找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Data Engineering and Communication Technology; Proceedings of ICDEC K. Ashoka Reddy,B. Rama Devi,K. Srujan Raju Conference proceedings 2021

[复制链接]
楼主: 不正常
发表于 2025-3-23 09:49:06 | 显示全部楼层
An Intelligent ANFIS Controller based PV Custom Device to enhance Power Quality,ve power quality (PQ) issues are presented. Optimal power electronic converters (PEC) are employed to get controlled balanced load voltage/current. The presence of nonlinear loads and sudden addition and removal of sensitive loads on distribution will always create harmonics in the network. It will
发表于 2025-3-23 14:25:29 | 显示全部楼层
Privacy by Design Approach for Vehicular Tripdata Using ,Anonymity Perturbation, entities. The adversary attacks having background knowledge are often a side effect due to re-identity and linkage attacks by innocuous public data sharing provisions. The proposed work spotlight on attacks with background knowledge who attempts to extract individual’s data using high end data extr
发表于 2025-3-23 21:40:14 | 显示全部楼层
Self-powered Implantable Device Using Thermo Electric Generator with DC-DC Converter for Eliminatiohuman beings. Bradycardia is a slow heartbeat that falls out as one of the major issues. An implantable device that deals with this disease are pacemaker. Battery oriented implantable pacemaker sustains until the life of the battery. Replacing implants due to limitation of battery life demands surgi
发表于 2025-3-24 00:09:34 | 显示全部楼层
发表于 2025-3-24 02:58:37 | 显示全部楼层
Compensation of Delay in Real-Time HILS for Aerospace Systems,ms of vehicle are introduced in HILS test bed for their performance evaluation in real-time scenario. The HILS results are suffering with unwanted diverging oscillations, which limit the HILS test bed effectiveness in evaluating the actual performance of embedded systems of aerospace vehicle. It is
发表于 2025-3-24 08:17:18 | 显示全部楼层
Malware Detection System Using Ensemble Learning: Tested Using Synthetic Data, infiltration can have disastrous consequences on any corporation which includes stealing confidential data, damaging network devices, and crippling of network systems. So, there is a need to filter the malware out from the network and this is achieved with the help of intrusion detection systems; t
发表于 2025-3-24 14:29:27 | 显示全部楼层
发表于 2025-3-24 15:27:08 | 显示全部楼层
CreepOnto: An Avant-Garde Scheme for Framing and Evaluating Ontologies Using Domain Knowledge of Cr the need for development of ontologies which has proven to be a great asset for individuals and groups that seek to ameliorate the usage of useful unorganised particulars and regenerate it to ensure optimum reusability of the same. This has been further kindled by the contemporary desire for artifi
发表于 2025-3-24 19:42:49 | 显示全部楼层
Analysis of Coupling Transition for the Encoded Data and Its Logical Level Power Analysis, connections will consume maximum amount of power when the technology shrinks, when data is transmitted to bus architecture it consumes a significant amount of power, and when transitions occur more power is required, and hence power has to be saved. Switching activity power can be minimized by desi
发表于 2025-3-25 02:00:58 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-20 14:36
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表