Browsing Computer Science & Engineering by Title
Now showing items 864-883 of 1696
-
"I want to ... Change": Micro-moment based recommendations can change users' energy habits
( SciTePress , 2019 , Conference Paper)Since electricity consumption of households in developing countries is dramatically increasing every year, it is now more prudent than ever to utilize technology-based solutions that assist energy end-users to improve ... -
I-SEE: Intelligent, Secure, and Energy-Efficient Techniques for Medical Data Transmission Using Deep Reinforcement Learning
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)The rapid evolution of remote health monitoring applications is foreseen to be a crucial solution for facing an unpredictable health crisis and improving the quality of life. However, such applications come with many ... -
iCAFE: Intelligent Congestion Avoidance and Fast Emergency services
( Elsevier B.V. , 2019 , Article)Content Centric Network (CCN)has been envisioned as a paradigm shift from client server architecture. In smart cities, transportation plays an important role where integrated services facilitate citizens through the ease ... -
ICDAR 2013 competition on gender prediction from handwriting
( IEEE , 2013 , Conference Paper)The prediction of gender from handwriting is a very interesting research field. However, no standard benchmark is available for researchers in this field. The aim of this competition is to gather researchers and compare ... -
ICDAR 2013 competition on handwriting stroke recovery from offline data
( IEEE , 2013 , Conference Paper)Stroke recovery from offline handwriting is a very interesting research field. However, no standard benchmark is available for researchers in this field. The aim of this competition is to gather researchers and compare ... -
ICDAR2015 competition on Multi-script Writer Identification and Gender Classification using 'QUWI' Database
( IEEE Computer Society , 2015 , Conference Paper)This competition targets writer identification and gender classification from offline handwritten documents using the QUWI database. The most interesting aspect of the competition is the use of a dataset with writing samples ... -
ICFHR2012 competition on writer identification - Challenge 2: Arabic scripts
( IEEE , 2012 , Conference Paper)Arabic writer identification is a very active research field. However, no standard benchmark is available for researchers in this field. The aim of this competition is to gather researchers and compare recent advances in ... -
ICFHR2016 competition on multi-script writer demographics classification using "qUWI" database
( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)This competition is aimed at classification of writer demographics from offline handwritten documents using the QUWI database. QUWI is a bilingual database comprising writing samples of same individuals in Arabic and ... -
Identification of phantom movements with an ensemble learning approach
( Elsevier , 2022 , Article)Phantom limb pain after amputation is a debilitating condition that negatively affects activities of daily life and the quality of life of amputees. Most amputees are able to control the movement of the missing limb, which ... -
Identifying opinion mining elements based on dependency relations and fuzzy logic
( CSREA Press , 2019 , Conference Paper)Opinion mining mainly involves three elements: feature and feature-of relations, opinion expressions and the related opinion attributes (e.g. Polarity), and feature-opinion relations. Although many works are emerged to ... -
Identifying the vulnerabilities of bitcoin anonymous mechanism based on address clustering
( Science in China Press , 2020 , Article)The anonymity mechanism of bitcoin is favored by the society, which promotes its usage and development. An adversary should not be able to discover the relation between bitcoin addresses and bitcoin users to ensure effective ... -
IEEE Access Special section Editorial: Mobile edge computing and mobile cloud computing: Addressing heterogeneity and energy issues of compute and network resources
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Other)[No abstract available] -
IEPSBP: A Cost-Efficient Image Encryption Algorithm Based on Parallel Chaotic System for Green IoT
( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)With the fast development of the Internet of Things (IoT) technologies, more IoT devices are currently connected with the Internet, resulting in more exchange of information. However, data privacy and security threats have ... -
Illustrations Generation Based On Arabic Ontology For Children With Intellectual Challenges
( Hamad bin Khalifa University Press (HBKU Press) , 2014 , Conference Paper)Digital devices and computer software have the prospect to help children with intellectual challenges (IC) in learning capabilities, profession growth, and self-consciousness living. However, most tools and existing software ... -
Image de-fencing framework with hybrid inpainting algorithm
( Springer London , 2016 , Article)Detection and removal of fences from digital images become essential when an important part of the scene turns to be occluded by such unwanted structures. Image de-fencing is challenging because manually marking fence ... -
Image Generation: A Review
( Springer , 2022 , Article Review)The creation of an image from another and from different types of data including text, scene graph, and object layout, is one of the very challenging tasks in computer vision. In addition, capturing images from different ... -
Image Inpainting: A Review
( Springer , 2019 , Article)Although image inpainting, or the art of repairing the old and deteriorated images, has been around for many years, it has recently gained even more popularity, because of the recent development in image processing techniques. ... -
Image Local Features Description through Polynomial Approximation
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)This work introduces a novel local patch descriptor that remains invariant under varying conditions of orientation, viewpoint, scale, and illumination. The proposed descriptor incorporate polynomials of various degrees to ... -
Image Steganography: A Review of the Recent Advances
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)Image Steganography is the process of hiding information which can be text, image or video inside a cover image. The secret information is hidden in a way that it not visible to the human eyes. Deep learning technology, ... -
Image stitching system with scanning microscopy for histopathological applications
( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)Histopathological analysis of biopsy or surgical specimen is a common clinical practice for diagnostic purposes. Essentially, the process involves slicing the biopsy or surgical sample into very thin slices, placing them ...