تصفح Computer Science & Engineering حسب العنوان
السجلات المعروضة 1105 -- 1124 من 2280
-
Guest Editorial: Special issue on green internet of things: Challenges and future opportunities - Part II
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Other)[No abstract available] -
Guest Editorial: Special Issue on Internet of Things for Industrial Security for Smart Cities
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Other)[No abstract available] -
Guest Editorial: Special Issue on: WiMAX security and applications
( John Wiley & Sons, Ltd. , 2009 , Article) -
Guest Editorial: Special Section on Integration of Big Data and Artificial Intelligence for Internet of Things
( IEEE Computer Society , 2020 , Other)[No abstract available] -
Guidelines for design and implementation of mobile learning
( IGI Global , 2016 , Book chapter)As technology evolves, there is a shift towards the use of mobile technology to deliver education both on-campus in a blended format and online delivery. This shift is moving at a very fast pace which is a major challenge ... -
Guidelines for design and implementation of mobile learning
( IGI Global , 2016 , Book chapter)As technology evolves, there is a shift towards the use of mobile technology to deliver education both on-campus in a blended format and online delivery. This shift is moving at a very fast pace which is a major challenge ... -
HA-CIDS: A hierarchical and autonomous IDS for cloud systems
( IEEE , 2013 , Conference Paper)Cloud computing is an attractive model that provides the delivery of on-demand computing resources over the Internet and on a pay-for-use basis. However, while intruders may exploit clouds for their advantage, most IDS ... -
Haddle: A framework for investigating data leakage attacks in hadoop
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)Nowadays Hadoop is popular among businesses and individuals for its low costs, convenience, and fast speed. However, this also makes it the goal of data leakage attacks as sensitive data stored with an HDFS infrastructure ... -
Hadoop Perfect File: A fast and memory-efficient metadata access archive file to face small files problem in HDFS
( Academic Press Inc. , 2021 , Article)HDFS faces several issues when it comes to handling a large number of small files. These issues are well addressed by archive systems, which combine small files into larger ones. They use index files to hold relevant ... -
Handcrafted features with convolutional neural networks for detection of tumor cells in histology images
( IEEE Computer Society , 2016 , Conference Paper)Detection of tumor nuclei in cancer histology images requires sophisticated techniques due to the irregular shape, size and chromatin texture of the tumor nuclei. Some very recently proposed methods employ deep convolutional ... -
Handoff-aware cross-layer assisted multi-path TCP for proactive congestion control in mobile heterogeneous wireless networks
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)Multi-Path TCP (MPTCP) is a new evolution of TCP that enables a single MPTCP connection to use multiple TCP subflows transparently to applications. Each subflow runs independently allowing the connection to be maintained ... -
Handover authentication for mobile networks: Security and efficiency aspects
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Article)A handover authentication module in mobile networks enables mobile nodes to securely and seamlessly roam over multiple access points. However, designing an appropriate handover authentication protocol is a difficult task ... -
HapticSnakes: multi-haptic feedback wearable robots for immersive virtual reality
( Springer London , 2019 , Article)Haptic feedback plays a large role in enhancing immersion and presence in VR. However, previous research and commercial products have limitations in terms of variety and locations of delivered feedbacks. To address these ... -
Haralick feature extraction from time-frequency images for epileptic seizure detection and classification of EEG data
( IEEE , 2014 , Conference Paper)This paper presents novel time-frequency (t-f) features based on t-f image descriptors for the automatic detection and classification of epileptic seizure activities in EEG data. Most previous methods were based only on ... -
Haralick feature extraction from timefrequency images for automatic detection and classification of audio anomalies for rd surveillance
( Hamad bin Khalifa University Press (HBKU Press) , 2018 , Conference Paper)In this paper, we propose a novel method for the detection of road accidents by analyzing audio streams for road surveillance application. In the last decade, due to the increase in a number of people and transportation ... -
HDBExpDetector: Aggregate sudden-change detector over dynamic web databases
( IEEE Computer Society , 2017 , Conference Paper)We propose to demonstrate HDBExpDetector, a system for analysts to discover bursty events from a thirdparty web database by using nothing but the existing search interface of the web database to monitor and detect sudden ... -
Heart Rate as a Predictor of Challenging Behaviours among Children with Autism from Wearable Sensors in Social Robot Interactions
( MDPI , 2023 , Article)Children with autism face challenges in various skills (e.g., communication and social) and they exhibit challenging behaviours. These challenging behaviours represent a challenge to their families, therapists, and caregivers, ... -
Hesitant extension of fuzzy-rough set to address uncertainty in classification
( IOS Press , 2018 , Article)Although fuzzy rough sets have been considered as a powerful theory to handle real-valued data with uncertainty, fuzzy rough sets based algorithms reached their limit of conveying hesitation information in the processes ... -
Heterogeneous wireless networks for smart grid distribution systems: Advantages and limitations
( MDPI AG , 2018 , Article)Supporting a conventional power grid with advanced communication capabilities is a cornerstone to transferring it to a smart grid. A reliable communication infrastructure with a high throughput can lay the foundation towards ... -
Hierarchical deep learning approach using fusion layer for Source Camera Model Identification based on video taken by smartphone
( Elsevier , 2024 , Article)Over the last decade, videos uploaded and shared through web-based multimedia platforms and mobile applications have proliferated worldwide. This is because cloud-based applications such as iCloud, YouTube, Facebook, ...