Search
Now showing items 351-360 of 545
Integration of business applications with the blockchain: Odoo and hyperledger fabric open source proof of concept
(
Elsevier
, 2021 , Conference Paper)
Since its revolution in the financial sector, the blockchain technology disrupted the majority of collaboration-based applications including supply chain management. The supply chain is one of the most important sectors ...
Face-Fake-Net: The Deep Learning Method for Image Face Anti-Spoofing Detection : 45
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Conference Paper)
Due to the increasingly growing demand for user identification on cell phones, PCs, laptops, and so on, face anti-spoofing has risen to significance and is an active research area in academia and industry. The detection ...
Generating Images from Arabic Story-Text using Scene Graph
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
In this paper, we propose a new approach to generate descriptive images from simple Arabic text of stories for children to build a flexible and rich multimedia repository. To make it successful, we need to transform the ...
Cyber-attacks against voltage profile in smart distribution grids with highly-dispersed pv generators: Detection and protection
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
In this work, we study the effect of cyber-attacks on voltage regulation in smart grids with highly dispersed photovoltaic (PV) power generators. We picture how the cyberattacks in the distribution network with the existence ...
Novel re-configurable topologies of SLC based high gain DC-DC converters
(
Institute of Electrical and Electronics Engineers Inc.
, 2022 , Conference Paper)
Standalone renewable sources such as PV (Photovoltaic) and FC (Fuel cells) are often employed as input sources to supply high voltage DC buses of microgrids. Conventional DC-DC converter used as interlinking device would ...
Convolutional neural networks for real-time and wireless damage detection
(
Springer New York LLC
, 2020 , Conference Paper)
Structural damage detection methods available for structural health monitoring applications are based on data preprocessing, feature extraction, and feature classification. The feature classification task requires considerable ...
Towards Information Theoretic Interpretation of Practical Ciphers
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Conference Paper)
In spite of the wide spread of practical crypto- systems and ciphers nowadays, they still lack a unique metric to measure the secrecy level they provide. Their strength is measured in an ad-hoc way by exposing them to ...
A downlink index-modulation based nonorthogonal multiple access scheme
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
Massive connectivity and spectral efficiency are among the main defining terms of the future communications era. Therefore, revolutionary technologies are required to keep up with the connectivity and spectrum demands. ...
Performance Analysis of PLS key generation-based Secure NOMA-enabled IoT Networks in the presence of Untrusted Users
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Conference Paper)
In Internet of Things (IoT), a massive amount of sensitive data is generated and transmitted by IoT devices. Security risks represent a major concern in IoT, especially when using innovative techniques such as Non-Orthogonal ...
Dynamic Time-Threshold Based Receive Buffer for Vehicle-to-Cloud Multipath Transmission
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
Vehicle-to-cloud is a network access model that aims to share computing resources for vehicles. In vehicle-to-cloud communication, reliable links are critical. Through multipath transmission, comprehensive utilization of ...