السجلات المعروضة 21 -- 40 من 2280

    • Audio-visual feature fusion for speaker identification 

      Almaadeed, Noor; Aggoun, Amar; Amira, Abbes ( Springer , 2012 , Conference Paper)
      Analyses of facial and audio features have been considered separately in conventional speaker identification systems. Herein, we propose a robust algorithm for text-independent speaker identification based on a decision-level ...
    • Speaker identification using multimodal neural networks and wavelet analysis 

      Almaadeed, Noor; Aggoun, Amar; Amira, Abbes ( Institution of Engineering and Technology , 2015 , Article)
      The rapid momentum of the technology progress in the recent years has led to a tremendous rise in the use of biometric authentication systems. The objective of this research is to investigate the problem of identifying a ...
    • 3D Gaussian Descriptor for Video-based Person Re-Identification 

      Riachy, Chirine; Al-Maadeed, Noor; Organisciak, Daniel; Khelifi, Fouad; Bouridane, Ahmed ( Vaclav Skala Union Agency , 2019 , Conference Paper)
      Despite being often considered less challenging than image-based person re-identification (re-id), video-based person re-id is still appealing as it mimics a more realistic scenario owing to the availability of pedestrian ...
    • Bringing Computer Science Education to Schools in Qatar: Challenges of the implementation 

      Alhazbi, Saleh ( IEEE , 2023 , Conference Paper)
      Many countries have started national curriculum changes to make computer science (CS) as a compulsory subject for all students in schools. In 2018, a new national computing curriculum has been developed in Qatar for all ...
    • Using e-journaling to improve self-regulated learning in introductory computer programming course 

      Alhazbi, Saleh ( IEEE , 2014 , Conference Paper)
      Usually, students face different difficulties when learning computer programming, this leads many of them to drop out of computing major, or continue with fear of programming assignments in subsequent courses. The main ...
    • Study on Characteristics of Metric-aware Multipath Algorithms in Real Heterogeneous Networks 

      Zhang, Xiaoya; Dong, Ping; Du, Xiaojiang; Zhang, Yuyang; Zhang, Hongke; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)
      Multipath transmission is considered one of the promising solutions to improve wireless resource utilization where there are many kinds of heterogeneous networks around. Most scheduling algorithms rely on real-time network ...
    • Low Rate DoS Attack Detection in IoT - SDN using Deep Learning 

      Ilango, Harun Surej; Ma, Maode; Su, Rong ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)
      The lack of standardization and the heterogeneous nature of IoT, exacerbated the issue of security and privacy. In recent literature, to improve security at the network level, the possibility of using SDN for IoT networks ...
    • Feasibility Evaluation of Mixed Reality Obstacles on Treadmill using HoloLens to Elicit Real Obstacle Negotiation 

      Miyake, Tamon; Al-Sada, Mohammed; Zhong, Tingting; Wang, Wei; Sugano, Shigeki ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)
      An ability of visually-guided and anticipatory adjustments of locomotion corresponding to upcoming obstacles is important to avoid trip-induced fall. For establishing gait training based on visually-guided and anticipatory ...
    • Using safety constraint for transactional dataset anonymization 

      Al Bouna, Bechara; Clifton, Chris; Malluhi, Qutaibah ( Springer , 2013 , Conference Paper)
      In this paper, we address privacy breaches in transactional data where individuals have multiple tuples in a dataset. We provide a safe grouping principle to ensure that correlated values are grouped together in unique ...
    • Secure and private outsourcing of shape-based feature extraction 

      Wang, Shumiao; Nassar, Mohamed; Atallah, Mikhail; Malluhi, Qutaibah ( Springer , 2013 , Conference Paper)
      There has been much recent work on secure storage outsourcing, where an organization wants to store its data at untrusted remote cloud servers in an encrypted form, such that its own employees can query the encrypted data ...
    • Maintaining database anonymity in the presence of queries 

      Riley, Ryan; Clifton, Chris; Malluhi, Qutaibah ( Springer , 2013 , Conference Paper)
      With the advent of cloud computing there is an increased interest in outsourcing an organization's data to a remote provider in order to reduce the costs associated with self-hosting. If that database contains information ...
    • Secure and efficient outsourcing of sequence comparisons 

      Blanton, Marina; Atallah, Mikhail J.; Frikken, Keith B.; Malluhi, Qutaibah ( Springer , 2012 , Conference Paper)
      We treat the problem of secure outsourcing of sequence comparisons by a client to remote servers, which given two strings λ and μ of respective lengths n and m, consists of finding a minimum-cost sequence of insertions, ...
    • Distributed computing and artificial intelligence, 12th international conference 

      Omatu, Sigeru; Malluhi, Qutaibah M.; Gonzalez, Sara Rodríguez; Bocewicz, Grzegorz; Bucciarelli, Edgardo; ... more authors ( Springer , 2015 , Conference Paper)
      The 12th International Symposium on Distributed Computing and Artificial Intelligence 2015 (DCAI 2015) is a forum to present applications of innovative techniques for studying and solving complex problems. The exchange of ...
    • Association rule mining on fragmented database 

      Hamzaoui, Amel; Malluhi, Qutaibah; Clifton, Chris; Riley, Ryan ( Springer , 2015 , Conference Paper)
      Anonymization methods are an important tool to protect privacy. The goal is to release data while preventing individuals from being identified. Most approaches generalize data, reducing the level of detail so that many ...
    • Preface : Distributed Computing and Artificial Intelligence, 12th International Conference 

      Omatu, Sigeru; Gonzalez, Sara Rodríguez; Giulioni, Gianfranco; Malluhi, Qutaibah M.; Bocewicz, Grzegorz; ... more authors ( Springer , 2015 , Other)
      The 12th International Symposium on Distributed Computing and Artificial Intelligence 2015 (DCAI 2015) is a forum to present applications of innovative techniques for solving complex problems in these areas. The exchange ...
    • Privacy Preserving Computation in Cloud Using Reusable Garbled Oblivious RAMs 

      Wang, Yongge; Malluhi, Qutaibah M. ( Springer , 2022 , Conference Paper)
      When users store encrypted data in a cloud environment, it is important for users to ask cloud to carry out some computation on the remote data remotely. ORAM is a good potential approach to carry out this kind of remote ...
    • Computational Aspects of Ideal (t, n)-Threshold Scheme of Chen, Laing, and Martin 

      Punekar, Mayur; Malluhi, Qutaibah; Desmedt, Yvo; Wang, Yongee ( Springer , 2018 , Conference Paper)
      In CANS 2016, Chen, Laing, and Martin proposed an ideal (t, n)-threshold secret sharing scheme (the CLM scheme) based on random linear code. However, in this paper we show that this scheme is essentially same as the one ...
    • An efficient secure data compression technique based on chaos and adaptive Huffman coding 

      Usama, Muhammad; Malluhi, Qutaibah M.; Zakaria, Nordin; Razzak, Imran; Iqbal, Waheed ( Springer , 2021 , Article)
      Data stored in physical storage or transferred over a communication channel includes substantial redundancy. Compression techniques cut down the data redundancy to reduce space and communication time. Nevertheless, compression ...
    • Efficient processing of hamming-distance-based similarity-search queries over MapReduce 

      Tang, Mingjie; Yu, Yongyang; Aref, Walid G.; Malluhi, Qutaibah M.; Ouzzani, Mourad ( OpenProceedings.org, University of Konstanz, University Library , 2015 , Conference Paper)
      Similarity search is crucial to many applications. Of particular interest are two flavors of the Hamming distance range query, namely, the Hamming select and the Hamming join (Hamming-select and Hamming-join, respectively). ...
    • Towards On-Device Dehydration Monitoring Using Machine Learning from Wearable Device's Data 

      Sabry, Farida; Eltaras, Tamer; Labda, Wadha; Hamza, Fatima; Alzoubi, Khawla; ... more authors ( MDPI , 2022 , Article)
      With the ongoing advances in sensor technology and miniaturization of electronic chips, more applications are researched and developed for wearable devices. Hydration monitoring is among the problems that have been recently ...