-
1
Optimal Network Reconfiguration and Scheduling With Hardware-in-the-Loop Validation for Improved Microgrid Resilience
Published 2025-01-01Subjects: Get full text
Article -
2
Multilevel Thresholding for Image Segmentation Using Mean Gradient
Published 2022-01-01“…These challenges present difficulties in the choice of the algorithm to use, and sometimes, it is practically impossible to implement these algorithms in a low-capacity hardware application where computational power and memory utilization are of great concern. …”
Get full text
Article -
3
The South Carolina Digital Watershed: End-to-End Support for Real-Time Management of Water Resources
Published 2010-07-01Get full text
Article -
4
Coracoid osteotomy approach for open free bone grafting of anterior glenoid defects
Published 2025-02-01“…Distal tibia allograft is commonly used due to its lack of donor site morbidity, ability to restore large bony defects, and near anatomic osteoarticular restoration. …”
Get full text
Article -
5
The Total Defense Concept as the Embodiment of Sweden’s Strategic Culture
Published 2022-12-01“…Within the EU Sweden has earned credit for developing civilian or non-military elements of crisis management, while «more hardware» defense cooperation within PESCO and the European Defense Fund is defined by the pragmatic economic interests of Swedish defense companies rather than by strategic considerations. …”
Get full text
Article -
6
Empire Seen from Within. Cinema Objects, Spaces and Edifices in the Limelight in Colonial India and Ceylon (1899-1950)
Published 2021-06-01“…And yet, nowhere is it more relevant to include conventional cinema hardware in scientific research given that in the first instance, cinema as an art, but also an industry with a massive following, came accompanied by a vast array of optical, audio and mechanical devices. …”
Get full text
Article -
7
Posterior Occipitocervical Fusion for Unstable Upper Cervical Trauma in Old and Elderly Population, Although Decreases Upper Cervical Rotation, Does Not Significantly Increase Neck...
Published 2020-01-01“…To our knowledge, there is a lack of research regarding sagittal occipitocervical spine balance restoration following posterior occipitocervical fusion (POCF). …”
Get full text
Article -
8
Deep Joint Demosaicking and Super-Resolution for Spectral Filter Array Images
Published 2025-01-01“…In spectral imaging, the constraints imposed by hardware often lead to a limited spatial resolution within spectral filter array images. …”
Get full text
Article -
9
Automated Testing of Ultrawideband Positioning for Autonomous Driving
Published 2020-01-01“…Addressed challenges are automatically generating test cases for real-time hardware, restoring the state between tests, and maintaining safety by preventing collisions. …”
Get full text
Article -
10
An Innovation to Address the Anterior Pelvic Ring Disruptions
Published 2024-01-01“…However, there is relatively high incidence of hardware failure either in the early or late follow-up. …”
Get full text
Article -
11
Universal patching method for side-channel vulnerabilities based on atomic obfuscation
Published 2022-04-01“…Executing code containing side-channel vulnerabilities exhibits different non-functional behaviors related to inputs.Attackers can obtain these behaviors by leveraging micro architecture side-channel attacks and then analyze the pattern between the behaviors and the inputs to access sensitive data.Vulnerability repairing at the software layer brings low overheads to a program’s execution.Besides, it does not require modifying hardware or system, which enables fast patching and widespread deployment.It becomes the mainstream strategy applied to the current cryptographic implementations.However, existing solutions are deeply bound to the program’s implementation and requires manual intervention.This brings challenge to implement and is not versatile enough.A general patching method was proposed for side-channel vulnerabilities that combined dynamic obfuscated execution with hardware atomic transaction.To hide the real accesses of the side-channel vulnerabilities of a program, the proposed method inserted dynamic confusing accesses into the vulnerabilities.To avoid an attacker using fine-grained side-channel attack to distinguish the real access and the confusing access, both of them were encapsulated as transactions and they were guaranteed to be uninterrupted during the running period.In addition, a prototype system called SC-Patcher was implemented based on the LLVM compiler.Various optimization strategies were supported, including secure springboard and transaction aggregation, to further improve system security and performance.Experimental results show that the proposed method makes it impossible for an attacker to restore accurate sensitive data through side-channel attack, and it also brings almost no additional performance overhead to the program.…”
Get full text
Article -
12
DESIGN ANALYSIS OF AN AUTOMATIC PHASE SELECTOR
Published 2022-01-01“…This paper gives a design analysis of an automatic phase selector linking available power supplies, that is; switching between a three-phase public utility supply, as a result of total power outage in the public supply to an alternative secondary supply (in this case a Generator and an Inverter system) and back when power is restored. The design adopts the use of a microcontroller-based system interconnected with other hardware components for proper isolation, switching and visualization of switching conditions. …”
Get full text
Article -
13
Implemetasi Komputasi Akar Kuadrat Resolusi Tinggi pada Field Programmable Gate Array (FPGA)
Published 2022-12-01“…Penerapan komputasi akar kuadrat pada FPGA menggunakan metode digit by digit non-restoring dengan beberapa modifikasi agar memiliki hasil perhitungan dengan nilai error yang kecil. …”
Get full text
Article -
14
Using Image-based AI for insect monitoring and conservation - InsectAI COST Action
Published 2025-02-01“…Specifically, the EU Nature Restoration Law will likely set binding targets for the high resolution data that cameras can provide. …”
Get full text
Article -
15
Retina Modeling by Artificial Neural Networks
Published 2024-03-01“…The model, as mentioned above, has potential applications in the development of artificial retinas, serving as a hardware implementation to restore some visual capabilities in individuals with visual impairments.…”
Get full text
Article -
16
A coordination control between energy storage based DVR and wind turbine for continuous fault ride‐through
Published 2024-10-01“…To validate the effectiveness of the proposed approach, simulations based on Simulink and hardware‐in‐loop (HIL) experiments are conducted.…”
Get full text
Article -
17
Implementation and Tuning of Momentum-Based Controller for Standing Balance in a Lower-Limb Exoskeleton With Paraplegic User
Published 2025-01-01“…Lower limb exoskeletons (LLEs) are wearable devices that can restore the movement autonomy of paraplegic users. …”
Get full text
Article -
18
CLINICAL EXAMPLE OF THE USE OF LIPOFILLING WITH DELAYED RECONSTRUCTION
Published 2017-03-01“…In the particular example we show the positive effects after one session of conducted lipofiling in front of the chest wall to the right with Body-Jet hardware techniques. The purpose of this procedure was to improve the quality of cover fabrics in postoperative scar on the anterior chest wall right after comprehensive treatment, including also a cover for the such aggressive tissue treatment, as radiotherapy.It is proved that mesenchymal stromal cells, or cell-messengers that are present in all the fatty tissues, contribute to its regeneration by forming new blood vessels, or act directly on the damaged or exposed to aging structure — restore and rejuvenate the field of lipofilling. …”
Get full text
Article -
19
A comparative study on the efficacy of kirschner wire tension band combined with anchor cross-suture internal fixation versus partial patellectomy in the treatment of comminuted in...
Published 2025-01-01“…In Group A, one patient experienced complications from hardware irritation, while in Group B, one patient had postoperative knee pain, and two patients experienced knee extension weakness after cast removal and rehabilitation. …”
Get full text
Article -
20
Designing a cyber insurance implementation model using foundational data theory
Published 2024-05-01“…These factors take into account the technical equipment and cyber infrastructural readiness level, and include hardware capability, software factors, tool power or strength, information content, information technology, human factors, and cyber policies. …”
Get full text
Article