Now showing items 5400-5419 of 8013

    • On the applicability of 2D local binary patterns for identifying electrical appliances in non-intrusive load monitoring 

      Himeur, Yassine; Alsalemi, Abdullah; Bensaali, Faycal; Amira, Abbes; Sardianos, Christos; ... more authors ( Springer , 2021 , Conference Paper)
      In recent years, the automatic identification of electrical devices through their power consumption signals finds a variety of applications in smart home monitoring and non-intrusive load monitoring (NILM). This work ...
    • On the application of αβ-transformation for power systems frequency relaying 

      Soliman, S.A.; Alammari, R.A.; El-Hawary, M.E. ( Institute of Electrical and Electronics Engineers Inc. , 2001 , Conference Paper)
      This paper presents a new and very accurate algorithm for power system frequency measurement. The proposed algorithm is based on αβ-transformation of the three phase voltages or current waveforms in the relay location, ...
    • On the Average Secrecy Outage Rate and Average Secrecy Outage Duration of Wiretap Channels with Rician Fading 

      Abughalwa M.; Omri A.; Hasna M.O. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
      In this paper, we study important physical layer security metrics over wiretap channels with Rician fading. We derive the average secrecy outage rate (ASOR) expression to quantify the average secrecy zero level crossing ...
    • On the capacity of cooperative diversity systems with adaptive modulation 

      Hasna , Mazen ( IEEE , 2005 , Conference Paper)
      In recent years, cooperative diversity systems have gained increased attention in the literature as a new way of combating the effect of signal fading. In this paper, we investigate the performance of these systems when ...
    • On the coexistence of a primary user with an energy harvesting secondary user: A case of cognitive cooperation 

      Shafie, Ahmed El; Khattab, Tamer; El-Keyi, Amr; Nafie, Mohamed ( John Wiley and Sons Ltd , 2016 , Article)
      In this paper, we consider a cognitive scenario where an energy harvesting secondary user shares the spectrum with a primary user. The secondary source helps the primary source in delivering its undelivered packets during ...
    • On the correlation analysis of electric field inside jet engine 

      Krishna, A; Khattab, T; Abdelaziz, A.F.; Guizani, Mohsen ( IEEE , 2014 , Conference Paper)
      A Simple channel modeling method based on correlation analysis of the electric field inside jet engine is presented. The analysis of the statistical propagation characteristics of electromagnetic field inside harsh jet ...
    • On the degrees of freedom of the cognitive broadcast channel 

      Shahmohammadi, Mohammad; Koyluoglu, O. Ozan; Khattab, Tamer M. S.; El Gamal, Hesham (2011 , Conference Paper)
      Cognitive broadcast channel, where two multiantenna transmitters communicate with their respective receivers, is considered. One of the transmitters is said to be cognitive (secondary) as it is assumed to know the messages ...
    • On the degrees of freedom region of the M x N Interference Channel 

      Khalil, Mohamed; Khattab, Tamer; El-Keyi, Amr; Nafie, Mohammed ( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)
      In this paper, the K-user MIMO interference channel is considered. The asymmetric DoF region for the channel is studied. The asymmetric DoF represent the set of all achievable DoF combinations {d1, d2,..., dK}. For the ...
    • On the delay of finite buffered multi-hop relay wireless internet of things 

      Elsamadouny A.; Hasna M.; Khattab T.; Abualsaud K.; Yaacoub E. ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)
      The evolution of Internet of Things (IoT) as a new application in wireless networks mandates the utilization of wireless cooperative relaying to overcome the energy limitations of IoT devices. Multi-hop relaying is a ...
    • On the delay/throughput-security tradeoff in wiretap TDMA networks with buffered nodes 

      El Shafie, Ahmed; Al-Dhahir, Naofal; Ding, Zhiguo; Hamila, Ridha ( IEEE , 2019 , Article)
      In this paper, we investigate the tradeoff between security and throughput and between security and queuing delay in wiretap time-division multiple access (TDMA) networks. We derive a simple relationship, characterized by ...
    • On the Design of a Relay-Assisted Network 

