UB ScholarWorks

Browsing Engineering Proceedings by Title

Browsing Engineering Proceedings by Title

Sort by: Order: Results:

  • Almajadub, Fatma; Elleithy, Khaled M.; Shaer, Azza (International Society for Computers and Their Applications, Inc., 2014-10-13)
    In this Paper, we enhance the performance of Wireless Sensor Networks (WSNs) by optimizing the Wake-up capabilities within a passive radio-triggered wakeup circuit and then used its applications to manage the power consumption ...
  • Mstafa, Ramadhan J. (ASEE, 2013-03)
    Vehicular Ad-hoc Network (VANET) is a new network technology where the cars are used as mobile nodes to form a communication network. In VANET, routing protocols have a significant role in terms of the performance because ...
  • Rizvi, Syed S.; Elleithy, Khaled M.; Riasat, Aasia (IEEE, 2009-02-17)
    Wireless Multiuser receivers suffer from their relatively higher computational complexity that prevents widespread use of this technique. In addition, one of the main characteristics of multi-channel communications that ...
  • Hassan, Abdalraouf; Batrafi, Wesam; Elleithy, Khaled M. (IEEE, 2016-04)
    The aim of quantum cryptography is to overcome the everlasting problem of unrestricted security in private communication. The usage of the quantum principles protects the privacy of the user data during the time it is in ...
  • Lewis, Neal; Ibrahim, Mohammed (American Society for Engineering Management, 2006)
    There are direct relationships between work in process inventory, cycle time, and throughput for most manufacturing processes. Companies that focus on lean manufacturing principles are aware of these relationships, and ...
  • Kongar, Elif; Baral, Mahesh; Sobh, Tarek M. (ASEE, 2008-06)
    In this paper, we present two consecutive DEA models to measure the relative efficiency of applicants to graduate programs in engineering and to compare these efficiencies with the success of these students in the program. ...
  • Elleithy, Khaled M.; Amin, Alaa A. (IEEE, 2000-10-11)
    In this paper we present a method to estimate the layout area of DSP algorithms that are designed using the standard cell methodology. The circuit description is given as a netlist of standard cell library modules. The ...
  • Abuzneid, Abdelshakour A.; Abuhelaleh, Mohammed A.; Mismar, Thabet M. (ASEE, 2008-03)
    The use of sensor networks is increasing day by day; which offer more research topics to be discuss and modified; one of these topics is the power consumption that has to be reduced as possible, where the resources are ...
  • Hamada, Samir E.; Alshalabi, Ibrahim Alkore; Elleithy, Khaled M.; Badara, Joanna A. (IEEE, 2016-04)
    ELearning (Electronic Learning) and m-learning (Mobile Learning) systems are online learning platforms. In our research we are modeling them as a weighted directed graph where each node represents a course unit. A directed ...
  • Umranikar, Adhish; Shah, Ajinkya; Nettem, Anantha Priya (ASEE, 2016-04-29)
    Purpose of this research paper is to introduce a design of a fully automated, cost effective, high-speed mechanical system. This system will assemble two plates of a batch or lot production and deliver them for inspection. ...
  • Sobh, Tarek M.; Bajcsy, Ruzena (IEEE, 1992-05-01)
    We address the problem of observing a moving agent. We advocate a modeling approach for the visual system and its observer, where a discrete event dynamic system (DEDS) frame work is developed and "events" are defined as ...
  • Xiong, Xingguo; Zou, Qiang; Lu, Deren; Wang, Weiyuan (SPIE, 1997-09-29)
    A simple and effective method using a balance to measure micro force and corresponding deflection is presented. The method is proved to be very practical in testing the force-deflection behavior of silicon cantilever, in ...
  • AlHassan, Hussain; Gupta, Navarun (ASEE, 2015-04-30)
    One way of avoiding procrastination is by activating areas within the brain where we switch from one mode of thinking to another. Scientists say the primary cause of procrastination is that people tend to become uncomfortable ...
  • AlHassan, Hussain; Gupta, Navarun (ASEE, 2015-04-30)
    Improving performance is one of the hot topics in every industry. Researchers are working on many perspectives to achieve ideal results to improve performance. Some of them study external factors while others focus on ...
  • Xiong, Xingguo; Lu, Deren; Wang, Weiyuan (IEEE, 2005-08-07)
    In this paper, a novel silicon-on-glass bulk micromachined comb accelerometer with floating interconnect is introduced. The device uses unique floating back interconnect for the connection of the fixed comb fingers, which ...
  • Xiong, Xingguo; Lu, Deren; Wang, Weiyuan (IEEE, 2005-08-07)
    In this paper, a novel DRIE (Deep Reactive Ion Etching) bulk-micromachined single-crystal silicon comb vibratory microgyroscope is introduced. The device uses glass as substrate so that parasitic capacitance can be alleviated. ...
  • Sobh, Tarek M.; Mihali, Raul; Ghimire, B.; Vovk, K.; Gosine, G.; Batra, Puneet; Singh, Amit; Pathak, Sudip; Rosca, Andrew (2002-05)
    The concept of distance learning has been more and more articulated during the past few years and is expected to shortly turn into a practical education system within current high level learning institutions. The chances ...
  • Elleithy, Khaled M. (IEEE, 1996-11-03)
    Designing an optimal Residue Number System (RNS) processor in terms of area and speed depends on the choice of the system moduli. In this paper an optimal algorithm for choosing the system moduli is presented. The algorithm ...
  • Rizvi, Syed S.; Elleithy, Khaled M.; Riasat, Aasia (IEEE, 2008-04-24)
    A closed-form expression to determine an average error rate for synchronous DS-CDMA multi-user detector is derived based on the transformation matrix (TM) algorithm proposed in [1]. The derived expression for average bit ...
  • Elleithy, Khaled M.; Alattas, Reem (ASEE, 2013-03)
    Although cloud computing is growing rapidly, a key challenge is to build confidence that the cloud can handle data securely. Data is migrated to the cloud after encryption. However, this data must be decrypted before ...

Search ScholarWorks


Advanced Search

Browse

My Account