Search
Now showing items 31-40 of 48
An ontology-based system to dynamically extract multimedia elements for children's tutorials
(
IEEE
, 2012 , Conference Paper)
Children with intellectual disabilities are very challenging to teach, and can learn best with the use of different methodologies that engage their senses, such as using images, sounds and clips. In this work, a new ...
MeMaPads: Enhancing children's well-being through a physically interactive memory and math games
(
IEEE
, 2012 , Conference Paper)
Obesity has recently become an epidemic that endangers the well-being of all the modern societies, especially the young generations. The lack of physical activity is considered as one major reason that contributes to such ...
An Arabic-based tutorial system for children with special needs
(
Springer
, 2012 , Conference Paper)
In spite of the current advance of the use of computers in education in the Arab world, complete suites of solutions for students with special needs are very scarce. This paper presents an assistive system managing learning ...
Understanding Simple Stories through Concepts Extraction and Multimedia Elements
(
Springer
, 2012 , Conference Paper)
Teaching children with intellectual disabilities is a challenging task. Instructors use different methodologies and techniques to introduce the concepts of lessons to the children, motivate them and keep them engaged. These ...
Constraint-enhanced role engineering via answer set programming
(
Association for Computing Machinery
, 2012 , Conference Paper)
Role engineering (RE) aims to develop and maintain appropriate role-based access control (RBAC) configurations. However, RE with constraints in place is not well-studied. Constraints usually describe organizations' security ...
Compliance checking for usage-constrained credentials in trust negotiation systems
(
Springer Berlin Heidelberg
, 2012 , Conference Paper)
We propose an approach to placing usage-constraints on RT credentials; issuers specify constraints by designing non-deterministic finite automata. We show by examples that this approach can express constraints of practical ...
Tracking and constraining authorization provenance
(
Springer Berlin Heidelberg
, 2012 , Conference Paper)
Authorization provenance concerns how an authorization is derived. It appears important to define authorization provenance to (1) analyze policy bases, (2) defend against a class of attacks, and (3) audit authorizations. ...
On critical point avoidance among mobile terminals in healthcare monitoring applications: Saving lives through reliable communication software
(
IEEE
, 2012 , Conference Paper)
The advances in Microelectromechanical systems (MEMS), battery life, low powered communication standards, more capable processing units, and hybrid communication have cemented the use of mobile Wireless Body Area Networks ...
Embedded system design with filter bank and fuzzy classification approach to critical cardiac abnormalities detection
(
IEEE
, 2012 , Conference Paper)
Embedded Electrocardiogram (E-ECG) based health diagnosis of cardiac diseases has been a saturated area of research and almost any known heart-condition can be detected and diagnosed by doctors in the hospital setting. ...
Power and task management in wireless body area network based medical monitoring systems
(
Springer Nature
, 2012 , Conference Paper)
Intelligent healthcare systems incorporating wireless sensors in a ubiquitous computing environment have the potential to revolutionize outpatient care. Such systems must balance effective and timely reporting of results ...