Search
Now showing items 11-20 of 48
A multi-modal face and signature biometric authentication system using a max-of-scores based fusion
(
Springer
, 2012 , Conference Paper)
Face and signature based multimodal biometric systems are often required in various areas, such as banking biometric systems and secured mobile phone operating systems, among others. Our system combines these two biometric ...
QUWI: An Arabic and English handwriting dataset for offline writer identification
(
IEEE
, 2012 , Conference Paper)
This paper presents a new offline dataset called the Qatar University Writer Identification dataset (QUWI). This dataset contains both Arabic and English handwritings and can be used to evaluate the performance of offline ...
All-to-all throughput maximization in wireless relay networks with multiple packet reception
(2012 , Conference Paper)
Network Coding (NC) has shown the promise of significant throughput improvement to wireless networks. Meanwhile, Multiple Packet Reception (MPR) has been proved as an efficient way to combat the Multiple Access Interference ...
Forced spectrum access termination probability analysis under restricted channel handoff
(2012 , Conference Paper)
Most existing works on cognitive radio networks assume that cognitive (or secondary) users are capable of switching/jumping to any available channel, regardless of the frequency gap between the target and the current ...
Cognitive transmission based on data priority classification in WSNs for Smart Grid
(2012 , Conference Paper)
Smart Grid integrates digital processing, sensor technology, automatic control and communication to the traditional power grid to achieve more efficient electricity distribution and management. Applying wireless sensor ...
Discovering influential users in micro-blog marketing with influence maximization mechanism
(2012 , Conference Paper)
Micro-blog marketing has become a main business model for social networks nowadays. On social networking sites (e.g., Twitter), micro-blog marketing enables the advertisers to put ads to attract customers to buy their ...
EM-MAC: An energy-aware multi-channel MAC protocol for multi-hop wireless networks
(2012 , Conference Paper)
We propose an energy-aware MAC protocol, referred to as EM-MAC, for multi-hop wireless networks with multi-channel access capabilities. EM-MAC relies on iMAC's efficient channel selection mechanism to resolve the medium ...
A novel P2P VoD streaming technique integrating localization and congestion awareness strategies
(2012 , Conference Paper)
The concept of the "future Internet" has evolved amongst researchers recently to relieve the tremendous pressure on the current Internet infrastructure to support the heterogeneous networking technologies, mobile devices, ...
Understanding the topologies of BitTorrent networks: A measurement view
(2012 , Conference Paper)
BitTorrent (BT) is one of the most popular Peer-to-Peer (P2P) network applications. Most characteristics (except the topology) of BT network have been examined extensively by measurement approaches. In this work, we deploy ...
Air quality monitoring and prediction system using machine-to-machine platform
(2012 , Conference Paper)
This paper presents an ambient air quality monitoring and prediction system. The system consists of several distributed monitoring stations that communicate wirelessly to a backend server using machine-to-machine communication ...