Robust adaptive controllers for multivariable nonlinear systems with fast convergence rate are designed, in spite of unwanted effects of external disturbances and input constraints. The proposed adaptive controller gu...
详细信息
Information security is currently a major problem for data communication. Cryptography has emerged as a treatment and is essential to information security systems. Techniques for encryption can effectively prevent att...
详细信息
A Semantic Web is able to describe things in such a way that computers can understand easily. Statements are built using syntax rules, which are the rules for building the language. The Semantic Web is not about links...
详细信息
A Botnet is a malicious network that can be leveraged in a wide range of cyber-attacks with possibly catastrophic results. Consequently, botnet detection is a high priority. In the past few years, many studies have be...
详细信息
In this paper, we are presenting a tri-band Planar Inverted F Antenna (PIFA) for mobile application. PIFA basically consist of ground plate, patch, feed and shortening pin connected to ground plate. Antenna is designe...
详细信息
This paper addressed the development of an augmented reality (AR) based scientific visualization system prototype that supports identification, localisation, and 3D visualisation of oil leakages sensors datasets. Sens...
详细信息
This paper addressed the development of an augmented reality (AR) based scientific visualization system prototype that supports identification, localisation, and 3D visualisation of oil leakages sensors datasets. Sensors generates significant amount of multivariate datasets during normal and leak situations which made data exploration and visualisation daunting tasks. Therefore a model to manage such data and enhance computational support needed for effective explorations are developed in this paper. A challenge of this approach is to reduce the data inefficiency. This paper presented a model for computing information gain for each data attributes and determine a lead *** computed lead attribute is then used for the development of an AR-based scientific visualization interface which automatically identifies, localises and visualizes all necessary data relevant to a particularly selected region of interest (ROI) on the network. Necessary architectural system supports and the interface requirements for such visualizations are also presented.
Lin et al. proposed a non-expansion method to improve the image quality of the recovered image in visual cryptography by taking into account the distribution of black pixels. This paper proposes a new non-expansion me...
详细信息
Common-mode voltages (CMVs) can lead to premature failure of the motor insulation system in medium-voltage (MV) current source drives. This paper proposes a novel space-vector modulation (SVM) based gating strategy th...
详细信息
This paper suggests a new policy for consolidating a company’s profits by segregating the clients using the contents service and allocating the media server’s resources distinctively by clusters using the cluster an...
详细信息
We investigate adversarial network coding and decoding focusing on the multishot regime. Errors can occur on a proper subset of the network edges and are modeled via an adversarial channel. The paper contains both bou...
详细信息
暂无评论