Browsing Computer Science & Engineering by Title
Now showing items 1631-1650 of 2288
-
Palmprint identification using an ensemble of sparse representations
( Institute of Electrical and Electronics Engineers Inc. , 2017 , Article)Among various palmprint identification methods proposed in the literature, sparse representation for classification (SRC) is very attractive offering high accuracy. Although SRC has good discriminative ability, its performance ... -
Palmprint identification using sparse and dense hybrid representation
( Springer New York LLC , 2019 , Article)Among various palmprint identification methods proposed in the literature, Sparse Representation for Classification (SRC) is very attractive, offering high accuracy. Although SRC has good discriminative ability, its ... -
Parametric modeling of EEG signals with real patient data for simulating seizures and pre-seizures
( IEEE , 2013 , Conference Paper)Numerous theories and models have been developed to associate various findings or in relating EEG patterns to develop a software simulators. In this paper, a Dynamic model for simulating the EEG signal has been developed ... -
Parkinson’s Disease Diagnosis Using Laplacian Score, Gaussian Process Regression and Self-Organizing Maps
( MDPI , 2023 , Article)Parkinson’s disease (PD) is a complex degenerative brain disease that affects nerve cells in the brain responsible for body movement. Machine learning is widely used to track the progression of PD in its early stages by ... -
Partial shoeprint retrieval using multiple point-of-interest detectors and SIFT descriptors
( IOS Press , 2015 , Article)Shoeprint evidence collected from crime scenes can play an important role in forensic investigations. Usually, the analysis of shoeprints is carried out manually and is based on human expertise and knowledge. As well as ... -
Passive inference of attacks on CPS communication protocols
( Elsevier Ltd , 2018 , Article)The security of Cyber-Physical Systems (CPS) has been recently receiving significant attention from the research community. While the majority of such attention originates from the control theory domain, few approaches ... -
Patch-based offline signature verification using one-class hierarchical deep learning
( Springer Verlag , 2019 , Article)Automatic processing of offline signature verification (in general) can be considered as a low-cost solution to problems in biometrics in comparison with other solutions (e. g. fingerprint, face verification, etc.). This ... -
Pathway to Prosocial AI-XR Metaverses: A Synergy of Technical and Regulatory Approaches
( IEEE , 2023 , Conference Paper)AI-XR metaverses leverage artificial intelligence (AI) and extended reality (XR) technology to create immersive environments that replicate and enhance the real world. The transformative impact of the metaverse as an ... -
Patient-Driven Network Selection in multi-RAT Health Systems Using Deep Reinforcement Learning
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)The recent pandemic along with the rapid increase in the number of patients that require continuous remote monitoring imposes several challenges to support the high quality of services (QoS) in remote health applications. ... -
PCCP: Proactive Video Chunks Caching and Processing in edge networks
( Elsevier B.V. , 2020 , Article)Mobile Edge Computing (MEC) networks have been proposed to extend the cloud services and bring the cloud computing capabilities near the end-users at the Mobile Base Stations (MBS). To improve the efficiency of pushing the ... -
Peak Extraction Passive Source Localization Using a Single Hydrophone in Shallow Water
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)In this work, we use the acoustic ray model to study passive source localization problems using a single hydrophone for shallow water waveguides. It has been found that conventional matched field processing, which requires ... -
Performance Analysis and Optimization for the MAC Protocol in UAV-Based IoT Network
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)Unmanned aerial vehicles (UAVs) have played an important role in air-ground integration network. Especially in Internet of Things (IoT) services, UAV equipped with communication equipments is widely adopted as a mobile ... -
Performance analysis for truncated ARQ based DSFBC-CO-OFDM communication scheme
( IEEE , 2011 , Conference Paper)We develop and analyze an ARQ (Automatic Repeat reQuest) based distributed space-frequency block code-orthogonal frequency division multiplexing protocol for cooperative communications (DSFBC-CO-OFDM). At PHY layer, space ... -
Performance analysis of a cell-based call admission control scheme for QoS support in multimedia wireless networks
( John Wiley & Sons, Ltd. , 2010 , Article)Next generation wireless communication systems, including 3G and 4G technologies, are envisaged to support more mobile users and a variety of high-bandwidth multimedia services. Different multimedia services have diverse ... -
Performance analysis of data intensive cloud systems based on data management and replication: a survey
( Springer New York LLC , 2016 , Article)As we delve deeper into the ‘Digital Age’, we witness an explosive growth in the volume, velocity, and variety of the data available on the Internet. For example, in 2012 about 2.5 quintillion bytes of data was created on ... -
Performance Analysis of IoT Physical layer Security Using 3-D Stochastic Geometry
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)The internet of things (IoT) is becoming part of the infrastructure supporting various services in every day's life. Due to the complex nature of IoT systems with heterogeneous devices, the needed security and privacy ... -
Performance Analysis of PLS key generation-based Secure NOMA-enabled IoT Networks in the presence of Untrusted Users
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)In Internet of Things (IoT), a massive amount of sensitive data is generated and transmitted by IoT devices. Security risks represent a major concern in IoT, especially when using innovative techniques such as Non-Orthogonal ... -
Performance and security improvements for Tor: A survey
( Association for Computing Machinery , 2016 , Article)Tor [Dingledine et al. 2004] is the most widely used anonymity network today, serving millions of users on a daily basis using a growing number of volunteer-run routers. Since its deployment in 2003, there have been more ... -
Performance and stability analysis of multilevel data structures with deferred reorganization
( IEEE , 2002 , Article)We develop a methodology for analyzing the performance and stability of a server that maintains a multilevel data structure to service a set of access operations for (key, value) records. A subset of the operations executed ... -
Performance assessment of two-timescale multi-objective volt/var optimization scheme considering EV charging stations, BESSs, and RESs in active distribution networks
( Elsevier Ltd , 2022 , Article)The high penetrations of distributed energy resources of renewable energy sources, battery energy storage systems, and electric vehicles introduced several challenges to power networks. It can lead to high voltage variation, ...