بحث بسيط
السجلات المعروضة 21 -- 30 من 133
Efficient alignment of next generation sequencing data using MapReduce on the cloud
(
Institute of Electrical and Electronics Engineers Inc.
, 2012 , Conference Paper)
This paper presents a methodology for running NGS read mapping tools in the cloud environment based on the MapReduce programming paradigm. As a demonstration, the recently developed and robust sequence alignment tool, ...
Heuristic algorithms for aircraft sequencing problem
(2012 , Conference Paper)
Delays in flights resulting in multi-billion-dollar losses are declared annually worldwide. Hence, an identification of air traffic policies that can reduce frequent and costly inefficiencies is needed. The problem of ...
Development and evaluation of open educational resources for enhancing engineering students' learning experience
(
IEEE Education Society
, 2012 , Conference Paper)
The aim of this paper is to report on the development of control systems open educational resources. The paper reports on two control systems education software: 1) A LabVIEW based Control Systems Analysis Toolkit (CSAT) ...
Constraint-enhanced role engineering via answer set programming
(
Association for Computing Machinery
, 2012 , Conference Paper)
Role engineering (RE) aims to develop and maintain appropriate role-based access control (RBAC) configurations. However, RE with constraints in place is not well-studied. Constraints usually describe organizations' security ...
An ontology-based system to dynamically extract multimedia elements for children's tutorials
(
IEEE
, 2012 , Conference Paper)
Children with intellectual disabilities are very challenging to teach, and can learn best with the use of different methodologies that engage their senses, such as using images, sounds and clips. In this work, a new ...
Vulnerabilities and verification of cryptographic protocols and their future in Wireless Body Area Networks
(
IEEE
, 2012 , Conference Paper)
In network security goals such as confidentiality, authentication, integrity and non-repudiation can be achieved using cryptographic techniques. Cryptographic techniques are techniques to hide information from unauthorized ...
Detecting different tasks using EEG-source-temporal features
(
Springer Nature
, 2012 , Conference Paper)
This study proposes a new type of features extracted from Electroencephalography (EEG) signals to distinguish between different tasks. EEG signals are collected from six children aged between two to six years old during ...
Ubiquitous monitoring system for critical cardiac abnormalities
(
IEEE
, 2012 , Conference Paper)
In many critical cardiac abnormalities, it is desirable to have a monitoring system that can keep a constant surveillance on the conditions of the heart and its related patterns. This can be very convenient in clinical ...
Fuzzy classification-based control of wheelchair using EEG data to assist people with disabilities
(
Springer Nature
, 2012 , Conference Paper)
Electroencephalography (EEG) will play an intelligent role our life: especially EEG based health diagnosis of brain disorder and Brain-Computer Interface (BCI) are growing areas of research. However, these approaches fall ...
MeMaPads: Enhancing children's well-being through a physically interactive memory and math games
(
IEEE
, 2012 , Conference Paper)
Obesity has recently become an epidemic that endangers the well-being of all the modern societies, especially the young generations. The lack of physical activity is considered as one major reason that contributes to such ...