Now showing items 428-447 of 2202

    • Bayesian Hierarchical Clustering for Studying Cancer Gene Expression Data with Unknown Statistics 

      Sirinukunwattana, Korsuk; Savage, Richard S.; Bari, Muhammad F.; Snead, David R.J.; Rajpoot, Nasir M. ( Public Library of Science , 2013 , Article)
      Clustering analysis is an important tool in studying gene expression data. The Bayesian hierarchical clustering (BHC) algorithm can automatically infer the number of clusters and uses Bayesian model selection to improve ...
    • Bayesian network based heuristic for energy aware EEG signal classification 

      Mohamed A.; Shaban K.B.; Mohamed A. ( SpringerLink , 2013 , Conference Paper)
      A major challenge in the current research of wireless electroencephalograph (EEG) sensor-based medical or Brain Computer Interface applications is how to classify EEG signals as accurately and energy efficient as possible. ...
    • BEC: A novel routing protocol for balanced energy consumption in Wireless Body Area Networks 

      Moid Sahndhu, Muhammad; Javaid, Nadeem; Imran, Muhammad; Guizani, Mohsen; Khan, Zahoor Ali; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)
      Wireless Body Area Networks (WBANs) are getting growing interest because of their suitability for wide range of medical and non-medical applications. These applications demand WBAN to stay functional for a longer time which ...
    • Behaviour of RC beams strengthened in shear using near surface embedded FRCM 

      Ebead U.; Wakjira T.G. ( Institute of Physics Publishing , 2018 , Conference Paper)
      This paper presents an experimental study on the efficacy of a lately introduced "near surface embedded" technique (NSE) for fabric reinforced cementitious matrix (FRCM) for the strengthening of reinforced concrete (RC) ...
    • BEMD-3DCNN-based method for COVID-19 detection 

      Riahi, A.; Elharrouss, O.; Al-Maadeed, Somaya ( Elsevier Ltd , 2022 , Article)
      The coronavirus outbreak continues to spread around the world and no one knows when it will stop. Therefore, from the first day of the identification of the virus in Wuhan, China, scientists have launched numerous research ...
    • Bi-attention DoubleUNet: A deep learning approach for carotid artery segmentation in transverse view images for non-invasive stenosis diagnosis 

      Najmath, Ottakath; Akbari, Younes; Al-Maadeed, Somaya Ali; Bouridane, Ahmed; Zughaier, Susu M.; ... more authors ( Elsevier , 2024 , Article)
      The carotid artery is a vital blood vessel that supplies oxygenated blood to the brain. Blockages in this artery can lead to life-threatening illnesses, making accurate diagnosis essential. While ultrasound (US) imaging ...
    • Bidirectional Parallel Capacitive Data Links: Modeling and Experimental Results 

      Sawma C.; Hassan A.; Kassem A.; Al-Maadeed S.; Sawan M. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Article)
      We present, in this paper, a bidirectional capacitive data link. Enhancement of the spatial pulse position modulation used on the downlink is introduced, and a load-shift keying modulation is implemented for the uplink. ...
    • Big data perspective with otological modeling for long term traceability of cultural heritage 

      Naeem, Muhammad; Fahad, Muhammad; Moalla, Néjib; Ouzrout, Yacine; Bouras, Abdelaziz ( Springer New York LLC , 2015 , Conference Paper)
      The safeguarding of cultural heritage has brought forward the generation of heterogeneous, complex, diversified and irreplaceable digital data. It becomes difficult for an object with missing characteristics to perform the ...
    • BigCrypt for big data encryption 

      Al Mamun, Abdullah; Salah, Khaled; Al-maadeed, Somaya; Sheltami, Tarek R. ( Institute of Electrical and Electronics Engineers Inc. , 2017 , Conference Paper)
      as data size is growing up, cloud storage is becoming more familiar to store a significant amount of private information. Government and private organizations require transferring plenty of business files from one end to ...
    • BigIR at CLEF 2018: Detection and verification of check-worthy political claims 

