Arama Sonuçları - Smart power grids Security features.
Önerilen Konular
Önerilen Konular
- Computational Intelligence 13
- Computational intelligence 13
- Artificial Intelligence 8
- Artificial intelligence 8
- Communications Engineering, Networks 8
- Telecommunication 8
- Signal processing 5
- Signal, Speech and Image Processing 5
- Data Mining and Knowledge Discovery 4
- Data mining 4
- Data and Information Security 3
- Data protection 3
- Applied Dynamical Systems 2
- Dynamics 2
- Nonlinear theories 2
- Algorithms 1
- Application software 1
- Automated Pattern Recognition 1
- Bioinformatics 1
- Computational and Systems Biology 1
- Computer and Information Systems Applications 1
- Computer-Aided Engineering (CAD, CAE) and Design 1
- Computer-aided engineering 1
- Control and Systems Theory 1
- Control engineering 1
- Electric power production 1
- Electrical Power Engineering 1
- Game Theory 1
- Game theory 1
- Innovation and Technology Management 1
-
1
International Conference on Applications and Techniques in Cyber Security and Intelligence ATCI 2018 Applications and Techniques in Cyber Security and Intelligence /
Baskı/Yayın Bilgisi Springer International Publishing : Imprint: Springer, 2019.İçindekiler: “…Convolutional Neural Network Deep-Learning Models for Prediction of Shared Bicycle Demand -- Analysis of Feature Selection Techniques for Correlation-Based Network Anomaly Detection -- An RFID Path Authentication Protocol Based on Chebyshev Polynomials -- An Efficient Authentication Protocol for RFID-based Supply Chains -- Research on the Two Stage Full Life Cycle Management of Police Equipment -- Research on Audio and Video Transmission Strategy for Android -- Emojis Sentiment Analysis Based on Big Social Media Data -- A Transfer Learning Approach for Credit Scoring -- A Parallel Programming Model Research Based on Heterogeneous Multi-core Embedded Processor -- An Improved Apriori-Pro Algorithm -- An Improved Fuzzy Support Vector Machine Algorithm Based on Refactoring Class Center -- An Ensemble Data Stream Mining Algorithm for Class-imbalanced Applications -- A Gaussian-Based Trust Model for Nodes of Sensor Networks -- A Study of Face Recognition System's Testing and Evaluation Methods -- NetworkSecurity Problems and Solutions of Video Surveillance System -- Image Encryption Algorithms Based on Chaos Through Dual Scrambling of Dynamic Josephus Ring and Bit -- Statistical Analysis of Traffic-related Social Media Data of Multiple Cities in China -- Exploring Influential Factors in Recommending Algorithms for All Items and Niche Items -- A Distributed Approach of Accompany Vehicle Discovery -- Spatial Context for Correlation Filter Tracking -- The Automobile Recommendation Method Based on Sentiment Analysis of Online Comments -- An Adaptive Tracking Algorithm for Micro-Blog Topic based on Association Semantic Network -- Knowledge Extracting from Micro-Blog Topic -- Personal Relations Extraction from Microblog Text Based on Relations Trigger Words -- Recommendation Algorithm Based on Latent Semantic of Tags -- Ontology-supported Case-based Reasoning Approach for Double Scenario Model Construction in International Disaster Medical Relief Action -- Web Sanitization from Malicious Code InjectionAttacks -- Event Element Recognition Based on Improved K-means Algorithm -- A Comparative Method of Legal Documents Based on LDA -- Feature Selection Approach for Twitter Sentiment Analysis and Text classification Based on Chi-square and Naïve Bayes -- A Combined Approach of Long Term Spectral Flatness and Formant Based Voice Activity Detection -- Design and Development of Automatic Packaging Equipment for Boxed Drugs -- Development of Automatic Material Sorting Machine Based on PLC -- Intelligent Counter-terrorism Equipment Status and Development -- A Monitoring System of Ground-Air Interaction Multi-Sensory Fusion Plant Growth Condition -- RSCHE: A Virtual Grid Structure Based Routing Scheme with Cell-Header Group Exchanged for Wireless Sensor Network -- A Improved Person Reidentification Method by Selective Convolutional Descriptor Aggregation -- A Survey of Multi-object Video Tracking Algorithms -- An Overview of Image-based Person Re-identification -- Electrical Data Recovery with Weather Information via Collective Matrix Factorization -- Two-Phases Detection Scheme: Detecting Android Malware in Android Markets -- A Software Quality Testing Evaluation Method