24 IEEE JOURNAL ON EMERGING AND SELECTED TOPICS IN CIRCUITS AND SYSTEMS‚ VOL. 2‚ NO. 1‚ MARCH 2012 Design Optimization and Implementation for RF Energy Harvesting Circuits Prusayon Nintanavongsa‚ Student Member‚ IEEE‚ Ufuk Muncuk‚ David Richard Lewis‚ and Kaushik Roy Chowdhury‚ Member‚ IEEE Abstract—A new design for an energy harvesting device is proposed in this paper‚ which enables scavenging energy from radiofrequency (RF) electromagnetic waves. Compared to common alternative energy sources
Premium Sensor node Electronic engineering Electrical engineering
Papers 1. M.Bolhassani‚ S.Hashemi “Determination of Distribution Function of Inrush Current in Three Phase Transformer Using Monte Carlo Method” IEEE 48th International conference UPEC‚on power system‚London‚Sep.2012. 2. M.Bolhassani‚ A.Pirayesh Neghab “Optimal VAR Procurement by ISO Using VAR Demand Price Curve Considering Market Uncertainties” IEEE 48th International conference UPEC‚on power system‚London‚Sep.2012. Journal Publication (Under review) 1. M.Bolhassani‚ A.Pirayesh Neghab
Premium Transformer Electrical engineering Electricity
ZigBee wireless mesh technology has been developed to address sensor and control application with its promise of robust and reliable‚ self-configuring and battery-efficient approach to adding wireless to any application‚ fixed or portable. A typical IEEE 803.15.4-based‚ ZigBee-complaint device is shown in figure 1. [pic] Figure 1. Typical 802.15.4/ZigBee Device that has included antenna‚ RF data modem‚ applications processor‚ all necessary passive
Premium Wireless networking Network topology Computer network
3. Problem Formulation As it is evident from the related work discussed in the section 2‚ when small files are stored on HDFS‚ disk utilization is not a bottleneck. In general‚ small file problem occurs when memory of NameNode is highly consumed by the metadata and BlockMap of huge numbers of files. NameNode stores file system metadata in main memory and the metadata of one file takes about 250 bytes of memory. For each block by default three replicas are created and its metadata takes about 368
Premium File system Computer file
Bibliography: filter structure for neural recording applications‚” in Circuits and Systems (ISCAS)‚ 2012 IEEE International Symposium on‚ pp. 2231 –2234‚ may 2012. IEEE Journal of‚ vol. 47‚ pp. 244 –256‚ jan. 2012.
Premium Voltage Neuroscience Neural network
Kurtosis based Multichannel ECG Signal Denoising and Diagnostic Distortion Measures Sharma L. N. Department of Electronics and Communication Engineering Indian Institute of Technology Guwahati Guwahati‚ India - 781 039 Email: lns@iitg.ernet.in Dandapat S. Department of Electronics and Communication Engineering Indian Institute of Technology Guwahati Guwahati‚ India - 781 039 Email: samaren@iitg.ernet.in Mahanta A. Department of Electronics and Communication Engineering Indian Institute
Premium Signal processing
Abstract Software architecture plays an important role in the achievement of particular qualities we want to see in our software under development. On the other hand specific software demands some distinct qualities in software architecture. Now question arises how software architecture becomes the base to achieve the certain qualities and how qualities influence the architecture. Architecture provides the base for the development of the core product so by inspecting the architecture we can predict
Premium Software architecture Software engineering
IS589: Networking Concepts and Applications Textbook Questions Chapter 1 March 09‚ 2014 Chapter 1: Question 7‚ 14‚ and 17 Question 7. How do local area networks (LANs) differ from metropolitan area networks (MANs)‚ wide area networks (WANs)‚ and backbone networks (BNs)? Most LAN’s are connected to (BNs) backbone networks that connect multiple LAN’s‚ BN’s‚ MAN’s and WAN’s and can range in size and distance from several hundreds of feet to miles and can have data transmission speed ranging
Premium OSI model Local area network Internet Protocol Suite
IEEE/ACM TRANSACTIONS ON NETWORKING‚ VOL. 19‚ NO. 6‚ DECEMBER 2011 1787 Topological Detection on Wormholes in Wireless Ad Hoc and Sensor Networks Dezun Dong‚ Member‚ IEEE‚ Mo Li‚ Member‚ IEEE‚ Yunhao Liu‚ Senior Member‚ IEEE‚ Xiang-Yang Li‚ Senior Member‚ IEEE‚ and Xiangke Liao Abstract—Wormhole attack is a severe threat to wireless ad hoc and sensor networks. Most existing countermeasures either require specialized hardware devices or make strong assumptions on the network in order to capture
Premium Network topology Graph theory Computer network
PX4: A Node-Based Multithreaded Open Source Robotics Framework for Deeply Embedded Platforms Lorenz Meier‚ Dominik Honegger and Marc Pollefeys Abstract— We present a novel‚ deeply embedded robotics middleware and programming environment. It uses a multithreaded‚ publish-subscribe design pattern and provides a Unixlike software interface for micro controller applications. We improve over the state of the art in deeply embedded open source systems by providing a modular and standards-oriented platform
Premium Embedded system Unmanned aerial vehicle Linux