Search
Now showing items 1-10 of 1368
Fault tolerant approach for verified software: Case of natural gas purification simulator
(2013 , Conference)
Well logically verified and tested software may fail because of undesired physical phenomena provoking transient faults during its execution. While being the most frequent kind of faults, transient faults are difficult to ...
Natural fault tolerance in the context of a goal oriented software design
(2013 , Conference)
A particular goal oriented software design is proposed in this paper: by checking the preservation of critical information, an original proposed program structure has the important property to naturally recover transient ...
ECG Signal Reconstruction on the IoT-Gateway and Efficacy of Compressive Sensing under Real-Time Constraints
(
Institute of Electrical and Electronics Engineers Inc.
, 2018 , Article)
Remote health monitoring is becoming indispensable, though, Internet of Things (IoTs)-based solutions have many implementation challenges, including energy consumption at the sensing node, and delay and instability due to ...
Revolutionizing ECMO simulation with affordable yet high-Fidelity technology
(
Elsevier
, 2018 , Article)
Simulation-based training (SBT) is becoming a necessity in educating healthcare professionals who work in high-risk environments, such as the intensive care unit (ICU) [1]. This applies to extracorporeal membrane oxygenation ...
Boosting domestic energy efficiency through accurate consumption data collection
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference)
Domestic user behavior shapes overall power consumption, necessitating the development of systems that analyze and help foster energy efficient behavior. The most important step in the process is the collection and management ...
Privacy and security issues in online social networks
(
MDPI AG
, 2018 , Article)
The advent of online social networks (OSN) has transformed a common passive reader into a content contributor. It has allowed users to share information and exchange opinions, and also express themselves in online virtual ...
Deciding Your Own Anonymity: User-Oriented Node Selection in I2P
(
Institute of Electrical and Electronics Engineers Inc.
, 2018 , Article)
With the development of Internet applications, anonymous communication technology plays a very significant role in protecting personal privacy. As one of the most popular anonymous communication systems, I2P provides strong ...
Bringing Deep Learning at the Edge of Information-Centric Internet of Things
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Various Internet solutions take their power processing and analysis from cloud computing services. Internet of Things (IoT) applications started discovering the benefits of computing, processing, and analysis on the device ...
Automatic Modulation Classification for Low SNR Digital Signal in Frequency-Selective Fading Environments
(
Kluwer Academic Publishers
, 2015 , Article)
In this research, a classifier is proposed for automatic modulation classification of some common modulation schemes, i.e., BPSK, QPSK, 8-PSK and 16-QAM. Our proposed classifier considers multipath fading effects on the ...
Performance Evaluation of IEEE 802.15.4 Nonbeacon-Enabled Mode for Internet of Vehicles
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Article)
The Internet of Vehicle (IoV) network refers to networking technologies that could support highly economical and effective communication channels for interactions between vehicles. The success of IoV relies on efficient ...