fuzzy load flow
Fuzzy logic is used to solve the load flow problem, so decreasing computing time. Consequently, the repetitive solution of the proposed fuzzy load flow (FLF) method requires only 2 m calculations per iteration, where m is the number of buses of the system. Fuzzy load flow -new algorithms incorporating uncertain generation and load representationfree download […]
load flow algorithm
Load flow analysis is the most important and essential approach to investigating problems in power system operating and planning. Based on a specified generating state and transmission network structure, load flow analysis solves the steady operation state with node voltages and branch power flow in the power system Backward/forward sweep load flow algorithm for radial […]
evaluation of mobile ip
Evaluation of Mobile IP fast authentication protocol compared to hierarchical mobile IP. Abstract: Handoff latency affects the service quality of real-time applications. Mobile IP presents the standard mobility management protocol to support the mobility in IP-based systems. Performance evaluation of AAA/ mobile IP authenticationfree downloadThis document1 studies the performance of the current IETF approach to […]
performance evaluation of mobile
Performance evaluation of mobile software systems: Challenges for a software engineer. Abstract: New Advances in mobile computer technology, along with rapid growth of quality and quantity of wireless networks, introduce new capabilities, applications, and concerns to computer science and industry. Simulation based performance evaluation of mobile , ad hoc network routing protocolsfree downloadIn this paper […]
Performance Evaluation of Mobile IP
Performance evaluation of AAA/ mobile IP authenticationfree downloadThis document1 studies the performance of the current IETF approach to authenticating mobile nodes by means of an integrated Authentication, Authorization and Accounting (AAA) infrastructure. The report first describes the procedures and message formats of the Performance evaluation of TCP over mobile IP free downloadThe aim of this […]
Computer Architecture
computer architecture is a set of rules and methods that describe the functionality, organization, and implementation of computer systems. Some definitions of architecture define it as describing the capabilities and programming model of a computer but not a particular implementation The interactions between the design of a computers instruction set and the design of compilers […]
SDLC-Software Development Life Cycle
SDLC or the Software Development Life Cycle is a process that produces software with the highest quality and lowest cost in the shortest time. SDLC includes a detailed plan for how to develop, alter, maintain, and replace a software system. Popular SDLC models include the waterfall model, spiral model, and Agile model Software development life […]
zenoss core technology
Zenoss Core challenges the systems-monitoring landscape with an open-source enterprise management solution that provides a single, web-based point of access to configure, manage, monitor, and report on our IT assets. We get a “single pane of glass” view of our IT assets including routers, servers, and environment. With Zenoss, the question changes from, “Should I […]
automata turing machine
machine can produce a certain output based on its input. Sometimes it may be required that the same input has to be used to generate the output. So in this machine, the distinction between input and output has been removed. Thus a common set of alphabets can be used for the Turing machine. Turing Machine […]
turing machine
A Turing machine is a mathematical model of computation that defines an abstract machine, which manipulates symbols on a strip of tape according to a table of rules. Despite the model’s simplicity, given any computer algorithm, a Turing machine capable of simulating that algorithm’s logic can be constructed. One-tape, off-line Turing machine computationsfree downloadThis paper […]