Browsing Computer Science & Engineering by Title
Now showing items 2194-2213 of 2280
-
Using conceptual reasoning for inconsistencies detection in islamic advisory opinion (Fatwas)
( IEEE Computer Society , 2016 , Conference Paper)The Islamic websites play an important role in disseminating Islamic knowledge and information about Islamic ruling. Their number and the content they provide is continuously increasing which require in-depth investigations ... -
Using Context Specific Generative Adversarial Networks for Audio Data Completion
( IEEE Explore , 2023 , Conference Paper)Audio quality plays an essential role in several applications ranging from music to voice conversations. Sound information is subject to quality loss caused by reasons such as intermittent network connections, or storage ... -
Using Deep Learning to Predict Stock Movements Direction in Emerging Markets: The Case of Qatar Stock Exchange
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)Deep learning approaches have been utilized to predict stocks. In this study, we use convolutional neural network (CNN) to predict stocks direction in Qatar stock exchange (QE) as a case of emerging markets. Prediction in ... -
Using e-journaling to improve self-regulated learning in introductory computer programming course
( IEEE , 2014 , Conference Paper)Usually, students face different difficulties when learning computer programming, this leads many of them to drop out of computing major, or continue with fear of programming assignments in subsequent courses. The main ... -
Using Financial Options for Pricing of IaaS Cloud Resources
( IEEE Computer Society , 2017 , Conference Paper)IaaS cloud resources are offered by cloud providers using various pricing schemes such as reservation, scheduled, on-demand and spot pricing. Such pricing models suffer from either wasteful payment in case of underutilization ... -
Using flipped classroom approach to teach computer programming
( IEEE , 2016 , Conference Paper)Flipped classroom approach has been increasingly adopted in higher institutions. Although this approach has many advantages, there are also many challenges that should be considered. In this paper, we discuss the suitability ... -
Using fringes for minimal conceptual decomposition of binary contexts
( World Scientific Publishing Co. Pte Ltd , 2012 , Article)Extracting knowledge from huge data in a reasonable time is still a challenging problem. Most real data (structured or not) can be mapped to an equivalent binary context, with or without using a scaling method, as for ... -
Using geodesic space density gradients for network community detection
( IEEE Computer Society , 2017 , Article)Many real world complex systems naturally map to network data structures instead of geometric spaces because the only available information is the presence or absence of a link between two entities in the system. To enable ... -
Using IPSec to Secure Multi-Level Data Classification in MLS Networks
( IEEE , 2006 , Conference Paper)In this paper we present a method of using IPsec to secure multi-level data classification in the MLS networks by using the data sensitivity. We will show how IPsec can be modified to be used in securing communication in ... -
Using learning analytics to measure self-regulated learning: A systematic review of empirical studies in higher education
( John Wiley and Sons Inc , 2024 , Article Review)Background: Measuring students' self-regulation skills is essential to understand how they approach their learning tasks in order to identify areas where they might need additional support. Traditionally, self-report ... -
Using machine learning to analyze the impact of coronavirus pandemic news on the stock markets in GCC countries
( Elsevier , 2022 , Article)COVID-19 has resulted in high volatility in financial markets across the world. The goal of this study is to investigate the impact of COVID-19-related news on the stock markets in Gulf Cooperation Council (GCC) countries. ... -
Using Mandatory Concepts for Knowledge Discovery and Data Structuring
( Springer , 2019 , Conference Paper)A data scientist could apply several machine learning approaches in order to discover valuable knowledge from the data. While applying several techniques, he might discover that some pieces of knowledge are invariant, what ... -
Using minimal generators for composite isolated point extraction and conceptual binary relation coverage: Application for extracting relevant textual features
( Elsevier , 2016 , Article)In recent years, several mathematical concepts have been successfully explored in the computer science domain as a basis for finding original solutions for complex problems related to knowledge engineering, data mining, ... -
Using safety constraint for transactional dataset anonymization
( Springer , 2013 , Conference Paper)In this paper, we address privacy breaches in transactional data where individuals have multiple tuples in a dataset. We provide a safe grouping principle to ensure that correlated values are grouped together in unique ... -
Using Sparse Matrices to Prevent Information Leakage in Cloud Computing
( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)Cloud computing represents the promise of outsourcing of scientific computing such as matrix multiplication. However, this can introduce new vulnerabilities such as information leakage. Cloud server intentionally or ... -
Using spectral imaging for the analysis of abnormalities for colorectal cancer: When is it helpful?
( Public Library of Science , 2018 , Article)© 2018 Awan et al. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original ... -
Using thermochromism to simulate blood oxygenation in extracorporeal membrane oxygenation
( SAGE Publications Ltd , 2019 , Article)Introduction: Extracorporeal membrane oxygenation (ECMO) training programs employ real ECMO components, causing them to be extremely expensive while offering little realism in terms of blood oxygenation and pressure. To ... -
Using virtual reality to allow paramedics to familiarise themselves with a new ambulance patient compartment design
( Hamad bin Khalifa University Press (HBKU Press) , 2021 , Article)Background: Virtual reality (VR) is still an evolving domain that presents a versatile medium to simulate various environments and scenarios that can be easily reset between users, which can be particularly useful for ... -
Utility-based efficient dynamic distributed resource allocation in buffer-aided relay-assisted OFDMA networks
( Springer International Publishing , 2015 , Article)In this paper, we study resource allocation in buffer-aided relay-assisted OFDMA networks. We consider utility-based stochastic optimization framework where there are constraints to be met either instantaneously or in ... -
Utility-based uplink scheduling algorithm for enhancing throughput and fairness in relayed LTE networks
( IEEE , 2010 , Conference Paper)Relaying is one of the key techniques considered by the 3GPP LTE-Advanced as part of 4G cellular technologies, aiming to increase the coverage and capacity of the network especially for the edge nodes. In this work, we ...