Showing 18,141 - 18,160 results of 28,194 for search 'Winaq~', query time: 3.20s Refine Results
  1. 18141

    Chaos Synchronization Based Novel Real-Time Intelligent Fault Diagnosis for Photovoltaic Systems by Chin-Tsung Hsieh, Her-Terng Yau, Jen Shiu

    Published 2014-01-01
    “…Then, the extension engineering is used to implement the fault diagnosis. Finally, the overall fault diagnosis system only needs to capture the voltage signal of the solar photovoltaic system, and the fault type can be diagnosed instantly.…”
    Get full text
    Article
  2. 18142

    Application in Feature Extraction of AE Signal for Rolling Bearing in EEMD and Cloud Similarity Measurement by Long Han, Chengwei Li, Liqun Shen

    Published 2015-01-01
    “…It uses Cloud Similarity Measurement to select sensitive IMF which can reflect the fault features. Finally, it sets the Multivariate Multiscale Entropy (MME) of sensitive IMF as the eigenvalue of original signal; then it is classified by the SVM to determine the fault types exactly. …”
    Get full text
    Article
  3. 18143

    Fractional order plus-negative sequence decoupling control strategy for dynamic voltage restorer by WU Chaojun, WANG Zhenyue, YANG Ningning, SHAO Wenquan

    Published 2025-01-01
    “…Then, the integer order plus-negative order decoupling control strategy is extended to fractional order, and the frequency domain method is combined with the robustness condition when the gain changes to correct the relevant parameters. Finally, the simulation results verify the feasibility of the fractional order plus-negative sequence decoupling control strategy applied to the DVR system, and the proposed strategy has better dynamic response speed and anti-interference performance than the traditional plus-negative sequence decoupling control startegy.…”
    Get full text
    Article
  4. 18144

    Application Prospect of Big Data Technology in the Informatization of Soil and Water Conservation by LUO Wen, LIU Xing, YUAN Zaijian

    Published 2023-01-01
    “…Soil and water conservation is an important part of China's environmental protection work.The construction and application of big data of China's ecological environment have brought technological innovation to soil and water conservation work.However,the application of big data technology in the informatization of soil and water conservation is still in the exploratory stage,and the technology is only used in the soil and water conservation monitoring and construction project guidelines.This paper briefly discusses the informatization construction of soil and water conservation in China.It prospects for the application of big data technology in the design,scheme preparation,monitoring,supervision and management,acceptance evaluation,treatment informatization of soil and water conservation and soil erosion forecasting combined with the processing systems such as batch data,streaming data,interactive data and graph data and the analysis techniques such as knowledge calculation and in-depth learning. Finally,given the deficiencies and difficulties in soil and water conservation informatization, some suggestions are put forward,such as strengthening informatization construction,building data collection standards, establishing soil and water conservation knowledge base,and cultivating the talents in the field of big data of soil and water conservation,providing a reference for accelerating the informatization of soil and water conservation.…”
    Get full text
    Article
  5. 18145

    Challenges and Shortcomings of “Settlement Patterns Analysis” Studies in the Archaeology of Iran: A Critical Evaluation and Some Suggestions by Saeed Amirhajloo

    Published 2021-10-01
    “…Accordingly, it is suggested here that the data collection and analysis could be done by using the combined method that considers the following items: the study of historical texts, full coverage survey of the region, and attention to off-site archaeology especially in Neolithic studies, regarding absolute chronologies before going through the settlement pattern analysis, analysis of animal and plant remains, soil analysis and geophysical methods, statistical analysis, use of models and analysis of economic relations between settlements, and finally, the spatial analysis of settlements based on up-to-date theories and models.…”
    Get full text
    Article
  6. 18146

    La participation des acteurs locaux à l’élaboration et l’évaluation des politiques publiques de développement durable  en Nouvelle-Calédonie by Séverine Bouard, Jean-Michel Sourisseau, Gilles Pestana

    Published 2008-11-01
    “…These principles are based on the experiences of a research program built around the evaluation of a grassroots development project in the northern province of New Caledonia. Finally, we insist on the constraints in the efficiency of real participatory device and on the difficulties to follow principles of the sustainable development, especially in the context of the Pacific islands.…”
    Get full text
    Article
  7. 18147

