In this paper an insider attack is considered to be deliberate misuse by those who are authorized to use computers and networks. Applying this definition in real-life settings to ...
In this work, we propose the use of sparse signal representation techniques to solve the problem of closed-loop spatial image prediction. The reconstruction of signal in the block...
Computational Intelligence techniques have been proposed as an efficient tool for modeling and forecasting in recent years and in various applications. Water is a basic need and as...
Ishmael S. Msiza, Fulufhelo Vincent Nelwamondo, Ts...
—This paper proposes a digital constant on-time control method for high switching frequency DC-DC buck converter, which eliminates the need for high resolution digital pulse-widt...
Background: The import of most intraperoxisomal proteins is mediated by peroxisome targeting signals at their C-termini (PTS1) or N-terminal regions (PTS2). Both signals have been...
Yumi Mizuno, Igor Kurochkin, Marlis Herberth, Yasu...