نتایج جستجو برای: security constrained unitcommitment
تعداد نتایج: 252998 فیلتر نتایج به سال:
In the linear system Ax = b the points x are sometimes constrained to lie in a given subspace S of column space of A. Drazin inverse for any singular or nonsingular matrix, exist and is unique. In this paper, the singular consistent or inconsistent constrained linear systems are introduced and the effect of Drazin inverse in solving such systems is investigated. Constrained linear system arise ...
The emergence of computing environments where smart devices are embedded pervasively in the physical world has made possible many interesting applications and has triggered several new research areas. Mobile ad hoc networks (MANET), sensor networks and radio frequency identification (RFID) systems are all examples of such pervasive systems. Operating on an open medium and lacking a fixed infras...
The paper studies a takeover contests, in which cash-constrained bidders decide on the optimal way to nance their cash bid. For both bidders and the seller this decision is at least as important as deciding on whether the payment should be in cash or in securities. The main result is that the optimal choice of the type of security contract (e.g., debt, equity, etc.) depends on biddersaccess t...
User authentication is a crucial service in wireless sensor networks (WSNs) that is becoming increasingly common in WSNs because wireless sensor nodes are typically deployed in an unattended environment, leaving them open to possible hostile network attack. Because wireless sensor nodes are limited in computing power, data storage and communication capabilities, any user authentication protocol...
Smart Messages (SMs) are migratory execution units used to describe distributed computations over mobile ad hoc networks of embedded systems. The main benefits provided by SMs are flexibility, scalability, and the ability to perform distributed computations over networks composed of heterogeneous, resource constrained, unattended embedded systems. A key challenge that confronts SMs, however, is...
Secure communication is an important aspect of any network and it has largely remained unexplored in wireless sensor networks (WSN). Security becomes a major challenge because of ad-hoc and resource constrained nature of sensor networks. In this paper we present a scalable and distributed security protocol, DSPS, for WSN that fits in between the network and the transport layers. DSPS satisfies ...
The resource-constrained sensors in mission-critical applications are subject to both random failures and intentional compromise by the adversary, which poses severe security threats in wireless sensor networks (WSNs). The different types of security threats have been identified and addressed in an individual manner in the past. And most solutions are cryptography based. In this paper, we argue...
Designing secure and robust gr ouping-proof protocols based o n RFID characte ristics becomes a hotspot in the research of security in Internet of Things (IOT). The proposed grouping-proof protocol s recently have security and/or privacy omission and these schemes afford order-dependence by relaying message among tags through an RFID reader. In consequence, aiming at enhancing the robustness, i...
In recent years, there is enormous growth of smart systems that have been developed for range of applications. This development is focused on Internet-ofThings (IoT), which will eventually, transform IoT into system of systems. Such smart systems are widely utilized in healthcare; however, the wide scope of such systems is also vulnerable to security and privacy issues. This paper proposes a se...
As smartphones are becoming more complex and powerful to provide better functionalities, concerns are increasing regarding security threats against their users. Since smartphones use a software architecture similar to PCs, they are vulnerable to the same classes of security risks. Unfortunately, smartphones are constrained by their limited resources that prevent the integration of advanced secu...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید