Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 43

Full-Text Articles in Physical Sciences and Mathematics

Enhanced Label Noise Filtering With Multiple Voting, Donghai Guan, Maqbool Hussain, Weiwei Yuan, Asad Masood Khattak, Muhammad Fahim, Wajahat Ali Khan Dec 2019

Enhanced Label Noise Filtering With Multiple Voting, Donghai Guan, Maqbool Hussain, Weiwei Yuan, Asad Masood Khattak, Muhammad Fahim, Wajahat Ali Khan

All Works

© 2019 by the authors. Label noises exist in many applications, and their presence can degrade learning performance. Researchers usually use filters to identify and eliminate them prior to training. The ensemble learning based filter (EnFilter) is the most widely used filter. According to the voting mechanism, EnFilter is mainly divided into two types: single-voting based (SVFilter) and multiple-voting based (MVFilter). In general, MVFilter is more often preferred because multiple-voting could address the intrinsic limitations of single-voting. However, the most important unsolved issue in MVFilter is how to determine the optimal decision point (ODP). Conceptually, the decision point is a …


Pathological Comparisons Of The Hippocampal Changes In The Transient And Permanent Middle Cerebral Artery Occlusion Rat Models, Fawad Ali Shah, Tao Li, Lina Tariq Al Kury, Alam Zeb, Shehla Khatoon, Gongping Liu, Xifei Yang, Fang Liu, Huo Yao, Arif Ullah Khan, Phil Ok Koh, Yuhua Jiang, Shupeng Li Nov 2019

Pathological Comparisons Of The Hippocampal Changes In The Transient And Permanent Middle Cerebral Artery Occlusion Rat Models, Fawad Ali Shah, Tao Li, Lina Tariq Al Kury, Alam Zeb, Shehla Khatoon, Gongping Liu, Xifei Yang, Fang Liu, Huo Yao, Arif Ullah Khan, Phil Ok Koh, Yuhua Jiang, Shupeng Li

All Works

© Copyright © 2019 Shah, Li, Kury, Zeb, Khatoon, Liu, Yang, Liu, Yao, Khan, Koh, Jiang and Li. Ischemic strokes are categorized by permanent or transient obstruction of blood flow, which impedes delivery of oxygen and essential nutrients to brain. In the last decade, the therapeutic window for tPA has increased from 3 to 5–6 h, and a new technique, involving the mechanical removal of the clot (endovascular thrombectomy) to allow reperfusion of the injured area, is being used more often. This last therapeutic approach can be done until 24 h after stroke onset. Due to this fact, more acute …


Biorthogonal-Wavelet-Based Method For Numerical Solution Of Volterra Integral Equations, Mutaz Mohammad Nov 2019

Biorthogonal-Wavelet-Based Method For Numerical Solution Of Volterra Integral Equations, Mutaz Mohammad

All Works

© 2019 by the authors. Framelets theory has been well studied in many applications in image processing, data recovery and computational analysis due to the key properties of framelets such as sparse representation and accuracy in coefficients recovery in the area of numerical and computational theory. This work is devoted to shedding some light on the benefits of using such framelets in the area of numerical computations of integral equations. We introduce a new numerical method for solving Volterra integral equations. It is based on pseudo-spline quasi-affine tight framelet systems generated via the oblique extension principles. The resulting system is …


Fog Computing Enabling Industrial Internet Of Things: State-Of-The-Art And Research Challenges, Rabeea Basir, Saad Qaisar, Mudassar Ali, Monther Aldwairi, Muhammad Ikram Ashraf, Aamir Mahmood, Mikael Gidlund Nov 2019

Fog Computing Enabling Industrial Internet Of Things: State-Of-The-Art And Research Challenges, Rabeea Basir, Saad Qaisar, Mudassar Ali, Monther Aldwairi, Muhammad Ikram Ashraf, Aamir Mahmood, Mikael Gidlund

All Works

© 2019 by the authors. Licensee MDPI, Basel, Switzerland. Industry is going through a transformation phase, enabling automation and data exchange in manufacturing technologies and processes, and this transformation is called Industry 4.0. Industrial Internet-of-Things (IIoT) applications require real-time processing, near-by storage, ultra-low latency, reliability and high data rate, all of which can be satisfied by fog computing architecture. With smart devices expected to grow exponentially, the need for an optimized fog computing architecture and protocols is crucial. Therein, efficient, intelligent and decentralized solutions are required to ensure real-time connectivity, reliability and green communication. In this paper, we provide a …


