Results (1878)
Search Parameters:
Keyword: AIA Study on Isomorphic Properties of Circulant Graphs
denotes circulant graph of order for a set where Circulant graph is said to have the Cayley Isomorphism (CI) property if whenever is isomorphic to , there is some for which . In this paper, isomorphic properties of circulant graphs that includes Self-complementary circulant graphs; Type-2 isomorphism, a new type of isomorphism other than already known Adam’s isomorphism of circulant graphs and Cartesian product and factorization of…
Read MoreA Taxonomy for Enhancing Usability, Flexibility, and Security of User Authentication
Two technology trends – a move toward software defined capabilities and toward networked devices – support both unprecedented innovations and requirements for security. A fundamental aspect of security is user authentication, which allows devices and software applications to establish their user’s identity and identity is in turn used to establish which of its capabilities the…
Read MoreMeasurement of the Bridge Surface Deflections Using Near-Field Amplitude of Secondary Radiators System
In remote measurements on large-sized objects main focus is on measuring deformations of bridge surfaces and determination of the dynamic amplification factor in particular. The proposed method estimates deflections of entire lower surface of a bridge due to placement of secondary radiators on this surface. Antenna array directivity pattern (ADP) is distorted during deflection of…
Read MoreReview on security issues in RFID systems
Radio frequency Identification (RFID) is currently considered as one of the most used technologies for an automatic identification of objects or people. Based on a combination of tags and readers, RFID technology has widely been applied in various areas including supply chain, production and traffic control systems. However, despite of its numerous advantages, the technology…
Read MoreFault Tolerant Control Based on PID-type Fuzzy Logic Controller for Switched Discrete-time Systems: An Electronic Throttle Valve Application
This paper deals with the problem of Fault Tolerant Control (FTC) using PID-type Fuzzy Logic Controller (FLC) for an Electronic Throttle Valve (ETV) described by a switched discrete-time system with input disturbances and actuator faults. In order to detect the faults, Unknown Input Observers (UIOs) are designed and formulated in terms of Lyapunov theory and…
Read MoreData Exchange Strategies for Aggregating Geographical Distribution of Demands for Location-Dependent Information Using Soft-State Sketches in VANETs
When we drive a car, we often want to know the circumstances of roads between the current location and the destination. Ishihara et al. proposed a Vehicular ad-hoc NETworks (VANET) -based information sharing system, called the Real-Time Visual Car Navigation System, in which a driver can obtain Location-Dependent Information (LDI), such as photographs or videos…
Read MoreMealy-to-Moore Transformation – A state stable design of automata
The paper shows a method of transforming an asynchronously feedbacked Mealy machine into a Moore machine. The transformation is done in dual-rail logic under the use of the RS-buffer. The transformed machine stabilizes itself and is safe to use. The transformation is visualized via KV-diagrams and calculated with formulas. We will present three use-cases for…
Read MoreComparison of K-Means and Fuzzy C-Means Algorithms on Simplification of 3D Point Cloud Based on Entropy Estimation
In this article we will present a method simplifying 3D point clouds. This method is based on the Shannon entropy. This technique of simplification is a hybrid technique where we use the notion of clustering and iterative computation. In this paper, our main objective is to apply our method on different clouds of 3D points.…
Read MoreA Relational Database Model and Tools for Environmental Sound Recognition
Environmental sound recognition (ESR) has become a hot topic in recent years. ESR is mainly based on machine learning (ML) and ML algorithms require first a training database. This database must comprise the sounds to be recognized and other related sounds. An ESR system needs the database during training, testing and in the production stage.…
Read MoreDistributing the computation in combinatorial optimization experiments over the cloud
Combinatorial optimization is an area of great importance since many of the real-world problems have discrete parameters which are part of the objective function to be optimized. Development of combinatorial optimization algorithms is guided by the empirical study of the candidate ideas and their performance over a wide range of settings or scenarios to infer…
Read MoreLeaf-shaped solar cell antenna for Energy Harvesting and RF Transmission in ku-band
In this paper, a hybrid system solar cell antenna was studied. Our contribution lies in the combination of both optical and radio-frequency signals in a solar cell antenna. Hence, we propose a new method to merge antenna and solar cell. The leaf- shaped patch solar cell antenna was dedicated at a time to the energy…
Read MoreControl of a three-stage medium voltage solid-state transformer
This paper proposes the modeling and control of a Solid-State Transformer using a three-stage conversion topology. First, a rectification stage is used, where a three-phase high-voltage AC signal is converted to a DC level; this stage is then followed by a DC-DC converter, and finally an inverter is used to convert the DC into a…
Read MoreA Review of Anti- Podal Vivaldi Antenna Operating in Cellular Mobile Communications
The antenna proposed is a new geomantic structure of Ultra-Wideband (UWB) Anti- Podal Vivaldi antenna (AVA). It remarkably offers an attractive performance over the bands of cellular networks. However, its benefits are not limited only in particular applications, whereas radar imaging, mining detection, the biomedical science in the heating of brain cancer tumor and treatment,…
