Results 111 to 120 of about 7,197 (279)

Remarks on Normal Distribution and Central Limit Theorem

open access: yesHighlights in Science, Engineering and Technology
The normal distribution holds significant importance in the fields of mathematics, science, and engineering. Statisticians often use the normal distribution to get a good idea of how likely different real-life events are to happen. For example, they make it easier to show how data is spread out during the measurement process. This research looks at the
openaire   +1 more source

Performance Monitoring of Photovoltaic Modules Using Machine‐Learning‐Based Solutions: A Survey of Current Trends

open access: yesEnergy Science &Engineering, EarlyView.
The graphical abstract presents the concept of applying machine‐learning algorithms to assess the performance of photovoltaic modules. Data from solar panels are fed to surrogates of intelligent models, to assess the following performance metrics: identifying faults, quantifying energy production and trend degradation over time. The combination of data
Nangamso Nathaniel Nyangiwe   +3 more
wiley   +1 more source

Personal HealthCare of Things: A novel paradigm and futuristic approach

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract This study provides an investigative approach and offers a complete review of research on Internet of Medical Things (IoMT), describing the progress in general and highlighting the research issues, trends, and future aspects of IoMT. Exploring a research strategy for IoMT systems is vital as the need for IoT in healthcare grows. By aggregating
Surbhi Gupta   +5 more
wiley   +1 more source

Prime type III factors. [PDF]

open access: yesProc Natl Acad Sci U S A, 2000
Shlyakhtenko D.
europepmc   +1 more source

Tomtit‐Raven Evolutionary Selector‐Reinforced Attention‐Driven: A High‐Performance and Computationally Efficient Cyber Threat Detection Framework for Smart Grids

open access: yesEnergy Science &Engineering, EarlyView.
Overview of the proposed work. ABSTRACT Identifying cyber threats maintains the security and operational stability of smart grid systems because they experience escalating attacks that endanger both operating data reliability and system stability and electricity grid performance.
Priya R. Karpaga   +3 more
wiley   +1 more source

Bi‐Level Coordination of Demand Response and Multiple Virtual Power Plants in a Distribution Network for Flexibility Assessment

open access: yesEnergy Science &Engineering, EarlyView.
This study presents a hierarchical coordination framework where multiple VPPs interact with the DSO to optimize energy trades and flexibility offers. Each VPP aggregates DERs and DR, performing internal optimization, day‐ahead bidding, and assessing flexibility to reduce excess renewable generation and pollution.
Alireza Zare   +4 more
wiley   +1 more source

Distributed wireless network resource optimisation method based on mobile edge computing

open access: yesIET Networks, EarlyView., 2022
This paper mainly compares the network ranking leader, consumption amount and network signal reception of the three algorithms. The study found that in terms of network sort captain, there are significant differences between the CPLEX algorithm, the CCST algorithm, and edge computing methods. The CCST algorithm and edge computing have little difference
Jiongting Jiang   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy