UB ScholarWorks

Browsing Engineering Proceedings by Title

Browsing Engineering Proceedings by Title

Sort by: Order: Results:

  • Almazaydeh, Laiali; Elleithy, Khaled M.; Faezipour, Miad (International Society for Computers and Their Applications, Inc., 2013-03-04)
    This study offers a literature research reference value for bioengineers and practitioner medical doctors. It could reduce research time and improve medical service efficiency regarding Obstructive Sleep Apnea (OSA) detection ...
  • Pande, Varun; Elleithy, Khaled M.; Almazaydeh, Laiali (International Society for Computers and Their Applications, Inc., 2012-11-14)
    In this paper, a robust approach for real time face recognition where the images come from live video is proposed. To improve the algorithmic efficiency of face detection, we combine the eigenface method using Haar-like ...
  • Amin, Alaaeldin A.M.; Elleithy, Khaled M. (1994-10-31)
    In this paper a new approach for parallelism analysis and extraction of Digital Signal Processing algorithms is introduced. The high level description of the input is given in CIRCAL. A dependency graph of the problem is ...
  • Zhang, Linfeng; McCullen, Erik F.; Rahman, Md H.; Baird, Ron J.; Naik, Ratna; Rimai, Lajos; Auner, Gregory W.; Ng, K.Y. Simon (American Institute of Chemical Engineers, 2004-11-07)
    Instead of the pure Pd gates in MIS type hydrogen sensor, Pd-Cr alloy gates with different composition and structure were used to improve the sensors performance. The use of Pd-Cr alloy not only extended the dynamic range ...
  • Sobh, Tarek M.; Dekhil, Mohamed; Jaynes, Chris; Henderson, Thomas C. (IEEE, 1993-06)
    We address a perception framework for intelligent inspection and reverse engineering in this work. In particular, we investigate the use of discrete event dynamic systems (DEDS) to guide the sensing of mechanical parts. ...
  • Imran, Muhammad; Shaikh, Asif; Rizvi, Syed S.; Elleithy, Khaled M. (ASEE, 2009-04-03)
    This paper presents an analysis of switches in high speed LAN. In order to support our analysis, this paper provides both analytical and mathematical models. The proposed analytical model is based on a finite state Markov ...
  • Zhang, Linfeng; Al-Homoudi, Ibrahim A.; Rahman, Md H.; McCullen, Erik F.; Rimai, Lajos; Baird, Ron J.; Naik, Ratna; Newaz, Golam; Auner, Gregory W.; Ng, K.Y. Simon (Materials Research Society, 2005)
    An MIS Hydrogen sensor with a Pd0.96Cr0.04/AlN/Si structure was fabricated, exhibiting the dynamic range considerably wider than that of analogous devices with pure Pd gates. A useful response could be obtained for Hydrogen ...
  • Veerapandian, Vignesh; Xiong, Xingguo; Hmurcik, Lawrence V. (ASEE, 2009-04-03)
    The Pico processor is a scaled down RISC processor hence the name “Pico”. Pico processors form an integral part in a network. They act as co-processors to Network processors. The network processors are in-charge of various ...
  • Kongar, Elif; Sobh, Tarek M. (ASEE, 2008-03)
    Today, ever-decreasing budgets and dynamic variations in the number of both faculty and student bodies are two major challenges that most U.S. universities deal with. In addition to the effort to solve these problems, every ...
  • Elleithy, Khaled M.; Aref, Mostafa A. (IEEE, 1993-11-01)
    In this paper a new formal hardware verification approach for Digital Signal Processing Architectures based on a production system environment is introduced. The PROVER system (PROduction system for hardware VERification) ...
  • Lewis, Neal; Spurlock, David (American Society for Engineering Management, 2003)
    The most widely used technique for evaluating projects is discounted cash flow. However, discounted cash flow analysis fails to consider flexibility. Real options analysis offers an alternative technique that provides value ...
  • Abushgra, Abdulbast; Elleithy, Khaled M. (IEEE, 2016-04)
    Quantum key distribution (QKD) is the future of the cryptography world. The QKD was invented to increase the security rate when exchanging a private key. Since 1984, several experimental attempts to design protocols have ...
  • Alshowkan, Muneer; Elleithy, Khaled M. (IEEE, 2016-04)
    Authentication is one of the security services that ensures sufficient security of the system by identification and verification. Also, it assures the identity of the communicating party to be that the claimed one. To build ...
  • Gupta, Navarun; Patel, Sarosh; Joshi, Manan; Dharmadhikari, Bhushan V.; Hmurcik, Lawrence V. (ASEE, 2012-01)
    We discuss the engineering principles of Hi-voltage (any voltage above 600 volts). We cite 4 examples that typify some of the problems facing the Engineer and technician working with Hi-voltages, including geometry ...
  • Lewis, Neal; Eschenbach, Ted; Hartman, Joseph (American Society for Engineering Management, 2009)
    Traditionally, present worth is computed with a single interest rate. However, the real options literature includes examples where “first” costs are discounted using a continuous risk-free interest rate while later revenues ...
  • Venna, Trinadh Venkata Swamy Naidu; Patel, Sarosh (ASEE, 2015-04-30)
    With the advent of robots in various industries, countless tasks that are complex for humans are made easier than ever before. Thanks to their functionality and accuracy we are able to achieve high productivity while ...
  • Sobh, Tarek M.; Mahmood, Ausif (Measurement Science Conference, 1997-01)
    This work examines closely the possibilities for errors, mistakes and uncertainties in sensing systems. We identify and suggest techniques for modeling, analyzing, and recovering these uncertainties. This work concentrates ...
  • Sobh, Tarek M.; Wohn, Kwangyoen (SPIE, 1990-03-01)
    We discuss the problem of recovering the 3-D motion and structure. An algorithm for computing the camera motion and the orientation of planar surface is developed. It solves for the 3-D motion and structure iteratively ...
  • Elleithy, Khaled M.; Rizvi, Syed S.; Riasat, Aasia (IEEE, 2008-07-06)

Search ScholarWorks


Advanced Search

Browse

My Account