Search
Now showing items 451-460 of 565
Demonstrating the Worth of Recycled Aggregates - A Case Study from Qatar
(
American Society of Civil Engineers (ASCE)
, 2016 , Conference Paper)
Recycled aggregates are widely used in unbound applications in many countries. However, in some areas the materials available may not meet all the requirements of the local specifications. This is the case in Qatar, where ...
QoE-oriented resource efficiency for 5G two-tier cellular networks: A femtocaching framework
(
Institute of Electrical and Electronics Engineers Inc.
, 2016 , Conference Paper)
Video streaming applications and services (VASs) consume an enormous amount of scarce resources in mobile devices and cellular wireless networks due to the demand for high data rates of video streaming. The limited resource ...
Operation of three-phase modular multilevel converter (MMC) with reduced number of arms
(
Institute of Electrical and Electronics Engineers Inc.
, 2016 , Conference Paper)
Conventional three-phase MMC consists of six-arms, each arm is controlled to generate unipolar voltage ranging from zero to Vdc where Vdc is the input DC voltage. Each arm voltage has two components (DC and AC components). ...
An efficient hybrid prediction approach for predicting cloud consumer resource needs
(
IEEE Computer Society
, 2016 , Conference Paper)
The prediction of cloud consumer resource needs is a vital step for several cloud deployment applications such as capacity planning, workload management, and dynamic allocation of cloud resources. In this paper, we develop ...
Robust distributed consensus of autonomous underwater vehicles in 3D space
(
Institute of Electrical and Electronics Engineers Inc.
, 2016 , Conference Paper)
In this paper, robust distributed consensus of autonomous underwater vehicles (AUV) in the presence of ocean disturbances is investigated where the considered model describes both the kinematics and dynamics of the AUV ...
Authenticity detection as a binary text categorization problem: Application to Hadith authentication
(
IEEE Computer Society
, 2016 , Conference Paper)
Authentication of Hadiths (sayings of Prophet Muhammad) is very important field for religious scholars as well as historians. Authenticity verification is traditionally conducted by studying how trustworthy is each person ...
Fault tolerant tactile sensor arrays for prosthesis
(
IEEE Computer Society
, 2016 , Conference Paper)
The demand for sensor networks has grown significantly over the last decade. These networks operate as a single unit, accumulating information from individual sensor nodes. Due to a matrix-like topology of these arrays, a ...
EPC Gen-2 UHF RFID tags with low-power CMOS temperature sensor suitable for gas applications
(
Institute of Electrical and Electronics Engineers Inc.
, 2016 , Conference Paper)
This paper presents a passive RFID tag with an embedded temperature sensor intended for the EPC Gen-2 protocol operating in the 902-928 MHz ISM band. The design is implemented as a node of a low cost temperature sensors ...
Wireless active noise control results
(
International Institute of Acoustics and Vibrations
, 2016 , Conference Paper)
Active Noise Control (ANC) is used in controlling low frequency noise where passive control is ineffective. Most (ANC) systems use physical cables to connect various parts of the system for operation. This can be bulky and ...
Learned vs. engineered features for fine-grained classification of aquatic macroinvertebrates
(
Institute of Electrical and Electronics Engineers Inc.
, 2016 , Conference Paper)
Aquatic macroinvertebrate biomonitoring is an efficient way of assessment of slow and subtle anthropogenic changes and their effect on water quality. It is imperative to have reliable identification and counts of the various ...