Browsing Computer Science & Engineering by Title
Now showing items 1897-1916 of 2127
-
Tag-based personalized recommendation in social media services
( Springer New York LLC , 2016 , Article)Users of ambient intelligence environments have been overwhelmed by the huge numbers of social media available, thus identifying the social media tailored to the user?s need is becoming an important question to be discussed. ... -
Tahaqqaq: A Real-Time System for Assisting Twitter Users in Arabic Claim Verification
( Association for Computing Machinery, Inc , 2023 , Conference Paper)Over the past years, notable progress has been made towards fighting misinformation spread over social media, encouraging the development of many fact-checking systems. However, systems that operate over Arabic content are ... -
Taking advantage of multi-user diversity in OFDM systems
(2013 , Conference Paper)A multi-user diversity approach, called Opportunistic Interference Management (OIM), is considered in connection with Orthogonal Frequency Division Multiplexing (OFDM) systems. The OIM is applied to each consecutive group ... -
TamForen: A tamper-proof cloud forensic framework
( John Wiley and Sons Inc , 2022 , Article)Cloud forensics has become increasingly critical in cloud computing security in recent years. A fundamental problem in cloud forensics is how to safely and effectively obtain, preserve, and analyze evidence. With massive ... -
Tamp-X: Attacking explainable natural language classifiers through tampered activations
( Elsevier , 2022 , Article)While the technique of Deep Neural Networks (DNNs) has been instrumental in achieving state-of-the-art results for various Natural Language Processing (NLP) tasks, recent works have shown that the decisions made by DNNs ... -
TangleCV: Decentralized Technique for Secure Message Sharing in Connected Vehicles
( Association for Computing Machinery, Inc , 2019 , Conference Paper)Connected vehicles are designed to make informed safety-related decisions based on data/information they receive from various on-board sensors and other vehicles in the vicinity. However, attacks directed towards on-board ... -
Teaching design project in introductory engineering course using 3D modeling and immersive virtual reality
( Springer Verlag , 2018 , Conference Paper)This paper presents a new approach for delivering the project component in introductory engineering course. The approach is based on using 3D modeling software to create the prototype of the product. Furthermore, immersive ... -
Techniques for calculating software product metrics threshold values: A systematic mapping study
( MDPI , 2021 , Article)Several aspects of software product quality can be assessed and measured using product metrics. Without software metric threshold values, it is difficult to evaluate different aspects of quality. To this end, the interest ... -
Tele-wobble: A telerehabilitation wobble board for lower extremity therapy
( IEEE , 2012 , Article)Ankle deficiencies occur quite often among poststroke patients and people working in physically demanding professions in general. Computerized telerehabilitation systems have emerged as promising assistive tools for effective ... -
A Testbed for Implementing Lightweight Physical Layer Security in an IoT-based Health Monitoring System
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)Telemedicine is a technique that allows patients to have health-related consultations without the need to be physically present in the hospital through phone and video calling technologies. In recent years, researchers ... -
Text categorization using weighted hyper rectangular keyword extraction
( IEEE Computer Society , 2018 , Conference Paper)Text categorization is an important research field that finds many applications nowadays. It is usually performed in two steps: feature extraction and classification. In the feature extraction step, discriminating keywords ... -
Text Summarization Based on Conceptual Data Classification
( IGI Global , 2006 , Article)In this article, we present an original approach for text summarization using conceptual data classification. We show how a given text can be summarized without losing meaningful knowledge and without using any semantic ... -
Text summarization based on conceptual data classification
( IGI Global , 2008 , Book chapter)In this paper, we present an original approach for text summarization using conceptual data classification. We show how a given text can be summarized without losing meaningful knowledge and without using any semantic or ... -
Text-dependent writer identification for arabic handwriting
( Hindawi Publishing Corporation , 2012 , Article)This paper proposes a system for text-dependent writer identification based on Arabic handwriting. First, a database of words was assembled and used as a test base. Next, features vectors were extracted from writers' word ... -
Text-Independent Speaker Identification Using Vowel Formants
( Springer New York LLC , 2016 , Article)Automatic speaker identification has become a challenging research problem due to its wide variety of applications. Neural networks and audio-visual identification systems can be very powerful, but they have limitations ... -
Text-to-picture tools, systems, and approaches: a survey
( Springer New York LLC , 2019 , Article)Text-to-picture systems attempt to facilitate high-level, user-friendly communication between humans and computers while promoting understanding of natural language. These systems interpret a natural language text and ... -
Texture analysis for colorectal tumour biopsies using multispectral imagery
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)Colorectal cancer is one of the most common cancers in the world. As part of its diagnosis, a histological analysis is often run on biopsy samples. Multispecral imagery taken from cancer tissues can be useful to capture ... -
The 100 most influential persons in history": A data mining perspective
(2011 , Conference Paper)Data mining has been widely applied in various domains; however, there have been limited studies into discovering hidden knowledge from factual data about selected groups of people with special characteristics. It is ... -
The accuracy and efficacy of real-time compressed ECG signal reconstruction on a heterogeneous multicore edge-device
( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)Typical real-time remote health monitoring architectures consist of wearable medical devices continuously transmitting physiological signals to a nearby gateway which routes the data to an remote internet of things ... -
The automation of the development of classification models and improvement of model quality using feature engineering techniques
( Elsevier , 2023 , Article)Recently pipelines of machine learning-based classification models have become important to codify, orchestrate, and automate the workflow to produce an effective machine learning model. In this article, we propose a ...