بحث بسيط
السجلات المعروضة 31 -- 40 من 232
Managing Security Control Assumptions Using Causal Traceability
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
Security control specifications of software systems are designed to meet their security requirements. It is difficult to know both the value of assets and the malicious intention of attackers at design time, hence assumptions ...
Space vector PWM for a three-phase to six-phase direct AC/AC converter
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
In this paper a generalized multi-phase space vector theory is considered for developing the space vector modulation of a three-phase to six-phase AC to AC converter. The modulation is based on the control of the voltage ...
Modelling and implementation of SVPWM technique for a fifteen-phase voltage source inverter for sinusoidal output waveform
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
In this paper space vector model of a fifteen-phase voltage source inverter (VSI) is presented. The space vector Pulse Width Modulation (SVPWM) of a fifteen-phase voltage source inverter (VSI) with the aim of producing ...
Evaluation of combined genome assemblies: A case study with fungal genomes
(
Springer
, 2015 , Conference Paper)
The rapid advances in genome sequencing leads to the generation of huge amount of data in a single sequencing experiment. Several genome assemblers with different objectives were developed to process these genomic data. ...
Distributed computing and artificial intelligence, 12th international conference
(
Springer
, 2015 , Conference Paper)
The 12th International Symposium on Distributed Computing and Artificial Intelligence 2015 (DCAI 2015) is a forum to present applications of innovative techniques for studying and solving complex problems. The exchange of ...
Performance analysis of M2M communication networks for QoS-differentiated smart grid applications
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
We study the performance of Machine-to-Machine (M2M) communications in Long Term Evolution Advanced (LTE-A) networks. The proposed analysis is applied to the random access procedure within LTE-A for the calculation of the ...
Framework for development of cognitive technology for children with hearing impairments
(
IEEE
, 2015 , Conference Paper)
The main aim of this study is to investigate the needs of people with HI in the Arab world, and propose a system design that would help alleviate the challenges they face. The system design is centered on Arabic-based ...
An intelligent sensing system tor healthcare applications using real-time EMG and gaze fusion
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
This paper propose and discuss a solution of an intelligent visualization/sensing system for people who suffer from spinal muscular atrophy (SMA) which is a disorder that gradually makes the person paralyzed. The solution ...
Problem-based learning environments in Moodle: Implementation approches
(
IEEE Computer Society
, 2015 , Conference Paper)
Problem-based learning (PBL) educators resorted to developing their own environments even with existence of comprehensive Learning Management Systems (LMS). They realized that both commercial and open source systems were ...
LocationSpark: A distributed in-memory data management system for big spatial data
(
VLDB Endowment
, 2015 , Conference Paper)
We present LocationSpark, a spatial data processing system built on top of Apache Spark, a widely used distributed data processing system. LocationSpark offers a rich set of spatial query operators, e.g., range search, ...