Sobh, Tarek
Innovative Algorithms and Techniques in Automation, Industrial Electronics and Telecommunications
1. A Hybrid Predistorter for Nonlinearly Amplified MQAM Signals
A. Nibaldo Rodríguez
2. Safe Logon with Free Lightweight Technologies
S. Encheva, S. Tumin
3. Stochastic Communication in Application Specific Networks—on—Chip
Vivek Kumar Sehgal, Nitin
4. A Random Approach to Study the Stability of Fuzzy Logic Networks
Yingjun Cao, Lingchu Yu, Alade Tokuta, Paul P. Wang
5. Extending Ad hoc Network range using CSMA(CD) parameter optimization
Adeel Akram, Shahbaz Pervez, Shoab A. Khan
6. Resource Aware Media Framework for Mobile Ad hoc Networks
Adeel Akram, Shahbaz Pervez, Shoab A. Khan
7. Cross-Layer Scheduling of QoS-Aware Multiservice Users in OFDM-Based
Wireless Networks
Amoakoh Gyasi-Agyei
8. Development of a Joystick-based Control for a Differential Drive Robot
A. N. Chand, G. C. Onwubolu
9. Structure and Analysis of a Snake-like Robot
Anjali V. Kulkarni, Ravdeep Chawla
10. A Novel Online Technique to Characterize and Mitigate DoS Attacks using EPSD
and Honeypots
Anjali Sardana, Bhavana Gandhi, Ramesh Joshi
11. Multi-Scale Modelling of VoIP Traffic by MMPP
Arkadiusz Biernacki
12. Transparent Multihoming Protocol Extension for MIPv6 with Dynamic Traffic Distribution across Multiple Interfaces
Basav Roychoudhury, Dilip K Saikia
13. The wave variables, a solution for stable haptic feedback in molecular docking simulations
B. Daunay, A. Abbaci, A. Micaelli, S. Regnier
14. A Model for Resonant Tunneling Bipolar Transistors
Buket D. Barkana, Hasan H. Erkaya
15. Developing secure Web-applications – Security criteria for the development of e-Democracy Web-applications
António Pacheco, Carlos Serrão
16. Data acquisition and processing for determination of vibration state of solid structures – Mechanical press PMCR 63
C?t?lin Iancu
17. Quality of Uni- and Multicast Services in a Middleware. LabMap Study Case
Cecil Bruce-Boye, Dmitry A. Kazakov
18. Traffic Flow Analysis Over a IPv6 Hybrid Manet
Christian Lazo R., Roland Glöckler, Sandra Céspedes U., Manuel Fernández V.
19. Designing aspects of a special class of reconfigurable parallel robots
Cornel Brisan
20. Performance Analysis of blocking Banyan Switches
D. C. Vasiliadis, G. E. Rizos, C. Vassilakis
21. Demystifying The Dynamics Of Linear Array Sensor Imagery
Dr. Koduri Srinivas
22. On the Robustness of Integral Time Delay Systems with PD Controllers
Eduardo Zuñiga, Omar Santos, M.A. Paz Ramos
23. Improvement of the Segmentation in HS Sub-space by means of a Linear
Transformation in RGB Space
E. Blanco, M. Mazo, L.M. Bergasa, S. Palazuelos, A.B. Awawdeh
24. Obstruction Removal Using Feature Extraction Through Time for Videoconferencing Processing
Elliott Coleshill, Dr. Deborah Stacey, Alex Ferworn
25. Blade Design And Forming For Fans Using Finite Elements
F.D. Foroni, L.A. Moreira Filho, M. A. Menezes
26. On the Application of Cumulant-based Cyclostationary Processing on Bearings
Diagnosis
F.E. Hernández, Vicente Atxa, E. Palomino, J. Altuna
27. Application of Higher-order Statistics on Rolling Element Bearings Diagnosis
F. E. Hernández, O. Caveda, V. Atxa, J. Altuna
28. Extending RSVP-TE to support Guarantee of Service in MPLS
Francisco Javier Rodriguez-Perez, Jose Luis Gonzalez-Sanchez
29. Operators Preserving Products Of Hurwitz Polynomials And Passivity
Guillermo Fernández-Anaya, José-Job Flores-Godoy
30. A computer aided tool dedicated to specification and verification of
the MoC and the MoF
N. Hamani, N. Dangoumau, E. Craye
31. Directionality Based Preventive Protocol for Mobile Ad Hoc Networks
Hetal Jasani, Yu Cai, Kang Yen
32. The Problem of Accurate Time Measurement in Researching Self-Similar Nature of Network Traffic
I.V. Sychev
33. Wi-Fi as a Last Mile Access Technology and The Tragedy of the Commons
Ingrid Brandt, Alfredo Terzoli, Cheryl Hodgkinson-Williams
