Showing 157–168 of 451 results

  • Design and Simulation of Fuzzy Logic Controller for DSTATCOM in Power System

    Design and Simulation of Fuzzy Logic Controller for DSTATCOM in Power System

    0 out of 5
    4,500

    Design and Simulation of Fuzzy Logic Controller for DSTATCOM in Power System Abstract-This paper mainly presents the Distribution Static Compensator (DSTATCOM) and control methodology of Direct Current (DC) capacitor voltage. Generally, the DC capacitor voltage is regulated using a Proportional Integral (PI) controller when various control algorithms are used for load compensation. However, during load…

  • Design of a Unified Power Controller for Variable-Speed Fixed-Pitch Wind Energy Conversion System

    Design of a Unified Power Controller for Variable-Speed Fixed-Pitch Wind Energy Conversion System

    0 out of 5
    5,500

    Design of a Unified Power Controller for Variable-Speed Fixed-Pitch Wind Energy Conversion System Abstract? A unified power controller for variable-speed fixed-pitch wind energy conversion system (WECS) is designed covering the whole range of wind speed in this paper. The proposed controller is composed of a modified maximum power point tracking (MPPT) controller in low wind…

  • Design of a Unified Power Controller for Variable-Speed Fixed-Pitch Wind Energy Conversion System

    Design of a Unified Power Controller for Variable-Speed Fixed-Pitch Wind Energy Conversion System

    0 out of 5
    5,500

    Design of a Unified Power Controller for Variable-Speed Fixed-Pitch Wind Energy Conversion System Abstract? A unified power controller for variable-speed fixed-pitch wind energy conversion system (WECS) is de-signed covering the whole range of wind speed in this paper. The proposed controller is composed of a modified maxi-mum power point tracking (MPPT) controller in low wind…

  • Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System

    Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System

    0 out of 5
    4,500

    Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System Abstract?Many web computing systems are running real time database services where their information change continuously and expand incrementally. In this context, web data services have a major role and draw significant improvements in monitoring and controlling the information truthfulness and data propagation. Currently,…

  • Detecting and Locating Faulty Nodes in Smart Grids Based on High Frequency Signal Injection

    Detecting and Locating Faulty Nodes in Smart Grids Based on High Frequency Signal Injection

    0 out of 5
    4,500

    Detecting and Locating Faulty Nodes in Smart Grids Based on High Frequency Signal Injection Abstract?An on-line method for detecting and locating a faulty node in the utility grid is proposed for smart grids. The method is based on injection of high frequency (A-Band) current signal into the grid that would impose voltages (less than 1V…

  • Detecting Malicious Facebook Applications

    Detecting Malicious Facebook Applications

    0 out of 5
    5,500

    Detecting Malicious Facebook Applications Abstract? With 20 million installs a day [1], third-party apps are a major reason for the popularity and addictiveness of Facebook. Unfortunately, hackers have realized the potential of using apps for spreading malware and spam. The problem is already significant, as we find that at least 13% of apps in our…

  • Detecting Stress Based on Social Interactions in Social Networks

    Detecting Stress Based on Social Interactions in Social Networks

    0 out of 5
    4,500

    Detecting Stress Based on Social Interactions in Social Networks Abstract-Psychological stress is threatening people?s health. It is non-trivial to detect stress timely for proactive care. With the popularity of social media, people are used to sharing their daily activities and interacting with friends on social media platforms, making it feasible to leverage online social network…

  • Detection and Localization of Multiple Spoofing Attackers in Wireless Networks

    Detection and Localization of Multiple Spoofing Attackers in Wireless Networks

    0 out of 5
    4,500

    Detection and Localization of Multiple Spoofing Attackers in Wireless Networks Abstract? Detection and Localization of Multiple Spoofing Attackers in Wireless Networks. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections] [numbers_sections number=”2″…

  • Determining Optimal Buses for Implementing Demand Response as an Effective Congestion Management Method

    Determining Optimal Buses for Implementing Demand Response as an Effective Congestion Management Method

    0 out of 5
    4,500

    Determining Optimal Buses for Implementing Demand Response as an Effective Congestion Management Method Abstract-Demand response (DR) can be counted as an effective congestion management (CM) method in power systems. However, appointing the optimal buses for the demand response programs (DRPs) implementation is one of the main challenges for the power system operators. In this paper,…

  • Discover the Expert: Context-Adaptive Expert Selection for Medical Diagnosis

    Discover the Expert: Context-Adaptive Expert Selection for Medical Diagnosis

    0 out of 5
    4,500

    Discover the Expert: Context-Adaptive Expert Selection for Medical Diagnosis Abstract?An expert selection system that learns online the best expert to assign to each patient depending on the context of the patient. In general, the context can include an enormous number and variety of information related to the patient’s health condition, age, gender, previous drug doses,…

  • Distributed malware propagation in Mobile Adhoc  NETwork

    Distributed malware propagation in Mobile Adhoc NETwork

    0 out of 5
    4,500

    Distributed malware propagation in Mobile Adhoc NETwork Abstract?The openness of the Android operating system increased the number of applications developed, but it also introduced a new propagation vector for mobile malware. We model the propagation of mobile malware using epidemiology theory and study the problem as a function of the underlying mobility models.< Final Year...

  • Distributed Sensor Data Computing in Smart City Applications

    Distributed Sensor Data Computing in Smart City Applications

    0 out of 5
    4,500

    Distributed Sensor Data Computing in Smart City Applications Abstract-With technologies developed in the Internet of Things, embedded devices can be built into every fabric of urban environments and connected to each other; and data continuously produced by these devices can be processed, integrated at different levels, and made available in standard formats through open services….

End of content

End of content