viii 2.3.3 Damping Control in the transmission path 2.3.4 Damping control at generation 2.4 Power System Stabilizer 2.4.1 Adaptive Power System Stabilizer 3 INTELLIGENT PSS CONTROL TECHNIQUE 3.1 3.7 Recurrent Neural Network 3.7.1 The... more
The version presented here may differ from the published version or from the version of record. If you wish to cite this item you are advised to consult the publisher's version. Please see the repository url above for details on accessing... more
Compressive sensing (CS) is an alternative to the Shannon limit when the signal to be acquired is known to be sparse or compressible in some domain. Since compressed samples are non-hierarchical packages of information, this acquisition... more
GEROS-ISS (GEROS hereafter) stands for GNSS REflectometry, Radio Occultation and Scatterometry onboard the International Space Station. It is a scientific experiment, proposed to the European Space Agency (ESA) in 2011 for installation... more
Zero Trust Architecture (ZTA) is a fundamental cybersecurity framework necessitated by the intricacy of cyber threats and the security of commercial networks. Insider attacks, advanced persistent threats (APTs), mobility, and cloud... more
We calculate electron energy loss spectra (EELS) for composite plasmonic structures based on silicene and germanene. A continued-fraction expression for the effective dielectric function is used to perform multiscale calculations of EELS... more
Accommodation of distributed generation (DG) units in the distribution power network (DPN) reduces the power losses (PL), improves the voltage profile (VP), and enhances the stability. The size and site for distribution generations have... more
Online social networks (OSNs) classify users into different categories based on their online activities and interests, a task which is referred as a node classification task. Such a task can be solved effectively using Graph Convolutional... more
Three-dimensional (3D) object classification is crucial in various applications, including autonomous driving, robotics, and augmented reality, where precise detection of objects in 3D space is required. Traditional techniques for 3D... more
With the advancement of technology and the increasing demand on smart systems and smart applications that provide a quality-of-life improvement, there has been a surge in the demand of more conscious applications, Machine Learning (ML) is... more
Robots have been used in manufacturing for years, but with the advent of smart factory technologies, their capabilities have expanded significantly. Learn more in Smart Factory courses by Tonex.
Abstract. When implementing a DC distribution network, it is much easier to integrate distributed energy sources than it is with an ac grid. Furthermore, the efficiency and reliability of DC distribution networks outperform those of AC... more
Introdução: A Hanseníase ou Mal de Hansen (MH) é uma doença infectocontagiosa que afeta os troncos nervosos periféricos em decorrência da invasão das células neurais pelo Mycobacterium leprae e da resposta do organismo ao processo... more
Next-generation firewalls are available and use machine learning and generative modeling to enhance the detection of hard-to-detect cyber threats. These systems incorporate advanced security controls, policies, and protocols with Layer 7... more
The integration of artificial intelligence (AI) into space exploration has ushered in a new era of discovery and innovation. While AI offers immense potential for autonomous decision-making, data analysis, and adaptive problem-solving,... more
— In this paper, a single switch transformer-less DC-DC converter with continuous input current for photovoltaic applications is proposed. The suggested configuration utilizes a CL1C2D2 structure to achieve a high voltage gain and... more
Background: The Altmetric score (AS) is a novel measure of publication impact that is calculated by the number of mentions across various social media websites. This method may have advantages over traditional bibliometrics in the context... more
Background: The Altmetric score (AS) is a novel measure of publication impact that is calculated by the number of mentions across various social media websites. This method may have advantages over traditional bibliometrics in the context... more
This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution.
