تصفح حسب الموضوع "Computation theory"
السجلات المعروضة 1 -- 6 من 6
-
Cybersecurity for industrial control systems: A survey
( Elsevier Ltd , 2020 , Article Review)Industrial Control System (ICS) is a general term that includes supervisory control & data acquisition (SCADA) systems, distributed control systems (DCS), and other control system configurations such as programmable logic ... -
Economic Planning and Comparative Analysis of Market-driven Multi-microgrid system for Peer-to-Peer energy trading
( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)This paper focuses on the implementation of peer-to-peer (P2P) energy trading and planning of a grid-connected multi-microgrid system (MMS) based on an advanced optimization approach. The proposed architecture is comprised ... -
Optimal Consensus Time Synchronizations for Wireless Sensor Networks
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)Wireless Sensor Networks (WSNs) have received an important consideration in recent years regarding its broad area of applications. Time synchronization is one of the most important challenges of WSNs. This paper proposes ... -
The inapproximability of illuminating polygons by α-floodlights
( Queen's University, Ontario, Canada , 2015 , Conference Paper)We consider variants of the art gallery problem where guard visibility is limited to a certain angular aperture-. We show that the problem is NP-hard even when guards can be located in the interior of the polygon. We then ... -
The Schottky-Klein prime function: A theoretical and computational tool for applications
( Oxford University Press , 2016 , Article)This article surveys the important role, in a variety of applied mathematical contexts, played by the socalled Schottky-Klein (S-K) prime function. While it is a classical special function, introduced by 19th century ... -
TRUST XAI: Model-Agnostic Explanations for AI With a Case Study on IIoT Security
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)Despite AI’s significant growth, its “black box" nature creates challenges in generating adequate trust. Thus, it is seldom utilized as a standalone unit in IoT high-risk applications, such as critical ...