Dataset Viewer
Auto-converted to Parquet Duplicate
FileName
stringlengths
17
17
Abstract
stringlengths
163
6.01k
Title
stringlengths
12
421
S001044851300239X
This article presents a generalized B -spline surface subdivision scheme of arbitrary order with a tension parameter. We first propose a tensor-product subdivision scheme that produces k u × k v order generalized B -spline limit surfaces. Generalized B -spline surface is the unified and extended form of B -splines, tri...
A generalized surface subdivision scheme of arbitrary order with a tension parameter
S001044851400061X
Axisymmetry and planar reflective symmetry properties of mechanical components can be used throughout a product development process to restructure the modeling process of a component, simplify the computation of tool path trajectories, assembly trajectories, etc. To this end, the restructured geometric model of such co...
Fast global and partial reflective symmetry analyses using boundary surfaces of mechanical components
S0020019014001987
We study the characteristics of straight skeletons of monotone polygonal chains and use them to devise an algorithm for computing positively weighted straight skeletons of monotone polygons. Our algorithm runs in O ( n log ⁡ n ) time and O ( n ) space, where n denotes the number of vertices of the polygon.
A simple algorithm for computing positively weighted straight skeletons of monotone polygons
S0045782513000479
This article presents a novel approach to collision detection based on distance fields. A novel interpolation ensures stability of the distances in the vicinity of complex geometries. An assumed gradient formulation is introduced leading to a C 1 -continuous distance function. The gap function is re-expressed allowing ...
Distance fields on unstructured grids: Stable interpolation, assumed gradients, collision detection and gap function
S0045782513001448
Incompressible smoothed particle hydrodynamics generally requires particle distribution smoothing to give stable and accurate simulations with noise-free pressures. The diffusion-based smoothing algorithm of Lind et al. (J. Comp. Phys. 231 (2012) 1499–1523) has proved effective for a range of impulsive flows and propag...
Incompressible smoothed particle hydrodynamics (SPH) with reduced temporal noise and generalised Fickian smoothing applied to body–water slam and efficient wave–body interaction
S0045782513001473
We propose a new hybrid algorithm for incompressible micro and nanoflows that applies to non-isothermal steady-state flows and does not require the calculation of the Irving–Kirkwood stress tensor or heat flux vector. The method is validated by simulating the flow in a channel under the effect of a gravity-like force w...
A Laplacian-based algorithm for non-isothermal atomistic-continuum hybrid simulation of micro and nano-flows
S0045782514000607
The Lagrange Multiplier (LM) and penalty methods are commonly used to enforce incompressibility and compressibility in models of cardiac mechanics. In this paper we show how both formulations may be equivalently thought of as a weakly penalized system derived from the statically condensed Perturbed Lagrangian formulati...
A displacement-based finite element formulation for incompressible and nearly-incompressible cardiac mechanics
S0045782514001492
Discrete element methods can be based on either penalties or impulses to resolve collisions. A generic impulse based method, the energy tracking method (ETM), is described to resolve collisions between multiple non-convex bodies in three dimensions. As opposed to the standard sequential impulse method (SQM) and simulta...
An impulse-based energy tracking method for collision resolution
S0045782514002291
We consider the extension of the Nitsche method to the case of fluid–structure interaction problems on unfitted meshes. We give a stability analysis for the space semi-discretized problem and show how this estimate may be used to derive optimal error estimates for smooth solutions, irrespectively of the mesh/interface ...
An unfitted Nitsche method for incompressible fluid–structure interaction using overlapping meshes
S0045782514002874
In level set methods for structural topology and shape optimization, the level set function gradients at the design interface need to be controlled in order to ensure stability of the optimization process. One popular way to do this is to enforce the level set function to be a signed distance function by periodically u...
Structural topology and shape optimization using a level set method with distance-suppression scheme
S0045782514004812
Issues related to space–time adaptivity for a class of nonlinear and time-dependent problems are discussed. The dG(k)-methods are adopted for the time integration, and the a posteriori error control is based on the appropriate dual problem in space–time. One key ingredient is to decouple the error generation in space a...
A sequential-adaptive strategy in space–time with application to consolidation of porous media
S0045782516000037
In this paper, a discontinuous Galerkin method for a nonlinear shear-flexible shell theory is proposed that is suitable for both thick and thin shell analysis. The proposed method extends recent work on Reissner–Mindlin plates to avoid locking without the use of projection operators, such as mixed methods or reduced in...
