785 results found.
Year: 2024, Volume: 24, Number: 2
... input interpretation of the images and the performance of pixel intensity, and s is the processed output pixel intensity. computer-assisted methods in medical imaging. γ is the power factor used to generate a series of curves that To date, a multitude of techniques have been developed to enhance different intensity regions. improve image contrast. ...
Terms matched: 1 - Score: 6 - 2,462k
Year: 2024, Volume: 24, Number: 2
... Advances in Electrical and Computer Engineering Volume 24, Number 2, 2024 Machine-side Harmonic Suppression Strategy for Direct Driven Five-phase PMSG of Wind Power Generation System Zhihua JIANG, Jinbao ZHANG School of Electrical Engineering and Automation, Henan Polytechnic University, Jiaozuo 454003, China zhangjinbao@home.hpu.edu.cn 1 Abstract — Wind power generation system with five-phase ...
Terms matched: 1 - Score: 126 - 1,198k
Year: 2024, Volume: 24, Number: 2
... of one band image can see, the most important features are found in the first image, therefore the approximation outputs have been used The Fourier Transform is another powerful tool that for the GMM clustering. facilitates the manipulation of signals in the Fourier or frequency domain and the compression of images. In the Fourier domain image ...
Terms matched: 1 - Score: 3 - 3,500k
Year: 2024, Volume: 24, Number: 2
... with a value predictor and to computer applications contain a lot of time-consuming estimate the computing performance, area of integration, arithmetic instructions, and any performance gain is power consumption, energy efficiency and chip temperature beneficial. More than that, most of those instructions are for the enhanced architecture. We run simulations and study subject ...
Terms matched: 1 - Score: 73 - 1,417k
Year: 2024, Volume: 24, Number: 2
... implementation for devices goes beyond OTRv3 and StegaCloak by changing keys not with lower computational power, such as mobile devices. only when the conversation direction changes but also ... (CL-AtSe) through automated analysis, thus demonstrating its applies constraint solving with some powerful simplification resilience against various security threats. We used heuristics and redundancy elimination techniques ...
Terms matched: 2 - Score: 5 - 1,304k
Year: 2024, Volume: 24, Number: 2
... evaluated the realize a two-layer monitoring network of a Modbus/RTU performance of the acquisition cycle in the context of an IIoT and Modbus/TCP based on multiple power saving gateway developed around the AM335x processor. equipment system. In paper [14], the authors present a method for developing, implementing and evaluating Index ...
Terms matched: 1 - Score: 8 - 2,352k
Year: 2024, Volume: 24, Number: 2
... , such as data rely on the use of classification algorithms to distinguish integrity, power system security, physical security of charging between normal and abnormal data flows, ... SDN and machine learning can provide According to the authors the proposed system can detect powerful intrusion detection tools, it is crucial to consider intrusions with a precision of ...
Terms matched: 2 - Score: 18 - 876k
Year: 2024, Volume: 24, Number: 2
... Information, Xi'an Polytechnic University, Xi'an, Shaanxi, 710048, China 2 School of Electrical Engineering, Xi'an Jiaotong University, Xi'an, 710049, China 3 Electric Power Occupational Technical Institute of SEPC (State Grid Shanxi Technology Training Center), Taiyuan, Shanxi, 030021, China yanghao@xpu.edu.cn 1 Abstract — The insulation ...
Terms matched: 1 - Score: 60 - 3,785k
Year: 2024, Volume: 24, Number: 2
... ParaÃba, Brazil moreiraf@ufba.br 1 Abstract — Every power system is vulnerable to fault location techniques for distribution ... A. Abur, "Integrated use of Technology, Powercon, vol. 4, pp. 2575-2579, ... F. Ribeiro, "Exploring the power of Porto PowerTech Conference, vol. 3, 2001. wavelet ...
Terms matched: 3 - Score: 112 - 1,753k
Year: 2024, Volume: 24, Number: 1
... biometric approaches, it is crucial to take into account the method impressively demonstrated the power of deep dataset diversity constraints and the requirement for learning in addressing face recognition ... ROI). dynamically adjusted depending on the preceding layer and Following this, a powerful convolutional neural network the number of categories under consideration. To minimize (CNN ...
Terms matched: 2 - Score: 8 - 1,133k