Browsing Computer Science & Engineering by Title
Now showing items 2156-2175 of 2280
-
Ubiquitous monitoring system for critical cardiac abnormalities
( IEEE , 2012 , Conference Paper)In many critical cardiac abnormalities, it is desirable to have a monitoring system that can keep a constant surveillance on the conditions of the heart and its related patterns. This can be very convenient in clinical ... -
Ubiquitous monitoring system for critical cardiac abnormalities
( Springer , 2012 , Book chapter)In many critical cardiac abnormalities, it is desirable to have a monitoring system that can keep a constant surveillance on the conditions of the heart and its related patterns. This can be very convenient in clinical ... -
Ultra-Low Energy CNFET-Based Ternary Combinational Circuits Designs
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)The embedded systems, IoT (Internet of Things) devices, and portable electronic devices spread very quickly recently. Most of them depend on batteries to operate. The target of this work is to decrease energy consumption ... -
Ultrasound Intima-Media Complex (IMC) Segmentation Using Deep Learning Models
( Multidisciplinary Digital Publishing Institute (MDPI) , 2023 , Article)Common carotid intima-media thickness (CIMT) is a common measure of atherosclerosis, often assessed through carotid ultrasound images. However, the use of deep learning methods for medical image analysis, segmentation and ... -
Ultrasound-Based Image Analysis for Predicting Carotid Artery Stenosis Risk: A Comprehensive Review of the Problem, Techniques, Datasets, and Future Directions
( MDPI , 2023 , Article Review)The carotid artery is a major blood vessel that supplies blood to the brain. Plaque buildup in the arteries can lead to cardiovascular diseases such as atherosclerosis, stroke, ruptured arteries, and even death. Both ... -
Uncertain training data set conceptual reduction: A machine learning perspective
( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)Knowledge discovery from data is a challenging problem that has significant importance in many different fields such as biology, economics and social sciences. Real-world data is incomplete and ambiguous; moreover, its ... -
Uncertainty and Equivalence Relation Analysis for Hesitant Fuzzy-Rough Sets and Their Applications in Classification
( IEEE Computer Society , 2019 , Article)The fusion of hesitant fuzzy set (HFS) and fuzzy-rough set (FRS) is explored and applied into the task of classification due to its capability of conveying hesitant and uncertainty information. In this paper, on the basis ... -
Undecimated wavelet-based Bayesian denoising in mixed Poisson-Gaussian noise with application on medical and biological images
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)Due to photon and readout noise biomedical images are generally contaminated by a mixed Poisson-Gaussian noise. In this paper, we propose a Bayesian image denoising methodology for images corrupted by a mixed Poisson-Gaussian ... -
Understand my world: An interactive app for children learning arabic vocabulary
( IEEE Computer Society , 2021 , Conference Paper)COVID-19 imposed a new paradigm in education especially in elementary schools. Children are no longer able to go regularly to schools as normal. They should then rely mainly on themselves to learn and acquire knowledge. ... -
Understanding Digital Forensic Characteristics of Smart Speaker Ecosystems
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)With a built-in intelligent personal voice assistant providing QA services, smart speaker ecosystems combine multiple compatible components, including the internet of things (IoT) technology, mobile devices, and cloud ... -
Understanding In-App Ads and Detecting Hidden Attacks through the Mobile App-Web Interface
( Institute of Electrical and Electronics Engineers Inc. , 2018 , Article)Mobile users are increasingly becoming targets of malware infections and scams. In order to curb such attacks it is important to know how these attacks originate. We take a previously unexplored step in this direction. ... -
Understanding probabilistic cognitive relaying communication with experimental implementation and performance analysis
( MDPI AG , 2019 , Article)Efficiently use of the limited wireless spectrum can be achieved by cooperative cognitive relaying, where secondary users (SUs), who do not pay for the licensed spectrum and have better channel condition to the primary ... -
Understanding Simple Stories through Concepts Extraction and Multimedia Elements
( Springer , 2012 , Conference Paper)Teaching children with intellectual disabilities is a challenging task. Instructors use different methodologies and techniques to introduce the concepts of lessons to the children, motivate them and keep them engaged. These ... -
Understanding the Impact of Emotions on the Quality of Software Artifacts
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)This paper proposes a framework for investigating the impact of emotions on the quality of software artifacts and portrays some observations captured during the development of several software engineering projects. The ... -
Understanding the impact of network structure on propagation dynamics based on mobile big data
( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)Understanding the propagation dynamics of information/an epidemic on complex networks is very important for discovering and controlling a terrorist attack, and even for predicting a disease outbreak. As an effective method, ... -
Understanding the topologies of BitTorrent networks: A measurement view
(2012 , Conference Paper)BitTorrent (BT) is one of the most popular Peer-to-Peer (P2P) network applications. Most characteristics (except the topology) of BT network have been examined extensively by measurement approaches. In this work, we deploy ... -
Unleashing the secure potential of the wireless physical layer: Secret key generation methods
( Elsevier B.V. , 2016 , Report)Within the paradigm of physical layer security, a physical layer characteristic is used as a common source of randomness to generate the secret key. This key is then used to encrypt the data to hide information from ... -
Unlocking Unlicensed Band Potential to Enable URLLC in Cloud Robotics for Ubiquitous IoT
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)Cloud robotics (CR) support extremely high reliability and low-latency communications in ubiquitous Internet of Things applications. However, many of those applications currently rely on wired connection, limiting their ... -
Unsupervised adaptive microblog filtering for broad dynamic topics
( Elsevier , 2016 , Article)Information filtering has been a major task of study in the field of information retrieval (IR) for a long time, focusing on filtering well-formed documents such as news articles. Recently, more interest was directed towards ... -
Unsupervised feature selection method for improved human gait recognition
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)Gait recognition is an emerging biometric technology which aims to identify people purely through the analysis of the way they walk. The technology has attracted interest as a method of identification because it is ...