نتایج جستجو برای: security constrained unitcommitment

تعداد نتایج: 252998  

M. K. Mirnia M. Nikuie,

In the linear system Ax = b the points x are sometimes constrained to lie in a given subspace S of column space of A. Drazin inverse for any singular or nonsingular matrix, exist and is unique. In this paper, the singular consistent or inconsistent constrained linear systems are introduced and the effect of Drazin inverse in solving such systems is investigated. Constrained linear system arise ...

2006
Mike Burmester Tri Van Le Breno de Medeiros

The emergence of computing environments where smart devices are embedded pervasively in the physical world has made possible many interesting applications and has triggered several new research areas. Mobile ad hoc networks (MANET), sensor networks and radio frequency identification (RFID) systems are all examples of such pervasive systems. Operating on an open medium and lacking a fixed infras...

2012
Vladimir Vladimirov

The paper studies a takeover contests, in which cash-constrained bidders decide on the optimal way to …nance their cash bid. For both bidders and the seller this decision is at least as important as deciding on whether the payment should be in cash or in securities. The main result is that the optimal choice of the type of security contract (e.g., debt, equity, etc.) depends on bidders’access t...

2011
Hsiu-lien Yeh Tien-Ho Chen Pin-Chuan Liu Tai-Hoo Kim Hsin-Wen Wei

User authentication is a crucial service in wireless sensor networks (WSNs) that is becoming increasingly common in WSNs because wireless sensor nodes are typically deployed in an unattended environment, leaving them open to possible hostile network attack. Because wireless sensor nodes are limited in computing power, data storage and communication capabilities, any user authentication protocol...

2003
Gang Xu Cristian Borcea Liviu Iftode

Smart Messages (SMs) are migratory execution units used to describe distributed computations over mobile ad hoc networks of embedded systems. The main benefits provided by SMs are flexibility, scalability, and the ability to perform distributed computations over networks composed of heterogeneous, resource constrained, unattended embedded systems. A key challenge that confronts SMs, however, is...

2003
Vijay Bhuse Ajay Gupta Rishi Pidva

Secure communication is an important aspect of any network and it has largely remained unexplored in wireless sensor networks (WSN). Security becomes a major challenge because of ad-hoc and resource constrained nature of sensor networks. In this paper we present a scalable and distributed security protocol, DSPS, for WSN that fits in between the network and the transport layers. DSPS satisfies ...

2015
A. Senthil Kumar E. Logashanmugam

The resource-constrained sensors in mission-critical applications are subject to both random failures and intentional compromise by the adversary, which poses severe security threats in wireless sensor networks (WSNs). The different types of security threats have been identified and addressed in an individual manner in the past. And most solutions are cryptography based. In this paper, we argue...

Journal: :Int. J. Computational Intelligence Systems 2012
Ya-li Liu Xiaolin Qin Bo-Han Li Liu Liang

Designing secure and robust gr ouping-proof protocols based o n RFID characte ristics becomes a hotspot in the research of security in Internet of Things (IOT). The proposed grouping-proof protocol s recently have security and/or privacy omission and these schemes afford order-dependence by relaying message among tags through an RFID reader. In consequence, aiming at enhancing the robustness, i...

2017
Mobeen Khan Muhammad Taha Jilani Muhammad Khalid Khan Maaz Bin Ahmed

In recent years, there is enormous growth of smart systems that have been developed for range of applications. This development is focused on Internet-ofThings (IoT), which will eventually, transform IoT into system of systems. Such smart systems are widely utilized in healthcare; however, the wide scope of such systems is also vulnerable to security and privacy issues. This paper proposes a se...

Journal: :Computers & Security 2013
Saman A. Zonouz Amir Houmansadr Robin Berthier Nikita Borisov William H. Sanders

As smartphones are becoming more complex and powerful to provide better functionalities, concerns are increasing regarding security threats against their users. Since smartphones use a software architecture similar to PCs, they are vulnerable to the same classes of security risks. Unfortunately, smartphones are constrained by their limited resources that prevent the integration of advanced secu...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید