Showing 3,381 - 3,400 results of 3,735 for search '"IEEE"', query time: 0.05s Refine Results
  1. 3381

    Optimal Dispatch of Reactive Power Using Modified Stochastic Fractal Search Algorithm by Thang Trung Nguyen, Dieu Ngoc Vo, Hai Van Tran, Le Van Dai

    Published 2019-01-01
    “…Furthermore, the proposed method also sees its effectiveness and robustness over SSFS by testing on IEEE 30-bus system and IEEE 118-bus system with three different single objectives for each system. …”
    Get full text
    Article
  2. 3382

    Optimal µPMU Placement Considering Node Importance and Multiple Deployed Monitoring Devices in Distribution Networks by Ruifeng Zhao, Jiangang Lu, Yizhe Chen, Yifan Gao, Kai Gan, Ming Li, Chengzhi Wei, Runhong Huang, Fan Xiao, Liang Che

    Published 2025-01-01
    “…The superiority of the proposed μPMU method is verified in standard systems such as IEEE-33, IEEE-34, and P&G69, in which the number of required μPMUs is reduced by 20%, and the observation performance of the system is improved by 30% in special cases.…”
    Get full text
    Article
  3. 3383

    Using idle TDMA slots for retransmitting packets cooperatively in VANET by Zhen CHEN, Jiang-hong HAN, Yong YANG, Zheng-yu LIU, Yang LU

    Published 2015-07-01
    “…The distributed TDMA approach for VANET dose not take advantage of idle slots,failing to effectively utilize radio resources.A retransmission method for medium access control was proposed for utilizing idle slots.In the method,neighboring nodes utilized idle slots for retransmitting a packet which failed to reach the target receiver.Theoretical analysis and simulation results show that the proposed method significantly increases the probability of successful packet transmission and the network throughput.In addition,a comparison between the proposed method and IEEE 802.11p was presented via extensive simulation,and the results prove that,due to its ability to access channel determinately,the method can disseminate real-time safety information timely and stably.…”
    Get full text
    Article
  4. 3384
  5. 3385

    Comparative Performance Evaluation of TCP Variants in WiMAX (and WLANs) Network Configurations by Konstantinos Tsiknas, George Stamatelos

    Published 2012-01-01
    “…An important application for the IEEE 802.16 technology (also called WiMAX) is to provide high-speed access to the Internet where the transmission control protocol (TCP) is the core transport protocol. …”
    Get full text
    Article
  6. 3386

    60 GHz Modular Antenna Array Link Budget Estimation with WiGig Baseband and Millimeter-Wave Specific Attenuation by Joongheon Kim, Liang Xian, Ali S. Sadri

    Published 2017-01-01
    “…This paper provides practical 60 GHz link budget estimation results with IEEE 802.11ad standard-defined parameters and 60 GHz specific attenuation factors. …”
    Get full text
    Article
  7. 3387

    Design and Study of Cognitive Network Physical Layer Simulation Platform by Yongli An, Dong Wang, Yang Xiao

    Published 2014-01-01
    “…Cognitive radio technology has received wide attention for its ability to sense and use idle frequency. IEEE 802.22 WRAN, the first to follow the standard in cognitive radio technology, is featured by spectrum sensing and wireless data transmission. …”
    Get full text
    Article
  8. 3388

    Research on localization scheme of UWB in NLOS environment by XIAO Zhu1, YU Quan2, YI Ke-chu1, WANG Yong-chao1

    Published 2008-01-01
    “…According to three NLOS channel model simulations in IEEE.802.15.4a,the relationship between channel impulse response and SP search region was analyzed,localization per-formance impacted by various parameters was also discussed. …”
    Get full text
    Article
  9. 3389

    A Trust Value-Based Spectrum Allocation Algorithm in CWSNs by Qing-Qi Pei, Zi Li, Li-Chuan Ma

    Published 2013-05-01
    “…CWSN devotes itself to the solution of spectrum sharing in forms of networks, such as IEEE 802.11 and Bluetooth. A new algorithm is proposed for allocating the idle spectrum to secondary users (SUs). …”
    Get full text
    Article
  10. 3390

    Study of performance of UWB transmitted-reference receivers by YANG Gang1, KANG Jie2, SHI Ren1

    Published 2005-01-01
    “…The principle and advantage were analyzed about UWB transmitted-reference (TR) receiver.Moreover,considering many UWB communications had little channel variance in the course of transmitting a few bits data,an improved TR receiver was presented by extending TR signal set to the sum of several reference signals and many data signals.The performance of this improved TR receiver and basic TR receiver were detailed analyzed in theory and simulated in the IEEE UWB multipath channel models CM1 and CM2.The results show that bit error rate and data transmission efficiency of this improved TR receiver are better than basic TR receiver,at the cost of a little rise of structure complexity.…”
    Get full text
    Article
  11. 3391

    Algorithm of grid reliability assessment and reconstruction optimization system by Zhibin ZANG, Peihao ZHENG, Benhai WEI, Zaipei ZHAI, Shengguo MA

    Published 2017-12-01
    “…Based on the research of the reliability of distribution network and the reconstruction of network,a new method was put forward to reconstruct the power grid reliability.Firstly,the evaluation index system was proposed,which included the active network LOSS (LOSS),lack of system power supply (ENS) and the average power supply availability (ASAI).A multi-objective model of distribution network was constructed by normalization,and the multi-objective function was transformed into a new single objective function by using the judgment matrix method,which realized fast calculation of power distribution network reconstruction and optimization.Through IEEE69 example verification,the optimization algorithm can obtain the global optimal solution and reduce the computational time at the same time,effectively solve the problem of the reconstruction of the complex network optimization.…”
    Get full text
    Article
  12. 3392

    Architecture and verification of enhanced deterministic networking oriented large-scale by Jun XU, Aihua LIU, Guoquan KONG, Quan XIONG

    Published 2024-01-01
    “…Comparison to the traditional “best-effort” QoS of IP-based network, deterministic networking had provided guaranteed QoS capabilities catering the requirements of differentiated increasing IP-based services.In the local Ethernet network and limited domain IP network, IEEE and IETF had approved the time-sensitive networking and deterministic working groups, which had published series standards.At present, the large-scale deterministic networking research has been carried out in the industry.There has being a consensus that the deterministic networking technology needs to be enhanced, and a new enhanced deterministic networking architecture needs to be developed.A three-dimension enhanced networking architecture was proposed, and the prototype devices verification based the architecture were provided.The results of verification show that it can meet the large-scale deterministic requirements with the well compatibilites for existed IP network.…”
    Get full text
    Article
  13. 3393

    Support vector machine based fast Monte Carlo reliability evaluation method for composite power system by Yuxiao LEI, Gengfeng LI, Yuxiong HUANG, Zhaohong BIE

    Published 2019-06-01
    “…A fast Monte Carlo reliability evaluation method for composite power system based on support vector machine (SVM) was proposesd.Firstly,sample data for training the SVM model was obtained by enumerating component failures and calculating the corresponding minimum load shedding.Then,the SVM algorithm was used to mine the nonlinear mapping relationship between component failures and minimum load shedding,and the minimum load shedding estimation model was trained.Finally,the model was combined with the Monte Carlo simulation.By randomly sampling component states,for each state,the estimation model obtained by the training directly gave the minimum load shedding,thereby achieving a rapid assessment of the reliability of the composite power system.The proposed method is applied to the IEEE RTS 79 system,which verifies its effectiveness.…”
    Get full text
    Article
  14. 3394

    Modeling the distance error and performance analysis in IR-UWB positioning system by MENG Jing1, ZHANG Qin-yu1, ZHANG Nai-tong12, CHEN Ping2, LIU Ning-ning3

    Published 2011-01-01
    “…The multipath and NLOS distance errors in indoor positioning due to the propagation characteristics of IR-UWB were analyzed,based on the coherent TOA ranging algorithm.Utilized the statistical information of IEEE 802.15.4a channel model,the multipath error was modeled in terms of system bandwidth in both LOS and NLOS envi-ronment.And the NLOS extra distance error was derived in terms of obstacle thickness,transceiver distance and the in-cidence angle as the IR-UWB signal propagated through walls.The positioning performance via triangulation was ana-lyzed as given the prior information of the NLOS distance error in completely NLOS environment.…”
    Get full text
    Article
  15. 3395

    Survey of IoT security research: threats, detection and defense by Yiyu YANG, Wei ZHOU, Shangru ZHAO, Cong LIU, Yuhui ZHANG, He WANG, Wenjie WANG, Yuqing ZHANG

    Published 2021-08-01
    “…Based on the IoT security literatures published in the international conferences on network security (ACM CCS, USENIX Security, NDSS, IEEE S&P) in recent five years, and other prominent researches, the works from the perspective of "threat, detection, defense" were systematically summarized and analyzed.Firstly the basic architecture of the IoT system was introduced.Then the main threats proposed in these works were classified into eight categories, and the causes and hazards of the threats were analyzed.After that, six detection and five defense schemes against these threats were introduced, and their technical principles, advantages and disadvantages were compared.At last, on the basis of the above analysis, the main challenges that the current research still faces were put forward, and the research directions of future works were point out.…”
    Get full text
    Article
  16. 3396

    MAC Protocols Used by Wireless Sensor Networks and a General Method of Performance Evaluation by Joseph Kabara, Maria Calle

    Published 2012-01-01
    “…Many researchers employ IEEE802.15.4 as communication technology for wireless sensor networks (WSNs). …”
    Get full text
    Article
  17. 3397

    Enhanced zebra optimization algorithm and applications of power allocation in SDWN by LI Jiajia, DONG Ligang, JIANG Xian

    Published 2025-01-01
    “…Experimental results demonstrate that EZOA exhibits superior competitiveness compared to six other well-established algorithms on the IEEE CEC 2014 benchmark function set. In the SDWN power allocation problem, EZOA achieves an average improvement of 5.46% in user secrecy rate and the fastest convergence speed compared to five other algorithms.…”
    Get full text
    Article
  18. 3398

    A Zone-Based Self-Organized Handover Scheme for Heterogeneous Mobile and Ad Hoc Networks by Murad Khan, Kijun Han

    Published 2014-06-01
    “…Furthermore, a new event is proposed and added to the IEEE 802.21: media independent handover (MIH) standard to integrate the functionality of multithreshold. …”
    Get full text
    Article
  19. 3399

    م التأهيل الذاتي للشبكة الكهربائية باستخدام الحماية التفاضلية by عبير زين

    Published 2024-12-01
    “…فكان التوجه لشبكة أكثر ذكاء وقدرة على معالجة المعطيات و البيانات واتخاذ القرار كما سنرى في بحثنا حول التأهيل الذاتي باستخدام الحماية التفاضلية وسنقوم باستخدام برنامج حاسوبي متقدم (ETAP) وسيتم تحليل النتائج لشبكة IEEE-9bus. …”
    Get full text
    Article
  20. 3400