Now showing items 478-497 of 1668

    • DAGIoV: A Framework for Vehicle to Vehicle Communication Using Directed Acyclic Graph and Game Theory 

      Hassija, Vikas; Chamola, Vinay; Han, Guangjie; Rodrigues, Joel J.P.C.; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)
      Data sharing and content offloading among vehicles is an imperative part of the Internet of Vehicles (IoV). A peer-to-peer connection among vehicles in a distributed manner is a highly promising solution for fast communication ...
    • Dairy Farm Management Information Systems 

      Kassahun, Ayalew; Bloo, Robbin; Catal, Cagatay; Mishra, Alok ( MDPI , 2022 , Article)
      Nowadays, different types of farm management information systems (FMIS) are being used in practice in several sectors of farming, such as dairy, arable, fruits, vegetables, and meat farming. The goal of this research is ...
    • DART: A large dataset of dialectal Arabic tweets 

      Alsarsour, Israa; Mohamed, Esraa; Suwaileh, Reem; Elsayed, Tamer ( European Language Resources Association (ELRA) , 2019 , Conference Paper)
      In this paper, we present a new large manually-annotated multi-dialect dataset of Arabic tweets that is publicly available. The Dialectal ARabic Tweets (DART) dataset has about 25K tweets that are annotated via crowdsourcing ...
    • Data analytics platforms for agricultural systems: A systematic literature review 

      Nyoman Kutha Krisnawijaya, Ngakan; Tekinerdogan, Bedir; Catal, Cagatay; Tol, Rik van der ( Elsevier , 2022 , Article Review)
      With the rapid developments in ICT, the current agriculture businesses have become increasingly data-driven and are supported by advanced data analytics techniques. In this context, several studies have investigated the ...
    • Data Collection and Image Processing System for Ancient Arabic Manuscripts 

      Al-Maadeed S.; Peer S.F.K.; Subramanian N. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
      This paper presents a general-purpose data collection system that combines a DSLR camera with directional LED lamps in order to capture a large quantity of high-resolution manuscript images in such a way as to maximize the ...
    • Data confidentiality in cloud-based pervasive system 

      Khan, Khaled M.; Shaheen, Mahboob; Wang, Yongge ( Association for Computing Machinery , 2017 , Conference Paper)
      Data confidentiality and privacy is a serious concern in pervasive systems where cloud computing is used to process huge amount of data such as matrix multiplications typically used in HPC. Due to limited processing ...
    • Data driven feature extraction for gender classification using multi-script handwritten texts 

      Moetesum M.; Siddiqi I.; Djeddi C.; Hannad Y.; Al-Maadeed S. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
      This paper presents a study on assessing the effectiveness of machine learned features to predict gender of writers from images of handwriting. Pre-trained Convolutional Neural Networks have been employed as feature ...
    • Data Mining, Reasoning and Incremental Information Retrieval through Non Enlargeable Rectangular Relation Coverage 

      Jaoua, Ali; Duwairi, Rehab; Elloumi, Samir; Yahia, Sadok Ben ( Springer Berlin / Heidelberg , 2009 , Conference Paper)
      Association rules extraction from a binary relation as well as reasoning and information retrieval are generally based on the initial representation of the binary relation as an adjacency matrix. This presents some ...
    • Data-Based Fault Diagnosis Model Using a Bayesian Causal Analysis Framework 

      Diallo T.M.L.; Henry S.; Ouzrout Y.; Bouras A. ( World Scientific Publishing Co. Pte Ltd , 2018 , Article)
      This paper provides a comprehensive data-driven diagnosis approach applicable to complex manufacturing industries. The proposed approach is based on the Bayesian network paradigm. Both the implementation of the Bayesian ...
    • Data-driven curation, learning and analysis for inferring evolving IoT botnets in the wild 

      Pour M.S.; Mangino A.; Friday K.; Rathbun M.; Bou-Harb E.; ... more authors ( Association for Computing Machinery , 2019 , Conference Paper)
      The insecurity of the Internet-of-Things (IoT) paradigm continues to wreak havoc in consumer and critical infrastructure realms. Several challenges impede addressing IoT security at large, including, the lack of IoT-centric ...
    • DCNN-GA: A Deep Neural Net Architecture for Navigation of UAV in Indoor Environment 

