Log in || Register editor@ijlret.com
IJLRET Menu

Current Issue [Vol. 04, No. 10] [October 2018]


Paper Title :: Heat Islands in México City: A Perspective from Remote Sensing Satellite Images
Author Name :: Fernando Mireles Arellano || Amanda Oralia Gómez González || Carlos Hernández López
Country :: México
Page Number :: 01-12
It is known that heat islands today are very common in cities around the world, but how do you know if your city is affected by this phenomenon ? Mexican researchers have investigated for a long time on this phenomenon by obtaining more accurate results every time on the existence of heat islands, but ¿How is it that behaves in Mexico City? To give a solution to this questioning it was decided to carry out the following work which shows the presence of heat islands in Mexico City, causes and consequences in addition demonstrates the effect pan and its possible relationship with the development of severe storms all this from a perspective of satellite remote sensing.
Keywords:effect casserole, heat islands, México City, remote sensing, satellite
[1]. Amanda Oralia Gómez González, Fernando Amir Espinoza Acuña, Carolina Coronado Alderete and Frida Ximena Jimenez Law (2017). Qgis Manual focused on Tele-Epidemiologia. First Edition, Mexico City.
[2]. Secretariat of Environment www.sedema.cdmx.gob.mx
[3]. General Directorate of Air Quality http://www.aire.cdmx.gob.mx
[4]. For the Mexico City Water System, Weather Radar https://data.sacmex.cdmx.gob.mx/radar-meteorologico
[5]. The United States Geological Survey (USGS https://earthexplorer.usgs.gov/

Paper Title :: The Future of Digital Integration on the Public sector in Lebanon: The case of Hospitality and Tourism
Author Name :: Bilal Jibai
Country :: Lebanon
Page Number :: 13-21
The main issue that this article will be discussing is the situation of Tourism and hospitality sector with in Lebanon. Our focus was on the obstacles facing this industry, its risks, and uncertainties. The main problem that was discussed is the drawbacks that hamper the domestic tourism activities from developing and flourishing. This is extremely harmful to the Lebanese economy and reflects negatively on all other economic sectors. Our study results proved that integration of digital and technological medium into tourism and hospitality activities do have positive effects on revenues and profits of this industry as it make things easier to both domestic and foreign tourists and visitors and creates competitive tourism and hospitality advantages.
Keywords: Big data, data governance, information security, information privacy, compliance, healthcare sector.
[1]. Ham, S., Kim, W.G. and Jeong, S., 2005. Effect of information technology on performance in upscale hotels. International journal of hospitality management, 24(2), pp.281-294.
[2]. -Kim, W. G., & Ham, S. (2007). The Impact of Information Technology Implementation on Service Quality in the Hotel Industry.Information Technology in Hospitality, 4(4), 143- 151.
[3]. -Kruger, D. J. (2003). Integrating quantitative and qualitative methods in community research. The Community Psychologist, 36, 18-19.
[4]. -Hardy A., Hyslop S., Booth K., Robards B., Aryal J., Gretzel U. and Eccleston R. (2017) 'Tracking Tourists' Travel with Smartphone-based GPS Technology : a Methodological Discussion', Information Technology & Tourism, 17 (Issue 3, September),pp. 255-274.
[5]. -Introduction To Tourism, Available at :HTTPS://WWW.VISITBRITAIN.ORG/INTRODUCTION-TOURISM

Paper Title :: Construction and reduction methods of Grid Security Situation Assessment index system for intelligent scheduling
Author Name :: Yuancheng Li || Jing Zeng || Zhaorong Li
Country :: China
Page Number :: 22-34
The development of smart grid construction in our country has put forward much higher requirements on power grid dispatching operation, which needs to develop the corresponding supporting system of the intelligent scheduling. It is aimed to accurately control the development trend and process of power grid operation by building automatic intelligent scheduling system architecture based on the situational awareness. In order to assess the security situation of the smart grid, this paper firstly uses the Delphi method and analytic hierarchy process (AHP) and constructs the situation assessment index system. Secondly, in allusion to several characteristics of situation assessment index of power grid, such as strong affinity and high dimension, Autoencoder method was adopted to decrease the dimension of index data, thus high-dimensional data being shown in a low dimensional space. Autoencoder method got the optimal initial weights in the training process, which was used in fine-tuning process to adjust weight by reversely propagating error and to get the optimal results by minimizing reconstruction error function. Under the MATLAB experiment platform, there had a simulation experiment for reconstruction error in the training and fine-tuning process. The experimental result is that the coding after dimensionality reduction can completely show high-dimensional data information and use lower dimensional code as input can significantly reduce the complexity of the grid situation assessment model in later period.
Keywords: Power grid security; Intelligent scheduling, Situation assessment, Index system, Autoencoder, Indicators reduction.
[1] S.C. Yang, B.Q. Tang and J.G. Yao, Based on the situational awareness of the power grid automatic intelligent scheduling architecture and key technologies, Power System Technology, 2014, pp.33-39.
[2] T.E. Dyliacco, Enhancing power system security control, IEEE Computer Applications in power, 2009, pp.38-41. [3] H.B. Sun, B.M,Zhang and W.C Wu, Smart control center for Chinese smart transmission grids, Journal of Electric Power Science and Technology, 2009,pp.2-7.
[4] Y. Zhang, L. Wang, Y. Xiang and C.W. Ten, Power system reliability evaluation with SCADA cybersecurity considerations, IEEE Trans. Smart Grid, Jul. 2015, pp. 1707-1721.
[5] Y.C. Li andS.N. Chu, Construction and Reduction Methods of Vulnerability Index System in Power SCADA, International Journal of Security and Its Applications, Aug. 2014, pp. 335-352.

