250 results found containing all search terms.
Year: 2021, Volume: 21, Number: 2
... used in various applications related to software implementation remains an open issue to meet its data security. The chaotic generator is a core component in service requirements. The ... . chaotic generators and realized two classes of new efficient Using chaos to secure information transmission is a very generators. Kocarev et al., [11], ...
Terms matched: 2 - Score: 18 - 1,419k
Year: 2011, Volume: 11, Number: 1
... 59 Advances in Electrical and Computer Engineering Volume 11, Number 1, 2011 simulated data has been observed in both Fig. 13 and Fig. The measured values ... resonators ", in Proc. ICCSC 2008, Shanghai, China, nonlinear artificial transmission line containing hundreds of pp.176-179. circuit elements [11]. Both behavioral ...
Terms matched: 2 - Score: 18 - 940k
Year: 2010, Volume: 10, Issue: 4
... from patient suffering from diabetes of 2nd level (right column). The obtained data show that the value of phase shifts δ where ν= d 1 are ... polarizers( {P 1} and {P2 }), planes of 0 transmission for which make+ 45 and – 450 angles with axes of the highest ...
Terms matched: 2 - Score: 18 - 986k
Year: 2022, Volume: 22, Number: 2
... and set c and values- Initialize the location of each camel. -Upload system data (bus data and line data of distribution network). Apply velocity limit ... affected the execution speed and memory size. in addition, it can cause the transmission lines trip, unexpected outages of has several parameters. In 2019 [17 ...
Terms matched: 2 - Score: 18 - 1,531k
Year: 2015, Volume: 15, Number: 1
... are low-voltage microgrids (MG), optimised. In the latter, given finite data sets, the offline the idea firstly introduced by Lasseter in [5] ... one already optimal power flow, smart grids, voltage control. applied in the transmission system in France [8]. The voltage is controlled by maintaining the ...
Terms matched: 2 - Score: 18 - 798k
Year: 2007, Volume: 7, Issue: 2
... of a device which role is to control I. INTRODUCTION the network access and data traffic. From the security viewpoint the infrastructure based mode is more secure but ... enforced by the nature of applications and and finishing with malicious attacks coming either from transmission environment. Many laptops and PDA are lost interior either from the exterior of ...
Terms matched: 2 - Score: 18 - 432k
Year: 2016, Volume: 16, Number: 1
... column Table III. includes the parameters obtained experimentally, and the third one contains data gathered through PSpice simulation TABLE III. THE VALUES OF RESISTORS FROM ANTONIOU GYRATOR ... ). The equivalent unidirectional (8 ): circuit parameters being known, the transmission constant (g1c), can be determined. In this case, the ...
Terms matched: 2 - Score: 18 - 849k
Year: 2018, Volume: 18, Number: 2
... the setup is used for investigating discharge signals of pressboard fractal figure contain complete figure data without any loss. samples under different electrical stresses. This paper proposes In ... . Zhao, C. Li, H. Wu, "Interface charge polarity transmission system) for proposed test procedure. In effect based analysis model for electric ...
Terms matched: 2 - Score: 16 - 1,298k
Year: 2009, Volume: 9, Issue: 2
... for solving an electromagnetic interference problem h [m] 1 2 2 The input data for all this type of interference problems w1 0.693 0.441 0.339 are (see ... of a soil structure composed of two layers with induced in layered soil by HV transmission lines in normal different resistivity, both horizontally, in respect with the conditions ...
Terms matched: 2 - Score: 16 - 608k
Year: 2015, Volume: 15, Number: 3
... being analyzed with construction body [19]. In this way, a complete data set both circuits magnetically coupled. about the construction behavior through a desired time ... ] D.C. Yates, A.S. Holmes, A.J. Burdett, "Optimal transmission wire. The two distinct circuits are magnetically coupled. The frequency for ultralow-power ...
Terms matched: 2 - Score: 16 - 1,220k