IEEE Access
IF
3.75
Papers
35281
Papers 10000
1 page of 1,000 pages (10k results)
Newest
#1Minh NguyenH-Index: 7
#2Sangshin Kwak (CAU: Chung-Ang University)H-Index: 9
Last. Sangshin Kwak (CAU: Chung-Ang University)H-Index: 22
view all 2 authors...
Owing to the low number of submodules (SMs) in modular multilevel converters (MMCs), especially in medium-voltage applications, the output current and voltage generated by conventional nearest-level control (NLC) methods contain evident distortions. Previously, various hybrid and level-increased NLC methods have been proposed to improve the output voltage quality, but such measures wither increased the complexity or did not regulate all the control objectives simultaneously. To further enhance t...
Source
Estimating semantic correspondence between pairs of images can be challenging as a result of intra-class variation, background clutter, and repetitive patterns. This paper proposes a convolutional neural network (CNN) that attempts to learn rich semantic representations that contain the global semantic context to enable robust semantic correspondence estimation against intra-class variation and repetitive patterns. We introduce a global context fused feature representation that efficiently emplo...
Source
#1Silia MaksutiH-Index: 5
#2Ani BicakuH-Index: 5
Last. Jerker Delsing (Luleå University of Technology)H-Index: 17
view all 9 authors...
The Internet of Things (IoT) is rapidly changing the number of connected devices and the way they interact with each other. This increases the need for an automated and secure onboarding procedure for IoT devices, systems and services. Device manufacturers are entering the market with internet connected devices, ranging from small sensors to production devices, which are subject of security threats specific to IoT. The onboarding procedure is required to introduce a new device in a System of Sys...
Source
#1Hikaru Yokoyama (UTokyo: University of Tokyo)H-Index: 6
#2Atsushi Sasaki (Japan Society for the Promotion of Science)H-Index: 6
Last. Kimitaka Nakazawa (UTokyo: University of Tokyo)H-Index: 37
view all 0 authors...
Investigation of motor unit (MU) activity provides a fundamental information of neuromuscular control. High density surface electromyogram (HDsEMG) decomposition based on the blind source separation techniques (BSS) has been performed to estimate discharge patterns of MUs. The decomposition techniques for HDsEMG signals were initially proposed for isometric contractions. Recently, the decomposition methods have been utilized for non-isometric muscle contractions. However, what level of dynamic m...
Source
#1Jiayi Wang (Hohai University)
#2Hao Gu (Hohai University)
Last. Zikang Xing (Hohai University)
view all 0 authors...
Deformation is the most intuitive indicator of the actual working status of a concrete dam. Zoning the variation regulation of dam deformation is one of the key parts of dam safety evaluation and risk assessment. However, the sample points reflecting deformation and variation characteristic information are non-uniformly distributed, thus it is difficult to cluster the data samples by traditional clustering methods. To solve this problem, a spatio-temporal zoning method of dam deformation conside...
Source
#1Ahmed Bedawy (SVU: South Valley University)H-Index: 3
#2Naoto Yorino (Hiroshima University)H-Index: 24
Last. Matti LehtonenH-Index: 37
view all 0 authors...
Source
#1Seog Chung Seo (Kookmin University)H-Index: 7
Since the introduction of the Supersingular isogeny Diffie–Hellman (SIDH) key exchange protocol by Jao and de Feo in 2011, it and its variation (SIKE) have gained significant attention as a promising candidate for post-quantum cryptography (PQC). Until now, even though several implementations of the state-of-the-art SIKE mechanism were presented on CPUs and embedded MCUs, there was no consideration of implementing SIKE on parallel graphic processing units (GPUs). With the advent of the IoT era, ...
Source
#1Sajjad Khan (CUI: COMSATS Institute of Information Technology)H-Index: 5
#2Muhammad Bilal Amin (UTAS: University of Tasmania)H-Index: 13
Last. Sheraz Aslam (CUT: Cyprus University of Technology)H-Index: 8
view all 0 authors...
The slower than expected adoption rate of blockchain technology has highlighted that there are barriers due to the diversity of its applications and its users. To overcome this limitation and take full advantage of the novel technology, researchers from academia as well as industry are dedicated to find different solutions, where two blockchains can interact with each other. As a result, several interoperability solutions have presented themselves. To investigate the functionalities and underlyi...
Source
#1Sojin Jeong (SKKU: Sungkyunkwan University)
#2Sangwoo Han (SKKU: Sungkyunkwan University)
Last. Changhwan Shin (SKKU: Sungkyunkwan University)H-Index: 22
view all 0 authors...
A two-dimension (2D) atomic-threshold-switching field-effect transistor (ATS-FET) was implemented, by connecting an AgTi/HfO2-based threshold-switching (TS) device in series to the drain electrode of the 2D baseline-FET with molybdenum disulfide (MoS2) channel material. We optimized/developed the Ag/HfO2-based TS device because its characteristic is associated to the way how to achieve high performance of the 2D ATS-FET. By reducing the effective device area of the Ag/HfO2-based TS device down t...
Source
#1Hailiang Du (LSE: London School of Economics and Political Science)
#2Wei SunH-Index: 4
Last. Gareth HarrisonH-Index: 41
view all 0 authors...
Source
12345678910
Top fields of study
Algorithm
Distributed computing
Pattern recognition
Computer network
Computer science
Feature extraction
Control theory