Integrated visual security management for optimal condition explorations in resource-constrained systems
نویسندگان
چکیده
منابع مشابه
Stochastic Security Constrained Transmission and Battery Expansion Planning In Integrated Gas-Electricity Systems Considering High Penetration of Renewable Resources..
In this study, a new model is proposed to solve the problem of transmission and battery expansion planning considering integrated electricity and gas systems. The presented model is a bi-level stochastic planning model, where transmission and battery expansion planning modeling is done on one level, and gas network modeling is done on the other level. Here, the impact of the high penetration of...
متن کاملOptimal resource allocation for security in reliability systems
Recent results have used game theory to explore the nature of optimal investments in the security of simple series and parallel systems. However, it is clearly important in practice to extend these simple security models to more complicated system structures with both parallel and series subsystems (and, eventually, to more general networked systems). The purpose of this paper is to begin to ad...
متن کاملAutomatic Thread Stack Management for Resource-Constrained Sensor Operating Systems
As low-power microcontrollers for wireless sensor nodes and other embedded devices continue to be manufactured with more memory, multi-threaded operating systems are becoming available on such devices. Each thread must be associated with an independent stack and part of the system memory must be dedicated to these stacks. This paper proposes a method of bounding worst-case thread stack sizes fr...
متن کاملDistributed Security Constrained Optimal Power Flow Integrated to a DSM Based Energy Management System for Real Time Power Systems Security Control
This paper presents the development of the distributed processing based Security Constrained Optimal Power Flow (SCOPF) and its integration to a Distributed Shared Memory Energy Management System (EMS) in order to enable real time power systems security control. The optimization problem is solved by the Interior Points Method and the security constraints are considered by the use of Benders Dec...
متن کاملSecurity Fusion: A New Security Architecture for Resource-Constrained Environments
There is a huge demand for wireless sensors and RFID tags for remote surveillance and tracking. However, in order for such technologies to gain wide acceptance in industry, there needs to be strong security integrated into them. Traditional cryptographic schemes are infeasible due to hardware, computation, and power constraints. To that end, we introduce a new security paradigm, namely security...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: EURASIP Journal on Image and Video Processing
سال: 2019
ISSN: 1687-5281
DOI: 10.1186/s13640-018-0389-0