بحث بسيط
السجلات المعروضة 161 -- 170 من 220
Detecting the greedy spectrum occupancy threat in cognitive radio networks
(
IEEE Computer Society
, 2014 , Conference Paper)
Recently, security of cognitive radio (CR) is becoming a severe issue. There is one kind of threat, which we call greedy spectrum occupancy threat (GSOT) in this paper, has long been ignored in previous work. In GSOT, a ...
Design and implementation of credit-based resource allocation protocol for DSA systems
(
IEEE Computer Society
, 2014 , Conference Paper)
This paper designs, implements, and evaluates an efficient dynamic spectrum access (DSA) protocol for cognitive radio networks. The proposed protocol relies on the concept of credit value to allocate resources among users ...
Routing and channel assignment in wireless cooperative networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2014 , Conference Paper)
In recent years, cooperative communication has attracted researchers' attention as it showed a good capability to increase network performance. On the other hand, a cooperative transmission may cause more interference. ...
Auditing cloud service level agreement on VM CPU speed
(
IEEE Computer Society
, 2014 , Conference Paper)
In this paper, we present a novel scheme for auditing Service Level Agreement (SLA) in a semi-trusted or untrusted cloud. A SLA is a contract formed between a cloud service provider (CSP)and a user which specifies, in ...
Measurement of grid solar PV system in Oman
(
Institution of Engineering and Technology
, 2014 , Conference Paper)
In this paper the measured results of Desert Type PV, in Muscat governorate in Oman, is discussed and analyzed. Several factors were measured and calculated for one whole year including, solar radiation, efficiency of the ...
Classification ensemble to improve medical named entity recognition
(
Institute of Electrical and Electronics Engineers Inc.
, 2014 , Conference Paper)
An accurate Named Entity Recognition (NER) is important for knowledge discovery in text mining. This paper proposes an ensemble machine learning approach to recognise Named Entities (NEs) from unstructured and informal ...
A probabilistic multi-tenant model for virtual machine mapping in cloud systems
(
Institute of Electrical and Electronics Engineers Inc.
, 2014 , Conference Paper)
A novel probabilistic multi-tenant model is developed to characterize the service performance of cloud systems. The model considers essential cloud-system characteristics including virtualization, multi-tenancy and ...
Virtual network mapping for cloud services under probabilistic regional failures
(
Institute of Electrical and Electronics Engineers Inc.
, 2014 , Conference Paper)
Network virtualization is critical for distributing cloud services over expanded distances and improving scalability and responsiveness. However many providers are very concerned about maintaining high availability, ...
Automated knowledge discovery in facility layout planning
(
International Business Information Management Association, IBIMA
, 2014 , Conference Paper)
This paper proposes a novel methodology for facilities layout planning and optimization in which fitness evaluation of layout alternatives is done in an automated manner using an artificial neural network trained to user ...
Cost effective assessment of transformers using machine learning approach
(
IEEE Computer Society
, 2014 , Conference Paper)
Furan content in transformer oil is highly correlated with the transformer insulation paper aging. In this paper, the ranges of furan content in power transformer is predicted using measurements of transformer oil tests ...