Search
Now showing items 11-20 of 135
Weak and strong convergence theorems without some widely used conditions
(
Academic Publications, Ltd.
, 2010 , Article)
We establish weak (strong) convergence of Ishikawa iterates of two asymptotically (quasi-)nonexpansive maps without any condition on the rate of convergence associated with the two maps. Moreover, our weak convergence ...
Ordered clustering: A way to simplify analysis of multichannel signals
(
IEEE
, 2010 , Conference Paper)
We describe here new possibilities offered by a
clustering method routinely used by many petroleum
companies and which could be used in other
applications where analysis of multichannel signals has
a significant role ...
Detection of neonatal seizure using multiple filters
(
IEEE
, 2010 , Conference Paper)
It is often impossible to accurately differentiate between seizure and non-seizure related activities in irifants based on clinical manifestations alone. The electroencephalogram (EEG) is therefore the best tool available ...
Mitigating error propagation in two-way relay channels with network coding
(
IEEE
, 2010 , Article)
In relay networks, error propagation at the relay nodes degrades the performance of the system. To combat that effect, it has been suggested to implement a reliability threshold at the relay to control error propagation. ...
Evaluation of a multilevel cascaded-type dynamic voltage restorer employing discontinuous space vector modulation
(
IEEE Industrial Electronics Society
, 2010 , Article)
In this paper, the application of a cascaded multilevel inverter as a dynamic voltage restorer (DVR) is investigated. Two discontinuous multilevel space vector modulation (SVM) techniques are implemented for DVR control ...
A performance comparison of MD5 authenticated routing traffic with EIGRP, RIPv2, and OSPF
(
Zarqa University
, 2010 , Article)
Routing is the process of forwarding data across an inter-network from a designated source to a final destination. Along the way from source to destination, at least one intermediate node is considered. Due to the major ...
Hybrid fault detection and isolation strategy for non-linear systems in the presence of large environmental disturbances
(
Institution of Engineering and Technology
, 2010 , Article)
The problem of designing and developing a hybrid fault detection and isolation (FDI) scheme for a non-linear system that is subject to large environmental disturbances is investigated. In the proposed FDI scheme, a hybrid ...
Fuzzy prediction for failed back surgery syndrome
(
Taylor and Francis Ltd.
, 2010 , Article)
In this article a new strategy is presented that can be used by neurophysicians, neurosurgeons, and orthopedic surgeons to predict patients' health after an operative procedure on the vertebral column just by analyzing the ...
Security-aware service composition for end users of small enterprises
(
IOS Press
, 2010 , Article)
This paper focuses on the service composition based on security properties of services from an end user perspective. End users are usually not expert in computer security, but expert users of computer software. They typically ...
Establishing trust in cloud computing
(
IEEE Computer Society
, 2010 , Article)
How can cloud providers earn their customers' trust when a third party is processing sensitive data in a remote machine located in various countries? Emerging technologies can help address the challenges of trust in cloud ...