Vehicular Cloud Data Collection for Intelligent Transportation Systems Abstract-The Internet of Things (IoT) envisions to connect billions of sensors to the Internet, in order to provide new applications and services for smart cities. IoT will allow the evolution of the Internet of Vehicles (IoV) from existing Vehicular Ad hoc Networks (VANETs), in which the delivery…
Virtual Multipath Attack and Defense for Location Distinction in Wireless Networkst Abstract?AbstractA charitable trust is an irrevocable trust established for charitable purposes and, in some jurisdictions, a more specific term than “charitable organization”. A charitable trust enjoys a varying degree of tax benefits in most countries. It also generates good will. Some important terminology in…
Voltage Modulated Direct Power Control for a Weak Grid-Connected Voltage Source Inverters Abstract-In this paper, we design a voltage modulated direct power control (VM-DPC) for a three-phase voltage source inverter (VSI) connected to a weak grid, where the PLL system may make the system unstable if the conventional vector current control (VCC) method is applied….
Voltage Profile Improvement Using Static Var Compensators (SVC) And Thyristor Controlled Voltage Regulator (TCVR) Abstract?Abstract The voltage level of the system changes when there is change in load and the drop in the load voltage leads to an increased demand for the reactive power that, if not met by the power system leads to a…
Voltage sag/swell compensation using Z-Source inverter based Dynamic Voltage Restorer Abstract?Abstract This paper presents the modeling and simulation of a dynamic voltage restorer as a voltage sag/swell mitigation device in electrical power distribution networks. The dynamic voltage restorer, with its excellent dynamic capabilities, when installed between the supply and a critical load feeder, can compensate…
VoteTrust: Leveraging Friend Invitation Graph to Defend against Social Network Sybils Abstract? VoteTrust: Leveraging Friend Invitation Graph to Defend against Social Network Sybils Online social networks OSNs suffer from the creation of fake accounts that introduce fake product reviews, malware and spam. Existing defenses focus on using the social graph structure to isolate fakes. However,…
Word Segmentation Method for Handwritten Documents based on Structured Learning Abstract? Word Segmentation Method for Handwritten Documents based on Structured Learning. Segmentation of handwritten document imagesinto text-lines and words is an essential task for optical character recognition. However, since the features of handwritten document are irregular and diverse depending on the person, it is considered…