A new approach for protection of transmission line including TCSC is presented in this paper. The proposed method includes application of Fuzzy Neural Network for distance relaying...
S. R. Samantaray, Pradipta K. Dash, Ganapati Panda...
Recently, actor-critic methods have drawn much interests in the area of reinforcement learning, and several algorithms have been studied along the line of the actor-critic strategy...
Abstract. Survivability should be considered beyond security for networked information systems, which emphasizes the ability of continuing providing services timely in malicious en...
The World Wide Web can be viewed as a gigantic distributed database including millions of interconnected hosts some of which publish information via web servers or peer-to-peer sys...
⎯A new nonslicing floorplan representation, the moving block sequence (MBS), is proposed in this paper. Our idea of the MBS originates from the observation that placing blocks on...
Abstract. In this paper, we propose a novel solution called joint encryption, in which audio and video data are scrambled efficiently by using modified phase scrambling, modified...
Goo-Rak Kwon, Tea-Young Lee, Kyoung-Ho Kim, Jae-Do...
Computational intelligence has figured prominently in many solutions to the network intrusion detection problem since the 1990s. This prominence and popularity has continued in the...
Restrictive blind signatures allow a recipient to receive a blind signature on a message not known to the signer but the choice of message is restricted and must conform to certain...