Search
Now showing items 1-6 of 6
Modelling and performance analysis of 3-D heterogeneous cellular networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2016 , Conference Paper)
Cellular networks are usually described by two-dimensional (2-D) models. These models are appropriate for rural or suburban areas but are not suitable for dense urban environments, where a large number of heterogeneous ...
Sewer Inspection Prioritization Using a Defect-Based Bayesian Belief Network Model
(
American Society of Civil Engineers (ASCE)
, 2016 , Conference Paper)
In order to successfully implement an asset management program, an accurate and reliable deterioration model for assets should be available. Deterioration models are considered as the basis for predicting and prioritizing ...
Capacity analysis of cognitive wireless networks with dynamic spectrum access
(
IEEE Computer Society
, 2015 , Conference Paper)
Cognitive radio (CR) is a promising technology based on spectrum sharing where the secondary unlicensed users can access the licensed frequency bands in the primary system without any modification to the devices, services ...
On physical layer security of correlated multiantenna cognitive radio receivers
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Conference Paper)
In limited space scenarios, the antennas in the multiantenna cognitive radio (CR) system are closely spaced and often experience correlation among them. In this work, the secrecy performance of correlated multiantenna CR ...
Automatic number plate recognition on FPGA
(
Institute of Electrical and Electronics Engineers Inc.
, 2013 , Conference Paper)
Automatic Number Plate Recognition (ANPR) systems have become one of the most important components in the current Intelligent Transportation Systems (ITS). In this paper, a FPGA implementation of a complete ANPR system ...
Tracking and constraining authorization provenance
(
Springer Berlin Heidelberg
, 2012 , Conference Paper)
Authorization provenance concerns how an authorization is derived. It appears important to define authorization provenance to (1) analyze policy bases, (2) defend against a class of attacks, and (3) audit authorizations. ...