Browsing Computer Science & Engineering by Title
Now showing items 1145-1164 of 2211
-
ICFHR2016 competition on multi-script writer demographics classification using "qUWI" database
( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)This competition is aimed at classification of writer demographics from offline handwritten documents using the QUWI database. QUWI is a bilingual database comprising writing samples of same individuals in Arabic and ... -
Identification of phantom movements with an ensemble learning approach
( Elsevier , 2022 , Article)Phantom limb pain after amputation is a debilitating condition that negatively affects activities of daily life and the quality of life of amputees. Most amputees are able to control the movement of the missing limb, which ... -
Identifying contextual properties of software architecture in cloud computing
( IEEE , 2011 , Conference Paper)This paper argues that the contextual properties of cloud-enabled software architecture should be identified and understood differently by cloud consumers. The existing architectures are not designed to exploit the contextual ... -
Identifying opinion mining elements based on dependency relations and fuzzy logic
( CSREA Press , 2019 , Conference Paper)Opinion mining mainly involves three elements: feature and feature-of relations, opinion expressions and the related opinion attributes (e.g. Polarity), and feature-opinion relations. Although many works are emerged to ... -
Identifying the vulnerabilities of bitcoin anonymous mechanism based on address clustering
( Science in China Press , 2020 , Article)The anonymity mechanism of bitcoin is favored by the society, which promotes its usage and development. An adversary should not be able to discover the relation between bitcoin addresses and bitcoin users to ensure effective ... -
IDRISI-RA: The First Arabic Location Mention Recognition Dataset of Disaster Tweets
( Association for Computational Linguistics (ACL) , 2023 , Conference Paper)Extracting geolocation information from social media data enables effective disaster management, as it helps response authorities; for example, in locating incidents for planning rescue activities, and affected people for ... -
IDRISI-RE: A generalizable dataset with benchmarks for location mention recognition on disaster tweets
( Elsevier , 2023 , Article)While utilizing Twitter data for crisis management is of interest to different response authorities, a critical challenge that hinders the utilization of such data is the scarcity of automated tools that extract geolocation ... -
IEEE Access Special section Editorial: Mobile edge computing and mobile cloud computing: Addressing heterogeneity and energy issues of compute and network resources
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Other)[No abstract available] -
IEPSBP: A Cost-Efficient Image Encryption Algorithm Based on Parallel Chaotic System for Green IoT
( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)With the fast development of the Internet of Things (IoT) technologies, more IoT devices are currently connected with the Internet, resulting in more exchange of information. However, data privacy and security threats have ... -
Illustrate It! An Arabic Multimedia Text-to-Picture m-Learning System
( IEEE , 2017 , Article)Multimedia learning is the process of building mental representation from words associated with images. Due to the intuitiveness and vividness of visual illustration, many texts to picture systems have been proposed. ... -
Illustrations Generation Based On Arabic Ontology For Children With Intellectual Challenges
( Hamad bin Khalifa University Press (HBKU Press) , 2014 , Conference Paper)Digital devices and computer software have the prospect to help children with intellectual challenges (IC) in learning capabilities, profession growth, and self-consciousness living. However, most tools and existing software ... -
Image de-fencing framework with hybrid inpainting algorithm
( Springer London , 2016 , Article)Detection and removal of fences from digital images become essential when an important part of the scene turns to be occluded by such unwanted structures. Image de-fencing is challenging because manually marking fence ... -
Image deconvolution for enhancing IR images in order to detect defects in metallic plates
( IEEE , 2009 , Conference Paper)In this paper, infrared (IR) imaging technique is used in conjunction with image deconvolution algorithms in order to enhance detection capabilities of the NDT personnel in detecting defects such as cracks, voids, and ... -
Image Generation: A Review
( Springer , 2022 , Article Review)The creation of an image from another and from different types of data including text, scene graph, and object layout, is one of the very challenging tasks in computer vision. In addition, capturing images from different ... -
Image Inpainting: A Review
( Springer , 2019 , Article)Although image inpainting, or the art of repairing the old and deteriorated images, has been around for many years, it has recently gained even more popularity, because of the recent development in image processing techniques. ... -
Image Local Features Description through Polynomial Approximation
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)This work introduces a novel local patch descriptor that remains invariant under varying conditions of orientation, viewpoint, scale, and illumination. The proposed descriptor incorporate polynomials of various degrees to ... -
Image steganography based on LSBMR using Sobel edge detection
( IEEE , 2014 , Conference Paper)Steganography is the science of embedding confidential data inside data so they can be sent to destination without suspicion. Image-steganography is the most popular type of carrier to hold information. Many algorithms ... -
Image Steganography: A Review of the Recent Advances
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)Image Steganography is the process of hiding information which can be text, image or video inside a cover image. The secret information is hidden in a way that it not visible to the human eyes. Deep learning technology, ... -
Image stitching system with scanning microscopy for histopathological applications
( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)Histopathological analysis of biopsy or surgical specimen is a common clinical practice for diagnostic purposes. Essentially, the process involves slicing the biopsy or surgical sample into very thin slices, placing them ... -
Image-based body mass prediction of heifers using deep neural networks
( Academic Press , 2021 , Article)Manual weighing of heifers is time-consuming, labour-intensive, expensive, and can be dangerous and risky for both humans and animals because it requires the animal to be stationary. To overcome this problem, automated ...