The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper focuses on the identification problem of multiple input single output finite impulse response (MISO-FIR) systems with unknown time delays. Using the matrix decomposition, a modified threshold orthogonal matching pursuit (TH-OMP) algorithm is proposed for identifying the parameters and time delays of the MISO-FIR systems from finite sampled data. The modified version of the TH-OMP algorithm...
Power system maintenance planning is vital for conducting maintenance of power system equipment in an optimal manner. A maintenance model of a system with number of equipment has several states. Solving such a system model would be computationally intractable. This paper investigates the possibility of conducting system level maintenance planning by using a component specific Markov decision process...
Graph clustering involves the task of dividing nodes into clusters, so that the edge density is higher within clusters as opposed to across clusters. A natural, classic, and popular statistical setting for evaluating solutions to this problem is the stochastic block model, also referred to as the planted partition model. In this paper, we present a new algorithm—a convexified version of maximum likelihood—for...
The hierarchy model of computer network security assessment was constructed in the light of the characteristics of computer network and the factors influencing the network security. The fuzzy analytic hierarchy process based on triangular fuzzy numbers was applied to assess the network security quantitatively. Final results of the example indicate that the fuzzy analytic hierarchy process is an exploratory...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.