Now showing items 1157-1176 of 2213

    • Image deconvolution for enhancing IR images in order to detect defects in metallic plates 

      Qidwai, Uvais; Maqbool, Mohammed ( IEEE , 2009 , Conference Paper)
      In this paper, infrared (IR) imaging technique is used in conjunction with image deconvolution algorithms in order to enhance detection capabilities of the NDT personnel in detecting defects such as cracks, voids, and ...
    • Image Generation: A Review 

      Elasri, Mohamed; Elharrouss, Omar; Al-Maadeed, Somaya; Tairi, Hamid ( Springer , 2022 , Article Review)
      The creation of an image from another and from different types of data including text, scene graph, and object layout, is one of the very challenging tasks in computer vision. In addition, capturing images from different ...
    • Image Inpainting: A Review 

      Elharrouss, Omar; Almaadeed, Noor; Al-Maadeed, Somaya; Akbari, Younes ( Springer , 2019 , Article)
      Although image inpainting, or the art of repairing the old and deteriorated images, has been around for many years, it has recently gained even more popularity, because of the recent development in image processing techniques. ...
    • Image Local Features Description through Polynomial Approximation 

      Fawad; Rahman, Muhibur; Khan, Muhammad Jamil; Asghar, Muhammad Adeel; Amin, Yasar; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)
      This work introduces a novel local patch descriptor that remains invariant under varying conditions of orientation, viewpoint, scale, and illumination. The proposed descriptor incorporate polynomials of various degrees to ...
    • Image steganography based on LSBMR using Sobel edge detection 

      Fouroozesh, Zohreh; Al ja'am, Jihad ( IEEE , 2014 , Conference Paper)
      Steganography is the science of embedding confidential data inside data so they can be sent to destination without suspicion. Image-steganography is the most popular type of carrier to hold information. Many algorithms ...
    • Image Steganography: A Review of the Recent Advances 

      Subramanian N.; Elharrouss O.; Al-Maadeed, Somaya; Bouridane A. ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)
      Image Steganography is the process of hiding information which can be text, image or video inside a cover image. The secret information is hidden in a way that it not visible to the human eyes. Deep learning technology, ...
    • Image stitching system with scanning microscopy for histopathological applications 

      Qidwai, Uvais; Akbar, Muhammad Ali ( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)
      Histopathological analysis of biopsy or surgical specimen is a common clinical practice for diagnostic purposes. Essentially, the process involves slicing the biopsy or surgical sample into very thin slices, placing them ...
    • Image-based body mass prediction of heifers using deep neural networks 

      Dohmen, Roel; Catal, Cagatay; Liu, Qingzhi ( Academic Press , 2021 , Article)
      Manual weighing of heifers is time-consuming, labour-intensive, expensive, and can be dangerous and risky for both humans and animals because it requires the animal to be stationary. To overcome this problem, automated ...
    • iMIGS: An innovative AI based prediction system for selecting the best patient-specific glaucoma treatment 

      Qidwai, Uvais; Qidwai, Umair; Sivapalan, Thurka; Ratnarajan, Gokulan ( Elsevier , 2023 , Article)
      The use of AI-based techniques in healthcare are becoming more and more common and more disease-specific. Glaucoma is a disorder in eye that causes damage to the optic nerve which can lead to permanent blindness. It is ...
    • Immersive virtual reality in improving communication skills in children with Autism 

      Halabi, O.; Elseoud, S.A.; Alja'am, J.M.; Alpona, H.; Al-Hemadi, M.; ... more authors ( International Association of Online Engineering , 2017 , Article)
      Individuals in the Autism Spectrum often encounter situations where they have to respond to questions and situations that they do not know how to respond to, such as, questions asked by strangers including ones related to ...
    • Immersive virtual reality to enforce teaching in engineering education 

      Halabi, Osama ( Springer , 2019 , Article)
      Prior studies on the use of digital prototyping and virtual reality (VR) in designing as well as evaluating new products have shown that VR reduces both development time and costs whilst augmenting student motivation and ...
    • Impact of channel estimation error on bidirectional MABC-AF relaying with asymmetric traffic requirements 

      Li, Jing; Ge, Jianhua; Zhang, Chensi; Shi, Jingjing; Rui, Yun; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2013 , Article)
      Channel estimation error results in severe performance deterioration in wireless networks. In this paper, we study the impact of imperfect channel estimation (ICE) on the outage performance of bidirectional relaying where ...
    • Impact of execution time on adaptive wireless video scheduling 

      Zhou, Liang; Yang, Zhen; Wang, Haohong; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2014 , Article)
      Adaptive wireless video scheduling has been widely studied to improve network performance. However, the majority of existing scheduling algorithms assume that they are able to converge instantaneously to adapt to a dynamic ...
    • Impact of location heterogeneity on random walk mobility models 

      Zhang, Jinbei; Luoyi Fu; Wang, Xinbing; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2013 , Conference Paper)
      This paper investigates random walk mobility models with location heterogeneity, where different locations may have different neighboring regions.With the assumption of totally n locations, we consider two cases, i.e., ...
    • Impact of MD5 authentication on routing traffic for the case of: EIGRP, RIPv2 and OSPF 

      Al-Saud, K. A.; Tahir, H. M.; Saleh, Moutaz; Saleh, Mohammed ( Science Publications , 2008 , Article)
      Problem Statement: With the free flow of routing data and the high availability of computer resources, possible threats to the networks can result in loss of privacy and in malicious use of information or resources that ...
    • Impact of multiple video representations in live streaming: A cost, bandwidth, and QoE analysis 

      Bila, Kashif; Erbad, Aiman ( Institute of Electrical and Electronics Engineers Inc. , 2017 , Conference Paper)
      Video streaming is one of the most popular and highest bandwidth consumers within the Internet today. Cloud's elastic and pay-per-use model offers viable solution to varying demands of heterogeneous viewers for large-scale ...
    • Impact of time synchronization error on the mode-shape calculation in wireless sensor networks for structural health monitoring 

      Abdaoui, Abderrazak; Ahmed, Mohamed H.; El Fouly, Tarek M. ( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)
      For structural health monitoring (SHM), mode shape calculation is an important task that needs to be performed accurately and reliably. The use of wireless sensor networks (WSNs) for SHM is a very effective and a promising ...
    • Impact of time synchronization error on the mode-shape identification and damage detection/localization in WSNs for structural health monitoring 

      Abdaoui, Abderrazak; El Fouly, Tarek M.; Ahmed, Mohamed H. ( Academic Press , 2017 , Article)
      Time synchronization in wireless sensor networks (WSNs) is a critical challenge for any distributed system such as WSNs for structural health monitoring (SHM). In SHM, mode shape identification, damage detection and damage ...
    • Implementation and Analysis of Reward Functions under Different Traffic Models for Distributed DSA Systems 

      Hamdi, R.; Ben Ghorbel, M.; Hamdaoui, B.; Guizani, Mohsen; Khalfi, B. ( IEEE , 2015 , Article)
      In this paper, we implement and analyze a resource allocation protocol for distributed dynamic spectrum allocation (DSA) systems. The DSA protocol is a learning-based protocol that allows secondary users (SU) to exploit ...
    • Implementation and benchmarking of a novel routing protocol for tactical mobile ad-hoc networks 

      Ben Arbia, Dhafer; Alam, Muhammad Mahtab; Kadri, Abdullah; Attia, Rabah; Ben Hamida, Elyes ( IEEE Computer Society , 2016 , Conference Paper)
      Providing efficient routing service over tactical multi-hop ad-hoc networks is a crucial building block in wireless communication networks especially during a disaster relief. To date, there is still a lack of routing ...