Open Access

Big Data Analysis and Simulation of Distributed Marine Green Energy Resources Grid-Connected System


Cite

1. M. Ceci, D. Malerba, 2007. Classifying Web documents in a hierarchy of categories:a comprehensive study. Journal of Intelligent Information System, 28(1): 37-78.10.1007/s10844-006-0003-2Search in Google Scholar

2. H. X. Wang, S. Y. Wang, X. Wang, et al. 2014. Analysis of LFM signals and improvement of IFM system. Acta Armamentarii, 35(8): 1193-1199.Search in Google Scholar

3. M. A. Govoni, H. Li, J. A. Kosinski, 2013. Range-Doppler resolution of the linear-FM noise radar waveform. IEEE Transactions on Aerospace and Electronic Systems, 49(1): 658-664.10.1109/TAES.2013.6404130Open DOISearch in Google Scholar

4. J. H. Lu, X. Han, J. X. Li, 2016. Consensus-based distributed fusion estimator with communication bandwidth constraints. Control and Decision, 31(12): 2155-2162.Search in Google Scholar

5. M. Huang, L. T. Wang, H. C. Zhang, 2016. Face Recognition Based on Gabor Wavelet Transform and K-L Gaussian Riemannian Manifold Discriminant. Computer Engineering, 42(9): 208-213.Search in Google Scholar

6. H. Hao, 2013. Multi component LFM signal detection and parameter estimation based on EEMD-FRFT. Optik- International Journal for Light and Electron Optics, 124(23): 6093-6096.10.1016/j.ijleo.2013.04.104Search in Google Scholar

7. M. A. Govoni, H. Li, J. A. Kosinski, 2013. Range-Doppler resolution of the linear-FM noise radar waveform. IEEE Transactions on Aerospace and Electronic Systems, 49(1):658-664.10.1109/TAES.2013.6404130Open DOISearch in Google Scholar

8. Y. Y. Fu, M. Zhang, D. G., Feng et al. 2014. Attribute privacy preservation in social networks based on node anatomy. Journal of Software, 25(4): 768-780.Search in Google Scholar

9. D. G. Feng, M. Zhang, H. Li, 2014. Big data security and privacy protection. Chinese Journal of Computers, 37(1): 246-258. Search in Google Scholar

10. J. Song, G. Y. Xu, R. P. Yao, 2016. Anonymized data privacy protection method based on differential privacy. Journal of Computer Applications, 36(10): 2753-2757.Search in Google Scholar

11. C. Hazay, K. Nissim, 2012. Efficient set operations in the presence of malicious adversaries. Journal of Cryptology, 25(3):383-433. 10.1007/s00145-011-9098-xOpen DOISearch in Google Scholar

12. Y. Pan, Y. Tang, H. Liu, 2012. Access control in very loosely structured data model using relational databases. Acta Electronica Sinica, 240(3): 600-606.Search in Google Scholar

13. A. Rahman, H. Muhammah, L. Sungyoung, et al. 2015. Rough set-based approaches for discretization: a compact reviews. Artificial Intelligence Review, 44(2): 235-263.10.1007/s10462-014-9426-2Search in Google Scholar

14. Y. H. Qian, H. Zhang, Y. Sang, et al. 2014. Multigranulation decision-theoretic rough sets. International Journal of Approximate Reasoning, 55(1): 225-237.10.1016/j.ijar.2013.03.004Search in Google Scholar

15. F. Xu, J. J. Ma, 2015. Improvement of Threshold RSA Signature Scheme Based on Chinese Remainder Theorem. JEIT, 37(10): 2495-2500.Search in Google Scholar

16. P. Curt, R. J. Thomas, S. Deming, 2012. A high-fidelity harmonic drive model. ASME J of Dynamic Systems, Measurement, and Control, 134(1): 457-461. 10.1115/1.4005041Search in Google Scholar

17. S. Ali, R. Ali, A. Iftikhar, 2017. Physico-chemical and microbiological assessment of some freshwater aquifers and associated diseases in district ghizer, gilgit-baltistan, Pakistan. Acta Scientifica Malaysia, 1(1): 08-12.10.26480/asm.01.2017.08.12Search in Google Scholar

18. Y. Pan, C. A. Yuan, W. J. Li, M. H. Cheng, 2016. Access Control Method for Supporting Update Operations in Dataspace. JEIT, 38(8): 1935-1941.Search in Google Scholar

