Reliability Evaluation of Large Scale Battery Energy Storage Systems Abstract? The reliability of large scale bat-tery storage systems consisting of multiple battery modules. The whole system reliability assessment is based on the reliability evaluation of system components including individual battery modules and power electronic converters. In order to evaluate the reliability of a battery module,…
Reliable and Efficient Data Acquisition in Wireless Sensor Networks in the Presence of Transfaulty Nodes Abstract? A collection of spatially distributed sensor nodes in a wireless sensor network (WSN) work collaboratively to sense the physical phenomena around them and then send the sensed information to the s ink node through single-hop or multihop paths. In…
Removal of Canvas Patterns in Digital Acquisitions of Paintings Abstract? The removal of canvas artifacts from high-resolution digital photographs and X-ray images of paintings on canvas. Both imaging modalities are common investigative tools in art history and art conservation. Canvas artifacts manifest themselves very differently according to the acquisition modality; they can hamper the visual…
Repair Tree: Fast Repair for Single Failure in Erasure-coded Distr ibuted Storage Systems Abstract– In order to guarantee data reliability, erasure codes have been used in distributed storage systems. Nevertheless, this mechanism suffers from the repair problem that excess data are needed to repair a single failure, causing both high bandwidth consuming for the network…
Coverage Performance of Joint Transmission for Moving Relay Enabled Cellular Networks in Dense Urban Scenarios Abstract– In order to guarantee data reliability, erasure codes have been used in distributed storage systems. Nevertheless, this mechanism suffers from the repair problem that excess data are needed to repair a single failure, causing both high bandwidth consuming for…
Rescheduling of real power for congestion management with integration of pumped storage hydro unit using firefly algorithm Abstract?Abstract Post-deregulation era of power system operation produces more pressure on Independent System Operator (ISO) to ensure congestion free transmission network without destroying system security. Inorder to relieve transmission congestion, ISO initiates correct methods by maintaining system reliability…
Rescheduling of real power for congestion management with integration of pumped storage hydro unit using firefly algorithm Abstract?Abstract During disaster events, timely and targeted information provision and exchange could provide great help to the stricken population in difficult and complicated environments. This paper reports a serviceoriented system, called Rescue Wings, for providing emergency support to…
Research on MapReduce-based Cloud Storage Batch Auditing Abstract?Cloud Storage is a new kind of network storage technology. It is developed from Cloud Computing, which has been envisioned as the next-generation architecture of IT enterprise. Cloud Storage is very popular for its quick, cheap and convenient services. However, it also brings new and challenging security problems…
Research on Trust Sensing Based Secure Routing Mechanism for Wireless Sensor Network Abstract-In the first place, aiming at the serious impact of the typical network attacks caused by the limited energyand the poor deployment environment of wireless sensor network (WSN) on data transmission, a trust sensing-based secure routing mechanism (TSSRM) with the lightweight characteristics and…
Resolving Multi-Party Privacy Conflicts in Social Media Abstract? Items shared through Social Media may affect more than one user?s privacy?e.g., photos that depict multiple users, comments that mention multiple users, events in which multiple users are invited, etc. The lack of multi-par ty privacy management support in current mainstream Social Media infrastructures makes users unable…
Resource Allocation for Multiple-Sources Single-Relay Cooperative Communication OFDMA Systems Abstract? Joint allocation of resources, namely subcarrier assignment and power profiles at the source and relay nodes, is considered for both relaying schemes amplify and forward (AF) and decode and forward (DF) with multiple users using orthogonal frequency division multiple access (OFDMA). The objective is to…
Resource Allocation in Cloud Computing Using the Uncertainty Principle of Game Theory Abstract? Virtualization of resources on the cloud offers a scalable means of consuming services beyond the capabilities of small systems. In a cloud that offers infrastructure such as processor, memory, hard disk, etc., a coalition of virtual machines formed by grouping two or…