Search
Now showing items 3061-3070 of 3245
Analyzing the impact of human characteristics on the comprehensibility of road traffic signs
(
IEOM Society
, 2018 , Conference Paper)
Traffic safety is one of major challenges facing most communities worldwide. To improve traffic safety, regulating traffic movement through markings, signs, channelization, and others is essential. Traffic signs are used ...
An Overview of Deep Learning Methods Used in Vibration-Based Damage Detection in Civil Engineering
(
Springer
, 2022 , Conference Paper)
This paper presents a brief overview of vibration-based damage identification studies based on Deep Learning (DL) in civil engineering structures. The presence, type, size, and propagation of structural damage on civil ...
Outage performance of multi-hop hybrid FSO/RF communication systems
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
In this paper, five scenarios are considered for the realization of a multi-hop hybrid free-space optical/radio frequency (FSO/RF) communication system with decode-and-forward (DF) relaying, and analytical outage probability ...
QoS optimization for cloud service composition based on economic model
(
Springer Verlag
, 2015 , Conference Paper)
Cloud service composition is usually long term based and economically driven. Services in cloud computing can be categorized into two groups: Application services and Computing Services. Compositions in the application ...
Quantifying caching effects in urban VANETs
(
Institute of Electrical and Electronics Engineers Inc.
, 2016 , Conference Paper)
Most applications in urban Vehicular Ad hoc NETworks (VANETs) rely on information sharing, such as real-Time traffic information queries, advertisements, etc. However, existing data dissemination techniques cannot guarantee ...
A model-based approach to self-protection in computing system
(
Association for Computing Machinery, Inc
, 2013 , Conference Paper)
This paper introduces a model-based autonomic security management (ASM) approach to estimate, detect and identify security attacks along with planning a sequence of actions to effectively protect the networked computing ...
Concurrent association in heterogeneous networks with underlay D2D communication
(
Institute of Electrical and Electronics Engineers Inc.
, 2017 , Conference Paper)
Deployment of Device-to-Device (D2D) communication within dense heterogeneous networks is a key solution in order to face the intense demand for high data rates and quality of the service in future 5G networks. However, ...
Hierarchical Federated Learning for Collaborative IDS in IoT Applications
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Conference Paper)
As the Internet-of-Things devices are being very widely adopted in all fields, such as smart houses, healthcare, and transportation, extremely huge amounts of data are being gathered, shared, and processed. This fact raises ...
Experimental analysis of double and triple glazed facades with different shading devices in Qatar
(
Institute of Electrical and Electronics Engineers Inc.
, 2017 , Conference Paper)
The design of fully-glazed facades on buildings has become very popular, especially in hot regions where the use of natural ventilation is not recommended. The integration of shading devices to facade surfaces has been ...
Overview of the CLEF-2021 CheckThat! Lab Task 1 on check-worthiness estimation in tweets and political debates
(
CEUR-WS
, 2021 , Conference Paper)
We present an overview of Task 1 of the fourth edition of the CheckThat! Lab, part of the 2021 Conference and Labs of the Evaluation Forum (CLEF). The task asks to predict which posts in a Twitter stream are worth ...