A discontinuous Galerkin method for nonlinear shear-flexible shells
S0045782516000050
We extend the hierarchical multiscale design framework of Nakshatrala et al. (2013) to nonlinear elastodynamics wherein we use topology optimization to design material micro-structures to achieve desired energy propagation in nonlinear elastic material systems subjected to impact loading. As in Part I, a well-posed top...
Nonlinear structural design using multiscale topology optimization. Part II: Transient formulation
S0045782516300068
A novel non-intrusive reduced order model (NIROM) for fluid–structure interaction (FSI) has been developed. The model is based on proper orthogonal decomposition (POD) and radial basis function (RBF) interpolation method. The method is independent of the governing equations, therefore, it does not require modifications...
Non-intrusive reduced order modelling of fluid–structure interactions
S0045782516300111
This work is concerned with the development of an efficient and robust isogeometric Reissner–Mindlin shell formulation for the mechanical simulation of thin-walled structures. Such structures are usually defined by non-uniform rational B-splines (NURBS) surfaces in industrial design software. The usage of isogeometric ...
An efficient and robust rotational formulation for isogeometric Reissner–Mindlin shell elements
S0045782516300214
While the interest in higher-order models in physics and mechanics grows, their numerical simulation still poses a challenge, especially for arbitrary shaped three-dimensional domains. This contribution presents the mathematical framework as well as the application to different problems in the field of material science...
Isogeometric analysis and hierarchical refinement for higher-order phase-field models
S0045782516300287
This work proposes a hybrid modelling technique for efficient analysis of poroelastic materials, which are widely used for noise reduction in acoustic problems. By combining the finite element method and the wave based method in a direct manner, the proposed hybrid technique maximises the advantages and compensates the...
A direct hybrid finite element–wave based modelling technique for efficient analysis of poroelastic materials in steady-state acoustic problems
S0045782516300354
In this work, we present a statistical treatment of stress-life (S-N) data drawn from a collection of records of fatigue experiments that were performed on 75S-T6 aluminum alloys. Our main objective is to predict the fatigue life of materials by providing a systematic approach to model calibration, model selection and ...
Bayesian inference and model comparison for metallic fatigue data
S0045782516300524
The avascular multiphase model for tumor growth, developed by the authors in previous works, is enhanced to include angiogenesis. The original model comprises the extracellular matrix (ECM) as porous solid phase and three fluid phases: living and necrotic tumor cells (TCs), host cells (HCs), and the interstitial fluid....
Simulation of angiogenesis in a multiphase tumor growth model
S0045782516300639
The numerical manifold method (NMM) surmounting the mesh dependence has successfully solved very complicated problems involving small deformation and large movement, but had few applications to large deformation and large rotation problems because the false volume expansion and other issues exist. In this study it is s...
S–R decomposition based numerical manifold method
S0045782516300834
This work proposes a stochastic shape optimization method for continuous structures using the level-set method. Such a method aims to minimize the expected compliance and its variance as measures of the structural robustness. The behavior of continuous structures is modeled by linear elasticity equations with uncertain...
Robust shape optimization of continuous structures via the level set method
S0045782516300895
This work evaluates the performance of a NURBS-based isogeometric finite element formulation for solving stationary acoustic problems in two dimensions. An initial assessment is made by studying eigenvalue problems for a square and a circular domain. The spectral approximation properties of NURBS functions of varying o...
A performance study of NURBS-based isogeometric analysis for interior two-dimensional time-harmonic acoustics
S0045782516300901
Discontinuous deformation analysis (DDA) is a numerical method for analyzing dynamic behaviors of an assemblage of distinct blocks, with the block displacements as the basic variables. The contact conditions are approximately satisfied by the open–close iteration, which needs to fix or remove repeatedly the virtual spr...
Dual form of discontinuous deformation analysis
S0045782516300913
This contribution presents Bézier extraction of truncated hierarchical B -splines and the application of the approach to adaptive isogeometric analysis. The developed procedures allow for the implementation of hierarchical B -splines and NURBS without the need for an explicit truncation of the basis. Moreover, standard...
Bézier extraction and adaptive refinement of truncated hierarchical NURBS
S0045782516300925
Recently, new families of mixed finite elements have been proposed to address the analysis of linear elastic bodies on regular grids adopting a limited number of degrees of freedom per element. A two-dimensional mixed discretization is implemented to formulate an alternative topology optimization problem where stresses...
Topology optimization with mixed finite elements on regular grids
S0045782516300950
This paper addresses the use of isogeometric analysis to solve solid mechanics problems involving nearly incompressible materials. The present work is focused on extension of two-field mixed variational formulations in both small and large strains to isogeometric analysis. Inf–sup stable displacement–pressure combinati...
Subdivision based mixed methods for isogeometric analysis of linear and nonlinear nearly incompressible materials
S0045782516300974
In this work, we intend to address the limitation of our earlier particle method, namely the Moving Particle Pressure Mesh (MPPM) method in handling arbitrary-shaped flow boundaries. The application of the Cartesian pressure mesh system adopted in our original MPPM method, which serves as the main key in recovering the...
Unstructured Moving Particle Pressure Mesh (UMPPM) method for incompressible isothermal and non-isothermal flow computation
S0045782516301001
We develop a fractional extension of a mass-conserving Allen–Cahn phase field model that describes the mixture of two incompressible fluids. The fractional order controls the sharpness of the interface, which is typically diffusive in integer-order phase-field models. The model is derived based on an energy variational...
A fractional phase-field model for two-phase flows with tunable sharpness: Algorithms and simulations
S0045782516301049
In this paper we present a multi-fidelity (MF) extension of non-intrusive polynomial chaos based on regression (point collocation) for uncertainty quantification purposes. The proposed method uses the principle of a global correction function from a previous similar method that uses spectral projection to estimate the ...
Multi-fidelity non-intrusive polynomial chaos based on regression
S0045782516301128
The present work is dedicated to the detection of Lagrangian Coherent Structures (LCSs) in viscous flows through the Finite-Time Lyapunov Exponents (FTLEs) which have been addressed by several works in the recent literature. Here, a novel numerical technique is presented in the context of the Smoothed Particle Hydrodyn...
Detection of Lagrangian Coherent Structures in the SPH framework
S0045782516301281
Variational Multiscale (VMS) Finite Element Methods (FEMs) are robust for the development of general formulations for the solution of multiphysics and multiscale transport problems. To obtain a tractable and computationally efficient model, VMS methods often rely on a residual-based algebraic approximation of the sub-g...
Algebraic approximation of sub-grid scales for the variational multiscale modeling of transport problems
S0045782516301323
An efficient and reliable stress computation algorithm is presented, which is based on implicit integration of the local evolution equations of multiplicative finite-strain plasticity/viscoplasticity. The algorithm is illustrated by an example involving a combined nonlinear isotropic/kinematic hardening; numerous backs...
Efficient implicit integration for finite-strain viscoplasticity with a nested multiplicative split
S0045782516301347
This paper explores the application of maximum-entropy methods (max-ent) to time harmonic acoustic problems. Max-ent basis functions are mesh-free approximants that are constructed observing an equivalence between basis functions and discrete probability distributions and applying Jaynes’s maximum entropy principle. Th...
Maximum-entropy methods for time-harmonic acoustics
S0045782516301372
This paper presents a novel topology optimization method for designing structures with multiphase embedded components under minimum distance constraints in the level set framework. By using the level set representation for both the component layout and the host structure topology, the shapes of the components can be ea...
Structural topology optimization with minimum distance control of multiphase embedded components by level set method
S0045782516301517
In this work, a novel comparative method for highly brittle materials such as aragonite crystals is proposed, which provides an efficient and accurate in-sight understanding for multi-scale fracture modeling. In particular, physically-motivated molecular dynamics (MD) simulations are performed to model quasi-static bri...
A comparative molecular dynamics-phase-field modeling approach to brittle fracture
S0045782516302626
Non-Uniform Rational B-splines (NURBS) and T-splines can have some drawbacks when modelling damage and fracture. The use of Powell–Sabin B-splines, which are based on triangles, can by-pass these drawbacks. Herein, smeared as well as discrete approaches to fracture in quasi-brittle materials using Powell–Sabin B-spline...
Powell–Sabin B-splines for smeared and discrete approaches to fracture in quasi-brittle materials
S0045790613002474
Industrial image processing tasks, especially in the domain of optical metrology, are becoming more and more complex. While in recent years standard PC components were sufficient to fulfill the requirements, special architectures have to be used to build high-speed image processing systems today. For example, for adapt...
Fast image processing for optical metrology utilizing heterogeneous computer architectures
S0045790613002504
With the development of the 6LoWPAN standard, sensors can be natively integrated into the IP world, becoming tiny information providers that are directly addressable by any Internet-connected party. To protect the information gathered by sensors from any potential attacker on the Internet, it is essential to have trust...
Analytical evaluation of a time- and energy-efficient security protocol for IP-enabled sensors
S0045790614000391
In cognitive radio networks, it is well known that the cooperative spectrum sensing can overcome damaging effects of fading and shadowing. However, it also increases the amount of energy consumption which is a critical factor in low powered wireless communications. In this paper based on bi-threshold energy detection, ...
Optimized energy limited cooperative spectrum sensing in cognitive radio networks
S0045790614000457
With reference to a network consisting of sensor nodes connected by wireless links, we approach the problem of the distribution of the cryptographic keys. We present a solution based on communication channels connecting sequences of adjacent nodes. All the nodes in a channel share the same key. This result is obtained ...
Key propagation in wireless sensor networks
S0045790614000688
When wireless sensor networks (WSNs) are deployed in areas inaccessible by human beings, security becomes extremely important, as they are prone to different types of malicious attacks. We propose a scheme to build a security mechanism in a query-processing paradigm within WSNs with clustered architecture. This work ai...
A lightweight security scheme for query processing in clustered wireless sensor networks
S0045790614000706
Thresholding is a popular image segmentation method that converts a grayscale image into a binary image. In this paper, we propose a cloud model-based framework for range-constrained thresholding with uncertainty, and improve four traditional methods. The method involves four major steps, including representing the ima...
Cloud model-based method for range-constrained thresholding
S0045790614001347
Cognitive radio (CR) technology can solve the problems of spectrum scarcity and low spectrum utilization. However, random behavior of the primary user (PU) appears to be an enormous challenge. In this paper, we propose a PU behavior aware joint channel selection and allocation scheme. In the first step, the channels ar...
Primary user behavior aware spectrum allocation scheme for cognitive radio networks
S0045790614001669
Having a direct effect on network lifetime, balanced energy consumption is one of the key challenges in wireless networks. In this paper, we investigate the effects of node mobility on energy balancing in wireless networks. We construct a Linear Programming (LP) framework that jointly captures data routing, mobility, a...
Effects of node mobility on energy balancing in wireless networks
S0045790614001761
The number of wireless sensor network deployments for real-life applications has rapidly increased in recent years. However, power consumption is a critical problem affecting the lifetime of wireless sensor networks (WSNs). A number of techniques have been proposed to solve this power problem. Among the proposed techni...
Fast and efficient lossless adaptive compression scheme for wireless sensor networks
S0045790614001840
Virtual fixtures can be used in haptic-enabled hydraulic telemanipulators to facilitate certain tasks. Using this concept, however, the operator may tend to move the master fast due to relying on the virtual fixture. As a result, the slave manipulator could start to lag due to latency in the hydraulic actuation control...
An augmented virtual fixture to improve task performance in robot-assisted live-line maintenance
S0045790614001888
The main constraint of wireless sensor networks (WSNs) is the limited and generally irreplaceable power source of the sensor nodes. Therefore, designing energy saving routing algorithm is one of the most focused research issues. In this paper, we propose an energy aware routing algorithm for cluster based WSNs. The alg...
Energy-aware routing algorithm for wireless sensor networks
S0045790614001918
Cognitive radio is an emerging technology in wireless communications for dynamically accessing under-utilized spectrum resources. In order to maximize the network utilization, vacant channels are assigned to cognitive users without interference to primary users. This is performed in the spectrum allocation (SA) module ...
Field programmable gate array implementation of spectrum allocation technique for cognitive radio networks
S0045790614002109
Compressed sensing recovers a sparse signal from a small set of linear, nonadaptive measurements. A sparse signal can be represented by compressed measurements with a reduced number of projections on a set of random vectors. In this paper, a multiscale compressed sensing based processing is investigated for an electroc...
Coding ECG beats using multiscale compressed sensing based processing
S0045790614002110
In this study, the Quality of Service (QoS) needed to support service continuity in heterogeneous networks is achieved by a Distributed Multi-Agent Scheme (DMAS) based on cooperation concepts and an awareness algorithm. A set of problem solving agents autonomously process local tasks and cooperatively interoperate via ...
Distributed multi-agent scheme support for service continuity in IMS-4G-Cloud networks
S0045790614002146
This paper presents a novel scheme to implement blind image watermarking based on the feature parameters extracted from a composite domain including the discrete wavelet transform (DWT), singular value decomposition (SVD), and discrete cosine transform (DCT). Multiple bits can be embedded into a single image block by a...
Exploring DWT–SVD–DCT feature parameters for robust multiple watermarking against JPEG and JPEG2000 compression
S0045790614002195
MapReduce is considered the key behind the success of cloud computing because it not only makes a cluster highly scalable but also allows applications to use resources in a cluster. However, MapReduce achieves this simplicity at the expense of flexibility for data partitioning, localization, and processing procedures b...
Flexible architecture for cluster evolution in cloud computing
S0045790614002213
A fundamental challenge in the design of Wireless Sensor Network (WSNs) is the proper utilization of resources that are scarce. The critical challenge is to maximize the bandwidth utilization in data gathering and forwarding from sensor nodes to the sink. The main design objective is to utilize the available bandwidth ...
Bandwidth efficient cluster-based data aggregation for Wireless Sensor Network
S0045790614002328
This work presents an analysis on efficiency of solar energy harvesting circuits focused on low power, low voltage sensor platforms. Two different approaches were tested in order to operate a solar panel closely to its maximum power point. The first circuit precisely matches the solar cells with the batteries. The seco...
Experimental analysis of solar energy harvesting circuits efficiency for low power applications
S0045790614002353
Widely deployed real-time embedded systems can improve the performance of industrial applications, but these systems also face the critical challenge of providing high quality security in an unpredictable network environment. We measure the time and energy consumptions of commonly used cryptographic algorithms on a rea...
Dynamic security management for real-time embedded applications in industrial networks
S0045790614002377
Glossy is a reliable and low latency flooding mechanism designed primarily for distributed communication in wireless sensor networks (WSN). Glossy achieves its superior performance over tree-based wireless sensor networks by exploiting identical concurrent transmissions. WSNs are subject to wireless attacks aimed to di...
An experimental study of attacks on the availability of Glossy
S0045790614002390
This paper presents a new approach for verifying user identity in pervasive environments using a non-intrusive behaviour tracking technique that offers minimum interruption to the user’s activities. The technique, termed Non-intrusive Identity Assertion System (NIAS), uses knowledge of how the user uses the environment...
Discreet verification of user identity in pervasive computing environments using a non-intrusive technique
S0045790614002407
An important issue to be addressed when data are to be published is data privacy. In this paper, the problem of data privacy based on a prominent privacy model, ( k , e ) -Anonymous, is addressed. Our scenario is that when a new dataset is to be released, there may be, at the same time, datasets that were released else...
An incremental privacy-preservation algorithm for the (k, e)-Anonymous model
S0045790614002419
Independent fine-grain web services can be integrated to a value-added coarse-grain service through service composition technologies in Service Oriented Architecture. With the advent of cloud computing, more and more web services in cloud may provide the same function but differ in performance. In addition, the develop...
A genetic-based approach to web service composition in geo-distributed cloud environment
S0045790614002560
Botnets continue to be used by attackers to perform various malicious activities on the Internet. Over the past years, many botnet detection techniques have been proposed; however, most of them cannot detect botnets in an early stage of their lifecycle, or they often depend on a specific command and control protocol. I...
BotGrab: A negative reputation system for botnet detection
S0045790614002572
This paper focuses on the spectrum sensing mechanisms, which could improve network throughput through the sensing strategy optimization and cooperative spectrum sensing methods. In order to guarantee an integrated and effective research, we take the whole channel scenarios into consideration, i.e., Single Secondary use...
Interference-aware spectrum sensing mechanisms in cognitive radio networks
S0045790614002584
Openflow, a novel Software Defined Network (SDN) technology, is developing rapidly and has already been utilized in many fields. It facilitates decoupling between the control and forwarding plane, enabling users to code the network functions easily and replace the traditional high-cost network functions devices. The Fl...
