找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Sustainable Technology and Advanced Computing in Electrical Engineering; Proceedings of ICSTA Vasundhara Mahajan,Anandita Chowdhury,Fernand

[复制链接]
楼主: 可扩大
发表于 2025-3-26 21:09:40 | 显示全部楼层
Optimal Location and Size of Multi-distributed Generation with Minimization of Network Losses,es in transmission system branches. These higher losses lead to higher operational cost in distribution system. The advancement of technology using distributed generations has been proved to be very important in optimizing network losses, environment pollution, and reliability of power systems. The
发表于 2025-3-27 01:18:05 | 显示全部楼层
发表于 2025-3-27 06:06:25 | 显示全部楼层
,ASIC Implementation of a 16-Bit Brent–Kung Adder at 45 nm Technology Node,adence Genus and Innovus tools. Brent–Kung Adder is selected with a 16-bit word size as it is considered suitable for very large-scale integration (VLSI) implementation out of the other parallel prefix adder implementation. It is provided with scan chain flip-flops which cover the overall design. Th
发表于 2025-3-27 10:20:07 | 显示全部楼层
发表于 2025-3-27 15:04:40 | 显示全部楼层
Imperceptible Digital Image Watermarking Based on Discrete Wavelet Transform and Schur Decompositio one of the solutions to this problem based on an image watermarking technique using Discrete Wavelet Transform (DWT) and Schur decomposition. The Schur decomposition takes a lesser number of computations than singular value decomposition, which makes it suitable for the decomposition of the image.
发表于 2025-3-27 21:06:31 | 显示全部楼层
发表于 2025-3-27 23:07:18 | 显示全部楼层
Attack and Defense Methodology Against the Share Intents in Android,y, there are millions of downloads of Android applications, either from trusted sources (like Google Play Store) or even from untrusted sources in the form of APKs. Due to this, a large number of users’ mobiles are infected with malicious applications. According to McAfee Mobile Threat Report (2019
发表于 2025-3-28 06:02:42 | 显示全部楼层
Comparative Study of Traffic Light and Sign Detection Techniques,imarily use a circular Hough transform with color masks to detect traffic lights. For the more complex approach, we deploy convolution neural networks in combination with previously proposed feature extractors to aid with traffic light detection along with a confidence score. We make use of the SSD
发表于 2025-3-28 09:57:52 | 显示全部楼层
A New Fuzzy Cascaded Controller for Hybrid Power System with Integration of FACTS Device,as plants, and electric vehicles (EV), and distributed generation (DG). The renewable energy effect is considered in DG. The stored energy of an interconnected power system HVDC tie-link is utilized with inertia emulation-based control (INEC). The secondary controller is crucial to the AGC’s stabili
发表于 2025-3-28 14:27:22 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-4 18:09
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表