A 3D object encryption scheme which maintains dimensional and spatial stability
- Authors: Jolfaei, Alireza , Wu, Xinwen , Muthukkumarasamy, Vallipuram
- Date: 2015
- Type: Text , Journal article
- Relation: IEEE Transactions on Information Forensics and Security Vol. 10, no. 2 (2015), p. 409-422
- Full Text:
- Reviewed:
- Description: Due to widespread applications of 3D vision technology, the research into 3D object protection is primarily important. To maintain confidentiality, encryption of 3D objects is essential. However, the requirements and limitations imposed by 3D objects indicate the impropriety of conventional cryptosystems for 3D object encryption. This suggests the necessity of designing new ciphers. In addition, the study of prior works indicates that the majority of problems encountered with encrypting 3D objects are about point cloud protection, dimensional and spatial stability, and robustness against surface reconstruction attacks. To address these problems, this paper proposes a 3D object encryption scheme, based on a series of random permutations and rotations, which deform the geometry of the point cloud. Since the inverse of a permutation and a rotation matrix is its transpose, the decryption implementation is very efficient. Our statistical analyses show that within the cipher point cloud, points are randomly distributed. Furthermore, the proposed cipher leaks no information regarding the geometric structure of the plain point cloud, and is also highly sensitive to the changes of the plaintext and secret key. The theoretical and experimental analyses demonstrate the security, effectiveness, and robustness of the proposed cipher against surface reconstruction attacks.
A comprehensive spectrum trading scheme based on market competition, reputation and buyer specific requirements
- Authors: Hassan, Md Rakib , Karmakar, Gour , Kamruzzaman, Joarder , Srinivasan, Bala
- Date: 2015
- Type: Text , Journal article
- Relation: Computer Networks Vol. 84, no. (2015), p. 17-31
- Full Text:
- Reviewed:
- Description: In the exclusive-use model of spectrum trading, cognitive radio devices or secondary users can buy spectrum resources from licensed users or primary users for a short or long period of time. Considering such spectrum access, a trading model is introduced where a buyer can select a set of candidate sellers based on their reputation and their offers in fulfilling its requirements, namely, offered signal quality, contract duration, coverage and bandwidth. Similarly, a seller can assess a buyer as a potential trading partner considering the buyer's reliability, which the seller can derive from the buyer's reputation and financial profile. In our scheme, seller reputation or buyer reliability can be either obtained from a reputation brokerage service, if one exists, or calculated using our model. Since in a competitive market, the price of a seller depends on that of other sellers, game theory is used to model the competition among multiple sellers. An optimization technique is used by a buyer to select the best seller(s) and optimize purchase to maximize its utility. This may result in buying from multiple sellers of certain amount of bandwidth from each, depending on price and meeting requirements and budget constraints. Stability of the model is analyzed and performance evaluation shows that it benefits sellers and buyers in terms of profit and throughput, respectively. © 2015 Elsevier B.V. All rights reserved.
A critical review of intrusion detection systems in the internet of things : techniques, deployment strategy, validation strategy, attacks, public datasets and challenges
- Authors: Khraisat, Ansam , Alazab, Ammar
- Date: 2021
- Type: Text , Journal article
- Relation: Cybersecurity Vol. 4, no. 1 (2021), p.
- Full Text:
- Reviewed:
- Description: The Internet of Things (IoT) has been rapidly evolving towards making a greater impact on everyday life to large industrial systems. Unfortunately, this has attracted the attention of cybercriminals who made IoT a target of malicious activities, opening the door to a possible attack on the end nodes. To this end, Numerous IoT intrusion detection Systems (IDS) have been proposed in the literature to tackle attacks on the IoT ecosystem, which can be broadly classified based on detection technique, validation strategy, and deployment strategy. This survey paper presents a comprehensive review of contemporary IoT IDS and an overview of techniques, deployment Strategy, validation strategy and datasets that are commonly applied for building IDS. We also review how existing IoT IDS detect intrusive attacks and secure communications on the IoT. It also presents the classification of IoT attacks and discusses future research challenges to counter such IoT attacks to make IoT more secure. These purposes help IoT security researchers by uniting, contrasting, and compiling scattered research efforts. Consequently, we provide a unique IoT IDS taxonomy, which sheds light on IoT IDS techniques, their advantages and disadvantages, IoT attacks that exploit IoT communication systems, corresponding advanced IDS and detection capabilities to detect IoT attacks. © 2021, The Author(s).
