Search results for "Vd"

showing 10 items of 7724 documents

An Efficient Online/Offline Signcryption Scheme for Internet of Things in Smart Home

2022

The delivery of unified intelligent services is accomplished through a networked environment comprised of a wide array of electronic devices. Through the use of Internet of Things (IoT) technology, smart homes collect data from their surroundings and use it to improve their tenants’ lives. Remote control, real-time monitoring, and a fire alarm are all characteristics of smart home security. Since smart homes hold personally identifying information about their residents, security is critical to ensure their reliability and prevent data breaches. In this paper, a certificateless online/offline signcryption (COOS) technique for IoT-enabled smart homes is proposed. The proposed solution takes a…

Article SubjectComputer Networks and CommunicationsElectrical and Electronic EngineeringVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550VDP::Teknologi: 500::Elektrotekniske fag: 540Information Systems
researchProduct

Post-Quantum Secure Identity-Based Encryption Scheme using Random Integer Lattices for IoT-enabled AI Applications

2022

Identity-based encryption is an important cryptographic system that is employed to ensure confidentiality of a message in communication. This article presents a provably secure identity based encryption based on post quantum security assumption. The security of the proposed encryption is based on the hard problem, namely Learning with Errors on integer lattices. This construction is anonymous and produces pseudo random ciphers. Both public-key size and ciphertext-size have been reduced in the proposed encryption as compared to those for other relevant schemes without compromising the security. Next, we incorporate the constructed identity based encryption (IBE) for Internet of Things (IoT) …

Article SubjectComputer Networks and CommunicationsVDP::Matematikk og Naturvitenskap: 400::Informasjons- og kommunikasjonsvitenskap: 420Information SystemsSecurity and Communication Networks
researchProduct

Internet of Things-Based Fire Alarm Navigation System: A Fire-Rescue Department Perspective

2022

In the past few years, fire alarm systems have become increasingly sophisticated and more capable and reliable. The two main objectives are the protection of life and property. As a result of state and local codes, fire protection has become more concerned with life safety over the past two decades. Several safety measures have been implemented to address the problems caused by the fires and reduce the number of fatalities and property damage. Our project is to develop and review a fire alarm navigation system and application that uses the internet of things. Fire alarm systems are designed to warn people about fires in advance so that they can evacuate the fire-affected area and take immed…

Article SubjectComputer Networks and CommunicationsVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550Computer Science Applications
researchProduct

Study on the characteristics of electromagnetic noise of axial flux permanent magnet synchronous motor

2014

Published version of an article in the journal: Abstract and Applied Analysis. Also available from the publisher at: http://dx.doi.org/10.1155/2014/764105 Open Access The normal electromagnetic force distribution in stator system of axial flux permanent magnet synchronous motor (PMSM) has been thoroughly analyzed in this paper. The main composition of force wave causing vibration and noise has been proposed, and at the same time a calculation method of stator natural frequency of axial flux PMSM has been raised. Through this method electromagnetic force wave, natural frequency, vibration response, and electromagnetic noise of a 15 kW axial flux PMSM with 22 poles and 24 slots have been calc…

Article SubjectComputer Science::Systems and Controllcsh:MathematicsApplied MathematicsAnalysis; Applied Mathematicslcsh:QA1-939VDP::Mathematics and natural science: 400::Mathematics: 410::Analysis: 411Analysis
researchProduct

New Results on Passivity Analysis for Uncertain Neural Networks with Time-Varying Delay

2014

Published version of an article in the journal: Abstract and Applied Analysis. Also available from the publisher at: http://dx.doi.org/10.1155/2014/303575 Open Access The paper investigates the stability and passivity analysis problems for a class of uncertain neural networks with time-delay via delta operator approach. Both the parameter uncertainty and the generalized activation functions are considered in this paper. By constructing an appropriate Lyapunov-Krasovskii functional, some new stability and passivity conditions are obtained in terms of linear matrix inequalities (LMIs). The main characteristic of this paper is to obtain novel stability and passivity analysis criteria for uncer…

Article SubjectComputer Science::Systems and Controllcsh:MathematicsApplied MathematicsAnalysis; Applied Mathematicslcsh:QA1-939VDP::Mathematics and natural science: 400::Mathematics: 410::Analysis: 411AnalysisAbstract and Applied Analysis
researchProduct

A Data-Based Approach for Modeling and Analysis of Vehicle Collision by LPV-ARMAX Models

