


default search action
DeSE 2013: Abu Dhabi, United Arab Emirates
- Sixth International Conference on Developments in eSystems Engineering, DeSE 2013, Abu Dhabi, United Arab Emirates, December 16-18, 2013. IEEE 2013, ISBN 978-1-4799-5263-2

- Muath Alrammal

, Gaétan Hains
:
Syntax Analyzer & Selectivity Estimation Technique Applied on Wikipedia XML Data Set. 3-8 - Fawzi M. Al-Naima

, Raoof T. Hussein:
PSO Based Indoor RFID Network Planning. 9-14 - Linus Atorf, Eric Guiffo Kaigom, Jürgen Roßmann:

A New eRobotics Approach to Simulation-Based Analysis and Optimization. 15-20 - Farhad Pouladi, Amir Mohammad Gilani, Bahareh Nikpour, Hojjat Salehinejad:

Optimum Localization of Wind Turbine Sites Using Opposition Based Ant Colony Optimization. 21-26 - M. Zoran, Roxana Savastru

, D. Savastru:
Remote Sensing Image-Based Analysis for Effects of Urbanization on Climate Quantifying. 27-32 - M. Zoran, Roxana Savastru

, D. Savastru:
Analysis of Environmental Impacts in Urban Areas by Geospatial Data. 33-38 - Sami Miniaoui

, Faouzi Kamoun:
Innovative RFID Solution for Tracking and Control. 41-45 - Andrew Attwood, Omar Abuelma'atti, Paul Fergus

:
M2M Rendezvous Redundancy for the Internet of Things. 46-50 - Daniel Gutiérrez-Reina, Radu-Ioan Ciobanu

, Sergio L. Toral Marín, Ciprian Dobre
, Federico Barrero
:
Analysis of Probabilistic Forwarding in Opportunistic Networks Using the Percolation Theory. 51-56 - Farida Chowdhury

, Mario Kolberg:
Performance Evaluation of Structured Peer-to-Peer Overlays for Use on Mobile Networks. 57-62 - Mohammad Abdul Azim

, Zeyar Aung
:
Simultaneous Perturbation Stochastic Approximation-Based Localization Algorithms for Mobile Devices. 63-68 - Salah Awad Al-Iesawi

:
Iterative Hybrid Decision-Feedback Equalization (HDFE) Based Single-Carrier IDMA Schemes. 69-72 - Ibrahim Khamis, Zeyar Aung

:
Outlier Preprocessing in Wireless Sensor Networks: A Two-Layered Ellipse Approach. 73-78 - Jan Sliwa, Emmanuel Benoist:

Reusing Dormant Distributed Legacy Data for Evidence Based Medicine. 81-86 - Giovanna Sannino

, Ivanoe De Falco
, Giuseppe De Pietro:
Automatic Extraction of an Effective Rule Set for Fall Detection for a Real-Time Mobile Monitoring System. 87-92 - Prabhat Kumar Upadhyay

, Rakesh Kumar Sinha
:
Wavelet-Neural Classification of Sleep EEG under Stressful Condition. 93-98 - Tarek Elguebaly, Nizar Bouguila:

A Bayesian Approach for the Classification of Mammographic Masses. 99-104 - Mohamed Al-Hemairy, Mohamed Adel Serhani, Yacine Atif, Saad Ali Amin

:
Classification of Pervasive Healthcare Systems. 105-110 - Hamzah S. AlZu'bi, Waleed Al-Nuaimy

, Nayel S. Al-Zubi
:
EEG-based Driver Fatigue Detection. 111-114 - Majid A. Al-Taee

, Suhail N. Abood, Nada Y. Philip:
A Human-Robot Sub-dialogues Structure Using XML Document Object Model. 115-120 - Abdul Hakim H. M. Mohamed

, Hissam Tawfik, Lin Norton, Dhiya Al-Jumeily
:
A Technology Acceptance Model for a User-Centred Culturally-Aware E-Health Design. 121-125 - Jan Sliwa, Emmanuel Benoist:

Medical Evaluative Research and Privacy Protection. 126-131 - Sharmila Subrahmaniam:

CG&A with Eye Tracking for Cognitive Behavior Analysis and Psychoanalysis. 132-137 - Tran Trung Nguyen, Heiko Weiss, Arvid Amthor, Christoph Ament

:
Fast and Robust Online Calibration of a Multi-laser Tracking System. 141-144 - Muna Alsallal

, Rahat Iqbal
, Saad Ali Amin
, Anne E. James
:
Intrinsic Plagiarism Detection Using Latent Semantic Indexing and Stylometry. 145-150 - Michael Schluse

, Christian Schlette
, Ralf Waspe
, Jürgen Roßmann:
Advanced 3D Simulation Technology for eRobotics: Techniques, Trends, and Chances. 151-156 - Alexander Katzmaier, Martin Hanneghan:

Design Pattern Evaluation of Mobile and Web Based Application Frameworks. 157-162 - Peter Karl Reichl:

It's the Ecosystem, Stupid: Lessons from an Anti-Copernican Revolution of User-Centric Service Quality in Telecommunications. 163-168 - Martin Knahl, Rawand Sulayman Mahmood:

Perception and Adoption of Mobile Internet Service Quality in Iraq. 169-173 - Livio Belegante

, Florica Toanca, Jeni Vasilescu
, Doina Nicolae
, Anca Nemuc
:
Integrated E-System for Pollution and Climate Change Monitoring in the Framework of the Romanian Atmospheric Research 3D Observatory - RADO. 174-177 - Jürgen Roßmann

