Computer Science & Engineering: Recent submissions
Now showing items 301-320 of 2427
-
Fuzzy classification-based control of wheelchair using EEG data to assist people with disabilities
( Springer Nature , 2012 , Conference)Electroencephalography (EEG) will play an intelligent role our life: especially EEG based health diagnosis of brain disorder and Brain-Computer Interface (BCI) are growing areas of research. However, these approaches fall ... -
Dynamic health level 7 packetizer for on-the-fly integrated healthcare enterprises (IHE) in disaster zones
( Springer Nature , 2012 , Conference)The advent of standards i.e. IEEE 11073 for device connectivity, Health Level 7 (HL7) etc. provide an assimilating platform for medical devices and seamless data flow among modern Health Information Systems (HIS). However, ... -
Fuzzy model for detection and estimation of the degree of autism spectrum disorder
( Springer Nature , 2012 , Conference)Early detection of autism spectrum disorder (ASD) is of great significance for early intervention. Besides, knowing the degree of severity in ASD and how it changes with the intervention is imperative for the treatment ... -
Power and task management in wireless body area network based medical monitoring systems
( Springer Nature , 2012 , Conference)Intelligent healthcare systems incorporating wireless sensors in a ubiquitous computing environment have the potential to revolutionize outpatient care. Such systems must balance effective and timely reporting of results ... -
Vulnerabilities and verification of cryptographic protocols and their future in Wireless Body Area Networks
( IEEE , 2012 , Conference)In network security goals such as confidentiality, authentication, integrity and non-repudiation can be achieved using cryptographic techniques. Cryptographic techniques are techniques to hide information from unauthorized ... -
Detecting different tasks using EEG-source-temporal features
( Springer Nature , 2012 , Conference)This study proposes a new type of features extracted from Electroencephalography (EEG) signals to distinguish between different tasks. EEG signals are collected from six children aged between two to six years old during ... -
Performance evaluation of TCP and UDP traffic in IEEE 1451 compliant healthcare infrastructure
( Springer Nature , 2012 , Conference)Wireless ad-hoc and intrastructure networks have become very popular during the last ten years. Due to this reason, wireless security has become a very serious issue, specially in healthcare intrastructure networks. The ... -
A Review of Usability Evaluation Techniques for Augmented Reality Systems in Education
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference)Augmented Reality (AR) converts a gigantic amount of data and analytics into images and/or animations that are overlaid into the real scene. The emerging technology of AR has been investigated for more than forty years, ... -
Adaptive de Algorithm for Novel Energy Control Framework Based on Edge Computing in IIoT Applications
( IEEE Computer Society , 2021 , Article)With the development of the industrial Internet of Things and the advancements in wireless sensor networking technologies, the smart grid based on edge computing now is regarded as being essential for real-time monitoring ... -
A Machine Learning Based Framework for Real-Time Detection and Mitigation of Sensor False Data Injection Cyber-Physical Attacks in Industrial Control Systems
( Institute of Electrical and Electronics Engineers Inc. , 2023 , Article)In light of the advancement of the technologies used in industrial control systems, securing their operation has become crucial, primarily since their activity is consistently associated with integral elements related to ... -
Constraint-enhanced role engineering via answer set programming
( Association for Computing Machinery , 2012 , Conference)Role engineering (RE) aims to develop and maintain appropriate role-based access control (RBAC) configurations. However, RE with constraints in place is not well-studied. Constraints usually describe organizations' security ... -
Compliance checking for usage-constrained credentials in trust negotiation systems
( Springer Berlin Heidelberg , 2012 , Conference)We propose an approach to placing usage-constraints on RT credentials; issuers specify constraints by designing non-deterministic finite automata. We show by examples that this approach can express constraints of practical ... -
Automatic verification of health regulatory compliance in cloud computing
( IEEE , 2013 , Conference)This paper aims to develop an approach that enables cloud computing clients to verify health regulatory compliance claimed by cloud computing providers. In this approach, clients of cloud computing could check automatically ... -
Role of contextual properties in enterprise service migration to cloud computing
( John Wiley and Sons Ltd , 2013 , Article Review)This paper attempts to identify the role of contextual properties of enterprise systems architecture in relation to service migration to cloud computing. In a cloud-based service architecture, the shift of ownership, scope, ... -
Social access control language (SocACL)
( Association for Computing Machinery , 2013 , Conference)Online Social Networks hold vast amounts of readily accessible personal information leaving them particularly vulnerable to privacy breach attacks [6]. With the impact these breaches varying from simply embarrassing the ... -
Traceability for adaptive information security in the cloud
( IEEE Computer Society , 2014 , Conference)One of the key challenges in cloud computing is the security of the consumer data stored and processed by cloud machines. When the usage context of a cloud application changes, or when the context is unknown, there is a ... -
Secure cloud services: Matrix multiplication revisited
( IEEE , 2013 , Conference)This paper revisits the issue of secure outsourcing of services. It proposes a data scrambling approach of transforming private data into public without public key encryption in the cloud computing context. The approach ... -
A Process Model for Customisation of Software in Multi-tenant SaaS Model
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference)This paper outlines a generic process framework for customisation of software in cloud computing. The flexibility for client-specific customisation of the software offered by software-as-a-service (SaaS) is limited. The ... -
Trust in cloud services: Providing more controls to clients
( IEEE , 2013 , Article)Trust is more important than money and will ultimately determine cloud computing's success. -
Security-oriented service composition and evolution
( IEEE , 2006 , Conference)This paper introduces a framework for security-oriented software service composition and evolution. Key building blocks of the framework are a semantic model for specifying the security objectives and properties at the ...