      Yasser K.; Kutlu M.; Elsayed T. ( CEUR-WS , 2018 , Conference Paper)
      With the enormous amount of misinformation spread over the Internet, manual fact-checking is no longer feasible to prevent its negative impact. There is an urgent need for automated systems that can make fact-checking ...
    • Binarization of Degraded Document Images Using Convolutional Neural Networks and Wavelet-Based Multichannel Images 

      Akbari Y.; Al-Maadeed, Somaya; Adam K. ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)
      Convolutional neural networks (CNNs) have previously been broadly utilized to binarize document images. These methods have problems when faced with degraded historical documents. This paper proposes the utilization of CNNs ...
    • Binarization of degraded document images using convolutional neural networks based on predicted two-channel images 

      Akbari Y.; Britto A.S.; Al-Maadeed, Somaya; Oliveira L.S. ( IEEE Computer Society , 2019 , Conference Paper)
      Due to the poor condition of most of historical documents, binarization is difficult to separate document image background pixels from foreground pixels. This paper proposes Convolutional Neural Networks (CNNs) based on ...
    • Binary consensus in sensor motes 

      Al-Nakhala, Noor; Riley, Ryan; Elfouly, Tarek M. ( IEEE , 2013 , Conference Paper)
      In this work, we adapt the binary consensus algorithm for use in wireless sensor networks. Binary consensus is used to allow a collection of distributed entities to reach consensus regarding the answer to a binary question ...
    • Biometric-based authentication scheme for Implantable Medical Devices during emergency situations 

      Belkhouja T.; Du X.; Mohamed A.; Al-Ali A.K.; Guizani M. ( Elsevier B.V. , 2019 , Article)
      Biometric recognition and analysis are among the most trusted features to be used by Implantable Medical Devices (IMDs). We aim to secure these devices by using these features in emergency scenarios. As patients can witness ...
    • BIRD-VNE: Backtrack-avoidance virtual network embedding in polynomial time 

      Abdelwahab, Sherif; Hamdaoui, Bechir; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2014 , Conference Paper)
      The virtual network embedding (VNE) problem is known to be NP-hard, and as a result, several heuristic approaches have been proposed to solve it. These heuristics find sub-optimal solutions in polynomial time, but have ...
    • Blind deconvolution and retinal abnormality detection in blurred retinal images 

      Qidwai, Uvais A.; Qidwai, Umair ( American Scientific Publishers , 2011 , Article)
      In this paper, a new technique is presented to enhance the blurred images obtained from retinal imaging; both regular as well as Fluorescein Angiography. While in most of the cases, the image produced is quite clean and ...
    • Blind Deconvolution for retinal image enhancement 

      Qidwai, Uvais; Qidwai, Umair ( IEEE , 2010 , Conference Paper)
      In this paper, a new technique is presented to enhance the blurred images obtained from retinal imaging. One of the main steps in inspecting the eye (especially the deeper image of retina) is to look into the eye using a ...
    • Blind restoration of fluorescein angiography images 

      Qidwai, Uvais; Qidwai, Umair ( IEEE , 2010 , Conference Paper)
      In this paper, a new technique is presented to enhance the blurred images obtained from Fluorescein Angiography (FA) of the retina. One of the main steps in inspecting the eye (especially the deeper image of retina) is to ...
    • Blink rate vs Inner self perceived cognitive state while using virtual reality applications with haptic devices. 

      Ottakath, Najmath; Al Maadeed, Somaya; Al Jaam, Jihad; Saleh, Moutaz ( Qatar University Press , 2021 , Poster)
      On average, humans blink between eight and 21 times per minute while resting. Eye actions are influenced by external and internal stimuli. This can be utilized to measure internal cognition specifically focus and attention ...
    • Block6Tel: Blockchain-based Spectrum Allocation Scheme in 60-envisioned Communications 

      Patel, F.; Patel, Farnazbanu; Bhattacharya, Pronaya; Tanwar, Sudeep; Gupta, Rajesh; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)
      The 6G-based spectrum bands allocation to telecom providers would guarantee ultra peak rates, high availability, and extremely low-latency for various user applications. However, the spectrum allocation still suffers from ...