A comprehensive overview on demand side energy management towards smart grids: challenges, solutions, and future direction

MS Bakare, A Abdulkarim, M Zeeshan, AN Shuaibu - Energy Informatics, 2023 - Springer
Demand-side management, a new development in smart grid technology, has enabled
communication between energy suppliers and consumers. Demand side energy …

MSIS: Multispectral instance segmentation method for power equipment

J Shu, J He, L Li - Computational Intelligence and …, 2022 - Wiley Online Library
Infrared image of power equipment is widely used in power equipment fault detection, and
segmentation of infrared images is an important step in power equipment thermal fault …

A review of scalability issues in software-defined exchange point (SDX) approaches: state-of-the-art

A Abdullahi, S Manickam, S Karuppayah - IEEE Access, 2021 - ieeexplore.ieee.org
Internet Exchange Points (IXPs) interconnect heterogeneous networks and transfer
substantial traffic volumes. In the past decade, the number of IXPs has seen tremendous …

Symptom-based identification of G-4 chili leaf diseases based on rotation invariant

S Das Chagas Silva Araujo, VS Malemath… - Frontiers in Robotics …, 2021 - frontiersin.org
Instinctive detection of infections by carefully inspecting the signs on the plant leaves is an
easier and economic way to diagnose different plant leaf diseases. This defines a way in …

[HTML][HTML] A News Sentiment Index to Inform International Financial Reporting Standard 9 Impairments

YS Stander - Journal of Risk and Financial Management, 2024 - mdpi.com
Economic and financial narratives inform market sentiment through the emotions that are
triggered and the subjectivity that gets evoked. There is an important connection between …

[PDF][PDF] Proposed enhanced link failure rerouting mechanism for software-defined exchange point

A Abdullahi, S Manickam, S Karuppayah… - Indonesian Journal of …, 2023 - academia.edu
Internet eXchange point (IXP) is a way to optimize network bandwidth. It enables a platform
in the different providers like internet service providers (ISPs) and content delivery providers …

Authenticator rebinding attack of the UAF protocol on mobile devices

H Li, X Pan, X Wang, H Feng… - … and Mobile Computing, 2020 - Wiley Online Library
We present a novel attack named “Authenticator Rebinding Attack,” which aims at the Fast
IDentity Online (FIDO) Universal Authentication Framework (UAF) protocol implemented on …