author: mohammad s obaidat

Modeling and Simulation of Computer Networks and Systems: Methodologies and Applications

... frame is divided into preparation and transmission phases, which are liable respectively for creating the GATS frame ... control frame, in order to implement different operations for the AP and multicast STA according to the received ...

Advances in Computer Science and its Applications: CSA 2013

... CCFL Modeling A cold cathode fluorescent lamp (CCFL) is suitable for miniaturization because of its simple structure. By changing the fluorescent material type and mixture ratio, we can obtain an arbitrary fluorescent color. Further, the ...

Computer Science and Convergence: CSA 2011 & WCC 2011 Proceedings

... Class University) program (Project No: R31-30007) and NRL (National Research Lab) ... Goljan M, Fridrich J (2008) Camera identification from cropped and scaled images. In: The international society for optical engineering (SPIE) 2. Goljan ...

E-Business and Telecommunication Networks: Third International Conference, ICETE 2006, Setúbal, Portugal, August 7-10, 2006, Selected Papers

... 17–35. Springer, Heidelberg (1999) 7. Faratin, P., Sierra, C., Jennings ... strategy for automated negotiation. In: ACM Conference On Electronic ... Globus Alliance: Open grid service architecture (2005), http://www.globus.org/ogsa/ 13 ...

E-Business and Telecommunications: International Joint Conference, ICETE 2012, Rome, Italy, July 24--27, 2012, Revised Selected Papers

... just basic programming routines without computing, for example, eigenvalues or eigenvectors and without using any specific libraries or functions such as k-means. However, if there is a lot of noise present, the k-means step can be ...

E-business and Telecommunications: 4th International Conference, ICETE 2007, Barcelona, Spain, July 28-31, 2007, Revised Selected Papers

... Toro 175 IPSec Database Query Acceleration ................................ 188 Alberto Ferrante, Satish Chandra ... H.264/AVC Rate Control Based on the Linear Model ... Grzegorz Pastuszak and Andrzej Pietrasiewicz 284 Non Parametric ...

Smart Cities and Homes: Key Enabling Technologies

... target smart meters such that after manipulation the guideline prices are high from ts to te and low at other time slots. 3. Schedule his/her own energy load from ts to te. When the guideline electricity price is high from ts to te, the ...

E-Business and Telecommunications: International Joint Conference, ICETE 2013, Reykjavik, Iceland, July 29-31, 2013, Revised Selected Papers

... 2011 2. Wewetzer , C. , Caliskan , M. , Meier , K. , Luebke , A ... ( 2011 ) 10. Bilstrup , K. , Uhlemann , E. , Strom , E. , Bilstrup , U .: Evaluation of the ... ( AASHTO ) . A Policy on Geometric Design of Highways and Streets ( The Green Book ) ...

Handbook of Security and Privacy of AI-Enabled Healthcare Systems and Internet of Medical Things

... ( 2017 ) . " Telemedicine : Good or bad and for whom ? " . 2017. E - Health ... helmet ” . Int J Psychosoc Rehabil , 24 ( 7 ) , pp . 2296–303 . [ 18 ] R. P. ... Security and Privacy.

Pervasive Computing and Networking

... ANTm is a WSN based on Dynastreamfi wireless technology. It provides lower ... applications. Coexistence with other networks is possible through adaptive channel ... application level. The objective is to provide a complete solution (with ...

E-Business and Telecommunications: 16th International Conference, ICETE 2019, Prague, Czech Republic, July 26–28, 2019, Revised Selected Papers

... Winograd Algorithm for 2-Power Size Matrices. The StrassenWinograd matrix multiplication algorithm is denoted SW. It works with two square matrices of same dimension. We assume that M,N ∈ Rd×d where d := 2k and k ∈ N∗. First, the SW ...

Principles of Wireless Sensor Networks

... MAC: An energy-efficient protocol 4.1.2 L-MAC: a light-weight medium access ... receiver-centric power management protocol 4.1.9 PMAC: an adaptive energy-efficient MAC protocol for wireless sensor networks 4.1.10 ... flat routing 5.2.2 ...

Biometric-Based Physical and Cybersecurity Systems

... Recon Jet. Smart eyewear for sports., Recon Instruments. [Online]. Available: https://www. reconinstruments.com/products/jet/. Accessed 02 Jun 2017 Head mounted display sunglasses for cycling, Solos Wearables. [Online]. Available: http ...

Principles of Wireless Sensor Networks

... (MVIDS). MVIDS is formed for topology acquisition. (a) Any node within a black node's virtual range is red color. (b) Nodes within the communication range (and not within the virtual range of a black node) are blue nodes. (c) White nodes ...

e-Business and Telecommunications: International Conference, ICETE 2008, Porto, Portugal, July 26-29, 2008, Revised Selected Papers

... list, probably only the name. Then the terminal retrieves the corresponding address from the contact list of the ... PSI can not be retrieved, the terminal checks if the recipient's address is Tel URI. If true, the message is sent out by ...

E-Business and Telecommunications: 11th International Joint Conference, ICETE 2014, Vienna, Austria, August 28-30, 2014, Revised Selected Papers

... (Transport Layer Security) [6], Secure SCTP [7], and the extension AUTH-SCTP ... session key, – Delay of authentication and re-authentication. We will use ... used to exchange data bidirectionally between two SCTP endpoints. While in a TCP ...

Handbook of Green Information and Communication Systems

... lamp post level Feasibility Solar and wind combination needed. Solar only in very sunny locations, with backup power during winter. Both solar and wind are ... energy yield of a solar panel. 484 CHAPTER 18 Overview of Energy Saving ...

This website uses cookies and collects data for optimal performance. Your continued use signifies agreement to our Privacy Policy.