Follow-Up Decision Support Tool For Public Healthcare: A Design Research Perspective, Shah J. Miah, Najmul Hasan, John Gammack Oct 2019

Follow-Up Decision Support Tool For Public Healthcare: A Design Research Perspective, Shah J. Miah, Najmul Hasan, John Gammack

All Works

© 2019, Korean Society of Medical Informatics. All rights reserved. Objectives: Mobile health (m-Health) technologies may provide an appropriate follow-up support service for patient groups with post-treatment conditions. While previous studies have introduced m-Health methods for patient care, a smart system that may provide follow-up communication and decision support remains limited to the management of a few specific types of diseases. This paper introduces an m-Health solution in the current climate of increased demand for electronic information exchange. Methods: Adopting a novel design science research approach, we developed an innovative solution model for post-treatment follow-up decision support interaction for use …


Dimensions Of 'Socio' Vulnerabilities Of Advanced Persistent Threats, Mathew Nicho, Christopher D. Mcdermott Sep 2019

Dimensions Of 'Socio' Vulnerabilities Of Advanced Persistent Threats, Mathew Nicho, Christopher D. Mcdermott

All Works

© 2019 University of Split, FESB. Advanced Persistent Threats (APT) are highly targeted and sophisticated multi-stage attacks, utilizing zero day or near zero-day malware. Directed at internetworked computer users in the workplace, their growth and prevalence can be attributed to both socio (human) and technical (system weaknesses and inadequate cyber defenses) vulnerabilities. While many APT attacks incorporate a blend of socio-technical vulnerabilities, academic research and reported incidents largely depict the user as the prominent contributing factor that can weaken the layers of technical security in an organization. In this paper, our objective is to explore multiple dimensions of socio factors …


A New Approach To Information Extraction In User-Centric E-Recruitment Systems, Malik Nabeel Ahmed Awan, Sharifullah Khan, Khalid Latif, Asad Masood Khattak Jul 2019

A New Approach To Information Extraction In User-Centric E-Recruitment Systems, Malik Nabeel Ahmed Awan, Sharifullah Khan, Khalid Latif, Asad Masood Khattak

All Works

In modern society, people are heavily reliant on information available online through various channels, such as websites, social media, and web portals. Examples include searching for product prices, news, weather, and jobs. This paper focuses on an area of information extraction in e-recruitment, or job searching, which is increasingly used by a large population of users in across the world. Given the enormous volume of information related to job descriptions and users’ profiles, it is complicated to appropriately match a user’s profile with a job description, and vice versa. Existing information extraction techniques are unable to extract contextual entities. Thus, …


Role Of Outer Membrane Permeability, Efflux Mechanism, And Carbapenemases In Carbapenem-Nonsusceptible Pseudomonas Aeruginosa From Dubai Hospitals: Results Of The First Cross-Sectional Survey, Carole Ayoub Moubareck, Dalal Hammoudi Halat, Charbel Akkawi, Anju Nabi, Mouza A. Alsharhan, Zulfa O. Aldeesi, Christabel C. Peters, Handan Celiloglu, Dolla Karam Sarkis Jul 2019

Role Of Outer Membrane Permeability, Efflux Mechanism, And Carbapenemases In Carbapenem-Nonsusceptible Pseudomonas Aeruginosa From Dubai Hospitals: Results Of The First Cross-Sectional Survey, Carole Ayoub Moubareck, Dalal Hammoudi Halat, Charbel Akkawi, Anju Nabi, Mouza A. Alsharhan, Zulfa O. Aldeesi, Christabel C. Peters, Handan Celiloglu, Dolla Karam Sarkis

All Works

© 2019 The Authors Objectives: Carbapenem resistance in Pseudomonas aeruginosa is growing and results from variable mechanisms. The objectives of the current study were to investigate mechanisms of carbapenem resistance and genetic relatedness of P. aeruginosa isolates recovered in Dubai hospitals. Methods: From June 2015 through June 2016, carbapenem-nonsusceptible P. aeruginosa were collected from 4 hospitals in Dubai, and subjected to antimicrobial susceptibility testing, molecular investigation of carbapenemases by PCR-sequencing, analysis of outer membrane porin OprD2 and multidrug efflux channel MexAB-OprM levels by qPCR, and fingerprinting by ERIC-PCR. Results: Out of 1969 P. aeruginosa isolated during the study period, 471 …


A Numerical Solution Of Fredholm Integral Equations Of The Second Kind Based On Tight Framelets Generated By The Oblique Extension Principle, Mutaz Mohammad Jul 2019

A Numerical Solution Of Fredholm Integral Equations Of The Second Kind Based On Tight Framelets Generated By The Oblique Extension Principle, Mutaz Mohammad

All Works

© 2019 by the authors. In this paper, we present a new computational method for solving linear Fredholm integral equations of the second kind, which is based on the use of B-spline quasi-affine tight framelet systems generated by the unitary and oblique extension principles. We convert the integral equation to a system of linear equations. We provide an example of the construction of quasi-affine tight framelet systems. We also give some numerical evidence to illustrate our method. The numerical results confirm that the method is efficient, very effective and accurate.


Cross-Company Customer Churn Prediction In Telecommunication: A Comparison Of Data Transformation Methods, Adnan Amin, Babar Shah, Asad Masood Khattak, Fernando Joaquim Lopes Moreira, Gohar Ali, Alvaro Rocha, Sajid Anwar Jun 2019

Cross-Company Customer Churn Prediction In Telecommunication: A Comparison Of Data Transformation Methods, Adnan Amin, Babar Shah, Asad Masood Khattak, Fernando Joaquim Lopes Moreira, Gohar Ali, Alvaro Rocha, Sajid Anwar

All Works

© 2018 Elsevier Ltd Cross-Company Churn Prediction (CCCP) is a domain of research where one company (target) is lacking enough data and can use data from another company (source) to predict customer churn successfully. To support CCCP, the cross-company data is usually transformed to a set of similar normal distribution of target company data prior to building a CCCP model. However, it is still unclear which data transformation method is most effective in CCCP. Also, the impact of data transformation methods on CCCP model performance using different classifiers have not been comprehensively explored in the telecommunication sector. In this study, …


Triplet Loss Network For Unsupervised Domain Adaptation, Imad Eddine Ibrahim Bekkouch, Youssef Youssry, Rustam Gafarov, Adil Khan, Asad Masood Khattak May 2019

Triplet Loss Network For Unsupervised Domain Adaptation, Imad Eddine Ibrahim Bekkouch, Youssef Youssry, Rustam Gafarov, Adil Khan, Asad Masood Khattak

All Works

© 2019 by the authors. Domain adaptation is a sub-field of transfer learning that aims at bridging the dissimilarity gap between different domains by transferring and re-using the knowledge obtained in the source domain to the target domain. Many methods have been proposed to resolve this problem, using techniques such as generative adversarial networks (GAN), but the complexity of such methods makes it hard to use them in different problems, as fine-tuning such networks is usually a time-consuming task. In this paper, we propose a method for unsupervised domain adaptation that is both simple and effective. Our model (referred to …


A Fina Világbajnokság (2017) Önkénteseinek Szerepe Budapest Sportturizmusában, Viktória Szenyéri, Gábor Michalkó, Anestis Fotiadis Apr 2019

A Fina Világbajnokság (2017) Önkénteseinek Szerepe Budapest Sportturizmusában, Viktória Szenyéri, Gábor Michalkó, Anestis Fotiadis

All Works

Volunteers are indispensable in the organization of international mega sport events. Their activity is really important not only during these world-level meetings, but also after the competition has ended, as they play an important role in furthering the life of the events and in maintaining interest in the host location. Although the practice of volunteering in Hungary is still in its infancy, its social status and popularity are developing dynamically. The 2017 FINA Championships in Budapest is considered to be a milestone in the evolution of Hungarian volunteer work. The volunteers took part in a variety of roles in order …


The Security Of Big Data In Fog-Enabled Iot Applications Including Blockchain: A Survey, Noshina Tariq, Muhammad Asim, Feras Al-Obeidat, Muhammad Zubair Farooqi, Thar Baker, Mohammad Hammoudeh, Ibrahim Ghafir Apr 2019

