-
301
Improved method of non-intrusive load monitoring based on compressed sensing
Published 2025-09-01“…Then, event detection method and eigenvalue extraction method for load analysis of NILM-CS are proposed. …”
Get full text
Article -
302
An Improved Fuzzy Trajectory Clustering Method for Exploring Urban Travel Patterns
Published 2021-01-01Get full text
Article -
303
Programming virulent bacteriophages by developing a multiplex genome engineering method
Published 2025-06-01“…Using the SMART method, the 39.9-kb T7 E. coli phage genome was split into 10 segments, and 8 genomic loci were deleted in parallel to obtain a chassis phage with 10% genome reduction. …”
Get full text
Article -
304
A New Finite-Difference Method for Nonlinear Absolute Value Equations
Published 2025-03-01Get full text
Article -
305
A Reversible Compression Coding Method for 3D Property Volumes
Published 2025-07-01Get full text
Article -
306
Research on load labeling method for big data in novel power system
Published 2025-07-01“…However, one of the main obstacles to the effective use of power big data is the lack of efficient data labeling methods. By proposing a flexible framework to mark load patterns and usage habits in a non-intrusive way, the composite data tag file is used for smart grid functions such as demand response, energy management and load monitoring. …”
Get full text
Article -
307
A Method for Bus OD Matrix Estimation Using Multisource Data
Published 2020-01-01Get full text
Article -
308
Analysis of Smart Village Development in Supporting Smart City in Indonesia: A Systematic Review
Published 2024-12-01“…Smart village refers, generally speaking, to the implementation of the smart city idea inside the village borders. …”
Get full text
Article -
309
Lightweight and robust ship detection method driven by self-attention mechanism
Published 2024-10-01Get full text
Article -
310
A method of SQL access logs pretreatment for power business system
Published 2015-12-01“…With the development of smart grid interactive,the database interaction between the information inside and outside is increasing.A method of SQL access log compression for power business system to respond to the demand of database security audit for the power system was designed in detail.This method can realize the compression of SQL access log and have the function of simple classification for SQL logs.The test results show that the method can achieve a large margin compression of SQL access logs and meet the requirements of log preprocessing for the database behavior audit of power business system.…”
Get full text
Article -
311
Network bandwidth forecast method for IMS business in power dispatching communication
Published 2015-12-01“…The electric power dispatching data network business requirements of the IMS system were analyzed,the networking of the dispatching data network method was proposed,and the amount of the dispatching data network users was researched.According to the technology development and the power communication services requirement,IMS technique was used to construct next generation communication system,and the electric power dispatching data network was needed to be designed to load IMS services.The calculation method of network bandwidth and multimedia business traffic model for loading multimedia businesses was studied.It has guiding significance to construct next generation communication network for smart grid.…”
Get full text
Article -
312
SmartPresence: Wi-Fi-based online attendance management for smart academic assistance
Published 2025-06-01“…Abstract SmartPresence, a Wi-Fi-based attendance management system marks a significant leap in evaluating student performance, replacing traditional manual methods with pen-and-paper timesheets or paper-based student signatures. …”
Get full text
Article -
313
A method of SQL access logs pretreatment for power business system
Published 2015-12-01“…With the development of smart grid interactive,the database interaction between the information inside and outside is increasing.A method of SQL access log compression for power business system to respond to the demand of database security audit for the power system was designed in detail.This method can realize the compression of SQL access log and have the function of simple classification for SQL logs.The test results show that the method can achieve a large margin compression of SQL access logs and meet the requirements of log preprocessing for the database behavior audit of power business system.…”
Get full text
Article -
314
Smart cities and smart health: Innovations in home medical devices for efficient healthcare delivery
Published 2025-09-01“…With the methods of literature review, case analysis and trend prediction, this study deeply analyzes the application status, challenges and future development trend of smart home medical equipment in China, especially its application potential and market prospect in chronic disease management and aging society. …”
Get full text
Article -
315
Responsive Public Policies for Smart and Sustainable Buildings: An Experimental Application of the Smart Readiness Indicator
Published 2025-06-01“…The paper is organized into the Introduction; Materials and Methods, which contains the methodological approach; Results; and Discussion and Conclusions. …”
Get full text
Article -
316
Informer-based DDoS attack detection method for the power Internet of Things.
Published 2025-01-01“…With the rapid development of smart grids, power grid systems are becoming increasingly complex, posing significant challenges to their security. …”
Get full text
Article -
317
The Integrated Processing Method of Educational Information Resources Based on Edge Computing
Published 2022-01-01“…The research purpose of this paper is to study the integrated processing method of educational information resources based on edge computing. …”
Get full text
Article -
318
Multi-camera video collaborative analysis method based on edge computing
Published 2023-08-01“…In order to reduce the processing volume of multi-camera real-time video data in smart city scenarios, a video collaborative analysis method based on machine learning algorithms at the edge was proposed.Firstly, for the important objects detected by each camera, different key windows were designed to filter the region of interest (RoI) in the video, reduce the video data volume and extract its features.Then, based on the extracted data features, the same objects in the videos from different cameras were annotated, and a strategy for calculating the association degree value between cameras was designed for further reducing the video data volume.Finally, the GC-ReID algorithm based on graph convolutional network (GCN) and re-identification (ReID) was proposed, aiming at achieving the collaborative analysis of multi-camera videos.The experimental results show that proposed method can effectively reduce the system latency and improve the video compression rate while ensuring the high accuracy, compared with the existing video analysis methods.…”
Get full text
Article -
319
A Consistent Differential Privacy Dynamic Trajectory Flow Prediction Method
Published 2025-05-01“…The proposed method constructs a trajectory flow graph and integrates Laplace noise‐based differential privacy with consistency constraint adjustments to enhance privacy while maintaining data utility. …”
Get full text
Article -
320
An Applicable Control-Relevant Method for Nonlinearity Assessment using Gap Metric
Published 2024-08-01“…In this method, nonlinear system is decomposed to a bank of linear systems using gap metric, a smart tool for measuring the distance between two linear systems. …”
Get full text
Article