نتایج جستجو برای: solgel auto

تعداد نتایج: 27612  

2005
Srinivasan Krishnamurthy Mansi Ramakrishnan Thoppian Srikant Kuppa Subbarayan Venkatesan Ramaswamy Chandrasekaran Neeraj Mittal Ravi Prakash

Cognitive radios CR have the ability to dynamically adapt to local spectrum availability. In a network comprised of CR-enabled devices, layerauto-configuration involves determining a common set of channels also referred to as the global channel set to facilitate communication among participating nodes. This is a unique challenge as nodes in the CR network are unaware of (a) their neighbors and ...

2004
Duncan C. McFarlane

1 Networked RFID in Industrial Control: Current and Future This paper introduces the notion of networked Radio Frequency Technology (RFID) and reviews the work of the Auto ID Center in providing a low cost, global networked RFID solution. The paper then examines the role of networked RFID in changing the nature of industrial control systems operations. In particular the notions of connectedness...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه یزد - دانشکده مهندسی برق و کامپیوتر 1393

در این پایان ‏نامه الگوریتم‏ های مختلفی برای پیش‏بینی توان تولیدی سامانه‏ های فتوولتائیک، برای بازه زمانی 10 دقیقه آینده، با استفاده از سری زمانی از داده‏ های مربوط به تولید توان این سامانه‏ ها پیشنهاد شده و مورد ارزیابی قرار می‏گیرند. نتایج نشان می‏دهد که عملکرد الگوریتم‏ها برای روز‏های آفتابی و ابری یکسان نیست. با این حال در میان این الگوریتم‏ها، نتایج شبیه‏سازی نشان می‏دهد که مدل ( auto-regr...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه بیرجند - دانشکده علوم 1391

in this thesis, we consider a mathematical model of cancer with completely unknown parameters. we study the stability of critical points which are biologically admissible. then we consider a control on the system and introduce situations at which solutions are attracted to critical points and so the cancer disease has auto healing. the lyapunov stability method is used for estimating the un...

2010
Matthias Lampe

Radio Frequency Identification (RFID) systems have begun to find greater use in the consumer object identification market, in industrial automation, and in mobile asset and supply chain management, in a wide range of industries such as retail, pharmaceutical, and defense. The term automatic identification (Auto-ID) applications is used to generalize RFID applications and includes other Auto-ID ...

2015
David C. Bardos Gurutzeta Guillera-Arroita Brendan A. Wintle

Spatially autocorrelated species abundance or distribution datasets typically generate spatially autocorrelated residuals in generalized linear models; a broader modelling framework is therefore required. Auto-logistic and related auto-models, implemented approximately as autocovariate regression, provide simple and direct modelling of spatial dependence. The autologistic model has been widely ...

Majid Khedmati, Seyed Taghi Akhavan Niaki

Assuming a first-order auto-regressive model for the auto-correlation structure between observations, in this paper, a transformation method is first employed to eliminate the effect of auto-correlation. Then, a maximum likelihood estimator (MLE) of a step change in the parameters of the transformed model is derived and three separate EWMA control charts are used to monitor the parameters of th...

2010
Christoph W. Kessler Welf Löwe David Padua Markus Püschel Mehmet Aksit

From May 9 to 12, 2010, the Dagstuhl Seminar 10191 Program Composition and Optimization: Autotuning, Scheduling, Metaprogramming and Beyond was held in Schloss Dagstuhl Leibniz Center for Informatics. During the seminar, several participants presented their current research, and ongoing work and open problems were discussed. Abstracts of the presentations given during the seminar as well as abs...

2005
Shenglan Hu Chris J. Mitchell

Existing techniques for IP address autoconfiguration in mobile ad hoc networks (MANETs) do not address security issues. In this paper, we first describe some of the existing IP address autoconfiguration schemes, and discuss their security shortcomings. We then provide solutions to these security issues based on the use of trust models. A specific trust model is also proposed for use in improvin...

1997
Sukumar Ghosh Sriram V. Pemmaraju

This paper demonstrates the feasibility of constructing fault-containing, self-stabilizing protocols that allow the user to ne-tune the performance of the protocols, via the choice of values for certain program parameters. Based on the fault-history of the protocol, the user can choose appropriate values for program parameters and select desirable performance guarantees from various classes of ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید