Browsing Computer Science & Engineering by Title
Now showing items 1965-1984 of 2211
-
Sustainability performance measurement framework for supply chain management
( Inderscience Publishers , 2015 , Article)Sustainability of supply chains has been recognised as a competitive indicator for business. The most widely used framework for implementing sustainability practices is the triple bottom line (TBL). However, the TBL is a ... -
Swinging with the Jet Set: Analysis of Electromagnetic Fields Inside Jet Engines - From Numerical and Experimental Analysis to Statistical Analysis
( Institute of Electrical and Electronics Engineers Inc. , 2016 , Article)Analyzing electromagnetic propagation inside jet engine turbines is a challenging and important research topic due to its potential applications in both civil and military fields. Electromagnetic modeling of such complex ... -
SWIPT-Enabled D2D Communication Underlaying NOMA-Based Cellular Networks in Imperfect CSI
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)Device-to-Device (D2D) communication is an emerging paradigm which enhances the coverage, capacity, and spectral efficiency of the network using cooperative communication in an underlay of cellular networks. In spite of ... -
Symmetric encryption relying on chaotic henon system for secure hardware-friendly wireless communication of implantable medical systems
( MDPI AG , 2018 , Article)Healthcare remote devices are recognized as a promising technology for treating health related issues. Among them are the wireless Implantable Medical Devices (IMDs): These electronic devices are manufactured to treat, ... -
System log detection model based on conformal prediction
( MDPI AG , 2020 , Article)With the rapid development of the Internet of Things, the combination of the Internet of Things with machine learning, Hadoop and other fields are current development trends. Hadoop Distributed File System (HDFS) is one ... -
System-on-chip solution for patients biometric: A compressive sensing-based approach
( Institute of Electrical and Electronics EngineersInc. , 2018 , Article)The ever-increasing demand for biometric solutions for the Internet-of-Things (IoT)-based connected health applications is mainly driven by the need to tackle fraud issues, along with the imperative to improve patient ... -
Systematic identification of threats in the cloud: A Survey
( Elsevier B.V. , 2019 , Article)When a vulnerability is discovered in a system, some key questions often asked by the security analyst are what threat(s) does it pose, what attacks may exploit it, and which parts of the system it affects. Answers to those ... -
Systematic reviews in sentiment analysis: a tertiary study
( Springer Science and Business Media B.V. , 2021 , Article)With advanced digitalisation, we can observe a massive increase of user-generated content on the web that provides opinions of people on different subjects. Sentiment analysis is the computational study of analysing people's ... -
Systolic architecture for hardware implementation of two-dimensional non-separable filter-bank
( IEEE , 2013 , Conference Paper)In this paper, we present an efficient poly-phase decomposition scheme for implementation of 2-D non-separable filter bank. Poly-phase decomposition scheme offers multiplexing of filter bank computations or/and reduce the ... -
Tag-based personalized recommendation in social media services
( Springer New York LLC , 2016 , Article)Users of ambient intelligence environments have been overwhelmed by the huge numbers of social media available, thus identifying the social media tailored to the user?s need is becoming an important question to be discussed. ... -
Tahaqqaq: A Real-Time System for Assisting Twitter Users in Arabic Claim Verification
( Association for Computing Machinery, Inc , 2023 , Conference Paper)Over the past years, notable progress has been made towards fighting misinformation spread over social media, encouraging the development of many fact-checking systems. However, systems that operate over Arabic content are ... -
Taking advantage of multi-user diversity in OFDM systems
(2013 , Conference Paper)A multi-user diversity approach, called Opportunistic Interference Management (OIM), is considered in connection with Orthogonal Frequency Division Multiplexing (OFDM) systems. The OIM is applied to each consecutive group ... -
TamForen: A tamper-proof cloud forensic framework
( John Wiley and Sons Inc , 2022 , Article)Cloud forensics has become increasingly critical in cloud computing security in recent years. A fundamental problem in cloud forensics is how to safely and effectively obtain, preserve, and analyze evidence. With massive ... -
Tamp-X: Attacking explainable natural language classifiers through tampered activations
( Elsevier , 2022 , Article)While the technique of Deep Neural Networks (DNNs) has been instrumental in achieving state-of-the-art results for various Natural Language Processing (NLP) tasks, recent works have shown that the decisions made by DNNs ... -
TangleCV: Decentralized Technique for Secure Message Sharing in Connected Vehicles
( Association for Computing Machinery, Inc , 2019 , Conference Paper)Connected vehicles are designed to make informed safety-related decisions based on data/information they receive from various on-board sensors and other vehicles in the vicinity. However, attacks directed towards on-board ... -
Teaching design project in introductory engineering course using 3D modeling and immersive virtual reality
( Springer Verlag , 2018 , Conference Paper)This paper presents a new approach for delivering the project component in introductory engineering course. The approach is based on using 3D modeling software to create the prototype of the product. Furthermore, immersive ... -
Techniques for calculating software product metrics threshold values: A systematic mapping study
( MDPI , 2021 , Article)Several aspects of software product quality can be assessed and measured using product metrics. Without software metric threshold values, it is difficult to evaluate different aspects of quality. To this end, the interest ... -
Tele-wobble: A telerehabilitation wobble board for lower extremity therapy
( IEEE , 2012 , Article)Ankle deficiencies occur quite often among poststroke patients and people working in physically demanding professions in general. Computerized telerehabilitation systems have emerged as promising assistive tools for effective ... -
A Testbed for Implementing Lightweight Physical Layer Security in an IoT-based Health Monitoring System
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)Telemedicine is a technique that allows patients to have health-related consultations without the need to be physically present in the hospital through phone and video calling technologies. In recent years, researchers ... -
Text categorization using weighted hyper rectangular keyword extraction
( IEEE Computer Society , 2018 , Conference Paper)Text categorization is an important research field that finds many applications nowadays. It is usually performed in two steps: feature extraction and classification. In the feature extraction step, discriminating keywords ...