and its Power Grid Application -- An Index Display Software Evaluation Architecture for Power Grid Application on Big Data Platform -- A Unified Access Method of Heterogeneous Big Data in Power Grid Application -- Regional Power Grid dispatch and Control Integrated Backup System Based on Cloud Computing -- Detection of Anomaly in Firewall Rule-Sets -- Classification and Coding of Pipe Gallery BIM Model for Operation and Maintenance -- A UAV Operational Situation Similarity Measurement Method Based on Empirical Mode Decomposition -- Research on Parking Guidance Information System Based on "Internet Plus" -- Dynamic Multi-objective Optimization for Mixed Traffic Flow Based on Partial Least Squares Prediction Model -- Multi-objective Genetic Algorithm BasedPrefabricated Component Production Process Optimization Considering the Demand Fluctuations in the Construction Site -- Anomaly Detection in Time Series Data Based on Unthresholded Recurrence Plots -- A Two-stage Temporal Anomaly Detection Algorithm Based on Danger Theory -- A Data-driven Framework for Tunnel Infrastructure Maintenance -- A Heuristic for Legacy Information System Remodularization -- E-maintenance Platform Design for Public Infrastructure based on IFC and Semantic Web Technologies -- Building and Application of Shield Construction Big Data Analysis Platform -- A Professional Competence Measurement Approach Based on a Modified PageRank Algorithm -- Particle-Filter-based Prediction for Anomaly Detection -- Analysis on Building a Green Eco-smart City Based on Block Chain Technology -- 3D Indoor Network Model for Emergency Response of Multi-utility Tunnel -- Computer Data Integration Analysis of the Personal Credit Reporting System -- Digital Image Encryption Algorithm Based on Affine Cipher -- Research on the Evaluation Methods of the Guidance and Test on the Student Employment Based on the Computer Model -- Research on the Ideological and Political Assessment System Based on the Data Visualization -- Research on the Interaction Mechanism Between the Ideological and Political Education and the Computer Network Under the New Media Environment -- Research on the Key Technology of the Computer Graphics and Image Processing -- Research on the Security Management Information System Based on the Data Mining.…”
Full-text access
e-Kitap -
2
Game Theory for Networking Applications
Baskı/Yayın Bilgisi Springer International Publishing : Imprint: Springer, 2019.Full-text access
e-Kitap -
3
Proceedings of the International Congress on Information and Communication Technology ICICT 2015, Volume 2 /
Baskı/Yayın Bilgisi Springer Nature Singapore : Imprint: Springer, 2016.Full-text access
e-Kitap -
4
Proceedings of the International Conference on Data Engineering and Communication Technology ICDECT 2016, Volume 1 /
Baskı/Yayın Bilgisi Springer Nature Singapore : Imprint: Springer, 2017.İçindekiler: “…Energy Efficient Self-Organization Wireless Sensor Network for Traffic Management in Smart Cities -- Chapter 68. Inter Area Frequency Monitoring in a Large Power Grid Network -- Chapter 69. …”
Full-text access
e-Kitap -
5
Proceedings of the International Conference on Data Engineering and Communication Technology ICDECT 2016, Volume 2 /
Baskı/Yayın Bilgisi Springer Nature Singapore : Imprint: Springer, 2017.İçindekiler: “…Multi-Objective Evolution based Scheduling of Computational Intensive Applications in Grid Environment -- Chapter 45. Selective Encryption Framework For Secure Multimedia Transmission Over Wireless Multimedia Sensor Networks -- Chapter 46. …”
Full-text access
e-Kitap -
6
International Conference on Intelligent Computing and Applications Proceedings of ICICA 2018 /
Baskı/Yayın Bilgisi Springer Nature Singapore : Imprint: Springer, 2019.Full-text access
e-Kitap -
7
Advances in Internet, Data and Web Technologies The 7th International Conference on Emerging Internet, Data and Web Technologies (EIDWT-2019) /
Baskı/Yayın Bilgisi Springer International Publishing : Imprint: Springer, 2019.Full-text access
e-Kitap -
8
Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications FICTA 2016, Volume 1 /
Baskı/Yayın Bilgisi Springer Nature Singapore : Imprint: Springer, 2017.İçindekiler: “…Analysis of Trustworthiness and Link Budget Power under Free Space Propagation Path Loss in Secured Cognitive Radio Ad-hoc Network -- Chapter 47. …”
Full-text access
e-Kitap -
9
