Now showing items 589-608 of 2211

    • Conformal circular patch antenna array design for use in jet engines 

      Krishna, A.; Khattab, T.; Abdelaziz, A.F.; Guizani, M. ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)
      A novel low profile two elements array of circular patch antenna is designed, analyzed and simulated for wireless sensor applications in extremly harsh environments like jet engines. The designed antenna is simulated using ...
    • Congestion-aware core mapping for Network-on-Chip based systems using betweenness centrality 

      Maqsood T.; Bilal K.; Madani S.A. ( Elsevier B.V. , 2018 , Article)
      Network congestion poses significant impact on application performance and network throughput in Network-on-Chip (NoC) based systems. Efficient core mapping can significantly reduce the network contention and end-to-end ...
    • ConProve: A conceptual prover system 

      Elloumi, Samir; Jaoua, Ali; Boulifa, Bilel; Saleh, Mohammad; Al Otaibi, Jameela ( IEEE , 2014 , Conference Paper)
      ConProve is an automated prover for propositional logic. It takes, as an input, a set of propositional formulas and proves whether a goal holds or not. ConProve converts each formula to its corresponding Truth Table Binary ...
    • Constrained metric learning by permutation inducing isometries 

      Bosveld, Joel; Mahmood, Arif; Huynh, Du Q.; Noakes, Lyle ( Institute of Electrical and Electronics Engineers Inc. , 2016 , Article)
      The choice of metric critically affects the performance of classification and clustering algorithms. Metric learning algorithms attempt to improve performance, by learning a more appropriate metric. Unfortunately, most of ...
    • Constraint-enhanced role engineering via answer set programming 

      Hu, Jinwei; Khan, Khaled M.; Bai, Yun; Zhang, Yan ( Association for Computing Machinery , 2012 , Conference Paper)
      Role engineering (RE) aims to develop and maintain appropriate role-based access control (RBAC) configurations. However, RE with constraints in place is not well-studied. Constraints usually describe organizations' security ...
    • Construction of audio corpus of non-native English dialects -Arabs speakers 

      Chellali S.; Al-Maadeed, Somaya; Asim M.; Ahfir M.; Hidouci W.K. ( European Association of Geoscientists and Engineers, EAGE , 2017 , Conference Paper)
      Speech recognition for the academic and standard languages has achieved a great development, but in the face of the multiple dialects with their differences, there is still a noticeable lack of recognition rates, especially ...
    • Content-based image retrieval with compact deep convolutional features 

      Alzu'bi, Ahmad; Amira, Abbes; Ramzan, Naeem ( Elsevier B.V. , 2017 , Article)
      Convolutional neural networks (CNNs) with deep learning have recently achieved a remarkable success with a superior performance in computer vision applications. Most of CNN-based methods extract image features at the last ...
    • Context-Aware Object Detection for Vehicular Networks Based on Edge-Cloud Cooperation 

      Guo, Jie; Song, Bin; Chen, Siqi; Yu, Fei Richard; Du, Xiaojiang; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)
      Due to high mobility and high dynamic environments, object detection for vehicular networks is one of the most challenging tasks. However, the development of integration techniques, such as software-defined networking (SDN) ...
    • Contextual Preparation of Future Engineers: A non-Western Perspective 

      Hasna, M.O.; Impagliazzo, John ( IEEE , 2008 , Conference Paper)
      The advent of technological communication and modern travel has increased the likelihood that graduates from engineering programs will work in environments containing integrated cultures, customs, and languages. One may ...
    • Contract and lyapunov optimization-based load scheduling and energy management for UAV charging stations 

      Lv, Lingling; Zheng, Chan; Zhang, Lei; Shan, Chun; Tian, Zhihong; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)
      Nowadays, a large number of civilian unmanned aerial vehicles (UAVs) are increasingly being used in many of our daily applications. However, there are many kinds of UAVs that need to enhance their endurance due to their ...
    • Controlling Error Propagation in Network-Coded Cooperative Wireless Systems 

