Browsing Computer Science & Engineering by Type "Article"
Now showing items 61-80 of 1033
-
A Parallel Random Forest Algorithm for Big Data in a Spark Cloud Computing Environment
( IEEE Computer Society , 2017 , Article)With the emergence of the big data age, the issue of how to obtain valuable knowledge from a dataset efficiently and accurately has attracted increasingly attention from both academia and industry. This paper presents a ... -
A performance comparison of MD5 authenticated routing traffic with EIGRP, RIPv2, and OSPF
( Zarqa University , 2010 , Article)Routing is the process of forwarding data across an inter-network from a designated source to a final destination. Along the way from source to destination, at least one intermediate node is considered. Due to the major ... -
A pictorial mobile application for improving communication skills in non-verbal autism
( International Association of Online Engineering , 2015 , Article)It is estimated that as many as 25 percent of individuals living with autism spectrum disorders are nonverbal. That is, they cannot functionally communicate with others using their voice. Despite that substantial fraction, ... -
A PLM components monitoring framework for SMEs based on a PLM maturity model and FAHP methodology
( Mundo Press , 2014 , Article)Right PLM components selection and investments increase business advantages. This paper develops a PLM components monitoring framework to assess and guide PLM implementation in small and middle enterprises (SMEs). The ... -
A privacy-preserving traffic monitoring scheme via vehicular crowdsourcing
( MDPI AG , 2019 , Article)The explosive number of vehicles has given rise to a series of traffic problems, such as traffic congestion, road safety, and fuel waste. Collecting vehicles’ speed information is an effective way to monitor the traffic ... -
A Probabilistic Approach for Maximizing Travel Journey WiFi Coverage Using Mobile Crowdsourced Services
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)A public transport journey planning service often yields multiple alternative journeys plans to get from a source to a destination. In addition to journey preferences, such as connecting time and walking distance, passengers ... -
A Probabilistic Source Location Privacy Protection Scheme in Wireless Sensor Networks
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)With the recent developments of wireless sensor networks (WSNs), computing and communication have experienced huge advancement. Meanwhile, security has not received the same attention to go along with such developments. ... -
A Promising Electrochemical Sensor Platform for the Detection of Dopamine Using CuO-NiO/rGO Composite
( John Wiley and Sons Inc , 2023 , Article)Dopamine plays a significant role in the proper functioning of the central nervous system. Hence, the ability to sense levels of dopamine is pivotal in diagnosis and treatment procedures. For sensing dopamine, a mixed metal ... -
A promising non-orthogonal multiple access based networking architecture: Motivation, conception, and evolution
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)Since it can offer higher spectral efficiency by granting the served data to share the same spectrum resource synchronously, NOMA is considered as a bright multiple access technique for future wireless networks. Accommodating ... -
A quality of experience model for haptic virtual environments
( Association for Computing Machinery , 2014 , Article)Haptic-based Virtual Reality (VR) applications have many merits. What is still obscure, from the designer's perspective of these applications, is the experience the users will undergo when they use the VR system. Quality ... -
A Real-Time CNN-Based Lightweight Mobile Masked Face Recognition System
( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)Due to the global spread of the Covid-19 virus and its variants, new needs and problems have emerged during the pandemic that deeply affects our lives. Wearing masks as the most effective measure to prevent the spread and ... -
A Reliability-Aware Network Service Chain Provisioning with Delay Guarantees in NFV-Enabled Enterprise Datacenter Networks
( Institute of Electrical and Electronics Engineers Inc. , 2017 , Article)Traditionally, service-specific network functions (NFs) (e.g., Firewall, intrusion detection system, etc.) are executed by installation-and maintenance-costly hardware middleboxes that are deployed within a datacenter ... -
A review of deep learning-based detection methods for COVID-19
( Elsevier Ltd , 2022 , Article)COVID-19 is a fast-spreading pandemic, and early detection is crucial for stopping the spread of infection. Lung images are used in the detection of coronavirus infection. Chest X-ray (CXR) and computed tomography (CT) ... -
A review of information centric network-based internet of things: communication architectures, design issues, and research opportunities
( Springer New York LLC , 2019 , Article)In the perspective of Internet advancements for the future Internet, Information Centric Network (ICN) offers a communication model, which is different from the current IP-based paradigm. ICN is a name based communication ... -
A review of video surveillance systems
( Academic Press Inc. , 2021 , Article)Automated surveillance systems observe the environment utilizing cameras. The observed scenario is then analysed using motion detection, crowd behaviour, individual behaviour, interaction between individuals, crowds and ... -
A risk mitigation approach for autonomous cloud intrusion response system
( Springer-Verlag Wien , 2016 , Article)Cloud computing delivers on-demand resources over the Internet on a pay-for-use basis, intruders may exploit clouds for their advantage. This paper presents Autonomous Cloud Intrusion Response System (ACIRS), a proper ... -
A Scheme for Delay-Sensitive Spatiotemporal Routing in SDN-Enabled Underwater Acoustic Sensor Networks
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)In underwater acoustic sensor networks (UASNs), the sensors are deployed at different areas of the ocean, which perform information collection and delay-sensitive routing to the data center for further processing or ... -
A secure cloud system for maintaining COVID-19 patient's data using image steganography
( Hamad bin Khalifa University Press (HBKU Press) , 2021 , Article)The COVID-19 pandemic has been life-threatening for many people and as such, a contactless medical system is necessary to prevent the spread of the virus. Smart healthcare systems collect data from patients at one end and ... -
A Secured Proxy-Based Data Sharing Module in IoT Environments Using Blockchain
( NLM (Medline) , 2019 , Article)Access and utilization of data are central to the cloud computing paradigm. With the advent of the Internet of Things (IoT), the tendency of data sharing on the cloud has seen enormous growth. With data sharing comes ... -
A self-selective correlation ship tracking method for smart ocean systems
( MDPI AG , 2019 , Article)In recent years, with the development of the marine industry, the ship navigation environment has become more complicated. Some artificial intelligence technologies, such as computer vision, can recognize, track and count ...