A distributed storage framework of FlowTable in software defined network
S0045790614002596
A wireless ad hoc network consists of a set of wireless devices. The wireless devices are capable of communicating with each other without the assistance of base stations. Space Division Multiple Access (SDMA) is a new technology designed to optimize the performance of current and future mobile communication systems. I...
An SDMA-based MAC protocol for wireless ad hoc networks with smart antennas
S0045790614002614
Online induction machine faults diagnosis is a concern to guarantee the overall production process efficiency. Nowadays, the industry demands the integration of smart wireless sensors networks (WSN) to improve the fault detection in order to reduce cost, maintenance and power consumption. Induction motors can develop o...
Smart wireless sensor networks for online faults diagnosis in induction machine
S0045790614002626
Smart Grid makes use of Information and Communications Technology (ICT) infrastructures for the management of the generation, transmission and consumption of electrical energy to increase the efficiency of remote control and automation systems. One of the most widely accepted standards for power system communication is...
Using Software Defined Networking to manage and control IEC 61850-based systems
S0045790614002663
Active authentication is the process of continuously verifying a user based on their on-going interaction with a computer. In this study, we consider a representative collection of behavioral biometrics: two low-level modalities of keystroke dynamics and mouse movement, and a high-level modality of stylometry. We devel...
Multi-modal decision fusion for continuous authentication
S0045790614002687
This paper focuses on the design of a novel low power twelve transistor static random access memory (12T SRAM) cell. In the proposed structure two voltage sources are used, one connected with the bit line and the other one connected with the bitbar line in order to reduce the swing voltage at the output nodes of the bi...
A design of low swing and multi threshold voltage based low power 12T SRAM cell
S0045790614002705
Previous distributed file systems aim at storing very large data sets. Their architectures are often designed to support large-scale data-intensive applications, which cannot cope with massive daily users who want to store their data on the Internet. In this paper, CSTORE is proposed to support mass data storage for a ...
CSTORE: A desktop-oriented distributed public cloud storage system
S0045790614002717
Service composition is an evolving approach that increases the number of applications of cloud computing by reusing existing services. However, the available methods focus on generating composite services from a single cloud, which limits the benefits that are derived from other clouds. This paper proposes a novel COMb...
A combinatorial optimization algorithm for multiple cloud service composition
S0045790614002729
A fault detection method based on dynamic kernel slow feature analysis (DKSFA) is presented in the paper. SFA is a new feature extraction technology which can find a group of slowly varying feature outputs from the high-dimensional inputs. In order to analyze the nonlinear dynamic characteristics of the process data, D...
Process fault detection based on dynamic kernel slow feature analysis
S0045790614002845
This study presents a new weak signal detection method based on the van der Pol–Duffing oscillator. The principle of the proposed method is described. A weak signal is detected through the transition from the chaotic to the periodic state. Numerical simulation shows that the van der Pol–Duffing oscillator is sensitive ...
Application of van der Pol–Duffing oscillator in weak signal detection
S0045790614003036
Biometric-based personal authentication is receiving a widespread interest in the area of research due to its high applicability in a wide range of security applications. Among these, hand-based biometric systems are considered to be more successful in terms of accuracy and computational complexity. In hand-based biome...
Finger knuckle biometrics – A review
S0045790614003073
In this paper, an Android based home automation system that allows multiple users to control the appliances by an Android application or through a web site is presented. The system has three hardware components: a local device to transfer signals to home appliances, a web server to store customer records and support se...
A cloud based and Android supported scalable home automation system
S0045790614003097
Collaboration between mobile nodes is significant in Mobile Ad Hoc Networks (MANETs). The great challenges of MANETs are their vulnerabilities to various security attacks. Because of the lack of centralized administration, secure routing is challenging in MANETs. Effective secure routing is quite essential to protect n...
Enhancing secure routing in Mobile Ad Hoc Networks using a Dynamic Bayesian Signalling Game model
S0045790614003103
In this paper, a locality aware NoC communication architecture is proposed. The architecture may reduce the energy consumption and latency in MultiProcessor Systems on Chips (MPSoCs). It consists of two network layers which one layer is dedicated to the packets transmitted to near destinations and the other layer is us...
