Search
Now showing items 161-170 of 173
An edutainment system for assisting qatari children with moderate intellectual and learning disability through exerting physical activities
(
IEEE
, 2013 , Conference Paper)
Children with Moderate Intellectual Disability (MID) and those with Moderate Learning Disability (MLD) are growing up with extensive exposure to computer technology. Computers and computer-related devices have the potential ...
Distributed binary consensus algorithm in wireless sensor networks with faulty nodes
(
IEEE
, 2013 , Conference Paper)
In sensor networks, consensus is a procedure to enhance the local measurements of the sensors with those of the surrounding nodes, and leads to a final agreement about a common value. The question here is how we can achieve ...
Distributed binary consensus algorithm and wireless sensor network
(
IEEE
, 2013 , Conference Paper)
We consider the design and implementation of the binary consensus algorithm in wireless sensor networks (WSN) under real life environment. This algorithm is applied for the evaluation of a consensus of a measured values ...
On the distributed binary consensus algorithm in wireless sensor networks
(
IEEE
, 2013 , Conference Paper)
We consider the binary consensus problem over the wireless sensor networks (WSN), where each node of the network initially observes one of two states and the aim of each node is to decide which one of the two states was ...
Binary consensus in sensor motes
(
IEEE
, 2013 , Conference Paper)
In this work, we adapt the binary consensus algorithm for use in wireless sensor networks. Binary consensus is used to allow a collection of distributed entities to reach consensus regarding the answer to a binary question ...
Secure cloud services: Matrix multiplication revisited
(
IEEE
, 2013 , Conference Paper)
This paper revisits the issue of secure outsourcing of services. It proposes a data scrambling approach of transforming private data into public without public key encryption in the cloud computing context. The approach ...
Automatic verification of health regulatory compliance in cloud computing
(
IEEE
, 2013 , Conference Paper)
This paper aims to develop an approach that enables cloud computing clients to verify health regulatory compliance claimed by cloud computing providers. In this approach, clients of cloud computing could check automatically ...
Social access control language (SocACL)
(
Association for Computing Machinery
, 2013 , Conference Paper)
Online Social Networks hold vast amounts of readily accessible personal information leaving them particularly vulnerable to privacy breach attacks [6]. With the impact these breaches varying from simply embarrassing the ...
Parametric modeling of EEG signals with real patient data for simulating seizures and pre-seizures
(
IEEE
, 2013 , Conference Paper)
Numerous theories and models have been developed to associate various findings or in relating EEG patterns to develop a software simulators. In this paper, a Dynamic model for simulating the EEG signal has been developed ...
Robotic toys for autistic children: Innovative tools for teaching and treatment
(
IEEE
, 2013 , Conference Paper)
This paper presents an initial study related to the use of robotic toys as teaching and therapeutic aid tools for teachers and care-givers as well as parents of children with various levels of autism spectrum disorder ...