Deep learning enabled predictive model for p2p energy trading in tem

被引:0
|
作者
Sekhar, Pudi [1 ]
Benedict Jose, T.J. [2 ]
Parvathy, Velmurugan Subbiah [3 ]
Laxmi Lydia, E. [4 ]
Kadry, Seifedine [5 ]
Pin, Kuntha [6 ]
Nam, Yunyoung [7 ]
机构
[1] Department of Electrical and Electronics Engineering, Vignan's Institute of Information Technology (Autonomous), Visakhapatnam,530049, India
[2] Department of Computer Applications, Government Arts and Science College, Kanyakumari,629401, India
[3] Department of Electronics and Communication Engineering, Kalasalingam Academy of Research and Education, Krishnankoil,626126, India
[4] Department of Computer Science and Engineering, Vignan's Institute of Information Technology (Autonomous), Visakhapatnam,530049, India
[5] Department of Applied Data Science, Noroff University College, Kristiansand, Norway
[6] Department of ICT Convergence, Soonchunhyang University, Korea, Republic of
[7] Department of Computer Science and Engineering, Soonchunhyang University, Korea, Republic of
来源
Computers, Materials and Continua | 2022年 / 71卷 / 01期
关键词
Compendex;
D O I
暂无
中图分类号
学科分类号
摘要
Forecasting
引用
收藏
页码:1473 / 1487
相关论文
共 33 条
  • [1] Recommendation trust model scheme for P2P network environment
    Dai, Zhan-Feng
    Wen, Qiao-Yan
    Li, Xiao-Biao
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2009, 32 (03): : 69 - 72
  • [2] An optimization model of load balancing in Peer to Peer (P2P) network
    Zhang, Bingquan
    Wang, Shuang
    2011 International Conference on Computer Science and Service System, CSSS 2011 - Proceedings, 2011, : 2064 - 2067
  • [3] A social network based bandwidth sharing model for P2P streaming service
    College of Computer Science and Technology, Jilin University, Changchun, China
    Int. J. u e Serv. Sci. Technol., 2 (171-180): : 171 - 180
  • [4] A new P2P identity authentication method based on zero-knowledge under hybrid P2P network
    Pang, X. (xiyupang@126.com), 1600, Universitas Ahmad Dahlan, Jalan Kapas 9, Semaki, Umbul Harjo,, Yogiakarta, 55165, Indonesia (11):
  • [5] Simulation of DDOS attacks on P2P metworks
    Qwasmi, Nidal
    Ahmed, Fayyaz
    Liscano, Ramiro
    Proc.- 2011 IEEE International Conference on HPCC 2011 - 2011 IEEE International Workshop on FTDCS 2011 -Workshops of the 2011 Int. Conf. on UIC 2011- Workshops of the 2011 Int. Conf. ATC 2011, 2011, : 610 - 614
  • [6] An innovative implementation method of P2P tracker
    Huang, Jin-Feng
    Zhang, Zi-Wen
    Cheng, Gao-Wei
    Guofang Keji Daxue Xuebao/Journal of National University of Defense Technology, 2010, 32 (06): : 59 - 63
  • [7] Dynamic secure trust management model for P2P e-commerce environments
    Li, Zhi-Yuan
    Wang, Ru-Chuan
    Tongxin Xuebao/Journal on Communications, 2011, 32 (03): : 50 - 59
  • [8] Design and implementation of P2P trust model based on the classic Bayesian networks theory
    Jiangxi Tourism and Commerce Vocational College, Nanchang 330100, Jiangxi, China
    不详
    J. Theor. Appl. Inf. Technol., 1 (129-135):
  • [9] Encrypted P2P Communication using LoRa waves
    Sanjay, G.K.
    Rao, Sai Bharath R.
    Amith, G.
    TechRxiv, 2022,
  • [10] Mobile mash-up model based on hybrid P2P using ajax technology
    Department of Computer Science, Ryerson University, Toronto, Canada
    Spring Simul. Multiconference, SpringSim,