تصفح Computer Science & Engineering حسب العنوان
السجلات المعروضة 2009 -- 2028 من 2211
-
The role of EEG and EMG combined virtual reality gaming system in facial palsy rehabilitation - A case report
( Churchill Livingstone , 2019 , Article)Background The recovery rates for facial palsy are usually excellent; however, regularly patients present with problems with their fine facial movements that affect their emotional expressions. Objective To discover the ... -
The Role of Micro-Moments: A Survey of Habitual Behavior Change and Recommender Systems for Energy Saving
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)Among the large number of efforts that study the role of technology in energy saving, there exists, first, frameworks for monitoring and controlling energy consumption in households, second, systems that suggest best ... -
The similarity-aware relational intersect database operator
( Springer International Publishing , 2014 , Conference Paper)Identifying similarities in large datasets is an essential operation in many applications such as bioinformatics, pattern recognition, and data integration. To make the underlying database system similarity-aware, the core ... -
The using of bibliometric analysis to classify trends and future directions on 'smart farm'
( Institute of Electrical and Electronics Engineers Inc. , 2017 , Conference Paper)Climate change has affected the cultivation in all countries with extreme drought, flooding, higher temperature, and changes in the season thus leaving behind the uncontrolled production. Consequently, the smart farm has ... -
Third Harmonic Operation of Current Fed Resonant Inverters for Inductive Power Transfer Systems
( IEEE Computer Society , 2020 , Conference Paper)This paper presents Third Harmonic Operation (THO) of Current Fed Parallel Resonant Push-pull Inverter (CFPRPI) for Inductive Power Transfer (IPT) systems. THO is proposed for CFPRPI to achieve higher voltage ratio with ... -
This is not new! Spotting previously-verified claims over Twitter
( Elsevier , 2023 , Article)Several fake claims are commonly repeated over time, especially on social media. To identify such previous claims, the verified claim retrieval task was studied, where, for a given input claim, the goal is to find ... -
Threat-specific security risk evaluation in the cloud
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)Existing security risk evaluation approaches (e.g., asset-based) do not consider specific security requirements of individual cloud computing clients in the security risk evaluation. In this paper, we propose a threat-specific ... -
ThreatBased Security Risk Evaluation in the Cloud
( Hamad bin Khalifa University Press (HBKU Press) , 2018 , Conference Paper)Research ProblemCyber attacks are targeting the cloud computing systems, where enterprises, governments, and individuals are outsourcing their storage and computational resources for improved scalability and dynamic ... -
Three Dimensional Denoising Filter for Effective Source Smartphone Video Identification and Verification
( Association for Computing Machinery , 2022 , Conference Paper)The field of digital image and video forensics has recently seen significant advances and has attracted attention from a growing number of researchers given the availability of imaging functionalities in most current ... -
Throughput, latency and cost comparisons of microcontroller-based implementations of wireless sensor network (WSN) in high jump sports
( American Institute of Physics Inc. , 2017 , Conference Paper)In high jump sports, approach take-off speed and force during the take-off are two (2) main important parts to gain maximum jump. To measure both parameters, wireless sensor network (WSN) that contains microcontroller and ... -
TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)Machine learning techniques are becoming mainstream in intrusion detection systems as they allow real-time response and have the ability to learn and adapt. By using a comprehensive dataset with multiple attack types, a ... -
Time-critical geolocation for social good
( Springer , 2020 , Conference Paper)Twitter has become an instrumental source of news in emergencies where efficient access, dissemination of information, and immediate reactions are critical. Nevertheless, due to several challenges, the current fully-automated ... -
Time-Dependent Pricing for Bandwidth Slicing under Information Asymmetry and Price Discrimination
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)Due to the bursty nature of Internet traffic, network service providers (NSPs) are forced to expand their network capacity in order to meet the ever-increasing peak-time traffic demand, which is however costly and inefficient. ... -
Time-frequency based signal restoration for laser-ultrasound signals with applications in nondestructive testing
( IEEE , 2011 , Conference Paper)In this paper, an inspection system has been presented that uses Laser-Ultrasound (LU) technique for Nondestructive testing (NDT) of metallic structures with specific interest in Oil & Gas sector. While the developed ... -
Time-frequency image descriptors-based features for EEG epileptic seizure activities detection and classification
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)This paper presents new class of time-frequency (T-F) features for automatic detection and classification of epileptic seizure activities in EEG signals. Most previous methods were based only on signal features derived ... -
Time-series forecasting of Bitcoin prices using high-dimensional features: a machine learning approach
( Springer , 2020 , Article)© 2020, Springer-Verlag London Ltd., part of Springer Nature. Bitcoin is a decentralized cryptocurrency, which is a type of digital asset that provides the basis for peer-to-peer financial transactions based on blockchain ... -
To chain or not to chain: A reinforcement learning approach for blockchain-enabled IoT monitoring applications
( Elsevier B.V. , 2020 , Article)Traceability and autonomous business logic execution are highly desirable features in IoT monitoring applications. Traceability enables verifying signals history for security or analytical purposes. On the other hand, the ... -
A Topic Representation Model for Online Social Networks Based on Hybrid Human-Artificial Intelligence
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)With the widespread use of online social networks, billions of pieces of information are generated every day. How to detect new topics quickly and accurately at such data scale plays a vital role in information recommendation ... -
TOSSIM and distributed binary consensus algorithm in wireless sensor networks
( Academic Press , 2014 , Article Review)In this paper, we present distributed binary consensus algorithm over the wireless sensor networks (WSN) in the presence of faulty nodes. We assume that each fault occurs during the execution of an algorithm on a sensor ... -
Total Variation for Image Denoising Based on a Novel Smart Edge Detector: An Application to Medical Images
( Springer New York LLC , 2019 , Article)In medical imaging applications, diagnosis relies essentially on good quality images. Edges play a crucial role in identifying features useful to reach accurate conclusions. However, noise can compromise this task as it ...