Proceedings of Fifth International Conference on Soft Computing for Problem Solving SocProS 2015, Volume 2 /
Baskı/Yayın Bilgisi Springer Nature Singapore : Imprint: Springer, 2016.İçindekiler: “…DG Integration with Power Quality Improvement Feature for Smart Grid -- Chapter 81. …”
Full-text access
e-Kitap -
10
Proceedings of the International Conference on Soft Computing Systems ICSCS 2015, Volume 1 /
Baskı/Yayın Bilgisi Springer India : Imprint: Springer, 2016.İçindekiler: “…Dynamic Energy Management on a Hydro-powered Smart Micro Grid -- Chapter 61. Performance Evaluation of a Speech Enhancement Technique Using Wavelets -- Chapter 62. 1D-Mine: Accurate Discovery of Large Pattern Sequences from Biological Datasets -- Chapter 63. …”
Full-text access
e-Kitap -
11
Proceedings of the International Conference on Recent Cognizance in Wireless Communication & Image Processing ICRCWIP-2014 /
Baskı/Yayın Bilgisi Springer India : Imprint: Springer, 2016.İçindekiler: “…Harvesting Electric Field Energy for Powering Wireless Sensors of Smart Grid -- Chalcogenide (LiGaSe2, LiGISe, LiGaS2): A Perfect Material to Design Highly Nonlinear PCFs for Supercontinuum Generation -- Machzehnder Interferometer: A Review of an Perfect all Optical Switching Structure -- Design and Analysis of Different Decoders for SAC-OCDMA Systems -- An Efficient Trust Based Routing Scheme using Max- Min Composition of Fuzzy Logic for MANET -- Modified D-Latch Enabled Bec-1 Carry Select Adder with Low Power Delay Product and Area Efficiency. …”
Full-text access
e-Kitap -
12
Proceeding of International Conference on Intelligent Communication, Control and Devices ICICCD 2016 /
Baskı/Yayın Bilgisi Springer Nature Singapore : Imprint: Springer, 2017.İçindekiler: “…MDS3C: Modified Digital Signature Scheme for Secure Communication -- Chapter 37. Autonomous Operation of Wind-Battery Hybrid Power System with Intelligent Power Management Capability -- Chapter 38. …”
Full-text access
e-Kitap -
13
Proceedings of International Conference on ICT for Sustainable Development ICT4SD 2015 Volume 2 /
Baskı/Yayın Bilgisi Springer Nature Singapore : Imprint: Springer, 2016.İçindekiler: “…A Scientometric Analysis of Smart Grid Implementation at Distribution Feeder -- Chapter 65. …”
Full-text access
e-Kitap -
14
Artificial Intelligence and Evolutionary Computations in Engineering Systems Proceedings of ICAIECES 2015 /
Baskı/Yayın Bilgisi Springer India : Imprint: Springer, 2016.İçindekiler: “…Communication Network of Wide Area Measurement System for Real Time Data Collection on Smart Micro Grid -- Chapter 16. Accoustic Modeling for Development of Accented Indian English ASR -- Chapter 17. …”
Full-text access
e-Kitap -
15
Proceedings of the First International Conference on Computational Intelligence and Informatics ICCII 2016 /
Baskı/Yayın Bilgisi Springer Nature Singapore : Imprint: Springer, 2017.Full-text access
e-Kitap -
16
Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA) 2015
Baskı/Yayın Bilgisi Springer India : Imprint: Springer, 2016.İçindekiler: “…Part 1: Special Session: Advances in Nature Inspired Algorithms for Engineering Optimization Problems_An Efficient Dynamic Scheduling Algorithm for Soft Real-Time Task in Multiprocessor System Using Hybrid Quantum-Inspired Genetic Algorithm -- Equitable Machine Learning Algorithms to Probe over P2P Botnets -- Directed Search Based PSO Algorithm and Its Application to Scheduling Independent Task in Multiprocessor Environment -- Part 2: Bioinformatics and Computational Biology_JUPred_MLP: Prediction of Phosphorylation Sites Using a Consensus of MLP Classifiers -- Molecular Computing and Structural Biology for Interactions in ERα and bZIP Proteins from Homo Sapiens: An Insight into the Signal Transduction in Breast Cancer Metastasis -- SVM Based Pre-microRNA Classifier Using Sequence, Structural and Thermodynamic Parameters -- DCoSpect: A Novel Differentially Co-expressed Gene Module Detection Algorithm Using Spectral Clustering -- Intelligent Topological Differential Gene Networks -- Part 3: Signal Processing_Impact of Threshold to Identify Vocal Tract -- Application of Compressed Sensing in Cognitive Radio -- Compressed Sensing Based NBI Mitigation in Ultra Wide Band Energy Detector -- Part 4: Data Mining_A Novel Data Mining Scheme for Smartphone Activity Recognition by Accelerometer Sensor -- Mining and Ranking Association Rules in Support, Confidence, Correlation and Dissociation Framework -- Mining