Search Results - (( data distribution matching algorithm ) OR ( _ evacuation under algorithm ))
Search alternatives:
- distribution matching »
- data distribution »
- evacuation under »
- under algorithm »
- _ evacuation »
-
1
Fault location estimation for distribution system using simulated voltage sags data
Published 2007Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Modeling and Simulation of Emergency Evacuation from Industry Buildings under Toxic Cloud Release
Published 2018Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Hierarchical Bayesian estimation for stationary autoregressive models using reversible jump MCMC algorithm
Published 2018“…The performance of the algorithm is tested by using simulated data. The test results show that the algorithm can estimate the order and coefficients of the autoregressive model very well. …”
Get full text
Article -
4
-
5
The application of voltage sags pattern to locate a faulted section in distribution network
Published 2010“…This paper proposes an alternative automated fault location algorithm to locate a faulted section in distribution network using only voltage sag data monitored at the primary substation. …”
Get full text
Get full text
Article -
6
-
7
Training data selection for record linkage classification
Published 2023“…Three constructions were proposed to select non-match pairs for the training data, with both balanced (symmetry) and imbalanced (asymmetry) distributions tested. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Measuring height of high-voltage transmission poles using unmanned aerial vehicle (UAV) imagery
Published 2017“…Results were compared with well-known algorithms; including, for example, global and local stereo matching algorithms. …”
Get full text
Get full text
Article -
9
CONTEXT AWARE TRAFFIC SCHEDULING ALGORITHM FOR COMMUNICATION SYSTEM IN POWER DISTRIBUTION NETWORK
Published 2023text::Thesis -
10
-
11
Survey on job scheduling mechanisms in grid environment
Published 2015“…Grid systems provide geographically distributed resources for both computational intensive and data-intensive applications.These applications generate large data sets.However, the high latency imposed by the underlying technologies; upon which the grid system is built (such as the Internet and WWW), induced impediment in the effective access to such huge and widely distributed data.To minimize this impediment, jobs need to be scheduled across grid environments to achieve efficient data access.Scheduling multiple data requests submitted by grid users onto the grid environment is NP-hard.Thus, there is no best scheduling algorithm that cuts across all grids computing environments.Job scheduling is one of the key research area in grid computing.In the recent past many researchers have proposed different mechanisms to help scheduling of user jobs in grid systems.Some characteristic features of the grid components; such as machines types and nature of jobs at hand means that a choice needs to be made for an appropriate scheduling algorithm to march a given grid environment.The aim of scheduling is to achieve maximum possible system throughput and to match the application needs with the available computing resources.This paper is motivated by the need to explore the various job scheduling techniques alongside their area of implementation.The paper will systematically analyze the strengths and weaknesses of some selected approaches in the area of grid jobs scheduling.This helps researchers better understand the concept of scheduling, and can contribute in developing more efficient and practical scheduling algorithms.This will also benefit interested researchers to carry out further work in this dynamic research area.…”
Get full text
Get full text
Get full text
Article -
12
Assessment of landsat 7 scan line corrector-off data gap-filling methods for seagrass distribution mapping
Published 2015“…For optimal performance of the GNSPI algorithm, cloud and shadow in the primary and auxiliary images had to be removed by cloud removal methods prior to filling data gaps. …”
Get full text
Get full text
Article -
13
DC-based PV-powered home energy system
Published 2017“…The work initially investigates the feasibility of using the DC distribution system to power the locally available AC appliances, that are analyzed and evaluated individually to match the DC supply either by direct coupling or some modification. …”
Get full text
Get full text
Thesis -
14
Temporal - spatial recognizer for multi-label data
Published 2018“…Hence, there is a need for a recognition algorithm that can separate the overlapping data points in order to recognize the correct pattern. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
15
-
16
Geometric feature descriptor and dissimilarity-based registration of remotely sensed imagery
Published 2024journal::journal article -
17
Development of a Web Access Control Technique Based User Access Behavior
Published 2004“…The development and the wide spread use of the World Wide Web allow for convenient electronic data storage and distribution all over the world. …”
Get full text
Get full text
Thesis -
18
A multi-scale smart fault diagnosis model based on waveform length and autoregressive analysis for PV system maintenance strategies
Published 2023“…The actual irradiance data at 5.86 °N and 102.03 °E were used as inputs to produce simulated data that closely matched the on-site PV output data. …”
Get full text
Get full text
Get full text
Article -
19
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…The CICIDS2017 dataset includes benign and up-to-date examples of typical attacks, closely matching real-world data of Packet Capture. The four models are tested and assessed using Confusion Metrix against four commonly used criteria: accuracy, precision, recall, and F-measure. …”
Get full text
Get full text
Get full text
Article -
20
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…The CICIDS2017 dataset includes benign and up-to-date examples of typical attacks, closely matching real-world data of Packet Capture. The four models are tested and assessed using Confusion Metrix against four commonly used criteria: accuracy, precision, recall, and F-measure. …”
Get full text
Get full text
Get full text
Article
