266 results found containing all search terms.
Year: 2011, Volume: 11, Number: 2
... Position Amplitude Modulation (PPAM) [4 ], is determined by the l-th data symbol of the k-th source and OOK-PSM [5 ], and hybrid Shape-Amplitude ... jk )Tc € d l( k ) ), (1) transmission and anti-interference characteristics. Therefore where E s is the energy per symbol, ...
Terms matched: 2 - Score: 20 - 635k
Year: 2015, Volume: 15, Number: 2
... the proposed surface. t2 of that same layer or increasing the capacitive loading The data presented in Table 1 show that the introduction result in modification of the limits ... placed in the lower range of the frequency applications as verified also by comparing the transmission spectrum, where the different types of noise spectra (white, along a ...
Terms matched: 2 - Score: 19 - 1,023k
Year: 2021, Volume: 21, Number: 2
... used in various applications related to software implementation remains an open issue to meet its data security. The chaotic generator is a core component in service requirements. The ... . chaotic generators and realized two classes of new efficient Using chaos to secure information transmission is a very generators. Kocarev et al., [11], ...
Terms matched: 2 - Score: 18 - 1,419k
Year: 2018, Volume: 18, Number: 3
... € 1,2..M (21) Step 1: Initialization: Input the system data. ƒ ƒ X if fit X m € € € € € fit ... The multi objective problem is converted to where Bij, Bi 0, B00 are transmission loss coefficients. single objective function using price penalty factor and 2) Inequality ...
Terms matched: 2 - Score: 18 - 1,210k
Year: 2022, Volume: 22, Number: 2
... and set c and values- Initialize the location of each camel. -Upload system data (bus data and line data of distribution network). Apply velocity limit ... affected the execution speed and memory size. in addition, it can cause the transmission lines trip, unexpected outages of has several parameters. In 2019 [17 ...
Terms matched: 2 - Score: 18 - 1,531k
Year: 2007, Volume: 7, Issue: 2
... of a device which role is to control I. INTRODUCTION the network access and data traffic. From the security viewpoint the infrastructure based mode is more secure but ... enforced by the nature of applications and and finishing with malicious attacks coming either from transmission environment. Many laptops and PDA are lost interior either from the exterior of ...
Terms matched: 2 - Score: 18 - 432k
Year: 2010, Volume: 10, Issue: 4
... from patient suffering from diabetes of 2nd level (right column). The obtained data show that the value of phase shifts δ where ν= d 1 are ... polarizers( {P 1} and {P2 }), planes of 0 transmission for which make+ 45 and €“ 450 angles with axes of the highest ...
Terms matched: 2 - Score: 18 - 986k
Year: 2015, Volume: 15, Number: 1
... are low-voltage microgrids (MG), optimised. In the latter, given finite data sets, the offline the idea firstly introduced by Lasseter in [5] ... one already optimal power flow, smart grids, voltage control. applied in the transmission system in France [8]. The voltage is controlled by maintaining the ...
Terms matched: 2 - Score: 18 - 798k
Year: 2016, Volume: 16, Number: 1
... column Table III. includes the parameters obtained experimentally, and the third one contains data gathered through PSpice simulation TABLE III. THE VALUES OF RESISTORS FROM ANTONIOU GYRATOR ... ). The equivalent unidirectional (8 ): circuit parameters being known, the transmission constant (g1c), can be determined. In this case, the ...
Terms matched: 2 - Score: 18 - 849k
Year: 2011, Volume: 11, Number: 1
... 59 Advances in Electrical and Computer Engineering Volume 11, Number 1, 2011 simulated data has been observed in both Fig. 13 and Fig. The measured values ... resonators ", in Proc. ICCSC 2008, Shanghai, China, nonlinear artificial transmission line containing hundreds of pp.176-179. circuit elements [11]. Both behavioral ...
Terms matched: 2 - Score: 18 - 940k