The Security Of Big Data In Fog-Enabled Iot Applications Including Blockchain: A Survey, Noshina Tariq, Muhammad Asim, Feras Al-Obeidat, Muhammad Zubair Farooqi, Thar Baker, Mohammad Hammoudeh, Ibrahim Ghafir

All Works

© 2019 by the authors. Licensee MDPI, Basel, Switzerland. The proliferation of inter-connected devices in critical industries, such as healthcare and power grid, is changing the perception of what constitutes critical infrastructure. The rising interconnectedness of new critical industries is driven by the growing demand for seamless access to information as the world becomes more mobile and connected and as the Internet of Things (IoT) grows. Critical industries are essential to the foundation of today’s society, and interruption of service in any of these sectors can reverberate through other sectors and even around the globe. In today’s hyper-connected world, the …


Wireless Sensor Networks For Big Data Systems, Beom Su Kim, Ki Il Kim, Babar Shah, Francis Chow, Kyong Hoon Kim Apr 2019

Wireless Sensor Networks For Big Data Systems, Beom Su Kim, Ki Il Kim, Babar Shah, Francis Chow, Kyong Hoon Kim

All Works

© 2019 by the authors. Licensee MDPI, Basel, Switzerland. Before discovering meaningful knowledge from big data systems, it is first necessary to build a data-gathering infrastructure. Among many feasible data sources, wireless sensor networks (WSNs) are rich big data sources: a large amount of data is generated by various sensor nodes in large-scale networks. However, unlike typical wireless networks, WSNs have serious deficiencies in terms of data reliability and communication owing to the limited capabilities of the nodes. Moreover, a considerable amount of sensed data are of no interest, meaningless, and redundant when a large number of sensor nodes is …


Compromised User Credentials Detection In A Digital Enterprise Using Behavioral Analytics, Saleh Shah, Babar Shah, Adnan Amin, Feras Al-Obeidat, Francis Chow, Fernando Joaquim Lopes Moreira, Sajid Anwar Apr 2019

Compromised User Credentials Detection In A Digital Enterprise Using Behavioral Analytics, Saleh Shah, Babar Shah, Adnan Amin, Feras Al-Obeidat, Francis Chow, Fernando Joaquim Lopes Moreira, Sajid Anwar

All Works

© 2018 In today's digital age, the digital transformation is necessary for almost every competitive enterprise in terms of having access to the best resources and ensuring customer satisfaction. However, due to such rewards, these enterprises are facing key concerns around the risk of next-generation data security or cybercrime which is continually increasing issue due to the digital transformation four essential pillars—cloud computing, big data analytics, social and mobile computing. Data transformation-driven enterprises should ready to handle this next-generation data security problem, in particular, the compromised user credential (CUC). When an intruder or cybercriminal develops trust relationships as a legitimate …


Enhancing The Teaching And Learning Process Using Video Streaming Servers And Forecasting Techniques, Raza Hasan, Sellappan Palaniappan, Salman Mahmood, Babar Shah, Ali Abbas, Kamal Uddin Sarker Apr 2019

Enhancing The Teaching And Learning Process Using Video Streaming Servers And Forecasting Techniques, Raza Hasan, Sellappan Palaniappan, Salman Mahmood, Babar Shah, Ali Abbas, Kamal Uddin Sarker

All Works

© 2019 by the authors. Higher educational institutes (HEI) are adopting ubiquitous and smart equipment such as mobile devices or digital gadgets to deliver educational content in a more effective manner than the traditional approaches. In present works, a lot of smart classroom approaches have been developed, however, the student learning experience is not yet fully explored. Moreover, module historical data over time is not considered which could provide insight into the possible outcomes in the future, leading new improvements and working as an early detection method for the future results within the module. This paper proposes a framework by …


Meanings, Dimensions, And Categories Of Mathematics Teacher Beliefs: A Navigation Through The Literature, Shashidhar Belbase Mar 2019

Meanings, Dimensions, And Categories Of Mathematics Teacher Beliefs: A Navigation Through The Literature, Shashidhar Belbase

All Works

This paper aimed to discuss the meanings, dimensions, and categories of teacher beliefs about teaching and learning mathematics. I reviewed the relevant literature about teacher beliefs in general, beliefs about mathematics, and beliefs about mathematics teaching and learning in particular. Based on the review of the literature, I outlined the meanings of teacher beliefs and conceptualized three dimensions of teacher beliefs "“ affective dimension, cognitive dimension, and pedagogical dimension. Then, I discussed three viewpoints to observe teacher beliefs "“ relational, institutional, and praxis lenses. I utilized these lenses to categorize belief constructs into three classes of beliefs about mathematics, teaching …


