• Login
    Search 
    •   eScholar Home
    • Faculty of Engineering & Applied Science
    • Search
    •   eScholar Home
    • Faculty of Engineering & Applied Science
    • Search
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Search

    Show Advanced FiltersHide Advanced Filters

    Filters

    Use filters to refine the search results.

    Now showing items 21-30 of 35

    • Sort Options:
    • Relevance
    • Title Asc
    • Title Desc
    • Issue Date Asc
    • Issue Date Desc
    • Results Per Page:
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100
    Thumbnail

    Haptic controls in cars for safer driving 

    Asif, Fayez (2011-06-01)
    With the spread of latest state of the art technologies geared towards utilization of the human senses, haptic technologies have been introduced as a way of utilising the sense of touch to either solve real world problems ...
    Thumbnail

    Self-propelled rotary tool for turning difficult-to-cut materials 

    Parker, Grant (2011-04-01)
    Hard turning of difficult-to-cut materials is an economical method of machining components with high surface quality and mechanical performance. Conventionally in the machining industry, generating a component from raw ...
    Thumbnail

    Detection of covert channel communications based on intentionally corrupted frame check sequences 

    Najafizadeh, Ali (2011-07-01)
    This thesis presents the establishment of a covert-channel in wireless networks in the form of frames with intentionally corrupted Frame Check Sequences (FCSs). Previous works had alluded to the possibility of using this ...
    Thumbnail

    Energy, exergy and exergoeconomic analyses of gas-turbine based systems 

    Altayib, Khalid (2011-12-01)
    Gas turbines are the primary technology used for the purpose of power generation nearly everywhere. In this thesis, the Makkah Power Plant, running on a Brayton cycle, is considered for analysis. The peak demand for electric ...
    Thumbnail

    Communication protocols, queuing and scheduling delay analysis in CANDU SCWR hydrogen co-generation model 

    Ahmed, Fayyaz (2011-08-01)
    Industrial dynamical, Networked Control Systems (NCSs) are controlled over a communication network. We study a continuous-time CANada Deuterium Uranium-Super Critical Water Reactor (CANDU-SCWR) hydrogen plant and a discrete-time ...
    Thumbnail

    Vibration suppression of straight and curved beams traversed by moving loads 

    Javid, Fahim (2011-09-01)
    Vibration suppression of beams traversed by moving loads, using optimal Tuned-Mass-Damper (TMD) systems, is investigated. This study is performed on two different geometrical shapes of the beam, namely, uniform homogenous ...
    Thumbnail

    User aid-based evolutionary computation for optimal parameter setting of image enhancement and segmentation 

    Darvish, Arman (2011-12-01)
    Applications of imaging and image processing become a part of our daily life and find their crucial way in real-world areas. Accordingly, the corresponding techniques get more and more complicated. Many tasks are ...
    Thumbnail

    Energy-efficient relay cooperation for lifetime maximization 

    Zuo, Fangzhi (2011-08-01)
    We study energy-efficient power allocation among relays for lifetime maximization in a dual-hop relay network operated by amplify-and-forward relays with battery limitations. Power allocation algorithms are proposed for ...
    Thumbnail

    Improved design of three-degree of freedom hip exoskeleton based on biomimetic parallel structure 

    Pan, Min (2011-07-01)
    The external skeletons, Exoskeletons, are not a new research area in this highly developed world. They are widely used in helping the wearer to enhance human strength, endurance, and speed while walking with them. Most ...
    Thumbnail

    Forensic analysis of unallocated space 

    Lei, Zhenxing (2011-06-01)
    Computer forensics has become an important technology in providing evidence in investigations of computer misuse, attacks against computer systems and more traditional crimes like money laundering and fraud where digital ...
    • 1
    • 2
    • 3
    • 4

    DSpace software copyright © 2002-2016  DuraSpace
    Contact Us | Send Feedback
    Theme by 
    Atmire NV
     

     

    Browse

    All of eScholarCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CommunityBy Issue DateAuthorsTitlesSubjects

    My Account

    LoginRegister

    Discover

    AuthorAbbas, Muhammad Awais (1)Ahmed, Fayyaz (1)Alfaheid, Khalid (1)Alganas, Abdulelah (1)Altayib, Khalid (1)Asif, Fayez (1)Darvish, Arman (1)Esmailzadeh, Ali (1)Hoque, Shaikh Md Emdadul (1)Ishak, Fadi (1)... View MoreSubjectExergy (3)Optimization (3)Ammonia (2)Biomass (2)Efficiency (2)Energy (2)ORC (2)Privacy (2)Security (2)3 DOF (1)... View MoreDate Issued
    2011 (35)
    Has File(s)Yes (35)

    DSpace software copyright © 2002-2016  DuraSpace
    Contact Us | Send Feedback
    Theme by 
    Atmire NV