Browsing Computer Science & Engineering by Title
Now showing items 1148-1167 of 1696
-
Obstacles and features of health information systems: A systematic literature review
( Elsevier , 2021 , Article Review)Background: Currently many healthcare systems are supported by an increasing set of Health Information Sys-tems (HISs), which assist the activities for multiple stakeholders. The literature on HISs is, however, fragmented ... -
Off-line Persian Signature Verification using Wavelet-based Fractal Dimension and One-class Gaussian Process
( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)This paper presents a novel individual verification approach through off-line handwriting signatures. In our proposed technique, images are decomposed into an series of wavelet sub-bands at some specific levels. In order ... -
Off-line writer identification using an ensemble of grapheme codebook features
( Elsevier , 2015 , Article)Off-line writer identification is the process of matching a handwritten sample with its author. Manual identification is very time-consuming because it requires a meticulous comparison of character shape details. Consequently ... -
Off-line writer identification using multi-scale local binary patterns and SR-KDA
( IEEE , 2013 , Conference Paper)Writer identification is becoming an increasingly important research topic especially in forensic and biometric applications. This paper presents a novel method for performing offline write identification by using multi-scale ... -
Offloading Time Optimization via Markov Decision Process in Mobile-Edge Computing
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)Computation offloading from a mobile device to the edge server is an emerging paradigm to reduce completion latency of intensive computations in mobile-edge computing (MEC). In order to satisfy the delay-sensitive computing ... -
On correlation-based channel sensing with IQ imbalance
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)This paper addresses the problem of the detection of the presence of a pre-classified (i.e., pulse shape is known) signals with IQ imbalance considering free-space path-loss. We study the effect of IQ distortion on the ... -
On Dependability Traffic Load and Energy Consumption Tradeoff in Data Center Networks
( Hamad bin Khalifa University Press (HBKU Press) , 2018 , Conference Paper)Mega data centers (DCs) are considered as efficient and promising infrastructures for supporting numerous cloud computing services such as online office, online social networking, Web search and IT infrastructure out-sourcing. ... -
On Designing Smart Agents for Service Provisioning in Blockchain-powered Systems
( IEEE Computer Society , 2021 , Article)Service provisioning systems assign users to service providers according to allocation criteria that strike an optimal trade-off between users Quality of Experience (QoE) and the operation cost endured by providers. These ... -
On Designing Smart Agents for Service Provisioning in Blockchain-Powered Systems
( IEEE Computer Society , 2022 , Article)Service provisioning systems assign users to service providers according to allocation criteria that strike an optimal trade-off between users' Quality of Experience (QoE) and the operation cost endured by providers. These ... -
On hybrid-fuzzy classifier design: An empirical modeling scenario for corrosion detection in gas pipelines
( IEEE , 2008 , Conference Paper)In this paper, a customized Fuzzy Inference System is presented to classify the corrosion and distinguish it from the geometric defects or normal state of the steel pipes used in gas/petroleum industry. The presented ... -
On Physical Layer Security in Energy-Efficient Wireless Health Monitoring Applications
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)In this paper, we investigate a multi-objective optimization framework for secure wireless health monitoring applications. In particular, we consider a legitimate link for the transmission of a vital EEG signal, threatened ... -
On realistic target coverage by autonomous drones
( Association for Computing Machinery , 2019 , Article)Low-cost mini-drones with advanced sensing and maneuverability enable a new class of intelligent sensing systems. To achieve the full potential of such drones, it is necessary to develop new enhanced formulations of both ... -
On Softwarization of Intelligence in 6G Networks for Ultra-Fast Optimal Policy Selection: Challenges and Opportunities
( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)The emerging Sixth Generation (6G) communication networks promising 100 to 1000 Gbps rates and ultra-low latency (1 millisecond) are anticipated to have native, embedded Artificial Intelligence (AI) capability to support ... -
On spectrum sharing between energy harvesting cognitive radio users and primary users
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)This paper investigates the maximum throughput for a rechargeable secondary user (SU) sharing the spectrum with a primary user (PU) plugged to a reliable power supply. The SU maintains a finite energy queue and harvests ... -
On target coverage in mobile visual sensor networks
( Association for Computing Machinery, Inc , 2014 , Conference Paper)Recent advancements in manufacturing low-cost wireless battery operated cameras has made their application in Wireless Video Sensor Networks (WVSN) increasingly more feasible and affordable. The application of robotic ... -
On the delay of finite buffered multi-hop relay wireless internet of things
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)The evolution of Internet of Things (IoT) as a new application in wireless networks mandates the utilization of wireless cooperative relaying to overcome the energy limitations of IoT devices. Multi-hop relaying is a ... -
On the detection of Kernel-level rootkits using hardware performance counters
( Association for Computing Machinery, Inc , 2017 , Conference Paper)Recent work has investigated the use of hardware perfor- mance counters (HPCs) for the detection of malware run- ning on a system. These works gather traces of HPCs for a variety of applications (both malicious and ... -
On the effect of proportional fairness in energy transfer for wireless powered communication networks
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)Wireless powered communication network (WPCN) is an emerging area of research where energy is transferred from the access point to the mobile terminals in the downlink and information is transferred in the uplink. In the ... -
On the evaluation of tweet timeline generation task
( Springer Verlag , 2016 , Conference Paper)Tweet Timeline Generation (TTG) task aims to generate a timeline of relevant but novel tweets that summarizes the development of a given topic. A typical TTG system first retrieves tweets then detects novel tweets among ... -
On the fairness of frequency domain resource allocation in Wireless Mesh Networks A survey
( IEEE , 2011 , Conference Paper)This article presents a concise survey of fairness-aware frequency domain resource allocation techniques in Wireless Mesh Networks (WMNs). Wireless mesh networks have emerged as a key technology for next generation application ...