Emerging Insights Of Health Informatics Research: A Literature Analysis For Outlining New Themes, Shah Miah, Jun Shen, John W Lamp, Don Kerr, John Gammack Feb 2019

Emerging Insights Of Health Informatics Research: A Literature Analysis For Outlining New Themes, Shah Miah, Jun Shen, John W Lamp, Don Kerr, John Gammack

All Works

This paper presents a contemporary literature review to provide insights into the current health informatics literature. The objective of this study is to identify emerging directions of current health informatics research from the latest and existing studies in the health informatics domain. We analyse existing health informatics studies using a thematic analysis, so that justified sets of research agenda can be outlined on the basis of these findings. We selected articles that are published in the science direct online database. The selected 73 sample articles (published from 2014 to 2018 in premier health informatics journals) are considered as representative samples …


A Lightweight Perceptron-Based Intrusion Detection System For Fog Computing, Belal Sudqi Khater, Ainuddin Wahid Bin Abdul Wahab, Mohd Yamani Idna Bin Idris, Mohammed Abdulla Hussain, Ashraf Ahmed Ibrahim Jan 2019

A Lightweight Perceptron-Based Intrusion Detection System For Fog Computing, Belal Sudqi Khater, Ainuddin Wahid Bin Abdul Wahab, Mohd Yamani Idna Bin Idris, Mohammed Abdulla Hussain, Ashraf Ahmed Ibrahim

All Works

© 2019 by the authors. Fog computing is a paradigm that extends cloud computing and services to the edge of the network in order to address the inherent problems of the cloud, such as latency and lack of mobility support and location-awareness. The fog is a decentralized platform capable of operating and processing data locally and can be installed in heterogeneous hardware which makes it ideal for Internet of Things (IoT) applications. Intrusion Detection Systems (IDSs) are an integral part of any security system for fog and IoT networks to ensure the quality of service. Due to the resource limitations …


Integrated Database System With Spatial Information For Disaster Risk Management, Ever Enrique Castillo Osorio, Bashir Hayat, Babar Shah, Francis Chow, Ki Il Kim Jan 2019

Integrated Database System With Spatial Information For Disaster Risk Management, Ever Enrique Castillo Osorio, Bashir Hayat, Babar Shah, Francis Chow, Ki Il Kim

All Works

© 2019 AECE. Despite availability of various image sources for specific areas, a new disaster management system is likely to be implemented by using only one of them. Thus, its applicability and extensibility are severely limited. In addition, real-time update for the disaster area is one of the crucial functions for search and rescue activities. To meet the aforementioned requirements, in this paper, we propose a new spatial data infrastructure by defining the methodological scheme for the raster information. The proposed system has four respective layers to reduce the management cost as well as provide a flexible architecture. In each …


Effect Of Consumer Innovativeness On New Product Purchase Intentions Through Learning Process And Perceived Value, Salem A. Al-Jundi, Ahmed Shuhaiber, Reshmi Augustine Jan 2019

Effect Of Consumer Innovativeness On New Product Purchase Intentions Through Learning Process And Perceived Value, Salem A. Al-Jundi, Ahmed Shuhaiber, Reshmi Augustine

All Works

© 2019, © 2019 The Author(s). This open access article is distributed under a Creative Commons Attribution (CC-BY) 4.0 license. Prior research on the impact of consumer innovativeness on new product purchase intentions experienced confusion about the definition of innovativeness and the interest in a specific domain. To fill the gaps, this study builds a new model to examine the multivariate effects of different variables on new product purchase intentions in general and the interplay between all latent variables. We tested a sample of 438 responses that reflect the perspectives of the public in the Emirate of Abu Dhabi, United …


Wordnet-Based Criminal Networks Mining For Cybercrime Investigation, Farkhund Iqbal, Benjamin C.M. Fung, Mourad Debbabi, Rabia Batool, Andrew Marrington Jan 2019

Wordnet-Based Criminal Networks Mining For Cybercrime Investigation, Farkhund Iqbal, Benjamin C.M. Fung, Mourad Debbabi, Rabia Batool, Andrew Marrington