A direct optimization method for low group delay FIR filter design
- Authors: Wu, Changzhi , Gao, David , Lay Teo, Kok
- Date: 2013
- Type: Text , Journal article
- Relation: Signal Processing Vol. 93, no. 7 (2013), p. 1764-1772
- Full Text: false
- Reviewed:
- Description: This paper studies the design of FIR filter with low group delay, where the desired phase response is not being approximated. It is formulated as a constrained optimization problem, which is then solved globally. Numerical experiments show that our design method can produce a filter with smaller group delay than that obtained by the existing convex optimization method used in conjunction with a minimum phase spectral factorization method under the same design criteria. Furthermore, our formulation offers us the flexibility for the trade-off between the group delay and the magnitude response directly. It also allows the feasibility of imposing constraints on the group delay. © 2013 Elsevier B.V.
- Description: 2003011019
A distributed and anonymous data collection framework based on multilevel edge computing architecture
- Authors: Usman, Muhammad , Jan, Mian , Jolfaei, Alireza , Xu, Min , He, Xiangjian , Chen, Jinjun
- Date: 2020
- Type: Text , Journal article
- Relation: IEEE Transactions on Industrial Informatics Vol. 16, no. 9 (2020), p. 6114-6123
- Full Text: false
- Reviewed:
- Description: Industrial Internet of Things applications demand trustworthiness in terms of quality of service (QoS), security, and privacy, to support the smooth transmission of data. To address these challenges, in this article, we propose a distributed and anonymous data collection (DaaC) framework based on a multilevel edge computing architecture. This framework distributes captured data among multiple level-one edge devices (LOEDs) to improve the QoS and minimize packet drop and end-to-end delay. Mobile sinks are used to collect data from LOEDs and upload to cloud servers. Before data collection, the mobile sinks are registered with a level-two edge-device to protect the underlying network. The privacy of mobile sinks is preserved through group-based signed data collection requests. Experimental results show that our proposed framework improves QoS through distributed data transmission. It also helps in protecting the underlying network through a registration scheme and preserves the privacy of mobile sinks through group-based data collection requests. © 2005-2012 IEEE.
A fast scalable implementation of the two-dimensional triangular discrete element Method on a GPU platform
- Authors: Zhang, Ling , Quigley, Steven , Chan, Andrew
- Date: 2014
- Type: Text , Journal article
- Relation: Advances in Engineering Software Vol. 60-61, no. June-July (2014), p. 70-80
- Full Text: false
- Reviewed:
- Description: Real-time solution of the Discrete Element Method is a computational challenge that is hardly achievable on standard PCs, especially when a large number of triangular shaped particles are involved. This paper presents a scalable architecture, including a domain decomposition technique, of a GPU accelerator for the two-dimensional Discrete Element Method for triangular shaped particles. This approach achieved a speed up of about 140 times as a single core and about 80 after domain decomposition on a consumer level GPU compared to a similar algorithm run on a fast desktop PC.
A fully automated CAD system using multi-category feature selection with restricted recombination
- Authors: Ghosh, Ranadhir , Ghosh, Moumita , Yearwood, John , Mukherjee, Subhasis
- Date: 2007
- Type: Text , Conference paper
- Relation: Paper presented at 6th IEEE/ACIS International Conference on Computer and Information Science, ICIS 2007, Melbourne, Victoria : 11th-13th July 2007 p. 106-111
- Full Text:
- Description: In pattern recognition problems features plays an important role for classification results. It is very important which features are used and how many features are used for the classification process. Most of the real life classification problem uses different category of features. It is desirable to find the optimal combination of features that improves the performance of the classifier. There exists different selection framework that selects the features. Mostly do not incorporate the impact of one category of features on another. Even if they incorporate, they produce conflict between the categories. In this paper we proposed a restricted crossover selection framework which incorporate the impact of different categories on each other, as well as it restricts the search within the category which searching in the global region of the search space. The results obtained by the proposed framework are promising.
