تصفح Computer Science & Engineering حسب العنوان
السجلات المعروضة 9 -- 28 من 2280
-
A BCI m-Learning System
( Hamad bin Khalifa University Press (HBKU Press) , 2016 , Conference Paper)Mobile learning can help in evolving students learning strength and comprehension skills. A connection is required to enable such devices communicate between each other. Brain-Computer Interface (BCI) can read brain signals ... -
A Bi-layered parallel training architecture for large-scale convolutional neural networks
( IEEE Computer Society , 2019 , Article)Benefitting from large-scale training datasets and the complex training network, Convolutional Neural Networks (CNNs) are widely applied in various fields with high accuracy. However, the training process of CNNs is very ... -
A Bilingual Scene-To-Speech Mobile Based Application
( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)Scene-To-Speech (STS) is the process of recognizing visual objects in a picture or a video to say aloud a descriptive text that represents the scene. The recent advancement in convolution neural network (CNN), a deep ... -
A bio-inspired framework to mitigate dos attacks in software defined networking
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)Software Defined Networking (SDN) is an emerging architecture providing services on a priority basis for real-time communication, by pulling out the intelligence from the hardware and developing a better management system ... -
A blockchain-based fog computing framework for activity recognition as an application to e-Healthcare services
( Elsevier B.V. , 2019 , Article)In modern e-Healthcare systems, human activity recognition (HAR) is one of the most challenging tasks in remote monitoring of patients suffering from mental illness or disabilities for necessary assistance. One of the major ... -
A Blockchain-Enabled Privacy-Preserving Verifiable Query Framework for Securing Cloud-Assisted Industrial Internet of Things Systems
( IEEE Computer Society , 2022 , Article)Advanced Industrial Internet-of-Things (IIoT), such as smart grids, 5G-enabled unmanned aerial vehicles (UAV), and supply chain 4.o, can be used to facilitate smart management. Nevertheless, IIoT systems generate huge ... -
A boost converter-based ringing circuit with high-voltage gain for unipolar pulse generation
( Institute of Electrical and Electronics Engineers Inc. , 2016 , Article)High-Voltage pulse generators are commonly used in biotechnology, medicine, industrial applications, food processing and drinking water purification. The dc-dc boost converter has been used before in pulsed applications ... -
A Broker-Based Manufacturing Supply Chain Integration with Blockchain: Managing Odoo Workflows Using Hyperledger Fabric Smart Contracts
( Springer Science and Business Media Deutschland GmbH , 2022 , Conference Paper)Nowadays, Blockchains are considered the go-to solution when it comes to secure and trust-ensuring platforms for critical data exchange. However, integrating this technology with existing systems is quite a challenging ... -
A business collaborative decision making system for network of SMEs
( Springer New York LLC , 2016 , Conference Paper)The enterprise collaboration has gain much popularity and strength with the inception of digital revolution. The concept of enterprise collaboration has observed a dynamic and evolving phenomenon of value added chain. This ... -
A cascade of artificial neural networks to predict transformers oil parameters
(2009 , Article)In this paper artificial neural networks have been constructed to predict different transformers oil parameters. The prediction is performed through modeling the relationship between the insulation resistance measured ... -
A Characterization Study of Arabic Twitter Data with a Benchmarking for State-of-the-Art Opinion Mining Models
( Association for Computational Linguistics (ACL) , 2017 , Conference Paper)Opinion mining in Arabic is a challenging task given the rich morphology of the language. The task becomes more challenging when it is applied to Twitter data, which contains additional sources of noise, such as the use ... -
A ciphertext-policy attribute-based encryption scheme with optimized ciphertext size and fast decryption
( Association for Computing Machinery, Inc , 2017 , Conference Paper)We address the problem of ciphertext-policy attribute-based encryption with fine access control, a cryptographic primitive which has many concrete application scenarios such as Pay-TV, e-Health, Cloud Storage and so on. ... -
A Cloud-based Solution for Rapid and Smart Neuropathy Detection
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)Cloud hosting of software allows easy and quick access to a wider community. In this paper, we propose a cloud-based solution for a smart neuropathy detection system that will benefit the community in three ways. Medical ... -
A CNN-Sequence-to-Sequence network with attention for residential short-term load forecasting
( Elsevier , 2022 , Article)Residential short-term load forecasting has become an essential process to develop successful demand response strategies, and help utilities and customers optimize energy production and consumption. Most previous works ... -
A combined Cognitive Multimedia Model for children with intellectual disabilities
( IEEE , 2013 , Conference Paper)Children with Down syndrome and other developmental disabilities are often faced with intellectual disorders ranging from mild to severe. This study proposes a multimedia-based learning model which combines Mayer's Cognitive ... -
A Combined Decision for Secure Cloud Computing Based on Machine Learning and Past Information
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)Cloud computing has been presented as one of the most efficient techniques for hosting and delivering services over the internet. However, even with its wide areas of application, cloud security is still a major concern ... -
A combined multiple action recognition and summarization for surveillance video sequences
( Springer , 2021 , Article)Human action recognition and video summarization represent challenging tasks for several computer vision applications including video surveillance, criminal investigations, and sports applications. For long videos, it is ... -
A Communication Framework with Unified Efficiency and Secrecy
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)Future wireless networks are confronted with the pressure to meet the requirements of network efficiency and communication secrecy, which require a new communication framework to unify and jointly optimize efficiency and ... -
A Comparative Study of Machine Learning Approaches for Handwriter Identification
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)During the past few years, writer identification has attracted significant interest due to its real-life applications including document analysis, forensics etc. Machine learning algorithms have played an important role ... -
A comprehensive overview of feature representation for biometric recognition
( Springer , 2020 , Article)The performance of any biometric recognition system heavily dependents on finding a good and suitable feature representation space where observations from different classes are well separated. Unfortunately, finding this ...