19. M. J. Guo, Y. Huang, Z. Xie, 2013. A WebGIS Model Optimization Strategy under Multi-core Environment. Computer Engineering, 39(8): 15-19.Search in Google Scholar

20. Y. Huang, J. Paisley, Q. Lin, et al. 2014. Bayesian nonparametric dictionary learning for compressed sensing MRI. IEEE Transactions on Image Processing, 23(12): 5007-5019.10.1109/TIP.2014.236012225265609Search in Google Scholar

21. L. Shen, G. Sun, Q. Huang, et al. 2015. Multi-level discriminative dictionary learning with application to large scale image classification. IEEE Transactions on Image Processing, 24(10): 3109-3123.10.1109/TIP.2015.243854826080049Search in Google Scholar

22. L. Shen, G. Sun, Q. Huang, et al. 2015. Multi-level discriminative dictionary learning with application to large scale image classification. IEEE Transactions on Image Processing, 24(10): 3109-3123.10.1109/TIP.2015.2438548Search in Google Scholar

23. J. J. Thiagarajan, K. N. Ramamurthy, A. Spanias, 2015. Learning stable multilevel dictionaries for space representations. IEEE Transactions on Neural Networks & Learning Systems, 26(9): 1913-1926.10.1109/TNNLS.2014.236105225343771Search in Google Scholar

24. J. Z. Jiang, F. Zhou, 2013. Iterative design of two-dimensional critically sampled MDFT modulated filter banks. Signal Processing, 93(11): 3124-3132.10.1016/j.sigpro.2013.03.022Search in Google Scholar

25. N. Rajapakaha, A. Madanayake, Lt. 2014. Bruton, 2D spacetime wave-digital multi-fan filter banks for sig[10]Gao, W. and W. Wang, The fifth geometric-arithmetic index of bridge graph and carbon nanocones. Journal of Difference Equations and Applications, 2017. 23(1-2SI): p. 100-109.Search in Google Scholar

26. Gao, W., et al., Distance learning techniques for ontology similarity measuring and ontology mapping. Cluster Computing-The Journal of Networks Software Tools and Applications, 2017. 20(2SI): p. 959-968.nals consisting of multiple plane waves. Multidimensional Systems and Signal Processing, 25(1): 17-39.10.1007/s10586-017-0887-3Search in Google Scholar

27. H. Mahboubi, K. Moezzi, A. G. Aghdam, et al. 2014. Distributed deployment algorithms for improved coverage in a network of wireless mobile sensors. IEEE Transactions on Industrial Informatics, 10(1): 163-174.10.1109/TII.2013.2280095Open DOISearch in Google Scholar

28. N.S.A. Sukor, N. Jarani, S.F.M. Fisal, 2017. Analysis of Passengers’ Access and Egress Characteristics to The Train Station. Engineering Heritage Journal, 1(2): 01-04.10.26480/gwk.02.2017.01.04Search in Google Scholar

29. S.C.A. Mana, M.M. Hanafiah, A.J.K. Chowdhury, 2017. Environmental characteristics of clay and clay-based minerals. Geology, Ecology, and Landscapes, 1(3): 155-161.10.1080/24749508.2017.1361128Search in Google Scholar

30. M. Bahmani, A. Noorzad, J. Hamedi, F. Sali, 2017. The role of bacillus pasteurii on the change of parameters of sands according to temperatur compresion and wind erosion resistance. Journal CleanWAS, 1(2): 1-5.10.26480/jcleanwas.02.2017.01.05Search in Google Scholar

31. N.A. Rahman, Z. Tarmudi, M. Rossdy, F.A. Muhiddin, 2017. Flood Mitigation Measres Using Intuitionistic Fuzzy Dematel Method. Malaysian Journal Geosciences, 1(2):01-05. 10.26480/mjg.02.2017.01.05Search in Google Scholar

32. R. Roslee, N. Simon, 2017. Rock Slopes Kinametic Analysis Along the Bundu Tuhan To Kundasang Highway, Sabah, Malaysia. Geological Behavior, 1(2):01-04.10.26480/gbr.02.2017.01.04Search in Google Scholar

eISSN:
2083-7429
Language:
English
Publication timeframe:
4 times per year
Journal Subjects:
Engineering, Introductions and Overviews, other, Geosciences, Atmospheric Science and Climatology, Life Sciences