      El Shafie, Ahmed; Khattab, Tamer; Sultan, Ahmed; Poor, H. Vincent ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Article)
      A relay network composed of a source, a set of relays, and a destination is considered. A queueing framework is proposed, in which each node maintains a buffer to store its incoming traffic. An optimization-based formulation ...
    • On the Design of Bit-Slice Processors 

      Bishai, S.; Metwally, M. S. ( Qatar University , 1988 , Article)
      In the past decade, fixed instruction microprocessors have evolved from 4 bits to 32 bits. Their compact design and relative low cost have made them very popular with design engineers. Their use extends into a lot of ...
    • On the design of relay-assisted primary-secondary networks 

      Shafie, Ahmed El; Sultan, Ahmed; Khattab, Tamer; Poor, H. Vincent ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)
      The use of N cognitive relays to assist primary and secondary transmissions in a time-slotted cognitive setting with one primary user (PU) and one secondary user (SU) is investigated. An overlapped spectrum sensing strategy ...
    • On the detection and estimation of correlated signal using circular antenna arrays 

      Shubair, R.M.; Jimaa, S.A.; Hamila, R.; Al-Tunaije, M.A. ( IEEE , 2011 , Conference Paper)
      This paper presents the design and analysis of smart antenna systems used for the detection and estimation of correlated radio signals encountered in multipath environments using circular antenna arrays. The MUSIC algorithm ...
    • On the detection of Kernel-level rootkits using hardware performance counters 

      Singh, Baljit; Evtyushkin, Dmitry; Elwell, Jesse; Riley, Ryan D; Cervesato, Iliano ( Association for Computing Machinery, Inc , 2017 , Conference Paper)
      Recent work has investigated the use of hardware perfor- mance counters (HPCs) for the detection of malware run- ning on a system. These works gather traces of HPCs for a variety of applications (both malicious and ...
    • On the development of flywheel storage systems for power system applications: A survey 

      Daoud, Mohamed I.; Abdel-Khalik, A. S.; Massoud, A.; Ahmed, S.; Abbasy, Nabil H. ( IEEE , 2012 , Conference Paper)
      Energy storage systems cannot be considered energy sources but having the ability of storing and discharging energy. They have a vital rule in the reliability and power quality of power systems. There are several energy ...
    • On the distributed binary consensus algorithm in wireless sensor networks 

      Abderrazak, Abdaoui; El Fouly, Tarek Mohamed ( IEEE , 2013 , Conference Paper)
      We consider the binary consensus problem over the wireless sensor networks (WSN), where each node of the network initially observes one of two states and the aim of each node is to decide which one of the two states was ...
    • On the DoF of X-Networks With Synergistic Alternating CSIT: A Step Towards Integrated Communication and Sensing 

      Shaban, Ahmed Wagdy; Seif, Mohamed; Khattab, Tamer; El-Keyi, Amr; Nafie, Mohammed; ... more authors ( IEEE Canada , 2022 , Article)
      The coexistence of communication and sensing services in the next wireless communication systems, i.e., beyond 5G and 6G systems, revive the central role of interference management techniques such as interference alignment, ...
    • On the effect of proportional fairness in energy transfer for wireless powered communication networks 

      Butt M.M.; Mohamed A.; Guizani M. ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)
      Wireless powered communication network (WPCN) is an emerging area of research where energy is transferred from the access point to the mobile terminals in the downlink and information is transferred in the uplink. In the ...
    • On the effectiveness of emission penalties in decentralized supply chains 

      Chen X.; Benjaafar S.; Elomri A. ( Elsevier B.V. , 2019 , Article)
      In recent years, the emission of harmful pollutants, such as greenhouse gases, due to industrial activities have received considerable interest from both business and scientific communities. As a result, an increasing ...