- Description: 2003005429
A HMM-based adaptive fuzzy inference system for stock market forecasting
- Authors: Hassan, Md Rafiul , Ramamohanarao, Kotagiri , Kamruzzaman, Joarder , Rahman, Mustafizur , Hossain, Maruf
- Date: 2013
- Type: Text , Journal article
- Relation: Neurocomputing Vol. 104, no. (2013), p. 10-25
- Full Text: false
- Reviewed:
- Description: In this paper, we propose a new type of adaptive fuzzy inference system with a view to achieve improved performance for forecasting nonlinear time series data by dynamically adapting the fuzzy rules with arrival of new data. The structure of the fuzzy model utilized in the proposed system is developed based on the log-likelihood value of each data vector generated by a trained Hidden Markov Model. As part of its adaptation process, our system checks and computes the parameter values and generates new fuzzy rules as required, in response to new observations for obtaining better performance. In addition, it can also identify the most appropriate fuzzy rule in the system that covers the new data; and thus requires to adapt the parameters of the corresponding rule only, while keeping the rest of the model unchanged. This intelligent adaptive behavior enables our adaptive fuzzy inference system (FIS) to outperform standard FISs. We evaluate the performance of the proposed approach for forecasting stock price indices. The experimental results demonstrate that our approach can predict a number of stock indices, e.g., Dow Jones Industrial (DJI) index, NASDAQ index, Standard and Poor500 (S&P500) index and few other indices from UK (FTSE100), Germany (DAX) , Australia (AORD) and Japan (NIKKEI) stock markets, accurately compared with other existing computational and statistical methods.
A hybrid of multiobjective evolutionary algorithm and HMM-Fuzzy model for time series prediction
- Authors: Hassan, Md Rafiul , Nath, Gupta , Kirley, Michael , Kamruzzaman, Joarder
- Date: 2012
- Type: Text , Journal article
- Relation: Neurocomputing Vol. 81, no. April (2012), p. 1-11
- Full Text: false
- Reviewed:
- Description: In this paper, we introduce a new hybrid of Hidden Markov Model (HMM), Fuzzy Logic and multiobjective Evolutionary Algorithm (EA) for building a fuzzy model to predict non-linear time series data. In this hybrid approach, the HMM's log-likelihood score for each data pattern is used to rank the data and fuzzy rules are generated using the ranked data. We use multiobjective EA to find a range of trade-off solutions between the number of fuzzy rules and the prediction accuracy. The model is tested on a number of benchmark and more recent financial time series data. The experimental results clearly demonstrate that our model is able to generate a reduced number of fuzzy rules with similar (and in some cases better) performance compared with typical data driven fuzzy models reported in the literature.
A lightweight integrity protection scheme for low latency smart grid applications
- Authors: Jolfaei, Alireza , Kant, Krishna
- Date: 2019
- Type: Text , Journal article
- Relation: Computers and Security Vol. 86, no. (2019), p. 471-483
- Full Text:
- Reviewed:
- Description: The substation communication protocol used in smart grid allows the transmission of messages without integrity protection for applications that require very low communication latency. This leaves the real-time measurements taken by phasor measurement units (PMUs) vulnerable to man-in-the-middle attacks, and hence makes high voltage to medium voltage (HV/MV) substations vulnerable to cyber-attacks. In this paper, a lightweight and secure integrity protection algorithm has been proposed to maintain the integrity of PMU data, which fills the missing integrity protection in the IEC 61850-90-5 standard, when the MAC identifier is declared 0. The rigorous security analysis proves the security of the proposed integrity protection method against ciphertext-only attacks and known/chosen plaintext attacks. A comparison with existing integrity protection methods shows that our method is much faster, and is also the only integrity protection scheme that meets the strict timing requirement. Not only the proposed method can be used in power protection applications, but it also can be used in emerging anomaly detection scenarios, where a fast integrity check coupled with low latency communications is used for multiple rounds of message exchanges. This paper is an extension of work originally reported in Proceedings of 14th International Conference on Security and Cryptography (Jolfaei and Kant, 2017).
