نتایج جستجو برای: systems network analysis

تعداد نتایج: 4184350  

Although significant private investment is absorbed in different sectors of power systems, transmission sector is still suffering from appropriate private investment. This is because of the pricing policies of transmission services, tariffs, and especially for investment risks. Investment risks are due to the uncertain behaviour of power systems that discourage investors to invest in the transm...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شهید باهنر کرمان - دانشکده ریاضی و کامپیوتر 1389

چکیده در این پایاننامه ابتدا فضاهای متریک فازی را به صورت مشاهدهگرایانه بررسی میکنیم. فضاهای متریک فازی و توپولوژی تولید شده توسط این متریک معرفی شدهاند. سپس بر اساس فضاهایی که در فصل اول معرفی شدهاند آشوب توپولوژیکی، مینیمالیتی و مجموعههای متقاطع در شیوههای مختلف بررسی شده- اند. در فصل سوم مفهوم مجموعههای جاذب فازی به عنوان یک مفهوم پایهای در سیستمهای نیم-دینامیکی نسبی، تعریف شده است. ...

2009
Tanya Y. Berger-Wolf Teresa M. Przytycka Mona Singh Donna K. Slonim

Biological network analysis has become a central component of computational and systems biology. Because
 such
 analysis
 provides
 a
 unifying
 language
 to
 describe
 relations
within
 complex
 systems,
 it
 has
 played
 an
 increasingly
 important
 role
 in
 understanding
 physiological
 function.
 
 Significant
 efforts
 have
 focused
 on
 analyzing
 and
 inferring
 the
 topology
and
struct...

2013
Marco Villani Stefano Benedettini Andrea Roli David Lane Irene Poli Roberto Serra

The identification of emergent structures in dynamical systems is a major challenge in complex systems science. In particular, the formation of intermediate-level dynamical structures is of particular interest for what concerns biological as well as artificial network models. In this work, we present a new technique aimed at identifying clusters of nodes in a network that behave in a coherent a...

Journal: :MIS Quarterly 2013
Paul Benjamin Lowry Gregory Moody James Eric Gaskin Dennis F. Galletta Sean L. Humpherys Jordan B. Barlow David W. Wilson

1 Information systems journal rankings and ratings help scholars focus their publishing efforts and are widely used surrogates for judging the quality of research. Over the years, numerous approaches have been used to rank IS journals, approaches such as citation metrics, school lists, acceptance rates, and expert assessments. However, the results of these approaches often conflict due to a hos...

State estimation is used in power systems to estimate grid variables based on meter measurements. Unfortunately, power grids are vulnerable to cyber-attacks. Reducing cyber-attacks against state estimation is necessary to ensure power system safe and reliable operation. False data injection (FDI) is a type of cyber-attack that tampers with measurements. This paper proposes network reconfigurati...

Journal: :مهندسی صنایع 0
محمدجعفر تارخ دانشیار دانشکده صنایع - دانشگاه خواجه نصیرالدین توسی مهسا اسمعیلی گوکه دانشجوی کارشناسی ارشد it- دانشکده صنایع دانشگاه خواجه نصیرالدین توسی شهره ترابی دانشجوی کارشناسی ارشد مهندسی صنایع – دانشگاه پیام نور تهران

the environmental rules of reverse logistic networks have caused important economic growth in the past decades. to integrate forward logistic networks with reverse logistics networks a helpful method is to design both networks simultaneously. considering more retrieval choices in modeling reverse logistic systems can be very critical. this article contains a mixed integer linear programming mod...

Journal: :international journal of electrical and electronics engineering 0
mohammad javad emadi amirkabir university of technology behzad abdolmaleki information systems and security laboratory (issl), sharif university of technology, tehran, iran karim baghery information systems and security laboratory (issl), sharif university of technology, tehran, iran

as a response to a growing interest in rfid systems such as internet of things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. hence, authentication protocols to increase security and privacy in rfid applications have gained much attention in the literature. in this study, security and privac...

Journal: :journal of ai and data mining 2013
mohammad ahmadi livani mahdi abadi meysam alikhany meisam yadollahzadeh tabari

detecting anomalies is an important challenge for intrusion detection and fault diagnosis in wireless sensor networks (wsns). to address the problem of outlier detection in wireless sensor networks, in this paper we present a pca-based centralized approach and a dpca-based distributed energy-efficient approach for detecting outliers in sensed data in a wsn. the outliers in sensed data can be ca...

2013
Fredrik Bengtsson Jenny Eriksson Lundström

In the IS-literature, graphical representations often accompany ActorNetwork Theory (ANT) analyses of IS-initiatives, serving as tools for improving visibility of the case and interest and power of actors. Building on a comprehensive literature survey, we identify a gap in existing visualisation approaches, as these mainly focus on offering visual support of the case. We present a visualisation...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید