بحث بسيط
السجلات المعروضة 101 -- 110 من 221
On target coverage in mobile visual sensor networks
(
Association for Computing Machinery, Inc
, 2014 , Conference Paper)
Recent advancements in manufacturing low-cost wireless battery operated cameras has made their application in Wireless Video Sensor Networks (WVSN) increasingly more feasible and affordable. The application of robotic ...
Quasi seven-level operation of multilevel converters with selective harmonic elimination
(
Institute of Electrical and Electronics Engineers Inc.
, 2014 , Conference Paper)
Generally, selective harmonic elimination (SHE) complexity for multilevel inverters increases with the increase in number of levels. In this paper, a novel approach for SHE is introduced. This approach is based on cancelling ...
Passive pre-cooling potential for reducing building air-conditioning loads in hot climates
(
American Society of Heating, Refrigeration, and Air-Conditioning Engineers (ASHRAE)
, 2014 , Conference Paper)
A major source of energy consumption in the building sector is the extensive use of Heating, Ventilation and Air-Conditioning (HVAC) systems to meet the rising demands for indoor comfort. Advancements in reducing cooling ...
Optimal power allocation for smart-grid powered point-to-point cognitive radio system
(
IEEE
, 2014 , Conference Paper)
This paper proposes an optimal power allocation analysis for a point-to-point wireless system when powered by a smart grid. We propose to minimize the total power consumption cost while ensuring individual and total ...
Attack Prediction Models for Cloud Intrusion Detection Systems
(
Institute of Electrical and Electronics Engineers Inc.
, 2014 , Conference Paper)
In spite of the functional and economic benefits of the cloud-computing systems, they also expose entirely several attacks. Most of the current cloud security technologies do not provide early warnings about such attacks. ...
Improved relay selection for decode-and-forward cooperative wireless networks under secrecy rate maximization
(
Institute of Electrical and Electronics Engineers Inc.
, 2014 , Conference Paper)
Privacy and security have an increasingly important role in wireless networks. A secure communication enables a legitimate destination to successfully retrieve information sent by a source, while it disables the eavesdropper ...
Efficient segmentation of sub-words within handwritten arabic words
(
Institute of Electrical and Electronics Engineers Inc.
, 2014 , Conference Paper)
Segmentation is considered as a core step for any recognition or classification method and for the text within any document to be effectively recognized it must be segmented accurately. In this paper a text and writer ...
A non-inclusive memory permissions architecture for protection against cross-layer attacks
(
IEEE
, 2014 , Conference Paper)
Protecting modern computer systems and complex software stacks against the growing range of possible attacks is becoming increasingly difficult. The architecture of modern commodity systems allows attackers to subvert ...
RSU cloud and its resource management in support of enhanced vehicular applications
(
IEEE
, 2014 , Conference Paper)
We propose Roadside Unit (RSU) Clouds as a novel way to offer non-safety application with QoS for VANETs. The architecture of RSU Clouds is delineated, and consists of traditional RSUs and specialized micro-datacenters and ...
Haralick feature extraction from time-frequency images for epileptic seizure detection and classification of EEG data
(
IEEE
, 2014 , Conference Paper)
This paper presents novel time-frequency (t-f) features based on t-f image descriptors for the automatic detection and classification of epileptic seizure activities in EEG data. Most previous methods were based only on ...