    A cooperative control strategy for power quality based on parallel grid-connected converters by LIANG Xiaorui, LUO Yuhang, ZHANG Huaying, TU Chunming, LIU Huicong, ZHENG Yuting

    Published 2025-01-01
    “…Through compensation capacity calculation and reactive power allocation, the voltage at the PCC can maintain near the rated voltage. Finally, the feasibility and superiority of the proposed strategy are verified through simulations.…”
    Get full text
    Article
  8. 18148

    Advances in Nanoengineered Terahertz Technology: Generation, Modulation, and Bio-Applications by Zhongwei Jin, Jing Lou, Fangzhou Shu, Zhi Hong, Cheng-Wei Qiu

    Published 2025-01-01
    “…Subsequently, it explores bio-applications such as novel biosensing and biofunction techniques. Finally, it summarizes findings and reflects on future trends and challenges in the field. …”
    Get full text
    Article
  9. 18149

    Theo-anthropocentric Paradigm of Tafsir At-Tanwir by Muhammadiyah and its Application in the Interpretation of Surah Al-Baqarah/2: 286 by Muhammad Ridha Basri, Muhammad Hasnan Nahar, Sirajuddin Bariqi

    Published 2024-12-01
    “…For them, there is a wealth distribution mechanism with worldly and hereafter dimensions, such as through zakat, infaq, and alms. The development of the meaning of surah al-Baqarah/2: 286 is an implication of theo-anthropocentric paradigm.…”
    Get full text
    Article
  10. 18150

    Forest Fire Smoke Video Detection Using Spatiotemporal and Dynamic Texture Features by Yaqin Zhao, Zhong Zhou, Mingming Xu

    Published 2015-01-01
    “…Local Binary Motion Pattern (LBMP) is used to define dynamic texture features of smoke videos. Finally, smoke video is recognized by Adaboost algorithm. …”
    Get full text
    Article
  11. 18151

    AADL architecture model construction based on FACE mode by LYU Guangzhe, YU Chunhai, KANG Kai, MA Chunyan, LIN Wei

    Published 2024-12-01
    “…Then, the StringTemplate template is designed based on the mapping rules, and the template engine algorithm for generating AADL model is given. Finally, a total of 12 kinds of FACE models elements in four aspects are taken as experimental objects, 241 FACE model instances are designed as test cases, and the generated AADL models are verified in the OSATE tool. …”
    Get full text
    Article
  12. 18152

    Fluorescent Sensors Based on Organic Polymer-Capped Gold Nanoparticles for the Detection of Cr(VI) in Water by Na Wang, Liangchen Wang, Hong Yang, Tingting Xiong, Shangping Xiao, Jiawen Zhao, Weiping Du

    Published 2019-01-01
    “…It is suggested that the quenching mechanism is based on the combined effects of internal electron transfer and the inner filter effect. Finally, the recovering mechanism is based on the redox reactions between the Cr(VI) and Fe(II) ions.…”
    Get full text
    Article
  13. 18153

    Design and application of system with dual-control of water and electricity based on wireless sensor network and video recognition technology by Hejie Chen, Chunxue Wu, Wending Huang, Yan Wu, Naixue Xiong

    Published 2018-09-01
    “…In order to solve the security problem of the user in wireless sensor network, this article proposes a radio frequency identification mutual security authentication protocol based on shared secret hash function. Finally, experiments show that the proposed secure authentication protocol can guarantee the secure transmission of data between the sensor node and the server, and the video recognition technology can recognize some abnormalities well.…”
    Get full text
    Article
  14. 18154

    Ameliorated Chameleon Algorithm-Based Shape Optimization of Disk Wang–Ball Curves by Yan Liang, Rui Yang, Xianzhi Hu, Gang Hu

