Search
Now showing items 11-20 of 76
Mitigating error propagation in two-way relay channels with network coding
(
IEEE
, 2010 , Article)
In relay networks, error propagation at the relay nodes degrades the performance of the system. To combat that effect, it has been suggested to implement a reliability threshold at the relay to control error propagation. ...
Evaluation of a multilevel cascaded-type dynamic voltage restorer employing discontinuous space vector modulation
(
IEEE Industrial Electronics Society
, 2010 , Article)
In this paper, the application of a cascaded multilevel inverter as a dynamic voltage restorer (DVR) is investigated. Two discontinuous multilevel space vector modulation (SVM) techniques are implemented for DVR control ...
A performance comparison of MD5 authenticated routing traffic with EIGRP, RIPv2, and OSPF
(
Zarqa University
, 2010 , Article)
Routing is the process of forwarding data across an inter-network from a designated source to a final destination. Along the way from source to destination, at least one intermediate node is considered. Due to the major ...
Hybrid fault detection and isolation strategy for non-linear systems in the presence of large environmental disturbances
(
Institution of Engineering and Technology
, 2010 , Article)
The problem of designing and developing a hybrid fault detection and isolation (FDI) scheme for a non-linear system that is subject to large environmental disturbances is investigated. In the proposed FDI scheme, a hybrid ...
Fuzzy prediction for failed back surgery syndrome
(
Taylor and Francis Ltd.
, 2010 , Article)
In this article a new strategy is presented that can be used by neurophysicians, neurosurgeons, and orthopedic surgeons to predict patients' health after an operative procedure on the vertebral column just by analyzing the ...
Security-aware service composition for end users of small enterprises
(
IOS Press
, 2010 , Article)
This paper focuses on the service composition based on security properties of services from an end user perspective. End users are usually not expert in computer security, but expert users of computer software. They typically ...
Establishing trust in cloud computing
(
IEEE Computer Society
, 2010 , Article)
How can cloud providers earn their customers' trust when a third party is processing sensitive data in a remote machine located in various countries? Emerging technologies can help address the challenges of trust in cloud ...
Detecting Fetal Movements Using Non-Invasive Accelerometers: A Preliminary Analysis
(
IEEE
, 2010 , Article)
Monitoring fetal movement is important to assess fetal health. Standard clinical fetal monitoring technologies include ultrasound imaging and cardiotocography. Both have limited prognostic value and require significant ...
Performance analysis of a cell-based call admission control scheme for QoS support in multimedia wireless networks
(
John Wiley & Sons, Ltd.
, 2010 , Article)
Next generation wireless communication systems, including 3G and 4G technologies, are envisaged to support more mobile users and a variety of high-bandwidth multimedia services. Different multimedia services have diverse ...
Investigation of the use of TiO2 doped with metal ions in water disinfection
(
IWA Publishing
, 2010 , Article)
This research was conducted to improve titanium dioxide by transition metal doping using cooper. Sol gel method was used to prepare metal doped TiO 2. Titanium isopropoxide and commercial TiO2 P25 were employed as catalyst ...