Browsing Computer Science & Engineering by Title
Now showing items 1169-1188 of 2288
-
"I want to ... Change": Micro-moment based recommendations can change users' energy habits
( SciTePress , 2019 , Conference Paper)Since electricity consumption of households in developing countries is dramatically increasing every year, it is now more prudent than ever to utilize technology-based solutions that assist energy end-users to improve ... -
I-SEE: Intelligent, Secure, and Energy-Efficient Techniques for Medical Data Transmission Using Deep Reinforcement Learning
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)The rapid evolution of remote health monitoring applications is foreseen to be a crucial solution for facing an unpredictable health crisis and improving the quality of life. However, such applications come with many ... -
iCAFE: Intelligent Congestion Avoidance and Fast Emergency services
( Elsevier B.V. , 2019 , Article)Content Centric Network (CCN)has been envisioned as a paradigm shift from client server architecture. In smart cities, transportation plays an important role where integrated services facilitate citizens through the ease ... -
ICCA 2022 General Chairs Word
( IEEE , 2022 , Other)Proceedings of the International Conference on Computer and Applications, ICCA 2022 - Proceedings -
ICDAR 2013 competition on gender prediction from handwriting
( IEEE , 2013 , Conference Paper)The prediction of gender from handwriting is a very interesting research field. However, no standard benchmark is available for researchers in this field. The aim of this competition is to gather researchers and compare ... -
ICDAR 2013 competition on handwriting stroke recovery from offline data
( IEEE , 2013 , Conference Paper)Stroke recovery from offline handwriting is a very interesting research field. However, no standard benchmark is available for researchers in this field. The aim of this competition is to gather researchers and compare ... -
ICDAR2015 competition on Multi-script Writer Identification and Gender Classification using 'QUWI' Database
( IEEE Computer Society , 2015 , Conference Paper)This competition targets writer identification and gender classification from offline handwritten documents using the QUWI database. The most interesting aspect of the competition is the use of a dataset with writing samples ... -
ICFHR2012 competition on writer identification - Challenge 2: Arabic scripts
( IEEE , 2012 , Conference Paper)Arabic writer identification is a very active research field. However, no standard benchmark is available for researchers in this field. The aim of this competition is to gather researchers and compare recent advances in ... -
ICFHR2016 competition on multi-script writer demographics classification using "qUWI" database
( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)This competition is aimed at classification of writer demographics from offline handwritten documents using the QUWI database. QUWI is a bilingual database comprising writing samples of same individuals in Arabic and ... -
Identification of phantom movements with an ensemble learning approach
( Elsevier , 2022 , Article)Phantom limb pain after amputation is a debilitating condition that negatively affects activities of daily life and the quality of life of amputees. Most amputees are able to control the movement of the missing limb, which ... -
Identifying contextual properties of software architecture in cloud computing
( IEEE , 2011 , Conference Paper)This paper argues that the contextual properties of cloud-enabled software architecture should be identified and understood differently by cloud consumers. The existing architectures are not designed to exploit the contextual ... -
Identifying opinion mining elements based on dependency relations and fuzzy logic
( CSREA Press , 2019 , Conference Paper)Opinion mining mainly involves three elements: feature and feature-of relations, opinion expressions and the related opinion attributes (e.g. Polarity), and feature-opinion relations. Although many works are emerged to ... -
Identifying the vulnerabilities of bitcoin anonymous mechanism based on address clustering
( Science in China Press , 2020 , Article)The anonymity mechanism of bitcoin is favored by the society, which promotes its usage and development. An adversary should not be able to discover the relation between bitcoin addresses and bitcoin users to ensure effective ... -
IDRISI-RA: The First Arabic Location Mention Recognition Dataset of Disaster Tweets
( Association for Computational Linguistics (ACL) , 2023 , Conference Paper)Extracting geolocation information from social media data enables effective disaster management, as it helps response authorities; for example, in locating incidents for planning rescue activities, and affected people for ... -
IDRISI-RE: A generalizable dataset with benchmarks for location mention recognition on disaster tweets
( Elsevier , 2023 , Article)While utilizing Twitter data for crisis management is of interest to different response authorities, a critical challenge that hinders the utilization of such data is the scarcity of automated tools that extract geolocation ... -
IEEE Access Special section Editorial: Mobile edge computing and mobile cloud computing: Addressing heterogeneity and energy issues of compute and network resources
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Other)[No abstract available] -
IEPSBP: A Cost-Efficient Image Encryption Algorithm Based on Parallel Chaotic System for Green IoT
( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)With the fast development of the Internet of Things (IoT) technologies, more IoT devices are currently connected with the Internet, resulting in more exchange of information. However, data privacy and security threats have ... -
Illustrate It! An Arabic Multimedia Text-to-Picture m-Learning System
( IEEE , 2017 , Article)Multimedia learning is the process of building mental representation from words associated with images. Due to the intuitiveness and vividness of visual illustration, many texts to picture systems have been proposed. ... -
Illustrations Generation Based On Arabic Ontology For Children With Intellectual Challenges
( Hamad bin Khalifa University Press (HBKU Press) , 2014 , Conference Paper)Digital devices and computer software have the prospect to help children with intellectual challenges (IC) in learning capabilities, profession growth, and self-consciousness living. However, most tools and existing software ... -
Image de-fencing framework with hybrid inpainting algorithm
( Springer London , 2016 , Article)Detection and removal of fences from digital images become essential when an important part of the scene turns to be occluded by such unwanted structures. Image de-fencing is challenging because manually marking fence ...