بحث بسيط
السجلات المعروضة 171 -- 180 من 180
Device interface for people with mobility impairment
(
IEEE
, 2013 , Conference Paper)
This paper presents a modified design of an electronically controlled wheelchair that integrates a general-purpose controlling system attached with the main actuators to provide mobility as well as additional control of ...
Space vector model of a three-phase to five-phase AC/AC converter
(
Institute of Electrical and Electronics Engineers Inc.
, 2013 , Conference Paper)
Multi-phase motor drives becoming popular in some niche application areas such as ship propulsion, 'more electric aircraft' electric and hybrid electric vehicle. The rise in popularity is attributed to fact that they are ...
PWM scheme for dual matrix converters based five-phase open-end winding drive
(
IEEE
, 2013 , Conference Paper)
The paper present simple carrier-based pulse width modulation scheme for three to five-phase matrix converters feeding a five-phase machine from both ends. The two matrix converters feeding a five-phase induction machine ...
Maintaining database anonymity in the presence of queries
(
Springer
, 2013 , Conference Paper)
With the advent of cloud computing there is an increased interest in outsourcing an organization's data to a remote provider in order to reduce the costs associated with self-hosting. If that database contains information ...
Secure and private outsourcing of shape-based feature extraction
(
Springer
, 2013 , Conference Paper)
There has been much recent work on secure storage outsourcing, where an organization wants to store its data at untrusted remote cloud servers in an encrypted form, such that its own employees can query the encrypted data ...
Secure outsourcing of network flow data analysis
(
Institute of Electrical and Electronics Engineers Inc.
, 2013 , Conference Paper)
In this paper, we identify a new and challenging application for the growing field of research on data anonymization and secure outsourcing of storage and computations to the cloud. Network flow data analysis is of high ...
Using safety constraint for transactional dataset anonymization
(
Springer
, 2013 , Conference Paper)
In this paper, we address privacy breaches in transactional data where individuals have multiple tuples in a dataset. We provide a safe grouping principle to ensure that correlated values are grouped together in unique ...
Updating outsourced anatomized private databases
(
Association for Computing Machinery
, 2013 , Conference Paper)
We introduce operations to safely update an anatomized database. The result is a database where the view of the server satisfies standards such as k-anonymity or l-diversity, but the client is able to query and modify the ...
Secure Outsourcing of Matrix Operations as a Service
(
IEEE Computer Society
, 2013 , Conference Paper)
This paper reports the design of a cloud-based service for coordinating secure outsourcing of storage and computation of scientific data, particularly matrices. While this service may support different secure outsourcing ...
ConMR: Concurrent MapReduce programming model for large scale shared-Data applications
(
Institute of Electrical and Electronics Engineers Inc.
, 2013 , Conference Paper)
The rapid growth of large-data processing has brought in the MapReduce programming model as a widely accepted solution. However, MapReduce limits itself to a onemap- To-one-reduce framework. Meanwhile, it lacks built-in ...