Buscar
Mostrando ítems 21-30 de 7176
Energy management and control for islanded microgrid using multi-agents
(2013-12-01)
This paper presents a multi-agent system for realtime operation of simulated microgrid using the Smart-Grid Test Bed at Washington State University. The multi-agent system (MAS) was developed in JADE (Java Agent DEvelopment ...
Mobile application as a tool for urban traffic data collection and generation to advanced traveler information systems using Wi-Fi networks available in urban centers
(2012-08-20)
This paper presents an Advanced Traveler Information System (ATIS) developed on Android platform, which is open source and free. The developed application has as its main objective the free use of a Vehicle-to- Infrastructure ...
Mobile application as a tool for urban traffic data collection and generation to advanced traveler information systems using Wi-Fi networks available in urban centers
(2012-08-20)
This paper presents an Advanced Traveler Information System (ATIS) developed on Android platform, which is open source and free. The developed application has as its main objective the free use of a Vehicle-to- Infrastructure ...
Electrical Power Distribution System modeling with VHDL-AMS for the construction of a Real-Time Digital Simulator using FPGAS devices
(2012-12-01)
This paper presents a distribution feeder simulation using VHDL-AMS, considering the standard IEEE 13 node test feeder admitted as an example. In an electronic spreadsheet all calculations are performed in order to develop ...
A practical approach for biometric authentication based on smartcards
(2010-10-18)
Cryptographic systems are safe. However, the management of cryptographic keys of these systems is a tough task. They are usually protected by the use of password-based authentication mechanisms, which is a weak link on ...
A practical approach for biometric authentication based on smartcards
(2010-10-18)
Cryptographic systems are safe. However, the management of cryptographic keys of these systems is a tough task. They are usually protected by the use of password-based authentication mechanisms, which is a weak link on ...