تصفح Computer Science & Engineering حسب العنوان
السجلات المعروضة 965 -- 984 من 2261
-
Evaluation of Loss Functions for Segmentation of Corneal Nerves
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)Corneal confocal microscopy (CCM) has been advocated as a non-invasive technique for objective diagnosis of very early neuropathy in patients by scanning the corneal subbasal nerve plexus. The obtained images provide a ... -
EveTAR: A new test collection for event detection in Arabic tweets
( Association for Computing Machinery, Inc , 2016 , Conference Paper)Research on event detection in Twitter is often obstructed by the lack of publicly-available evaluation mechanisms such as test collections; this problem is more severe when considering the scarcity of them in languages ... -
EveTAR: building a large-scale multi-task test collection over Arabic tweets
( Springer Netherlands , 2018 , Article)This article introduces a new language-independent approach for creating a large-scale high-quality test collection of tweets that supports multiple information retrieval (IR) tasks without running a shared-task campaign. ... -
Evidence theory-based approach for epileptic seizure detection using EEG signals
( IEEE , 2012 , Conference Paper)Electroencephalogram (EEG) is one of the potential physiological signals used for detecting epileptic seizure. Discriminant features, representing different brain conditions, are often extracted for diagnosis purposes. ... -
Evolution of Internet of Things from Blockchain to IOTA: A Survey
( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)Internet of Things (IoT) is the new paradigm to the scaling nature of things and their elements, interconnected, exchanging data over a network supported with nodes. The Ubiquitous use of tiny devices and embedded sensor ... -
Evolution-algorithm-based unmanned aerial vehicles path planning in complex environment
( Elsevier Ltd , 2019 , Article)With the wide application of Unmanned Aerial Vehicles (UAVs) in production and life, more and more attention has been paid to the autonomous track planning of UAVs. When UAV path planning algorithm is dealing with flying ... -
Experimental analysis of gravity and buoyancy powered energy generation storage systems
( Springer Science and Business Media Deutschland GmbH , 2021 , Conference Paper)The concept of harnessing energy from buoyancy as well as the ability to have underwater energy storage is an area of research that, compared to other renewable energy generation techniques, is relatively unexplored. This ... -
Experimental Setup for Measuring Relaxation from EEG Signals during Immersion in VR Environments
( Institute of Electrical and Electronics Engineers Inc. , 2022 , Conference Paper)According to the Global Organization for Stress, 80 percent of people are stressed at work and according to the American Institute of Stress, stress causes 48 percent of people to have difficulty sleeping. Relaxation reduces ... -
An Experimental Study of Two-way Ranging Optimization in UWB-based Simultaneous Localization and Wall-Mapping Systems
( Institute of Electrical and Electronics Engineers Inc. , 2022 , Conference Paper)In this paper, we propose a new ultra-wideband (UWB)-based simultaneous localization and wall-mapping (SLAM) system, which adopts two-way ranging optimization on UWB anchor and tag nodes to track the target's real-time ... -
Explainable, trustworthy, and ethical machine learning for healthcare: A survey
( Elsevier , 2022 , Article Review)With the advent of machine learning (ML) and deep learning (DL) empowered applications for critical applications like healthcare, the questions about liability, trust, and interpretability of their outputs are raising. The ... -
Exploitation of additional degrees of freedom of multiphase drives in low-frequency operation of modular multilevel converters
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)MMC encounters serious limitations in the zero and low-frequency operation of variable-speed motor drives. In MMC, the voltage ripples of SubModule (SM) capacitor is inversely proportional to the phase current frequency. ... -
Exploiting 4G mobile user cooperation for energy conservation: Challenges and opportunities
(2013 , Article)Recent years have witnessed tremendous success and popularity of mobile applications and services, resulting in an explosive growth in the number of mobile devices, as well as in the range and types of things these devices ... -
Exploiting Client-Side Collected Measurements to Perform QoS Assessment of IaaS
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Article)Delivering reliable service offerings to clients remain a challenging aspect in today's cloud infrastructure. A broad number of research studies have undertaken the service evaluation process from one side; that is, the ... -
Exploiting context severity to achieve opportunistic service differentiation in vehicular ad hoc networks
( Institute of Electrical and Electronics Engineers Inc. , 2014 , Article)Wireless Access in Vehicular Environment (WAVE) dictates primitives for intelligent transportation system (ITS) applications and services. The medium access control (MAC) layer in WAVE facilitates service differentiation. ... -
Exploiting LabVIEW FPGA in Implementation of DCT-based Wireless Image Transmission for Wildlife Surveillance System
( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)In the development of wildlife surveillance system technology, images are important input data that allow real situations in the field to be viewed and analysed. This project proposed a compressed and wireless image ... -
Exploiting Live Feedback for Tweet Real-time Push Notifications
( National Institute of Standards and Technology (NIST) , 2017 , Conference Paper)Twitter has been developed as an immense information creation and sharing network through which users post diverse information. Although a user would regularly check her Twitter timeline to stay up-to-date on her topics ... -
Exploiting Spatial Correlations: Group Key Generation for Secure IoT Device Networks
( Institute of Electrical and Electronics Engineers Inc. , 2023 , Conference Paper)With the exponential growth in IoT devices, especially in healthcare systems, where multiple devices are attributed to one person, the need for a secure and effective group secret key (GSK) generation is intrinsic. GSKs ... -
Exploiting spectrum sensing data for key management
( Elsevier B.V. , 2017 , Article)In cognitive radio networks, secondary users (SUs) communicate on unused spectrum slots in the frequency bands assigned to primary users (PUs). Like any other wireless communication system, cognitive radio networks are ... -
Exploiting Task Elasticity and Price Heterogeneity for Maximizing Cloud Computing Profits
( IEEE Computer Society , 2018 , Article)This paper exploits cloud task elasticity and price heterogeneity to propose an online resource management framework that maximizes cloud profits while minimizing energy expenses. This is done by reducing the duration ... -
Exploiting Traffic Correlation Towards Energy Saving in Data Centers
( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)Many proposed data center architectures are constructed with a huge number of network devices in order to support the increasing cloud based services. These devices are used to achieve the highest performance in case of ...