نتایج جستجو برای: security constrained unitcommitment

تعداد نتایج: 252998  

2014
Christian Forler David McGrew Stefan Lucks Jakob Wenzel

In this paper we introduce the first authenticated encryption scheme based on a hash function, called COFFE. This research has been motivated by the challenge to fit secure cryptography into constrained devices – some of these devices have to use a hash function, anyway, and the challenge is to avoid the usage of an additional block cipher to provide authenticated encryption. COFFE satisfies th...

2013
Pejman Niksaz

_ Wireless Sensor Networks (WSNs) have been recognized for their utility in a variety of different fields including military sensing and tracking, environmental monitoring, patient monitoring and tracking smart environments. The more scientists try to develop further cost and energy efficient computing devices and algorithms for WSNs, the more challenging it becomes to fit the security of WSNs ...

Journal: :Energies 2023

The integration of distributed energy resources, such as wind farms (WFs) and storage systems (ESSs), into distribution networks can lower the economic cost power generation. However, it is essential to consider operational constraints, including loading margin, which ensures security line contingency. This study aims develop a comprehensive hourly network reconfiguration (HDNR) model minimize ...

Journal: :International Journal of Electrical Power & Energy Systems 2021

Global electric vehicles (EVs) fleet is expanding at a rapid pace. Considering the uncertain driving pattern of EVs, they are dynamic consumers electricity and their integration can give rise to operational problems jeopardize security power system. Under such circumstances, implementation demand-side response (DSR) programs more likely be an effective solution for reducing risks load curtailme...

2008
Ruhma Tahir Muhammad Younas Javed Attiq Ahmad Raja Iqbal

In this paper we propose a Lightweight Encryption Mechanism based on the Rabbit stream cipher for providing confidentiality in Wireless Sensor Networks (WSNs) that fulfils both requirements of security as well as energy efficiency. Our proposed security protocol is an idea for resource constrained WSNs, and can be widely used in the applications of secure communication where the communication n...

Journal: :IEEE Transactions on Information Forensics and Security 2019

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید