Search
Now showing items 1-10 of 1106
On Physical Layer Security in Energy-Efficient Wireless Health Monitoring Applications
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
In this paper, we investigate a multi-objective optimization framework for secure wireless health monitoring applications. In particular, we consider a legitimate link for the transmission of a vital EEG signal, threatened ...
Cooperative Q-learning techniques for distributed online power allocation in femtocell networks
(
John Wiley & Sons, Ltd.
, 2015 , Article)
In this paper, we address the problem of distributed interference management of femtocells that share the same frequency band with macrocells using distributed multi-agent Q-learning. We formulate and solve two problems ...
Verifying cloud service-level agreement by a third-party auditor
(
John Wiley & Sons, Ltd.
, 2014 , Article)
In this paper, we study the important issue of verifying service-level agreement (SLA) with an untrusted cloud and present an SLA verification framework that utilizes a third-party auditor (TPA). A cloud provides users ...
Game-based micro-learning approach for language vocabulary acquisition using LingoSnacks
(
IEEE
, 2013 , Conference Paper)
Acquisition of new vocabulary is an important element for language learning but it requires repeated and varied exposure to the new words and their usage. This paper reports the experience of designing and developing a ...
Designing Decision Support Systems for Humanitarian Organisations
(
John Wiley & Sons, Inc.
, 2015 , Book chapter)
The first step to ensure the success of applications in a specific field consists in producing a complete and representative model of the studied system. This alignment with reality is not easy to achieve though. This is ...
Stochastic learning automata-based channel selection in cognitive radio/dynamic spectrum access for WiMAX networks
(
John Wiley & Sons, Ltd.
, 2015 , Article)
This paper proposes a cognitive radio-based dynamic bandwidth allocation scheme for secondary users in a cluster-based WiMAX network. It uses a learning automata-based algorithm to find the optimal transmission channel, ...
mlearn: Designing a Platform for Mobile Learning
(
IGI Global
, 2013 , Book chapter)
This chapter presents the findings of the first phase of a four-phase research study that involves the design and development of an integrated architecture for a mobile learning platform. During this phase, a high-level ...
A performance comparison of MD5 authenticated routing traffic with EIGRP, RIPv2, and OSPF
(
Zarqa University
, 2010 , Article)
Routing is the process of forwarding data across an inter-network from a designated source to a final destination. Along the way from source to destination, at least one intermediate node is considered. Due to the major ...
Fuzzy prediction for failed back surgery syndrome
(
Taylor and Francis Ltd.
, 2010 , Article)
In this article a new strategy is presented that can be used by neurophysicians, neurosurgeons, and orthopedic surgeons to predict patients' health after an operative procedure on the vertebral column just by analyzing the ...
Security-aware service composition for end users of small enterprises
(
IOS Press
, 2010 , Article)
This paper focuses on the service composition based on security properties of services from an end user perspective. End users are usually not expert in computer security, but expert users of computer software. They typically ...