ECE 617 Fall 2015 Homework xizhe Mao 31344482 Use the papers/presentations: Gies, “Safety Considerations for Smart Grid Technology Equipment,” Chopra, “Remarks to IEEE International Conference on SmartGridComm,” and Budka, et.al., “GERI – Bell Labs Smart Grid Research Focus:Economic Modeling, Networking, and Security & Privacy” to answer the following. [5 points] According to Gies, in basic, high level terms, what is the smart grid? According to Gies, what is the best approach to approach
Words: 588 - Pages: 3
30 IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.8, August 2008 A Hierarchical Scheduling and Replication Strategy A. Horri, R. Sepahvand, Gh. Dastghaibyfard Department of Computer Science & Engineering, College of Engineering, Shiraz University, Molla Sadra Ave, Shiraz, Iran 71348-51154 3- Deciding what replica files to keep or delete when there is shortage of storage in a site i.e. long-term optimization or dynamic replication strategy. Replication can be
Words: 3673 - Pages: 15
after amputation and recovery from hemiplegia after a stroke. In traditional mirror therapy, patients place a mirror beside the functional limb, blocking their view of the affected limb, thus enhances recovery by enlisting direct simulation. This paper creating the illusion that both the limbs are working properly, proposes an alternate robot based concept, named Wear-A-BAN, which enhances recovery by enlisting direct stimulation. In where the rehabilitative task will be carried out by
Words: 3208 - Pages: 13
In this paper, we address the problem designing a proactive protocol scheme that does not rely on any timer-based mechanism. This scheme guarantees that valid cached routes are never removed while stale routes are removed aggressively .This proactive caching scheme has been embedded in the Zone Routing Protocol (ZRP) framework. 1: INTRODUCTION The term MANET (Mobile Adhoc Network)refers to a multihop packet based wireless network composed
Words: 2723 - Pages: 11
WIRE LESS MESS NETWORK WITH HRPU ABSTRACT A Wireless mesh network is a mesh network created through the connection of wireless access points installed at each network user’s locale. Each user is also a provider, forwarding data at next node. The networking infrastructure is decentralized and simplified because each node need only transmit as far as the next node. Wireless mesh networking could allow people living in the remote areas and small businesses operating in rural neighborhoods
Words: 4177 - Pages: 17
Abstract: Multicast establishes a group communication, where one sender can transmit the message to multiple receivers. Multicasting makes this transmission efficient by making the client to send just one copy. But for secure transmission in the multicast environment is a major issue it should maintain the authentication, non-repudiation and integrity of messages. For this we have created a multicast environment which ensures all these properties by applying digital signature for authentication by
Words: 1122 - Pages: 5
places through the internet. Companies can get many advantages by using Internet network to support their business. Therefore, companies are trying as hard as they can, and give high effort in protecting their network from attack and make sure that they have the best network security. Most people think that the threat of security attack is only come from outside the company. In fact, the attack from inside the company network is more harmful with high frequency to be happened. It is widely know now that
Words: 1183 - Pages: 5
Neural Networks for Matching in Computer Vision Giansalvo Cirrincione1 and Maurizio Cirrincione2 Department of Electrical Engineering, Lab. CREA University of Picardie-Jules Verne 33, rue Saint Leu, 80039 Amiens - France exin@u-picardie.fr Universite de Technologie de Belfort-Montbeliard (UTBM) Rue Thierry MIEG, Belfort Cedex 90010, France maurizio.cirricione@utbm.fr 1 2 Abstract. A very important problem in computer vision is the matching of features extracted from pairs of images. At this
Words: 3666 - Pages: 15
CHAPTER 1 THE PROBLEM AND ITS SCOPE INTRODUCTION Rationale of the Study Acquiring information is quasi difficult. Specifically, information that was secluded from general views. To puzzle out this problem, technology becomes an absolute must. In fact it can be used effectively in daily lives. The most essential contribution of technology to society is making the lives of people much easier and helping them achieve more what was previously impossible. The discovery of computers was the
Words: 8842 - Pages: 36
Mutation: in this paper, we adopt the following mutation mode: randomly select a gene of a chromosome, and change its value to an integer in the set of {1, 2, ..., L}, where L is the largest class number in that chromosome. It is easy to operate and contributes a lot to increase the diversity of population. Besides, invalid mutation will be effectively avoided through limiting the scope of mutation. For each of the chromosome to be mutated, 20% genes will be selected to operate mutation. For example
Words: 2229 - Pages: 9