The Development of a Thin-Filmed, Non-Invasive Tissue Perfusion Sensor to Quantify Capillary Pressure Occlusion of Explanted Organs

The Development of a Thin-Filmed, Non-Invasive Tissue Perfusion Sensor to Quantify Capillary Pressure Occlusion of Explanted Organs

ABSTRACT A new thin-filmed perfusion sensor was developed using a heat flux gauge, thin-film thermocouple, and a heating element. This sensor, termed “CHFT+”, is an enhancement of the previously established CHFT (combined heat flux – temperature) sensor technology predominately used to quantify the severity of burns [1]. The CHFT+ sensor was uniquely designed to measure […]

A Multiple-Voting-Based Decoding Algorithm for Nonbinary LDPC-Coded Modulation Systems

A Multiple-Voting-Based Decoding Algorithm for Nonbinary LDPC-Coded Modulation Systems

ABSTRACT We propose a multiple-voting-based joint detection-decoding algorithm for nonbinary lowdensity parity-check (LDPC)-coded modulation systems. This algorithm is inspired from the reliabilitybased JDD algorithm for nonbinary LDPC-coded modulation systems, that has been proposed recently, in which the accumulated reliability of symbols based on one-step majority-logic decoding algorithm and the Chase-like local list decoding algorithm are […]

Integration of Ant Colony Optimization and Object-Based Analysis for LiDAR Data Classification

Integration of Ant Colony Optimization and Object-Based Analysis for LiDAR Data Classification

ABSTRACT Light detection and ranging (LiDAR) data classification provides useful thematic maps for numerous geospatial applications. Several methods and algorithms have been proposed recently for LiDAR data classification. Most studies focused on object-based analysis because of its advantages over per-pixelbased methods. However, several issues, such as parameter optimization, attribute selection, and development of transferable rulesets, […]

A Cloud-based Java Compiler for Smart Devices

A Cloud-based Java Compiler for Smart Devices

ABSTRACT The Java programming language is widely used in industry and business. Therefore, academic institutions worldwide include Java learning as a basic part of their Computer Science and Engineering curricula. At the same time, smart devices have become popular among university learners. This research tries to take advantage of this fact to promote Java learning. […]

Cooperative Simultaneous Localization and Mapping by Exploiting Multipath Propagation

Cooperative Simultaneous Localization and Mapping by Exploiting Multipath Propagation

ABSTRACT An affordable and reliable indoor positioning is a highly needed service. Moreover, maps of the indoor environment are vital to many applications. In this paper, a method for joint localization and mapping using multipath delay estimates is developed. Required high-resolution estimates of multipath delays may be obtained using radio frequency or acoustic measurements among […]

Cluster based Zoning of Crime Info

Cluster based Zoning of Crime Info

ABSTRACT The criminal behavior is a disorderliness that is a combined result of social and economic aspects. The crime rate has expanded and the activities of criminals have broaden in last few decades due to better communication system and transport. Crimes cause terror and damage our community enormously in several means. In cities and towns […]

Who are Your “Real” Friend: Analyzing and Distinguishing between Offline and Online Friendships from Social Multimedia Data

Who are Your “Real” Friend: Analyzing and Distinguishing between Offline and Online Friendships from Social Multimedia Data

ABSTRACT The Internet has extended the physical boundary of people’s social circles to manage an inordinate number of online friends. It is recognized that only a fraction of these online friends are also known with each other in offline circumstances, i.e., the offline friends. An important type of offline friend, onsite offline friend, is defined […]

Real-Time Distributed Control of Battery Energy Storage Systems for Security Constrained DC-OPF

Real-Time Distributed Control of Battery Energy Storage Systems for Security Constrained DC-OPF

Abstract: The introduction of fast-response battery energy storage system (BESS) provides a number of advantages to address the new challenges of smart grids, including improving the reliability and security of the power grids. This paper proposes a real-time distributed control algorithm to the corrective security-constrained DC optimal power flow problem for transmission network. The objective […]

FACT: A Framework for Authentication in Cloud-based IP Traceback (IEEE 2017).

FACT: A Framework for Authentication in Cloud-based IP Traceback (IEEE 2017).

Abstract: IP traceback plays an important role in cyber inves- tigation processes, where the sources and the traversed paths of packets need to be identified. It has a wide range of applications, including network forensics, security auditing, network fault diagnosis, and performance testing. Despite a plethora of research on IP traceback, the Internet is yet […]

On the Secrecy Capacity Region of the 2-user Symmetric Z Interference Channel with Unidirectional Transmitter Cooperation (IEEE 2017).

On the Secrecy Capacity Region of the 2-user Symmetric Z Interference Channel with Unidirectional Transmitter Cooperation (IEEE 2017).

Abstraact: The need for fast and strong image cryptosystems motivates researchers to develop new techniques to apply tradi- tional cryptographic primitives in order to exploit the intrinsic features of digital images. One of the most popular and mature technique is the use of complex dynamic phenomena, including chaotic orbits and quantum walks, to generate the […]