Search
Now showing items 171-180 of 181
A combined Cognitive Multimedia Model for children with intellectual disabilities
(
IEEE
, 2013 , Conference Paper)
Children with Down syndrome and other developmental disabilities are often faced with intellectual disorders ranging from mild to severe. This study proposes a multimedia-based learning model which combines Mayer's Cognitive ...
An edutainment system for assisting qatari children with moderate intellectual and learning disability through exerting physical activities
(
IEEE
, 2013 , Conference Paper)
Children with Moderate Intellectual Disability (MID) and those with Moderate Learning Disability (MLD) are growing up with extensive exposure to computer technology. Computers and computer-related devices have the potential ...
Distributed binary consensus algorithm in wireless sensor networks with faulty nodes
(
IEEE
, 2013 , Conference Paper)
In sensor networks, consensus is a procedure to enhance the local measurements of the sensors with those of the surrounding nodes, and leads to a final agreement about a common value. The question here is how we can achieve ...
Distributed binary consensus algorithm and wireless sensor network
(
IEEE
, 2013 , Conference Paper)
We consider the design and implementation of the binary consensus algorithm in wireless sensor networks (WSN) under real life environment. This algorithm is applied for the evaluation of a consensus of a measured values ...
On the distributed binary consensus algorithm in wireless sensor networks
(
IEEE
, 2013 , Conference Paper)
We consider the binary consensus problem over the wireless sensor networks (WSN), where each node of the network initially observes one of two states and the aim of each node is to decide which one of the two states was ...
Binary consensus in sensor motes
(
IEEE
, 2013 , Conference Paper)
In this work, we adapt the binary consensus algorithm for use in wireless sensor networks. Binary consensus is used to allow a collection of distributed entities to reach consensus regarding the answer to a binary question ...
Secure cloud services: Matrix multiplication revisited
(
IEEE
, 2013 , Conference Paper)
This paper revisits the issue of secure outsourcing of services. It proposes a data scrambling approach of transforming private data into public without public key encryption in the cloud computing context. The approach ...
Automatic verification of health regulatory compliance in cloud computing
(
IEEE
, 2013 , Conference Paper)
This paper aims to develop an approach that enables cloud computing clients to verify health regulatory compliance claimed by cloud computing providers. In this approach, clients of cloud computing could check automatically ...
Social access control language (SocACL)
(
Association for Computing Machinery
, 2013 , Conference Paper)
Online Social Networks hold vast amounts of readily accessible personal information leaving them particularly vulnerable to privacy breach attacks [6]. With the impact these breaches varying from simply embarrassing the ...
Potential of geothermal energy for electricity generation in Qatar
(
Canadian Institute of Mining, Metallurgy and Petroleum
, 2013 , Conference Paper)
There is general acceptance that climate change, which is the most important challenge facing humanity, is anthropogenic and attributed to fossil fuel consumption. Therefore, improving the performance of our existing energy ...