All Works

© 2019 IEEE. Cybercriminals exploit the opportunities provided by the information revolution and social media to communicate and conduct underground illicit activities, such as online fraudulence, cyber predation, cyberbullying, hacking, blackmailing, and drug smuggling. To combat the increasing number of criminal activities, structure and content analysis of criminal communities can provide insight and facilitate cybercrime forensics. In this paper, we propose a framework to analyze chat logs for crime investigation using data mining and natural language processing techniques. The proposed framework extracts the social network from chat logs and summarizes conversation into topics. The crime investigator can use information visualizer …


Non-Orthogonal Radio Resource Management For Rf Energy Harvested 5g Networks, Mehak Basharat, Muhammad Naeem, Waleed Ejaz, Asad Masood Khattak, Alagan Anpalagan, Omar Alfandi, Hyung Seok Kim Jan 2019

Non-Orthogonal Radio Resource Management For Rf Energy Harvested 5g Networks, Mehak Basharat, Muhammad Naeem, Waleed Ejaz, Asad Masood Khattak, Alagan Anpalagan, Omar Alfandi, Hyung Seok Kim

All Works

© 2013 IEEE. Fifth generation (5G) networks are expected to support a large number of devices, provide spectral efficiency and energy efficiency. Non-orthogonal multiple access (NOMA) has been recently investigated to accommodate a large number of devices as well as spectral efficiency. On the other hand, energy efficiency in 5G networks can be addressed using energy harvesting. In this paper, we investigate NOMA in 5G networks with RF energy harvesting to maximize the number of admitted users as well as system throughput. We model a mathematical framework to optimize user grouping, power allocation, and time allocation for information transfer and …


Hicss - Modeling Privacy Preservation In Smart Connected Toys By Petri-Nets, Benjamin Yankson, Farkhund Iqbal, Zhihui Lu, Xiaoling Wang, Patrick Hung Jan 2019

Hicss - Modeling Privacy Preservation In Smart Connected Toys By Petri-Nets, Benjamin Yankson, Farkhund Iqbal, Zhihui Lu, Xiaoling Wang, Patrick Hung

All Works

No abstract provided.


Neuroprotective Effects Of Melatonin And Celecoxib Against Ethanol-Induced Neurodegeneration: A Computational And Pharmacological Approach, Lina T. Al Kury, Alam Zeb, Zain Ul Abidin, Nadeem Irshad, Imran Malik, Arooj Mohsin Alvi, Atif Ali Khan Khalil, Sareer Ahmad, Muhammad Faheem, Arif Ullah Khan, Fawad Ali Shah, Shupeng Li Jan 2019

Neuroprotective Effects Of Melatonin And Celecoxib Against Ethanol-Induced Neurodegeneration: A Computational And Pharmacological Approach, Lina T. Al Kury, Alam Zeb, Zain Ul Abidin, Nadeem Irshad, Imran Malik, Arooj Mohsin Alvi, Atif Ali Khan Khalil, Sareer Ahmad, Muhammad Faheem, Arif Ullah Khan, Fawad Ali Shah, Shupeng Li

All Works

© 2019 Al Kury et al. This work is published and licensed by Dove Medical Press Limited. Purpose: Melatonin and celecoxib are antioxidants and anti-inflammatory agents that exert protective effects in different experimental models. In this study, the neuroprotective effects of melatonin and celecoxib were demonstrated against ethanol-induced neuronal injury by in silico, morphological, and biochemical approaches. Methods: For the in silico study, 3-D structures were constructed and docking analysis performed. For in vivo studies, rats were treated with ethanol, melatonin, and celecoxib. Brain samples were collected for biochemical and morphological analysis. Results: Homology modeling was performed to build 3-D …


Speech Enhancement Algorithm Based On Super-Gaussian Modeling And Orthogonal Polynomials, Basheera M. Mahmmod, Abd Rahman Ramli, Thar Baker, Feras Al-Obeidat, Sadiq H. Abdulhussain, Wissam A. Jassim Jan 2019

Speech Enhancement Algorithm Based On Super-Gaussian Modeling And Orthogonal Polynomials, Basheera M. Mahmmod, Abd Rahman Ramli, Thar Baker, Feras Al-Obeidat, Sadiq H. Abdulhussain, Wissam A. Jassim

