Search
Now showing items 1-10 of 1325
On Physical Layer Security in Energy-Efficient Wireless Health Monitoring Applications
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
In this paper, we investigate a multi-objective optimization framework for secure wireless health monitoring applications. In particular, we consider a legitimate link for the transmission of a vital EEG signal, threatened ...
A Model-driven Approach to the development of a PBL Script Editor
(
Global Chinese Conference on Computers in Education (GCCCE)
, 2013 , Article)
Designing a pedagogically sound and technically executable collaboration script is a highly complex,
time-consuming and error-prone task. This paper presents a model-driven approach to enable practitioners to design
online ...
Cooperative Q-learning techniques for distributed online power allocation in femtocell networks
(
John Wiley & Sons, Ltd.
, 2015 , Article)
In this paper, we address the problem of distributed interference management of femtocells that share the same frequency band with macrocells using distributed multi-agent Q-learning. We formulate and solve two problems ...
Verifying cloud service-level agreement by a third-party auditor
(
John Wiley & Sons, Ltd.
, 2014 , Article)
In this paper, we study the important issue of verifying service-level agreement (SLA) with an untrusted cloud and present an SLA verification framework that utilizes a third-party auditor (TPA). A cloud provides users ...
Game-based micro-learning approach for language vocabulary acquisition using LingoSnacks
(
IEEE
, 2013 , Conference Paper)
Acquisition of new vocabulary is an important element for language learning but it requires repeated and varied exposure to the new words and their usage. This paper reports the experience of designing and developing a ...
Designing Decision Support Systems for Humanitarian Organisations
(
John Wiley & Sons, Inc.
, 2015 , Book chapter)
The first step to ensure the success of applications in a specific field consists in producing a complete and representative model of the studied system. This alignment with reality is not easy to achieve though. This is ...
Stochastic learning automata-based channel selection in cognitive radio/dynamic spectrum access for WiMAX networks
(
John Wiley & Sons, Ltd.
, 2015 , Article)
This paper proposes a cognitive radio-based dynamic bandwidth allocation scheme for secondary users in a cluster-based WiMAX network. It uses a learning automata-based algorithm to find the optimal transmission channel, ...
mlearn: Designing a Platform for Mobile Learning
(
IGI Global
, 2013 , Book chapter)
This chapter presents the findings of the first phase of a four-phase research study that involves the design and development of an integrated architecture for a mobile learning platform. During this phase, a high-level ...
Q-Map Application for Enrichment of a Mobile Directory Assistance Service
(
NCCIT 2010
, 2010 , Article)
The project described in this paper involves designing and developing a mobile map application, called the Qatar Map (Q-Map), which supports a telephone directory assistance service that runs over the terrestrial cellular ...
A performance comparison of MD5 authenticated routing traffic with EIGRP, RIPv2, and OSPF
(
Zarqa University
, 2010 , Article)
Routing is the process of forwarding data across an inter-network from a designated source to a final destination. Along the way from source to destination, at least one intermediate node is considered. Due to the major ...