Browsing Computer Science & Engineering by Title
Now showing items 1500-1519 of 1670
-
Tag-based personalized recommendation in social media services
( Springer New York LLC , 2016 , Article)Users of ambient intelligence environments have been overwhelmed by the huge numbers of social media available, thus identifying the social media tailored to the user?s need is becoming an important question to be discussed. ... -
Taking advantage of multi-user diversity in OFDM systems
(2013 , Conference Paper)A multi-user diversity approach, called Opportunistic Interference Management (OIM), is considered in connection with Orthogonal Frequency Division Multiplexing (OFDM) systems. The OIM is applied to each consecutive group ... -
TamForen: A tamper-proof cloud forensic framework
( John Wiley and Sons Inc , 2022 , Article)Cloud forensics has become increasingly critical in cloud computing security in recent years. A fundamental problem in cloud forensics is how to safely and effectively obtain, preserve, and analyze evidence. With massive ... -
TangleCV: Decentralized Technique for Secure Message Sharing in Connected Vehicles
( Association for Computing Machinery, Inc , 2019 , Conference Paper)Connected vehicles are designed to make informed safety-related decisions based on data/information they receive from various on-board sensors and other vehicles in the vicinity. However, attacks directed towards on-board ... -
Teaching design project in introductory engineering course using 3D modeling and immersive virtual reality
( Springer Verlag , 2018 , Conference Paper)This paper presents a new approach for delivering the project component in introductory engineering course. The approach is based on using 3D modeling software to create the prototype of the product. Furthermore, immersive ... -
Techniques for calculating software product metrics threshold values: A systematic mapping study
( MDPI , 2021 , Article)Several aspects of software product quality can be assessed and measured using product metrics. Without software metric threshold values, it is difficult to evaluate different aspects of quality. To this end, the interest ... -
A Testbed for Implementing Lightweight Physical Layer Security in an IoT-based Health Monitoring System
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)Telemedicine is a technique that allows patients to have health-related consultations without the need to be physically present in the hospital through phone and video calling technologies. In recent years, researchers ... -
Text categorization using weighted hyper rectangular keyword extraction
( IEEE Computer Society , 2018 , Conference Paper)Text categorization is an important research field that finds many applications nowadays. It is usually performed in two steps: feature extraction and classification. In the feature extraction step, discriminating keywords ... -
Text-dependent writer identification for arabic handwriting
( Hindawi Publishing Corporation , 2012 , Article)This paper proposes a system for text-dependent writer identification based on Arabic handwriting. First, a database of words was assembled and used as a test base. Next, features vectors were extracted from writers' word ... -
Text-Independent Speaker Identification Using Vowel Formants
( Springer New York LLC , 2016 , Article)Automatic speaker identification has become a challenging research problem due to its wide variety of applications. Neural networks and audio-visual identification systems can be very powerful, but they have limitations ... -
Text-to-picture tools, systems, and approaches: a survey
( Springer New York LLC , 2019 , Article)Text-to-picture systems attempt to facilitate high-level, user-friendly communication between humans and computers while promoting understanding of natural language. These systems interpret a natural language text and ... -
Texture analysis for colorectal tumour biopsies using multispectral imagery
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)Colorectal cancer is one of the most common cancers in the world. As part of its diagnosis, a histological analysis is often run on biopsy samples. Multispecral imagery taken from cancer tissues can be useful to capture ... -
The 100 most influential persons in history": A data mining perspective
(2011 , Conference Paper)Data mining has been widely applied in various domains; however, there have been limited studies into discovering hidden knowledge from factual data about selected groups of people with special characteristics. It is ... -
The accuracy and efficacy of real-time compressed ECG signal reconstruction on a heterogeneous multicore edge-device
( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)Typical real-time remote health monitoring architectures consist of wearable medical devices continuously transmitting physiological signals to a nearby gateway which routes the data to an remote internet of things ... -
The automation of the development of classification models and improvement of model quality using feature engineering techniques
( Elsevier , 2023 , Article)Recently pipelines of machine learning-based classification models have become important to codify, orchestrate, and automate the workflow to produce an effective machine learning model. In this article, we propose a ... -
The evolution of scholarly digital library needs in an international environment: Social reference management systems and Qatar
( Springer Verlag , 2013 , Conference Paper)Qatar has become an active research producer of data, publications, and other scholarly works. We studied the evolving scholarly activities and needs of researchers in this relatively new research environment, and compared ... -
The ICDAR2011 Arabic writer identification contest
( IEEE , 2011 , Conference Paper)Arabic writer identification is a very active research field. However, no standard benchmark is available for researchers in this field. The aim of this competition is to gather researchers and compare recent advances in ... -
The impact of inter-layer network coding on the relative performance of MRC/MDC WiFi media delivery
( ACM , 2011 , Conference Paper)A primary challenge in multicasting video in a wireless LAN is to deal with the client diversity - clients may have different channel characteristics and hence receive different numbers of transmissions from the AP. A ... -
The impact of stealthy attacks on smart grid performance: Tradeoffs and implications
( Institute of Electrical and Electronics Engineers Inc. , 2017 , Article)The smart grid is envisioned to significantly enhance the efficiency of energy consumption, by utilizing two-way communication channels between consumers and operators. For example, operators can opportunistically leverage ... -
The inapproximability of illuminating polygons by α-floodlights
( Queen's University, Ontario, Canada , 2015 , Conference Paper)We consider variants of the art gallery problem where guard visibility is limited to a certain angular aperture-. We show that the problem is NP-hard even when guards can be located in the interior of the polygon. We then ...