Browsing College of Engineering by Title
Now showing items 7674-7693 of 8222
-
This is not new! Spotting previously-verified claims over Twitter
( Elsevier , 2023 , Article)Several fake claims are commonly repeated over time, especially on social media. To identify such previous claims, the verified claim retrieval task was studied, where, for a given input claim, the goal is to find ... -
Threat and vulnerability risk assessment for existing subway stations: A simplified approach
( Elsevier Ltd , 2018 , Article)People use infrastructure systems mostly without realizing how important these systems are until an attack or damage occurs and results in casualties or causes discomfort or inconvenience. Even though there have been ... -
Threat-specific security risk evaluation in the cloud
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)Existing security risk evaluation approaches (e.g., asset-based) do not consider specific security requirements of individual cloud computing clients in the security risk evaluation. In this paper, we propose a threat-specific ... -
ThreatBased Security Risk Evaluation in the Cloud
( Hamad bin Khalifa University Press (HBKU Press) , 2018 , Conference Paper)Research ProblemCyber attacks are targeting the cloud computing systems, where enterprises, governments, and individuals are outsourcing their storage and computational resources for improved scalability and dynamic ... -
Three Dimensional Computational Study for Spiral Dry Gas Seal with Constant Groove Depth and Different Tapered Grooves
( Elsevier Ltd , 2013 , Conference Paper)The three dimensional simulation for dry gas seal with constant depth spiral grooves and with different taper grooves is done using ANSYS FLUENT CFD code. Grid independence study and code validation are done with experimental ... -
Three Dimensional Denoising Filter for Effective Source Smartphone Video Identification and Verification
( Association for Computing Machinery , 2022 , Conference Paper)The field of digital image and video forensics has recently seen significant advances and has attracted attention from a growing number of researchers given the availability of imaging functionalities in most current ... -
Three dimensional magnetic field computation by a coupled vector-scalar potential method in brushless DC motors with skewed permanent magnet mounts - the formulation and FE grids
( IEEE , 1994 , Article)A three dimensional finite element (3D-FE) method for the computation of global distributions of 3D magnetic fields in electric machines containing permanent magnets is presented. The formulation of this 3D-FE method ... -
Three dimensional magnetic field computation by a coupled vector-scalar potential method in brushless DC motors with skewed permanent magnet mounts - the no-load and load results
( IEEE , 1994 , Article)The coupled magnetic vector potential-magnetic scalar potential (CMVP-MSP) method of computation of 3D magnetic fields by finite elements (3D-FE), whose theoretical development and formulation were detailed in a companion ... -
Three maintenances for age replacement policies
( International Society of Science and Applied Technologies , 2017 , Conference Paper)Preventive replacement policy conducted at a routine time T* has been surveyed extensively in literatures. Another two random replacement times Y1 and Y2 are jointly considered in this paper. We formulate the models of ... -
Three-Dimensional Evaluation of Sand Particle Fracture Using Discrete-Element Method and Synchrotron Microcomputed Tomography Images
( American Society of Civil Engineers (ASCE) , 2020 , Article)Recent research showed that fracture of sand particles plays a significant role in determining the plastic bulk volumetric changes of granular materials under different loading conditions. One of the major tools used to ... -
Three-dimensional finite element analysis of permanent magnet brushless DC motor drives - Status of the state of the art
( IEEE , 1996 , Article)This paper reviews recent advances in the state of the art of applying three-dimensional finite-element (3-D-FE) magnetic field computation techniques to the analysis and quantification of parameters and performance of ... -
Three-wire bipolar high-voltage direct current line using an existing single-circuit high-voltage alternating current line for integrating renewable energy sources in multiterminal DC networks
( Institution of Engineering and Technology , 2016 , Article)When compared with conventional point-To-point high-voltage direct current (HVDC) systems, multiterminal HVDC (MTDC) systems are more economical and flexible. MTDC systems can tie distributed high power renewable energy ... -
Threshold-based relaying in coded cooperative networks
( IEEE , 2011 , Article)In cooperative communications, error propagation at the relay nodes degrades the diversity order of the system. To combat that effect, we present a novel technique to control error propagation at the relays, which is ... -
Thresholds optimization for one-bit feedback multi-user scheduling
( Institute of Electrical and Electronics Engineers Inc. , 2018 , Article)We propose a new one-bit feedback scheme with scheduling decision based on the maximum expected weighted rate. We show the concavity of the 2-user case and provide the optimal solution which achieves the maximum weighted ... -
Throughput maximization via adjusting packet size of a buffered cognitive radio user
( Institute of Electrical and Electronics Engineers Inc. , 2014 , Conference Paper)In this paper, we investigate a cognitive scenario with one secondary user and one primary user. Users are assumed to be buffered terminals. Each user has certain arrival rate with certain packet size. We propose a scheme ... -
Throughput of a cooperative energy harvesting secondary user in cognitive radio networks
( Wiley Blackwell , 2016 , Article)This paper investigates the maximum throughput of a rechargeable secondary user (SU) sharing the spectrum with a primary user (PU). The SU is assumed to be an energy harvesting node, which harvests energy packets from the ... -
Throughput optimization for the Robotic Cell Problem with Controllable Processing Times
( EDP Sciences , 2017 , Article)In this paper, we present a MIP-based heuristic and an effective genetic algorithm for the Robotic Cell Problem with Controllable Processing Times (RCPCPT). This problem arises in modern automated manufacturing systems and ... -
Throughput, latency and cost comparisons of microcontroller-based implementations of wireless sensor network (WSN) in high jump sports
( American Institute of Physics Inc. , 2017 , Conference Paper)In high jump sports, approach take-off speed and force during the take-off are two (2) main important parts to gain maximum jump. To measure both parameters, wireless sensor network (WSN) that contains microcontroller and ... -
Thyristor based SVC and multilevel qZSI for Active and Reactive power management in solar PV system
( Institute of Electrical and Electronics Engineers Inc. , 2017 , Conference Paper)In this paper, Active and Reactive power management with the utility grid is achieved by integrating 7-level quasi Impedance Source Inverter (qZSI) with Thyristor based elements (Thyristor Switched Capacitor (TSC) and ... -
THz vs. FSO: An Outage Probability and Channel Capacity Performance Comparison Study
( IEEE , 2023 , Conference Paper)The main subject of this work is to make a detailed comparison between the performance of free-space optical (FSO) and terahertz (THz) links under different conditions. To this end, we first perform a detailed modeling of ...