• English
    • العربية
  • English
  • تسجيل الدخول
  • جامعة قطر
  • مكتبة جامعة قطر
  •  الصفحة الرئيسية
  • الوحدات والمجموعات
  • المساعدة
    • إرسال الأعمال الأكاديمية
    • سياسات الناشر
    • أدلة المستخدم
    • الأسئلة الأكثر تكراراً
  • عن المستودع الرقمي
    • الرؤية والرسالة
تصفح Computer Science & Engineering حسب النوع 
  •   مركز المجموعات الرقمية لجامعة قطر
  • المستودع الرقمي لجامعة قطر
  • أكاديمية
  • مساهمة أعضاء هيئة التدريس
  • كلية الهندسة
  • علوم وهندسة الحاسب
  • تصفح Computer Science & Engineering حسب النوع
  • مركز المجموعات الرقمية لجامعة قطر
  • المستودع الرقمي لجامعة قطر
  • أكاديمية
  • مساهمة أعضاء هيئة التدريس
  • كلية الهندسة
  • علوم وهندسة الحاسب
  • تصفح Computer Science & Engineering حسب النوع
  •      
  •  
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    تصفح Computer Science & Engineering حسب النوع "Conference"

    • 0-9
    • A
    • B
    • C
    • D
    • E
    • F
    • G
    • H
    • I
    • J
    • K
    • L
    • M
    • N
    • O
    • P
    • Q
    • R
    • S
    • T
    • U
    • V
    • W
    • X
    • Y
    • Z

    فرز حسب:

    طلب:

    النتائج:

    السجلات المعروضة 1 -- 20 من 1168

    • العنوان
    • تاريخ الاصدار
    • تاريخ الإرسال
    • تصاعدي
    • تنازلي
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100
      • Thumbnail

        3D Beamforming Based on Deep Learning for Secure Communication in 5G and beyond Wireless Networks 

        Yang, Helin; Lam, Kwok Yan; Nie, Jiangtian; Zhao, Jun; Garg, Sahil; Xiao, Liang; Xiong, Zehui; Guizani, Mohsen... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference)
        Three-dimensional (3D) beamforming is a potential technique to enhance communication security of new generation networks such as 5G and beyond. However, it is difficult to achieve optimal beamforming due to the challenges ...
      • Thumbnail

        3D Gaussian Descriptor for Video-based Person Re-Identification 

        Riachy, Chirine; Al-Maadeed, Noor; Organisciak, Daniel; Khelifi, Fouad; Bouridane, Ahmed ( Vaclav Skala Union Agency , 2019 , Conference)
        Despite being often considered less challenging than image-based person re-identification (re-id), video-based person re-id is still appealing as it mimics a more realistic scenario owing to the availability of pedestrian ...
      • 6G Connectivity in Dense Indoor Environments using Beamforming and Frequency Allocation over IEEE 802.11ad 

        Yaacoub, Elias ( Institute of Electrical and Electronics Engineers Inc. (IEEE) , 2021 , Conference)
        The upcoming 6G network is expected to support high data rate services combining the requirements of the 5G enhanced mobile broadband (eMBB) and ultra-reliable and low-latency communications (URLLC) use cases, typically ...
      • Thumbnail

        A BCI m-Learning System 

        Karkar, AbdelGhani; Mohamed, Amr ( Hamad bin Khalifa University Press (HBKU Press) , 2016 , Conference)
        Mobile learning can help in evolving students learning strength and comprehension skills. A connection is required to enable such devices communicate between each other. Brain-Computer Interface (BCI) can read brain signals ...
      • Thumbnail

        A Bilingual Scene-To-Speech Mobile Based Application 

        Karkar A.; Puthren M.; Al-Maadeed S. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference)
        Scene-To-Speech (STS) is the process of recognizing visual objects in a picture or a video to say aloud a descriptive text that represents the scene. The recent advancement in convolution neural network (CNN), a deep ...
      • Thumbnail

