We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 10,000 results
  1. A Critical Review of Distributed Generations Planning in Distribution Networks for Improved System Performances

    With the help of a range of load models including static, dynamic, composite, and realistic load models, the planning of distributed generations...

    Ravindra Kumar, B. K. Singh, Bindeshwar Singh in Journal of The Institution of Engineers (India): Series B
    Article 14 July 2024
  2. Text summarization based on semantic graphs: an abstract meaning representation graph-to-text deep learning approach

    Nowadays, due to the constantly growing amount of textual information, automatic text summarization constitutes an important research area in natural...

    Panagiotis Kouris, Georgios Alexandridis, Andreas Stafylopatis in Journal of Big Data
    Article Open access 14 July 2024
  3. Review of Deep Learning Techniques for Neurological Disorders Detection

    Neurological disease is one of the most common types of dementia that predominantly concerns the elderly. In clinical approaches, identifying its...

    Akhilesh Kumar Tripathi, Rafeeq Ahmed, Arvind Kumar Tiwari in Wireless Personal Communications
    Article 14 July 2024
  4. Information flow control for comparative privacy analyses

    The prevalence of web tracking and its key characteristics have been extensively investigated by the research community by means of large-scale web...

    Zubair Ahmad, Stefano Calzavara, ... Ben Stock in International Journal of Information Security
    Article 14 July 2024
  5. Energy Efficient Routing in Cluster Based Heterogeneous Wireless Sensor Network Using Hybrid GWO and Firefly Algorithm

    Object tracking application is one of the important as well as challenging application of energy constrained Wireless Sensor Network (WSN).Timely and...

    Jayashree Dev, Jibitesh Mishra in Wireless Personal Communications
    Article 14 July 2024
  6. Techniques for Generating Sign Language a Comprehensive Review

    Sign verbal is an important communication medium regarding the community of Deaf and Hard of Hearing, and advances in sign language generation...

    Article 13 July 2024
  7. Trust attack prevention based on Spark-blockchain in social IoT: a survey

    Integrating the Internet of Things (IoT) with Social Networks (SN) has given rise to a new paradigm called Social IoT, which allows users and objects...

    Mariam Masmoudi, Ikram Amous, ... Florence Sèdes in International Journal of Information Security
    Article 13 July 2024
  8. EFTVG: An Energy Efficient Fuzzy–Timer Clustering Approach in an Adaptive Virtual Grid Cluster Based WSN

    Clustering is an effective way that improves WSN lifetime. In this paper, unlike the other approaches, an adaptive virtual grid is conducted to form...

    Armin Mazinani, Sayyed Majid Mazinani, Mohammed Jasim Mohammed Alyasiri in Wireless Personal Communications
    Article 13 July 2024
  9. Construction of all even lengths type-II Z-complementary pair with a large zero-correlation zone

    This paper presents a direct construction of type-II Z-complementary pair (ZCP) of q -ary ( q is even) for all even lengths with a wide...

    Piyush Priyanshu, Subhabrata Paul, Sudhan Majhi in Cryptography and Communications
    Article 12 July 2024
  10. Dcaro: Dynamic cluster formation and AUV-aided routing optimization for energy-efficient UASNs

    In Underwater Acoustic Sensor Networks (UASNs), optimizing energy efficiency and minimizing void occurrences in routing is paramount. Due to the...

    Kammula Sunil Kumar, Deepak Singh, Veena Anand in Peer-to-Peer Networking and Applications
    Article 12 July 2024
  11. Load Balancing in Cloud Environment Using Opposition Based Spider Monkey Optimization

    Using cloud computing, user can pool resources in a distributed environment. These resources can be accessed wherever and whenever the provider...

    Article 12 July 2024
  12. Winning Region Determination and Optimal Cooperative Guidance Design in a Pursuer–Evader–Defender Game

    In this paper, we study the pursuer–evader–defender game under the isotropic rocket model. The game involves three agents: the evader, the pursuer,...

    Wei Yongshang, Liu Tianxi, Wei Cheng in Dynamic Games and Applications
    Article 12 July 2024
  13. Implementing Blockchain Technology in the Indian Context to Enable the Secure Exchange of Patients’ Information with Government Agencies

    The healthcare sector has endured significant challenges due to its incapacity to exchange sensitive patient information. Throughout the battle...

    Poonam Verma, Vikas Tripathi, Bhaskar Pant in Journal of The Institution of Engineers (India): Series B
    Article 12 July 2024
  14. Flexible localization protocol for underwater wireless sensor networks using hybrid reward evaluation scheme

    Underwater Wireless Sensor Networks (UWSNs) must recognize sensor nodes and estimate their locations. A reliable underwater data forwarding relay is...

    Rupinder Kaur, Sonia Goyal in Peer-to-Peer Networking and Applications
    Article 12 July 2024
  15. Discreet: distributed delivery service with context-aware cooperation

    End-to-end encrypted messaging applications such as Signal became widely popular thanks to their capability to ensure the confidentiality and...

    Ludovic Paillat, Claudia-Lavinia Ignat, ... Amine Ismail in Annals of Telecommunications
    Article 11 July 2024
  16. Appropriate Mother Wavelet Selection with Optimum Level of Disintegration for Analyzing Various Faults of Induction Motor Under Variation in Motor Loading

    Current signature analysis is used successfully for induction motor fault detection. A common mathematical tool for assessing fault signals is the...

    Arunava Kabiraj Thakur, Alok Mukherjee, ... Arabinda Das in Journal of The Institution of Engineers (India): Series B
    Article 11 July 2024
  17. A Novel Method for Design and Implementation of Systolic Associative Cascaded Variable Leaky Least Mean Square Adaptive Filter for Denoising of ECG Signals

    Electrocardiogram is the most essential diagnostic test for heart disease detection in this era, where it has low frequency and small amplitude,...

    Chitra Manickam, Murugesan Govindasamy, ... Muneeshwari Paramasivam in Wireless Personal Communications
    Article 11 July 2024
  18. Decentralized traffic management of autonomous drones

    Coordination of local and global aerial traffic has become a legal and technological bottleneck as the number of unmanned vehicles in the common...

    Boldizsár Balázs, Tamás Vicsek, ... Gábor Vásárhelyi in Swarm Intelligence
    Article Open access 11 July 2024
  19. A powerful adversary model and corresponding OTP time slot allocation scheme in RIS-assisted physical layer key generation

    Physical layer key generation (PLKG) is a technique of information-theoretic security to tackle the problem of key distribution between...

    Liquan Chen, Yufan Song, ... Liang Chen in EURASIP Journal on Wireless Communications and Networking
    Article Open access 11 July 2024
  20. Virtual home staging and relighting from a single panorama under natural illumination

    Virtual staging technique can digitally showcase a variety of real-world scenes. However, relighting indoor scenes from a single image is challenging...

    Guanzhou Ji, Azadeh O. Sawyer, Srinivasa G. Narasimhan in Machine Vision and Applications
    Article Open access 11 July 2024
Did you find what you were looking for? Share feedback.