تصفح Computer Science & Engineering حسب العنوان
السجلات المعروضة 1824 -- 1843 من 2262
-
Robust human silhouette extraction with Laplacian fitting
( Elsevier , 2014 , Article)Human silhouette extraction has been a primary step to estimate human poses or classify activities from videos. While the accuracy of human silhouettes has great impact on the follow-on human pose/gait estimation, it has ... -
Robust model-free gait recognition by statistical dependency feature selection and Globality-Locality Preserving Projections
( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)Gait recognition aims to identify people through the analysis of the way they walk. The challenge of model-free based gait recognition is to cope with various intra-class variations such as clothing variations and carrying ... -
Robust normalization protocols for multiplexed fluorescence bioimage analysis
( BioMed Central , 2016 , Article)The study of mapping and interaction of co-localized proteins at a sub-cellular level is important for understanding complex biological phenomena. One of the recent techniques to map co-localized proteins is to use the ... -
A Robust Protocol for Smart eHealthcare based on Elliptic Curve Cryptography and Fuzzy logic in IoT
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)Emerging technologies change the qualities of modern healthcare by employing smart systems for patient monitoring. To well use the data surrounding the patient, tiny sensing devices and smart gateways are involved. These ... -
Robust secret key extraction from channel secondary random process
( John Wiley and Sons Ltd , 2016 , Conference Paper)The vast majority of existing secret key generation protocols exploit the inherent randomness of the wireless channel as a common source of randomness. However, independent noise added at the receivers of the legitimate ... -
Robustness analysis of superpixel algorithms to image blur, additive Gaussian noise, and impulse noise
( SPIE , 2017 , Article)Superpixels have gradually become popular in computer vision and image processing applications. However, no comprehensive study has been performed to evaluate the robustness of superpixel algorithms in regard to common ... -
Robustness quantification of hierarchical complex networks under targeted failures
( Elsevier Ltd , 2018 , Article)Robustness is one of the key properties in complex networks to ensure the expected level of performance and service availability in case of perturbations and failures. Network robustness is generally quantified using various ... -
RobustTrust - A Pro-Privacy Robust Distributed Trust Management Mechanism for Internet of Things
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)In the promising time of the Internet, connected things have the ability to communicate and share information. The Internet of Things (IoT) cannot be implemented unless the security-related concerns have been resolved. ... -
Role of contextual properties in enterprise service migration to cloud computing
( John Wiley and Sons Ltd , 2013 , Article Review)This paper attempts to identify the role of contextual properties of enterprise systems architecture in relation to service migration to cloud computing. In a cloud-based service architecture, the shift of ownership, scope, ... -
ROM-based inference method built on deep learning for sleep stage classification
( UIKTEN - Association for Information Communication Technology Education and Science , 2019 , Article)We used a classical deep feedforward neural network (DFFNN) for an automatic sleep stage scoring based on a single-channel EEG signal. We used an open-available dataset, randomly selecting one healthy young adult for both ... -
Round-Robin sequential forward selection algorithm for prostate cancer classification and diagnosis using multispectral imagery
( Springer , 2011 , Article)This paper proposes an automatic classification system for the use in prostate cancer diagnosis. The system aims to detect and classify prostatic tissue textures captured from microscopic samples taken from needle biopsies. ... -
Routing and channel assignment in wireless cooperative networks
( Institute of Electrical and Electronics Engineers Inc. , 2014 , Conference Paper)In recent years, cooperative communication has attracted researchers' attention as it showed a good capability to increase network performance. On the other hand, a cooperative transmission may cause more interference. ... -
Routing and flow rate assignment using multi-objective optimization in wireless sensor networks
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)Wireless sensor networks (WSNs) have shown to be an efficient solution for physical parameters monitoring and activity detection. WSNs are usually designed using single optimization by optimizing one objective function ... -
RR-LADP: A Privacy-Enhanced Federated Learning Scheme for Internet of Everything
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)While the widespread use of ubiquitously connected devices in Internet of Everything (IoE) offers enormous benefits, it also raises serious privacy concerns. Federated learning, as one of the promising solutions to alleviate ... -
RSU cloud and its resource management in support of enhanced vehicular applications
( IEEE , 2014 , Conference Paper)We propose Roadside Unit (RSU) Clouds as a novel way to offer non-safety application with QoS for VANETs. The architecture of RSU Clouds is delineated, and consists of traditional RSUs and specialized micro-datacenters and ... -
RULE BASED RECOMMENDATION SYSTEM: TO SUPPORT CROP LIFECYCLE MANAGEMENT
( Editora Mundos Sociais , 2021 , Article)Crop lifecycle management is important for crop care and maintenance throughout its life. The existing recommendation and expert systems do not provide advice for the entire crop lifecycle. However, each stage of the crop's ... -
Rule-base wearable embedded platform for seizure detection from real EEG data in ambulatory state
( Institute of Electrical and Electronics Engineers Inc. , 2014 , Conference Paper)This paper describes a classification method is presented using an empirical Rule-base System to detect the occurrences of Partial Seizures from Epilepsy data, which can be implemented in any embedded system as a wearable ... -
Salt Generation for Hashing Schemes based on ECG readings for Emergency Access to Implantable Medical Devices
( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)Secure communication in medical devices is a pillar in ensuring patient's safety. However, in emergency cases, this can hinder the recovery of the patient. If an emergency team cannot give themselves access to the IMD ... -
SCADA system testbed for cybersecurity research using machine learning approach
( MDPI AG , 2018 , Article)This paper presents the development of a Supervisory Control and Data Acquisition (SCADA) system testbed used for cybersecurity research. The testbed consists of a water storage tank's control system, which is a stage in ... -
Scalable Containerized Pipeline for Real-time Big Data Analytics
( IEEE Computer Society , 2022 , Conference Paper)With the widespread usage of IoT, processing data streams in real-time have become very important. The traditional data-stream processing systems are inefficient in processing big data for detecting anomalies, classifications, ...