        A bio-inspired framework to mitigate dos attacks in software defined networking 

        Rathore, Heena; Samant, Abhay; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference)
        Software Defined Networking (SDN) is an emerging architecture providing services on a priority basis for real-time communication, by pulling out the intelligence from the hardware and developing a better management system ...
      • Thumbnail

        A Broker-Based Manufacturing Supply Chain Integration with Blockchain: Managing Odoo Workflows Using Hyperledger Fabric Smart Contracts 

        Belhi, Abdelhak; Gasmi, Houssem; Hammi, Assam; Bouras, Abdelaziz; Aouni, Belaid; Khalil, Ibrahim... more authors ... less authors ( Springer Science and Business Media Deutschland GmbH , 2022 , Conference)
        Nowadays, Blockchains are considered the go-to solution when it comes to secure and trust-ensuring platforms for critical data exchange. However, integrating this technology with existing systems is quite a challenging ...
      • Thumbnail

        A business collaborative decision making system for network of SMEs 

        Naeem, Muhammad; Moalla, Néjib; Ouzrout, Yacine; Bouras, Abdelaziz ( Springer New York LLC , 2016 , Conference)
        The enterprise collaboration has gain much popularity and strength with the inception of digital revolution. The concept of enterprise collaboration has observed a dynamic and evolving phenomenon of value added chain. This ...
      • Thumbnail

        A Characterization Study of Arabic Twitter Data with a Benchmarking for State-of-the-Art Opinion Mining Models 

        Baly, Ramy; Badaro, Gilbert; El-Khoury, Georges; Moukalled, Rawan; Aoun, Rita; Hajj, Hazem; El-Hajj, Wassim; Habash, Nizar; Shaban, Khaled... more authors ... less authors ( Association for Computational Linguistics (ACL) , 2017 , Conference)
        Opinion mining in Arabic is a challenging task given the rich morphology of the language. The task becomes more challenging when it is applied to Twitter data, which contains additional sources of noise, such as the use ...
      • Thumbnail

        A ciphertext-policy attribute-based encryption scheme with optimized ciphertext size and fast decryption 

        Malluhi, Qutaibah M.; Shikfa, Abdullatif; Trinh, Viet Cuong ( Association for Computing Machinery, Inc , 2017 , Conference)
        We address the problem of ciphertext-policy attribute-based encryption with fine access control, a cryptographic primitive which has many concrete application scenarios such as Pay-TV, e-Health, Cloud Storage and so on. ...
      • Thumbnail

        A Cloud-based Solution for Rapid and Smart Neuropathy Detection 

        Salahuddin, Tooba; Qidwai, Uvais ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference)
        Cloud hosting of software allows easy and quick access to a wider community. In this paper, we propose a cloud-based solution for a smart neuropathy detection system that will benefit the community in three ways. Medical ...
      • A Comb Shape Slot UWB Antenna with Controllable Triple Band Rejection Features for Wimax/Wlan/5G/Satellite Applications 

        Soliman, Md Mohiuddin; Alkaeed, Mahdi; Pervez, Md. Jahedul Alam; Rafi, Ifran Ahmed; Hasan Mahfuz, M.M.; Musa, Ahmed... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference)
        Advent of Ultra-wideband (UWB) technology has been flourished the uses of UWB spectrum (3.1-10.6) GHz accredited by the Federal Communication Commission (FCC) for the diversity of short-range applications. The vital challenge ...
      • Thumbnail

        A combined Cognitive Multimedia Model for children with intellectual disabilities 

        Dandashi, Amal; Alja'am, Jihad M.; Saleh, Moutaz ( IEEE , 2013 , Conference)
        Children with Down syndrome and other developmental disabilities are often faced with intellectual disorders ranging from mild to severe. This study proposes a multimedia-based learning model which combines Mayer's Cognitive ...
      • Thumbnail

        A Combined Decision for Secure Cloud Computing Based on Machine Learning and Past Information 

        Chkirbene Z.; Erbad A.; Hamila R. ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference)
        Cloud computing has been presented as one of the most efficient techniques for hosting and delivering services over the internet. However, even with its wide areas of application, cloud security is still a major concern ...
      • Thumbnail

        A Comparative Study of Machine Learning Approaches for Handwriter Identification 

        Durou A.; Al-Maadeed S.; Aref I.; Bouridane A.; Elbendak M. ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference)
        During the past few years, writer identification has attracted significant interest due to its real-life applications including document analysis, forensics etc. Machine learning algorithms have played an important role ...
      • Thumbnail

        A comprehensive overview on intelligent mechanical systems and its applications 

        David, Shibin; Anand, R.S.; Sheikh, Sarah; Jebapriya, S.; Andrew, J.; Xavier, S. Basil... more authors ... less authors ( Elsevier , 2020 , Conference)
        The serenity of the materials can be reflected from the load applied over them to extract its strength and scope. Perhaps the tender nature of the materials and its behavior such as ductility, hardness, impact resistance, ...
      • Thumbnail

        A cooperative Q-learning approach for distributed resource allocation in multi-user femtocell networks 

        Saad H.; Mohamed A.; El Batt T. ( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference)
        This paper studies distributed interference management for femtocells that share the same frequency band with macrocells. We propose a multi-agent learning technique based on distributed Q-learning, called subcarrier-based ...
      • Thumbnail

        A cooperative Q-learning approach for online power allocation in femtocell networks 

        Saad H.; Mohamed A.; Elbatt T. ( IEEE , 2013 , Conference)
        In this paper, we address the problem of distributed interference management of cognitive femtocells that share the same frequency range with macrocells using distributed multiagent Q-learning. We formulate and solve three ...
      • Thumbnail

        A cost-aware model for risk mitigation in Cloud computing systems 

        Kholidy, Hisham A.; Erradi, Abdelkarim ( IEEE Computer Society , 2016 , Conference)
        Security is an important element in Cloud computing. Intruders may exploit clouds for their advantage. This paper presents a cost-aware model for risk mitigation in cloud computing systems. The proposed model is integrated ...
      • Thumbnail

        A cost-effective 3d acquisition and visualization framework for cultural heritage 

        Ahmed, Hosameldin Osman; Belhi, Abdelhak; Alfaqheri, Taha; Bouras, Abdelaziz; Sadka, Abdul H.; Foufou, Sebti... more authors ... less authors ( Springer Science and Business Media Deutschland GmbH , 2021 , Conference)
        Museums and cultural institutions, in general, are in a constant challenge of adding more value to their collections. The attractiveness of assets is practically tightly related to their value obeying the offer and demand ...

        مركز المجموعات الرقمية لجامعة قطر هو مكتبة رقمية تديرها مكتبة جامعة قطر بدعم من إدارة تقنية المعلومات

        اتصل بنا | ارسل ملاحظاتك
        اتصل بنا | ارسل ملاحظاتك | جامعة قطر

         

         

        الصفحة الرئيسية

        أرسل عملك التابع لجامعة قطر

        تصفح

        محتويات مركز المجموعات الرقمية
          الوحدات والمجموعات تاريخ النشر المؤلف العناوين الموضوع النوع اللغة الناشر
        هذه المجموعة
          تاريخ النشر المؤلف العناوين الموضوع النوع اللغة الناشر

        حسابي

        تسجيل الدخول

        عن المستودع الرقمي

        الرؤية والرسالة

        المساعدة

        إرسال الأعمال الأكاديميةسياسات الناشرأدلة المستخدمالأسئلة الأكثر تكراراً

        مركز المجموعات الرقمية لجامعة قطر هو مكتبة رقمية تديرها مكتبة جامعة قطر بدعم من إدارة تقنية المعلومات

        اتصل بنا | ارسل ملاحظاتك
        اتصل بنا | ارسل ملاحظاتك | جامعة قطر