We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 61-80 of 10,000 results
  1. On Communication Requirements for Multi-agent Consensus Seeking

    Several consensus protocols have been proposed in the literature and their convergence properties studied via a variety of methods. In all these...
    Lei Fang, Panos J. Antsaklis in Networked Embedded Sensing and Control
    Chapter
  2. Beating the Bounds on Stabilizing Data Rates in Networked Systems

    This paper applies simple, classical feedback control and quantization schemes to the problem of bit rate reduction for stabilizing unstable linear...
    Yupeng Liang, Peter Bauer in Networked Embedded Sensing and Control
    Chapter
  3. On Quantization and Delay Effects in Nonlinear Control Systems

    The purpose of this paper is to demonstrate that a unified study of quantization and delay effects in nonlinear control systems is possible by...
    Chapter
  4. Performance Evaluation for Model-Based Networked Control Systems

    The performance of a class of Model-Based Networked Control System (MB-NCS) is considered in this paper. A MB-NCS uses an explicit model of the plant...
    Luis A. Montestruque, Panos J. Antsaklis in Networked Embedded Sensing and Control
    Chapter
  5. Anticipative and Non-anticipative Controller Design for Network Control Systems

    We propose a numerical procedure to design a linear output-feedback controller for a remote linear plant in which the loop is closed through a...
    Payam Naghshtabrizi, João P. Hespanha in Networked Embedded Sensing and Control
    Chapter
  6. A semantic-based model with a hybrid feature engineering process for accurate spam detection

    Detecting spam emails is essential to maintaining the security and integrity of email communication. Existing research has made significant progress...

    Chira N. Mohammed, Ayah M. Ahmed in Journal of Electrical Systems and Information Technology
    Article Open access 15 July 2024
  7. A Critical Review of Distributed Generations Planning in Distribution Networks for Improved System Performances

    With the help of a range of load models including static, dynamic, composite, and realistic load models, the planning of distributed generations...

    Ravindra Kumar, B. K. Singh, Bindeshwar Singh in Journal of The Institution of Engineers (India): Series B
    Article 14 July 2024
  8. Review of Deep Learning Techniques for Neurological Disorders Detection

    Neurological disease is one of the most common types of dementia that predominantly concerns the elderly. In clinical approaches, identifying its...

    Akhilesh Kumar Tripathi, Rafeeq Ahmed, Arvind Kumar Tiwari in Wireless Personal Communications
    Article 14 July 2024
  9. Optimizing Image Retrieval in Cloud Servers with TN-AGW: A Secure and Efficient Approach

    The increasing use of cloud-based image storage and retrieval systems has made ensuring security and efficiency crucial. The security enhancement of...

    N. P. Ponnuviji, G. Nirmala, ... S. Indra Priyadharshini in Journal of The Institution of Engineers (India): Series B
    Article 14 July 2024
  10. Energy Efficient Routing in Cluster Based Heterogeneous Wireless Sensor Network Using Hybrid GWO and Firefly Algorithm

    Object tracking application is one of the important as well as challenging application of energy constrained Wireless Sensor Network (WSN).Timely and...

    Jayashree Dev, Jibitesh Mishra in Wireless Personal Communications
    Article 14 July 2024
  11. Techniques for Generating Sign Language a Comprehensive Review

    Sign verbal is an important communication medium regarding the community of Deaf and Hard of Hearing, and advances in sign language generation...

    Article 13 July 2024
  12. EFTVG: An Energy Efficient Fuzzy–Timer Clustering Approach in an Adaptive Virtual Grid Cluster Based WSN

    Clustering is an effective way that improves WSN lifetime. In this paper, unlike the other approaches, an adaptive virtual grid is conducted to form...

    Armin Mazinani, Sayyed Majid Mazinani, Mohammed Jasim Mohammed Alyasiri in Wireless Personal Communications
    Article 13 July 2024
  13. Dcaro: Dynamic cluster formation and AUV-aided routing optimization for energy-efficient UASNs

    In Underwater Acoustic Sensor Networks (UASNs), optimizing energy efficiency and minimizing void occurrences in routing is paramount. Due to the...

    Kammula Sunil Kumar, Deepak Singh, Veena Anand in Peer-to-Peer Networking and Applications
    Article 12 July 2024
  14. Load Balancing in Cloud Environment Using Opposition Based Spider Monkey Optimization

    Using cloud computing, user can pool resources in a distributed environment. These resources can be accessed wherever and whenever the provider...

    Article 12 July 2024
  15. Flexible localization protocol for underwater wireless sensor networks using hybrid reward evaluation scheme

    Underwater Wireless Sensor Networks (UWSNs) must recognize sensor nodes and estimate their locations. A reliable underwater data forwarding relay is...

    Rupinder Kaur, Sonia Goyal in Peer-to-Peer Networking and Applications
    Article 12 July 2024
  16. Implementing Blockchain Technology in the Indian Context to Enable the Secure Exchange of Patients’ Information with Government Agencies

    The healthcare sector has endured significant challenges due to its incapacity to exchange sensitive patient information. Throughout the battle...

    Poonam Verma, Vikas Tripathi, Bhaskar Pant in Journal of The Institution of Engineers (India): Series B
    Article 12 July 2024
  17. Discreet: distributed delivery service with context-aware cooperation

    End-to-end encrypted messaging applications such as Signal became widely popular thanks to their capability to ensure the confidentiality and...

    Ludovic Paillat, Claudia-Lavinia Ignat, ... Amine Ismail in Annals of Telecommunications
    Article 11 July 2024
  18. Appropriate Mother Wavelet Selection with Optimum Level of Disintegration for Analyzing Various Faults of Induction Motor Under Variation in Motor Loading

    Current signature analysis is used successfully for induction motor fault detection. A common mathematical tool for assessing fault signals is the...

    Arunava Kabiraj Thakur, Alok Mukherjee, ... Arabinda Das in Journal of The Institution of Engineers (India): Series B
    Article 11 July 2024
  19. A Novel Method for Design and Implementation of Systolic Associative Cascaded Variable Leaky Least Mean Square Adaptive Filter for Denoising of ECG Signals

    Electrocardiogram is the most essential diagnostic test for heart disease detection in this era, where it has low frequency and small amplitude,...

    Chitra Manickam, Murugesan Govindasamy, ... Muneeshwari Paramasivam in Wireless Personal Communications
    Article 11 July 2024
  20. A powerful adversary model and corresponding OTP time slot allocation scheme in RIS-assisted physical layer key generation

    Physical layer key generation (PLKG) is a technique of information-theoretic security to tackle the problem of key distribution between...

    Liquan Chen, Yufan Song, ... Liang Chen in EURASIP Journal on Wireless Communications and Networking
    Article Open access 11 July 2024
Did you find what you were looking for? Share feedback.