Search
Now showing items 211-220 of 273
An image steganography approach based on k-least significant bits (k-LSB)
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
Image steganography is the operation of hiding a message into a cover image. the message can be text, codes, or image. Hiding an image into another is the proposed approach in this paper. Based on LSB coding, a k-LSB-based ...
Signed Network Embedding with Dynamic Metric Learning
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
Network embedding is an important method to learn low-dimensional vector representations of nodes in networks, which has wide-ranging applications in network analysis such as link prediction. Most existing network embedding ...
Secure Performance Analysis for Full-Duplex Cooperative NOMA System in the Presence of Multiple Eavesdroppers
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
This paper investigates the physical layer security of a full-duplex (FD) Decode-and-Forward (DF) NOMA network assumed to undergo independent and identically distributed Nakagami-m fading. Herein, we provide a secrecy ...
Infrared Versus Visible Image Matching for Multispectral Face Recognition
(
Springer
, 2020 , Conference Paper)
Multispectral face recognition has been an interesting area of research where images obtained from different bands are matched. There are many face image datasets available which contain infrared and visible images. In ...
Optimizing Energy-Distortion Trade-off for Vital Signs Delivery in Mobile Health Applications
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
Healthcare is considered a top priority worldwide, considering the swift increase in the number of chronic patients who require continuous monitoring. This motivates the researchers to develop scalable remote health ...
Analyzing the Role of Government in the Management and Planning of Tourism Crisis; A Case Study of the COVID-19 Crisis
(
Gulf Studies center - College of Arts & Sciences - Qatar University
, 2020 , Conference Paper)
The tourism planning and management is a collective action in which different actors of governmental and non-governmental organizations and institutions are involved. It is necessary to manage this phenomenon both during ...
The Qatari Identity: Crisis, Change and Transition
(
Gulf Studies center - College of Arts & Sciences - Qatar University
, 2020 , Conference Paper)
The paper presents a set of qualitative and quantitative data (including interviews with policy instigators, academics and social/cultural influencers of different age ranges, backgrounds and professions, as well as an ...
Secure Authentication and Key Agreement Protocol for Tactile Internet-based Tele-Surgery Ecosystem
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
With the recent advancements in wireless communications, Tactile Internet (TI) has witnessed a major blow. TI is considered the next big evolution that will provide real-time control in industrial setups, particularly in ...
Cloud Storage Forensics: BaiduNetDisk, WeiYun, and 115yun on a Wireless Network
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
With the development of cloud computing and wireless networks, cloud storage services are widely used in daily life. People can get access to cloud storage anytime and anywhere. Cloud storage forensics is a computer forensic ...
An Improvement of Support Vector Machine Imputation Algorithm Based on Multiple Iteration and Grid Search Strategies
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
Data missing is a vitally important issue that influences the classification results in medical field. This paper proposes an improved support vector machine (SVM) imputation algorithm by using strategies of pre-imputation, ...