بحث بسيط
السجلات المعروضة 51 -- 60 من 1325
Understanding probabilistic cognitive relaying communication with experimental implementation and performance analysis
(
MDPI AG
, 2019 , Article)
Efficiently use of the limited wireless spectrum can be achieved by cooperative cognitive relaying, where secondary users (SUs), who do not pay for the licensed spectrum and have better channel condition to the primary ...
Multi-Objective Security Hardening Optimisation for Dynamic Networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
Hardening the dynamic networks is a very challenging task due to their complexity and dynamicity. Moreover, there may be multi-objectives to satisfy, while containing the solutions within the constraints (e.g., fixed budget, ...
Online risk assessment and prediction models for Autonomic Cloud Intrusion srevention systems
(
IEEE
, 2014 , Conference Paper)
The extensive use of virtualization in implementing cloud infrastructure brings unrivaled security concerns for cloud tenants or customers and introduces an additional layer that itself must be completely configured and ...
MIMO vehicle to vehicle channels: An experimental study
(
IEEE
, 2014 , Conference Paper)
In this paper, a platform for measuring the impulse response of wireless multiple-input-multiple-output (MIMO) vehicle-to-vehicle (V2V) channels is presented. The platform is developed using Rice University Wireless ...
PLATE workbench: A PBL authoring tool
(
Springer International Publishing
, 2014 , Conference Paper)
For most practitioners it is problematic to design an online or blended problem-based learning (PBL) unit within an increasingly complex learning context. This paper presents the development and application of a PBL authoring ...
Overcoming user selfishness in DSA systems through credit-based resource allocation
(
IEEE
, 2014 , Conference Paper)
We propose a credit-based resource allocation technique for wireless systems with dynamic spectrum access (DSA) capability, such as multichannel wireless sensor networks. The proposed technique is robust against selfish ...
A fast method for approximate registration of whole-slide images of serial sections using local curvature
(
SPIE
, 2014 , Conference Paper)
We present a method for fast, approximate registration of whole-slide images (WSIs) of histopathology serial sections. Popular histopathology slide registration methods in the existing literature tend towards intensity-based ...
A PLM components monitoring framework for SMEs based on a PLM maturity model and FAHP methodology
(
Mundo Press
, 2014 , Article)
Right PLM components selection and investments increase business advantages. This paper develops a PLM components monitoring framework to assess and guide PLM implementation in small and middle enterprises (SMEs). The ...
Automatic detection of regions in spinach canopies responding to soil moisture deficit using combined visible and thermal imagery
(
Public Library of Science
, 2014 , Article)
Thermal imaging has been used in the past for remote detection of regions of canopy showing symptoms of stress, including water deficit stress. Stress indices derived from thermal images have been used as an indicator of ...
Novel geometric features for off-line writer identification
(
Springer Verlag
, 2014 , Article)
Writer identification is an important field in forensic document examination. Typically, a writer identification system consists of two main steps: feature extraction and matching and the performance depends significantly ...