Scholarworks Repository

Browsing Department of Electrical and Computer Engineering - Faculty Publications by Issue Date

Browsing Department of Electrical and Computer Engineering - Faculty Publications by Issue Date

Sort by: Order: Results:

  • Kabalan K.Y.; El-Hajj A.; Al-Husseini M. (WASHINGTON2000 FLORIDA AVE NW, WASHINGTON, DC 20009 USA, 2004)
    In this paper, we introduce a new class of planar arrays that we call the Bessel planar arrays. A formula for the current distribution in the elements of these arrays is presented, which is related to Bessel functions. For ...
  • Itani W.; Kayssi A. (AMSTERDAMPO BOX 211, 1000 AE AMSTERDAM, NETHERLANDS, 2004)
    This paper presents SPECSA, a new, optimized, policy-driven security architecture for wireless enterprise applications. SPECSA is scalable, extensible, flexible, and customizable. It supports end-to-end client authentication, ...
  • Kayssi A.; El-Haj-Mahmoud A. (, 2004)
    New protocols and network applications must be extensively tested before deployment on the Internet. In this paper, we describe the design and implementation of EmuNET, a lightweight, portable, configurable, and extendable ...
  • Mansour M.M.; Mansour M.M.; Mehrotra A. (, 2004)
    New analytical techniques for estimating the large-signal periodic steady-state solution of MOS LC-tank oscillators using short-channel device equations are presented. These techniques allow us to make quantitative estimates ...
  • Kuwatly I.; Sraj M.; Masri Z.A.; Artail H. (, 2004)
    A modern technology in the area of intrusion detection is honeypot technology that unlike common IDSs tends to provide the attacker with all the necessary resources needed for a successful attack. Honeypots provide a ...
  • El-Hajj A.; Kabalan K.Y.; Al-Husseini M. (, 2004)
    In this paper, a new method for exact calculation of the directivity of Chebyshev and modified Chebyshev arrays is presented. It makes use of Chebyshev polynomials and puts the integral in the denominator of the directivity ...
  • Chehab A.; Hanna S.; Kabalan K.Y.; El-Hajj A. (MALDENCOMMERCE PLACE, 350 MAIN ST, MALDEN 02148, MA USA, 2004)
    This paper presents an interactive and user-friendly computer package, 8085SimuKit, which can be used to simulate the operation of an 8085 microprocessor. The package is a practical tool in teaching microprocessor or related ...
  • Kayssi A.; Sharafeddine S.; Karaki H. (HOBOKEN111 RIVER ST, HOBOKEN, NJ 07030 USA, 2004)
    Data communications and computer networking (DCCN) has established itself as an essential part of most computer science and engineering curricula, usually in the form of courses and-or laboratories. For reliable training ...
  • Diab H.B.; Itani M.A. (CALGARYB6, STE 101, 2509 DIEPPE AVE SW, CALGARY, ALBERTA T3E 7J9, CANADA, 2004)
    This paper presents an emerging reconfigurable hardware that delivers flexible high performance for cryptographic algorithms. MorphoSys, a reconfigurable architecture that sustains implementations that can yield into equally ...
  • El-Hajj A.; Kabalan K.Y.; Elias F. (, 2004)
    The problem of penetration into a cylindrical cavity through apertures was discussed. The characteristic mode theory was used to solve the aperture problem for a cylindrical conducting waveguide. The equivalence principle ...
  • Kabalan K.Y.; El-Hajj A.; Choufani D. (, 2004)
    The performance of turbo codes with short frame size of 320 bits with variable rate and constraint length of 4 and 5 of AWGN channel is investigated. Two encoders (13,15) and (37,21) with constraint length 4 and 5 were ...
  • Abou-Faycal I.; Medard M. (, 2004)
    We derive, for a binary antipodal input signal, the optimal uncoded regenerator function when the channels at the ingress and at the egress of the regenerator are degraded by AWGN. We show that the optimal function is a ...
  • Bdeir A.; Abou-Faycal I.; Medard M. (, 2004)
    In communication over time-varying Rayleigh fading channels, adaptive coded modulation for Pilot Symbol Assisted Modulation (PSAM) without feedback has been shown to yield significant benefits in terms of achievable rates. ...
  • Derbas G.; Kayssi A.; Artail H.; Chehab A. (, 2004)
    In this paper we present TRUMMAR, a reputation-based trust model that mobile agent systems can use to protect agents from malicious hosts. TRUMMAR is unique in being a truly comprehensive model since it accounts, in a ...
  • Aaraj N.; Nazer A.; Chehab A.; Kayssi A. (LOS ALAMITOS10662 LOS VAQUEROS CIRCLE, PO BOX 3014, LOS ALAMITOS, CA 90720-1264 USA, 2004)
    We propose methods for testing dynamic CMOS circuits using the transient power supply current, iDDT. The methods are based on setting the primary inputs of the circuit under test, switching the clock signal and monitoring ...
  • Itani M.; Diab H. (, 2004)
    This paper presents an emerging reconfigurable hardware that potentially delivers flexible high performance for cryptographic algorithms. MorphoSys, a dynamic reconfigurable architecture that sustains implementations that ...
  • Saade J.J.; Al-Khatib M. (DHAHRANC-O UNIV, DHAHRAN 31261, SAUDI ARABIA, 2004)
    This study defines practical performance measures for testing data-driven design algorithms for fuzzy controllers through the use of non-linear control functions. Also, criteria, which can be applied to these measures in ...
  • Artail H.A.; Al-Asadi H.; Koleilat W.; Chehab A. (DUBLINDUBLIN INST TECHNOLOGY, BOLTON ST, DUBLIN, IRELAND, 2004)
    The relatively new Wavelet transform and Wavelet-based algorithms have found applications in virtually all engineering and many scientific disciplines. In this paper we point out their applications in enhancing education ...
  • Chehab A.; El-Hajj A.; Al-Husseini M.; Artail H. (DUBLINDUBLIN INST TECHNOLOGY, BOLTON ST, DUBLIN, IRELAND, 2004)
    Spreadsheets were originally intended for business applications like finance, accounting, and so on. However, the ubiquity and simplicity of spreadsheet programs, in addition to their rich library of built-in functions, ...
  • Saade J.J.; Diab H.B. (, 2004)
    Based on the various components involved in the structure of fuzzy logic controllers, this study provides an in-depth examination of the different features and disadvantages of commonly used defuzzification methods. Then ...

Search Scholarworks


Browse

My Account