Sobh, Tarek

Innovative Algorithms and Techniques in Automation, Industrial Electronics and Telecommunications

Sobh, Tarek - Innovative Algorithms and Techniques in Automation, Industrial Electronics and Telecommunications, ebook


Ebook, PDF with Adobe DRM
ISBN: 9781402062667
DRM Restrictions

PrintingNot allowed
Copy to clipboardNot allowed

Table of contents

1. A Hybrid Predistorter for Nonlinearly Amplified MQAM Signals
A. Nibaldo Rodríguez

2. Safe Logon with Free Lightweight Technologies
S. Encheva, S. Tumin

3. Stochastic Communication in Application Specific Networks—on—Chip
Vivek Kumar Sehgal, Nitin

4. A Random Approach to Study the Stability of Fuzzy Logic Networks
Yingjun Cao, Lingchu Yu, Alade Tokuta, Paul P. Wang

5. Extending Ad hoc Network range using CSMA(CD) parameter optimization
Adeel Akram, Shahbaz Pervez, Shoab A. Khan

6. Resource Aware Media Framework for Mobile Ad hoc Networks
Adeel Akram, Shahbaz Pervez, Shoab A. Khan

7. Cross-Layer Scheduling of QoS-Aware Multiservice Users in OFDM-Based
Wireless Networks
Amoakoh Gyasi-Agyei

8. Development of a Joystick-based Control for a Differential Drive Robot
A. N. Chand, G. C. Onwubolu

9. Structure and Analysis of a Snake-like Robot
Anjali V. Kulkarni, Ravdeep Chawla

10. A Novel Online Technique to Characterize and Mitigate DoS Attacks using EPSD
and Honeypots
Anjali Sardana, Bhavana Gandhi, Ramesh Joshi

11. Multi-Scale Modelling of VoIP Traffic by MMPP
Arkadiusz Biernacki

12. Transparent Multihoming Protocol Extension for MIPv6 with Dynamic Traffic Distribution across Multiple Interfaces
Basav Roychoudhury, Dilip K Saikia

13. The wave variables, a solution for stable haptic feedback in molecular docking simulations
B. Daunay, A. Abbaci, A. Micaelli, S. Regnier

14. A Model for Resonant Tunneling Bipolar Transistors
Buket D. Barkana, Hasan H. Erkaya

15. Developing secure Web-applications – Security criteria for the development of e-Democracy Web-applications
António Pacheco, Carlos Serrão

16. Data acquisition and processing for determination of vibration state of solid structures – Mechanical press PMCR 63
C?t?lin Iancu

17. Quality of Uni- and Multicast Services in a Middleware. LabMap Study Case
Cecil Bruce-Boye, Dmitry A. Kazakov

18. Traffic Flow Analysis Over a IPv6 Hybrid Manet
Christian Lazo R., Roland Glöckler, Sandra Céspedes U., Manuel Fernández V.

19. Designing aspects of a special class of reconfigurable parallel robots
Cornel Brisan

20. Performance Analysis of blocking Banyan Switches
D. C. Vasiliadis, G. E. Rizos, C. Vassilakis

21. Demystifying The Dynamics Of Linear Array Sensor Imagery
Dr. Koduri Srinivas

22. On the Robustness of Integral Time Delay Systems with PD Controllers
Eduardo Zuñiga, Omar Santos, M.A. Paz Ramos

23. Improvement of the Segmentation in HS Sub-space by means of a Linear
Transformation in RGB Space
E. Blanco, M. Mazo, L.M. Bergasa, S. Palazuelos, A.B. Awawdeh

24. Obstruction Removal Using Feature Extraction Through Time for Videoconferencing Processing
Elliott Coleshill, Dr. Deborah Stacey, Alex Ferworn

25. Blade Design And Forming For Fans Using Finite Elements
F.D. Foroni, L.A. Moreira Filho, M. A. Menezes

26. On the Application of Cumulant-based Cyclostationary Processing on Bearings
F.E. Hernández, Vicente Atxa, E. Palomino, J. Altuna

27. Application of Higher-order Statistics on Rolling Element Bearings Diagnosis
F. E. Hernández, O. Caveda, V. Atxa, J. Altuna

28. Extending RSVP-TE to support Guarantee of Service in MPLS
Francisco Javier Rodriguez-Perez, Jose Luis Gonzalez-Sanchez

29. Operators Preserving Products Of Hurwitz Polynomials And Passivity
Guillermo Fernández-Anaya, José-Job Flores-Godoy

30. A computer aided tool dedicated to specification and verification of
the MoC and the MoF
N. Hamani, N. Dangoumau, E. Craye

31. Directionality Based Preventive Protocol for Mobile Ad Hoc Networks
Hetal Jasani, Yu Cai, Kang Yen

32. The Problem of Accurate Time Measurement in Researching Self-Similar Nature of Network Traffic
I.V. Sychev

33. Wi-Fi as a Last Mile Access Technology and The Tragedy of the Commons
Ingrid Brandt, Alfredo Terzoli, Cheryl Hodgkinson-Williams

34. Study of Surfaces Generated by Abrasive Waterjet Technology
J. Valí?ek1, S. Hloch, M. Držík, M. Ohlídal, V. Mádr, M. Lupták, S. Fabian, A. Radvanská, K. Páleníková

35. On Length-Preserving Symmetric Cryptography
Zheng Jianwu, Liu Hui, Liu Mingsheng

36. Revocable Proxy Signature Scheme with Efficient Multiple Delegations to the
Same Proxy Signer
Ji-Seon Lee, Jik Hyun Chang

37. A Robust Method for Registration of Partially-Overlapped Range
Images Using Genetic Algorithms
J. W. Branch, F. Prieto, P. Boulanger

38. Lips Movement Segmentation and Features Extraction in Real Time
Juan Bernardo Gómez, Flavio Prieto, Tanneguy Redarce

39. Droplet Acceleration In The Arc
J. Hu, H.L. Tsai

40. A Comparison of Methods for Estimating the Tail Index of
Heavy-tailed Internet Traffic
Karim Mohammed Rezaul, Vic Grout

41. IEC61499 Execution Model Semantics
Kleanthis Thramboulidis, George Doukas

42. Towards a Practical Differential Image Processing Approach of Change Detection
KP Lam

43. An ISP level Distributed Approach to Detect DDoS Attacks
Krishan Kumar, R C Joshi, Kuldip Singh

44. Performance Enhancement Of Blowfish Algorithm By Modifying Its function
Krishnamurthy G.N, Dr. V. Ramaswamy, Mrs. G.H. Leela

45. A Clustering Algorithm Based on Geographical Sensor Position in Wireless
Sensor Networks
Kyungjun Kim

46. The Economic Evaluation of the Active DSRC Application for Electronic Toll
Collection System in KOREA
Gunyoung Kim, Kyungwoo Kang

47. Adaptive Control of Milling Forces under Fractional Order Holds
L. Rubio, M. de la Sen

48. Application of Genetic Algorithms to a Manufacturing Industry Scheduling
Multi-Agent System
María de los Ángeles Solari, Ernesto Ocampo

49. Pre- And Post- Processing for Enhancement Of Image Compression Based On Spectrum Pyramid
Mariofanna Milanova, Roumen Kountchev, Vladimir Todorov, Roumiana Kountcheva

50. The Use of Maple in Computation of Generalized Transfer Functions for Nonlinear
M. Ondera

51. A Game Theoretic Approach to Regulating Mutual Repairing in a Self-Repairing
Masakazu Oohashi, Yoshiteru Ishida

52. An Automated Self-Configuring Driver System for IEEE 802.11b/g WLAN
Mathieu K. Kourouma, Ebrahim Khosravi

53. Development Of A Virtual Force-Reflecting Scara Robot For Teleoperation
Mehmet Ismet Can Dede, Sabri Tosunoglu

54. Improving HORSE Again and Authenticating MAODV
Mingxi Yang, Layuan Li, Yiwei Fang

55. Curvelet Transform Based Logo Watermarking
Thai Duy Hien, Kazuyoshi Miyara, Yasunori Nagata, Zensho Nakao, Yen Wei Chen

56. Fairness Enhancement of IEEE 802.11 Ad Hoc Mode Using Rescue Frames
Mohamed Youssef, Eric Thibodeau, Alain C. Houle

57. Modelling Trust in Wireless Sensor Networks from the Sensor Reliability
Mohammad Momani, Subhash Challa, Khalid Aboura

58. Performability Estimation of Network Services in the Presence of Component
Mohammad-Mahdi Bidmeshki, Mostafa Shaad Zolpirani, Seyed Ghassem Miremadi

59. RBAC Model for SCADA
Munir Majdalawieh, Francesco Parisi-Presicce, Ravi Sandhu

60. DNPSec Simulation Study
Munir Majdalawieh, Duminda Wijesekera

61. A Client-Server Software that Violates Security Rules Defined by
Firewalls and Proxies
Othon M. N. Batista, Marco A. C. Simões, Helder G. Aragão, Cláudio M. N. G. da Silva, Israel N. Boudoux

62. Mobile communication in real time for the first time. User evaluation of
non-voice terminal equipment for people with hearing and speech disabilities
Patricia Gillard, Gunela Astbrink, Judy Bailey

