Browsing Computer Science & Engineering by Title
Now showing items 557-576 of 2211
-
Combating jamming attacks in multi-channel IoT networks using game theory
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)Jamming attacks are among the most widely used techniques to block and disturb legitimate communications. Several techniques are used in the literature to combat these attacks. However, most of them either require the ... -
A Combined Method for Diabetes Mellitus Diagnosis Using Deep Learning, Singular Value Decomposition, and Self-Organizing Map Approaches
( Multidisciplinary Digital Publishing Institute (MDPI) , 2023 , Article)Diabetes in humans is a rapidly expanding chronic disease and a major crisis in modern societies. The classification of diabetics is a challenging and important procedure that allows the interpretation of diabetic data and ... -
A combined method of optimized learning vector quantization and neuro-fuzzy techniques for predicting unified Parkinson's disease rating scale using vocal features
( Elsevier B.V. , 2024 , Article)Parkinson's Disease (PD) is a common disorder of the central nervous system. The Unified Parkinson's Disease Rating Scale or UPDRS is commonly used to track PD symptom progression because it displays the presence and ... -
Combined use of lifecycle management and IoT in smart cities
( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)IoT-enabled smart city service systems are well recognized to address issues of urbanization in the city environment. In most cases, those systems are vertically locked; and from lifecycle perspective, independently designed, ... -
Combining Fisher locality preserving projections and passband DCT for efficient palmprint recognition
( Elsevier B.V. , 2015 , Article)In this paper a new graph based approach referred to as Fisher Locality Preserving Projections (FLPP) is proposed for efficient palmprint recognition. The technique employs two graphs with the first being used to characterize ... -
Communication-efficient hierarchical federated learning for IoT heterogeneous systems with imbalanced data
( Elsevier B.V. , 2022 , Article)Federated Learning (FL) is a distributed learning methodology that allows multiple nodes to cooperatively train a deep learning model, without the need to share their local data. It is a promising solution for telemonitoring ... -
Comparative analysis of computer-vision and BLE technology based indoor navigation systems for people with visual impairments
( BioMed Central Ltd. , 2019 , Article)Background: Considerable number of indoor navigation systems has been proposed to augment people with visual impairments (VI) about their surroundings. These systems leverage several technologies, such as computer-vision, ... -
Comparative Evaluation of Sentiment Analysis Methods Across Arabic Dialects
( Elsevier , 2017 , Conference Paper)Sentiment analysis in Arabic is challenging due to the complex morphology of the language. The task becomes more challenging when considering Twitter data that contain significant amounts of noise such as the use of Arabizi, ... -
Comparative simulation for physical layer key generation methods
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)The paper cogitates about a comparative simulation for various distillation, reconciliation, and privacy amplification techniques that are used to generate secure symmetric physical layer keys. Elementary wireless model ... -
Comparing models of problem and project-based learning (PBL) courses and student engagement in civil engineering in Qatar
( Modestum LTD , 2020 , Article)Background: While improved student engagement has been highlighted as an essential goal and a major outcome of Problem and Project-Based learning (PBL), little empirical evidence has been provided regarding types and forms ... -
Comparison of registration methods for mobile manipulators
( World Scientific Publishing Co. Pte Ltd , 2016 , Conference Paper)Mobile manipulators can be effective, efficient, and flexible for automation on the factory floor but will need safety and performance standards for wide adoption. This paper looks at a specific area of performance standards ... -
Compliance checking for usage-constrained credentials in trust negotiation systems
( Springer Berlin Heidelberg , 2012 , Conference Paper)We propose an approach to placing usage-constraints on RT credentials; issuers specify constraints by designing non-deterministic finite automata. We show by examples that this approach can express constraints of practical ... -
Composition Loss for Counting, Density Map Estimation and Localization in Dense Crowds
( Springer Verlag , 2018 , Conference Paper)With multiple crowd gatherings of millions of people every year in events ranging from pilgrimages to protests, concerts to marathons, and festivals to funerals; visual crowd analysis is emerging as a new frontier in ... -
Comprehensive review of cybercrime detection techniques
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)Cybercrimes are cases of indictable offences and misdemeanors that involve computers or communication tools as targets and commission instruments or are associated with the prevalence of computer technology. Common forms ... -
A Comprehensive Review of the COVID-19 Pandemic and the Role of IoT, Drones, AI, Blockchain, and 5G in Managing its Impact
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)The unprecedented outbreak of the 2019 novel coronavirus, termed as COVID-19 by the World Health Organization (WHO), has placed numerous governments around the world in a precarious position. The impact of the COVID-19 ... -
A Comprehensive Review of Unmanned Aerial Vehicle Attacks and Neutralization Techniques
( Elsevier B.V. , 2021 , Other)Unmanned Aerial Vehicles (UAV) have revolutionized the aircraft industry in this decade. UAVs are now capable of carrying out remote sensing, remote monitoring, courier delivery, and a lot more. A lot of research is happening ... -
Compress or Interfere?
( IEEE Computer Society , 2019 , Conference Paper)Rapid evolution of wireless medical devices and network technologies has fostered the growth of remote monitoring systems. Such new technologies enable monitoring patients' medical records anytime and anywhere without ... -
Compressive sensing-based IoT applications: A review
( MDPI AG , 2018 , Article Review)The Internet of Things (IoT) holds great promises to provide an edge cutting technology that enables numerous innovative services related to healthcare, manufacturing, smart cities and various human daily activities. In a ... -
Compressive SensingBased Remote Monitoring Systems for IoT applications
( Hamad bin Khalifa University Press (HBKU Press) , 2018 , Conference Paper)Internet of things (IoT) is shifting the healthcare delivery paradigm from in-person encounters between patients and providers to an "anytime, anywhere" model delivery. Connected health has become more profound than ever ... -
Computation of Yvon-Villarceau circles on Dupin cyclides and construction of circular edge right triangles on tori and Dupin cyclides
( Elsevier Ltd , 2014 , Article)Ring Dupin cyclides are non-spherical algebraic surfaces of degree four that can be defined as the image by inversion of a ring torus. They are interesting in geometric modeling because: (1) they have several families of ...