814 results found.
Year: 2022, Volume: 22, Number: 1
... assigned additionally promotes the use of solar energy. Nevertheless, power electronic converters is designed, analyzed and tested the large-scale integration of RES into power system causes in ... pp. 1270 – 1281, information that can be used in practical situations to design May 2014. doi:10.1109/TSG.2014.2301157 and operate realistic microgrids. However ...
Terms matched: 2 - Score: 13 - 1,928k
Year: 2022, Volume: 22, Number: 1
... ]. Hackers have reportedly created unique strains of (BGH) model has been designed to detect eight known IoT malware that can circumvent security measures and disrupt network ... Things (IoT) devices have flocked the variety, it is not easy to design a single security solution for whole world through the Internet. With increasing mission ...
Terms matched: 2 - Score: 21 - 1,415k
Year: 2022, Volume: 22, Number: 1
... for the large dataset is more. By considering the changes of customers. The segregation can be used in aforementioned issues the clustering based optimal different future studies, designing and managing loads scheduling using DR strategies has been proposed in this during peak times [4]. In most research works, [5-8] work. ...
Terms matched: 1 - Score: 3 - 3,544k
Year: 2022, Volume: 22, Number: 1
... and ωb is the base angular speed; electronic switch designed by IGBT-Diode transistor. A o  RTot  ... intermittent nature, the diversification of due to their simple design. However, they have limitations sites and the ... under varying atmospheric conditions, on the performance of the designer and the accuracy of the by simulations in the ...
Terms matched: 3 - Score: 37 - 1,648k
Year: 2022, Volume: 22, Number: 1
... this property effectively prevents WTs from frequency regulation via properly designed inertial controls. responding to system frequency deviations [ ... a fixed rate of Section II presents the proposed control design with detailed change in the system frequency because WTGs ... not mathematical modelling and analyses, aiming to enhance the synchronously connected to the system. The rotor speed of ...
Terms matched: 3 - Score: 91 - 1,707k
Year: 2022, Volume: 22, Number: 1
... ), computers configurations, results are compared and because of the low computational power of commodity advantages and disadvantages are discussed for each computers CPU. Changes in architecture design of graphics approach for different configurations and vendors. cards processors (GPU) and processors (CPU) have enabled an increasing number of scientific researchers to study ...
Terms matched: 1 - Score: 3 - 1,615k
Year: 2022, Volume: 22, Number: 1
... image segmentation [5]. The noise estimation methods, Local Binary Patterns) is introduced, which first estimates which have been employed in these techniques, are designed noise patterns using FFT and encodes the discrepancies in noise patterns using DRLBP. Features extracted are passed to keeping in view a specific type of noise. Usually ...
Terms matched: 1 - Score: 16 - 1,614k
Year: 2022, Volume: 22, Number: 1
... capacity  208.78 Ah (3) have been previously designed to this voltage level. However, the choice ... the main While many research [10-13] studied the design and constraints. Therefore, the conception of an ... purpose of the entire mission. The first step in designing main parts with some essential changes. the EPS ...
Terms matched: 3 - Score: 79 - 1,960k
Year: 2022, Volume: 22, Number: 1
... The addition of these vectors (OP+ OR') is K-L coordinates are designed and the corresponding VHDL achieved by connecting Inverter I and Inverter II at the ... Engineering Kannur, Kerala, India sumam.mj@gecbh.ac.in Abstract — This paper proposes the design and development The automated FPGA implementation tools develop a of a space vector pulse ...
Terms matched: 2 - Score: 32 - 3,602k
Year: 2022, Volume: 22, Number: 1
... reach billions, critical tasks Sun et al. have designed a password-based authentication face many information capture attacks every ... our authentication is the process of both parties verifying each design wearable textile and the gateway is secure. A ... which constitutes smart cities. The low-cost primary motivation for designing two-factor security for system design controls the utensils of ...
Terms matched: 3 - Score: 112 - 1,672k