Multiclass Brain Tumor Classification using GA-SVM Abstract?The objective of this study is to develop a CAD system for assisting radiologists in multiclass classification of brain tumors. A new hybrid machine learning system based on the Genetic Algorithm (GA) and Support Vector Machine (SVM) for brain tumor classification is proposed. Texture and intensity features of…
Multifunctional DC Electric Springs for Improving Voltage Quality of DC Grids Abstract-Electric springs (ES) have been proposed as a distributed demand-response technology for mitigating voltage and frequency fluctuations of AC power systems fed by substantial intermittent renewable energy. This paper extends this concept to the development of DC Electric Springs (DCES) for voltage regulation of…
Multilevel voltage source inverter with optimised usage of bidirectional switches Abstract? Multilevel voltage source inverter with optimized usage of bidirectional switches.A multilevel voltage source inverter that has been designed to reduce circuit complexity by optimising the use of bidirectional switches. The proposed inverter is built by adding an auxiliary circuit comprising an arrangement of bidirectional…
Multiple mail forwarding to single Abstract?Abstract Email forwarding generically refers to the operation of re-sending an email message delivered to one email address on to a possibly different email address. The term forwarding has no specific technical meaning. Users and administrators of email systems use the same term when speaking of both server-based and client-based…
Multireceiver Predicate Encryption for Online Social Networks Abstract-Amongtheapplicationsoftheinternetandcloudcomputing, online social network (OSN) is a very popular service. Since a lot of personal information is stored on the OSN platform, privacy protection on such an application has become a critical issue. Apart from this, OSN platforms need advertisement revenue toenable continued operations. However, if the users…
Multireceiver Predicate Encryption for Online Social Networks Abstract-Amongtheapplicationsoftheinternetandcloudcomputing, online social network (OSN) is a very popular service. Since a lot of personal information is stored on the OSN platform, privacy protection on such an application has become a critical issue.Apart from this, OSN platforms need advertisement revenue to enable continued operations. However, if the users…
Multiscale Energy and Eigenspace Approach to Detection and Localization of Myocardial Infarcti Abstract? Multiscale Energy and Eigenspace Approach to Detection and Localization of Myocardial Infarcti. A novel technique on a multiscale energy and eigenspace (MEES) approach is proposed for the detection and localization of myocardial infarction (MI) from multilead electrocardiogram (ECG). Wavelet decomposition of multilead…
Multiview Partitioning via Tensor Methods Abstract? Clustering by integrating multiview representations has become a crucial issue for knowledge discovery in heterogeneous environments. However, most prior approaches assume that the multiple representations share the same dimension, limiting their applicability to homogeneous environments. In this paper, we present a novel tensor-based framework for integrating heterogeneous multiview data…
Network Resource Allocation for Users WithMultiple Connections: Fairness and Stability Abstract?Network Resource Allocation for Users WithMultiple Connections: Fairness and Stability. This paper studies network resource allocation between users that manage multiple connections, possibly through different routes, where each connection is subject to congestion control. We formulate a user-centric Network Utility Maximization problem that takes into…
Network Restoration in Wireless Sensor Networks for Next-Generation Applications Abstract-This paper investigates highly efficient network restoration models for wireless sensor networks (WSNs) to be deployed for next-generation (xG) applications. The developed network restoration models are designed with two main goals in mind. The first goal is to optimize network resource utilization, and the second is…
Networking under joint node and link attacks : vulnerability Assessment methods and analysis Abstract?Networking under joint node and link attacks : vulnerability Assessment methods and analysis. Critical infrastructures such as communication networks, electrical grids, and transportation systems are highly vulnerable to natural disasters and malicious attacks. Even failures of few nodes or links may have…