A low-complexity equalizer for video broadcasting in cyber-physical social systems through handheld mobile devices
- Authors: Solyman, Ahmad , Attar, Hani , Khosravi, Mohammad , Menon, Varun , Jolfaei, Alireza , Balasubramanian, Venki , Selvaraj, Buvana , Tavallali, Pooya
- Date: 2020
- Type: Text , Journal article
- Relation: IEEE Access Vol. 8, no. (2020), p. 67591-67602
- Full Text:
- Reviewed:
- Description: In Digital Video Broadcasting-Handheld (DVB-H) devices for cyber-physical social systems, the Discrete Fractional Fourier Transform-Orthogonal Chirp Division Multiplexing (DFrFT-OCDM) has been suggested to enhance the performance over Orthogonal Frequency Division Multiplexing (OFDM) systems under time and frequency-selective fading channels. In this case, the need for equalizers like the Minimum Mean Square Error (MMSE) and Zero-Forcing (ZF) arises, though it is excessively complex due to the need for a matrix inversion, especially for DVB-H extensive symbol lengths. In this work, a low complexity equalizer, Least-Squares Minimal Residual (LSMR) algorithm, is used to solve the matrix inversion iteratively. The paper proposes the LSMR algorithm for linear and nonlinear equalizers with the simulation results, which indicate that the proposed equalizer has significant performance and reduced complexity over the classical MMSE equalizer and other low complexity equalizers, in time and frequency-selective fading channels. © 2013 IEEE.
A machine vision based automatic optical inspection system for measuring drilling quality of printed circuit boards
- Authors: Wang, Wei , Chen, Shang-Liang , Chen, Liang-Bi , Chang, Wan-Jung
- Date: 2017
- Type: Text , Journal article
- Relation: IEEE Access Vol. 5, no. (2017), p. 10817-10833
- Full Text:
- Reviewed:
- Description: In this paper, we develop and put into practice an automatic optical inspection (AOI) system based on machine vision to check the holes on a printed circuit board (PCB). We incorporate the hardware and software. For the hardware part, we combine a PC, the three-axis positioning system, a lighting device, and charge-coupled device cameras. For the software part, we utilize image registration, image segmentation, drill numbering, drill contrast, and defect displays to achieve this system. Results indicated that an accuracy of 5 mu m could be achieved in errors of the PCB holes allowing comparisons to be made. This is significant in inspecting the missing, the multi-hole, and the incorrect location of the holes. However, previous work only focuses on one or other feature of the holes. Our research is able to assess multiple features: missing holes, incorrectly located holes, and excessive holes. Equally, our results could be displayed as a bar chart and target plot. This has not been achieved before. These displays help users to analyze the causes of errors and immediately correct the problems. In addition, this AOI system is valuable for checking a large number of holes and finding out the defective ones on a PCB. Meanwhile, we apply a 0.1-mm image resolution, which is better than others used in industry. We set a detecting standard based on 2-mm diameter of circles to diagnose the quality of the holes within 10 s.
A mapreduce based technique for mining behavioral patterns from sensor data
- Authors: Rashid, Md. Mamunur , Gondal, Iqbal , Kamruzzaman, Joarder
- Date: 2015
- Type: Text , Conference paper
- Relation: 22nd International Conference on Neural Information Processing, ICONIP 2015; Istanbul, Turkey; 9th-12th November 2015 Vol. 9492, p. 145-153
- Full Text: false
- Reviewed:
- Description: WSNs generate a large amount of data in the form of streams, and temporal regularity in occurrence behavior is considered as an important measure for assessing the importance of patterns in WSN data. A frequent sensor pattern that occurs after regular intervals in WSNs is called regularly frequent sensor patterns (RFSPs). Existing RFSPs techniques assume that the data structure of the mining task is small enough to fit in the main memory of a processor. However, given the emergence of the Internet of Things (IoT), WSNs in future will generate huge volume of data, which means such an assumption does not hold any longer. To overcome this, a distributed solution using MapReduce model has not yet been explored extensively. Since MapReduce is becoming the de-facto model for computation on large data, an efficient RFSPs mining algorithm on this model is likely to provide a highly effective solution. In this work, we propose a regularly frequent sensor patterns mining algorithm called RFSP-H which uses MapReduce based framework. Extensive performance analyses show that our technique is significantly time efficient in finding regularly frequent sensor patterns. © Springer International Publishing Switzerland 2015.
A Markov-blanket-based model for gene regulatory network inference
- Authors: Ram, Ramesh , Chetty, Madhu
- Date: 2011
- Type: Text , Journal article
- Relation: Transactions on Computational Biology and Bioinformatics Vol. 8, no. 2 (2011), p.