      Chhikara, Prateek; Tekchandani, Rajkumar; Kumar, Neeraj; Chamola, Vinay; Guizani, Mohsen (2021 , Article)
      The applications of unmanned aerial vehicles (UAVs) in military, intelligent transportation, agriculture, rescue operations, natural environment mapping, and many other allied domains has increased exponentially during the ...
    • Decentralized ciphertext-policy attribute-based encryption schemes for lightweight devices 

      Malluhi Q.M.; Shikfa A.; Tran V.D.; Trinh V.C. ( Elsevier B.V. , 2019 , Article)
      In a traditional attribute-based encryption (ABE) system, there is only one central authority who generates and hence knows the secret keys of all users, this problem is known as the key escrow problem. An ABE scheme which ...
    • Decentralized throughput maximization in cognitive radio wireless mesh networks 

      El-Sherif A.A.; Mohamed A. ( Institute of Electrical and Electronics Engineers Inc. , 2014 , Article)
      Scheduling and spectrum allocation are tasks affecting the performance of cognitive radio wireless networks, where heterogeneity in channel availability limits the performance and poses a great challenge on protocol design. ...
    • Deciding Your Own Anonymity: User-Oriented Node Selection in I2P 

      Ye, Lin; Yu, Xiangzhan; Zhao, Junda; Zhan, Dongyang; Du, Xiaojiang; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Article)
      With the development of Internet applications, anonymous communication technology plays a very significant role in protecting personal privacy. As one of the most popular anonymous communication systems, I2P provides strong ...
    • Deep CNN-Based real-time traffic light detector for self-driving vehicles 

      Ouyang, Zhenchao; Niu, Jianwei; Liu, Yu; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)
      Due to the unavailability of Vehicle-to-Infrastructure (V2I) communication in current transportation systems, Traffic Light Detection (TLD) is still considered an important module in autonomous vehicles and Driver Assistance ...
    • Deep Federated Learning for IoT-based Decentralized Healthcare Systems 

      Elayan, Haya; Aloqaily, Moayad; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)
      Recent trends in the healthcare industry, such as the use of wearable IoT for continuous health monitoring, are setting new requirements for healthcare systems that boost data analysis. These systems should support ...
    • Deep learning and low rank dictionary model for mHealth data classification 

      Said A.B.; Mohamed A.; Elfouly T.; Abualsaud K.; Harras K. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
      In the context of mobile Health (mHealth) applications, data are prone to several sources of contamination which would lead to false interpretation and misleading classification results. In this paper, a robust deep learning ...
    • Deep learning approach for EEG compression in mHealth system 

      Ben Said, Ahmed; Mohamed, Amr; Elfouly, Tarek ( Institute of Electrical and Electronics Engineers Inc. , 2017 , Conference Paper)
      The emergence of mobile health (mHealth) systems has risen the challenges and concerns due to the sensitivity of the data involved in such systems. It is essential to ensure that these data are well delivered to the health ...
    • A Deep Learning Approach for Vital Signs Compression and Energy Efficient Delivery in mhealth Systems 

      Said, A.; Said, Ahmed Ben; Al-Sa'D, Mohamed Fathi; Tlili, Mounira; Abdellatif, Alaa Awad; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Article)
      © 2013 IEEE. Due to the increasing number of chronic disease patients, continuous health monitoring has become the top priority for health-care providers and has posed a major stimulus for the development of scalable and ...
    • A deep learning based static taint analysis approach for IoT software vulnerability location 

      Niu, Weina; Zhang, Xiaosong; Du, Xiaojiang; Zhao, Lingyuan; Cao, Rong; ... more authors ( Elsevier B.V. , 2020 , Article)
      Computer system vulnerabilities, computer viruses, and cyber attacks are rooted in software vulnerabilities. Reducing software defects, improving software reliability and security are urgent problems in the development of ...