Now showing items 1034-1053 of 2202

    • Fuzzy mapping of human heuristics for defect classification in gas pipelines using ultrasonic NDE 

      Qidwai, Uvais; Maqbool, Mohammed; Jamil, Mohammad Shahid ( IEEE , 2007 , Conference Paper)
      This paper presents a methodology for classifying the common defects in steel pipelines for transporting petroleum and gas. Usually, the nondestructive evaluation (NDE) experts in the industry judges the defect type by ...
    • Fuzzy model for detection and estimation of the degree of autism spectrum disorder 

      Shams, Wafaa Khazaal; Wahab, Abdul; Qidwai, Uvais A. ( Springer Nature , 2012 , Conference Paper)
      Early detection of autism spectrum disorder (ASD) is of great significance for early intervention. Besides, knowing the degree of severity in ASD and how it changes with the intervention is imperative for the treatment ...
    • Fuzzy multi-criteria lifecycle system maturity decision making based on an integrated Fuzzy AHP and VIKOR methodology 

      Zhang, Haiqing; Bouras, Abdelaziz; Ouzrout, Yacine; Sekhari, Aicha ( Institute of Electrical and Electronics Engineers Inc. , 2014 , Conference Paper)
      A wide range of maturity models for product lifecycle management are proposed to assess the relative position of companies on their road to complete lifecycle systems' implementation. However, it is a tough job for the ...
    • Fuzzy prediction for failed back surgery syndrome 

      Qidwai, U.; Shamim, S.; Enam, A. ( Taylor and Francis Ltd. , 2010 , Article)
      In this article a new strategy is presented that can be used by neurophysicians, neurosurgeons, and orthopedic surgeons to predict patients' health after an operative procedure on the vertebral column just by analyzing the ...
    • Fuzzy prediction of complications in craniopathy 

      Qidwai, Uvais; Shamim, M Shahzad; Godil, Saniya Siraj; Qadeer, Mohsin; Enam, Syed Ather ( IEEE , 2011 , Conference Paper)
      Decompressive craniectomy is a neurosurgical procedure in which part of the skull is removed to allow a swelling brain room to expand. It is a life-saving procedure used in the treatment of medically refractory intracranial ...
    • Fuzzy time-frequency defect classifier for NDT applications 

      Qidwai, Uvais; Bettayeb, Maamar ( IEEE , 2009 , Conference Paper)
      In this paper, a customized classifier is presented for the industry-practiced Nondestructive Evaluation (NDE) protocols using a Hybrid-Fuzzy Inference System (FIS) to classify the and characterize the defects commonly ...
    • Fuzzy-EMG-based Assistive interface for children with Spinal-Muscular-Atrophy 

      Qidwai, Uvais; Zahid, Aejaz ( Institute of Electrical and Electronics Engineers Inc. , 2014 , Conference Paper)
      Spinal Muscular Atrophy (SMA) is a progressive neuromuscular disorder. Usually, this condition is considered genetically induced with no known cure to date. Children are born with the condition and develop muscular weakness ...
    • G-RAT | A novel graphical randomized authentication technique for consumer smart devices 

      Khan M.A.; Ud Din I.; Jadoon S.U.; Khan M.K.; Guizani M.; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)
      User authentication is the process that is exercised millions of times around the globe by using different techniques and methods. The most prominent way of authentication is alphanumerical password forms that have been ...
    • Gait recognition based on modified phase-only correlation 

      Rida, Imad; Almaadeed, Somaya; Bouridane, Ahmed ( Springer-Verlag London Ltd , 2016 , Article)
      Gait recognition is an emerging biometric technology aiming to identify people purely through the analysis of the way they walk. The technology has attracted interest as a method of identification because it is noncontact ...
    • Gait recognition for person re-identification 

      Elharrouss O.; Almaadeed N.; Al-Maadeed, Somaya; Bouridane A. ( Springer , 2021 , Article)
      Person re-identification across multiple cameras is an essential task in computer vision applications, particularly tracking the same person in different scenes. Gait recognition, which is the recognition based on the ...
    • Game theoretic data privacy preservation: Equilibrium and pricing 

      Xu, Lei; Jiang, Chunxiao; Wang, Jian; Ren, Yong; Yuan, Jian; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)
      Privacy issues arising in the process of collecting, publishing and mining individuals' personal data have attracted much attention in recent years. In this paper, we consider a scenario where a data collector collects ...
    • Game Theoretical Model for Cybersecurity Risk Assessment of Industrial Control Systems 

      Nassar, Mohamed; Khoury, Joseph; Erradi, Abdelkarim; Bou-Harb, Elias ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)
      Supervisory Control and Data Acquisition (SCADA) and Distributed Control Systems (DCS) use advanced computing, sensors, control systems, and communication networks to monitor and control industrial processes and distributed ...
    • Game Theory Based Opportunistic Computation Offloading in Cloud-Enabled IoV 

      Liwang, Minghui; Wang, Jiexiang; Gao, Zhibin; Du, Xiaojiang; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)
      With the growing popularity of the fifth-generation (5G) wireless systems and cloud-enabled Internet of Vehicles, vehicular cloud has been introduced as a novel mobile device computing mode, which enables vehicles to offload ...
    • Game Theory for Anti-Jamming Strategy in Multichannel Slow Fading IoT Networks 

      Gouissem, Ala; Abualsaud, Khalid; Yaacoub, Elias; Khattab, Tamer; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)
      The open nature of the wireless communication medium renders it vulnerable to jamming attacks by malicious users. To detect their presence and to avoid such attacks, several techniques are present in the literature. Most ...
    • Game-based micro-learning approach for language vocabulary acquisition using LingoSnacks 

      Erradi, Abdelkarim; Hind, Almerekhi; Sajeda, Nahia ( IEEE , 2013 , Conference Paper)
      Acquisition of new vocabulary is an important element for language learning but it requires repeated and varied exposure to the new words and their usage. This paper reports the experience of designing and developing a ...
    • Garbled computation in cloud 

      Wang, Yongge; Malluhi, Qutaibah M.; Khancb, Khaled MD ( Elsevier , 2016 , Article)
      With the wide adoption of cloud computing paradigm, it is important to develop appropriate techniques to protect client data privacy in the cloud. Encryption is one of the major techniques that could be used to achieve ...
    • Garbled computation in cloud 

      Wang, Yongge; Malluhi, Qutaibah M.; Khan, Khaled MD ( Elsevier , 2016 , Article)
      With the wide adoption of cloud computing paradigm, it is important to develop appropriate techniques to protect client data privacy in the cloud. Encryption is one of the major techniques that could be used to achieve ...
    • General learning approach for event extraction: Case of management change event 

      Elloumi, Samir; Jaoua, Ali; Ferjani, Fethi; Semmar, Nasredine; Besançon, Romaric; ... more authors ( SAGE Publications Ltd , 2013 , Article)
      Starting from an ontology of a targeted financial domain corresponding to transaction, performance and management change news, relevant segments of text containing at least a domain keyword are extracted. The linguistic ...
    • Generating haptic texture using solid noise 

      Halabi, O.; Khattak, G. ( Elsevier B.V. , 2021 , Article)
      Texture enhances haptic interaction by providing unique, distinguishable, and versatile surfaces. In computer haptics, texture can render environments more realistic and provide useful information. In this paper, an algorithm ...
    • Generating Images from Arabic Story-Text using Scene Graph 

      Zakraoui J.; Saleh M.; Asghar U.; Alja'am J.M.; Al-Maadeed, Somaya ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      In this paper, we propose a new approach to generate descriptive images from simple Arabic text of stories for children to build a flexible and rich multimedia repository. To make it successful, we need to transform the ...