UB ScholarWorks

Browsing Engineering Journal Articles by Title

Browsing Engineering Journal Articles by Title

Sort by: Order: Results:

  • Almgren, Khaled; Krishnan, Murali; Aljanobi, Fatima; Lee, Jeongkyu (MDPI, 2018-12-17)
    The processing and analyzing of multimedia data has become a popular research topic due to the evolution of deep learning. Deep learning has played an important role in addressing many challenging problems, such as computer ...
  • Alshammari, Hamoud H.; Bach, Christian (AIRCC Publishing, 2013-08)
    This paper discover the most administration security issues in Cloud Computing in term of trustworthy and gives the reader a big visualization of the concept of the Service Level Agreement in Cloud Computing and it’s some ...
  • Sobh, Tarek M.; Elleithy, Khaled M. (World Scientific, 2007-11)
  • Sobh, Tarek M.; Zhu, Xiao-Hong; Bruderlin, Beat; Mihali, Raul (Kluwer Academic Publishers, 2000-03-08)
    In this work we address the problem of manufacturing machine parts from sensed data. Constructing geometric models for objects from sensed data is the intermediate step in a reverse engineering manufacturing system. Sensors ...
  • Utenov, Muratulla; Sobh, Tarek M.; Baigunchekov, Zhumadil; Zhilkibayeva, Saltanat; Patel, Sarosh (MDPI, 2018-09-10)
    This paper presents a theory for the analytical determination of internal forces in the links of planar linkage mechanisms and manipulators with statically determinate structures, considering the distributed dynamic loads. ...
  • Almasri, Marwah M.; Elleithy, Khaled M.; Razaque, Abdul (AIRCC Publishing, 2015-07)
    Maintaining the quality of service (QOS) and controlling the network congestion are quite complicated tasks. They cause degrading the performance of the network, and disturbing the continuous communication process. To ...
  • Sobh, Tarek M.; Henderson, Thomas C.; Zana, Frederic (1998)
    In this work we address the problem of tolerance analysis across the domains of industrial inspection using sensed data, CAD design, and manufacturing. Instead of using geometric primitives in CAD models to define and ...
  • Mihali, Raul; Grigorian, Mher; Sobh, Tarek M. (Kluwer Academic Publishers, 2000)
    Robotics experiences tremendous evolutions every year. Once a topic is mainly approached at research centers, read through highly specialized books and viewed distantly on scientific channels, nowadays it is a common and ...
  • Alshalabi, Ibrahim Alkore; Hamada, Samir E.; Elleithy, Khaled M.; Badara, Joanna A.; Moslehpour, Saeid (2018)
    A directed graph represents an accurate picture of course descriptions for online courses through computer-based implementation of various educational systems. E-learning and m-learning systems are modeled as a weighted, ...
  • Razaque, Abdul; Elleithy, Khaled M. (2013-09-17)
    We deploy BT node (sensor) that offers passive and active sensing capability to save energy. BT node works in passive mode for outdoor communication and active for indoor communication. The BT node is supported with novel ...
  • Xiong, Xingguo; Zou, Qiang; Lu, Deren; Wang, Weiyuan (Elsevier Science Ltd., 1998-08-01)
    A simple and effective method using a balance to measure micro force and corresponding deflection is presented. The method is proved to be very practical in testing the force–deflection behavior of silicon cantilever, in ...
  • Xiong, Xingguo; Zou, Qiang; Lu, Deren; Wang, Weiyuan (SPIE, 1997-09-29)
    A simple and effective method using a balance to measure micro force and corresponding deflection is presented. The method is proved to be very practical in testing the force-deflection behavior of silicon cantilever, in ...
  • Riasat, Aasia; Rashid, Muhammad; Elleithy, Khaled M.; Rizvi, Syed S. (Springer Netherlands, 2008)
    High performance packet switching networks are being deployed to provide sufficient data bandwidth for end users 3G services such as video streaming and broadband like data services. The use of high performance networks ...
  • Thakur, Jagdish S.; Haripriya E., Prakasam; Zhang, Linfeng; McCullen, Erik F.; Rimai, Lajos; García-Suárez, V. M.; Naik, Ratna; Ng, K.Y. Simon; Auner, Gregory W. (American Physical Society, 2007-02-06)
    The time-dependant current response of Pd/AlN/ Si-based devices is investigated for different hydrogen concentrations. At a fixed applied voltage, the device current suddenly increases when hydrogen gas is turned on and ...
  • Barkana, Buket D. (Elsevier, 2008-12)
    Electrical properties of a resonant-tunneling-semiconductor-controlled rectifier (RT-SCR) model have been presented. The current, temperature, gain, doping concentration, and layer size versus voltage relationships have ...
  • Abualkibash, Munther Hamad; Elleithy, Khaled M. (AIRCC Publishing, 2012-07)
    As a result of the research processing in the computing field, a new computing model appeared based on the development of many computing models such as parallel computing, distributed computing, and grid computing. Many ...
  • Abuhelaleh, Mohammed A.; Elleithy, Khaled M.; Mismar, Thabet M. (AIRCC Publishing, 2009-07)
    Many papers have been proposed in order to increase the wireless sensor networks performance; This kind of network has limited resources, where the energy in each sensor came from a small battery that sometime is hard to ...
  • Rizvi, Syed S.; Riasat, Aasia; Elleithy, Khaled M. (AIRCC Publishing, 2010-01)
    This paper presents the implementation of a secure application for an academic institution that offers numerous services to both students and the faculty. The primary focus of this paper is to provide a technical implementation ...
  • Alexander, Pagán Jr.; Baashirah, Rania; Abuzneid, Abdelshakour A. (MDPI, 2018-09-01)
    Radio frequency identification (RFID) is a technology that has grown in popularity and in the applications of use. However, there are major issues regarding security and privacy with respect to RFID technology which have ...
  • Elleithy, Khaled M.; Reddy, Rama Ca (Taiwan Academic Network, 2002-04-01)
    Today the Internet contains all dangerous situations,nasty people and risks that one can find in a society as a whole. A common perimeter security measure is to install a firewall between disparate networks as a means of ...

Search ScholarWorks


Advanced Search

Browse

My Account