Skip to main content
The effect of outages in transmission lines and generator units can be predictable for stable and reliable operation of power system through contingency assessment. Hence, contingency assessment is an important task for stable and... more
    • by 
In order to have stable and improve efficiency in power supply, there is need to analyse and understand the complex interrelated factors affecting the efficiency and stability of power supply. The factors that affect the efficacy and... more
    • by 
    • Energy Engineering
This paper implements an optimized solution to Over Current Relay Coordination (OCR) using a new metaheuristics algorithm called Smell Agent Optimization (SAO). We first formulate the relay coordination as a single objective... more
    • by 
    • Computer Science
Дніпровський національний університет імені Олеся Гончара Розглянуто порівняно молодий вид онлайнової медійної діяльності-копірайтинг. Незважаючи на велику популярність та високу економічну ефективність, копірайтинг досі не системного... more
    • by 
    •   2  
      Materials ScienceAutomotive Industry
Three-phase Induction motors are increasingly used in a variety of applications such as fans, milling machines, transportation, etc. In applications requiring precise speed control such as robotics, centrifugal pumps, mills and other... more
    • by 
    •   4  
      Pid ControllerInduction MotorPhase marginSettling time
... isochronous data between embedded LLC and PHY and the application through DRAM or FIFO. There are several FPGA solutions for IEEE 1394 using reusable synthesizable PHY cores ... it was found that the Ethernet is suitable for... more
    • by  and +1
    •   7  
      Computer HardwareOPERATING SYSTEMIntegrationNetwork Processor
Page 1. Performance Analysis of IPSec Protocol: Encryption and Authentication 0. Elkeelany*, MM Matalgah+, KP Sheikh+, M. Thaker+, G. Chaudhry*, D. Me&i* , J. Qaddouri *University of Missouri-Kansas City +Sprint 5 100... more
    • by  and +2
    •   5  
      Performance AnalysisSecure Hash AlgorithmTime ComplexityICC
    • by 
Embedded systems find applications in fields such as defense, communications, industrial automation and many more. For majority of these applications, security is a vital issue. Cryptography plays an important role in providing data... more
    • by 
Modern mobile platforms like Android enable applications to read aggregate power usage on the phone. This information is considered harmless and reading it requires no user permission or notification. We show that by simply reading the... more
    • by 
Introduction The motivation of the paper is absolutely great. The authors mention that " sound is the primitive medium of unencrypted human communication (and side-product of many private activities) ". It is at least intriguing to think... more
    • by 
    • by 
Due to the amount of data that smartphone applications can potentially access, platforms enforce permission systems that allow users to regulate how applications access protected resources. If users are asked to make security decisions... more
    • by 
Building security systems are commonly deployed to detect intrusion and burglary in home and business structures. Such systems can accurately detect door open/close events, but their high-cost of installation and maintenance makes them... more
    • by 
Recognizing when eating activities take place is one of the key challenges in automated food intake monitoring. Despite progress over the years, most proposed approaches have been largely impractical for everyday usage, requiring multiple... more
    • by 
This paper presents an approach for automatically detecting eating activities by measuring deformations in the ear canal walls due to mastication activity. These deformations are measured with three infrared proximity sensors encapsulated... more
    • by 
Mobile devices are shrinking their form factors for portability, but user-mobile interaction is becoming increasingly challenging. In this paper, we propose a novel system called Okuli to meet this challenge. Okuli is a compact, low-cost... more
    • by 
Recently a number of systems have been developed to implement and improve the visual communication over screen-camera links. In this paper we study an opposite problem: how to prevent unauthorized users from videotaping a video played on... more
    • by 
We present LiSense, the first-of-its-kind system that enables both data communication and fine-grained, real-time human skeleton reconstruction using Visible Light Communication (VLC). LiSense uses shadows created by the human body from... more
    • by 
Although GPS has become a standard component of smartphones, providing accurate navigation during the last portion of a trip remains an important but unsolved problem. Despite extensive research on localization, the limited resolution of... more
    • by