نتایج جستجو برای: security constrained unitcommitment
تعداد نتایج: 252998 فیلتر نتایج به سال:
In this paper we introduce the first authenticated encryption scheme based on a hash function, called COFFE. This research has been motivated by the challenge to fit secure cryptography into constrained devices – some of these devices have to use a hash function, anyway, and the challenge is to avoid the usage of an additional block cipher to provide authenticated encryption. COFFE satisfies th...
_ Wireless Sensor Networks (WSNs) have been recognized for their utility in a variety of different fields including military sensing and tracking, environmental monitoring, patient monitoring and tracking smart environments. The more scientists try to develop further cost and energy efficient computing devices and algorithms for WSNs, the more challenging it becomes to fit the security of WSNs ...
The integration of distributed energy resources, such as wind farms (WFs) and storage systems (ESSs), into distribution networks can lower the economic cost power generation. However, it is essential to consider operational constraints, including loading margin, which ensures security line contingency. This study aims develop a comprehensive hourly network reconfiguration (HDNR) model minimize ...
Global electric vehicles (EVs) fleet is expanding at a rapid pace. Considering the uncertain driving pattern of EVs, they are dynamic consumers electricity and their integration can give rise to operational problems jeopardize security power system. Under such circumstances, implementation demand-side response (DSR) programs more likely be an effective solution for reducing risks load curtailme...
In this paper we propose a Lightweight Encryption Mechanism based on the Rabbit stream cipher for providing confidentiality in Wireless Sensor Networks (WSNs) that fulfils both requirements of security as well as energy efficiency. Our proposed security protocol is an idea for resource constrained WSNs, and can be widely used in the applications of secure communication where the communication n...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید