Search
Now showing items 11-20 of 34
Impact of MD5 authentication on routing traffic for the case of: EIGRP, RIPv2 and OSPF
(
Science Publications
, 2008 , Article)
Problem Statement: With the free flow of routing data and the high availability of computer resources, possible threats to the networks can result in loss of privacy and in malicious use of information or resources that ...
Autonomous corrosion detection in gas pipelines: A hybrid-fuzzy classifier approach using ultrasonic nondestructive evaluation protocols
(
IEEE
, 2009 , Article)
In this paper, a customized classifier is presented for the industry-practiced nondestructive evaluation (NDE) protocols using a hybrid-fuzzy inference system (FIS) to classify the corrosion and distinguish it from the ...
Infrared Image Enhancement using H{infinity} Bounds for Surveillance Applications
(
IEEE
, 2008 , Article)
In this paper, two algorithms have been presented to enhance the infrared (IR) images. Using the autoregressive moving average model structure and Hinfin optimal bounds, the image pixels are mapped from the IR pixel space ...
Efficient Channel Allocation Scheme with Triangle Communication
(
IEEE
, 2009 , Article)
Radio is a valuable resource for wireless/mobile communication systems. In this paper, we present an efficient algorithm using a novel triangle communication model to synchronize processes effectively by searching for free ...
Controlling Error Propagation in Network-Coded Cooperative Wireless Systems
(
IEEE
, 2009 , Article)
In cooperative communications, error propagation at relays degrades the diversity order of the system. To combat that effect, it has been suggested to implement a reliability threshold at the relay to control error ...
Self-Imaging based Dispersion Compensation: Performance and Tolerance of the System
(
IEEE
, 2007 , Article)
Transmitting ultra wideband (UWB) pulse signals over optical fiber is a certain sign of chromatic dispersion (CD) existence. CD is a serious problem in optical transmission because the velocity of light depends on the ...
Non-linear simulation of controller for longitudinal control augmentation system of F-16 using numerical approach
(
Elsevier Inc
, 2003 , Article)
The non-linear simulation of controller for automatic flight control system is an essential part of the complete control design process. After using the linear approach in the design and simulation of the controller (control ...
MASACAD: a multiagent based approach to information customization
(
IEEE
, 2006 , Article)
MASACAD is a multiagent information customization system that adopts the machine-learning paradigm to advise students by mining the Web. In the distributed problem-solving paradigm, systems can distribute among themselves ...
Performance and stability analysis of multilevel data structures with deferred reorganization
(
IEEE
, 2002 , Article)
We develop a methodology for analyzing the performance and stability of a server that maintains a multilevel data structure to service a set of access operations for (key, value) records. A subset of the operations executed ...
Preface
(
Elsevier
, 2003 , Article)
In recent years the involvement of Information Technology in business,
governments, and education has increased dramatically. More and more research
works have been conducted in different areas of Information Technology
such ...