Now showing items 128-140 of 140

    • Using block cipher for confidentiality of images in cloud-based systems 

      Rihan, Rana Adnan; Khan, Khaled M. ( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)
      This paper deals with outsourcing of computing to cloud servers where clients' images are computed and stored. It proposes a technique that obfuscates images before sending them to servers. Cloud servers can perform ...
    • Using Sparse Matrices to Prevent Information Leakage in Cloud Computing 

      Khan K.; Shaheen M.; Wang Y. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
      Cloud computing represents the promise of outsourcing of scientific computing such as matrix multiplication. However, this can introduce new vulnerabilities such as information leakage. Cloud server intentionally or ...
    • Using the Sadakane compressed suffix tree to solve the all-pairs suffix-prefix problem 

      Rachid, Maan Haj; Malluhi, Qutaibah; Abouelhoda, Mohamed ( Hindawi , 2014 , Article)
      The all-pairs suffix-prefix matching problem is a basic problem in string processing. It has an application in the de novo genome assembly task, which is one of the major bioinformatics problems. Due to the large size of ...
    • Using thermochromic ink for medical simulations 

      Alsalemi, Abdullah; Aldisi, Mohammed; Alhomsi, Yahya; Ahmed, Ibrahim; Bensaali, Faycal; ... more authors ( Hamad bin Khalifa University Press (HBKU Press) , 2017 , Article)
      Background: In medical simulation and training, blood is used to exhibit its different behaviors in context. In some cases, blood color differential is an imperative visual effect to ensure high-fidelity training and ...
    • Virtual Reality Falconry: Simulation of a Traditional Qatari Sport Methodology and Techniques 

      Kharbach S.; Ahmad S.S.; Haj Ahmed N.M.; Fetais N. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
      This paper talks about the process of developing a game called 'Virtual Reality Falconry'. The game is a simulation of the traditional Qatari hunting sport. Falconry refers to the process of hunting wild preys in their ...
    • Virtual reality for ambulance simulation environment 

      Halabi, O.; Salahuddin, T.; Karkar, A.G.; Alinier, G. ( Springer , 2022 , Article)
      Simulations are beneficial in evaluating clinicians' empirical competencies through practical skills, prioritizing, and decision-making as part of patient care scenarios generally run in a full-scale physical context. ...
    • Virtual Reality Game for Falconry 

      Fetais, Noora; Lotfi Kharbach, Sarah; Ahmad, Nour Moslem Haj; Ahmad, Salma Salah ( Hamad bin Khalifa University Press (HBKU Press) , 2018 , Conference Paper)
      Traditions and culture play a major role in our society, as they are the source of a person's pride and honor. One of Qatar's National Vision 2030 pillars that relates to the social development aims at preserving Qatar's ...
    • Virtual Reality Glove for Falconry 

      Al-Hathal T.; Fetais N. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
      This project is a virtual reality based game. Basically it's about hunting pray-using different types of falcons. And the main idea behind this project is to give more knowledge to the player about a cultural game in more ...
    • Visualization as a mean of big data management: Using Qatar's electricity consumption data 

      Soliman E.; Fetais N. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
      Visualization as a mean of big data management is the new century revolution. Managing data has become a great challenge today, as the amount of raw data size is increasing rapidly. For data like electricity consumption, ...
    • A Voting-Mechanism-Based Ensemble Framework for Constraint Handling Techniques 

      Wu, Guohua; Wen, Xupeng; Wang, Ling; Pedrycz, Witold; Suganthan, Ponnuthurai Nagaratnam ( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)
      Effective constraint handling techniques (CHTs) are of great significance for evolutionary algorithms (EAs) dealing with constrained optimization problems (COPs). To date, many CHTs, such as penalty function, superiority ...
    • Watermarking: A review of software and hardware techniques 

      Sleit, Azzam; Fetais, Noora ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
      Watermarking is a well-known technique traditionally used in banknotes and other documents to discourage counterfeiting. It usually consists of semi-transparent symbols embedded on paper. Similar concepts were applied to ...
    • Weighting and pruning based ensemble deep random vector functional link network for tabular data classification 

      Shi, Qiushi; Hu, Minghui; Suganthan, Ponnuthurai Nagaratnam; Katuwal, Rakesh ( Elsevier Ltd , 2022 , Article)
      In this paper, we first integrate normalization to the Ensemble Deep Random Vector Functional Link network (edRVFL). This re-normalization step can help the network avoid divergence of the hidden features. Then, we propose ...
    • Wireless Network Slice Assignment with Incremental Random Vector Functional Link Network 

      He, Yu Lin; Ye, Xuan; Cui, Laizhong; Fournier-Viger, Philippe; Luo, Chengwen; ... more authors ( IEEE Computer Society , 2022 , Article)
      This paper presents an artificial intelligence-assisted network slice prediction method, which utilizes a novel incremental random vector functional link (IRVFL) network to deal with the wireless network slice assignment ...