This article introduces a group search optimization (GSO) based tuning model for modelling and managing Smart Micro-Grids connected system. In existing systems, typically tuned PID controllers are engaged to point out...This article introduces a group search optimization (GSO) based tuning model for modelling and managing Smart Micro-Grids connected system. In existing systems, typically tuned PID controllers are engaged to point out the load frequency control (LFC) problems through different tuning techniques. Though, inappropriately tuned PID controller may reveal pitiable dynamical reply and also incorrect option of integral gain may even undermine the complete system. This research is used to explain about an optimized energy management system through Group Search Optimization (GSO) for building incorporation in smart micro-grids (MGs) with zero grid-impact. The essential for this technique is to develop the MG effectiveness, when the complete PI controller requires to be tuned. Consequently, we proposed that the proposed GSO based algorithm with appropriate explanation or member representation, derivation of fitness function, producer process, scrounger process, and ranger process. An entire and adaptable design of MATLAB/SIMULINK also proposed. The related solutions and practical test verifications are given. This paper verified that the proposed method was effective in Micro-Grid (MG) applications. The comparison results demonstrate the advantage of the proposed technique and confirm its potential to solve the problem.展开更多
The objective of this paper was to understand the increasing importance of building energy consumption, an overview of the comfort needs of the occupants is first deemed necessary in new control strategy for automatic...The objective of this paper was to understand the increasing importance of building energy consumption, an overview of the comfort needs of the occupants is first deemed necessary in new control strategy for automatic control and to present facts that characterize the energy consumption, most particularly at the workplaces level with new technology strategies. The study’s methodology applies functional and hierarchical separation. The contributions of this paper are static and dynamic models of individual users in a proposed existing building to create an office environment. To fulfill the purpose of the study and the research the following research questions will be investigated and analyzed from an architect’s perspective: (1) Are there appropriate technologies for improving energy efficiency in new buildings from the point of view the micro-grid, control and evaluation process in strategy? (2) Which sensor technology can determine the zone that needs or needs not to be considered the comfort?展开更多
The widespread adoption of blockchain technology has led to the exploration of its numerous applications in various fields.Cryptographic algorithms and smart contracts are critical components of blockchain security.De...The widespread adoption of blockchain technology has led to the exploration of its numerous applications in various fields.Cryptographic algorithms and smart contracts are critical components of blockchain security.Despite the benefits of virtual currency,vulnerabilities in smart contracts have resulted in substantial losses to users.While researchers have identified these vulnerabilities and developed tools for detecting them,the accuracy of these tools is still far from satisfactory,with high false positive and false negative rates.In this paper,we propose a new method for detecting vulnerabilities in smart contracts using the BERT pre-training model,which can quickly and effectively process and detect smart contracts.More specifically,we preprocess and make symbol substitution in the contract,which can make the pre-training model better obtain contract features.We evaluate our method on four datasets and compare its performance with other deep learning models and vulnerability detection tools,demonstrating its superior accuracy.展开更多
False data injection attack(FDIA)is an attack that affects the stability of grid cyber-physical system(GCPS)by evading the detecting mechanism of bad data.Existing FDIA detection methods usually employ complex neural ...False data injection attack(FDIA)is an attack that affects the stability of grid cyber-physical system(GCPS)by evading the detecting mechanism of bad data.Existing FDIA detection methods usually employ complex neural networkmodels to detect FDIA attacks.However,they overlook the fact that FDIA attack samples at public-private network edges are extremely sparse,making it difficult for neural network models to obtain sufficient samples to construct a robust detection model.To address this problem,this paper designs an efficient sample generative adversarial model of FDIA attack in public-private network edge,which can effectively bypass the detectionmodel to threaten the power grid system.A generative adversarial network(GAN)framework is first constructed by combining residual networks(ResNet)with fully connected networks(FCN).Then,a sparse adversarial learning model is built by integrating the time-aligned data and normal data,which is used to learn the distribution characteristics between normal data and attack data through iterative confrontation.Furthermore,we introduce a Gaussian hybrid distributionmatrix by aggregating the network structure of attack data characteristics and normal data characteristics,which can connect and calculate FDIA data with normal characteristics.Finally,efficient FDIA attack samples can be sequentially generated through interactive adversarial learning.Extensive simulation experiments are conducted with IEEE 14-bus and IEEE 118-bus system data,and the results demonstrate that the generated attack samples of the proposed model can present superior performance compared to state-of-the-art models in terms of attack strength,robustness,and covert capability.展开更多
The concept of smart houses has grown in prominence in recent years.Major challenges linked to smart homes are identification theft,data safety,automated decision-making for IoT-based devices,and the security of the d...The concept of smart houses has grown in prominence in recent years.Major challenges linked to smart homes are identification theft,data safety,automated decision-making for IoT-based devices,and the security of the device itself.Current home automation systems try to address these issues but there is still an urgent need for a dependable and secure smart home solution that includes automatic decision-making systems and methodical features.This paper proposes a smart home system based on ensemble learning of random forest(RF)and convolutional neural networks(CNN)for programmed decision-making tasks,such as categorizing gadgets as“OFF”or“ON”based on their normal routine in homes.We have integrated emerging blockchain technology to provide secure,decentralized,and trustworthy authentication and recognition of IoT devices.Our system consists of a 5V relay circuit,various sensors,and a Raspberry Pi server and database for managing devices.We have also developed an Android app that communicates with the server interface through an HTTP web interface and an Apache server.The feasibility and efficacy of the proposed smart home automation system have been evaluated in both laboratory and real-time settings.It is essential to use inexpensive,scalable,and readily available components and technologies in smart home automation systems.Additionally,we must incorporate a comprehensive security and privacy-centric design that emphasizes risk assessments,such as cyberattacks,hardware security,and other cyber threats.The trial results support the proposed system and demonstrate its potential for use in everyday life.展开更多
文摘This article introduces a group search optimization (GSO) based tuning model for modelling and managing Smart Micro-Grids connected system. In existing systems, typically tuned PID controllers are engaged to point out the load frequency control (LFC) problems through different tuning techniques. Though, inappropriately tuned PID controller may reveal pitiable dynamical reply and also incorrect option of integral gain may even undermine the complete system. This research is used to explain about an optimized energy management system through Group Search Optimization (GSO) for building incorporation in smart micro-grids (MGs) with zero grid-impact. The essential for this technique is to develop the MG effectiveness, when the complete PI controller requires to be tuned. Consequently, we proposed that the proposed GSO based algorithm with appropriate explanation or member representation, derivation of fitness function, producer process, scrounger process, and ranger process. An entire and adaptable design of MATLAB/SIMULINK also proposed. The related solutions and practical test verifications are given. This paper verified that the proposed method was effective in Micro-Grid (MG) applications. The comparison results demonstrate the advantage of the proposed technique and confirm its potential to solve the problem.
