117 results on '"Zhao Hui Huang"'
Search Results
2. A Research of Short-Term Wind Power Prediction Based on Support Vector Regression
3. Droop Control Strategy of Microgrid Parallel Inverter Under Island Operation
4. Security Analysis and Protection for Charging Protocol of Smart Charging Pile
5. The Power Distribution Control Strategy of Fully Active Hybrid Energy Storage System Based on Sliding Mode Control
6. Resource Allocation Mechanism in Electric Vehicle Charging Scenario for Ubiquitous Power-IoT Coverage Enhancement
7. Computation Resource Allocation Based on Particle Swarm Optimization for LEO Satellite Networks
8. Secure Communication with Two-Stage Beamforming for Wireless Energy and Jamming Signal Based on Power Beacon
9. Network Slice Access Selection Scheme for 5G Network Power Terminal Based on Grey Analytic Hierarchy Process
10. VNF Placement and Routing Algorithm for Energy Saving and QoS Guarantee
11. VNF Deployment Method Based on Multipath Transmission
12. Research on IoT Architecture and Application Scheme for Smart Grid
13. Design and Implementation of Wi-Fi-Trusted Authentication System Based on Blockchain
14. Equipment Fault Prediction Method in Power Communication Network Based on Equipment Frequency Domain Characteristics
15. Efficient Fault Location Algorithm Based on D-Segmentation for Data Network Supporting Quantum Communication
16. Service Chain Orchestration Based on Deep Reinforcement Learning in Intent-Based IoT
17. Deep Web Selection Based on Entity Association
18. Research on Automated Penetration Testing Framework for Power Web System Integrating Property Information and Expert Experience
19. Design of a Real-Time Transmission System for TV- and Radar-Integrated Videos
20. Priority-Based Optimal Resource Reservation Mechanism in Wireless Sensor Networks for Smart Grid
21. Fault Diagnosis Algorithm for Power Bottom-Guaranteed Communication Network Based on Random Forest
22. Energy-Efficient Clustering and Multi-hop Routing Algorithm Based on GMM for Power IoT Network
23. Bayesian-Based Efficient Fault Location Algorithm for Power Bottom-Guaranteed Communication Networks
24. An Outlier Detection Algorithm for Electric Power Data Based on DBSCAN and LOF
25. Resource Allocation Algorithm for Power Bottom-Guaranteed Communication Network Based on Network Characteristics and Historical Data
26. A Data Clustering Method for Communication Network Based on Affinity Propagation
27. Optimal Distribution in Wireless Mesh Network with Enhanced Connectivity and Coverage
28. A Traffic Anomaly Detection Method Based on Gravity Theory and LOF
29. Power Anomaly Data Detection Algorithm Based on User Tag and Random Forest
30. Construction of Management and Control Platform for Bus Parking and Maintenance Field Under Hybrid Cloud Computing Mode
31. Fault Diagnosis and CAN Bus/Ethernet Redundancy Design of a Monitoring and Control System
32. Real-Time Pricing Method Based on Lyapunov for Stochastic and Electric Power Demand in Smart Grid
33. Service Recovery Algorithm for Power Communication Network Based on SDN Multi-mode Channel
34. Terminal Communication Network Fault Diagnosis Algorithm Based on TOPSIS Algorithm
35. A Multi-channel Aggregation Selection Mechanism Based on TOPSIS in Electric Power Communication Network
36. Multi-controller Cooperation High-Efficiency Device Fault Diagnosis Algorithm for Power Communication Network in SDN Environment
37. Data Collection of Power Internet of Things Sensing Layer Based on Path Optimization Strategy
38. STFRC: A Multimedia Stream Congestion Control Algorithm Based on TFRC
39. ZigBee-Based Architecture Design of Imperceptible Smart Home System
40. A Non-intrusive Appliances Load Monitoring Method Based on Hourly Smart Meter Data
41. Design and Implementation of VxWorks System Vulnerability Mining Framework Based on Dynamic Symbol Execution
42. Design and Evaluation of Traffic Congestion Index for Yancheng City
43. Research and Implementation of Hybrid Encryption System Based on SM2 and SM4 Algorithm
44. Homological Fault Attack on AES Block Cipher and Its Countermeasures
45. A Counterfactual Quantum Key Distribution Protocol Based on the Idea of Wheeler’s Delayed-Choice Experiment
46. A Survey on Anomaly Detection Techniques in Large-Scale KPI Data
47. Researching on AES Algorithm Based on Software Reverse Engineering
48. A Text Information Hiding Method Based on Sentiment Word Substitution
49. Research on Information Hiding Based on Intelligent Creation of Tang Poem
50. Metadata Management Algorithm Based on Improved LSM Tree
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.