Skip to main content
This paper proposes a fuzzy logic diet journaling system based on the premise that food intake is a control system. Past work in fuzzy diet analysis is covered. This continues into a discussion over strengths and weaknesses of the past... more
    • by 
    • Computer Science
Abstract—For 100 years, there has been no change in the basic structure of the electrical power grid. Experiences have shown that the hierarchical, centrally controlled grid of the 20th Century is ill-suited to the needs of the 21st... more
    • by 
Increasing global demand for rechargeable lithium (Li) ion batteries has been driving the research on innovative processing techniques and material systems for cheaper production of battery electrodes. While cost reduction is important,... more
    • by 
    •   6  
      EngineeringProcess OptimizationThermal Spray CoatingPlasma spray coatings
Indium oxide (In 2 O 3 ) has been widely used in sensors, solar cells and microelectronics. There are several techniques available for making In 2 O 3 such as vapor, electrochemical and atomic layer deposition, which are not only... more
    • by 
    • Plasma spray coatings
Indium oxide (In 2 O 3 ) has been widely used in sensors, solar cells and microelectronics. There are several techniques available for making In 2 O 3 such as vapor, electrochemical and atomic layer deposition, which are not only... more
    • by 
    • Plasma spray coatings
Indium oxide (In 2O 3) has been widely used in sensors, solar cells and microelectronics. There are several techniques available for making In 2O 3 such as vapor, electrochemical and atomic layer deposition, which are not only expensive... more
    • by 
    • Plasma spray coatings
Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider... more
    • by  and +2
Smart mobility is an imperative facet of smart cities, and the transition of conventional automotive systems to connected and automated vehicles (CAVs) is envisioned as one of the emerging technologies on urban roads. The existing AV... more
    • by  and +2
    •   5  
      Autonomous VehiclesCyber Security Incident ResponseAccident analysisCyber Attacks
Over recent years, we have seen a significant rise in electric mobility to overcome the anthropogenic emissions by conventional gasoline vehicles. However, the prerequisite of smoothening of peaks and imbalances through bidirectional... more
    • by 
    •   6  
      Anomaly DetectionThreat ModelingCyber AttacksElectric Vehicle Charging Stations
Due to digital transformation, an autonomous vehicle (AV) is realized as a network of multiple electronic control units (ECUs) for providing ubiquitous connectivity and controlling various electronic functions ranging from essential... more
    • by 
    •   5  
      Digital SignatureAnomaly DetectionAutonomous VehiclesCyber Attacks
Data authentication and integrity are predominant factors that determine the reliability and security of a communication system. The integration of computers and communication capabilities with power systems, digitization, and massive... more
    • by  and +1
    •   3  
      Anomaly DetectionCyber AttacksPower Substations
A novel 2×2 MIMO antenna using crown square curve and koch curve is proposed and designed on RT/duroid having thickness of 3.175mm, loss tangent of 0.0009 and dielectric constant of 2.2, by employing MoM based IE3D software. In this... more
    • by  and +1
    •   2  
      Microstrip antenna designMIMO Systems
Smart mobility is an imperative facet of smart cities, and the transition of conventional automotive systems to connected and automated vehicles (CAVs) is envisioned as one of the emerging technologies on urban roads. The existing AV... more
    • by 
    •   7  
      Computer ScienceComputer SecurityAutonomous VehiclesCyber Security Incident Response
Safe and reliable electric vehicle charging stations (EVCSs) have become imperative in an intelligent transportation infrastructure. Over the years, there has been a rapid increase in the deployment of EVCSs to address the upsurging... more
    • by 
    •   3  
      Computer ScienceComputer SecuritySoftware Deployment
A novel 2×2 MIMO antenna using crown square curve and koch curve is proposed and designed on RT/duroid having thickness of 3.175mm, loss tangent of 0.0009 and dielectric constant of 2.2, by employing MoM based IE3D software. In this... more
    • by 
    •   3  
      PhysicsMicrostrip antenna designMIMO Systems
The increasing demand of mobile Internet and the IoTs poses exacting requisites for 5G wireless communications, like high spectral efficiency. Hence, a promising technology, non-orthogonal multiple access (NOMA), is discussed. Unlike... more
    • by 
Intrusion detection for Controller Area Network (CAN) protocol requires modern methods in order to compete with other electrical architectures. Fingerprint Intrusion Detection Systems (IDS) provide a promising new approach to solve this... more
    • by 
    •   3  
      Artificial IntelligenceMachine LearningHyperparameter Optimization
Safe and secure electric vehicle charging stations (EVCSs) are important in smart transportation infrastructure. The prevalence of EVCSs has rapidly increased over time in response to the rising demand for EV charging. However,... more
    • by 
    •   4  
      Computer SecurityElectric VehicleCyber Physical SystemCyber Attack
Intrusion detection for Controller Area Network (CAN) protocol requires modern methods in order to compete with other electrical architectures. Fingerprint Intrusion Detection Systems (IDS) provide a promising new approach to solve this... more
    • by 
    •   4  
      Computer ScienceArtificial IntelligenceIntrusion Detection SystemHyperparameter Optimization
Autonomous driving (AD) has developed tremendously in parallel with the ongoing development and improvement of deep learning (DL) technology. However, the uptake of artificial intelligence (AI) in AD as the core enabling technology raises... more
    • by 
    •   3  
      Computer ScienceComputer SecurityAdversarial System