بحث بسيط
السجلات المعروضة 41 -- 50 من 51
Delay minimization through joint routing and resource allocation in cognitive radio-based mesh networks
(
IEEE
, 2012 , Conference Paper)
We consider wireless mesh networks in which the nodes are utilizing cognitive radios and try to opportunistically gain access to spectrum resources. In such networks, the timely delivery of the traffic is a challenging ...
Channel Aware and Queue Aware Scheduling in LTE Uplink
(
SpringerLink
, 2012 , Conference Paper)
Long Term Evolution (LTE) uses single carrier frequency division multiple access (SCFDMA) technique as the multiple access scheme in the uplink, due to its low peak to average power ratio (PAPR) compared to orthogonal ...
Distributed cooperative q-learning for power allocation in cognitive femtocell networks
(
IEEE
, 2012 , Conference Paper)
In this paper, we propose a distributed reinforcement learning (RL) technique called distributed power control using Q-learning (DPC-Q) to manage the interference caused by the femtocells on macro-users in the downlink. ...
Evidence theory-based approach for epileptic seizure detection using EEG signals
(
IEEE
, 2012 , Conference Paper)
Electroencephalogram (EEG) is one of the potential physiological signals used for detecting epileptic seizure. Discriminant features, representing different brain conditions, are often extracted for diagnosis purposes. ...
Computer aided diagnosis system based on machine learning techniques for lung cancer
(2012 , Conference Paper)
Cancer is a leading cause of death worldwide. Lung cancer is a type of cancer that is considered as one of the most leading causes of death globally. In Malaysia, it is the 3rd common cancer type and the 2nd type of cancer ...
Applying and evaluating architectural patterns on a stock trading case study
(
IEEE
, 2012 , Conference Paper)
Teaching architectural and design patterns is a difficult task and not easy to understand by the students as patterns are expressed at a higher abstraction level than programming language constructs or graphical UML ...
An online signature verification system for forgery and disguise detection
(
Springer
, 2012 , Conference Paper)
Online signatures are acquired using a digital tablet which provides all the trajectory of the signature as well as the variation in pressure with respect to time. Therefore, online signature verification achieves higher ...
Towards cost-effective maintenance of power transformer by accurately predicting its insulation condition
(2012 , Conference Paper)
Insulation resistance (IR) or Megger test has been commonly performed in both preventive and corrective maintenance activities to verify power transformers' insulation condition. Other insulation diagnosis tests such as ...
Modeling security importance and preferences of software services
(
IEEE
, 2012 , Conference Paper)
This paper proposes a modeling framework on how to specify security preferences and importance of software services, and compute a quantifiable value. Our approach advocates for an automatic calculation of the results of ...
A multi-modal face and signature biometric authentication system using a max-of-scores based fusion
(
Springer
, 2012 , Conference Paper)
Face and signature based multimodal biometric systems are often required in various areas, such as banking biometric systems and secured mobile phone operating systems, among others. Our system combines these two biometric ...