نتایج جستجو برای: security constrained unitcommitment
تعداد نتایج: 252998 فیلتر نتایج به سال:
This book presents various security aspects in RFID and sensor networks. Each chapter represents a self-sufficient, independent paper, and the topics are not formally bound together by means of e.g. an introduction or an overview of the debated topics. The editors have chosen and arranged the discussed topics in such a way, however, as to give a good overview of the security challenges in resou...
Resource-constrained mobile devices are becoming increasingly popular within distributed networks, but introduce a weak point of security. Existing protocols for distributed mobile device networks, such as SPKI/SDSI, are emerging standards and lack built-in confidentiality, mutual authorisation and mutual authentication. Our research addresses the above-mentioned security limitations of an exis...
Case-based reasoning (CBR) infers a solution to a new problem by searching a collection of previouslysolved problems for cases which are similar to the new problem. The collection of previous problems and their associated solutions represents the CBR system’s realm of expertise. A CBR system helps to exploit data so that smarter decisions can be made in less time and/or at lower cost. A key iss...
In this paper, a new approach is proposed to solve the constrained optimization problem of saving grid energy and increasing safety in a simultaneous wireless information and power transfer (SWIPT) system. The traditional grid energy is combined with the renewable energy to form a hybrid energy, which provides power for the system to achieve green wireless transmission. The transfer process of ...
Constrained optimisation is increasingly considered by industry as amajor candidate to cope with hard problems of practical relevance.However, the approach of exploiting, in those scenarios, current Con-straint or Mathematical Programming solvers has severe limitations,which clearly demand new methods: data is usually stored in poten-tially very-large databases, and building...
As we move towards the Internet of Things (IoT), the number of sensors deployed around the world is growing at a rapid pace. There is a huge scope for more streamlined living through an increase of smart services but this coincides with an increase in security and privacy concerns, therefore access control has been an important factor in the development of IoT. This work proposes an authorizati...
We present a new method for automatic implicit induction theorem proving, and its application for the verification of cryptographic protocols. The method is based on constrained tree grammars and handles non-confluent rewrite systems which are required in the context of the verification of security protocols because of the non-deterministic behavior of attackers. It also handles axioms between ...
This paper outlines the fundamental features of the PJM day-ahead energy market and real-time energy market. The Day-ahead market is based on a voluntary least-cost security constrained unit commitment and dispatch with several fundamental design features that ensure the market is robust and competitive. This market offers market participants the option to lock in energy and transportation char...
Due to the recent increased interest in wireless mesh networks (WMN), their security challenges have become of paramount importance. An important security mechanism for WMN, intrusion detection, has received considerable attention from the research community. Recent results show that traditional monitoring mechanisms are not applicable to real-worldWMN due to their constrained resources (memory...
WSNs are trending towards dynamic environments that enable multiple parties to concurrently deploy and exploit multiple applications on shared nodes. The node owners want to share their nodes’ capabilities in order to increase return on investment, provide value added services, and easily share sensor node services. These concepts drive an evolving view on the software support that is required ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید