Computer Science & Engineering: المرسلات الحديثة
السجلات المعروضة 1621 -- 1640 من 2402
-
An e-learning mobile system to generate illustrations for Arabic text
( IEEE Computer Society , 2016 , Conference Paper)Smart devices applications can assist children in improving their learning capabilities and comprehension skills. However most applications are built without taking into consideration the effective needs and background of ... -
Cognitive technology for children with hearing impairments
( IEEE Computer Society , 2016 , Conference Paper)Lack of specialists, speech instructors and sign language instructors in the Arab world have led to the impediment of the education and cognitive development for children with Hearing Impairments (HI). The objective of ... -
Performance analysis of data intensive cloud systems based on data management and replication: a survey
( Springer New York LLC , 2016 , Article)As we delve deeper into the ‘Digital Age’, we witness an explosive growth in the volume, velocity, and variety of the data available on the Internet. For example, in 2012 about 2.5 quintillion bytes of data was created on ... -
Wireless multihoming for smart grid high data rate applications
( IEEE Computer Society , 2016 , Conference Paper)Supervisory control and data acquisition (SCADA) systems are used extensively to monitor/control utility power distribution networks. However, the current SCADA systems cannot accommodate the demand of smart grid high data ... -
Denoising of acoustic partial discharge signals corrupted with random noise
( Institute of Electrical and Electronics Engineers Inc. , 2016 , Article)Power transformers are one of the most important and expensive electrical equipment that require online condition monitoring. Partial discharge (PD) measurement is considered the most effective and non-destructive approach ... -
Unleashing the secure potential of the wireless physical layer: Secret key generation methods
( Elsevier B.V. , 2016 , Report)Within the paradigm of physical layer security, a physical layer characteristic is used as a common source of randomness to generate the secret key. This key is then used to encrypt the data to hide information from ... -
Joint Optimal Placement, Routing, and Flow Assignment in Wireless Sensor Networks for Structural Health Monitoring
( Institute of Electrical and Electronics Engineers Inc. , 2016 , Article)Sensor node placement optimization has a significant role in wireless sensor networks, especially in structural health monitoring. Since sensor node placement affects the routing, optimization should be Jointly done for ... -
Handcrafted features with convolutional neural networks for detection of tumor cells in histology images
( IEEE Computer Society , 2016 , Conference Paper)Detection of tumor nuclei in cancer histology images requires sophisticated techniques due to the irregular shape, size and chromatin texture of the tumor nuclei. Some very recently proposed methods employ deep convolutional ... -
Stain deconvolution of histology images via independent component analysis in the wavelet domain
( IEEE Computer Society , 2016 , Conference Paper)With the ubiquity of digital slide scanners, histology image analysis is rapidly emerging as an active area of research. Several histology image analysis algorithms such as those for mitotic cell detection, nuclei segmentation ... -
Surviving link failures in multicast VN embedded applications
( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)Virtual network embedding (VNE) is defined as the allocation of network resources to multiple virtual networks (VNs) and is recognized to be a challenging task to perform efficiently. Virtual network survivability is a new ... -
Network function virtualization scheduling with transmission delay optimization
( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)To accelerate the implementation of network functions/middle boxes and reduce the deployment cost, recently the concept of Network Function Virtualization (NFV) has emerged and became a topic of much interest attracting ... -
Subspace based network community detection using sparse linear coding
( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)Information mining from networks by identifying communities is an important problem across a number of research fields including social science, biology, physics, and medicine. Most existing community detection algorithms ... -
Guidelines for design and implementation of mobile learning
( IGI Global , 2016 , Book chapter)As technology evolves, there is a shift towards the use of mobile technology to deliver education both on-campus in a blended format and online delivery. This shift is moving at a very fast pace which is a major challenge ... -
Application of a decision model by using an integration of AHP and TOPSIS approaches within humanitarian operation life cycle
( World Scientific Publishing Co. Pte Ltd , 2016 , Article)Emergency logistics is one of the most important parts of disaster relief operations. Quick and adequate decision making in this sector is vital but sometimes hard to achieve. This issue is currently faced by several ... -
ICFHR2016 competition on multi-script writer demographics classification using "qUWI" database
( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)This competition is aimed at classification of writer demographics from offline handwritten documents using the QUWI database. QUWI is a bilingual database comprising writing samples of same individuals in Arabic and ... -
A sparsity-aware approach for NBI estimation and mitigation in large cognitive radio networks
( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)Underlay cognitive networks should follow strict interference thresholds to operate in parallel with primary networks. This constraint limits their transmission power and eventually the coverage area. Therefore, in this ... -
Sparsity-aware narrowband interference mitigation and subcarriers selection in OFDM-based cognitive radio networks
( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)In this paper, the performance of an orthogonal frequency division multiplexing overlay cognitive radio network with subcarrier selection schemes is investigated. We propose three subcarrier selection techniques that reduce ... -
Crosslingual automatic diacritization for Egyptian Colloquial Dialect
( IEEE Computer Society , 2016 , Conference Paper)In this paper, the problem of missing diacritic marks in most of dialectal Arabic written resources is addressed. Our aim is to implement a scalable and extensible platform for automatically retrieving the diacritic marks ... -
Mobile app conceptual browser: Online marketplaces information extraction
( IEEE Computer Society , 2016 , Conference Paper)Online marketplaces are e-commerce websites where thousands of products are provided by multiple third parties. There are dozens of these differently structured marketplaces that need to be visited by the end users to reach ... -
An efficient hybrid prediction approach for predicting cloud consumer resource needs
( IEEE Computer Society , 2016 , Conference Paper)The prediction of cloud consumer resource needs is a vital step for several cloud deployment applications such as capacity planning, workload management, and dynamic allocation of cloud resources. In this paper, we develop ...