Search
Now showing items 11-20 of 74
Image stitching system with scanning microscopy for histopathological applications
(
Institute of Electrical and Electronics Engineers Inc.
, 2016 , Conference Paper)
Histopathological analysis of biopsy or surgical specimen is a common clinical practice for diagnostic purposes. Essentially, the process involves slicing the biopsy or surgical sample into very thin slices, placing them ...
A Domain Specific Language for Secure Outsourcing of Computation to the Cloud
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
Secure outsourcing of computation has gained importance with the proliferation of cloud services. However, existing outsourcing protocol specification languages are mainly suitable for secure multi-party computation. They ...
Data confidentiality in cloud-based pervasive system
(
Association for Computing Machinery
, 2017 , Conference Paper)
Data confidentiality and privacy is a serious concern in pervasive systems where cloud computing is used to process huge amount of data such as matrix multiplications typically used in HPC. Due to limited processing ...
Real-time robotic avatar control using fuzzy gaze-classification for people with disability
(
Institute of Electrical and Electronics Engineers Inc.
, 2016 , Conference Paper)
Robotic control with gaze-classification has been an area of interest for quite some time. In this paper, a novel solution of implementing sensing system with intelligent visualization has been presented. Such a system can ...
Wirelessly controlled mimicing humanoid robot
(
IEEE
, 2014 , Conference Paper)
Educational humanoid robots have started to find there place in institutions for children with special needs and Autism Spectrum Disorder (ASD) children therapy centers. Most of the humanoid robots are expensive, or come ...
Data Obfuscation for Privacy and Confidentiality in Cloud Computing
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
This paper proposes a data obfuscation approach in outsourcing matrix multiplication to cloud computing. It is primarily based on splitting the rows and columns of matrices to alter their actual dimension coupled with ...
Detection of partial seizure: An application of fuzzy rule system for wearable ambulatory systems
(
IEEE
, 2014 , Conference Paper)
Electroencephalography (EEG) plays an intelligent role, especially EEG based health diagnosis of brain disorder, as well as brain-computer interface (BCI) applications. One such research field is related to epilepsy. The ...
A formal model-based testing framework for validating an IoT solution for blockchain-based vehicles communication
(
SciTePress
, 2020 , Conference Paper)
The emergence of embedded and connected smart technologies, systems, and devices has enabled the concept of smart cities by connecting every "thing" to the Internet and in particular in transportation through the Internet ...
Battery-Induced Load Hiding and Its Utility Consequences
(
Institute of Electrical and Electronics Engineers Inc.
, 2024 , Conference Paper)
The introduction of smart grids allows utility providers to collect detailed data about consumers, which can be utilized to enhance grid efficiency and reliability. However, this data collection also raises privacy concerns. ...
Analysis of Predictive Models for Revealing Household Characteristics using Smart Grid Data
(
IEEE Computer Society
, 2023 , Conference Paper)
The Smart Grid Advanced Metering Infrastructure (AMI) has revolutionized the smart grid network, generating vast amounts of data that can be utilized for diverse objectives, one of which is Household Characteristics ...