2013

Published version of an article in the journal: Journal of Applied Mathematics. Also available from the publisher at: http://dx.doi.org/10.1155/2013/452391 Open Access Vehicle crash test is considered to be the most direct and common approach to assess the vehicle crashworthiness. However, it suffers from the drawbacks of high experiment cost and huge time consumption. Therefore, the establishment of a mathematical model of vehicle crash which can simplify the analysis process is significantly attractive. In this paper, we present the application of LPV-ARMAX model to simulate the car-to-pole collision with different initial impact velocities. The parameters of the LPV-ARMAX are assumed to …

Article SubjectComputer scienceApplied Mathematicslcsh:MathematicsProcess (computing)Collisionlcsh:QA1-939Set (abstract data type)Identification (information)High fidelityControl theoryCrashworthinessVDP::Matematikk og Naturvitenskap: 400::Matematikk: 410::Anvendt matematikk: 413Test dataMotor vehicle crashJournal of Applied Mathematics
researchProduct

Energy-efficient routing control algorithm in large-scale WSN for water environment monitoring with application to Three Gorges Reservoir area

2013

Published version of an article in the journal: The Scientific World Journal. Also available from the publisher at: http://dx.doi.org/10.1155/2014/802915 Open Access The typical application backgrounds of large-scale WSN (wireless sensor networks) for the water environment monitoring in the Three Gorges Reservoir are large coverage area and wide distribution. To maximally prolong lifetime of large-scale WSN, a new energy-saving routing algorithm has been proposed, using the method of maximum energy-welfare optimization clustering. Firstly, temporary clusters are formed based on two main parameters, the remaining energy of nodes and the distance between a node and the base station. Secondly,…

Article SubjectComputer scienceReal-time computinglcsh:Medicinelcsh:TechnologyGeneral Biochemistry Genetics and Molecular BiologyBase stationWater QualityComputer Science::Networking and Internet ArchitectureWater environmentCluster (physics)lcsh:ScienceCluster analysisGeneral Environmental Sciencelcsh:TNode (networking)lcsh:RVDP::Technology: 500::Information and communication technology: 550General MedicineDissipationlcsh:QWireless sensor networkAlgorithmsEnergy (signal processing)Environmental MonitoringResearch Article
researchProduct

A New Correlation Coefficient for T-Spherical Fuzzy Sets and Its Application in Multicriteria Decision-Making and Pattern Recognition

2022

The goal of this paper is to design a new correlation coefficient for T -spherical fuzzy sets (TSFSs), which can accurately measure the nature of correlation (i.e., positive and negative) as well as the degree of relationship between TSFS. In order to formulate our proposed idea, we had taken inspiration from the statistical concept of the correlation coefficient. While doing so, we firstly introduce the variance and covariance of two TSFS and then constructed our scheme using these two newly defined notions. The numerical value of our proposed correlation coefficient lies within the interval − 1 , + 1 , as it should be from a statistical point of view, whereas the existing methods cannot m…

Article SubjectControl and Systems EngineeringElectrical and Electronic EngineeringVDP::Matematikk og Naturvitenskap: 400::Informasjons- og kommunikasjonsvitenskap: 420InstrumentationJournal of Sensors
researchProduct

A Machine Learning in Binary and Multiclassification Results on Imbalanced Heart Disease Data Stream

2022

In medical filed, predicting the occurrence of heart diseases is a significant piece of work. Millions of healthcare-related complexities that have remained unsolved up until now can be greatly simplified with the help of machine learning. The proposed study is concerned with the cardiac disease diagnosis decision support system. An OpenML repository data stream with 1 million instances of heart disease and 14 features is used for this study. After applying to preprocess and feature engineering techniques, machine learning approaches like random forest, decision trees, gradient boosted trees, linear support vector classifier, logistic regression, one-vs-rest, and multilayer perceptron are u…

Article SubjectControl and Systems EngineeringElectrical and Electronic EngineeringVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550InstrumentationJournal of Sensors
researchProduct

Efficient and Secure Key Management and Authentication Scheme for WBSNs Using CP-ABE and Consortium Blockchain

2022

Wireless body sensor networks (WBSNs) pose significant security and privacy risks. The Medical Server (MS) will only allow legitimate stakeholders access to confidential patient medical records when successful mutual authentication between all registered users and the MS has been confirmed using preset secret attributes. This paper proposes a novel approach to overcome the security and privacy problems in WBSNs by using CP-ABE and a consortium blockchain for key management and authentication. In this paper, a fixed-size session key is computed by utilizing several attribute base rules and AND/OR logic gate combinations. IEEE 802.15.6 is also used to transmit the encoded patient data from th…

Article SubjectControl and Systems EngineeringElectrical and Electronic EngineeringVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550InstrumentationJournal of Sensors
researchProduct