Browsing Computer Science & Engineering by Title
Now showing items 498-517 of 2197
-
CAT: Credibility Analysis of Arabic Content on Twitter
( Association for Computational Linguistics (ACL) , 2017 , Conference Paper)Data generated on Twitter has become a rich source for various data mining tasks. Those data analysis tasks that are dependent on the tweet semantics, such as sentiment analysis, emotion mining, and rumor detection among ... -
CE-D2D: Collaborative and Popularity-aware Proactive Chunks Caching in Edge Networks
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)Leveraging video caching to collaborative Mobile Edge Computing (MEC) servers is an emerging paradigm, where cloud computing services are extended to edge networks to allocate multimedia contents close to end-users. However, ... -
CE-D2D: Dual framework chunks caching and offloading in collaborative edge networks with D2D communication
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)The advancement of technology has pushed the cloud computing capabilities to the edge networks, paving the way for network operators and multimedia service providers to leverage video caching and transcoding to the Mobile ... -
Cell phenotyping in multi-tag fluorescent bioimages
( Elsevier B.V. , 2014 , Article)Multi-tag bioimaging systems have recently emerged as powerful tools which provide spatiotemporal localization of several different proteins in the same tissue specimen. The analysis of such multivariate bioimages requires ... -
Centralized and Distributed Cognitive Relay-Selection Schemes for SWIPT Cognitive Networks
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)We investigate the model of a single primary-transceiver pair with multiple secondary-transceiver pairs. The secondary pairs can act as relays for the primary transmitter enabling access to its channel resources. Each ... -
Challenges and Countermeasures for Adversarial Attacks on Deep Reinforcement Learning
( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)Deep reinforcement learning (DRL) has numerous applications in the real world, thanks to its ability to achieve high performance in a range of environments with little manual oversight. Despite its great advantages, DRL ... -
Challenges of Physical Layer Security in a Satellite-Terrestrial Network
( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)Integrated satellite-terrestrial networks (ISTNs) are one of the new research directions for future 5G networks. Satellite coverage enables 5G communication throughout most of the world. However, the security concerns ... -
Changing Dynamics of network security involving hacking/cracking with next generation firewalls (NGFW)
( IGI Global , 2016 , Book chapter)With increasing number of users on the internet, risk of security and probability of vulnerable attacks are increasing day by day. For every user connected to network, security attacks like hacking and cracking are very ... -
Channel Aware and Queue Aware Scheduling in LTE Uplink
( SpringerLink , 2012 , Conference Paper)Long Term Evolution (LTE) uses single carrier frequency division multiple access (SCFDMA) technique as the multiple access scheme in the uplink, due to its low peak to average power ratio (PAPR) compared to orthogonal ... -
Channel Measurement and Resource Allocation Scheme for Dual-Band Airborne Access Networks
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)The aerial base stations (ABSs) can be quickly deployed to provide emergency communications and airborne network infrastructures. How to ensure wide coverage, reliable links, and high throughput for ground users under the ... -
Channel secondary random process for robust secret key generation
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)The broadcast nature of wireless communications imposes the risk of information leakage to adversarial users or unauthorized receivers. Therefore, information security between intended users remains a challenging issue. ... -
Channel-, Queue-, and Delay-Aware Resource Allocation in Buffer-Aided Relay-Enhanced OFDMA Networks
( Institute of Electrical and Electronics Engineers Inc. , 2016 , Article)Resource allocation is an important factor in providing different varieties of services in next-generation broadband wireless systems. In this paper, we consider dynamic routing and subchannel allocation for providing ... -
Characteristics of agent-based hierarchical diff-EDF schedulability over heterogeneous real-time Packet networks
( EuroJournals Publishing, Inc. , 2009 , Article)Packet networks are currently enabling the integration of heterogeneous traffic with a wide range of characteristics that extend from video traffic with stringent QoS requirements to best-effort traffic requiring no ... -
Characteristics, benefits, challenges, and socio-cultural factors of implementing pbl in qatar
( Aalborg University , 2020 , Conference Paper)While project-and/or problem-based learning has been implemented in higher education worldwide for several decades, both modes of PBL remain a new phenomenon in Qatar. Over the past few years, several research projects ... -
Characterization of the indoor-outdoor radio propagation channel at 2.4 GHz
( IEEE , 2011 , Conference Paper)We present the site-specific signal strength measurement results for path loss, shadowing, and fading in 2.4GHz band under typical harsh environment (high temperature 4050 C and humidity 8090%). We use spectrum analyzer ... -
Characterization of untreated and treated male and female date palm leaves
( Elsevier, Ltd , 2013 , Technical Report)This paper describes the characterization of male and female date palm leaves from two different cultivars, Sheshi female and unknown male leaves. Characterization was done for both untreated and NaOH treated date palm ... -
Chatbot Application to Support Smart Agriculture in Thailand
( Institute of Electrical and Electronics Engineers Inc. , 2022 , Conference Paper)A chatbot is a software developed to help reply to text or voice conversations automatically and quickly in real time. In the agriculture sector, the existing smart agriculture systems just use data from sensing and internet ... -
CheckThat! at CLEF 2019: Automatic identification and verification of claims
( Springer Verlag , 2019 , Conference Paper)We introduce the second edition of the CheckThat! Lab, part of the 2019 Cross-Language Evaluation Forum (CLEF). CheckThat! proposes two complementary tasks. Task 1: predict which claims in a political debate should be ... -
CheckThat! at CLEF 2020: Enabling the automatic identification and verification of claims in social media
( Springer , 2020 , Conference Paper)We describe the third edition of the CheckThat! Lab, which is part of the 2020 Cross-Language Evaluation Forum (CLEF). CheckThat! proposes four complementary tasks and a related task from previous lab editions, offered in ... -
Classification and trends in knowledge research relevance and context for smart farm technology development
( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)With the climate change paradigm, farmers are facing changes in the environment all the time like drought, higher temperature, heavy raining, and the shift of season. Smart farm is a method for helping farmers to plant ...