بحث بسيط
السجلات المعروضة 21 -- 30 من 2676
Stemming Versus Light Stemming as Feature Selection Techniques for Arabic Text Categorization
(
IEEE
, 2007 , Conference Paper)
This paper compares and contrasts two feature selection techniques when applied to Arabic corpus; in particular; stemming, and light stemming were employed. With stemming, words are reduced to their stems. With light ...
Predicting transformers oil parameters
(
IEEE
, 2009 , Conference Paper)
In this paper different configurations of artificial neural networks are applied to predict various transformers oil parameters. The prediction is performed through modeling the relationship between the transformer insulation ...
Ordered clustering: A way to simplify analysis of multichannel signals
(
IEEE
, 2010 , Conference Paper)
We describe here new possibilities offered by a
clustering method routinely used by many petroleum
companies and which could be used in other
applications where analysis of multichannel signals has
a significant role ...
Detection of neonatal seizure using multiple filters
(
IEEE
, 2010 , Conference Paper)
It is often impossible to accurately differentiate between seizure and non-seizure related activities in irifants based on clinical manifestations alone. The electroencephalogram (EEG) is therefore the best tool available ...
Analysis of a Cell-based Call Admission Control Scheme for QoS Support in Multimedia Wireless Networks
(
IEEE
, 2007 , Conference Paper)
Next generation wireless communication systems target to provide guaranteed quality of service (QoS) for multimedia applications. In this paper, a multiple-threshold bandwidth reservation scheme combined with a call admission ...
The State of Qatar Informative Web Portal
(
IEEE
, 2008 , Conference Paper)
This paper describes the electronic government project in the state of Qatar known as Qatar Central Government Portal (Hukoomi e-Gov). It highlights the main online services that are offered to Qataris citizens and residents. ...
Specifying Security Goals of Component Based Systems: An End-User Perspective
(
IEEE
, 2008 , Conference Paper)
This paper treats security from a software engineering point of view. Security issues of software components are usually handled at the two levels of development abstractions: by the security experts during the component ...
Intelligent Virtual Archiving for Accessing News Article Repositories
(
IEEE
, 2008 , Conference Paper)
This paper proposes a news article archiving solution that addresses many of today's systems limitations for effective storage and management of unstructured data items. The proposed system employs formal concept analysis ...
Performance Evaluation of Network-Parallel Data Storage
(
IEEE
, 2006 , Conference Paper)
This paper presents a unique storage architecture that utilizes the multiplicity of storage nodes in LAN and WAN network environments to achieve high reliability, high-performance, scalability, and cost effectiveness. The ...
Fuzzy Expert System for Defect Classification for Non-Destructive Evaluation of Petroleum Pipes
(
IEEE
, 2007 , Conference Paper)
In this paper, an expert system has been outlined to classify the defects in metallic petroleum pipelines using acoustic techniques with non-destructive evaluation (NDE) protocols, the proposed system maps the quantitative ...