文摘The objective of this paper was to understand the increasing importance of building energy consumption, an overview of the comfort needs of the occupants is first deemed necessary in new control strategy for automatic control and to present facts that characterize the energy consumption, most particularly at the workplaces level with new technology strategies. The study’s methodology applies functional and hierarchical separation. The contributions of this paper are static and dynamic models of individual users in a proposed existing building to create an office environment. To fulfill the purpose of the study and the research the following research questions will be investigated and analyzed from an architect’s perspective: (1) Are there appropriate technologies for improving energy efficiency in new buildings from the point of view the micro-grid, control and evaluation process in strategy? (2) Which sensor technology can determine the zone that needs or needs not to be considered the comfort?
基金supported by the National Key Research and Development Plan in China(Grant No.2020YFB1005500)。
文摘The widespread adoption of blockchain technology has led to the exploration of its numerous applications in various fields.Cryptographic algorithms and smart contracts are critical components of blockchain security.Despite the benefits of virtual currency,vulnerabilities in smart contracts have resulted in substantial losses to users.While researchers have identified these vulnerabilities and developed tools for detecting them,the accuracy of these tools is still far from satisfactory,with high false positive and false negative rates.In this paper,we propose a new method for detecting vulnerabilities in smart contracts using the BERT pre-training model,which can quickly and effectively process and detect smart contracts.More specifically,we preprocess and make symbol substitution in the contract,which can make the pre-training model better obtain contract features.We evaluate our method on four datasets and compare its performance with other deep learning models and vulnerability detection tools,demonstrating its superior accuracy.
基金supported in part by the the Natural Science Foundation of Shanghai(20ZR1421600)Research Fund of Guangxi Key Lab of Multi-Source Information Mining&Security(MIMS21-M-02).
文摘False data injection attack(FDIA)is an attack that affects the stability of grid cyber-physical system(GCPS)by evading the detecting mechanism of bad data.Existing FDIA detection methods usually employ complex neural networkmodels to detect FDIA attacks.However,they overlook the fact that FDIA attack samples at public-private network edges are extremely sparse,making it difficult for neural network models to obtain sufficient samples to construct a robust detection model.To address this problem,this paper designs an efficient sample generative adversarial model of FDIA attack in public-private network edge,which can effectively bypass the detectionmodel to threaten the power grid system.A generative adversarial network(GAN)framework is first constructed by combining residual networks(ResNet)with fully connected networks(FCN).Then,a sparse adversarial learning model is built by integrating the time-aligned data and normal data,which is used to learn the distribution characteristics between normal data and attack data through iterative confrontation.Furthermore,we introduce a Gaussian hybrid distributionmatrix by aggregating the network structure of attack data characteristics and normal data characteristics,which can connect and calculate FDIA data with normal characteristics.Finally,efficient FDIA attack samples can be sequentially generated through interactive adversarial learning.Extensive simulation experiments are conducted with IEEE 14-bus and IEEE 118-bus system data,and the results demonstrate that the generated attack samples of the proposed model can present superior performance compared to state-of-the-art models in terms of attack strength,robustness,and covert capability.
基金funded by Princess Nourah bint Abdulrahman University Researchers Supporting Project Number(PNURSP2024R333)Princess Nourah bint Abdulrahman University,Riyadh,Saudi Arabia.
文摘The concept of smart houses has grown in prominence in recent years.Major challenges linked to smart homes are identification theft,data safety,automated decision-making for IoT-based devices,and the security of the device itself.Current home automation systems try to address these issues but there is still an urgent need for a dependable and secure smart home solution that includes automatic decision-making systems and methodical features.This paper proposes a smart home system based on ensemble learning of random forest(RF)and convolutional neural networks(CNN)for programmed decision-making tasks,such as categorizing gadgets as“OFF”or“ON”based on their normal routine in homes.We have integrated emerging blockchain technology to provide secure,decentralized,and trustworthy authentication and recognition of IoT devices.Our system consists of a 5V relay circuit,various sensors,and a Raspberry Pi server and database for managing devices.We have also developed an Android app that communicates with the server interface through an HTTP web interface and an Apache server.The feasibility and efficacy of the proposed smart home automation system have been evaluated in both laboratory and real-time settings.It is essential to use inexpensive,scalable,and readily available components and technologies in smart home automation systems.Additionally,we must incorporate a comprehensive security and privacy-centric design that emphasizes risk assessments,such as cyberattacks,hardware security,and other cyber threats.The trial results support the proposed system and demonstrate its potential for use in everyday life.