Académique Documents
Professionnel Documents
Culture Documents
Abstract: This paper expects to build up a procedural apparatus that will encourage the substitution of fossil fuel based era with the coordination of
utility scale PV/ Wind plants. It will result in techniques for evaluating suitable hybrid plant locations and an optimized plant sizing and energy
storage control strategy which will allow for reliable power injection and storage that is capable of meeting the demand of a variable load. Although the
separate interconnection of both wind and solar based generation has become common place, the integration of a large scale hybrid generation facility
has yet to be achieved. Here, we are focusing on issues such as resource variability, energy storage and power system reliability in order to have hybrid
plant supplement conventional generation. The synergistic merging of the two technologies solar and wind power is being investigated and solutions will
be proposed for optimal control and reliability assessment of such hybrid plants.
Abstract: Nowadays patients get consultant and treatment through online by sharing their personal health information among healthcare providers.
It is very challenging to keep both the data about disease and patients identity privacy information simultaneously. Many existing access control and
anonymous authentication schemes cannot be straightforwardly exploited. To solve the problem, in this paper, a novel Authorized Accessible Privacy
Model (AAPM) is established. Patients can authorize their physicians by setting an access tree supporting exible threshold predicates. Then, based on
it, by devising a new technique of attribute-based designated verier signature, a Patient Self-controllable Multi-level Privacy-preserving cooperative
Authentication scheme (PSMPA) realizing three levels of security and privacy requirement in distributed m-healthcare cloud computing system is
proposed. The directly authorized physicians, the indirectly authorized physicians and the unauthorized persons in medical consultation can
respectively decipher the personal health information and/or verify patients identities by satisfying the access tree with their own attribute sets.
Finally, the formal security proof and simulation results illustrate the scheme can resist various kinds of attacks and far outperforms the previous ones in
terms of computational, communication and storage overhead.
This paper is prepared exclusively for International Conference on Advances & Challenges in Interdisciplinary Engineering and Management 2017 [ICACIEM
2017] which is published by ASDF International, Registered in London, United Kingdom under the directions of the Editor-in-Chief Dr K Samidurai and Editors
Dr. Daniel James, Dr. Kokula Krishna Hari Kunasekaran and Dr. Saikishore Elangovan. Permission to make digital or hard copies of part or all of this work for
personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage, and that copies bear this
notice and the full citation on the first page. Copyrights for third-party components of this work must be honoured. For all other uses, contact the
owner/author(s). Copyright Holder can be reached at copy@asdf.international for distribution.