Search
Now showing items 21-30 of 53
A model-based validated autonomic approach to self-protect computing systems
(
IEEE
, 2014 , Article)
This paper introduces an autonomic model-based cyber security management approach for the Internet of Things (IoT) ecosystems. The approach aims at realizing a self-protecting system, which has the ability to autonomously ...
Cell phenotyping in multi-tag fluorescent bioimages
(
Elsevier B.V.
, 2014 , Article)
Multi-tag bioimaging systems have recently emerged as powerful tools which provide spatiotemporal localization of several different proteins in the same tissue specimen. The analysis of such multivariate bioimages requires ...
Decentralized throughput maximization in cognitive radio wireless mesh networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2014 , Article)
Scheduling and spectrum allocation are tasks affecting the performance of cognitive radio wireless networks, where heterogeneity in channel availability limits the performance and poses a great challenge on protocol design. ...
Joint routing and resource allocation for delay minimization in cognitive radio based mesh networks
(
IEEE
, 2014 , Article)
This paper studies the joint design of routing and resource allocation algorithms in cognitive radio based wireless mesh networks. The mesh nodes utilize cognitive overlay mode to share the spectrum with primary users. ...
Memory footprint reduction for power-efficient realization of 2-D finite impulse response filters
(
Institute of Electrical and Electronics Engineers Inc.
, 2014 , Article)
We have analyzed memory footprint and combinational complexity to arrive at a systematic design strategy to derive area-delay-power-efficient architectures for two-dimensional (2-D) finite impulse response (FIR) filter. ...
Automatic prediction of age, gender, and nationality in offline handwriting
(
Hindawi Publishing Corporation
, 2014 , Article)
The classification of handwriting into different categories, such as age, gender, and nationality, has several applications. In forensics, handwriting classification helps investigators focus on a certain category of ...
Developing, implementing and improving learning outcomes assessment in Qatar's public higher education
(
Hamad bin Khalifa University Press (HBKU Press)
, 2014 , Article)
This study reports on the development and implementation of the Student Learning Outcomes Assessment process and the system implemented at Qatar University. This system consists of two phases, initiation and enhancement, ...
Computation of Yvon-Villarceau circles on Dupin cyclides and construction of circular edge right triangles on tori and Dupin cyclides
(
Elsevier Ltd
, 2014 , Article)
Ring Dupin cyclides are non-spherical algebraic surfaces of degree four that can be defined as the image by inversion of a ring torus. They are interesting in geometric modeling because: (1) they have several families of ...
Exploiting context severity to achieve opportunistic service differentiation in vehicular ad hoc networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2014 , Article)
Wireless Access in Vehicular Environment (WAVE) dictates primitives for intelligent transportation system (ITS) applications and services. The medium access control (MAC) layer in WAVE facilitates service differentiation. ...
Enabling smart cloud services through remote sensing: An internet of everything enabler
(
Institute of Electrical and Electronics Engineers Inc.
, 2014 , Article)
The recent emergence and success of cloud-based services has empowered remote sensing and made it very possible. Cloud-assisted remote sensing (CARS) enables distributed sensory data collection, global resource and data ...