Browsing Computer Science & Engineering by Title
Now showing items 2005-2024 of 2211
-
The multimedia-based learning system improved cognitive skills and motivation of disabled children with a very high rate
( International Forum of Educational Technology,National Taiwan Normal Universityand Society, , 2015 , Article)A multimedia-based learning system to teach children with intellectual disabilities (ID) the basic living and science concepts is proposed. The tutorials' development is pedagogically based on Mayer's Cognitive Theory of ... -
The need for a global response against cybercrime: Qatar as a case study
( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)Cybersecurity is one of the most significant concerns of life in the 21st century and safeguarding information systems is an arduous task for governments and companies across the globe. The tremendous growth in wireless ... -
The P-ART framework for placement of virtual network services in a multi-cloud environment
( Elsevier B.V. , 2019 , Article)Carriers network services are distributed, dynamic, and investment intensive. Deploying them as virtual network services (VNS) brings the promise of low-cost agile deployments, which reduce time to market new services. If ... -
The research on detection of crop diseases ranking based on transfer learning
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)Crop diseases are a major global threat to food security. Because the lack of agriculture experts or necessary facilities, it is difficult to determine the type of disease, as well as the degree of disease in time, which ... -
The role of EEG and EMG combined virtual reality gaming system in facial palsy rehabilitation - A case report
( Churchill Livingstone , 2019 , Article)Background The recovery rates for facial palsy are usually excellent; however, regularly patients present with problems with their fine facial movements that affect their emotional expressions. Objective To discover the ... -
The Role of Micro-Moments: A Survey of Habitual Behavior Change and Recommender Systems for Energy Saving
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)Among the large number of efforts that study the role of technology in energy saving, there exists, first, frameworks for monitoring and controlling energy consumption in households, second, systems that suggest best ... -
The similarity-aware relational intersect database operator
( Springer International Publishing , 2014 , Conference Paper)Identifying similarities in large datasets is an essential operation in many applications such as bioinformatics, pattern recognition, and data integration. To make the underlying database system similarity-aware, the core ... -
The using of bibliometric analysis to classify trends and future directions on 'smart farm'
( Institute of Electrical and Electronics Engineers Inc. , 2017 , Conference Paper)Climate change has affected the cultivation in all countries with extreme drought, flooding, higher temperature, and changes in the season thus leaving behind the uncontrolled production. Consequently, the smart farm has ... -
Third Harmonic Operation of Current Fed Resonant Inverters for Inductive Power Transfer Systems
( IEEE Computer Society , 2020 , Conference Paper)This paper presents Third Harmonic Operation (THO) of Current Fed Parallel Resonant Push-pull Inverter (CFPRPI) for Inductive Power Transfer (IPT) systems. THO is proposed for CFPRPI to achieve higher voltage ratio with ... -
This is not new! Spotting previously-verified claims over Twitter
( Elsevier , 2023 , Article)Several fake claims are commonly repeated over time, especially on social media. To identify such previous claims, the verified claim retrieval task was studied, where, for a given input claim, the goal is to find ... -
Threat-specific security risk evaluation in the cloud
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)Existing security risk evaluation approaches (e.g., asset-based) do not consider specific security requirements of individual cloud computing clients in the security risk evaluation. In this paper, we propose a threat-specific ... -
ThreatBased Security Risk Evaluation in the Cloud
( Hamad bin Khalifa University Press (HBKU Press) , 2018 , Conference Paper)Research ProblemCyber attacks are targeting the cloud computing systems, where enterprises, governments, and individuals are outsourcing their storage and computational resources for improved scalability and dynamic ... -
Three Dimensional Denoising Filter for Effective Source Smartphone Video Identification and Verification
( Association for Computing Machinery , 2022 , Conference Paper)The field of digital image and video forensics has recently seen significant advances and has attracted attention from a growing number of researchers given the availability of imaging functionalities in most current ... -
Throughput, latency and cost comparisons of microcontroller-based implementations of wireless sensor network (WSN) in high jump sports
( American Institute of Physics Inc. , 2017 , Conference Paper)In high jump sports, approach take-off speed and force during the take-off are two (2) main important parts to gain maximum jump. To measure both parameters, wireless sensor network (WSN) that contains microcontroller and ... -
TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)Machine learning techniques are becoming mainstream in intrusion detection systems as they allow real-time response and have the ability to learn and adapt. By using a comprehensive dataset with multiple attack types, a ... -
Time-critical geolocation for social good
( Springer , 2020 , Conference Paper)Twitter has become an instrumental source of news in emergencies where efficient access, dissemination of information, and immediate reactions are critical. Nevertheless, due to several challenges, the current fully-automated ... -
Time-Dependent Pricing for Bandwidth Slicing under Information Asymmetry and Price Discrimination
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)Due to the bursty nature of Internet traffic, network service providers (NSPs) are forced to expand their network capacity in order to meet the ever-increasing peak-time traffic demand, which is however costly and inefficient. ... -
Time-frequency based signal restoration for laser-ultrasound signals with applications in nondestructive testing
( IEEE , 2011 , Conference Paper)In this paper, an inspection system has been presented that uses Laser-Ultrasound (LU) technique for Nondestructive testing (NDT) of metallic structures with specific interest in Oil & Gas sector. While the developed ... -
Time-frequency image descriptors-based features for EEG epileptic seizure activities detection and classification
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)This paper presents new class of time-frequency (T-F) features for automatic detection and classification of epileptic seizure activities in EEG signals. Most previous methods were based only on signal features derived ... -
Time-series forecasting of Bitcoin prices using high-dimensional features: a machine learning approach
( Springer , 2020 , Article)© 2020, Springer-Verlag London Ltd., part of Springer Nature. Bitcoin is a decentralized cryptocurrency, which is a type of digital asset that provides the basis for peer-to-peer financial transactions based on blockchain ...