بحث بسيط
السجلات المعروضة 11 -- 20 من 83
Mitigating error propagation in two-way relay channels with network coding
(
IEEE
, 2010 , Article)
In relay networks, error propagation at the relay nodes degrades the performance of the system. To combat that effect, it has been suggested to implement a reliability threshold at the relay to control error propagation. ...
Evaluation of a multilevel cascaded-type dynamic voltage restorer employing discontinuous space vector modulation
(
IEEE Industrial Electronics Society
, 2010 , Article)
In this paper, the application of a cascaded multilevel inverter as a dynamic voltage restorer (DVR) is investigated. Two discontinuous multilevel space vector modulation (SVM) techniques are implemented for DVR control ...
A performance comparison of MD5 authenticated routing traffic with EIGRP, RIPv2, and OSPF
(
Zarqa University
, 2010 , Article)
Routing is the process of forwarding data across an inter-network from a designated source to a final destination. Along the way from source to destination, at least one intermediate node is considered. Due to the major ...
Hybrid fault detection and isolation strategy for non-linear systems in the presence of large environmental disturbances
(
Institution of Engineering and Technology
, 2010 , Article)
The problem of designing and developing a hybrid fault detection and isolation (FDI) scheme for a non-linear system that is subject to large environmental disturbances is investigated. In the proposed FDI scheme, a hybrid ...
Fuzzy prediction for failed back surgery syndrome
(
Taylor and Francis Ltd.
, 2010 , Article)
In this article a new strategy is presented that can be used by neurophysicians, neurosurgeons, and orthopedic surgeons to predict patients' health after an operative procedure on the vertebral column just by analyzing the ...
Security-aware service composition for end users of small enterprises
(
IOS Press
, 2010 , Article)
This paper focuses on the service composition based on security properties of services from an end user perspective. End users are usually not expert in computer security, but expert users of computer software. They typically ...
Establishing trust in cloud computing
(
IEEE Computer Society
, 2010 , Article)
How can cloud providers earn their customers' trust when a third party is processing sensitive data in a remote machine located in various countries? Emerging technologies can help address the challenges of trust in cloud ...
Evidence of the Involvement of E358, A498 and C571 of a New Cry1Ac δ-endotoxin of Bacillus thuringiensis in its High Insecticidal Activity Against Ephestia kuehniella
(
Humana Press Inc
, 2010 , Article)
A new cry1Ac-type gene was cloned from Bacillus thuringiensis strain BLB1, sequenced and expressed. The deduced amino acid sequence of the polypeptide has a predicted molecular mass of 132.186 kDa. The amino acid sequence ...
Antifungal activities of an endophytic Pseudomonas fluorescens strain Pf1TZ harbouring genes from pyoluteorin and phenazine clusters
(
Springer Netherlands
, 2010 , Article)
Pseudomonas fluorescens Pf1TZ was inhibitory in vitro to a number of phytopathogenic fungi and could protect vine plantlets against Botrytis cinerea. Total protection was reached after 3 weeks of bacterial inoculation. The ...
Unpublished Material from the Arab Museum of Modern Art at Qatar—Doha II Osiris Naos
(
American Research Center in Egypt
, 2010 , Article)
Publication of part of a white limestone naos with the representation of the god Osiris dedicated
by a military man of the Nineteenth Dynasty, perhaps from the Abydos temple. The paper examines the iconography and text ...