This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY
State of the art communication system pave way for microstrip patch antennas to experience rapid development. Nowadays, patch antennas are becoming increasingly popular due to their light weight and low profile making them easy to... more
In this paper, an efficient methodology to retargeting and reuse of embedded mixed-signal blocks is presented. Parametrized layout templates, accurate behavioral modeling of mixed-signal blocks, and appropriate mechanisms for tuning sized... more
In the last decade, training recurrent neural networks (RNN) using techniques from the area of reservoir computing (RC) became more attractive for learning sequential data due to the ease of network train- ing. Although successfully... more
One of the main aims of this paper is to draw the reader's attention to some problems and results from Structural Geometry which can be easily reformulated in terms familiar to the researches in Computational Kinematics, thus establishing... more
This systematic review and meta-analysis evaluated the performance of machine learning models in predicting prostate cancer progression using lifestyle factors as predictive biomarkers to improve prognostic accuracy. Various models were... more
IT is evolving at an incredible pace, and this has greatly changed the perimeter of the network that is distributed. As such, the traditional concepts of security are not enough. Today, port-based firewalls have become virtually useless... more
Introdução: Introdução: A hanseníase configura-se como um problema de saúde pública no Brasil juntamente com outros países, pois ainda não se conseguiu alcançar as taxas alvo de erradicação preconizada pela Organização Mundial da Saúde. O... more
Highways are an important component of any country. However, some highways in Indonesia endanger users while maintaining road safety. Crack detection early in the deterioration process can prevent further damage and lower maintenance... more
This paper presents an optimization algorithm called KGCS suitable to be used for different engineering problems. The efficiency of the algorithm is given by the aggregation between the particularities of the Cuckoo Search algorithm and... more
During the fast progress of digital technologies, business intelligence (BI) has experienced a significant change, leading to new chances for making data-informed decisions and gaining strategic insights. Businesses are currently... more
Blockchain technology can play a vital role in the space industry and exploration. This magic technology can provide decentralized and secure techniques for processing and manipulating space resources as space digital tokens. Tokenizing... more
YOLOv5 represents a significant advancement in the field of real-time object detection, building upon the YOLO (You Only Look Once) series' legacy. This paper provides a comprehensive review of YOLOv5, examining its architecture,... more
Open-vocabulary keyword spotting (KWS) aims to detect arbitrary keywords from continuous speech, which allows users to define their personal keywords. In this paper, we propose a novel location guided end-to-end (E2E) keyword spotting... more
Open-vocabulary keyword spotting (KWS) aims to detect arbitrary keywords from continuous speech, which allows users to define their personal keywords. In this paper, we propose a novel location guided end-to-end (E2E) keyword spotting... more
Message oriented and robotics middleware play an important role in facilitating robot control, abstracting complex functionality, and unifying communication patterns between sensors and devices. However, using multiple middleware... more
Space-time focusing of phase-stabilized nanojoulelevel 2.5-cycle pulses to peak intensities >3x10[superscript 13] w/cm[superscript 2] at 80 mhz The MIT Faculty has made this article openly available. Please share how this access benefits... more
This paper presents a low-profile textile scorpion patch antenna for wearable applications. The modal behaviors of the proposed antenna are investigated by using the theory of characteristic modes analysis (CMA). Four characteristic modes... more
High-utility itemset mining (HUIM) is an important data mining task with broad applications. In this paper, we propose a novel algorithm named EFIM (EFficient high-utility Itemset Mining), which introduces a number of new ideas to more... more
—Sentiment analysis of online doctor reviews helps patients to better evaluate and select the related doctors based on the previous patients' satisfaction. Although some studies are addressing this problem in the English language, only... more
Time reversal has been recently applied to the problem of fault location in power networks. In this paper we report on three experiments aimed at validating the use of time reversal to locate faults in power networks.
The implementation of optimal power flow (OPF) methods to perform voltage and power flow regulation in electric networks is generally believed to require communication. We consider distribution systems with multiple controllable... more
The process of categorizing students' performance based on input data, encompassing demographic information and final exam results, is recognized as student performance classification. Educational data mining has gained traction in... more
Estimation of lateral inflows using data assimilation in the context of realtime flood forecasting for the Marne catchment in France. Estimation des apports latéraux via assimilation de données pour le bassin versant de la Marne dans un... more
The present study describes the assimilation of discharge in-situ data for operational flood forecasting.
Over the past years the exponential growth of social media usage has given the power to every individual to share their opinions freely. This has led to numerous threats allowing users to exploit their freedom of speech, thus spreading... more