The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Over the last decade, wind power penetration has increased substantially because of environmental considerations. With the integration of so much wind power generating capacity, system operators are facing the challenge of maintaining the stability of the power system. Use of the complex wind turbine (WT) model to analyze the steady-state operation and dynamic stability of the power system with high...
With the quickly changed trends of fashion and the shortened clothing product cycle, clothing enterprises often face the situation of urgent delivery period and heavy task. In order to meet the delivery period and business efficiency, enterprises must arrange for clothing production reasonably. Based on the actual constraints of clothing production, the paper set up the minimum number and the balance...
Human opportunistic networks can facilitate wireless content dissemination while humans are on the move. In such a network, content is disseminated via nodes relaying and nodes mobility (human mobility). Thus it is essential to understand and model the real human mobility. We present a heterogeneous community-based random way-point (HC-RWP) mobility model that captures the four important properties...
With the increasing development of information technology, the computer crime problem is getting even serious. However traditional computer forensic that employs the static investigation after security events has inherent limitations. The authenticity, effectiveness and timeliness of the evidence are difficult to meet real needs. In order to solve the existing problems which static forensics technology...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.