Lithium-ion batteries are widely used in transportation and vehicle electrification because of their low cost, high-energy density, and long lifetime. However, aging, complex nonlinear degradation, and diverse operation ...
Though there have been a number of instruments for heart condition monitoring, few of them is suitable for individual portable use, which makes the expenditure of related healthcare extremely high with the increasing number ...
Cardiovascular disease is the leading cause of death in the world. Long-term monitoring of heart condition through electrocardiogram (ECG) will provide vital information for prevention, early warning and detection of fatal ...
The Edgebreaker triangle mesh-coding method is presented along with a software implementation of the method developed by the author. The software consists of two programs. The first program performs the mesh compression, ...
One of the enormous challenges in the transistor fabrication industry is to find materials with suitable electronic properties. On the other hand, the size of electronic systems is being reduced every day. Therefore, ...
Understanding human emotions has become a research trend and practical topic
in recent decades. There are much research having good result on detecting human
emotions with facial expressions, speech and text. Recognizing ...
Energy saving and power optimization techniques are in demand.
In this project, a prototype has been developed for smart home automation. This
prototype features energy monitoring, analysis and ...
In combinatorial theory, a necklace is an equivalence class of a word under cyclic shift. Enumerating necklaces over a finite field F_q is an essential yet time-consuming step in constructing Quasi-Cyclic (QC) and ...
CO2 is the main contributor of green house gasses. In recent years emissions from maritime transport has increased rapidly. This trend can also be seen for passenger ferries. It is harmful as ferries operate closer to ...
Today, the number of targeted attacks has increased extremely. The attacks have increased in sophistication and diversity. It is imperative to deploy effective and proactive countermeasures that can help mitigate the threats ...
One of the common techniques used by attackers to break security and steal private and confidential information is phishing. An effective way to defend against phishing is to use an add-on filter. However, it is vital for ...
As the popularity of battery-powered portable electronic systems continues to grow, an Electronic System Level (ESL) designer may need an executable high-level battery model to make informed battery-aware decisions targeting ...
Smart Grids have emerged as a very crucial platform for providing timely, efficient, and
uninterrupted power supply to consumers. Communication networks in smart grid bring
increased connectivity with increased severe ...
The mixer/detector is a fundamental component in the communications field in both
the receiver and transmitter signal chains. It has been used since the earliest days of radio acting as a demodulator in a cat's-whisker ...
The presented work shows further improvement made to the boost-type switch mode rectifier developed in [1]. Modern industry offers various analog controllers for power factor correction purposes. Their manufacturers claim ...
Face recognition is one of the most challenging and important topics in computer vision, pattern recognition and image processing. It has experienced a recent advance by using dictionary learning algorithms. These algorithms ...
Human emotions are the mental state of feelings and are spontaneous. There is no clear connection between emotions and facial expressions and there is significant variability making facial recognition a challenging research ...
Simple Finite Elements in python (Sfepy) is an open-source framework that is
dedicated to solving partial differential equation (PDE) problems with the help of
vectorized operation in the Numpy package. And Gmsh is an ...
The lifted wavelet transforms of 3-D polygon meshes are introduced, and the details of Loop and Butterfly wavelet transforms are studied. Then, a library that implements a framework for computing lifted wavelet transforms ...
The Long Term Evolution (LTE) uplink power control in cellular networks consist of a
closed loop power control component and an open loop power control component. The
open loop component is also called Fractional Power ...