Closed Interesting Sub spaces to Discover Conducive Living Environment of Migratory Animals -- Frequent Patterns Mining from Data Cube Using Aggregation and Directed Graph -- Part 5: Document Image Analysis_A Modified Parallel Thinning Method for Handwritten Oriya Character Images -- Offline Signature Verification Using Artificial Neural Network -- A Simple and Effective Technique for Online Handwritten Bangla Character Recognition -- Visual Analytic Based Technique for Handwritten Indic Script Identification - A Greedy Heuristic Feature Fusion Framework -- Offline Writer Identification from Isolated Characters Using Textural Features -- PWDB_13: A Corpus of Word-level Printed Document Images from Thirteen Official Indic Scripts -- Part 6: Applications of Metaheuristic Optimization_Application of Krill Herd Algorithm for Optimum Design of Load Frequency Controller for Multi-Area Power System Network with Generation Rate Constraint -- Optimal allocation of Distributed Generator using Chemical Reaction Optimization -- A Novel Combined Approach of k-means and Genetic Algorithm to Cluster Cultural Goods in Household Budget -- A PSO with improved initialization operator for solving Multiple Sequence Alignment Problems -- Profit Maximization of TSP with uncertain Parameters through a Hybrid Algorithm -- Part 7: Wireless Sensor and Ad-hoc Networks_Mitigating Packet Dropping Problem and Malicious Node Detection Mechanism in Ad Hoc Wireless Networks -- Service Provisioning middleware for Wireless Sensor Network -- A Novel MTC-RB Heuristic for Addressing Target Coverage Problem in Heterogeneous Wireless Sensor Network -- Part 8: Quantum dot Cellular Automata_2 Dimensional 2 Dot 1 Electron Quantum Cellular Automata Based Dynamic Memory Design -- Optimized Approach for Reversible Code Converters Using Quantum Dot Cellular Automata -- Design of a Logically Reversible Half Adder using 2D 2-Dot 1-Electron QCA -- Part 9: Fuzzy Sets and Systems_Intuitionistic Fuzzy Multivalued Dependency and Intuitionistic Fuzzy Fourth Normal Form -- Parameter Reduction of Intuitionistic Fuzzy Soft Sets and Its Related Algorithms -- Correlation Measure of Hesitant Fuzzy Linguistic Term Soft Set and Its Application in Decision Making -- Constrained Solid Travelling Salesman Problem Solving by Rough GA Under Bi-fuzzy Coefficients -- Part 10: Routing and Traffic Grooming_A Novel Multi-criteria Multi-agent Based Routing Strategy Based on Tarantula Mating Behaviour -- A Mesh Based Multicast Routing Protocol using Reliable Neighbor Node for Wireless Mobile Ad-Hoc Networks -- Traffic Grooming in Hybrid Optical-WiMAX Mesh Networks -- Part 11: Authentication and Network Security_Host Based Intrusion Detection Using Statistical Approaches -- Secure Remote Login Scheme with Password and Smart Card Update Facilities -- Generation and Risk Analysis of Network Attack Graph -- Unsupervised Spam Detection in Hyves Using SALSA -- Cryptanalysis of a Chaotic Map Based Authentication and Key Agreement Scheme for Telecare Medicine Information Systems -- Improving the Accuracy of Intrusion Detection Using GAR-Forest with Feature Selection -- Part 12: Text Processing_Sentiment Analysis with Modality Processing -- Query-Based Extractive Text Summarization for Sanskrit -- Code Obfuscation by Using Floating Points and Conditional Statements -- Privacy Preserving Spam Email Filtering Based on Somewhat Homomorphic Using Functional Encryption -- Part 13: Image Processing_Digital Image Watermarking Scheme based on Visual Cryptography and SVD -- Compression of Hyper-Spectral Images and Its Performance Evaluation -- Hand Gesture Recognition for Sign Language: A Skeleton Approach -- Modified Cuckoo Searchbased Image Enhancement -- A Novel Iterative Salt-and-Pepper Noise Removal Algorithm -- Part 14: Intelligent System Planning_Queuing Model for Improving QoS in Cloud Service Discovery -- Adaptive Multi-Layer Routing for Incremental Design of an SoC -- Analyzing and Modelling Spatial Factors for Pre-decided Route Selection Behaviour -- Fault Tolerant Scheduling with Enhanced Performance for Onboard Computers-Evaluation -- A Multi-Agent Planning Algorithm with Joint Actions -- 4-Directional Combinatorial Motion Planning via Labeled Isotonic Array P System -- Intelligent Control of DFIG Using Sensorless Speed Estimation and Lookup Table based MPPT Algorithm to overcome Wind and Grid disturbances.…”
Full-text access
e-Kitap