Balanced Boolean functions with optimum algebraic degree, optimum algebraic immunity and very high nonlinearity Fulltext Access 8 Pages 2014
Tight upper bound of the rainbow vertex-connection number for 2-connected graphs Fulltext Access 8 Pages 2014
A novel low-ripple interleaved buck-boost converter with high efficiency and low oscillation for fuel-cell applications Fulltext Access 9 Pages 2014
Interval optimization combined with point estimate method for stochastic security-constrained unit commitment Fulltext Access 9 Pages 2014
Uninterruptible smart house equipped with the phase synchronization control system Fulltext Access 9 Pages 2014
A novel validated solution for lightning and surge protection of distribution transformers Fulltext Access 9 Pages 2014
Efficient time domain power quality state estimation using the enhanced numerical differentiation Newton type method Fulltext Access 9 Pages 2014
Calculation of optimal induction heater capacitance based on the smart bacterial foraging algorithm Fulltext Access 9 Pages 2014
Robust two-degree-of-freedom controller for automatic generation control of multi-area system Fulltext Access 9 Pages 2014
Reliability optimization of an electric power system by biomass fuelled gas engine Fulltext Access 9 Pages 2014
Optimal placement and schedule of multiple grid connected hybrid energy systems Fulltext Access 9 Pages 2014
Learning bounds via sample width for classifiers on finite metric spaces Fulltext Access 9 Pages 2014
Parameterized and approximation algorithms for finding two disjoint matchings Fulltext Access 9 Pages 2014
Efficient algorithms for network localization using cores of underlying graphs Fulltext Access 9 Pages 2014
A method for automatic detection and manual localization of content-based translation errors and shifts Fulltext Access 9 Pages 2014
A combined likelihood ratio/information ratio bootstrap technique for estimating the number of components in finite mixtures Fulltext Access 9 Pages 2014
Non-contextual chocolate balls versus value indefinite quantum cryptography Fulltext Access 9 Pages 2014
Computing efficient exact designs of experiments using integer quadratic programming Fulltext Access 9 Pages 2014
Nonparametric estimation of the mixing distribution in logistic regression mixed models with random intercepts and slopes Fulltext Access 9 Pages 2014
Experimental investigation of impact of remnant flux on the ferroresonance initiation Fulltext Access 9 Pages 2014
Analysis of optimal power flow problem based on two stage initialization algorithm Fulltext Access 9 Pages 2014
Tighter relaxation method for unit commitment based on second-order cone programming and valid inequalities Fulltext Access 9 Pages 2014
A load flow method for weakly meshed distribution networks using powers as flow variables Fulltext Access 9 Pages 2014
An optimized nearest prototype classifier for power plant fault diagnosis using hybrid particle swarm optimization algorithm Fulltext Access 9 Pages 2014
Statistical assertion: A more powerful method for debugging scientific applications Fulltext Access 9 Pages 2014
An optimized mean variance estimation method for uncertainty quantification of wind power forecasts Fulltext Access 9 Pages 2014
Multi-objective evolutionary algorithms for the design of grid-connected solar tracking systems Fulltext Access 9 Pages 2014
Dynamic monopolies in directed graphs: The spread of unilateral influence in social networks Fulltext Access 9 Pages 2014
Tight and simple Web graph compression for forward and reverse neighbor queries Fulltext Access 9 Pages 2014
Lower hedging of American contingent claims with minimal surplus risk in finite-state financial markets by mixed-integer linear programming Fulltext Access 9 Pages 2014
Nonparametric tests for panel count data with unequal observation processes Fulltext Access 9 Pages 2014
On the definition of a computational fluid dynamic solver using cellular discrete-event simulation Fulltext Access 9 Pages 2014
Reference voltage optimizer for maximum power point tracking in triphase grid-connected photovoltaic systems Fulltext Access 9 Pages 2014
Security weaknesses of a signature scheme and authenticated key agreement protocols Fulltext Access 9 Pages 2014
Authenticated broadcast with a partially compromised public-key infrastructure Fulltext Access 9 Pages 2014
A text based indexing system for mammographic image retrieval and classification Fulltext Access 9 Pages 2014
Exploiting mean field analysis to model performances of big data architectures Fulltext Access 9 Pages 2014
Secure and energy-efficient data aggregation with malicious aggregator identification in wireless sensor networks Fulltext Access 9 Pages 2014
A Decision Making Method for the Quality Identification of Wines Based on Fuzzy Soft Sets Fulltext Access 9 Pages 2014
Guided curation of semistructured data in collaboratively-built knowledge bases Fulltext Access 9 Pages 2014
Support vector machine classification for large datasets using decision tree and Fisher linear discriminant Fulltext Access 9 Pages 2014
Zebra mussels’ behaviour detection, extraction and classification using wavelets and kernel methods Fulltext Access 9 Pages 2014
A game-theoretic approach to the financial benefits of infrastructure-as-a-service Fulltext Access 9 Pages 2014