Search
Now showing items 31-40 of 140
PRNU-Net: a Deep Learning Approach for Source Camera Model Identification based on Videos Taken with Smartphone
(
Institute of Electrical and Electronics Engineers Inc.
, 2022 , Conference Paper)
Recent advances in digital imaging have meant that every smartphone has a video camera that can record high-quality video for free and without restrictions. In addition, rapidly developing Internet technology has contributed ...
Crowd counting Using DRL-based segmentation and RL-based density estimation
(
Institute of Electrical and Electronics Engineers Inc.
, 2022 , Conference Paper)
People counting is one of the computer vision tasks that can be useful for crowd management. In addition, estimating the crowdedness of a surveilled scene for crowd behavior analysis is one of the prominent challenges in ...
Reliable Video Forensics Evidence Cataloguing using Video Source device Identification on the Blockchain
(
Institute of Electrical and Electronics Engineers Inc.
, 2022 , Conference Paper)
Videos and images are plentiful, shared, modified, and retrieved through different sources. They are used for the purposes of data collection and evidence gathering, as well as entertainment. The widespread use and misuse ...
Three Dimensional Denoising Filter for Effective Source Smartphone Video Identification and Verification
(
Association for Computing Machinery
, 2022 , Conference Paper)
The field of digital image and video forensics has recently seen significant advances and has attracted attention from a growing number of researchers given the availability of imaging functionalities in most current ...
An Agile Black-Out Detection and Response Paradigm in Smart Grids Incorporating IoT-Oriented Initiatives and Fog-Computing Platform
(
Institute of Electrical and Electronics Engineers Inc.
, 2022 , Conference Paper)
Voltage and frequency stability are fundamental subjects for power system operators. There are unwanted faults and factors, which affect the stability of the system and may result in a major instability (blackout). Thereby, ...
Optimal Operation of a Residential Energy Hub in the Presence of an Electric Vehicle using Whale Optimization Algorithm
(
Institute of Electrical and Electronics Engineers Inc.
, 2022 , Conference Paper)
An energy hub is a unit that receives various energy carriers such as electricity and natural gas at its input and, after converting or storing energy, offers different energies at its output such as electricity, heating, ...
P2P as a Smarter Way of Energy Trading: A Game Theoretic Case Study for Multi-microgrids
(
Institute of Electrical and Electronics Engineers Inc.
, 2022 , Conference Paper)
This paper focuses on performing peer-To-peer (P2P) energy trading in a grid-Tied multi-microgrid system (MMS). To do so, three microgrids, each consisting of distributed energy resources (DERs) such as wind turbines (WTs), ...
Optimal Operation of Distributed Flexible Generation Sources Incorporating VPP Framework in Market Environment Considering Uncertainties
(
Institute of Electrical and Electronics Engineers Inc.
, 2022 , Conference Paper)
With the evolution of wind turbine technologies, an immense desire is to integrate this energy into power markets more than ever. On the other hand, wind farms have a limited role in the electricity market due to their ...
A Game Theory Based Optimal Planning for a Hybrid Energy System Considering Time of Use Tariffs
(
Institute of Electrical and Electronics Engineers Inc.
, 2022 , Conference Paper)
In this paper, a game theory based optimization algorithm is presented for optimal planning of hybrid energy systems. Considering wind turbine, photovoltaic, and battery energy storage systems as rational players, all ...
Data-Driven Koopman Operator Based Cyber-Attacks for Nonlinear Control Affine Cyber-Physical Systems
(
Institute of Electrical and Electronics Engineers Inc.
, 2022 , Conference Paper)
This paper studies the data-driven implementation of stealthy cyber-attacks for a class of nonlinear cyber-physical systems (CPS). In particular, we consider and study zero dynamics and covert cyber-attacks. By utilizing ...