- Full Text: false
- Reviewed:
- Description: An efficient two-step Markov blanket method for modeling and inferring complex regulatory networks from large-scale microarray data sets is presented. The inferred gene regulatory network (GRN) is based on the time series gene expression data capturing the underlying gene interactions. For constructing a highly accurate GRN, the proposed method performs: 1) discovery of a gene's Markov Blanket (MB), 2) formulation of a flexible measure to determine the network's quality, 3) efficient searching with the aid of a guided genetic algorithm, and 4) pruning to obtain a minimal set of correct interactions. Investigations are carried out using both synthetic as well as yeast cell cycle gene expression data sets. The realistic synthetic data sets validate the robustness of the method by varying topology, sample size, time delay, noise, vertex in-degree, and the presence of hidden nodes. It is shown that the proposed approach has excellent inferential capabilities and high accuracy even in the presence of noise. The gene network inferred from yeast cell cycle data is investigated for its biological relevance using well-known interactions, sequence analysis, motif patterns, and GO data. Further, novel interactions are predicted for the unknown genes of the network and their influence on other genes is also discussed.
A method to improve transparency of electronic election process without identification
- Authors: Alamuti, Roghayeh , Barjini, Hassan , Khandelwal, Manoj , Jafarabad, Mohammad
- Date: 2015
- Type: Text , Conference proceedings
- Full Text:
- Description: Transparency of bank accounts, nowadays, is an undeniable necessity, but no one denies that definite transparency throughout election process is not realized thus far in the world. This calls for fundamental changes in traditional electronic election methods. The new method must close the way for any complaints by the candidate as to the voting process as the public completely trusts in the voting mechanism. Synchronizing voting and votes counting improves the public's trust in the results of election. The proposed secure room-corridor of electronic voting employs election watchers and reports real time results of election along with observance of confidentiality of the votes. © 2015 The Authors.
A model of the circadian clock in the cyanobacterium Cyanothece sp. ATCC 51142
- Authors: Nguyen, Vinh , Chetty, Madhu , Coppel, Ross , Gaudana, Sandeep , Wangikar, Pramod
- Date: 2013
- Type: Text , Journal article
- Relation: BMC Bioinformatics Vol. 14, no. (Supplement 2) (2013), p. s14-1-s14-9
- Full Text:
- Reviewed:
- Description: Background The over consumption of fossil fuels has led to growing concerns over climate change and global warming. Increasing research activities have been carried out towards alternative viable biofuel sources. Of several different biofuel platforms, cyanobacteria possess great potential, for their ability to accumulate biomass tens of times faster than traditional oilseed crops. The cyanobacterium Cyanothece sp. ATCC 51142 has recently attracted lots of research interest as a model organism for such research. Cyanothece can perform efficiently both photosynthesis and nitrogen fixation within the same cell, and has been recently shown to produce biohydrogen--a byproduct of nitrogen fixation--at very high rates of several folds higher than previously described hydrogen-producing photosynthetic microbes. Since the key enzyme for nitrogen fixation is very sensitive to oxygen produced by photosynthesis, Cyanothece employs a sophisticated temporal separation scheme, where nitrogen fixation occurs at night and photosynthesis at day. At the core of this temporal separation scheme is a robust clocking mechanism, which so far has not been thoroughly studied. Understanding how this circadian clock interacts with and harmonizes global transcription of key cellular processes is one of the keys to realize the inherent potential of this organism. Results In this paper, we employ several state of the art bioinformatics techniques for studying the core circadian clock in Cyanothece sp. ATCC 51142, and its interactions with other key cellular processes. We employ comparative genomics techniques to map the circadian clock genes and genetic interactions from another cyanobacterial species, namely Synechococcus elongatus PCC 7942, of which the circadian clock has been much more thoroughly investigated. Using time series gene expression data for Cyanothece, we employ gene regulatory network reconstruction techniques to learn this network de novo, and compare the reconstructed network against the interactions currently reported in the literature. Next, we build a computational model of the interactions between the core clock and other cellular processes, and show how this model can predict the behaviour of the system under changing environmental conditions. The constructed models significantly advance our understanding of the Cyanothece circadian clock functional mechanisms.
A modified immune network optimization algorithm
- Authors: Hong, Lu , Kamruzzaman, Joarder
- Date: 2014
- Type: Text , Journal article
- Relation: IAENG International Journal of Computer Science Vol. 41, no. 4 (2014), p. 231-236
- Full Text: false
- Reviewed:
- Description: This study proposes a modified artificial immune network algorithm for function optimization problems based on idiotypic immune network theory. A hyper-cubic mutation operator was introduced to reduce the heavy computational cost of the traditional opt-AINet algorithm. Moreover, the new symmetrical mutation can effectively improve local search. To maintain population diversity, we also devised an immune selection mechanism based on density and fitness. The global convergence of the algorithm was deduced through the method of pure probability and iterative formula. Simulation results of benchmark function optimization show that the modified algorithm converges more effectively than other immune network algorithms.
