Expertini Research Research

Browse Research Papers

214,501+ open-access research outputs.

✕ Clear
📄 Peer-Reviewed
Showing 214501 results · Peer-Reviewed
Multidisciplinary & Other Peer-Reviewed PDF DOI

Design of a High-Gain Single Circular Patch Radiator With a Cavity-Backed Structure Using Multiple SIW Feeders for Monopulse DF-Applications

Sangwoon Youn, Tae Heung Lim, Byung-Jun Jang, Hosung Choo · 2022

This paper proposes the design of a gain enhanced single circular patch radiator (SCPR) with a cavity-backed structure using multiple substrate integrated waveguide (SIW) feeders for monopulse systems…

Read Paper →
Multidisciplinary & Other Peer-Reviewed PDF DOI

PersianQuAD: The Native Question Answering Dataset for the Persian Language

Arefeh Kazemi, Jamshid Mozafari, Mohammad Ali Nematbakhsh · 2022

Developing Question Answering systems (QA) is one of the main goals in Artificial Intelligence. With the advent of Deep Learning (DL) techniques, QA systems have witnessed significant advances. Althou…

Read Paper →
Multidisciplinary & Other Peer-Reviewed PDF DOI

Estimating the Bot Population on Twitter via Random Walk Based Sampling

Mei Fukuda, Kazuki Nakajima, Kazuyuki Shudo · 2022

The rise of social bots, which contribute to marketing, political intervention, and the spread of fake news, has been noted. Analysis methods for the characteristics of Twitter bots have been develope…

Read Paper →
Multidisciplinary & Other Peer-Reviewed PDF DOI

How Does Proximity Affect the Dual Innovation of Alliance Partner? The Role of Knowledge Coupling

Yongbo Sun, Ying Sun, Jiajia Zhang · 2022

Recent work on alliance partner selection focuses on the relationship between partner features and alliance performance, while ignoring the influence mechanism of alliance partner features on differen…

Read Paper →
Multidisciplinary & Other Peer-Reviewed PDF DOI

Kernel Parameter Optimization for Support Vector Machine Based on Sliding Mode Control

Maryam Yalsavar, Paknoosh Karimaghaee, Akbar Sheikh-Akbari, Mohammad-Hassan Khooban, Jamshid Dehmeshki, Salah Al-Majeed · 2022

Support Vector Machine (SVM) is a supervised machine learning algorithm, which is used for robust and accurate classification. Despite its advantages, its classification speed deteriorates due to its …

Read Paper →
Multidisciplinary & Other Peer-Reviewed PDF DOI

Systematic Transistor Sizing of a CNFET-Based Ternary Inverter for High Performance and Noise Margin Enlargement

Mehdi Takbiri, Keivan Navi, Reza Faghih Mirzaee · 2022

Noise and variation are the two major challenges for the reliability of digital circuits, especially multiple-valued logic (MVL) circuits where the entire voltage range is divided into some narrow zon…

Read Paper →
Engineering Peer-Reviewed PDF DOI

An Active and Reactive Power Controller for Battery Energy Storage System in Microgrids

Jun-Ting Gao, Chang-Heng Shih, Chun-Wei Lee, Kuo-Yuan Lo · 2022

Battery energy storage systems (BESS) are widely used for renewable energy applications, especially in stabilizing the power system with ancillary services. The objective of this paper is to propose a…

Read Paper →
Computer Science Peer-Reviewed PDF DOI

Towards InAs/InP Quantum-Dash Laser-Based Ultra-High Capacity Heterogeneous Optical Networks: A Review

Mohammed Zahed Mustafa Khan · 2022

nan…

Read Paper →
Multidisciplinary & Other Peer-Reviewed PDF DOI

Anomalous Radio Frequency Conductivity and Sheet Resistance of 2D Ti3C2Tx MXene

Md. Abu Saleh Tajin, Kapil R. Dandekar · 2022

In this paper, we demonstrate the anomalous radio frequency (RF) performance of a 2D nanomaterial, Ti 3 C 2 T x MXene, by extracting conductivity and sheet resistance at both direct current (DC) and …

Read Paper →
Multidisciplinary & Other Peer-Reviewed PDF DOI

Authenticated Encryption Schemes: A Systematic Review

Mohamud Ahmed Jimale, Muhammad Reza Z'aba, Miss Laiha Binti Mat Kiah, Mohd Yamani Idna Idris, Norziana Jamil, Moesfa Soeheila Mohamad, Mohd Saufy Rohmad · 2022

Authenticated encryption (AE) is a cryptographic construction that simultaneously protects confidentiality and integrity. A considerable amount of research has been devoted to the area since its forma…

