Search
Now showing items 41-50 of 73
Robustness quantification of hierarchical complex networks under targeted failures
(
Elsevier Ltd
, 2018 , Article)
Robustness is one of the key properties in complex networks to ensure the expected level of performance and service availability in case of perturbations and failures. Network robustness is generally quantified using various ...
Modern network reconfiguration techniques for service restoration in distribution systems: A step to a smarter grid
(
Elsevier B.V.
, 2018 , Article)
This paper presents state of the art reconfiguration techniques used for service restoration in distribution systems under different practical considerations. The different formulations of the problem together with the ...
Subjective and objective quality assessment of degraded document images
(
Elsevier Masson SAS
, 2018 , Article)
The huge amount of degraded documents stored in libraries and archives around the world needs automatic procedures of enhancement, classification, transliteration, etc. While high-quality images of these documents are in ...
Exploiting Task Elasticity and Price Heterogeneity for Maximizing Cloud Computing Profits
(
IEEE Computer Society
, 2018 , Article)
This paper exploits cloud task elasticity and price heterogeneity to propose an online resource management framework that maximizes cloud profits while minimizing energy expenses. This is done by reducing the duration ...
Privacy and security issues in online social networks
(
MDPI AG
, 2018 , Article)
The advent of online social networks (OSN) has transformed a common passive reader into a content contributor. It has allowed users to share information and exchange opinions, and also express themselves in online virtual ...
Deciding Your Own Anonymity: User-Oriented Node Selection in I2P
(
Institute of Electrical and Electronics Engineers Inc.
, 2018 , Article)
With the development of Internet applications, anonymous communication technology plays a very significant role in protecting personal privacy. As one of the most popular anonymous communication systems, I2P provides strong ...
Feature selection for effective health index diagnoses of power transformers
(
Institute of Electrical and Electronics Engineers Inc.
, 2018 , Article)
This letter investigates an approach based on feature selection and classification techniques to reduce assessment complexities of power transformers. This approach decreases the number of features by extracting the most ...
ECG Signal Reconstruction on the IoT-Gateway and Efficacy of Compressive Sensing under Real-Time Constraints
(
Institute of Electrical and Electronics Engineers Inc.
, 2018 , Article)
Remote health monitoring is becoming indispensable, though, Internet of Things (IoTs)-based solutions have many implementation challenges, including energy consumption at the sensing node, and delay and instability due to ...
Symmetric encryption relying on chaotic henon system for secure hardware-friendly wireless communication of implantable medical systems
(
MDPI AG
, 2018 , Article)
Healthcare remote devices are recognized as a promising technology for treating health related issues. Among them are the wireless Implantable Medical Devices (IMDs): These electronic devices are manufactured to treat, ...
Passive inference of attacks on CPS communication protocols
(
Elsevier Ltd
, 2018 , Article)
The security of Cyber-Physical Systems (CPS) has been recently receiving significant attention from the research community. While the majority of such attention originates from the control theory domain, few approaches ...