Search
Now showing items 21-30 of 179
Adaptive Network Coding over Cognitive Relay Networks
(
IEEE
, 2013 , Conference Paper)
We consider network coded cooperation for cognitive relay networks. The primary system comprises multiple sources and multiple destinations, whereas the secondary system comprises multiple sources, multiple relays and a ...
An improved predictive control approach for Multilevel Inverters
(
IEEE Computer Society
, 2013 , Conference Paper)
This paper proposes a flexible predictive control strategy for flying capacitors based Multi-Level Inverters (MLIs). The proposed controller, applied for a Flying Capacitors Inverter (FCI) and a Modular Multilevel Converter ...
Multi-module Bi-directional Buck-Boost Inverter-based HVDC back-to-back transmission system
(
IEEE
, 2013 , Conference Paper)
Offshore wind energy is now seen as a key contributor to the renewable energy future. HVDC technology is among the chief technologies enabling widespread use of offshore wind. This paper proposes a new configuration, namely, ...
A novel open-stator-winding DFIM flywheel architecture for renewable energy applications
(
IEEE
, 2013 , Conference Paper)
Energy storage is becoming a basic component of modern renewable power plants, especially wind farms. For several considerations, local wind turbine (WT) energy storage is preferred. Flywheel energy storage is among the ...
AC solid state circuit breakers for fault current limitation in distributed generation
(
IEEE
, 2013 , Conference Paper)
The solid state circuit breaker (SSCB) is a protective device used in power systems to provide protection against short circuit. The objective of this paper is to study and implement a simplified prototype of SSCB as a ...
Maximizing energy efficiency for loss tolerant applications: The packet buffering case
(
IEEE
, 2013 , Conference Paper)
Energy efficient communication has emerged as one of the key areas of research due to its impact on industry and environment. Any potential degree of freedom (DoF) available in the system should be exploited smartly to ...
ConMR: Concurrent MapReduce programming model for large scale shared-Data applications
(
Institute of Electrical and Electronics Engineers Inc.
, 2013 , Conference Paper)
The rapid growth of large-data processing has brought in the MapReduce programming model as a widely accepted solution. However, MapReduce limits itself to a onemap- To-one-reduce framework. Meanwhile, it lacks built-in ...
Using safety constraint for transactional dataset anonymization
(
Springer
, 2013 , Conference Paper)
In this paper, we address privacy breaches in transactional data where individuals have multiple tuples in a dataset. We provide a safe grouping principle to ensure that correlated values are grouped together in unique ...
Secure and private outsourcing of shape-based feature extraction
(
Springer
, 2013 , Conference Paper)
There has been much recent work on secure storage outsourcing, where an organization wants to store its data at untrusted remote cloud servers in an encrypted form, such that its own employees can query the encrypted data ...
An edutainment system for assisting qatari children with moderate intellectual and learning disability through exerting physical activities
(
IEEE
, 2013 , Conference Paper)
Children with Moderate Intellectual Disability (MID) and those with Moderate Learning Disability (MLD) are growing up with extensive exposure to computer technology. Computers and computer-related devices have the potential ...