منابع مشابه
Traffic Signal Control Using Fuzzy And Neural Network
This paper presents an adaptive traffic signal method based on fuzzy -neural networks for an isolated four-approaches intersection with through and lest-turning movements. This method has the ability to make adjustments to signal timing in response to observed changes. The “urgency degree” term, which can describe the different user’s demand for green time is used in decisionmaking by which str...
متن کاملWireless Network Traffic Control Using Neural Networksin Wavelet Domain
For traffic prediction forecasting in WIMAX, generally the genetic algorithm were used ,but due to certain limitation of genetic algorithms, problems was created in the traffic prediction .So there is a need to proposed a new approach that is better than Genetic algorithm .this approach need to update the limitation of the Genetics algorithm. There is a need to enhance the prediction capability...
متن کاملUsing Neural Network to Control STATCOM for ImprovingTransient Stability
FACTS technology has considerable applications in power systems, such as; improving the steady stateperformance, damping the power system oscillations, controlling the power flow, and etc. STATCOM is oneof the most important FACTS devices used in the parallel compensation, enhancing transient stability andetc. Since three phase fault is widespread in power systems, in this paper STATCOM is used...
متن کاملscour modeling piles of kambuzia industrial city bridge using hec-ras and artificial neural network
today, scouring is one of the important topics in the river and coastal engineering so that the most destruction in the bridges is occurred due to this phenomenon. whereas the bridges are assumed as the most important connecting structures in the communications roads in the country and their importance is doubled while floodwater, thus exact design and maintenance thereof is very crucial. f...
Control Flow Obfuscation Using Neural Network to Fight Concolic Testing
Concolic testing is widely regarded as the state-of-the-art technique in dynamic discovering and analyzing trigger-based behavior in software programs. It uses symbolic execution and an automatic theorem prover to generate new concrete test cases to maximize code coverage for scenarios like software verification and malware analysis. While malicious developers usually try their best to hide mal...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Applied Information Systems
سال: 2012
ISSN: 2249-0868
DOI: 10.5120/ijais12-450115