An efficient network on-chip architecture based on isolating local and non-local communications
S0045790614003115
Supervisory control and data acquisition (SCADA) systems currently use the polling technique for monitoring electric utility networks. Unfortunately, conventional SCADA systems do not suit the needs of smart grids in terms of the required data rate. Polling-based wireless networks can extend the capabilities of SCADA s...
Considerations for packet delivery reliability over polling-based wireless networks in smart grids
S0045790614003127
A memory efficient field programmable gate array (FPGA) method is described that facilitates the processing of the continuous wavelet transform (CWT) arithmetic operations. The CWT computations were performed in Fourier space and implemented on FPGA following several optimization schemes. First, the adapted wavelet fun...
Optimized FPGA based continuous wavelet transform
S0045790614003152
Advanced medical diagnosing and research requires precise information which can be obtained from measured electrophysiological data, e.g., electroencephalogram (EEG) and electrocardiograph (ECG). However, they are often contaminated with noise and a variety of bioelectric signals called artefacts, e.g., electromyograph...
A new method for removal of powerline interference in ECG and EEG recordings
S0045790614003164
Backside illuminated pixel structure is proposed and evaluated as the building block for the image sensor being used as epiretinal prosthesis implant. The image sensor pixel is designed with the parameters of 90nm technology node of standard CMOS (Complementary Metal Oxide Semiconductor) process. The image sensor is co...
Design and optimization of backside illuminated image sensor for epiretinal implants
S0045790614003188
Networks-on-Chip (NoCs) have emerged as a promising solution for the communication crisis in today’s high-performance Multi-Processor System-on-Chip (MPSoC) architectures. Routing methods have a prominent role in taking advantage of the potential benefits offered by NoCs. As a result, designing high-performance and eff...
The Hamiltonian-based odd–even turn model for maximally adaptive routing in 2D mesh networks-on-chip
S0045790614003218
XACML (eXtensible Access Control Markup Language) policies, which are widely adopted for defining and controlling dynamic access among Web/cloud services, are becoming more complex in order to handle the significant growth in communication and cooperation between individuals and composed services. However, the large si...
Semantics-based approach for detecting flaws, conflicts and redundancies in XACML policies
S0045790615000051
Blood travels throughout the body and thus its flow is modulated by changes in body condition. As a consequence, the wrist pulse signal contains important information about the status of the human body. In this work we have employed signal processing techniques to extract important information from these signals. Radia...
Study of wrist pulse signals using time domain spatial features
S0045790615000063
Wavelet packet (WP) acoustic features are found to be very promising in unvoiced phoneme classification task but they are less effective to capture periodic information from voiced speech. This motivated us to develop a wavelet packet based feature extraction technique that signifies both the periodic and aperiodic inf...
Hindi phoneme classification using Wiener filtered wavelet packet decomposed periodic and aperiodic acoustic feature
S0045790615000075
In this paper a new approach of edge-based quantization for the compression of gray scale images using an Adaptive Block Truncation Coding technique (ABTC-EQ) is proposed, to improve the compression ratio (CR) with high picture quality. Quantization is done based on the edge information contained in each block of pixel...
Adaptive block truncation coding technique using edge-based quantization approach
S0045790615000099
Data compression is a challenging process with important practical applications. Specialized techniques for lossy and lossless data compression have been the subject of numerous investigations during last several decades. Previously, we studied the use of the pseudo-distance technique (PDT) in lossless compression of c...
The pseudo-distance technique for parallel lossless compression of color-mapped images
S0045790615000105
Detecting covert information in images by means of steganalysis techniques has become increasingly necessary due to the amount of data being transmitted mainly through the Internet. However, these techniques are computationally expensive and not much attention has been paid to reduce their cost by means of available pa...
An analysis of computational models for accelerating the subtractive pixel adjacency model computation
S0045790615000130
Wireless sensor networks are formed by a large number of sensor nodes which are commonly known as motes. In the past few years, several reliable, congestion controlled and energy efficient transport layer protocols in wireless sensor networks have been developed and proposed in the literature. In this paper, we have pr...
A hybrid and dynamic reliable transport protocol for wireless sensor networks
S0045790615000142
This paper investigates an optimal adaptive rate and power transmission algorithms for Orthogonal Frequency Division Multiplexing (OFDM) – based Cognitive Radio (CR) systems. The aim was to study the problem of maximizing the overall rate achieved by the Secondary User (SU), while keeping the interference powers introd...
