UPFC control parameter identification for effective power oscillation damping Fulltext Access 8 Pages 2009
A blended E-learning experience in a course of object oriented programming fundamentals Fulltext Access 8 Pages 2009
Ensemble of neural networks with associative memory (ENNA) for estimating software development costs Fulltext Access 8 Pages 2009
An integrated knowledge based system for sheet metal cutting–punching combination processing Fulltext Access 8 Pages 2009
A two-stage planning and control model toward Economically Adapted Power Distribution Systems using analytical hierarchy processes and fuzzy optimization Fulltext Access 8 Pages 2009
Electricity transmission pricing: Tracing based point-of-connection tariff Fulltext Access 8 Pages 2009
The numerical Laplace transform: An accurate technique for analyzing electromagnetic transients on power system devices Fulltext Access 8 Pages 2009
Computation of TCSC reactance and suggesting criterion of its location for ATC improvement Fulltext Access 8 Pages 2009
Automatic generation control of TCPS based hydrothermal system under open market scenario: A fuzzy logic approach Fulltext Access 8 Pages 2009
Probabilistic evaluation of reserve requirements of generating systems with renewable power sources: The Portuguese and Spanish cases Fulltext Access 8 Pages 2009
A grid operation model: Resource demand for an adequate incident management in high-, medium-, and low-voltage grids Fulltext Access 8 Pages 2009
Fault location for underground distribution feeders: An extended impedance-based formulation with capacitive current compensation Fulltext Access 8 Pages 2009
Probabilistic load flow with wind production uncertainty using cumulants and Cornish–Fisher expansion Fulltext Access 8 Pages 2009
A variational approach to path planning for hyper-redundant manipulators Fulltext Access 8 Pages 2009
Marble mosaic tiling automation with a four degrees of freedom Cartesian robot Fulltext Access 8 Pages 2009
Distributed and centralised material handling scheduling: Comparison and results of a simulation study Fulltext Access 8 Pages 2009
Infinity-norm acceleration minimization of robotic redundant manipulators using the LVI-based primal–dual neural network Fulltext Access 8 Pages 2009
Manufacturing methodology for personalised symptom-specific sports insoles Fulltext Access 8 Pages 2009
The scope of artificial neural network metamodels for precision casting process planning Fulltext Access 8 Pages 2009
Application of ant colony, genetic algorithm and data mining-based techniques for scheduling Fulltext Access 8 Pages 2009
A DSS for production planning focused on customer service and technological aspects Fulltext Access 8 Pages 2009
Ontology-based data integration and decision support for product e-Design Fulltext Access 8 Pages 2009
Goal state optimization algorithm considering computational resource constraints and uncertainty in task execution time Fulltext Access 8 Pages 2009
Shared Potential Fields and their place in a multi-robot co-ordination taxonomy Fulltext Access 8 Pages 2009
Cluster synchronization in an array of hybrid coupled neural networks with delay Fulltext Access 8 Pages 2009
A novel neural dynamical approach to convex quadratic program and its efficient applications Fulltext Access 8 Pages 2009
Complex and chaotic dynamics in a discrete-time-delayed Hopfield neural network with ring architecture Fulltext Access 8 Pages 2009
T–S fuzzy model identification based on a novel fuzzy c-regression model clustering algorithm Fulltext Access 8 Pages 2009
Combination of genetic algorithm with Lagrange multipliers for lot-size determination in multi-stage production scheduling problems Fulltext Access 8 Pages 2009
Conformation of EPC Class 1 Generation 2 standards RFID system with mutual authentication and privacy protection Fulltext Access 8 Pages 2009
Application of heuristic and hybrid-GASA algorithms to tool-path optimization problem for minimizing airtime during machining Fulltext Access 8 Pages 2009
Accurate diagnosis of induction machine faults using optimal time–frequency representations Fulltext Access 8 Pages 2009
How to take into account piecewise constraints in constraint satisfaction problems Fulltext Access 8 Pages 2009
ICA, kernel methods and nonnegativity: New paradigms for dynamical component analysis of fMRI data Fulltext Access 8 Pages 2009
A relational approach to probabilistic classification in a transductive setting Fulltext Access 8 Pages 2009
Affine feature extraction: A generalization of the Fukunaga–Koontz transformation Fulltext Access 8 Pages 2009
On efficient multistep non-linear time series prediction in chaotic diode resonator circuits by optimizing the combination of non-linear time series analysis and neural networks Fulltext Access 8 Pages 2009
Automatic semantic indexing of medical images using a web ontology language for case-based image retrieval Fulltext Access 8 Pages 2009
Using explanations for determining carcinogenecity in chemical compounds Fulltext Access 8 Pages 2009
Design of fractional-order PIλDμ controllers with an improved differential evolution Fulltext Access 8 Pages 2009
Application of support vector machines in scour prediction on grade-control structures Fulltext Access 8 Pages 2009
A novel secret image sharing scheme for true-color images with size constraint Fulltext Access 8 Pages 2009
Application of wavelets and Prony method for disturbance detection in fixed speed wind farms Fulltext Access 8 Pages 2009
Some single-machine and m-machine flowshop scheduling problems with learning considerations Fulltext Access 8 Pages 2009
Associated evolution of a support vector machine-based classifier for pedestrian detection Fulltext Access 8 Pages 2009
A Lookup Table Decoding of systematic (47, 24, 11) quadratic residue code Fulltext Access 8 Pages 2009
A bi-level programming for logistics network design with system-optimized flows Fulltext Access 8 Pages 2009
Extracting complex linguistic data summaries from personnel database via simple linguistic aggregations Fulltext Access 8 Pages 2009
On the conflict between inducing confusion and attaining payoff in adversarial decision making Fulltext Access 8 Pages 2009
Analysis of the efficiency of the Chor–Rivest cryptosystem implementation in a safe-parameter range Fulltext Access 8 Pages 2009
A non-interactive deniable authentication scheme based on designated verifier proofs Fulltext Access 8 Pages 2009
A fuzzy analysis of country-size argument for the Feldstein–Horioka puzzle Fulltext Access 8 Pages 2009
A novel user identification scheme with key distribution preserving user anonymity for distributed computer networks Fulltext Access 8 Pages 2009
Getting insights from the voices of customers: Conversation mining at a contact center Fulltext Access 8 Pages 2009
The equivalence of convergences of sequences of fuzzy numbers and its applications to the characterization of compact sets Fulltext Access 8 Pages 2009