Search
Now showing items 31-40 of 266
Conceptual Interactive Search Engine Interface for Visually Impaired Web Users
(
IEEE Computer Society
, 2019 , Conference Paper)
The Internet is the main source of information nowadays. Consequently, end users need to be knowledgeable about how to use search engines in order to locate relevant information in a reasonable time with minimal effort. ...
Towards a Hierarchical Multitask Classification Framework for Cultural Heritage
(
IEEE Computer Society
, 2019 , Conference Paper)
Digital technologies such as 3D imaging, data analytics and computer vision opened the door to a large set of applications in cultural heritage. Digital acquisition of a cultural assets takes nowadays a couple of seconds ...
A Scheme for Three-way Secure and Verifiable E-Voting
(
IEEE Computer Society
, 2019 , Conference Paper)
Online voting systems are gaining acceptance with the widespread use of secure web services and cloud computing such as electronic currency and online banking. However, they still face privacy, security and accountability ...
DART: A large dataset of dialectal Arabic tweets
(
European Language Resources Association (ELRA)
, 2019 , Conference Paper)
In this paper, we present a new large manually-annotated multi-dialect dataset of Arabic tweets that is publicly available. The Dialectal ARabic Tweets (DART) dataset has about 25K tweets that are annotated via crowdsourcing ...
EEG-based multi-modal emotion recognition using bag of deep features: An optimal feature selection approach
(
MDPI AG
, 2019 , Article)
Much attention has been paid to the recognition of human emotions with the help of electroencephalogram (EEG) signals based on machine learning technology. Recognizing emotions is a challenging task due to the non-linear ...
Patch-based offline signature verification using one-class hierarchical deep learning
(
Springer Verlag
, 2019 , Article)
Automatic processing of offline signature verification (in general) can be considered as a low-cost solution to problems in biometrics in comparison with other solutions (e. g. fingerprint, face verification, etc.). This ...
Secured Fine-Grained Selective Access to Outsourced Cloud Data in IoT Environments
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
With the vast increase in data transmission due to a large number of information collected by devices, data management, and security has been a challenge for organizations. Many data owners (DOs) outsource their data to ...
Matrix Barcode Based Secure Authentication without Trusting Third Party
(
IEEE Computer Society
, 2019 , Article)
The user creates a JavaScript-enabled bookmark file once and opens this file to generate a QR code every time to use secure servers. The mobile device generates a secret to encrypt his/her credentials and saves it so that ...
Designing an Educational Multimedia System for Supporting Learning Difficulties in Arabic
(
Springer Verlag
, 2019 , Conference Paper)
Nowadays, schools are highly encouraged to use information technology in unconventional manners and also be creative in combining the use of various tools, while maintaining high standards. In spite of the latent advantage ...
Using Bloom Filter to Generate a Physiological Signal-Based Key for Wireless Body Area Networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Wireless body area networks (WBANs) are often used to provide communication services for the data from the body. Since the data in WBANs are always closely related to individuals, they need to be kept secret with integrity. ...