28 research outputs found

    An Efficient and Secure Energy Trading Approach with Machine Learning Technique and Consortium Blockchain

    Get PDF
    In this paper, a secure energy trading mechanism based on blockchain technology is proposed. The proposed model deals with energy trading problems such as insecure energy trading and inefficient charging mechanisms for electric vehicles (EVs) in a vehicular energy network (VEN). EVs face two major problems: finding an optimal charging station and calculating the exact amount of energy required to reach the selected charging station. Moreover, in traditional trading approaches, centralized parties are involved in energy trading, which leads to various issues such as increased computational cost, increased computational delay, data tempering and a single point of failure. Furthermore, EVs face various energy challenges, such as imbalanced load supply and fluctuations in voltage level. Therefore, a demand-response (DR) pricing strategy enables EV users to flatten load curves and efficiently adjust electricity usage. In this work, communication between EVs and aggregators is efficiently performed through blockchain. Moreover, a branching concept is involved in the proposed system, which divides EV data into two different branches: a Fraud Chain (F-chain) and an Integrity Chain (I-chain). The proposed branching mechanism helps solve the storage problem and reduces computational time. Moreover, an attacker model is designed to check the robustness of the proposed system against double-spending and replay attacks. Security analysis of the proposed smart contract is also given in this paper. Simulation results show that the proposed work efficiently reduces the charging cost and time in a VEN.publishedVersio

    An analysis of object appearance information and context based classification

    No full text
    The purpose of categorizing objects is to identify and locate within an image, instances of an object category. It is a difficult task to identify objects in images when such images contain poor quality, occlusion, background clutter, or noise. It is more difficult when there are too many objects in same scene (background). Most models for categorizing object exploit context information and appearance information from objects in order to enhance recognition accuracy. In the scene, interaction among objects (context information) can successfully help in removing ambiguity of appearance inputs during recognition task. Appearance information can help identify object classes successfully up to some level. The issue of integrating several kinds of contextual information in order to have a robust categorization of object is address in this paper. Various methods of exploiting contextual information for categorizing object are revie

    An Efficient and Secure Energy Trading Approach with Machine Learning Technique and Consortium Blockchain

    Get PDF
    In this paper, a secure energy trading mechanism based on blockchain technology is proposed. The proposed model deals with energy trading problems such as insecure energy trading and inefficient charging mechanisms for electric vehicles (EVs) in a vehicular energy network (VEN). EVs face two major problems: finding an optimal charging station and calculating the exact amount of energy required to reach the selected charging station. Moreover, in traditional trading approaches, centralized parties are involved in energy trading, which leads to various issues such as increased computational cost, increased computational delay, data tempering and a single point of failure. Furthermore, EVs face various energy challenges, such as imbalanced load supply and fluctuations in voltage level. Therefore, a demand-response (DR) pricing strategy enables EV users to flatten load curves and efficiently adjust electricity usage. In this work, communication between EVs and aggregators is efficiently performed through blockchain. Moreover, a branching concept is involved in the proposed system, which divides EV data into two different branches: a Fraud Chain (F-chain) and an Integrity Chain (I-chain). The proposed branching mechanism helps solve the storage problem and reduces computational time. Moreover, an attacker model is designed to check the robustness of the proposed system against double-spending and replay attacks. Security analysis of the proposed smart contract is also given in this paper. Simulation results show that the proposed work efficiently reduces the charging cost and time in a VEN

    Islamic resurgence and its aftermath

    No full text

    Contemporary trends in Muslim legal thought and ideology

    No full text

    Modern Islam and the economy

    No full text

    Muslims in the West: North America

    No full text

    Beyond dhimmihood

    No full text

    New frontiers and conversion

    No full text
    corecore