تصفح Computer Science & Engineering حسب العنوان
السجلات المعروضة 1652 -- 1671 من 2213
-
Precoder Design and Power Allocation for MIMO Cognitive Radio Two-Way Relaying Systems
( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)In this paper, we study a multiple-antenna two-way relaying (TWR) cognitive radio (CR) system. A space alignment (SA) technique is adopted by the secondary users (SUs) to avoid interference with the primary users (PUs). ... -
Predicting COVID-19 cases using bidirectional LSTM on multivariate time series
( Springer Science and Business Media Deutschland GmbH , 2021 , Article)To assist policymakers in making adequate decisions to stop the spread of the COVID-19 pandemic, accurate forecasting of the disease propagation is of paramount importance. This paper presents a deep learning approach to ... -
Predicting infarction growth rate II using ANFIS-based binary particle swarm optimization technique in ischemic stroke
( Elsevier , 2023 , Article)Ischemic stroke, a severe medical condition triggered by a blockage of blood flow to the brain, leads to cell death and serious health complications. One key challenge in this field is accurately predicting infarction ... -
Predicting Plasma Vitamin C Using Machine Learning
( Taylor and Francis Ltd. , 2022 , Article)Precision Nutrition makes use of personal information about individuals to produce nutritional recommendations that have more utility than general population level recommendations. In many cases, being able to predict ... -
Predicting transformers oil parameters
( IEEE , 2009 , Conference Paper)In this paper different configurations of artificial neural networks are applied to predict various transformers oil parameters. The prediction is performed through modeling the relationship between the transformer insulation ... -
Prediction of date and ideology of old Islamic documents
( American Scientific Publishers , 2017 , Article)Prediction of date and Ideology (aka Islamic school or Madhab) is a very important research field. It allows scholars and researchers to find out more about what is specific to a particular period of time and what the main ... -
Prediction of Transformer Furan Levels
( Institute of Electrical and Electronics Engineers Inc. , 2016 , Article)In this letter, the ranges of furan content in oil in power transformers are predicted using measurements of oil tests, such as breakdown voltage, acidity, water content, and dissolved gas analysis. Predictive models based ... -
Prediction-based delay optimization data collection algorithm for underwater acoustic sensor networks
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)The past years have seen a rapid development of autonomous underwater vehicle-aided (AUV-aided) data-gathering schemes in underwater acoustic sensor networks (UASNs). The use of AUVs efficiently reduces energy consumption ... -
Predictive Auto-scaling of Multi-tier Applications Using Performance Varying Cloud Resources
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)The performance of the same type of cloud resources, such as virtual machines (VMs), varies over time mainly due to hardware heterogeneity, resource contention among co-located VMs, and virtualization overhead. The performance ... -
Predictive Autoscaling of Microservices Hosted in Fog Microdata Center
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)Fog computing provides microdata center (MDC) facilities closer to the users and applications, which help to overcome the application latency and response time concerns. However, guaranteeing specific service-level objectives ... -
Predictive maintenance using digital twins: A systematic literature review
( Elsevier , 2022 , Article Review)Context: Predictive maintenance is a technique for creating a more sustainable, safe, and profitable industry. One of the key challenges for creating predictive maintenance systems is the lack of failure data, as the machine ... -
Preface
( Elsevier , 2003 , Article)In recent years the involvement of Information Technology in business, governments, and education has increased dramatically. More and more research works have been conducted in different areas of Information Technology such ... -
Preference-based semantic matching of web service security policies
( IEEE , 2013 , Conference Paper)This electronic document is a live template. The various components of your paper [title, text, heads, etc.] are already defined on the style sheet, as illustrated by the portions given in this document. 2013 IEEE. -
Present landscape of quantum computing
( John Wiley and Sons Inc , 2020 , Other)Quantum computing is currently a topic of interest that harnesses the phenomena of quantum mechanics. It can address several scientific challenges and generate new business opportunities. Recently, for the first time in ... -
Prioritizing deadline-constrained data flows in cloud datacenter networks
( Association for Computing Machinery , 2016 , Conference Paper)Real-time interactive application workloads (e.g. web search, social networking, etc.) are composed of a remarkably large number of mini request partitions that require stringent delayminimal aggregation of responses and ... -
Priority-based medium access control for wireless body area networks with high-performance design
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)The wireless body area network (WBAN) has attracted considerable attention. Two main problems exist in WBANs: 1) the quality of service (QoS) requirements and 2) the energy efficiency of data transmission. To solve the ... -
Privacy and security issues in online social networks
( MDPI AG , 2018 , Article)The advent of online social networks (OSN) has transformed a common passive reader into a content contributor. It has allowed users to share information and exchange opinions, and also express themselves in online virtual ... -
Privacy Leakage in Smart Homes and Its Mitigation: IFTTT as a Case Study
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)The combination of smart home platforms and automation apps introduce many conveniences to smart home users. However, this also brings the potential of privacy leakage. If a smart home platform is permitted to collect all ... -
Privacy-Aware Collaborative Task Offloading in Fog Computing
( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)Numerous new applications have been proliferated with the mature of 5G, which generates a large number of latency-sensitive and computationally intensive mobile data requests. The real-time requirement of these mobile data ... -
Privacy-preserving artificial intelligence in healthcare: Techniques and applications
( Elsevier , 2023 , Article Review)There has been an increasing interest in translating artificial intelligence (AI) research into clinically-validated applications to improve the performance, capacity, and efficacy of healthcare services. Despite substantial ...