Browsing by Title
Now showing items 1292-1311 of 49336
-
A robust Gaussian process regression-based model for the determination of static Young's modulus for sandstone rocks
( Springer Science and Business Media Deutschland GmbH , 2023 , Article)Static Young's modulus (Es) is one of the leading mechanical rock properties. The Es can be measured from experimental lab methods. However, these methods are costly, time-consuming, and challenging to collect samples. ... -
A robust high-resolution time-frequency representation based on the local optimization of the short-time fractional Fourier transform
( Elsevier Inc. , 2017 , Article)The Locally Optimized Spectrogram (LOS) defines a novel method for obtaining a high-resolution time-frequency (t,f) representation based on the short-time fractional Fourier transform (STFrFT). The key novelty of the LOS ... -
A robust method for line and word segmentation in handwritten text
( Hamad bin Khalifa University Press (HBKU Press) , 2013 , Conference Paper)Line and word segmentation is a key-step in any document image analysis system. It can be used for instance in handwriting recognition when separating words before their recognition. Line segmentation can also serve as a ... -
A Robust MPC for Input-Output LPV Models
( Institute of Electrical and Electronics Engineers Inc. , 2016 , Article)In this note, a discrete-time robust model predictive control (MPC) design approach is proposed to control systems described by linear parameter-varying models in input-output form subject to constraints. To ensure the ... -
A robust resource allocation scheme for device-to-device communications based on Q-Learning
( Tech Science Press , 2020 , Article)One of the most effective technology for the 5G mobile communications is Device-to-device (D2D) communication which is also called terminal pass-through technology. It can directly communicate between devices under the ... -
A scalable solution for finding overlaps between sequences using map-reduce
( The International Society for Computers and Their Applications (ISCA) , 2016 , Conference Paper)The overlap stage of a string graph-based assembler is considered one of the most time- and space-consuming stages in any de novo overlap-based assembler. This is due to the huge output of the next-generation sequencing ... -
A Scene-to-Speech Mobile based Application: Multiple Trained Models Approach
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)The concept of Scene-to-Speech (STS) is to recognize elements in a captured image or a video clip to speak loudly an informative textual content that describes the scene. The contemporary progression in convolution neural ... -
A Scheme for Delay-Sensitive Spatiotemporal Routing in SDN-Enabled Underwater Acoustic Sensor Networks
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)In underwater acoustic sensor networks (UASNs), the sensors are deployed at different areas of the ocean, which perform information collection and delay-sensitive routing to the data center for further processing or ... -
A Scheme for Three-way Secure and Verifiable E-Voting
( IEEE Computer Society , 2019 , Conference Paper)Online voting systems are gaining acceptance with the widespread use of secure web services and cloud computing such as electronic currency and online banking. However, they still face privacy, security and accountability ... -
A scrutiny of antibacterial activity of pure and iodine doped ZnO thin films synthesized by mSILAR method
( American Institute of Physics Inc. , 2019 , Conference Paper)Iodine doped zinc oxide (I-ZnO) thin films were synthesized by microwave assisted successive ionic layer adsorption (mSILAR) method. The structural characteristics of pure ZnO and I-ZnO thin films were carried out by powder ... -
A secondary voltage regulation approach for Hydro-Québec in transmission level
( Elsevier , 2015 , Article)This paper presents a secondary voltage control that applies discrete controllers to regulate the voltage in the Hydro-Québec power network. Firstly, an artificial intelligence methodology is presented for partitioning the ... -
A Secrecy Study of UAV Based Networks with Fountain Codes and FD Jamming
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)Securing wireless communication using different techniques has been an interesting topic for research, especially with the increasing demand on fast and secure transmission. In this research, we conduct a performance ... -
A Secret-key-aided scheme to secure transmissions from single-antenna RF-eh source nodes
( Institute of Electrical and Electronics Engineers Inc. , 2018 , Article)We propose a two-phase artificial-noise-aided scheme to power a single-antenna energy-harvesting source node (Alice) and secure her transmissions to a multiple-antenna legitimate destination (Bob) in the presence of a ... -
A secure and efficient renewable energy trading scheme based on blockchain in smart grid
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)Nowadays, with the diversification and decentralization of energy systems, the energy Internet makes it possible to interconnect distributed energy sources and consumers. In the energy trading market, the traditional ... -
A secure client-side framework for protecting the privacy of health data stored on the cloud
( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)In the past decade, Cloud-Computing emerged as a new computing concept with a distributed nature using virtual network and systems. Many businesses rely on this technology to keep their systems running but concerns are ... -
A secure cloud system for maintaining COVID-19 patient's data using image steganography
( Hamad bin Khalifa University Press (HBKU Press) , 2021 , Article)The COVID-19 pandemic has been life-threatening for many people and as such, a contactless medical system is necessary to prevent the spread of the virus. Smart healthcare systems collect data from patients at one end and ... -
A Secure, Lightweight, and Privacy-Preserving Authentication Scheme for V2G Connections in Smart Grid
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)Vehicle to Grid (V2G) is a crucial technology that enables the bidirectional flow of communication between electric vehicles (EVs) and the smart grid (SG). Undoubtedly security and privacy are inherent requirements of these ... -
A Secured Proxy-Based Data Sharing Module in IoT Environments Using Blockchain
( NLM (Medline) , 2019 , Article)Access and utilization of data are central to the cloud computing paradigm. With the advent of the Internet of Things (IoT), the tendency of data sharing on the cloud has seen enormous growth. With data sharing comes ... -
A Self-Balanced Bidirectional Medium-/High-Voltage Hybrid Modular DC-DC Converter with Low-Voltage Common DC-Link and Sequential Charging/Discharging of Submodules Capacitors
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)This paper proposes a medium-/high-voltage high-power hybrid modular DC-DC converter to interconnect two different dc-voltage levels in medium-/high-voltage dc grids. The converter consists of half-bridge submodules (SMs) ... -
A self-selective correlation ship tracking method for smart ocean systems
( MDPI AG , 2019 , Article)In recent years, with the development of the marine industry, the ship navigation environment has become more complicated. Some artificial intelligence technologies, such as computer vision, can recognize, track and count ...