Search
Now showing items 761-770 of 3768
Anonymity and privacy in bitcoin escrow trades
(
Association for Computing Machinery
, 2019 , Conference Paper)
As a decentralized cryptocurrency, Bitcoin has been in market for around a decade. Bitcoin transactions are thought to be pseudoanonymous, however, there were many attempts to deanonymize these transactions making use of ...
An asymmetrical six-phase induction machine-based flywheel energy storage system using modular multilevel converters
(
Institute of Electrical and Electronics Engineers Inc.
, 2017 , Conference Paper)
Energy storage systems have become an essential pillar in most of electrical engineering applications due to introduced technical and economical merits, particularly following the pronounced grid-integration of renewable ...
A Hybrid Energy Sharing Framework for Green Cellular Networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2017 , Conference Paper)
Cellular operators are increasingly turning toward renewable energy (RE) as an alternative to using traditional electricity in order to reduce operational expenditure and carbon footprint. Due to the randomness in both RE ...
Data enrichment in fine-grained classification of aquatic macroinvertebrates
(
Institute of Electrical and Electronics Engineers Inc.
, 2017 , Conference Paper)
The types and numbers of benthic macroinverte-brates found in a water body reflect water quality. Therefore, macroinvertebrates are routinely monitored as a part of freshwater ecological quality assessment. The collected ...
Leadership and collaboration in project management education: A case study
(
ISEC Press
, 2017 , Conference Paper)
This paper discusses about the importance of practical experience and multidisciplinary collaboration in project management success and the apparent lack of emphasis placed on this within the context of university education. ...
Feasibility of Supervised Machine Learning for Cloud Security
(
Institute of Electrical and Electronics Engineers Inc.
, 2017 , Conference Paper)
Cloud computing is gaining significant attention, however, security is the biggest hurdle in its wide acceptance. Users of cloud services are under constant fear of data loss, security threats and availability issues. ...
Reusable garbled turing machines without FHE
(
Springer Verlag
, 2019 , Conference Paper)
Since Yao introduced the garbled circuit concept in 1980s, it has been an open problem to design efficient reusable garbled Turing machines/circuits. Recently, Goldwasser et al. and Garg et al. answered this question ...
Database Facilitated Screening with NMR Spectroscopy Analysis for Drug Detection
(
IEEE
, 2019 , Conference Paper)
© 2019 IEEE. Drug detection plays the key role in the enforcement of drug regulations. Various detection methods for them are thus developed. However, in most investigations, the most time-consuming and tedious part is not ...
Secrecy performance of AF relaying in cooperative NOMA over rician channel
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
In this paper, we investigate the secrecy performance of an Amplify-and-Forward (AF) relay in a cooperative NOMA system. The AF relay ensures the transmission of the signal in the presence of one passive eavesdropper where ...
NAVIGATION IN INDOOR VOXEL MODELS
(
Copernicus GmbH
, 2019 , Conference Paper)
The paper proposes to use voxel models of building interiors to perform indoor navigation. The algorithms can be purely geometrical, not relying on semantic information about different building elements, such as floors, ...