The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In traditional power networks, energy theft is a significant problem that causes severe financial losses to utility companies and legitimate users, jeopardizes system stability, and enables other illegal activities. Recently, governments and utility companies propose the Smart Grid as the next generation electric network to improve the current grid's efficiency, reliability, and security. In the Smart...
A major source of inefficiency in power grids is the underutilization of generation capacity. This is mainly because load demand during peak hours is much larger than that during off-peak hours. Moreover, extra generation capacity is needed to maintain a security margin above peak load demand. As load demand keeps increasing and two-way communications are enabled by smart meters (SMs), demand response...
A computationally efficient algorithm is presented for locating multiple sources on a two-dimensional grid. The total number of the sources as well as their intensities and locations on the two-dimensional grid are assumed unknown and the intensities of the sources are not necessarily identical. The distribution of the source intensity on the grid, which contains all the information about the sources,...
Abstract-Spectrum auction is an enabling approach to drastically improving the spectrum utilization to satisfy the ever increasing service demands in wireless networks. However, the behaviors of the untrustworthy auctioneer (i.e., the frauds of the untrustworthy auctioneer and the bid-rigging between the greedy bidders and the insincere auctioneer) pose significant design challenges. In this paper,...
In the actual data there are a lot of missing values which can be properly remedied by other relevant factors in order to bring down the amount of missing information. In this paper Support Vector Regression (SVR) is applied to predict the values of abdominal circumference, body mass index and high density lipoproteins. After predicted by SVR, the average relative errors of abdominal circumference,...
A new method to compute Chinese text concept is proposed in this paper. In this method, we construct sentence vectors from the text by extracting and quantifying some syntax and semantic features such as concept elements, dependent relations and correlative relations. Then, we combine these sentence vectors to the text vector to represent the text concept. Experimental results show that, in the application...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.