      Al-Habian, G.; Ghrayeb, A.; Hasna, M.O. ( IEEE , 2009 , Article)
      In cooperative communications, error propagation at relays degrades the diversity order of the system. To combat that effect, it has been suggested to implement a reliability threshold at the relay to control error ...
    • Convolutional Autoencoder Approach for EEG Compression and Reconstruction in m-Health Systems 

      Al-Marridi A.Z.; Mohamed A.; Erbad A. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
      In the last few years, the number of patients with chronic diseases requiring constant monitoring increased rapidly, which motivates researchers to develop scalable remote health applications. Nevertheless, the amount of ...
    • Cooperative access in cognitive radio networks: Stable throughput and delay tradeoffs 

      Ashour, Mahmoud; El-Sherif, Amr A.; Elbatt, Tamer; Mohamed, Amr ( IEEE , 2014 , Conference Paper)
      In this paper, we study and analyze fundamental throughput-delay tradeoffs in cooperative multiple access for cognitive radio systems. We focus on the class of randomized cooperative policies, whereby the secondary user ...
    • Cooperative Conceptual Retrieval for Heterogeneous Information 

      Nafkha, Ibtissem; Jaoua, Ali ( IEEE , 2006 , Conference Paper)
      The potentials of formal concept analysis (FCA) for information retrieval have been highlighted by a number of research studies since its inception. With the advent of the Web along with the unprecedented amount of information ...
    • Cooperative education development: Towards ICT reference models 

      Bouras, Abdelaziz; Veillard, Laurent; Tralongo, Stéphanie; Lenir, Michel ( Institute of Electrical and Electronics Engineers Inc. , 2014 , Conference Paper)
      The paper focuses on the modeling of new Information and Communication Technology competences and skills. Competencies as abstractions of work human behavior, have emerged as a promising concept to make human skills and ...
    • Cooperative information security/cybersecurity curriculum development 

      Bouras, Abdelaziz; Gasmi, Houssem; Ghemri, Fadi ( Springer Verlag , 2018 , Conference Paper)
      It is often difficult to meaningfully convey concepts like security incident management cycle, information sharing, cooperation, as well as the roles of people, processes and technology in information and cybersecurity ...
    • Cooperative joint power splitting and allocation approach for simultaneous energy delivery and data transfer 

      Ben Ghorbel, Mahdi; Guizani, Mohsen; Khalfi, Bassem; Hamdaoui, Bechir ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)
      In this paper, we propose to minimize the total energy consumption cost of a simultaneous data transmission and power delivery from different sources. The receiver is designed to simultaneously process information and ...
    • Cooperative Machine Learning Techniques for Cloud Intrusion Detection 

      Chkirbene, Zina; Hamila, Ridha; Erbad, Aiman; Kiranyaz, Serkan; Al-Emadi, Nasser; ... more authors ( IEEE , 2021 , Conference Paper)
      Cloud computing is attracting a lot of attention in the past few years. Although, even with its wide acceptance, cloud security is still one of the most essential concerns of cloud computing. Many systems have been proposed ...
    • Cooperative Q-learning techniques for distributed online power allocation in femtocell networks 

      Saad, H.; Mohamed, A.; ElBatt, T. ( John Wiley & Sons, Ltd. , 2015 , Article)
      In this paper, we address the problem of distributed interference management of femtocells that share the same frequency band with macrocells using distributed multi-agent Q-learning. We formulate and solve two problems ...
    • Cooperative Secondary Encryption for Primary Privacy Preserving in Cognitive Radio Networks 

      Wang, Dawei; Zhang, Ruonan; Li, Lixin; Men, Shaoyang; Zhou, Deyun; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)
      Aiming at protecting primary privacy messages and supporting secondary quality-of-service (QoS), we propose a secondary encrypted secure strategy for cognitive radio networks. In this scheme, a primary system directly ...