Qatar University

Displaying 1-7 of 7 results

  • White Papers // Aug 2012

    Automated Reasoning Techniques for System Correctness Verification

    The functionality and complexity of software and hardware systems are steadily growing. Consequently, the probability of delicate faults existence in these systems is also rising. Some of these faults may result in a destructive loss of money and time. However, one major goal of designing those systems is to construct...

    Provided By Qatar University

  • White Papers // Jan 2011

    Teaching Software Engineering: Problems and Suggestions

    This paper presents some problems encountered during teaching the course of software engineering to computer science and computer engineering students for few offerings. The authors present problems encountered as well as suggested solutions. The author teaches Software Engineering, which is a common compulsory course in many Computer Science and Computer...

    Provided By Qatar University

  • White Papers // Oct 2010

    A Performance Comparison of MD5 Authenticated Routing Traffic With EIGRP, RIPv2, and OSPF

    Routing is the process of forwarding data across an inter-network from a designated source to a final destination. Along the way from source to destination, at least one intermediate node is considered. Due to the major role that routing protocols play in computer network infrastructures, special cares have been given...

    Provided By Qatar University

  • White Papers // Aug 2010

    Channel Estimation for LTE Uplink System by Perceptron Neural Network

    In this paper, a channel estimator using neural network is presented for Long Term Evolution (LTE) uplink. This paper considers multiuser SC-FDMA uplink transmissions with doubly selective channels. This channel estimation method uses knowledge of pilot channel properties to estimate the unknown channel response at non-pilot sub-carriers. First, the neural...

    Provided By Qatar University

  • White Papers // Sep 2009

    Wireless Application Deploying Cell Broadcast, and Bulk SMS/MMS

    Cell broadcast is a mobile technology that allows messages to be broadcast to all mobile handsets and similar devices within a designated geographical area. The broadcast range can be varied, from a single cell to the entire network. This technology is used in deploying location-based subscriber services, such as advertising,...

    Provided By Qatar University

  • White Papers // Apr 2009

    Security Dynamics of Cloud Computing

    This paper explores various dimensions of cloud computing security. It argues that security concerns of cloud computing need to be addressed from the perspective of individual stakeholder. Security focuses of cloud computing are essentially different in terms of its characteristics and business model. Conventional way of viewing as well as...

    Provided By Qatar University

  • White Papers // Sep 2008

    MB-C: Check-in Mobile Application Using Barcodes

    This project involves the design and development of a mobile application, called Mobile Bar-Code (MB-C) that uses the bar-code concept in the process of check-in to the provider's venue or facility. The MB-C integrates both web and wireless technologies. It provides a wireless service, over the cellular network that sends...

    Provided By Qatar University

  • White Papers // Sep 2009

    Wireless Application Deploying Cell Broadcast, and Bulk SMS/MMS

    Cell broadcast is a mobile technology that allows messages to be broadcast to all mobile handsets and similar devices within a designated geographical area. The broadcast range can be varied, from a single cell to the entire network. This technology is used in deploying location-based subscriber services, such as advertising,...

    Provided By Qatar University

  • White Papers // Apr 2009

    Security Dynamics of Cloud Computing

    This paper explores various dimensions of cloud computing security. It argues that security concerns of cloud computing need to be addressed from the perspective of individual stakeholder. Security focuses of cloud computing are essentially different in terms of its characteristics and business model. Conventional way of viewing as well as...

    Provided By Qatar University

  • White Papers // Oct 2010

    A Performance Comparison of MD5 Authenticated Routing Traffic With EIGRP, RIPv2, and OSPF

    Routing is the process of forwarding data across an inter-network from a designated source to a final destination. Along the way from source to destination, at least one intermediate node is considered. Due to the major role that routing protocols play in computer network infrastructures, special cares have been given...

    Provided By Qatar University

  • White Papers // Aug 2010

    Channel Estimation for LTE Uplink System by Perceptron Neural Network

    In this paper, a channel estimator using neural network is presented for Long Term Evolution (LTE) uplink. This paper considers multiuser SC-FDMA uplink transmissions with doubly selective channels. This channel estimation method uses knowledge of pilot channel properties to estimate the unknown channel response at non-pilot sub-carriers. First, the neural...

    Provided By Qatar University

  • White Papers // Jan 2011

    Teaching Software Engineering: Problems and Suggestions

    This paper presents some problems encountered during teaching the course of software engineering to computer science and computer engineering students for few offerings. The authors present problems encountered as well as suggested solutions. The author teaches Software Engineering, which is a common compulsory course in many Computer Science and Computer...

    Provided By Qatar University

  • White Papers // Sep 2008

    MB-C: Check-in Mobile Application Using Barcodes

    This project involves the design and development of a mobile application, called Mobile Bar-Code (MB-C) that uses the bar-code concept in the process of check-in to the provider's venue or facility. The MB-C integrates both web and wireless technologies. It provides a wireless service, over the cellular network that sends...

    Provided By Qatar University

  • White Papers // Aug 2012

    Automated Reasoning Techniques for System Correctness Verification

    The functionality and complexity of software and hardware systems are steadily growing. Consequently, the probability of delicate faults existence in these systems is also rising. Some of these faults may result in a destructive loss of money and time. However, one major goal of designing those systems is to construct...

    Provided By Qatar University