Scholarworks Repository

Browsing Department of Electrical and Computer Engineering - Faculty Publications by Issue Date

Browsing Department of Electrical and Computer Engineering - Faculty Publications by Issue Date

Sort by: Order: Results:

  • Abou-Faycal I.; Medard M. (2004)
    We derive, for a binary antipodal input signal, the optimal uncoded regenerator function when the channels at the ingress and at the egress of the regenerator are degraded by AWGN. We show that the optimal function is a ...
  • Kuwatly I.; Sraj M.; Masri Z.A.; Artail H. (2004)
    A modern technology in the area of intrusion detection is honeypot technology that unlike common IDSs tends to provide the attacker with all the necessary resources needed for a successful attack. Honeypots provide a ...
  • Itani M.; Diab H. (2004)
    This paper presents an emerging reconfigurable hardware that potentially delivers flexible high performance for cryptographic algorithms. MorphoSys, a dynamic reconfigurable architecture that sustains implementations that ...
  • El-Hajj A.; Kabalan K.Y.; Al-Husseini M. (2004)
    In this paper, a new method for exact calculation of the directivity of Chebyshev and modified Chebyshev arrays is presented. It makes use of Chebyshev polynomials and puts the integral in the denominator of the directivity ...
  • Song I.; Guedea F.; Karray F.; Dai Y.; El Khalil I. (2004)
    Natural language command is very abstract. On the other hand, a mobile robot command should be very specific with actual numbers. Thus natural language processing and robot navigation has a big gap. In our research, we ...
  • Mansour M.M. (2004)
    This paper investigates high-performance decoder design for regular and irregular repeat-accumulate (RA) codes of large block length. In order to achieve throughputs and bit-error rate performance that are inline with ...
  • Kabalan K.Y.; El-Hajj A.; Elias F. (2004)
    The problem of aperture in conducting media has been widely considered in the literature. This problem addresses the case of an electromagnetic wave incident on a structure of conducting material segmenting space into two ...
  • Chehab A.; Kayssi A.; Nazer A.; Makki R. (2004)
    We propose in this paper a testing method for CMOS circuits that is insensitive to process variations and leakage levels. This method is based on the transient supply current (iDDT) and on the observation that current ...
  • Fares A.; Khachan A.; Kasbah A.B.; Zeidan M.; Kayssi A. (2004)
    In this paper we present four Radio Frequency (RF) measurements used to evaluate fundamental performance parameters of Global System for Mobile Communications (GSM) equipment. We describe the relevant theory for each ...
  • Chedid R.B.; Ghajar R.F. (OXFORDTHE BOULEVARD, LANGFORD LANE, KIDLINGTON, OXFORD OX5 1GB, OXON, ENGLAND, 2004)
    This paper examines the merits of implementing energy efficiency policies in the building sector in Lebanon following the approach normally adopted in Climate Change studies. The paper first examines the impact of the ...
  • Chehab A.; Kayssi A.; Nazer A.; Aaraj N. (2004)
    We propose a method for testing dynamic CMOS circuits using the transient power supply current, iDDT. The method is based on setting the primary inputs of the circuit under test, switching the clock signal and monitoring ...
  • Diab H.B.; Al-Khalidy M. (CALGARYB6, STE 101, 2509 DIEPPE AVE SW, CALGARY, ALBERTA T3E 7J9, CANADA, 2004)
    Research in reconfigurable computing is becoming more pronounced with the increasing research effort being invested in this area. By placing the computationally intense portions of an application onto the reconfigurable ...
  • Artail H.A. (OXFORDOXFORD FULFILLMENT CENTRE THE BOULEVARD, LANGFORD LANE, KIDLINGTON, OXFORD OX5 1GB, OXON, ENGLAND, 2004)
    In this paper we present a method for password recovery through the employment of multiple Web servers, and which we name Peer-Assisted Carrying Authentication (PACA). The paper starts by highlighting the vulnerabilities ...
  • El-Hajj A.; Kabalan K.Y.; Khoury S. (DUBLINDUBLIN INST TECHNOLOGY, BOLTON ST, DUBLIN, IRELAND, 2004)
    This paper presents an educational spreadsheet programs for calculating the convolution sum of two finite sequences. This convolution sum is accomplished using three different methods. After each method is presented, the ...
  • Bazzi L.; Richardson T.J.; Urbanke R.L. (PISCATAWAY445 HOES LANE, PISCATAWAY, NJ 08855 USA, 2004)
    We show that for the case of the binary-symmetric channel and Gallager's decoding algorithm A the threshold can, in many cases, be determined analytically. More precisely, we show that the threshold is always upper-bounded ...
  • Artail H.A.; Al-Asadi H.; Koleilat W.; Chehab A. (DUBLINDUBLIN INST TECHNOLOGY, BOLTON ST, DUBLIN, IRELAND, 2004)
    The relatively new Wavelet transform and Wavelet-based algorithms have found applications in virtually all engineering and many scientific disciplines. In this paper we point out their applications in enhancing education ...
  • Saade J.J.; Al-Khatib M. (DHAHRANC-O UNIV, DHAHRAN 31261, SAUDI ARABIA, 2004)
    This study defines practical performance measures for testing data-driven design algorithms for fuzzy controllers through the use of non-linear control functions. Also, criteria, which can be applied to these measures in ...
  • Chehab A.; Hanna S.; Kabalan K.Y.; El-Hajj A. (MALDENCOMMERCE PLACE, 350 MAIN ST, MALDEN 02148, MA USA, 2004)
    This paper presents an interactive and user-friendly computer package, 8085SimuKit, which can be used to simulate the operation of an 8085 microprocessor. The package is a practical tool in teaching microprocessor or related ...
  • Itani W.; Kayssi A. (AMSTERDAMPO BOX 211, 1000 AE AMSTERDAM, NETHERLANDS, 2004)
    This paper presents SPECSA, a new, optimized, policy-driven security architecture for wireless enterprise applications. SPECSA is scalable, extensible, flexible, and customizable. It supports end-to-end client authentication, ...
  • Diab H.B.; Itani M.A. (CALGARYB6, STE 101, 2509 DIEPPE AVE SW, CALGARY, ALBERTA T3E 7J9, CANADA, 2004)
    This paper presents an emerging reconfigurable hardware that delivers flexible high performance for cryptographic algorithms. MorphoSys, a reconfigurable architecture that sustains implementations that can yield into equally ...

Search Scholarworks


Browse

My Account