بحث بسيط
السجلات المعروضة 51 -- 60 من 259
تطوير بيئة دمج شاملة : رؤية ورسالة مبادئ وقيم مساواة وعدالة ومشاركة كاملة للأشخاص ذوي الإعاقة في المجتمع د أسماء عبدالله العطية رئيس قسم العلوم النفسية - كلية التربية - جامعة قطر
(
Hamad bin Khalifa University Press (HBKU Press)
, 2015 , Conference Paper)
The integration process of persons with disabilities with their normal peers in all fields and in the community reflects a humanitarian philosophy; and it represents a moral leap towards the provision of appropriate education ...
Efficient processing of hamming-distance-based similarity-search queries over MapReduce
(
OpenProceedings.org, University of Konstanz, University Library
, 2015 , Conference Paper)
Similarity search is crucial to many applications. Of particular interest are two flavors of the Hamming distance range query, namely, the Hamming select and the Hamming join (Hamming-select and Hamming-join, respectively). ...
Model predictive control of selective catalytic reduction in diesel-powered vehicles
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
This paper proposes a method to synthesize an optimal controller for the SCR section of the diesel exhaust after-treatment system, which is based on a system model consisting of coupled hyperbolic and parabolic partial ...
Adaptive Cooperative Network Coding based MAC protocol for device-to-device communication
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
Device-to-Device (D2D) communication allows the direct connection of mobile devices in a cellular network. In D2D networking, cooperative communication is inherent due to the proximity of the devices that are able to ...
Approving updates in collaborative databases
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
Data curation activities in collaborative databases mandate that collaborators interact until they converge and agree on the content of their data. Typically, updates by a member of the collaboration are made visible to ...
Data Obfuscation for Privacy and Confidentiality in Cloud Computing
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
This paper proposes a data obfuscation approach in outsourcing matrix multiplication to cloud computing. It is primarily based on splitting the rows and columns of matrices to alter their actual dimension coupled with ...
Dynamic analysis of application delivery network for leveraging software defined infrastructures
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
Application Service Providers (ASPs) may obtain resources from a number of cloud service providers (CSPs) in an attempt to improve latency and minimize operational expenses (OpEx). The CSPs may use management and control ...
QU at TREC-2015: Building Real-Time Systems for Tweet Filtering and Question Answering
(
National Institute of Standards and Technology (NIST)
, 2015 , Conference Paper)
This paper presents our participation in the microblog and LiveQA tracks in TREC-2015. Both tracks required building a "real-time" system that monitors a data stream and responds to users' information needs in real-time. ...
Managing Security Control Assumptions Using Causal Traceability
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
Security control specifications of software systems are designed to meet their security requirements. It is difficult to know both the value of assets and the malicious intention of attackers at design time, hence assumptions ...
Space vector PWM for a three-phase to six-phase direct AC/AC converter
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
In this paper a generalized multi-phase space vector theory is considered for developing the space vector modulation of a three-phase to six-phase AC to AC converter. The modulation is based on the control of the voltage ...