63. Analyzing the Key Distribution from Security Attacks in Wireless
Piya Techateerawat, Andrew Jennings

64. Hint Key Distribution for Sensor Networks
Piya Techateerawat, Andrew Jennings

65. A Model for GSM Mobile Network Design
Plácido Rogério Pinheiro, Alexei Barbosa de Aguiar

66. Application of LFSR with NTRU Algorithm
P. R. Suri, Priti Puri

67. Adaptive Packet Loss Concealment Mechanism For Wireless Voice Over Ip
M. Razvi Doomun

68. Dynamic Location Privacy Mechanism in Location-Aware System
M. Razvi Doomun

69. Video Transmission Performance Using Bluetooth Technology
M. Razvi Doomun

70. Kelvin Effect, Mean Curvatures and Load Impedance in Surface Induction
Hardening: An Analytical Approach including Magnetic Losses
Roberto Suárez-Ántola

71. A Simple Speed Feedback System for Low Speed DC Motor Control in Robotic
R. V. Sharan, G. C. Onwubolu, R. Singh, H. Reddy, S. Kumar

72. A Low Power CMOS Circuit for Generating Gaussian Pulse and its Derivatives
for High Frequency Applications
Sabrieh Choobkar, Abdolreza Nabavi

73. On the Efficiency and Fairness of Congestion Control Algorithms
Sachin Kumar, M.K. Gupta, V.S.P. Srivastav, Kadambri Agarwal

74. Hopfield Neural Network as a Channel Allocator
Ahmed Emam, Sarhan M. Musa

75. Command Charging Circuit with Energy Recovery for Pulsed Power Supply of Copper Vapor Laser
Satish Kumar Singh, Dr. Shishir Kumar, S. V. Nakhe

76. Performance Evaluation of MANET Routing Protocols Using Scenario
Based Mobility Models
Shams-ul-Arfeen, A. W. Kazi, Jan M. Memon, S. Irfan Hyder

77. Analysis of small world phenomena and group mobility in ad hoc networks
Sonja Filiposka, Dimitar Trajanov, Aksenti Grnarov

78. Handoff Management Schemes for HCN/WLAN Interworking
Srinivas Manepalli, Alex A. Aravind

79. Cross-Layer Fast and Seamless Handoff Scheme for 3GPP-WLAN Interworking
SungMin Yoon, SuJung Yu, JooSeok Song

80. Minimizing the Null Message Exchange in Conservative Distributed
Syed S. Rizvi, K. M. Elleithy, Aasia Riasat

81. An Analog Computer To Solve Any Second Order Linear Differential Equation
With Arbitrary Coefficients
T. ElAli, S. Jones, F. Arammash, C. Eason, A. Sopeju, A. Fapohunda, O. Olorode

82. QoS Provisioning in WCDMA 3G Networks using Mobility Prediction
T. Rachidi, M. Benkirane, H. Bouzekri

83. Patent-Free Authenticated-Encryption As Fast As OCB
Ted Krovetz

84. Application of least squares support vector machines in modeling of the
top-oil temperature
T. C. B. N. Assunção, J. L. Silvino, P. Resende

85. Optimal routing with QoS guarantees in the wireless networks
P. Venkata Krishna, N.Ch. S. N. Iyengar

86. Rfid In Automotive Supply Chain Processes - There Is A Case
Viacheslav Moskvich, Vladimir Modrak

87. Reduced – Order Controller Design in Discrete Time Domain
Vivek Kumar Sehgal

88. Simple Intrusion Detection in an 802.15.4 Sensor Cluster
Vojislav B. Miši?, Jobaida Begum

89. Dim Target Detection in Infrared Image Sequences Using Accumulated
Wei He, Li Zhang

90. Cooperative Diversity Based on LDPC Code
Weijia Lei, Xianzhong Xie, Guangjun Li

91. MEMS Yield Simulation with Monte Carlo Method
Xingguo Xiong, Yu-Liang Wu, Wen-Ben Jone

92. A Human Interface Tool for System Modeling and Application Development Based on Multilevel Flow Models
Yangping Zhou, Yujie Dong, Yuanle Ma, Hidekazu Yoshikawa

93. Genetic Algorithm Approach In Adaptive Resource Allocation In Ofdm
Y. B. Reddy

94. Real-time Vehicle Detection with the Same Algorithm both Day and Night Using
the Shadows Underneath Vehicles
Yoichiro Iwasaki, Hisato Itoyama

95. An Authentication Protocol to Address the Problem of the Trusted 3rd Party
Authentication Protocols
Y. Kirsal, O. Gemikonakli

96. Autonomous Agents based Dynamic Distributed (A2D2) Intrusion Detection System
Yu Cai, Hetal Jasani

97. Modeling and Implementation of Agent-Based Discrete Industrial
Yuval Chhen, Ming-En Wang, Bopaya Bidanda

98. Performance of CBR and TCP Traffics in Various MANET Environments
Z. M. Yusof, J.A. Flint, S. Datta

Keywords: Engineering, Circuits and Systems

Publication year
Page amount
567 pages
Technology, Energy, Traffic

Similar titles