An optimal modulation scheme with Triple-Phase-Shift (TPS) control that increase efficiency in the whole load range is presented for a Dual Active Bridge (DAB) converter under wide output voltage range conditions. Thi...
详细信息
With the increasing number of IoT devices, there is a growing need for bandwidth to support their communication. Unfortunately, there is a shortage of available bandwidth due to preallocated bands for various services...
详细信息
In this paper, we present a new LMI-based non-iterative design strategy for static output feedback controllers with L2 Gain Performance for linear systems. In our approach, on the basis of the well-known necessary and...
详细信息
In this work, a Non-Intrusive Load Monitoring (NILM) system is designed for smart homes based on smart energy meters. The proposed solution simplifies the monitoring process by using a single set of sensors, in contra...
详细信息
Blood is vital for transporting oxygen, nutrients, and hormones to all body parts as it circulates through arteries and veins. It removes carbon dioxide, regulates body temperature, and maintains the body's immune...
详细信息
Sensors are the foundation to facilitate smart cities, smart grids, and smart transportation, and distance sensors are especially important for sensing the environment and gathering information. Researchers have devel...
详细信息
Due to the development of hacking programs, it has become easy to penetrate systems. Hence, there is a need for strong security mechanisms. The use of traditional passwords has become insufficient to secure systems. B...
详细信息
Due to the development of hacking programs, it has become easy to penetrate systems. Hence, there is a need for strong security mechanisms. The use of traditional passwords has become insufficient to secure systems. Biometric authentication is now widely used for security applications, and it has proven to be superior compared to traditional authentication methods. However, two issues need to be considered in biometric systems. The first is not to keep biometric data in its original form in the database. If biometric traits are hacked, they will no longer be of use. Biometric data should be kept in cancelable forms for reuse. The second issue is the reliance on a single biometric, which limits the verification accuracy. This can be solved by using a multimodal biometric system. Using steganography and cryptography, this paper introduces a cancelable multimodal biometric system. As voiceprints, facial images, and fingerprint images are used. In this paper, the verification is performed through the Mel frequency cepstral coefficients (MFCCs) of the voiceprints. Steganography is used as a tool to secure features extracted from voiceprints by embedding them into the facial image using block-based singular value decomposition (BSVD). Double random phase encoding (DRPE) is utilized as an encryption algorithm to generate the final cancelable templates. To increase the level of system security, fingerprint images are used as random phase masks (RPMs). Verification is performed by estimating the correlation between registered and test MFCCs. The correlation value is then compared with a threshold value, which is calculated using the distribution curves for the genuine and imposter correlations. Equal error rate (EER) values close to zero and an area under the receiver operator characteristic curve (AROC) that is close to one are obtained from the simulation results, demonstrating the outstanding performance of the suggested system. The proposed system achieves good performan
This study designs and simulates weather parameters using MEMS technology with suitable characteristics for integration into a single chip for environment monitoring. The sensing and heating filament of the temperatur...
详细信息
With the rapid growth of global air traffic, 4D-flight trajectory prediction (4D-FTP) using deep learning (DL) methods has become essential for applications such as flight delay prediction, fuel consumption analysis, ...
详细信息
暂无评论