A multilevel longitudinal study of experiencing virtual presence in adolescence : The role of anxiety and openness to experience in the classroom
- Authors: Stavropoulos, Vasileios , Wilson, Peter , Kuss, Daria , Griffiths, Mark , Gentile, Douglas
- Date: 2017
- Type: Text , Journal article
- Relation: Behaviour & Information Technology Vol. 36, no. 5 (2017), p. 524-539
- Full Text:
- Reviewed:
- Description: Presence describes the feeling of reality and immersion that users of virtual/Internet environments have. Importantly, it has been suggested that there are individual and contextual differences regarding susceptibility to presence. These aspects of presence have been linked to both beneficial and disadvantageous uses of the Internet, such as online therapeutic applications and addictive Internet behaviours. In the present study, presence was studied in relation to individual anxiety symptoms and classroom-level openness to experience (OTE) using a normative sample of 648 adolescents aged between 16 and 18 years. Presence was assessed with the Presence II questionnaire, anxiety symptoms with the relevant subscales of the SCL-90-R, and OTE with the Five-Factor Questionnaire. A three-level hierarchical linear model was calculated. Results showed that experiencing presence in virtual environments dropped between the ages of 16 and 18 years. Additionally, although anxiety symptoms were associated with higher presence at 16 years, this association decreased with age. Results also demonstrated that adolescents in classrooms higher on OTE reported reduced level of experiencing presence. The practical and theoretical implications of these findings are discussed.
A new cascaded multilevel inverter topology with galvanic isolation
- Authors: Hasan, Mubashwar , Abu-Siada, Ahmed , Islam, Syed , Dahidah, Mohamed
- Date: 2018
- Type: Text , Journal article
- Relation: IEEE Transactions on Industry Applications Vol. 54, no. 4 (2018), p. 3463-3472
- Full Text:
- Reviewed:
- Description: IEEE This paper presents a new compact three-phase cascaded multilevel inverter (CMLI) topology with reduced device count and high frequency magnetic link. The proposed topology overcomes the predominant limitation of separate DC power supplies, which CMLI always require. The high frequency magnetic link also provides a galvanic isolation between the input and output sides of the inverter, which is essential for various grid-connected applications. The proposed topology utilizes an asymmetric inverter configuration that consists of cascaded H-bridge cells and a conventional three-phase two-level inverter. A toroidal core is employed for the high frequency magnetic link to ensure compact size and high-power density. Compared with counterpart CMLI topologies available in the literatures, the proposed inverter has the advantage of utilizing the least number of power electronic components without compromising the overall performance, particularly when a high number of output voltage levels is required. The feasibility of the proposed inverter is confirmed through extensive simulation and experimentally validated studies.
A new data driven long-term solar yield analysis model of photovoltaic power plants
- Authors: Ray, Biplob , Shah, Rakibuzzaman , Islam, Md Rabiul , Islam, Syed
- Date: 2020
- Type: Text , Journal article
- Relation: IEEE Access Vol. 8, no. (2020), p. 136223-136233
- Full Text:
- Reviewed:
- Description: Historical data offers a wealth of knowledge to the users. However, often restrictively mammoth that the information cannot be fully extracted, synthesized, and analyzed efficiently for an application such as the forecasting of variable generator outputs. Moreover, the accuracy of the prediction method is vital. Therefore, a trade-off between accuracy and efficacy is required for the data-driven energy forecasting method. It has been identified that the hybrid approach may outperform the individual technique in minimizing the error while challenging to synthesize. A hybrid deep learning-based method is proposed for the output prediction of the solar photovoltaic systems (i.e. proposed PV system) in Australia to obtain the trade-off between accuracy and efficacy. The historical dataset from 1990-2013 in Australian locations (e.g. North Queensland) are used to train the model. The model is developed using the combination of multivariate long and short-term memory (LSTM) and convolutional neural network (CNN). The proposed hybrid deep learning (LSTM-CNN) is compared with the existing neural network ensemble (NNE), random forest, statistical analysis, and artificial neural network (ANN) based techniques to assess the performance. The proposed model could be useful for generation planning and reserve estimation in power systems with high penetration of solar photovoltaics (PVs) or other renewable energy sources (RESs). © 2013 IEEE.