Browsing Computer Science & Engineering by Title
Now showing items 1303-1322 of 1670
-
Random sampling for patch-based face recognition
( Institute of Electrical and Electronics Engineers Inc. , 2017 , Conference Paper)Real face recognition is a challenging problem especially when face images are subject to distortions. This paper presents an approach to tackle partial occlusion distortions present in real face recognition using a single ... -
Ranking disagreement between graders: Application to ranking hadith scholars
( American Scientific Publishers , 2017 , Article)Ranking raters based on their agreement or disagreement is a very active research field with many applications. It has been applied for instance for ranking automatic essay grading algorithms based on their agreement with ... -
Rapid prototyping of wireless image transmission for wildlife (tiger) monitoring system - A preliminary study
( Universiti Teknikal Malaysia Melaka , 2018 , Article)This paper proposes a rapid prototyping of wireless image transmission for wildlife monitoring system on Raspberry Pi. In this study, inputs based on the motion of surrounding activities were detected using a motion sensor ... -
Rational Contracts: Data-driven Service Provisioning in Blockchain-powered Systems
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)Smart Contracts (SCs), which are software programs that run on blockchain platforms, provide appealing security guarantees characterized by decentralized, autonomous, and verifiable execution. On the other hand, Service ... -
Re-parameterization reduces irreducible geometric constraint systems
( Elsevier Ltd , 2016 , Article)You recklessly told your boss that solving a non-linear system of size n (n unknowns and n equations) requires a time proportional to n, as you were not very attentive during algorithmic complexity lectures. So now, you ... -
Re-ranking web search results for better fact-checking: A preliminary study
( Association for Computing Machinery , 2018 , Conference Paper)Even though Web search engines play an important role in finding documents relevant to user queries, there is little to no attention given to how they perform in terms of usefulness for fact-checking claims. In this paper, ... -
Real-time automated image segmentation technique for cerebral aneurysm on reconfigurable system-on-chip
( Elsevier B.V. , 2018 , Article)© 2018 Elsevier B.V. Cerebral aneurysm is a weakness in a blood vessel that may enlarge and bleed into the surrounding area, which is a life-threatening condition. Therefore, early and accurate diagnosis of aneurysm is ... -
Real-time data center's telemetry reduction and reconstruction using markov chain models
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)Large-scale data centers are composed of thousands of servers organized in interconnected racks to offer services to users. These data centers continuously generate large amounts of telemetry data streams (e.g., hardware ... -
Real-time implementation and evaluation of an adaptive energy-aware data compression for wireless EEG monitoring systems
( Institute of Electrical and Electronics Engineers Inc. , 2014 , Conference Paper)Wireless sensor technologies can provide the leverage needed to enhance patient-caregivers collaboration through ubiquitous access and direct communication, which promotes smart and scalable vital sign monitoring of the ... -
Reasoning about Policies in Security-Aware Service Discovery Using Answer Set Programming
( World Scientific Publishing Co. Pte Ltd , 2016 , Article)In order to enable a secure interaction between dynamically discovered software services and the client's application in a cooperative information system such as service oriented system, one of the pre-requisites is the ... -
Recent advances in mobile touch screen security authentication methods: A systematic literature review
( Elsevier Ltd , 2019 , Article Review)The security of the smartphone touch screen has attracted considerable attention from academics as well as industry and security experts. The maximum security of the mobile phone touch screen is necessary to protect the ... -
Recognition of off-line handwritten Arabic words using neural network
( IEEE , 2006 , Conference Paper)Neural network (NN) have been used with some success in recognizing printed Arabic words. In this paper, a complete scheme for unconstrained Arabic handwritten word recognition based on a Neural network is proposed and ... -
Recommender systems using harmonic analysis
( IEEE Computer Society , 2015 , Conference Paper)Recommender systems provide recommendations on variety of personal activities or relevant items of interest. They can play a significant role for E-commerce and in daily personal decisions. However, existing recommender ... -
Reconfigurable self-calibrated multi-sensing RFID-based platform
( Institute of Electrical and Electronics Engineers Inc. , 2017 , Conference Paper)This paper concerns an RFID tag platform using an integrated temperature sensor and external pressure sensor targeted for the Electronics Product Code (EPC) Gen-2 standard operating in the 902-928 MHz ISM band. The developed ... -
Reconfigurable swarm robots for structural health monitoring: a brief review
( Springer , 2017 , Article)Autonomous monitoring of infrastructure systems offers a promising alternative to manual inspection techniques which are mostly tedious, expensive and prone to error. Robot-based autonomous monitoring systems not only ... -
Regional failure survivability for cloud networking services using post fault restoration
(2013 , Conference Paper)Cloud computing services are being adopted to expand applications across dispersed data-center sites. As these new paradigms require active data exchange, they impose further virtual network (VN) mappings over operator ... -
Reinforcement learning approaches for efficient and secure blockchain-powered smart health systems
( Elsevier B.V. , 2021 , Article)Emerging technological innovation toward e-Health transition is a worldwide priority for ensuring people's quality of life. Hence, secure exchange and analysis of medical data amongst diverse organizations would increase ... -
A Reinforcement Learning Method for Joint Mode Selection and Power Adaptation in the V2V Communication Network in 5G
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)A 5G network is the key driving factor in the development of vehicle-to-vehicle (V2V) communication technology, and V2V communication in 5G has recently attracted great interest. In the V2V communication network, users can ... -
Reinforcement Learning Power Control Algorithm Based on Graph Signal Processing for Ultra-Dense Mobile Networks
( IEEE Computer Society , 2021 , Article)Ultra-dense mobile networks (UDMNs) represent a promising technology for improving the network performance and providing the ubiquitous network accessibility in the beyond 5 G (B5G) mobile networks. Heterogenous densely ... -
Relay selection schemes to minimise outage in wireless powered communication networks
( Institution of Engineering and Technology , 2016 , Article)In this study, the authors discuss relay selection schemes with the objective to minimise outage probability for a network consisting of a single source, multiple relays and a single destination. The relays are powered by ...