34. Study of Surfaces Generated by Abrasive Waterjet Technology
J. Valí?ek1, S. Hloch, M. Držík, M. Ohlídal, V. Mádr, M. Lupták, S. Fabian, A. Radvanská, K. Páleníková
35. On Length-Preserving Symmetric Cryptography
Zheng Jianwu, Liu Hui, Liu Mingsheng
36. Revocable Proxy Signature Scheme with Efficient Multiple Delegations to the
Same Proxy Signer
Ji-Seon Lee, Jik Hyun Chang
37. A Robust Method for Registration of Partially-Overlapped Range
Images Using Genetic Algorithms
J. W. Branch, F. Prieto, P. Boulanger
38. Lips Movement Segmentation and Features Extraction in Real Time
Juan Bernardo Gómez, Flavio Prieto, Tanneguy Redarce
39. Droplet Acceleration In The Arc
J. Hu, H.L. Tsai
40. A Comparison of Methods for Estimating the Tail Index of
Heavy-tailed Internet Traffic
Karim Mohammed Rezaul, Vic Grout
41. IEC61499 Execution Model Semantics
Kleanthis Thramboulidis, George Doukas
42. Towards a Practical Differential Image Processing Approach of Change Detection
KP Lam
43. An ISP level Distributed Approach to Detect DDoS Attacks
Krishan Kumar, R C Joshi, Kuldip Singh
44. Performance Enhancement Of Blowfish Algorithm By Modifying Its function
Krishnamurthy G.N, Dr. V. Ramaswamy, Mrs. G.H. Leela
45. A Clustering Algorithm Based on Geographical Sensor Position in Wireless
Sensor Networks
Kyungjun Kim
46. The Economic Evaluation of the Active DSRC Application for Electronic Toll
Collection System in KOREA
Gunyoung Kim, Kyungwoo Kang
47. Adaptive Control of Milling Forces under Fractional Order Holds
L. Rubio, M. de la Sen
48. Application of Genetic Algorithms to a Manufacturing Industry Scheduling
Multi-Agent System
María de los Ángeles Solari, Ernesto Ocampo
49. Pre- And Post- Processing for Enhancement Of Image Compression Based On Spectrum Pyramid
Mariofanna Milanova, Roumen Kountchev, Vladimir Todorov, Roumiana Kountcheva
50. The Use of
Systems
M. Ondera
51. A Game Theoretic Approach to Regulating Mutual Repairing in a Self-Repairing
Network
Masakazu Oohashi, Yoshiteru Ishida
52. An Automated Self-Configuring Driver System for IEEE 802.11b/g WLAN
Standards
Mathieu K. Kourouma, Ebrahim Khosravi
53. Development Of A Virtual Force-Reflecting Scara Robot For Teleoperation
Mehmet Ismet Can Dede, Sabri Tosunoglu
54. Improving HORSE Again and Authenticating MAODV
Mingxi Yang, Layuan Li, Yiwei Fang
55. Curvelet Transform Based Logo Watermarking
Thai Duy Hien, Kazuyoshi Miyara, Yasunori Nagata, Zensho Nakao, Yen Wei Chen
56. Fairness Enhancement of IEEE 802.11 Ad Hoc Mode Using Rescue Frames
Mohamed Youssef, Eric Thibodeau, Alain C. Houle
57. Modelling Trust in Wireless Sensor Networks from the Sensor Reliability
Prospective
Mohammad Momani, Subhash Challa, Khalid Aboura
58. Performability Estimation of Network Services in the Presence of Component
Failures*
Mohammad-Mahdi Bidmeshki, Mostafa Shaad Zolpirani, Seyed Ghassem Miremadi
59. RBAC Model for SCADA
Munir Majdalawieh, Francesco Parisi-Presicce, Ravi Sandhu
60. DNPSec Simulation Study
Munir Majdalawieh, Duminda Wijesekera
61. A Client-Server Software that Violates Security Rules Defined by
Firewalls and Proxies
Othon M. N. Batista, Marco A. C. Simões, Helder G. Aragão, Cláudio M. N. G. da Silva, Israel N. Boudoux
62. Mobile communication in real time for the first time. User evaluation of
non-voice terminal equipment for people with hearing and speech disabilities
Patricia Gillard, Gunela Astbrink, Judy Bailey
63. Analyzing the Key Distribution from Security Attacks in Wireless
Sensor
Piya Techateerawat, Andrew Jennings
64. Hint Key Distribution for Sensor Networks
Piya Techateerawat, Andrew Jennings
65. A Model for GSM Mobile Network Design
Plácido Rogério Pinheiro, Alexei Barbosa de Aguiar
66. Application of LFSR with NTRU Algorithm
P. R. Suri, Priti Puri
67. Adaptive Packet Loss Concealment Mechanism For Wireless Voice Over Ip
M. Razvi Doomun