Paper Title :: Correlation analysis of user power consumption behavior based on improved Apriori algorithm
Author Name :: Liu Haiqing || Qu Jinmeng || Li Yuancheng
Country :: China
Page Number :: 35-45
With the increasing number of smart meters, The client generates a large data and there are the potential information of users'electricity consumption behavior behind these data. By mining the similarities of different users' electricity consumption behaviors, the paper finds out the relationship between various factors and different electricity consumption behavior patterns, which can be used to customize and analyze service applications for power companies, users and governments. In the process of association analysis, an improved algorithm based on prefix itemsets and vertical Boolean matrix is proposed. By using the frequent itemsets storage method of prefix itemsets, the efficiency of the algorithm in the join step and pruning step is greatly improved. At the same time, the vertical Boolean matrix is used to store the transaction database and the "and"operation is used to calculate the support degree, which further optimizes the efficiency, reduces the occupied memory space and improves the efficiency of the algorithm. Compared with other algorithms, the effectiveness and feasibility of the proposed method are verified.
Keywords: Apriori algorithm; power consumption; association analysis; prefix item set; vertical Boolean matrix
[1] Li Kangping, Wang Fei; Zhen Zhao, Mi Zengqiang, Sun Hongbin, Liu Chun, Wang Bo, Lu Jing. Analysis on residential electricity consumption behavior using improved K-means based on simulated annealing algorithm[A]. IEEE Power and Energy Conference at Illinois(PECI)[C] p6 pp., 2016
[2] Qian Cheng, Chen Min, Gao Ciwei, Li Huixing, Shen Tugang. Research on the analysis of user's electricity behavior and the application of demand response based on global energy interconnection[A]. China International Conference on Electricity Distribution (CICED)[C], p7 pp., 2016
[3] Jian Liu, Jiakui Zhao, Yan Chen, Hongfa Li, Qiucen Huang, Hong Ouyang, Qingli Hao, Yaozong Lu. Analysis of customers' electricity consumption behavior based on massive data[A]. 2016 12th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD)[C], p1433-8, 2016
[4] Humeau Samuel, Wijaya Tri Kurniawan, Vasirani Matteo, Aberer Karl. Electricity load forecasting for residential customers: Exploiting aggregation and correlation between households[J]. Sustainable Internet and ICT for Sustainability, SustainIT 2013
[5] Minghao Piao, Meijing Li, Keun Ho Ryu. Using Significant Classification Rules to Analyze Korean Customers' Power Consumption Behavior: Incremental Tree Induction using Cascading-and-Sharing Method[A]. Proceedings of the 2010 IEEE 10th International Conference on Computer and Information Technology (CIT 2010)[C], p1649-53, 2010

Paper Title :: IDR privacy protection based on sharing watermarking
Author Name :: Yuancheng Li || Yimeng Wang || Xiang Li
Country :: China
Page Number :: 46-55
Demand response (DR) technology is an important part of the smart grid framework during the construction of smart grids. DR can be divided into Price-based Demand Response (PDR) and Incentive-based Demand Response (IDR). For the privacy leakage problem in IDR, we combined database digital watermarking algorithm with an improved Shamir-based secret sharing algorithm, and proposed the strategy of IDR privacy protection. Firstly, the billing cycle is segmented into shorter time periods. During each time period, the sharing watermarks are embedded in the electricity consumption data, and are stored using an improved Shamir-based secret sharing algorithm. When the billing period ends, the watermarks are extracted from the electricity consumption data of each time period. Then, the total power load during the billing period is transmitted to the power company. This method makes the power company unable to obtain the specific power consumption data of the user at each moment, and avoids leakage of user privacy. Finally, we performed the comparison experiments and robustness analysis of the proposed watermarking algorithm. The experimental results show that the proposed method performs well on protecting privacy. Meanwhile, it also achieves stronger robustness and security, and lower computational overhead.
Keywords: smart grid; incentive-based demand response (IDR); privacy protection; sharing watermarking; secret sharing
[1]. M. Shafie-khah, P. Siano, and J. P. S. Catalao, "Optimal Demand Response Strategies to Mitigate Oligopolistic Behavior of Generation Companies using a Multi Objective Decision Analysis," IEEE Transactions on Power Systems, vol. PP, pp. 1-1, 2017.
[2]. H. Mortaji, S. H. Ow, M. Moghavvemi, and H. A. F. Almurib, "Load Shedding and Smart-Direct Load Control Using Internet of Things in Smart Grid Demand Response Management," IEEE Transactions on Industry Applications, vol. 53, pp. 5155-5163, 2017.
[3]. A. Eshraghi, M. Motalleb, E. Reihani, and R. Ghorbani, "Frequency regulation in Islanded microgrid using demand response," in 2017 North American Power Symposium (NAPS), 2017, pp. 1-6.
[4]. GONG Kangli,ZHANG Xueping. Research of digital watermarking technology for relational database[J]. Computer Technology and Development,2013,23(3):125-128.
[5]. LIU Weiqun, Research on Digital Watermarking Algorithm Based on Independent Component Analysis[D], Central South University, 2009.


Copyright © 2015 IJLRET. All Right Reseverd Home   Editorial Board   Current Issue   Contact Us