بحث بسيط
السجلات المعروضة 31 -- 40 من 752
A fully accessible Arabic learning platform for assisting children with intellectual challenges
(
Springer International Publishing
, 2014 , Conference Paper)
Children with intellectual challenges (IC) are growing up with wide exposure to computer technology. Computer software and assistive devices have the potential to help these children in their education, career development, ...
Logic programs with ordered disjunction: First-order semantics and expressiveness
(
AAAI Publications
, 2014 , Conference Paper)
Logic programs with ordered disjunction (LPODs) (Brewka 2002) generalize normal logic programs by combining alternative and ranked options in the heads of rules. It has been showed that LPODs are useful in a number of areas ...
A non-inclusive memory permissions architecture for protection against cross-layer attacks
(
IEEE
, 2014 , Conference Paper)
Protecting modern computer systems and complex software stacks against the growing range of possible attacks is becoming increasingly difficult. The architecture of modern commodity systems allows attackers to subvert ...
Multilinear sparse decomposition for best spectral bands selection
(
Springer Verlag
, 2014 , Conference Paper)
Optimal spectral bands selection is a primordial step in multispectral images based systems for face recognition. In this context, we select the best spectral bands using a multilinear sparse decomposition based approach. ...
Supervised machine learning techniques for efficient network intrusion detection
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
Cloud computing is gaining significant traction and virtualized data centers are becoming popular as a cost-effective infrastructure in telecommunication industry. Infrastructure as a Service (IaaS), Platform as a Service ...
An arabic ontology-based learning system for children with intellectual challenges
(
IEEE
, 2014 , Conference Paper)
Children with intellectual challenges (IC) are growing up with extensive exposure to computer technology. Computer software and assistive devices have the potential to help these children in education, career development, ...
A finite state hidden markov model for predicting multistage attacks in cloud systems
(
IEEE
, 2014 , Conference Paper)
Cloud computing significantly increased the security threats because intruders can exploit the large amount of cloud resources for their attacks. However, most of the current security technologies do not provide early ...
Energy-efficient cloud resource management
(
IEEE
, 2014 , Conference Paper)
We propose a resource management framework that reduces energy consumption in cloud data centers. The proposed framework predicts the number of virtual machine requests along with their amounts of CPU and memory resources, ...
Smart neuropathy detection using machine intelligence: Filling the void between clinical practice and early diagnosis
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
An important aspect of Smart healthcare involves the development of innovative non-intrusive procedures for early detection and diagnosis of specific illnesses. Essentially, diseases for which very complicated and invasive ...
IoT-based fire alarm system
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
Fire alarm systems are essential in alerting people before tire engulfs their homes. However, tire alarm systems, today, require a lot of wiring and labor to be installed. This discourages users from installing them in ...