Now showing items 2105-2124 of 2201

    • Up and away: A visually-controlled easy-to-deploy wireless UAV Cyber-Physical testbed 

      Saeed A.; Neishaboori A.; Mohamed A.; Harras K.A. ( IEEE Computer Society , 2014 , Conference Paper)
      Cyber-Physical Systems (CPS) have the promise of presenting the next evolution in computing with potential applications that include aerospace, transportation, and various automation systems. These applications motivate ...
    • Urban air pollution monitoring system with forecasting models 

      Shaban, Khaled Bashir; Kadri, Abdullah; Rezk, Eman ( Institute of Electrical and Electronics Engineers Inc. , 2016 , Article)
      A system for monitoring and forecasting urban air pollution is presented in this paper. The system uses low-cost air-quality monitoring motes that are equipped with an array of gaseous and meteorological sensors. These ...
    • Use of combination of PCA and ANFIS in infarction volume growth rate prediction in ischemic stroke 

      Ali, Rahma; Qidwai, Uvais; Ilyas, Saadat K. ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)
      Stroke is one of the leading causes of death in the world today. Treatment of stroke using a procedure called Decompressive Hemicraniectomy requires the patient to undergo multiple CT scans in order to determine the size ...
    • Use of mobile learning apps in workplace learning 

      Ally, Mohamed; Samaka, Mohammed; Ismail, Loay; Impagliazzo, John ( IEEE Computer Society , 2013 , Article)
      Organizations are starting to use mobile learning to train workers and to provide professional development of workers so that they can function on the job. The training can be delivered using mobile apps which provides the ...
    • User privacy and data trustworthiness in mobile crowd sensing 

      He, Daojing; Chan, Sammy; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Article)
      Smartphones and other trendy mobile wearable devices are rapidly becoming the dominant sensing, computing and communication devices in peoples' daily lives. Mobile crowd sensing is an emerging technology based on the sensing ...
    • User Scheduling in Federated Learning over Energy Harvesting Wireless Networks 

      Hamdi, Rami; Chen, Mingzhe; Ben Said, Ahmed; Qaraqe, Marwa; Poor, H. Vincent ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)
      In this paper, the deployment of federated learning (FL) is investigated in an energy harvesting wireless network in which the base station (BS) is equipped with a massive multiple-input multiple-output (MIMO) system and ...
    • User-centric network selection in multi-RAT systems 

      Awad, Alaa; Mohamed, Amr; Chiasserini, Carla-Fabiana ( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)
      Rising numbers of mobile devices and wireless access technologies motivate network operators to leverage spectrum across multiple radio access networks, in order to significantly enhance quality of service as well as network ...
    • Using a PBL authoring tool to train teachers in designing an online PBL unit 

      Miao, Yongwu; Samaka, Mohammed; Wang, Disi; Ali, Zeyad; Romanowski, Michael H. ( Asia-Pacific Society for Computers in Education , 2014 , Conference Paper)
      Problem-based learning (PBL) is proposed as one of the most well-known alternatives to subject-based learning in educating graduates to become independent workers, critical thinkers, problem solvers, lifelong learners, and ...
    • Using an outcome-based approach to assess computing programs 

      Impagliazzo, John ( ACM New York, NY, USA , 2007 , Poster)
      In this poster, the author provides a pictorial demonstration of the elements associated with assessment and its relationship to the newly developed requirements by accrediting agencies in various countries. The presentation ...
    • Using block cipher for confidentiality of images in cloud-based systems 

      Rihan, Rana Adnan; Khan, Khaled M. ( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)
      This paper deals with outsourcing of computing to cloud servers where clients' images are computed and stored. It proposes a technique that obfuscates images before sending them to servers. Cloud servers can perform ...
    • Using Bloom Filter to Generate a Physiological Signal-Based Key for Wireless Body Area Networks 

      Yao X.; Liao W.; Du X.; Cheng X.; Guizani M. ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)
      Wireless body area networks (WBANs) are often used to provide communication services for the data from the body. Since the data in WBANs are always closely related to individuals, they need to be kept secret with integrity. ...
    • Using casual reasoning for anomaly detection among ECG live data streams in ubiquitous healthcare monitoring systems 

      Qidwai U.; Chaudhry J.; Jabbar S.; Zeeshan H.M.A.; Janjua N.; ... more authors ( Springer Verlag , 2019 , Article)
      Anomalies in cardiac functionality can be fatal. Early detection of these anomalies, and in many cases their precursors, can save lives. The probability of the occurrence of these anomalies is extremely among people with ...
    • Using codebooks generated from text skeletonization for forensic writer identification 

      Al-Maadeed, Somaya; Hassane A.; Bouridan A. ( IEEE Computer Society , 2014 , Conference Paper)
      In this paper, we propose a novel approach for writer identification using codebook generation based on text skeletonization.Unlike other schemes, the skeleton in this approach is segmented at its junction pixels into ...
    • Using conceptual reasoning for inconsistencies detection in islamic advisory opinion (Fatwas) 

      Al Otaibi, Jameela; Elloumi, Samir; Jaoua, Ali; Hassaine, Abdelali ( IEEE Computer Society , 2016 , Conference Paper)
      The Islamic websites play an important role in disseminating Islamic knowledge and information about Islamic ruling. Their number and the content they provide is continuously increasing which require in-depth investigations ...
    • Using Context Specific Generative Adversarial Networks for Audio Data Completion 

      Maayah, Marina; Al-Ali, Abdulaziz; Belhi, Abdelhak ( IEEE Explore , 2023 , Conference Paper)
      Audio quality plays an essential role in several applications ranging from music to voice conversations. Sound information is subject to quality loss caused by reasons such as intermittent network connections, or storage ...
    • Using Deep Learning to Predict Stock Movements Direction in Emerging Markets: The Case of Qatar Stock Exchange 

      Alhazbi, Saleh; Ben Said, Ahmed; Al-Maadid, Alanoud ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      Deep learning approaches have been utilized to predict stocks. In this study, we use convolutional neural network (CNN) to predict stocks direction in Qatar stock exchange (QE) as a case of emerging markets. Prediction in ...
    • Using Financial Options for Pricing of IaaS Cloud Resources 

      Erradi, Abdelkarim; Sharma, Bhanu; Bouguettaya, Athman ( IEEE Computer Society , 2017 , Conference Paper)
      IaaS cloud resources are offered by cloud providers using various pricing schemes such as reservation, scheduled, on-demand and spot pricing. Such pricing models suffer from either wasteful payment in case of underutilization ...
    • Using flipped classroom approach to teach computer programming 

      Alhazbi, Saleh ( IEEE , 2016 , Conference Paper)
      Flipped classroom approach has been increasingly adopted in higher institutions. Although this approach has many advantages, there are also many challenges that should be considered. In this paper, we discuss the suitability ...
    • Using fringes for minimal conceptual decomposition of binary contexts 

      JAOUA, ALI; SALAH, MOHAMED; YAHIA, SADOK BEN; AL-JA'AM, JIHAD M. ( World Scientific Publishing Co. Pte Ltd , 2012 , Article)
      Extracting knowledge from huge data in a reasonable time is still a challenging problem. Most real data (structured or not) can be mapped to an equivalent binary context, with or without using a scaling method, as for ...
    • Using geodesic space density gradients for network community detection 

      Mahmood, Arif; Small, Michael; Al-Maadeed, Somaya Ali; Rajpoot, Nasir ( IEEE Computer Society , 2017 , Article)
      Many real world complex systems naturally map to network data structures instead of geometric spaces because the only available information is the presence or absence of a link between two entities in the system. To enable ...