بحث بسيط
السجلات المعروضة 81 -- 90 من 112
A Pyramidal Security Model for Large-Scale Group-Oriented Computing in Mobile Ad Hoc Networks: The Key Management Study
(
IEEE
, 2009 , Article)
In mobile ad hoc networks (MANETs), many applications require group-oriented computing among a large number of nodes in an adversarial environment. To deploy these large-scale cooperative applications, secure multicast ...
Estimating design effort for the compressor design department: a case study at Pratt & Whitney Canada
(
Elsevier Ltd
, 2009 , Article)
The effort required in a design project not only impacts the final cost, but also the project lead-time. This paper presents a case study carried out with the collaboration of Pratt & Whitney Canada, a global leader in the ...
Density manifolds, geometric measures and high-energy physics in transfinite dimensions
(
Elsevier B.V.
, 2009 , Article)
We discuss certain manifolds with density. Furthermore, we outline natural connections leading to E-infinity theory and high-energy physics from a geometric measure and transfinite dimensional theoretical viewpoints.
A predictive strategy for lifetime maximization in selective relay networks
(
IEEE
, 2009 , Conference Paper)
Two algorithms based on an energy conserving dynamic transmit power threshold are proposed for improving the lifetime in relay networks utilizing selective relay strategies with amplify-and-forward (AF) relays. the lifetime ...
The mathematical theory of finite and infinite dimensional topological spaces and its relevance to quantum gravity
(
Elsevier Ltd
, 2009 , Article)
The present work gives first a review of the mathematical theory of finite and infinite dimensional topological spaces. Subsequently we connect the discussion with E-infinity theory and the theory of partially ordered sets. ...
موقف أهل السنة من الرواية عن أهل الأهواء و البدع : دراسة نظرية تطبيقية
(
جامعة القاهرة - كلية دار العلوم
, 2009 , Article)
إن أئمة الجرح والتعديل جعلوا نقد أهل البدع وتجريحهم هدفهم الأول حتى يميزوا بين المقبول والمردود من الأحاديث؛ فمدار هذا البحث على رواية المبتدع لأن الفرق الإسلامية الأخرى تعد من المبتدعة في نظر أهل السنة. في حين نجد أن صحيحي ...
Interleukin-2: Evaluation of routes of administration and current delivery systems in cancer therapy
(
Wiley Subscription Services, Inc., A Wiley Company
, 2009 , Article)
Despite the fact that different administration routes and delivery systems have been used for interleukin-2 (IL-2) delivery, little has been reported regarding the most efficient strategies used to deliver IL-2 in a nontoxic, ...
Novel linearizer for tangent/cotangent converter
(
IEEE
, 2009 , Conference Paper)
Resolvers and other types of sinusoidal encoders provide electrical signals whose amplitudes are related to the sine and cosine of the mechanical shaft angle ¿ over the full 360° range. The tangent/cotangent converter, ...
Dynamic risk assessment using failure assessment and Bayesian theory
(
Elsevier Ltd
, 2009 , Article)
To ensure the safety of a process system, engineers use different methods to identify the potential hazards that may cause severe consequences. One of the most popular methods used is quantitative risk assessment (QRA) ...
Development of a remote lab for electrical engineering program
(
IEEE Computer Society
, 2009 , Conference Paper)
A remote lab for electrical engineering experiments has been designed and implemented. This has been intended as a platform that supports existing traditional labs by offering lab experiments that serve some of the student ...