Browsing by Title
Now showing items 1397-1416 of 53172
-
A Robust MPC for Input-Output LPV Models
( Institute of Electrical and Electronics Engineers Inc. , 2016 , Article)In this note, a discrete-time robust model predictive control (MPC) design approach is proposed to control systems described by linear parameter-varying models in input-output form subject to constraints. To ensure the ... -
A robust resource allocation scheme for device-to-device communications based on Q-Learning
( Tech Science Press , 2020 , Article)One of the most effective technology for the 5G mobile communications is Device-to-device (D2D) communication which is also called terminal pass-through technology. It can directly communicate between devices under the ... -
A scalable solution for finding overlaps between sequences using map-reduce
( The International Society for Computers and Their Applications (ISCA) , 2016 , Conference Paper)The overlap stage of a string graph-based assembler is considered one of the most time- and space-consuming stages in any de novo overlap-based assembler. This is due to the huge output of the next-generation sequencing ... -
A Scene-to-Speech Mobile based Application: Multiple Trained Models Approach
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)The concept of Scene-to-Speech (STS) is to recognize elements in a captured image or a video clip to speak loudly an informative textual content that describes the scene. The contemporary progression in convolution neural ... -
A Scheme for Delay-Sensitive Spatiotemporal Routing in SDN-Enabled Underwater Acoustic Sensor Networks
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)In underwater acoustic sensor networks (UASNs), the sensors are deployed at different areas of the ocean, which perform information collection and delay-sensitive routing to the data center for further processing or ... -
A Scheme for Three-way Secure and Verifiable E-Voting
( IEEE Computer Society , 2019 , Conference Paper)Online voting systems are gaining acceptance with the widespread use of secure web services and cloud computing such as electronic currency and online banking. However, they still face privacy, security and accountability ... -
A scoping review of the questionnaires used for the assessment of the perception of undergraduate students of the learning environment in healthcare professions education programs
( Springer Science and Business Media B.V. , 2024 , Article Review)The learning environment (LE) includes social interactions, organizational culture, structures, and physical and virtual spaces that influence the learning experiences of students. Despite numerous studies exploring the ... -
A scrutiny of antibacterial activity of pure and iodine doped ZnO thin films synthesized by mSILAR method
( American Institute of Physics Inc. , 2019 , Conference Paper)Iodine doped zinc oxide (I-ZnO) thin films were synthesized by microwave assisted successive ionic layer adsorption (mSILAR) method. The structural characteristics of pure ZnO and I-ZnO thin films were carried out by powder ... -
A secondary voltage regulation approach for Hydro-Québec in transmission level
( Elsevier , 2015 , Article)This paper presents a secondary voltage control that applies discrete controllers to regulate the voltage in the Hydro-Québec power network. Firstly, an artificial intelligence methodology is presented for partitioning the ... -
A Secrecy Study of UAV Based Networks with Fountain Codes and FD Jamming
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)Securing wireless communication using different techniques has been an interesting topic for research, especially with the increasing demand on fast and secure transmission. In this research, we conduct a performance ... -
A Secret-key-aided scheme to secure transmissions from single-antenna RF-eh source nodes
( Institute of Electrical and Electronics Engineers Inc. , 2018 , Article)We propose a two-phase artificial-noise-aided scheme to power a single-antenna energy-harvesting source node (Alice) and secure her transmissions to a multiple-antenna legitimate destination (Bob) in the presence of a ... -
A secure and efficient renewable energy trading scheme based on blockchain in smart grid
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)Nowadays, with the diversification and decentralization of energy systems, the energy Internet makes it possible to interconnect distributed energy sources and consumers. In the energy trading market, the traditional ... -
A secure client-side framework for protecting the privacy of health data stored on the cloud
( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)In the past decade, Cloud-Computing emerged as a new computing concept with a distributed nature using virtual network and systems. Many businesses rely on this technology to keep their systems running but concerns are ... -
A secure cloud system for maintaining COVID-19 patient's data using image steganography
( Hamad bin Khalifa University Press (HBKU Press) , 2021 , Article)The COVID-19 pandemic has been life-threatening for many people and as such, a contactless medical system is necessary to prevent the spread of the virus. Smart healthcare systems collect data from patients at one end and ... -
A Secure, Lightweight, and Privacy-Preserving Authentication Scheme for V2G Connections in Smart Grid
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)Vehicle to Grid (V2G) is a crucial technology that enables the bidirectional flow of communication between electric vehicles (EVs) and the smart grid (SG). Undoubtedly security and privacy are inherent requirements of these ... -
A Secured Proxy-Based Data Sharing Module in IoT Environments Using Blockchain
( NLM (Medline) , 2019 , Article)Access and utilization of data are central to the cloud computing paradigm. With the advent of the Internet of Things (IoT), the tendency of data sharing on the cloud has seen enormous growth. With data sharing comes ... -
A Self-Balanced Bidirectional Medium-/High-Voltage Hybrid Modular DC-DC Converter with Low-Voltage Common DC-Link and Sequential Charging/Discharging of Submodules Capacitors
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)This paper proposes a medium-/high-voltage high-power hybrid modular DC-DC converter to interconnect two different dc-voltage levels in medium-/high-voltage dc grids. The converter consists of half-bridge submodules (SMs) ... -
A self-selective correlation ship tracking method for smart ocean systems
( MDPI AG , 2019 , Article)In recent years, with the development of the marine industry, the ship navigation environment has become more complicated. Some artificial intelligence technologies, such as computer vision, can recognize, track and count ... -
A semantic approach for document clustering
( Academy Publisher , 2009 , Article)Conventional document mining systems mainly use the presence or absence of keywords to mine texts. However, simple word counting and frequency distributions of term appearances do not capture the meaning behind the words, ... -
A semi-analytical beam model for the vibration of railway tracks
( Academic Press , 2017 , Article)The high frequency dynamic behaviour of railway tracks, in both vertical and lateral directions, strongly affects the generation of rolling noise as well as other phenomena such as rail corrugation. An improved semi-analytical ...