The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The advancement of cloud-computing technologies opens new possibilities to outsource to the third-party cloud the computation-intensive and time-consuming dynamic simulations needed in power grid system research and operations. Outsourcing makes it possible to conduct dynamic simulations much faster and with lower cost than to keep all computations local. On the other hand, outsourcing, however, also...
In the U.S., energy theft causes about six billion dollar losses to utility companies (UCs) every year. With the smart grid being proposed to modernize current power grids, energy theft may become an even more serious problem since the "smart meters" used in smart grids are vulnerable to more types of attacks compared to traditional mechanical meters. Therefore, it is important to develop...
In the U.S., energy theft causes six billion dollar losses to utility companies (UCs) every year. With the smart grid being proposed to modernize current power grids, energy theft may become an even more serious problem since the “smart meters” used in smart grids are vulnerable to more types of attacks compared to traditional mechanical meters. Therefore, it is important to develop efficient and...
A computationally efficient algorithm is presented for locating multiple sources on a two-dimensional grid. The total number of the sources as well as their intensities and locations on the two-dimensional grid are assumed unknown and the intensities of the sources are not necessarily identical. The distribution of the source intensity on the grid, which contains all the information about the sources,...
Connection Manager Intelligence Agent's (CMIA) an attractive feature is use the network traffic and behavior with multi-attributes to find the best network devices and connection devices meet user habits that it possible to access various network contents everywhere at any time. In this agent, information process is thoroughly integrated into embedded system for connection manager of MeeGo or Android...
Cognitive Radio technology releases the spectrum from shackles of authorized licenses and facilitates the trading of spectrum bands. In the spectrum market, primary service providers (PSPs) set price for the vacant licensed bands of primary users (PUs) and sell them for monetary gains, and the secondary service provider (SSP) can buy the bands and opportunistically use them to satisfy the service...
It is necessary to establish scientific and integrated course and text book architecture of simulation science and technology. This paper introduces the actuality of the course and text book architecture, and establishes the principle of the course architecture. Based on authorpsilas teaching practice, a primary architecture is presented to be discussed.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.