Read Paper →
Multidisciplinary & Other Peer-Reviewed PDF DOI

Sub-6 GHz Highly Isolated Wideband MIMO Antenna Arrays

Amany A. Megahed, Mohamed Abdelazim, Ehab H. Abdelhay, Heba Y. M. Soliman · 2022

This study proposes a compact four-port multiple-input multiple-output (MIMO) antenna system to operate within a frequency range of 3.2–5.75 GHz to serve in 5G new radio (NR) sub-6 GHz n77/n78/n79 and…

Read Paper →
Multidisciplinary & Other Peer-Reviewed PDF DOI

A New Hybrid Cascaded Switched-Capacitor Reduced Switch Multilevel Inverter for Renewable Sources and Domestic Loads

Mohammad Amin Rezaei, Majid Nayeripour, Jiefeng Hu, Shahab S. Band, Amir Mosavi, Mohammad-Hassan Khooban · 2022

This multilevel inverter type summarizes an output voltage of medium voltage based on a series connection of power cells employing standard configurations of low-voltage components. The main problems …

Read Paper →
Multidisciplinary & Other Peer-Reviewed PDF DOI

Single-Point Crossover and Jellyfish Optimization for Handling Imbalanced Data Classification Problem

Abeer S. Desuky, Yomna M. Elbarawy, Samina Kausar, Asmaa Hekal Omar, Sadiq Hussain · 2022

The imbalanced datasets and their classification has pulled in as a hot research topic over the years. It is used in different fields, for example, security, finance, health, and many others. The imba…

Read Paper →
AI & Data Science Peer-Reviewed PDF DOI

Neural Network Approach to Program Synthesis for Tabular Transformation by Example

Yoshifumi Ujibashi, Atsuhiro Takasu · 2022

Data transformation is a laborious and time-consuming task for analysts. Programming by example (PBE) is a technique that can simplify this difficult task for data analysts by automatically generating…

Read Paper →
Multidisciplinary & Other Peer-Reviewed PDF DOI

Transverse Flux Machine—A Review

Benedikt Kaiser, Nejila Parspour · 2022

For applications with high torque demand, gearboxes are commonly used to convert torque and speed in order to receive higher specific values for torque and power. This causes additional losses, cost, …

Read Paper →
Multidisciplinary & Other Peer-Reviewed PDF DOI

Aircraft Trajectory Prediction With Enriched Intent Using Encoder-Decoder Architecture

Phu N. Tran, Hoang Q. V. Nguyen, Duc-Thinh Pham, Sameer Alam · 2022

Aircraft trajectory prediction is a challenging problem in air traffic control, especially for conflict detection. Traditional trajectory predictors require a variety of inputs such as flight-plans, a…

Read Paper →
Multidisciplinary & Other Peer-Reviewed PDF DOI

Rapid Quality Evaluation of Camellia Oleifera Seed Kernel Using a Developed Portable NIR With Optimal Wavelength Selection

Amorndej Puttipipatkajorn, Amornrit Puttipipatkajorn · 2022

Moisture content is one of the factors measured to evaluate the quality of Camellia oleifera seeds. High quality C. oleifera seeds used for trading must have a low moisture content, specifically not…

Read Paper →
Multidisciplinary & Other Peer-Reviewed PDF DOI

Research on Losses and Heat Dissipation of Saturable Reactor Used in Converter Valve

Kun Liu, Kai Li, Zhongting Chang, Caiyun Fan, Siquan Hu · 2022

nan…

Read Paper →
Multidisciplinary & Other Peer-Reviewed PDF DOI

Generalized Approximate Message Passing Detector for GSM-OTFS Systems

Tiebin Wang, Shiwen Fan, Hao Chen, Yue Xiao, Xuemei Guan, Wenlong Song · 2022

Orthogonal Time Frequency Space (OTFS) as a two-dimensional modulation scheme designed in the delay-Doppler domain, is realized by inverse symplectic finite Fourier transform (ISFFT) and symplectic fi…

Read Paper →
Multidisciplinary & Other Peer-Reviewed PDF DOI

Research Trends, Challenges, and Emerging Topics in Digital Forensics: A Review of Reviews

Fran Casino, Thomas K. Dasaklis, Georgios P. Spathoulas, Marios Anagnostopoulos, Amrita Ghosal, Istvan Borocz, Agusti Solanas, Mauro Conti, Constantinos Patsakis · 2022

Due to its critical role in cybersecurity, digital forensics has received significant attention from researchers and practitioners alike. The ever increasing sophistication of modern cyberattacks is d…

Read Paper →
Page 1 of 10726 Next →