The paper investigates the effects of Users Equipment (UEs) mobility on the performance of 4G LTE-A under high data rate services. One of the key techniques supporting LTE services is Adaptive Modulation and Coding (AMC) ...
Hammood , Maytham M.; Yoshigoe ,Kenji; Sagheer, Ali M.(2015)
Wireless communication security is a critical factor for secure communication among large scale of wireless networks. A limited resource constraint, such as power and memory size presents a significant challenge to implement ...
Wind energy has emerged as an important field of study in today's era. A fundamental aspect of this study is the efficient design of wind farms. This design process considers a number of conflicting design criteria. ...
The majority of universities in the developing countries are still using a paper sheet for checking students' attendance. The use of an alternative system is becoming an urgent necessity to manage the students' attendance ...
This paper presents reconfigurable hardware architecture for MWD (Minimum Weight Decoding) algorithm for network error correction, with high throughput on Field Programmable Gate Array (FPGA). Network Error Correction (NEC) ...
Q-learning is a one of the well-known Reinforcement Learning algorithms that has been widely used in various problems. The main contribution of this work is how to speed up the learning in a single agent environment (e.g. ...
Playfair cipher is an interesting data encryption technique with a medium level of complexity, and therefore, is suitable for security of wireless and mobile systems. Different sizes of the matrices used for key have been ...
Ahmed, Hany Hashem; Kelash, Hamdy M.; Tolba, Maha S.; ELRashidy, Mohammed A. .(2015)
Nowadays Biometric plays vital role in many applications. It is defined as the credentials of people based on their physiological or behavioral characteristics. Biometric recognition can be classified into various types ...
Jumaah, Alaa K.; Al-Janabi, Sufyan; Ali, Nazar Abedlqader(2015)
Many privacy preserving data mining algorithms attempt to hide what database owners consider as sensitive. Specifically, in the association rules domain, many of these algorithms are based on item restriction methods; that ...
This paper presents a fuel dispensing system based on RFID technology. The system can improve the fueling process in order to make it much easier, secure and reliable. It prevents unauthorized fueling by assigning a specified ...
Currently, BitTorrent is the most popular protocol that is widely used for P2P file sharing system. Nevertheless, BitTorrent protocol exposes some inefficient processes that are choosing neighbours and selecting pieces. ...
The IEEE 802.16 standard, also known as worldwide interoperability for microwave access (WiMAX), has emerged as the strongest contender for broadband wireless technology with promises to offer guaranteed Quality of Service ...
El-Kattan, Walaa; Kandil, Magy; Said, El-Sayed A.; Hussein, Abd El-Razik(2015)
The relatively high dangerous thermal effects of electric cable in the Nuclear Power Plants (NPPs) is the concern to study the cable insulation behavior during a fire accident. This paper provides a comprehensive evaluation ...
The emergence of next generation protocol (IPv6) and MPLS has been seen as technologies that will drive the next generation networks. Together with Traffic Engineering (TE), Quality of Service (QoS) requirements for high ...
Wahab, Osama F. Abdel; Badawy, Mohamed B.; Elshakankiry, Osama A.; El-sayed, Hala S.(2015)
This paper propose a method of hiding data in selected video sequence. The proposed algorithm is a hybrid hiding scheme based on discrete wavelet transform (DWT) and histogram shifting for lossless data hiding . In this ...