Now showing items 616-635 of 648

• #### Transmission congestion management considering EV parking lots and demand response programmes ﻿

(Taylor and Francis Ltd, 2020-10-07)
Transmission congestion is one of the key elements affecting spike price and local market power. Reducing the demand and increasing the generation in distribution network may lead to relive the congestion of a transmission ...
• #### Transport of flight critical data over Internet protocol ﻿

(IEEE, 2005-10-30)
The growth of the Internet in recent times can be attributed to people's need to access information quickly. This, combined with the need to provide seamless connectivity to mobile users, has led to the development of ...
• #### A tutorial on secure outsourcing of large-scale computations for big data ﻿

(IEEE, 2016-04-04)
Today's society is collecting a massive and exponentially growing amount of data that can potentially revolutionize scientific and engineering fields, and promote business innovations. With the advent of cloud computing, ...
• #### Two stage residential energy management under distribution locational marginal pricing ﻿

(Elsevier, 2018-01)
This paper proposes a new optimization model for Smart Home Management Systems (SHMS) in order to increase the profits of Load Serve Entities (LSEs) and customers from technical and financial points of view. In the recent ...
• #### Two-dimensional zoom FFT ﻿

(IEEE, 1978-04-01)
The concept of the zoom FFT (a more efficient algorithm which allows zooming in on a narrow segment of the spectrum while preserving its frequency content) is extended to the two-dimensional case. The technique is further ...
• #### Two-level MMSE relay strategy for an AF wireless relay network ﻿

(IEEE, 2012-10-01)
This paper presents optimal amplify-and-forward (AF) relay amplifying matrices based on the minimum mean square error (MMSE) criterion for a cooperative AF wireless relay network consisting of a one-source-one-destination ...
• #### Two-way amplify-and-forward relay strategies under relay power constraint ﻿

(IEEE, 2013-11)
This paper proposes a two-way amplify-and-forward (AF) wireless relay network consisting of two sources with a single antenna and one relay with multiple antennas. The relay amplifying matrix under a power constraint at ...
• #### Unassisted aircraft landing via co-operative data exchange ﻿

(IEEE, 2006-10-15)
The air traffic controller (ATC) is required to maintain a safe and orderly flow of airplanes in any airport. A fairly recent incident at the Los Angeles Airport (LAX) caused a blackout to the entire control tower and ...
• #### Uncertainty mitigation in feeder level power loss reduction with distributed generation ﻿

(IEEE, 2019)
The grid is moving towards a system of decentralized distributed generation using a large number of small scale renewable generation resources. These resources are stochastic in nature and therefore have to be continuously ...
• #### Underlay MIMO Cognitive Radio Downlink Scheduling with Multiple Primary Users and no CSI ﻿

(IEEE, 2015-05)
In this work, we proposed user selection strategies for downlink of multiple input and multiple output (MIMO) cognitive radio (CR) network. Underlay CR secondary users (SUs) are selected by cognitive base station (CBS) to ...
• #### Universal covertness for discrete memoryless sources ﻿

(IEEE, 2021-06-21)
Consider a sequence $X^{n}$ of length n emitted by a Discrete Memoryless Source (DMS) with unknown distribution $p_{X}$. The objective is to construct a lossless source code that maps $X^{n}$ to a sequence \widehat {Y}^{m} ...
• #### User privacy enhancement in modern web applications ﻿

(IEEE, 2015)
It has been shown recently that a vast majority of modern web applications are prone to compromising privacy of online activity of their users due to the applications' vulnerability to analysis of unique network traffic ...
• #### Using developer-interaction trails to triage change requests ﻿

(IEEE, 2015)
The paper presents an approach, namely iHDev, to recommend developers who are most likely to implement incoming change requests. The basic premise of iHDev is that the developers who interacted with the source code relevant ...
• #### Using non-ideal gates to implement universal quantum computing between uncoupled qubits ﻿

(Springer, 2013-02)
In many physical systems, when implementing quantum gate operations unavoidable global and relative phases occur as by-products due to the internal structure of the governing Hamiltonian. To correct, additional phase ...
• #### Using virtual reality and motion capture as tools for human factors engineering at NASA Marshall Space Flight Center ﻿

(Springer Nature, 2020)
NASA Marshall Space Flight Center (MSFC) Human Factors Engineering (HFE) Team is implementing virtual reality (VR) and motion capture (MoCap) into HFE analyses of various projects through its Virtual Environments Lab (VEL). ...
• #### Utility-optimal wireless routing in the presence of big and heavy data ﻿

(IEEE, 2018-11-02)
Due to emerging mobile applications and an Internet of things, data traffic carried by wireless networks has increased dramatically. As a result, maximizing the utilization of the limited network resource is a top priority. ...
• #### Validation of the MPLS module in OPNET ﻿

(OPNETWORK 2002, 2002-08)
MPLS is an emerging technology that combines layer 2 switching performance with layer 3 scalability. MPLS assigns labels to packets for transportation across a packet-switched or a circuit-switched network. The forwarding ...
• #### VISOB 2.0 - The second international competition on mobile ocular biometric recognition ﻿

(Springer, Cham, 2021-02-21)
Following the success of VISOB 1.0 visible light ocular biometrics competition at IEEE ICIP 2016, we organized VISOB 2.0 competition at IEEE WCCI 2020. The aim of VISOB 2.0 competition was to evaluate and compare the ...
• #### Voice over cable network ﻿

(OPNETWORK 2002, 2002-08)
Accessing Internet using Cable modem is one of the recent technological advancements in the field of networking. Cable network has widely deployed infrastructure and is most commonly used to distribute television programs. ...
• #### Voice over IP security and law enforcement ﻿

(IEEE, 2005-10-11)
Voice over IP is one of the fastest growing Internet based application in today's networking world. As more and more enterprises are moving towards IP based voice network, the payload security has become an important issue. ...