Results 31 to 40 of about 83,553 (194)
Islanding detection in distributed generators using GBDT-JS techniques
Renewable Energy Sources (RES) using PV arrays are considered and extensively employed in today’s world. Islanding is an issue that happens when The RES is connected to the grid and unexpected circuit breakers are connected to the grid trip.
Krishna Goriparthy Murali +1 more
doaj +1 more source
Strong measurements give a better direct measurement of the quantum wave function [PDF]
Weak measurements have thus far been considered instrumental in the so-called direct measurement of the quantum wavefunction [Nature (London) 474, 188 (2011)]. Here we show that direct measurement of the wavefunction can be obtained by using measurements
Dequal, Daniele, Vallone, Giuseppe
core +2 more sources
De Novo Assembly of Nucleotide Sequences in a Compressed Feature Space [PDF]
Sequencing technologies allow for an in-depth analysis of biological species but the size of the generated datasets introduce a number of analytical challenges.
Robertson, David L., Tapinos, Avraam
core +1 more source
DWT/PCA face recognition using automatic coefficient selection [PDF]
In PCA-based face recognition, there is often a trade-off between selecting the most relevant parts of a face image for recognition and not discarding information which may be useful.
Amira, A, Nicholl, P
core +1 more source
Multiple distributed generators islanding detection using GBDT-JS techniques
Photovoltaic arrays and wind Distributed Generators (DG) have become integral to our renewable energy landscape. However, when a DG disconnects from the grid, the risk of islanding arises, necessitating detection within the stringent of two-second ...
Goriparthy Murali Krishna +1 more
doaj +1 more source
A Study Concerning Soft Computing Approaches for Stock Price Forecasting
Financial time-series are well known for their non-linearity and non-stationarity nature. The application of conventional econometric models in prediction can incur significant errors.
Chao Shi, Xiaosheng Zhuang
doaj +1 more source
Voice Security Using Hybrid Algorithm [PDF]
This research deals with constructing and implementing a new digital voice security Algorithm based on hiding large amount of data (sound file) in a 24 bits host color image (RGB image). The proposed method starts with speech compression to convert human
Alyaa Abdul Majeed Haleem
doaj +1 more source
Biometric Privacy Using Secret Image Sharing [PDF]
Biometric technique includes uniquely identifying person based on their physical or behavioral characteristics. It is mainly used for authentication. Iris scanning is one of the most secure techniques among all biometrics because of its uniqueness and ...
A.T. Hashim, D.A. Noori
doaj +1 more source
A new threshold rule for the estimation of a deterministic image immersed in noise is proposed. The full estimation procedure is based on a separable wavelet decomposition of the observed image, and the estimation is improved by introducing the new ...
Olhede, SC
core +1 more source
Analisis Kinerja Kompresi Citra Digital dengan Komparasi DWT, DCT dan Hybrid (DWT-DCT)
Penelitian ini merupakan penelitian tentang penerapan transformasi diskrit kosinus (DCT), transformasi wavelet diskrit (DWT), dan hybrid sebagai penggabungan dari kedua transformasi sebelumnya dalam proses kompresi data citra digital. Proses kompresi dilakukan untuk menekan konsumsi sumber daya memory, mempercepat proses transmisi citra digital. Proses
Aditya Mahmud Faza +2 more
openaire +2 more sources