68. Dynamic Location Privacy Mechanism in Location-Aware System
M. Razvi Doomun
69. Video Transmission Performance Using Bluetooth Technology
M. Razvi Doomun
70. Kelvin Effect, Mean Curvatures and Load Impedance in Surface Induction
Hardening: An Analytical Approach including Magnetic Losses
Roberto Suárez-Ántola
71. A Simple Speed Feedback System for Low Speed DC Motor Control in Robotic
Applications
R. V. Sharan, G. C. Onwubolu, R. Singh, H. Reddy, S. Kumar
72. A Low Power CMOS Circuit for Generating Gaussian Pulse and its Derivatives
for High Frequency Applications
Sabrieh Choobkar, Abdolreza Nabavi
73. On the Efficiency and Fairness of Congestion Control Algorithms
Sachin Kumar, M.K. Gupta, V.S.P. Srivastav, Kadambri Agarwal
74. Hopfield Neural Network as a Channel Allocator
Ahmed Emam, Sarhan M. Musa
75. Command Charging Circuit with Energy Recovery for Pulsed Power Supply of Copper Vapor Laser
Satish Kumar Singh, Dr. Shishir Kumar, S. V. Nakhe
76. Performance Evaluation of MANET Routing Protocols Using Scenario
Based Mobility Models
Shams-ul-Arfeen, A. W. Kazi, Jan M. Memon, S. Irfan Hyder
77. Analysis of small world phenomena and group mobility in ad hoc networks
Sonja Filiposka, Dimitar Trajanov, Aksenti Grnarov
78. Handoff Management Schemes for HCN/WLAN Interworking
Srinivas Manepalli, Alex A. Aravind
79. Cross-Layer Fast and Seamless Handoff Scheme for 3GPP-WLAN Interworking
SungMin Yoon, SuJung Yu, JooSeok Song
80. Minimizing the Null Message Exchange in Conservative Distributed
Simulation
Syed S. Rizvi, K. M. Elleithy, Aasia Riasat
81. An Analog Computer To Solve Any Second Order Linear Differential Equation
With Arbitrary Coefficients
T. ElAli, S. Jones, F. Arammash, C. Eason, A. Sopeju, A. Fapohunda, O. Olorode
82. QoS Provisioning in WCDMA 3G Networks using Mobility Prediction
T. Rachidi, M. Benkirane, H. Bouzekri
83. Patent-Free Authenticated-Encryption As Fast As OCB
Ted Krovetz
84. Application of least squares support vector machines in modeling of the
top-oil temperature
T. C. B. N. Assunção, J. L. Silvino, P. Resende
85. Optimal routing with QoS guarantees in the wireless networks
P. Venkata Krishna, N.Ch. S. N. Iyengar
86. Rfid In Automotive Supply Chain Processes - There Is A Case
Viacheslav Moskvich, Vladimir Modrak
87. Reduced – Order Controller Design in Discrete Time Domain
Vivek Kumar Sehgal
88. Simple Intrusion Detection in an 802.15.4 Sensor Cluster
Vojislav B. Miši?, Jobaida Begum
89. Dim Target Detection in Infrared Image Sequences Using Accumulated
Information
Wei He, Li Zhang
90. Cooperative Diversity Based on LDPC Code
Weijia Lei, Xianzhong Xie, Guangjun Li
91. MEMS Yield Simulation with Monte Carlo Method
Xingguo Xiong, Yu-Liang Wu, Wen-Ben Jone
92. A Human Interface Tool for System Modeling and Application Development Based on Multilevel Flow Models
Yangping Zhou, Yujie Dong, Yuanle Ma, Hidekazu Yoshikawa
93. Genetic Algorithm Approach In Adaptive Resource Allocation In Ofdm
Systems
Y. B. Reddy
94. Real-time Vehicle Detection with the Same Algorithm both Day and Night Using
the Shadows Underneath Vehicles
Yoichiro Iwasaki, Hisato Itoyama
95. An Authentication Protocol to Address the Problem of the Trusted 3rd Party
Authentication Protocols
Y. Kirsal, O. Gemikonakli
96. Autonomous Agents based Dynamic Distributed (A2D2) Intrusion Detection System
Yu Cai, Hetal Jasani
97. Modeling and Implementation of Agent-Based Discrete Industrial
Automation
Yuval Chhen, Ming-En Wang, Bopaya Bidanda
98. Performance of CBR and TCP Traffics in Various MANET Environments
Z. M. Yusof, J.A. Flint, S. Datta
Keywords: Engineering, Circuits and Systems
- Author(s)
- Sobh, Tarek
- Elleithy, Khaled
- Mahmood, Ausif
- Karim, Mohammed
- Publisher
- Springer
- Publication year
- 2007
- Language
- en
- Edition
- 1
- Page amount
- 567 pages
- Category
- Technology, Energy, Traffic
- Format
- Ebook
- eISBN (PDF)
- 9781402062667