:
Advances in eRobotics: An Overview of Principles and Applications for Space, Industry, and Environmental Monitoring. 178-183 - Belal Al-Khateeb

, Wadhah Zeyad Tareq
:
Solving 8-Queens Problem by Using Genetic Algorithms, Simulated Annealing, and Randomization Method. 187-191 - Martin Randles

, David J. Lamb, Andrew Attwood:
Agents' Monitoring Approach for Big Data. 192-197 - Thar Baker

, Yanik Ngoko, Rafael Tolosana-Calasanz
, Omer F. Rana
, Martin Randles
:
Energy Efficient Cloud Computing Environment via Autonomic Meta-director Framework. 198-203 - Md. Shiblee, B. Chandra:

Novel Approach for Blind Source Separation. 204-208 - Mohammad Hijji, Saad Ali Amin

, Rahat Iqbal
, Wayne Harrop:
A Critical Evaluation of the Rational Need for an IT Management System for Flash Flood Events in Jeddah, Saudi Arabia. 209-214 - Wajid Khan, Fiaz Hussain:

Data Analysis through Information Visualisation for eGovernments & eBusinesses. 215-220 - Laurentiu-Marian Angheluta:

Using Virtual World Environments in Conservation-Restoration. 221-224 - Denis J. Reilly

, Chris Wren, Susan Giles, Lisa Cunningham, Paul Hargreaves:
CASPER: Computer Assisted Search Prioritisation and Environmental Response Application. 225-230 - Alecsandru Chirosca

, Gianina Chirosca:
Time Series Analysis for Cyberthreat Detection and Prevention. 231-235 - Omar Kassem Khalil, Aissa Boudjella:

An Enhanced Cryptographic Technique for Messages Traveling between Computers. 239-242 - Nizar Naji Albassam, Mahdi Nasereddin

:
Solution Space Optimization for RSA Attack. 243-246 - Foad Salem Mubarek, Sufyan T. Faraj Al-Janabi

:
Efficient Symmetric and Heterogeneous Mobile Group-Based Key Management Protocol. 247-252 - Sultan Al-Shehhi, Mohammed Al-Muhairi, Dalia Abuoeida, Hussain Al-Ahmed

, Naoufel Werghi
, Alavi Kunhu:
Robust and Fragile Watermarking Scheme Based on DCT and Hash Function for Color Satellite Images. 253-258 - Samaher Hussein Ali:

Novel Approach for Generating the Key of Stream Cipher System Using Random Forest Data Mining Algorithm. 259-269 - Ali Makki Sagheer

, Muzhir Shaban Al-Ani, Omar Adil Mahdi
:
Ensure Security of Compressed Data Transmission. 270-275 - Quang Duc Tran, Panos Liatsis:

User-Specific Fusion Using One-Class Classification for Multimodal Biometric Systems: Boundary Methods. 276-280 - Ali Makki Sagheer

, Ayoob Abdulmunem Abdulhameed, Mohammed Adeeb AbdulJabbar:
SMS Security for Smartphone. 281-285 - Quang Duc Tran, Panos Liatsis:

A Modified Equal Error Rate Based User-Specific Normalization for Multimodal Biometrics. 286-290 - Andres Ojamaa, Uku-Rasmus Lind:

Securing Customer Email Communication in E-Commerce. 291-296 - Khalid Battal Najim, Zaher Shakir Mahmood:

Using of Cement Kiln Dust as a Mineral Admixture to Produce Sustainable Self-Compacting Concrete. 299-302 - Yaseen T. Khaleel, Omar H. Jasim

:
Development of Normal Strength Concrete from Crushed Al-Ma'mora Stones. 303-307 - B. Chandra, Manish Gupta:

Novel Multivariate Time Series Clustering Approach for E-Governance of Crime Data. 311-316 - Rabea Kurdi, Martin Randles

:
Proposed Design for an E-Government Web Portal Application Using Cloud Computing. 317-322 - Haya Alshehri, Farid Meziane

:
An Investigation into Saudi Online Shoppers' Behaviour Abroad. 323-327 - Ahmed Al-Gindy

, Ayman Tawfik, Laila Sakhi, Hibaq Mohamad, Manahil Mustafa:
RFID Speed Monitoring System. 328-331 - Hulya Francis, Dhiya Al-Jumeily

, Tom Oliver Lund:
A Framework to Support E-Commerce Development for People with Visual Impairment. 335-341 - Ioan Szilagyi, Ana Roxin

, Ioan Roxin:
Active Learning System in the Context of the Social Semantic Web. 342-347 - Mohammed Alghamdi, David J. Lamb, Dhiya Al-Jumeily

, Abir Jaafar Hussain
:
Assessing the Impact of Web-Based Technology on Learning Styles in Education. 348-353 - Hissam Tawfik, Obinna Anya:

Towards Lifestyle-Oriented and Personalised E-Services for Elderly Care. 357-360 - Obinna Anya, Hissam Tawfik, Atulya Kumar Nagar:

ContextMorph: A Model of Context-Aware Cross-Boundary Decision Support in E-Health. 361-366 - David Folksman, Paul Fergus

, Dhiya Al-Jumeily
, Chris Carter:
A Mobile Multimedia Application Inspired by a Spaced Repetition Algorithm for Assistance with Speech and Language Therapy. 367-375 - Anthony Farrugia, Dhiya Al-Jumeily

, Mohammed Al-Jumaily, Abir Hussain
, David J. Lamb:
Medical Diagnosis: Are Artificial Intelligence Systems Able to Diagnose the Underlying Causes of Specific Headaches? 376-382

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