All Works

© 2020 Lippincott Williams and Wilkins. All rights reserved. Different types of noise from the surrounding always interfere with speech and produce annoying signals for the human auditory system. To exchange speech information in a noisy environment, speech quality and intelligibility must be maintained, which is a challenging task. In most speech enhancement algorithms, the speech signal is characterized by Gaussian or super-Gaussian models, and noise is characterized by a Gaussian prior. However, these assumptions do not always hold in real-life situations, thereby negatively affecting the estimation, and eventually, the performance of the enhancement algorithm. Accordingly, this paper focuses on …


Virtual Environments Testing As A Cloud Service: A Methodology For Protecting And Securing Virtual Infrastructures, Elhadj Benkhelifa, Anoud Bani Hani, Thomas Welsh, Siyakha Mthunzi, Chirine Ghedira Guegan Jan 2019

Virtual Environments Testing As A Cloud Service: A Methodology For Protecting And Securing Virtual Infrastructures, Elhadj Benkhelifa, Anoud Bani Hani, Thomas Welsh, Siyakha Mthunzi, Chirine Ghedira Guegan

All Works

© 2013 IEEE. Testing is a vital component of the system development life cycle. As information systems infrastructure move from native computing to cloud-based and virtualized platforms, it becomes necessary to evaluate their effectiveness to ensure completion of organizational goals. However, the complexity and scale of virtualized environments make this process difficult. Additionally, inherited and novel issues further complicate this process, while relatively high costs can be constraining. Enabling service-driven environments to provide this evaluation is therefore beneficial for both providers and users. No such complete service offering currently exists. This paper is therefore aimed to benefit industry and academia …


Effective Evaluation Of The Non-Technical Skills In The Computing Discipline, Maurice Danaher, Kevin Schoepp, Ashley Ater Kranov Jan 2019

Effective Evaluation Of The Non-Technical Skills In The Computing Discipline, Maurice Danaher, Kevin Schoepp, Ashley Ater Kranov

All Works

© 2019, Journal of Information Technology Eucation Research. Aim/Purpose Assessing non-technical skills is very difficult and current approaches typically assess the skills separately. There is a need for better quality assessment of these skills at undergraduate and postgraduate levels. Background A method has been developed for the computing discipline that assesses all six non-technical skills prescribed by ABET (Accreditation Board for Engineering and Technology), the accreditation board for engineering and technology. It has been shown to be a valid and reliable method for undergraduate students Methodology The method is based upon performance-based assessment where a team of students discuss and …


A Novel Quality And Reliability-Based Approach For Participants' Selection In Mobile Crowdsensing, May El Barachi, Assane Lo, Sujith Samuel Mathew, Kiyan Afsari Jan 2019

A Novel Quality And Reliability-Based Approach For Participants' Selection In Mobile Crowdsensing, May El Barachi, Assane Lo, Sujith Samuel Mathew, Kiyan Afsari

All Works

© 2013 IEEE. With the advent of mobile crowdsensing, we now have the possibility of tapping into the sensing capabilities of smartphones carried by citizens every day for the collection of information and intelligence about cities and events. Finding the best group of crowdsensing participants that can satisfy a sensing task in terms of data types required, while satisfying the quality, time, and budget constraints is a complex problem. Indeed, the time-constrained and location-based nature of crowdsensing tasks, combined with participants' mobility, render the task of participants' selection, a difficult task. In this paper, we propose a comprehensive and practical …


Towards An Efficient Data Fragmentation, Allocation, And Clustering Approach In A Distributed Environment, Hassan Abdalla, Abdel Monim Artoli Jan 2019

Towards An Efficient Data Fragmentation, Allocation, And Clustering Approach In A Distributed Environment, Hassan Abdalla, Abdel Monim Artoli

All Works

© 2019 by the authors. Data fragmentation and allocation has for long proven to be an efficient technique for improving the performance of distributed database systems' (DDBSs). A crucial feature of any successful DDBS design revolves around placing an intrinsic emphasis on minimizing transmission costs (TC). This work; therefore, focuses on improving distribution performance based on transmission cost minimization. To do so, data fragmentation and allocation techniques are utilized in this work along with investigating several data replication scenarios. Moreover, site clustering is leveraged with the aim of producing a minimum possible number of highly balanced clusters. By doing so, …