Read MoreA Switched-Capacitor Low-Pass Filter with Dynamic Switching Bias OP Amplifiers
A switched capacitor low-pass filter employing folded-cascode CMOS OP Amps with a dynamic switching bias circuit capable of processing video signals, which enables low power consumption, and operation in wide bandwidths and low power supply voltages, is proposed. In this filter, charge transfer operations through two-phase clock pulses during the on-state period of the OP…
Read MoreModelling and Analysis of Radial Flux Surface Mounted Direct-Driven PMSG in Small Scale Wind Turbine
This paper presents the modelling and analysis of permanent magnet synchronous generator (PMSG) which are used in direct driven small scale wind turbines. The 3 kW PM generator which is driven directly without gear system is analyzed by Ansoft Maxwell 2D RMxprt. The performance analysis of generator includes the cogging torque in two teeth, induced…
Read MoreDiscovering Interesting Biological Patterns in the Context of Human Protein-Protein Interaction Network and Gene Disease Profile Data
The current advances in proteomic and transcriptomic technologies produced huge amounts of high-throughput data that spans multiple biological processes and characteristics in different organisms. One of the important directions in today’s bioinformatics research is to discover patterns of genes that have interesting properties. These groups of genes can be referred to as functional modules. Detecting…
Read MoreSelective Electron Beam Melting Manufacturing of Electrically Small Antennas
Real estate pressures in modern electronics have resulted in the need for electrically small antennas, which have subsequently garnered interest amongst researchers and industry alike. These antennas are characterized by their largest dimensions translating to a fraction of the operating wavelength; such a diminutive size comes at the expense of reduced gain and efficiency, and…
Read MoreReal-Time Flux-weakening Control for an IPMSM Drive System Using a Predictive Controller
This paper proposes extended-range high-speed control for an IPMSM drive system. A simple real-time tuning flux-weakening control algorithm is proposed and implemented to control an IPMSM drive system in a wide variable speed range, from 3 r/min up to 2700 r/min. This flux-weakening control algorithm does not require any motor parameters and only needs simple…
Read MoreSmartphone Based Heart Attack Risk Prediction System with Statistical Analysis and Data Mining Approaches
Nowadays, Ischemic Heart Disease (IHD) (Heart Attack) is ubiquitous and one of the major reasons of death worldwide. Early screening of people at risk of having IHD may lead to minimize morbidity and mortality. A simple approach is proposed in this paper to predict risk of developing heart attack using smartphone and data mining. Clinical…
Read MoreOptimization of Depth-Based Routing for Underwater Wireless Sensor Networks through Intelligent Assignment of Initial Energy
Underwater Wireless Sensor Networks (UWSNs) are extensively used to explore the diverse marine environment. Energy efficiency is one of the main concerns regarding performance of UWSNs. In a cooperative wireless sensor network, nodes with no energy are known as coverage holes. These coverage holes are created due to non-uniform energy utilization by the sensor nodes…
Read MoreKalman filter Observer for SoC prediction of Lithium cells
The SoC estimation of Li Ion batteries presents a difficult task for almost applications in order to ensure their higher energy density and their safety. Hence, there have been several methods to optimize the state of charge of the Lithium cells such as observer strategies which have been considered in this work. Kalman filter observer…
Read MoreA New profiling and pipelining approach for HEVC Decoder on ZedBoard Platform
New multimedia applications such as mobile video, high-quality Internet video or digital television requires high-performance encoding of video signals to meet technical constraints such as runtime, bandwidth or latency. Video coding standard h.265 HEVC (High Efficiency Video Coding) was developed by JCT-VC to replace the MPEG-2, MPEG-4 and h.264 codecs and to respond to these…
Read MoreInvestigating the Expertise Indicators of Vulnerability Discovery Professionals
In crowdsourcing, selecting the person with suitable expertise is very important; especially since the task requester is not always in direct contact with the worker. Recently, this has become increasingly important particularly when the crowdsourced tasks are complex and require skillful workers (e.g. software development, software testing, vulnerability discovery, and open innovation). In this paper,…
Read MoreA Cost Effective Security Technology Integrated with RFID Based Automated Toll Collection System
Crime statistics and research on criminology show that under similar circumstances,crimes are more likely to occur in developing countries than in developed countries due to their lack ofsecurity measures. Transport crimes on highways and bridges are one of the most common crimes in the developing nations. Automation of various systems like the toll collection system…
Read MoreMonitoring power breakers using vibro acoustic techniques
Speaking about the commutation’s equipment, it can be said that the best solution in increasing reliability and lowering the maintenance costs is a continuous monitoring of the equipment. However, if the price/quality ratio is considered, it is obvious that, for the moment, the diagnosis can be also an acceptable solution. Nowadays the predictive maintenance for…
Read More