    Published 2024-12-01
    “…Secondly, the shape optimization of CDWB curves is considered as a minimization problem with curve energy as the objective, and an optimization model is developed under the constraints of the splicing conditions. Finally, the meta-heuristic algorithm MCSA is introduced to solve the established optimization model to obtain the minimum energy value, and its performance is verified by comparison with other algorithms. …”
    Get full text
    Article
  15. 18155

    Simeprevir and Sofosbuvir Combination Treatment in a Patient with HCV Cirrhosis and HbS Beta 0-Thalassemia: Efficacy and Safety despite Baseline Hyperbilirubinemia by Nikolaos Papadopoulos, Melanie Deutsch, Athanasios Georgalas, Helias Poulakidas, Lazaros Karnesis

    Published 2016-01-01
    “…Hyperbilirubinemia was benign and fully reversible and our patient finally achieved sustained virological response 24 weeks after the end of treatment.…”
    Get full text
    Article
  16. 18156

    The Impact of Bullwhip Effect on the Cash Flow in Two-Parallel Supply Chain Systems with the Competition Effect by Xingji Chen, Jing Zeng, Xigang Yuan

    Published 2022-01-01
    “…After that, the quantitative equation of the CFBE was deduced from two-product and two-parallel SC systems. Finally, we get the condition that the competition effect and the market share increase or decrease the CFBE, which was in contrast to the situation without the competition effect and the market share. …”
    Get full text
    Article
  17. 18157

    Optimal Control of ISTR Rumor Propagation Model with Social Reinforcement in Heterogeneous Network by Liang’an Huo, Sijing Chen, Xiaoxiao Xie, Huiyuan Liu, Jianjia He

    Published 2021-01-01
    “…And through using Pontryagin’s Minimum Principle, the optimal solution of the rumor propagation model is solved. Finally, through theoretical analysis and numerical simulation, some results can be obtained. …”
    Get full text
    Article
  18. 18158

    Wake Detection and Positioning for Autonomous Underwater Vehicles Based on Cilium-Inspired Wake Sensor by Xuanye Hu, Yi Yang, Zhiyu Liao, Xinghua Zhu, Renxin Wang, Peng Zhang, Zhiqiang Hu

    Published 2024-12-01
    “…Then, a flow velocity sensor is used to measure the flow velocities of the “TS MINI” AUV’s wake at different positions, and a velocity field model of the “TS MINI” AUV’s wake is established. Finally, the wake field of the “TS MINI” AUV was measured at various positions using the CIWS. …”
    Get full text
    Article
  19. 18159

    HYEI: A New Hybrid Evolutionary Imperialist Competitive Algorithm for Fuzzy Knowledge Discovery by D. Jalal Nouri, M. Saniee Abadeh, F. Ghareh Mohammadi

    Published 2014-01-01
    “…Initially, the best feature subset is selected by using the embedded ICA feature selection, and then these features are used to generate basic fuzzy-classification rules. Finally, all rules are optimized by using an ICA algorithm to reduce their length or to eliminate some of them. …”
    Get full text
    Article
  20. 18160

    Shuffled differential privacy protection method for K-Modes clustering data collection and publication by Weijin JIANG, Yilin CHEN, Yuqing HAN, Yuting WU, Wei ZHOU, Haijuan WANG

    Published 2024-01-01
    “…Aiming at the current problem of insufficient security in clustering data collection and publication, in order to protect user privacy and improve data quality in clustering data, a privacy protection method for K-Modes clustering data collection and publication was proposed without trusted third parties based on the shuffled differential privacy model.K-Modes clustering data collection algorithm was used to sample the user data and add noise, and then the initial order of the sampled data was disturbed by filling in the value domain random arrangement publishing algorithm.The malicious attacker couldn’t identify the target user according to the relationship between the user and the data, and then to reduce the interference of noise as much as possible a new centroid was calculated by cyclic iteration to complete the clustering.Finally, the privacy, feasibility and complexity of the above three methods were analyzed from the theoretical level, and the accuracy and entropy of the three real data sets were compared with the authoritative similar algorithms KM, DPLM and LDPKM in recent years to verify the effectiveness of the proposed model.The experimental results show that the privacy protection and data quality of the proposed method are superior to the current similar algorithms.…”
    Get full text
    Article