Optimal and suboptimal adaptive algorithms for rate and power transmission in OFDM-based Cognitive Radio systems
S0045790615000166
Orthogonal Frequency Division Multiplexing (OFDM) system has lead to significant advancement in wireless communication systems. In OFDM system multi-carriers are present. During modulation the sub-carriers are added together with same phase which increases the value of Peak-to-Average Power Ratio (PAPR). High PAPR lead...
Peak-power reduction using improved partial transmit sequence in orthogonal frequency division multiplexing systems
S0045790615000178
Wireless multimedia sensor networks (WMSNs) are capable of retrieving audio, image and video data in addition to scalar sensor data. The lifetime of these networks is mainly dependent on the communication and computational energy consumption of the node. In this paper, compressed sensing (CS)-based image transmission i...
Energy-efficient image transmission in wireless multimedia sensor networks using block-based Compressive Sensing
S0045790615000191
Diabetic retinopathy is a condition that occurs in individuals with several years of diabetes mellitus and causes a characteristic group of lesions in the retina and progressively damages it. Detecting retinal fundus diseases in advance helps ophthalmologists to apply proper treatments that may cure the disease or decr...
Investigation of the severity level of diabetic retinopathy using supervised classifier algorithms
S0045790615000208
The main goal of this paper is to propose and implement an experimental fully automatic face recognition system which will be used to annotate photographs during insertion into a database. Its main strength is to successfully process photos of a great number of different individuals taken in a totally uncontrolled envi...
Automatic face recognition system based on the SIFT features
S0045790615000221
Government agencies and many non-governmental organizations often need to publish sensitive data that contain information about individuals. The sensitive data or private data is an important source of information for the agencies like government and non-governmental organization for research and allocation of public f...
An approach for prevention of privacy breach and information leakage in sensitive data mining
S0045790615000233
In this paper we discuss the application of two-dimensional linear cellular automata (CA) rules with the help of fuzzy heuristic membership function to the problems of edge detection in image processing applications. We proposed an efficient and simple thresholding technique of edge detection based on fuzzy cellular au...
Edge detection with fuzzy cellular automata transition function optimized by PSO
S0045790615000245
In this article, we investigate the performance of a coded multiple-input multiple-output (MIMO) multi-carrier (MC) system in underwater communication, where acoustic interference and ambient noise are the two major channel impairments. The channel model considered in this work is based on the shallow water model that ...
Performance analysis of turbo-coded MIMO–OFDM system for underwater communication
S0045790615000257
The world of home automation is an exciting field that has exploded with new technologies and today is known as an area where “The internet of things” (IoT) vision becomes reality. The primary advantages that stem from this concept include how each device forms a small part of the Internet, by which the advanced system...
Raspberry Pi as a Sensor Web node for home automation
S0045790615000269
This paper presents an analysis of a mobile manipulator movement executing a pick-up task. The robot has to reach a target point with its end-effector. The configuration of the manipulator and the pose of the mobile robot define the inputs of the problem. The random profile approach is applied to deal with the aforemen...
Motion analysis of a mobile manipulator executing pick-up tasks
S0045790615000270
The main challenge in image denoising is, how to preserve the information such as edges and textures to get satisfactory visual quality when improving the signal to noise ratio. In this paper, we propose a hybrid filter bank for denoising based on wavelet filter bank and quincunx diamond filter bank. The noisy image is...
Image denoising in hybrid wavelet and quincunx diamond filter bank domain based on Gaussian scale mixture model
S0045790615000282
Provisioning of appropriate resources to cloud workloads depends on the Quality of Service (QoS) requirements of cloud workloads. Based on application requirements of cloud users, discovery and allocation of best workload – resource pair is an optimization problem. Acceptable QoS cannot be provided to the cloud users u...
Q-aware: Quality of service based cloud resource provisioning
S0045790615000294
Increasingly, companies are adopting service-oriented architectures to respond to rapid changes in the market. Even though there are excellent tools and frameworks for service-oriented architecture adoption and service development, the latest adaptation to context has not been properly dealt with yet. Current approache...
A metamodel and taxonomy to facilitate context-aware service adaptation
End of preview. Expand in Data Studio
README.md exists but content is empty.
Downloads last month
32