10 research outputs found
AI-enabled metaheuristic optimization for predictive management of renewable energy production in smart grids
The integration of renewable energy sources into smart grids offers a promising solution for building sustainable and reliable energy systems. However, optimizing hybrid renewable energy systems remains a crucial area of research. The study presents a comprehensive approach combining artificial intelligence algorithm techniques with metaheuristic optimization algorithms for anticipating and managing renewable energy sources in smart grid environments. With precision, recall, and accuracy scores of 0.92, 0.93, and 0.92, respectively, the proposed Hybrid LSTM-RL model beats current algorithms in correctly forecasting energy demand patterns. With an accuracy of 0.91 for various load balancing measures, the RL-SA algorithm efficiently measures load balancing. With mean squared error (MSE), mean absolute error (MAE), R-squared score, root mean square error (RMSE), and mean absolute percentage error (MAPE) values of 345.12, 15.07, 0.78, 18.57, and 7.83, respectively, the CNN-PSO algorithm also turns out to be the most successful at forecasting the generation of renewable energy. These discoveries help hybrid renewable energy systems in smart grid settings advance, enabling effective, dependable, and economical energy production and distribution. The suggested solution also has the potential to be used in rural and off-grid settings. Overall, this research offers a useful method for maximizing the production of renewable energy and acts as a spark for additional studies into energy management systems
CTLA: Compressed Table Look up Algorithm for Open Flow Switch
The size of the TCAM memory grows as more entries are added to the flow table of Open Flow switch. The procedure of looking up an IP address involves finding the longest prefix. In order to keep up with the link speed, the IP lookup operation in the forwarding table should also need to be speed up. TCAM's scalability and storage are constrained by its high power consumption and circuit density. The only time- or space-efficient algorithms for improvement are the subject of several research studies. In order to boost performance even further, this study focuses on time and space efficient algorithms. To strike a balance between speedy data access and efficient storage, this study proposes a combination of compression and a quick look-up mechanism to satisfy the space and speed requirements of the Open Flow switch. As the data is compressed, performance improves because less memory is required to store the look-up table and fewer bits are required to search. The look up complexity of proposed approach is and average space reduction is 61%
FEDDBN-IDS: federated deep belief network-based wireless network intrusion detection system
Abstract Over the last 20 years, Wi-Fi technology has advanced to the point where most modern devices are small and rely on Wi-Fi to access the internet. Wi-Fi network security is severely questioned since there is no physical barrier separating a wireless network from a wired network, and the security procedures in place are defenseless against a wide range of threats. This study set out to assess federated learning, a new technique, as a possible remedy for privacy issues and the high expense of data collecting in network attack detection. To detect and identify cyber threats, especially in Wi-Fi networks, the research presents FEDDBN-IDS, a revolutionary intrusion detection system (IDS) that makes use of deep belief networks (DBNs) inside a federated deep learning (FDL) framework. Every device has a pre-trained DBN with stacking restricted Boltzmann machines (RBM) to learn low-dimensional characteristics from unlabelled local and private data. Later, these models are combined by a central server using federated learning (FL) to create a global model. The whole model is then enhanced by the central server with fully linked SoftMax layers to form a supervised neural network, which is then trained using publicly accessible labeled AWID datasets. Our federated technique produces a high degree of classification accuracy, ranging from 88% to 98%, according to the results of our studies
Optimizing QoS and security in agriculture IoT deployments: A bioinspired Q-learning model with customized shards
Agriculture Internet of Things (AIoTs) deployments require design of high-efficiency Quality of Service (QoS) & security models that can provide stable network performance even under large-scale communication requests. Existing security models that use blockchains are either highly complex or require large delays & have higher energy consumption for larger networks. Moreover, the efficiency of these models depends directly on consensus-efficiency & miner-efficiency, which restricts their scalability under real-time scenarios. To overcome these limitations, this study proposes the design of an efficient Q-Learning bioinspired model for enhancing QoS of AIoT deployments via customized shards. The model initially collects temporal information about the deployed AIoT Nodes, and continuously updates individual recurring trust metrics. These trust metrics are used by a Q-Learning process for identification of miners that can participate in the block-addition process. The blocks are added via a novel Proof-of-Performance (PoP) based consensus model, which uses a dynamic consensus function that is based on temporal performance of miner nodes. The PoP consensus is facilitated via customized shards, wherein each shard is deployed based on its context of deployment, that decides the shard-length, hashing model used for the shard, and encryption technique used by these shards. This is facilitated by a Mayfly Optimization (MO) Model that uses PoP scores for selecting shard configurations. These shards are further segregated into smaller shards via a Bacterial Foraging Optimization (BFO) Model, which assists in identification of optimal shard length for underlying deployment contexts. Due to these optimizations, the model is able to improve the speed of mining by 4.5%, while reducing energy needed for mining by 10.4%, improving the throughput during AIoT communications by 8.3%, and improving the packet delivery consistency by 2.5% when compared with existing blockchain-based AIoT deployment models under similar scenarios. This performance was observed to be consistent even under large-scale attacks