تصفح Computer Science & Engineering حسب العنوان
السجلات المعروضة 1479 -- 1498 من 2211
-
NOMA-based Joint Allocation and Offloading Strategy of Communication and Computing Resources
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)This paper proposes an offloading strategy for communication resources and computing resources. Based on the communication background of NOMA, this strategy combines D2D communication and cellular mobile communication to ... -
Non-data-aided SNR estimation for QPSK modulation in AWGN channel
( IEEE Computer Society , 2014 , Conference Paper)Signal-to-noise ratio (SNR) estimation is an important parameter that is required in any receiver or communication systems. It can be computed either by a pilot signal data-aided approach in which the transmitted signal ... -
Non-linear simulation of controller for longitudinal control augmentation system of F-16 using numerical approach
( Elsevier Inc , 2003 , Article)The non-linear simulation of controller for automatic flight control system is an essential part of the complete control design process. After using the linear approach in the design and simulation of the controller (control ... -
Nonlinear Dynamics Tools for Offline Signature Verification Using One-class Gaussian Process
( World Scientific Publishing Co. Pte Ltd , 2019 , Article)One of the major problems in biometrics and in document forensics is the offline mode of signature verification. This study aims to present a novel approach of verifying an individual's signature through offline images of ... -
Nonlocal strain gradient effects on forced vibrations of porous FG cylindrical nanoshells
( Techno-Press , 2020 , Article)The present paper explores forced vibrational properties of porosity-dependent functionally graded (FG) cylindrical nanoshells exposed to linear-type or triangular-type impulse load via classical shell theory (CST) and ... -
Notice of Retraction: Electromagnetic Radiation Due to Cellular, Wi-Fi and Bluetooth Technologies: How Safe Are We?
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Other)The electromagnetic radiation (EMR) emitted out of wireless communication modules in various IoT devices (especially used for healthcare applications due to their close proximity to the body) have been identified by ... -
A novel chaos-based physical layer security transmission scheme for internet of things
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)The Internet of Things (IoT) has attracted much attention in many fields, such as healthcare, transportation, finance and other critical infrastructures. But how to ensure the security of whole IoT system and the privacy ... -
A Novel Class Noise Detection Method for High-Dimensional Data in Industrial Informatics
(2021 , Article)The data in industrial informatics may be high-dimensional and mislabeled. Irrelevant or noisy features pose a significant challenge to the detection of high-dimensional mislabeling. The traditional method usually adopts ... -
A novel deep learning technique for morphology preserved fetal ECG extraction from mother ECG using 1D-CycleGAN
( Elsevier , 2024 , Article)The non-invasive fetal electrocardiogram (fECG) enables easy detection of developing heart abnormalities, leading to a significant reduction in infant mortality rate and post-natal complications. Due to the overlapping of ... -
Novel geometric features for off-line writer identification
( Springer Verlag , 2014 , Article)Writer identification is an important field in forensic document examination. Typically, a writer identification system consists of two main steps: feature extraction and matching and the performance depends significantly ... -
Novel hybrid physical layer security technique in RFID systems
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)In this paper, we propose a novel PHY layer security technique in radio frequency identification (RFID) backscatter communications system. In order to protect the RFID tag information confidentiality from the eavesdroppers ... -
A novel pandemic tracking map: From theory to implementation
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)The wide spread of the novel COVID-19 virus all over the world has caused major economical and social damages combined with the death of more than two million people so far around the globe. Therefore, the design of a model ... -
Novel Task Allocation Method for Emergency Events under Delay-Cost Tradeoff
( IEEE , 2022 , Conference Paper)With the emergence of three new paradigms, namely the Internet of Things (IoT), cloud/edge computing and mobile social networks; Mobile Crowd Sensing (MCS) has emerged as a potential approach for data collecting in numerous ... -
Novel Ternary Adder and Multiplier Designs without Using Decoders or Encoders
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)Multiple-Valued Logic systems present significant improvements in terms of energy consumption over binary logic systems. This paper proposes new ternary combinational digital circuits that reduce energy consumption in ... -
Nutshell - Simulation Toolkit for Modeling Data Center Networks and Cloud Computing
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)Cloud computing provides flexibility, reliability, and scalability to its consumers. Applications that run on Cloud are now more resource hungry than ever, and the need is constantly growing. The number of Cloud applications ... -
Obstacles and features of health information systems: A systematic literature review
( Elsevier , 2021 , Article Review)Background: Currently many healthcare systems are supported by an increasing set of Health Information Sys-tems (HISs), which assist the activities for multiple stakeholders. The literature on HISs is, however, fragmented ... -
Off-line Persian Signature Verification using Wavelet-based Fractal Dimension and One-class Gaussian Process
( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)This paper presents a novel individual verification approach through off-line handwriting signatures. In our proposed technique, images are decomposed into an series of wavelet sub-bands at some specific levels. In order ... -
Off-line writer identification using an ensemble of grapheme codebook features
( Elsevier , 2015 , Article)Off-line writer identification is the process of matching a handwritten sample with its author. Manual identification is very time-consuming because it requires a meticulous comparison of character shape details. Consequently ... -
Off-line writer identification using multi-scale local binary patterns and SR-KDA
( IEEE , 2013 , Conference Paper)Writer identification is becoming an increasingly important research topic especially in forensic and biometric applications. This paper presents a novel method for performing offline write identification by using multi-scale ... -
Offloading Time Optimization via Markov Decision Process in Mobile-Edge Computing
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)Computation offloading from a mobile device to the edge server is an emerging paradigm to reduce completion latency of intensive computations in mobile-edge computing (MEC). In order to satisfy the delay-sensitive computing ...