Search
Now showing items 221-230 of 505
A sparsity-aware approach for NBI estimation and mitigation in large cognitive radio networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2016 , Conference Paper)
Underlay cognitive networks should follow strict interference thresholds to operate in parallel with primary networks. This constraint limits their transmission power and eventually the coverage area. Therefore, in this ...
An efficient hybrid prediction approach for predicting cloud consumer resource needs
(
IEEE Computer Society
, 2016 , Conference Paper)
The prediction of cloud consumer resource needs is a vital step for several cloud deployment applications such as capacity planning, workload management, and dynamic allocation of cloud resources. In this paper, we develop ...
Authenticity detection as a binary text categorization problem: Application to Hadith authentication
(
IEEE Computer Society
, 2016 , Conference Paper)
Authentication of Hadiths (sayings of Prophet Muhammad) is very important field for religious scholars as well as historians. Authenticity verification is traditionally conducted by studying how trustworthy is each person ...
Crosslingual automatic diacritization for Egyptian Colloquial Dialect
(
IEEE Computer Society
, 2016 , Conference Paper)
In this paper, the problem of missing diacritic marks in most of dialectal Arabic written resources is addressed. Our aim is to implement a scalable and extensible platform for automatically retrieving the diacritic marks ...
Surviving link failures in multicast VN embedded applications
(
Institute of Electrical and Electronics Engineers Inc.
, 2016 , Conference Paper)
Virtual network embedding (VNE) is defined as the allocation of network resources to multiple virtual networks (VNs) and is recognized to be a challenging task to perform efficiently. Virtual network survivability is a new ...
PEAM: A polymorphic, energy-aware MAC protocol for WBAN
(
Institute of Electrical and Electronics Engineers Inc.
, 2016 , Conference Paper)
In remote healthcare monitoring and care delivery, obtaining the right information at the right time is critical. For these systems, designing an efficient MAC protocol that is able to meet the challenges on network quality ...
Network function virtualization scheduling with transmission delay optimization
(
Institute of Electrical and Electronics Engineers Inc.
, 2016 , Conference Paper)
To accelerate the implementation of network functions/middle boxes and reduce the deployment cost, recently the concept of Network Function Virtualization (NFV) has emerged and became a topic of much interest attracting ...
Wireless multihoming for smart grid high data rate applications
(
IEEE Computer Society
, 2016 , Conference Paper)
Supervisory control and data acquisition (SCADA) systems are used extensively to monitor/control utility power distribution networks. However, the current SCADA systems cannot accommodate the demand of smart grid high data ...
A precise converter for resolvers and sinusoidal encoders based on a novel ratiometric technique
(
Institute of Electrical and Electronics Engineers Inc.
, 2016 , Conference Paper)
Resolvers and other sinusoidal encoders provide electrical signals related to the sine and cosine of the unknown angular position of their rotor shafts. Conventional tangent/cotangent converter used with these transducers ...
Towards enhanced control of upper prosthetic limbs: A force-myographic approach
(
IEEE Computer Society
, 2016 , Conference Paper)
Reliable decoding of a user's intention is a key step to control prosthetic devices. Force myography (FMG) is often used to assess topographic force patterns resulting from volumetric changes of activated muscles. However, ...