Scholarworks Repository

Browsing Department of Electrical and Computer Engineering - Faculty Publications by Issue Date

Browsing Department of Electrical and Computer Engineering - Faculty Publications by Issue Date

Sort by: Order: Results:

  • Kuwatly I.; Sraj M.; Masri Z.A.; Artail H. (, 2004)
    A modern technology in the area of intrusion detection is honeypot technology that unlike common IDSs tends to provide the attacker with all the necessary resources needed for a successful attack. Honeypots provide a ...
  • Aaraj N.; Nazer A.; Chehab A.; Kayssi A. (LOS ALAMITOS10662 LOS VAQUEROS CIRCLE, PO BOX 3014, LOS ALAMITOS, CA 90720-1264 USA, 2004)
    We propose methods for testing dynamic CMOS circuits using the transient power supply current, iDDT. The methods are based on setting the primary inputs of the circuit under test, switching the clock signal and monitoring ...
  • El-Afifi L.; Karaki M.; Korban J.; Al Alaoui M.A. (, 2004)
    In this paper, we propose 'Hands-free Interface', a technology that is intended to replace conventional computer screen pointing devices for the use of the disabled. We describe a real time, non-intrusive, fast and affordable ...
  • Mansour M.M. (, 2004)
    This paper investigates the design of high-performance decoder architectures for two promising codes - Repeat-Accumulate (RA) and LDPC codes - of large block length, in both regular and irregular forms. It addresses the ...
  • Chedid R.B.; Ghajar R.F. (OXFORDTHE BOULEVARD, LANGFORD LANE, KIDLINGTON, OXFORD OX5 1GB, OXON, ENGLAND, 2004)
    This paper examines the merits of implementing energy efficiency policies in the building sector in Lebanon following the approach normally adopted in Climate Change studies. The paper first examines the impact of the ...
  • Derbas G.; Kayssi A.; Artail H.; Chehab A. (, 2004)
    In this paper we present TRUMMAR, a reputation-based trust model that mobile agent systems can use to protect agents from malicious hosts. TRUMMAR is unique in being a truly comprehensive model since it accounts, in a ...
  • Itani W.; Kayssi A. (LONDON24-28 OVAL RD, LONDON NW1 7DX, ENGLAND, 2004)
    This paper shows an end-to-end application-layer security solution for wireless enterprise applications using the Java 2 Platform Micro Edition (J2ME). The proposed solution uses pure Java components to provide end-to-end ...
  • Fares A.; Khachan A.; Kasbah A.B.; Zeidan M.; Kayssi A. (, 2004)
    In this paper we present four Radio Frequency (RF) measurements used to evaluate fundamental performance parameters of Global System for Mobile Communications (GSM) equipment. We describe the relevant theory for each ...
  • Chehab A.; Kayssi A.; Nazer A.; Aaraj N. (, 2004)
    We propose a method for testing dynamic CMOS circuits using the transient power supply current, iDDT. The method is based on setting the primary inputs of the circuit under test, switching the clock signal and monitoring ...
  • Kabalan K.Y.; El-Hajj A.; Al-Husseini M. (WASHINGTON2000 FLORIDA AVE NW, WASHINGTON, DC 20009 USA, 2004)
    In this paper, we introduce a new class of planar arrays that we call the Bessel planar arrays. A formula for the current distribution in the elements of these arrays is presented, which is related to Bessel functions. For ...
  • Artail H.A. (AMSTERDAMPO BOX 211, 1000 AE AMSTERDAM, NETHERLANDS, 2004)
    Web personalization and customization are increasingly becoming important services for web users. The conventional approaches used in implementing these services often lead to poor responsiveness, lengthy network delays, ...
  • Kayssi A.I. (PISCATAWAY445 HOES LANE, PISCATAWAY, NJ 08855 USA, 2004)
    The transient response of metal-oxide-semiconductor (MOS) gates is a topic covered in most textbooks on digital integrated circuits and very-large-scale-integration (VLSI) design. One method often used to calculate first-order ...
  • Diab H.B. (PISCATAWAY445 HOES LANE, PISCATAWAY, NJ 08855 USA, 2004)
    This paper describes and evaluates the use of fuzzy logic arbiters for multiple-bus shared memory multiprocessor system. Multiple-bus systems allow multiple and simultaneous bus transfer in addition to a high degree of ...
  • Itani W.; Kayssi A. (LONDON24-28 OVAL RD, LONDON NW1 7DX, ENGLAND, 2004)
    This paper shows an end-to-end application-layer security solution for wireless enterprise applications using the Java 2 Platform Micro Edition (J2ME). The proposed solution uses pure Java components to provide end-to-end ...
  • Diab H.B.; Al-Khalidy M. (CALGARYB6, STE 101, 2509 DIEPPE AVE SW, CALGARY, ALBERTA T3E 7J9, CANADA, 2004)
    Research in reconfigurable computing is becoming more pronounced with the increasing research effort being invested in this area. By placing the computationally intense portions of an application onto the reconfigurable ...
  • Artail H.A. (OXFORDOXFORD FULFILLMENT CENTRE THE BOULEVARD, LANGFORD LANE, KIDLINGTON, OXFORD OX5 1GB, OXON, ENGLAND, 2004)
    In this paper we present a method for password recovery through the employment of multiple Web servers, and which we name Peer-Assisted Carrying Authentication (PACA). The paper starts by highlighting the vulnerabilities ...
  • Bazzi L.; Richardson T.J.; Urbanke R.L. (PISCATAWAY445 HOES LANE, PISCATAWAY, NJ 08855 USA, 2004)
    We show that for the case of the binary-symmetric channel and Gallager's decoding algorithm A the threshold can, in many cases, be determined analytically. More precisely, we show that the threshold is always upper-bounded ...
  • El-Hajj A.; Kabalan K.Y.; Khoury S. (DUBLINDUBLIN INST TECHNOLOGY, BOLTON ST, DUBLIN, IRELAND, 2004)
    This paper presents an educational spreadsheet programs for calculating the convolution sum of two finite sequences. This convolution sum is accomplished using three different methods. After each method is presented, the ...
  • Artail H.A.; Al-Asadi H.; Koleilat W.; Chehab A. (DUBLINDUBLIN INST TECHNOLOGY, BOLTON ST, DUBLIN, IRELAND, 2004)
    The relatively new Wavelet transform and Wavelet-based algorithms have found applications in virtually all engineering and many scientific disciplines. In this paper we point out their applications in enhancing education ...
  • Saade J.J.; Al-Khatib M. (DHAHRANC-O UNIV, DHAHRAN 31261, SAUDI ARABIA, 2004)
    This study defines practical performance measures for testing data-driven design algorithms for fuzzy controllers through the use of non-linear control functions. Also, criteria, which can be applied to these measures in ...

Search Scholarworks


Browse

My Account