Browsing Computer Science & Engineering by Title
Now showing items 1784-1803 of 2288
-
Reasoning about Policies in Security-Aware Service Discovery Using Answer Set Programming
( World Scientific Publishing Co. Pte Ltd , 2016 , Article)In order to enable a secure interaction between dynamically discovered software services and the client's application in a cooperative information system such as service oriented system, one of the pre-requisites is the ... -
Reasoning about security policies of services using answer set programming
( Institute of Electrical and Electronics Engineers Inc. , 2014 , Conference Paper)In this paper, we propose a formal framework for checking the consistency of security policies of services using Answer Set Programming (ASP). We illustrate that the formalisation of security policies of the service providers ... -
Recent advances in mobile touch screen security authentication methods: A systematic literature review
( Elsevier Ltd , 2019 , Article Review)The security of the smartphone touch screen has attracted considerable attention from academics as well as industry and security experts. The maximum security of the mobile phone touch screen is necessary to protect the ... -
Recent progress in generative adversarial networks applied to inversely designing inorganic materials: A brief review
( Elsevier B.V. , 2022 , Other)Generative adversarial networks (GANs) are deep generative models (GMs) that have recently attracted attention owing to their impressive performance in generating completely novel images, text, music, and speech. Recently, ... -
Recognition of off-line handwritten Arabic words using neural network
( IEEE , 2006 , Conference Paper)Neural network (NN) have been used with some success in recognizing printed Arabic words. In this paper, a complete scheme for unconstrained Arabic handwritten word recognition based on a Neural network is proposed and ... -
Recommender systems using harmonic analysis
( IEEE Computer Society , 2015 , Conference Paper)Recommender systems provide recommendations on variety of personal activities or relevant items of interest. They can play a significant role for E-commerce and in daily personal decisions. However, existing recommender ... -
Reconfigurable self-calibrated multi-sensing RFID-based platform
( Institute of Electrical and Electronics Engineers Inc. , 2017 , Conference Paper)This paper concerns an RFID tag platform using an integrated temperature sensor and external pressure sensor targeted for the Electronics Product Code (EPC) Gen-2 standard operating in the 902-928 MHz ISM band. The developed ... -
Reconfigurable swarm robots for structural health monitoring: a brief review
( Springer , 2017 , Article)Autonomous monitoring of infrastructure systems offers a promising alternative to manual inspection techniques which are mostly tedious, expensive and prone to error. Robot-based autonomous monitoring systems not only ... -
Region of Interest Optimization for Delay-sensitive Telemedicine Applications
( IEEE , 2022 , Conference Paper)Telemedicine is a rising technology that is gaining a lot of interest in the recent decades. Several applications of telemedicine are delay-sensitive and need to be operated in real-time. One of which is surgical tele-mentoring ... -
Regional failure survivability for cloud networking services using post fault restoration
(2013 , Conference Paper)Cloud computing services are being adopted to expand applications across dispersed data-center sites. As these new paradigms require active data exchange, they impose further virtual network (VN) mappings over operator ... -
Reinforcement learning approaches for efficient and secure blockchain-powered smart health systems
( Elsevier B.V. , 2021 , Article)Emerging technological innovation toward e-Health transition is a worldwide priority for ensuring people's quality of life. Hence, secure exchange and analysis of medical data amongst diverse organizations would increase ... -
A Reinforcement Learning Method for Joint Mode Selection and Power Adaptation in the V2V Communication Network in 5G
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)A 5G network is the key driving factor in the development of vehicle-to-vehicle (V2V) communication technology, and V2V communication in 5G has recently attracted great interest. In the V2V communication network, users can ... -
Reinforcement Learning Power Control Algorithm Based on Graph Signal Processing for Ultra-Dense Mobile Networks
( IEEE Computer Society , 2021 , Article)Ultra-dense mobile networks (UDMNs) represent a promising technology for improving the network performance and providing the ubiquitous network accessibility in the beyond 5 G (B5G) mobile networks. Heterogenous densely ... -
Relay selection schemes to minimise outage in wireless powered communication networks
( Institution of Engineering and Technology , 2016 , Article)In this study, the authors discuss relay selection schemes with the objective to minimise outage probability for a network consisting of a single source, multiple relays and a single destination. The relays are powered by ... -
Release-time aware VM placement
( IEEE , 2014 , Conference Paper)Consolidating virtual machines (VMs) on as few physical machines (PMs) as possible so as to turn into sleep as many PMs as possible can make significant energy savings in cloud centers. Although traditional online bin ... -
Relevance of lifecycle management to smart city development
( Inderscience Publishers , 2018 , Article)Smart cities are complex ecosystems with interrelated systems or system of systems. Hence, management of smart cities is very important due to the big number of stakeholders, diversity of application domains, heterogeneity ... -
Reliability-aware service provisioning in NFV-enabled enterprise datacenter networks
( Institute of Electrical and Electronics Engineers Inc. , 2017 , Conference Paper)Network Function Visualization (NFV) enables the complete decoupling of Network Functions (NFs) (e.g., firewall, intrusion detection, routing, etc.) from physical middleboxes used to implement service-specific and strictly ... -
Reliable Federated Learning for Mobile Networks
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)Federated learning, as a promising machine learning approach, has emerged to leverage a distributed personalized dataset from a number of nodes, for example, mobile devices, to improve performance while simultaneously ... -
Reliable Task Offloading for Vehicular Fog Computing under Information Asymmetry and Information Uncertainty
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)Vehicular fog computing has emerged as a cost-efficient solution for task processing in vehicular networks. However, how to realize effective server recruitment and reliable task offloading under information asymmetry and ... -
Reliable Video Forensics Evidence Cataloguing using Video Source device Identification on the Blockchain
( Institute of Electrical and Electronics Engineers Inc. , 2022 , Conference Paper)Videos and images are plentiful, shared, modified, and retrieved through different sources. They are used for the purposes of data collection and evidence gathering, as well as entertainment. The widespread use and misuse ...