بحث بسيط
السجلات المعروضة 11 -- 20 من 67
The role of EEG and EMG combined virtual reality gaming system in facial palsy rehabilitation - A case report
(
Churchill Livingstone
, 2019 , Article)
Background
The recovery rates for facial palsy are usually excellent; however, regularly patients present with problems with their fine facial movements that affect their emotional expressions.
Objective
To discover the ...
SOLD: A node-Splitting algorithm for R-tree based on Objects' Locations Distribution
(
SAGE Publications Ltd
, 2019 , Article)
Spatial data indexing methods are of extreme importance as they massively build up as a result of the explosive growth in capturing data with spatial features. No matter how much the data size is, eventually it will reside ...
Challenges and Mitigation of Cyber Threat in Automated Vehicle: An Integrated Approach
(
Institute of Electrical and Electronics Engineers Inc.
, 2018 , Conference Paper)
The technological development of automated vehicles opens novel cybersecurity threats and risks for road safety. Increased connectivity often results in increased risks of a cyber-security attacks, which is one of the ...
SpiralSRA: A threat-specific security risk assessment framework for the cloud
(
Institute of Electrical and Electronics Engineers Inc.
, 2018 , Conference Paper)
Conventional security risk assessment approaches for cloud infrastructures do not explicitly consider risk with respect to specific threats. This is a challenge for a cloud provider because it may apply the same risk ...
Visualization as a mean of big data management: Using Qatar's electricity consumption data
(
Institute of Electrical and Electronics Engineers Inc.
, 2018 , Conference Paper)
Visualization as a mean of big data management is the new century revolution. Managing data has become a great challenge today, as the amount of raw data size is increasing rapidly. For data like electricity consumption, ...
Role updating in information systems using model checking
(
Springer London
, 2017 , Article)
The role-based access control (RBAC) has significantly simplified the management of users and permissions in information systems. In dynamic environments, systems are constantly undergoing changes, and accordingly, the ...
Stateless Security Risk Assessment for Dynamic Networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2018 , Conference Paper)
Emerging networking technologies, such as cloud and Software Defined Networking, provide flexibility, elasticity and functionalities to change the network configurations over time. However, changes also impose unpredictable ...
Short survey of techniques for visualizing events recorded in logs
(
Institute of Electrical and Electronics Engineers Inc.
, 2018 , Conference Paper)
Nowadays, data is being generated in large volumes and the users are left with a staggering amount of textual data that needs to be transformed into information to derive some knowledge from it. However, transforming and ...
Data confidentiality in cloud-based pervasive system
(
Association for Computing Machinery
, 2017 , Conference Paper)
Data confidentiality and privacy is a serious concern in pervasive systems where cloud computing is used to process huge amount of data such as matrix multiplications typically used in HPC. Due to limited processing ...
Parallelizing exact motif finding algorithms on multi-core
(
Springer Science+Business Media
, 2014 , Article)
The motif finding problem is one of the important and challenging problems in bioinformatics. A variety of sequential algorithms have been proposed to find exact motifs, but the running time is still not suitable due to ...