121 results found containing all search terms.
Year: 2014, Volume: 14, Number: 3
... in cloud-integrated Mathematics)," pp. 135-136, Society for Industrial and Applied Wireless Sensor Networks," In. Proc. of CTS 2013, 2013, ... . Mathematics, 1st edition, Jan. 1987. [Online]. Available: [21] D.F. Shanno, "Conditioning of quasi-Newton methods for function ...
Terms matched: 2 - Score: 10 - 812k
Year: 2021, Volume: 21, Number: 1
... S. Singh and H. J. Singh, "Data compression techniques in wireless [4] P. V. Kumaraguru and V. J. Chakravarthy ... , speech, and other An image encoding technique is a process that converts a sensor data acquisition. The primary function of the vector set of characters such as ...
Terms matched: 2 - Score: 8 - 1,431k
Year: 2014, Volume: 14, Number: 4
... , Available: http://dx.doi.org/10.1109/GLOCOM.1990.116774 EURASIP Journal on Wireless Communications and Networking, vol. [30] H. Balta, C ... application to turbo coding", 1 ƒ 2 ƒ Proceedings of the 2000 IEEE Sensor Array and Multichannel Signal Pbi € ƒ— erfcƒ ƒ— R ƒ— ƒ€ Processing Workshop ...
Terms matched: 2 - Score: 8 - 684k
Year: 2015, Volume: 15, Number: 1
... Functions for Comparison convolvers for fast digital signal processing," Very Large Scale of Wireless Smart Cameras," International Journal of Distributed Integration (VLSI) Systems, ... Transactions on, vol.7, no.3, Sensor Networks, vol. 2014, Article ID 710685, 15 pages, 2014, pp.299-308, Sept. 1999, http ...
Terms matched: 2 - Score: 8 - 762k
Year: 2011, Volume: 11, Number: 1
... F. Hantila, and prof. M. Maricaru for the helpful selection in wireless sensor network", Advances in Electrical and discussions. Computer Engineering, vol ... M. R. Islam, J. Kim, "Cooperative techniques based on sensor I. F. Hantila, and prof. M. Maricaru for the ...
Terms matched: 2 - Score: 8 - 940k
Year: 2019, Volume: 19, Number: 3
... . Pranggono, "Impact of distributed denial-of-service attack on advanced metering infrastructure," Wireless Personal V. CONCLUSION Communications, vol. 83, no. 3, ... encompass two types of intrusion detection and prevention systems (IDPS): network-based IDPS sensors and host- based IDPS agents [19]. The three inline network-based ...
Terms matched: 2 - Score: 8 - 274k
Year: 2016, Volume: 16, Number: 3
... commands Shortcomings consist of words XORed with random number RN-2. A RFID rests upon wireless technology, where a tiny tag malicious listener can capture the RNs and extract ... systems," in Proc. 17th Int. On-Line Testing authentication protocols," Sensors, vol. 13, pp. 3537-3547, 2013. Symposium (IOLTS ...
Terms matched: 2 - Score: 8 - 755k
Year: 2018, Volume: 18, Number: 2
... , V. Manta, R. Ciobotariu, "Integrated System Based on -5 Wireless Sensors Network for Cardiac Arrhythmia Monitoring," Magnitude (dB) -10 Advances ... Electrical and Computer Engineering, vol.13, no.1, -15 pp.95-100, 2013. doi:10.4316/AECE.2013.01016 -20 [7] P. Farago, S. Hintea ...
Terms matched: 2 - Score: 8 - 1,230k
Year: 2015, Volume: 15, Number: 3
... called HiGIS. The goal of interoperable solutions that "geo-enable" the Web, wireless HiGIS is to promote the performance of geocomputation by and location-based services and mainstream ... sets captured with ubiquitous location-aware parallel frameworks for point cloud algorithms [6] and sensors require massive computing power, storage space and remote sensing image processing web services ...
Terms matched: 2 - Score: 7 - 1,662k
Year: 2016, Volume: 16, Number: 4
... . P. Schreurs, estimation of Fricke-Morse model of biological tissue has "Wearable wireless health monitoring: Current developments, challenges, and future trends," IEEE ... low power bioimpedance module for wearable 0.145 0.146 0.163 0.168 0.340 0.087 systems," Sensors and Actuators A: Physical, Vol. 232, pp. 359-367, ...
Terms matched: 2 - Score: 5 - 1,242k