Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Engineering

Sparse General Non-Negative Matrix Factorization Based On Left Semi-Tensor Product, Zigang Chen, Lixiang Li, Haipeng Peng, Yuhong Liu, Haihua Zhu, Yixian Yang Jun 2019

Sparse General Non-Negative Matrix Factorization Based On Left Semi-Tensor Product, Zigang Chen, Lixiang Li, Haipeng Peng, Yuhong Liu, Haihua Zhu, Yixian Yang

Computer Science and Engineering

The dimension reduction of large scale high-dimensional data is a challenging task, especially the dimension reduction of face data and the accuracy increment of face recognition in the large scale face recognition system, which may cause large storage space and long recognition time. In order to further reduce the recognition time and the storage space in the large scale face recognition systems, on the basis of the general non-negative matrix factorization based on left semi-tensor (GNMFL) without dimension matching constraints proposed in our previous work, we propose a sparse GNMFL/L (SGNMFL/L) to decompose a large number of face data sets …


Interoperable E-Infrastructure Services In Arabia, Salem Al-Agtash, Roberto Barbera May 2019

Interoperable E-Infrastructure Services In Arabia, Salem Al-Agtash, Roberto Barbera

Computer Science and Engineering

e-Infrastructures became critical platforms that integrate computational resources, facilities and repositories globally. The coordination and harmonization of advanced e-Infrastructure project developed with partners from Europe, Latin America, Arabia, Africa, China, and India contributed to developing interoperable platforms based on identity federation and science gateway technologies. This paper presents these technologies to support key services in the development of Arabia networking and services platform for research and education. The platform provides scientists, teachers, and students with seamless access to a variety of advanced resources, services, and applications available at regional e-Infrastructures in Europe and elsewhere. Users simply enter the credentials provided …


Internationalization Context Of Arabia Higher Education, Salem Al-Agtash, Labib Khadra Apr 2019

Internationalization Context Of Arabia Higher Education, Salem Al-Agtash, Labib Khadra

Computer Science and Engineering

Internationalization in Arabia higher education space is expanding rapidly. It has taken different shapes with no systematic approach to evaluate its success and impact. By analysing patterns of mobility; trends; and forms of academic cooperation in Arabia, a framework for internationalization is introduced. The purpose is to guide efforts towards a strengthened position of higher education in the international dimension. Internationalization promotes the idea of making the university a dynamic cross-boarder educational environment. The higher education space in Arabia is analysed mainly in the internationalization perspective. The German Jordanian University is presented as an illustrative example. The objective is to …


An Extensive Game-Based Resource Allocation For Securing D2d Underlay Communications, Oleksii Rudenko, Yuhong Liu, Chenwei Wang, Susanto Rahardja Mar 2019

An Extensive Game-Based Resource Allocation For Securing D2d Underlay Communications, Oleksii Rudenko, Yuhong Liu, Chenwei Wang, Susanto Rahardja

Computer Science and Engineering

Device-to-device (D2D) communication has been increasingly attractive due to its great potential to improve cellular communication performance. While resource allocation optimization for improving the spectrum efficiency is of interest in the D2D-related work, communication security, as a key issue in the system design, has not been well investigated yet. Recently, a few studies have shown that D2D users can actually serve as friendly jammers to help enhance the security of cellular user communication against eavesdropping attacks. However, only a few studies considered the security of D2D communications. In this paper, we consider the secure resource allocation problem, particularly, how to …