Browsing by Title
Now showing items 10562-10581 of 51551
-
Explainable, trustworthy, and ethical machine learning for healthcare: A survey
( Elsevier , 2022 , Article Review)With the advent of machine learning (ML) and deep learning (DL) empowered applications for critical applications like healthcare, the questions about liability, trust, and interpretability of their outputs are raising. The ... -
The explicit eigenvalues and eigenfunctions of the generalized neumann kernel in annular domains
( Universiti Putra Malaysia , 2019 , Article)This paper presents the explicit forms of the eigenvalues of the general-ized Neumann kernel in annular domains and the explicit forms of the corresponding eigenfunctions. It follows from these explicit forms that, except ... -
Explicit Forms of Conservation Laws of a Class of Differential Equations
( Qatar University , 1994 , Article)Explicit forms of conservation laws of a class of nonlinear partial differential equations are derived; firstly from BScklund transformation and secondly from the. fundamental equations of the corresponding inverse method. -
Exploitation of additional degrees of freedom of multiphase drives in low-frequency operation of modular multilevel converters
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)MMC encounters serious limitations in the zero and low-frequency operation of variable-speed motor drives. In MMC, the voltage ripples of SubModule (SM) capacitor is inversely proportional to the phase current frequency. ... -
Exploitation of Citrus Peel Extract as a Feedstock for Power Generation in Microbial Fuel Cell (MFC)
( Springer , 2019 , Article)Microbial fuel cells (MFCs) are envisioned as an evolving cost-effective process for treating organic wastes to simultaneously generate bioelectricity. Therefore, in present study a single chambered mediator- less air ... -
Exploiting 4G mobile user cooperation for energy conservation: Challenges and opportunities
(2013 , Article)Recent years have witnessed tremendous success and popularity of mobile applications and services, resulting in an explosive growth in the number of mobile devices, as well as in the range and types of things these devices ... -
Exploiting bluetooth vulnerabilities in e-health IoT devices
( Association for Computing Machinery , 2019 , Conference Paper)Internet of Things (IoT) is an interconnected network of heterogeneous things through the Internet. The current and next generation of e-health systems are dependent on IoT devices such as wireless medical sensors. One of ... -
Exploiting Client-Side Collected Measurements to Perform QoS Assessment of IaaS
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Article)Delivering reliable service offerings to clients remain a challenging aspect in today's cloud infrastructure. A broad number of research studies have undertaken the service evaluation process from one side; that is, the ... -
Exploiting context severity to achieve opportunistic service differentiation in vehicular ad hoc networks
( Institute of Electrical and Electronics Engineers Inc. , 2014 , Article)Wireless Access in Vehicular Environment (WAVE) dictates primitives for intelligent transportation system (ITS) applications and services. The medium access control (MAC) layer in WAVE facilitates service differentiation. ... -
Exploiting heterogeneity in operational neural networks by synaptic plasticity
( Springer Science and Business Media Deutschland GmbH , 2021 , Article)The recently proposed network model, Operational Neural Networks (ONNs), can generalize the conventional Convolutional Neural Networks (CNNs) that are homogenous only with a linear neuron model. As a heterogenous network ... -
Exploiting LabVIEW FPGA in Implementation of DCT-based Wireless Image Transmission for Wildlife Surveillance System
( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)In the development of wildlife surveillance system technology, images are important input data that allow real situations in the field to be viewed and analysed. This project proposed a compressed and wireless image ... -
Exploiting Live Feedback for Tweet Real-time Push Notifications
( National Institute of Standards and Technology (NIST) , 2017 , Conference Paper)Twitter has been developed as an immense information creation and sharing network through which users post diverse information. Although a user would regularly check her Twitter timeline to stay up-to-date on her topics ... -
Exploiting Sparsity in Amplify-and-Forward Broadband Multiple Relay Selection
( IEEE , 2019 , Article)Cooperative communication has attracted significant attention in the last decade due to its ability to increase the spatial diversity order with only single-antenna nodes. However, most of the techniques in the literature ... -
Exploiting sparsity of relay-assisted cognitive radio networks
( IEEE , 2015 , Conference Paper)We propose a novel protocol for secondary users based on compressive sensing principles. The secondary user assigned to one of the primary frequency bands is aided by a set of nearby secondary users, which we refer to as ... -
Exploiting Spatial Correlations: Group Key Generation for Secure IoT Device Networks
( Institute of Electrical and Electronics Engineers Inc. , 2023 , Conference Paper)With the exponential growth in IoT devices, especially in healthcare systems, where multiple devices are attributed to one person, the need for a secure and effective group secret key (GSK) generation is intrinsic. GSKs ... -
Exploiting spectrum sensing data for key management
( Elsevier B.V. , 2017 , Article)In cognitive radio networks, secondary users (SUs) communicate on unused spectrum slots in the frequency bands assigned to primary users (PUs). Like any other wireless communication system, cognitive radio networks are ... -
Exploiting Task Elasticity and Price Heterogeneity for Maximizing Cloud Computing Profits
( IEEE Computer Society , 2018 , Article)This paper exploits cloud task elasticity and price heterogeneity to propose an online resource management framework that maximizes cloud profits while minimizing energy expenses. This is done by reducing the duration ... -
Exploiting Traffic Correlation Towards Energy Saving in Data Centers
( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)Many proposed data center architectures are constructed with a huge number of network devices in order to support the increasing cloud based services. These devices are used to achieve the highest performance in case of ... -
Exploiting wideband spectrum occupancy heterogeneity for weighted compressive spectrum sensing
( Institute of Electrical and Electronics Engineers Inc. , 2017 , Conference Paper)Compressive sampling has shown great potential for making wideband spectrum sensing possible at sub-Nyquist sampling rates. As a result, there have recently been research efforts that aimed to develop techniques that ... -
Exploration and analysis of On-Surface and In-Air handwriting attributes to improve dysgraphia disorder diagnosis in children based on machine learning methods
( Elsevier , 2023 , Article)Dysgraphia is a type of learning disorder that affects children’s writing skills. Poor writing skills can obstruct students’ academic growth if it is undiagnosed and untreated properly in the early stages. The irregularity ...