Current hard real-time technologies are unable to support a new class of applications that have real-time constraints but with dynamic request arrivals and unpredictable resource r...
In general, the iris recognition systems have used the wavelet transform as feature extraction techniques. Since the wavelet transform does not have the shift-invariant property, t...
Seung-In Noh, Kwanghyuk Bae, Yeunggyu Park, Jaihie...
We show the practical feasibility of monitoring complex security properties using a runtime monitoring approach for metric first-order temporal logic. In particular, we show how ...
High-resolution nuclear magnetic resonance (NMR) spectra contain important biomarkers that have potentials for early diagnosis of disease and subsequent monitoring of its progressi...
Guangzhe Fan, Zhou Wang, Seoung Bum Kim, Chivalai ...
— Due to the uncertainty in the forecasting of load patterns, security dispatching finds the generation pattern, which is the most economic and passes all N − 1 contingencies ...