UB ScholarWorks

Browsing Engineering Journal Articles by Title

Browsing Engineering Journal Articles by Title

Sort by: Order: Results:

  • Ben Haj Frej, Mohamed; Dichter, Julius; Gupta, Navarun (MDPI, 2019-07-27)
    Cloud computing is reserving its position in the market as the next disruptive utility paradigm. It is found on the pay-as-you-use model. Cloud computing is changing the way information technology (IT) operates for individuals ...
  • Hmurcik, Lawrence V.; Slacik, Amy; Miller, Hilda; Samoncik, Sandy (American Association of Physics Teachers, 1989-02)
    Linear regression analysis (least squares) is used in the first physics lab in order to introduce students to computer-aided analysis and to teach data fitting techniques. Application is made to two experiments: Fletcher’s ...
  • Sobh, Tarek M.; Dekhil, Mohamed; Efros, Alyosha A.; Mihali, Raul (ACTA Press, 2001)
  • Patel, Sarosh; Sobh, Tarek M. (Springer Netherlands, 2015-03)
    Performance measures are quintessential to the design, synthesis, study and application of robotic manipulators. Numerous performance measures have been defined to study the performance and behavior of manipulators since ...
  • Elleithy, Khaled M.; Amin, Alaaeldin A.M. (Academic Publication Council, Kuwait University, 1996-12)
    In this paper a new approach for implementing CIRCAL algorithms using event logic is presented. A high-level description of an algorithm is expressed in CIRCAL, a formal parallel hardware description language. The approach ...
  • Xiong, Xingguo; Wu, Yu-Liang; Jone, Wen-Ben (Springer Netherlands, 2007)
    In this paper, Monte Carlo method is used for the simulation of point-stiction defects in MEMS accelerometer devices. The yield of MEMS devices is estimated based on the simulation results. Comparison between simulated ...
  • Hu, Junling; Tsai, Hai-Lung (ASME, 2007-08)
    This article analyzes the transient complex heat transfer and fluid flow in molten metal and arc plasma during the gas metal arc welding process. The model predicts the formation, growth, detachment, and transfer of droplets ...
  • Su, Xiao-Li; Dallas, Tim; Gangopadhyay, Shubhra; Temkin, Henryk; Wang, Xuejun; Walulu, Richard; Li, Jianzhong; Dasgupta, Purnendu K.; Xiong, Xingguo (Elsevier, 2002-02-11)
    We describe a microfabricated moisture sensor with interdigitated Au or Pt electrodes on a silicon substrate. The sensor active area is covered with a spin-coated, baked-on layer of Nafion® perfluorosulfonate ionomer of ...
  • Erkaya, H.H. (Elsevier Science Inc., 2007-07-01)
    A new switch called a resonant-tunneling-semiconductor-controlled rectifier (RT-SCR) has been proposed. A two-transistor model is used for the device. One of the transistors in the two-transistor model is assumed to be a ...
  • Mohammed, Mohammad; Babriya, Vipul; Sobh, Tarek M. (Medwell Journals, 2008)
  • Abuhelaleh, Mohammed A.; Mismar, Thabet M.; Elleithy, Khaled M. (Springer Netherlands, 2010)
    Many algorithms and techniques were proposed to increase the efficiency of Sensor Networks. Due to high restrictions of this kind of networks, where the resources are limited, many factors may affect its work. Theses factors ...
  • Razaque, Abdul; Elleithy, Khaled M. (MDPI, 2015-07-06)
    Robust paradigms are a necessity, particularly for emerging wireless sensor network (WSN) applications. The lack of robust and efficient paradigms causes a reduction in the provision of quality of service (QoS) and additional ...
  • Alajmi, Naser M.; Elleithy, Khaled M. (MDPI, 2015-11-19)
    Security breaches are a major threat in wireless sensor networks (WSNs). WSNs are increasingly used due to their broad range of important applications in both military and civilian domains. WSNs are prone to several types ...
  • Sobh, Tarek M.; Elkady, Ayssam Y.; Mohammed, Mohammed (InTech, 2009-11-01)
    The estimation of the performance characteristics of robot manipulators is crucial in robot application and design. Furthermore, studying the manipulability index for every point within the workspace of any serial manipulator ...
  • Abu Mallouh, Arafat; Qawaqneh, Zakariya; Barkana, Buket D. (MDPI, 2018-10-16)
    Automatic age estimation from unconstrained facial images is a challenging task and it recently has gained much attention due to its wide range of applications. In this paper, we propose a new model based on convolutional ...
  • Nossire, Zyad; Gupta, Navarun; Almazaydeh, Laiali; Xiong, Xingguo (MDPI, 2018-11-01)
    Due to rapid development in mobile communication technology in recent years, the demand for high quality and high capacity networks with thorough coverage has become a major necessity. Several models have been developed ...
  • Nossire, Zyad; Elleithy, Khaled M.; Ammourah, Boraq (AIRCC Publishing, 2013-01)
    This paper focuses on the development of new storage model by using cloud computing for mobile devises. The concept of cloud computing has been applied to mobile devices for improving the existing model (battery time and ...
  • Alotaibi, Bandar; Elleithy, Khaled M. (MDPI, 2016-02-24)
    Media access control (MAC) addresses in wireless networks can be trivially spoofed using off-the-shelf devices. The aim of this research is to detect MAC address spoofing in wireless networks using a hard-to-spoof measurement ...
  • Rai, Allon; Ale, Sangeta; Rizvi, Syed S.; Riasat, Aasia (IEEE, 2008-12-23)
    Localization is the subject matter that has allured the attention of many researchers in the field of wireless sensor network. It is the process of assigning or computing the location of the sensor nodes in a sensor network. ...
  • Elleithy, Abdelrahman; Liu, Gonhsin; Elrashidi, Ali (2012-09)
    In this paper we present a new model for the lifetime of wireless sensor networks used for sea water communications. The new model for power communications takes into consideration parameters such as power consumption for ...

Search ScholarWorks


Advanced Search

Browse

My Account