Computer Science & Engineering: Recent submissions
Now showing items 141-160 of 2427
-
Resource allocation scheme for eMBB and uRLLC coexistence in 6G networks
( Springer Nature , 2023 , Article)5G technology is intended to support three promising services with heterogeneous requirements: Ultra-Reliable and Low Latency Communication (uRLLC), enhanced Mobile Broadband (eMBB), and massive Machine Type Communication ... -
Development and Evaluation of a Mixed-Reality Tele-ultrasound System
( Elsevier , 2023 , Article)ObjectiveThe objective of this feasibility study was to develop and assess a tele-ultrasound system that would enable an expert sonographer (situated at the remote site) to provide real-time guidance to an operator (situated ... -
Preliminary design and evaluation of a remote tele-mentoring system for minimally invasive surgery
( Springer Nature , 2022 , Article)Background: Tele-mentoring during surgery facilitates the transfer of surgical knowledge from a mentor (specialist surgeon) to a mentee (operating surgeon). The aim of this work is to develop a tele-mentoring system tailored ... -
Evaluation of user-interfaces for controlling movements of virtual minimally invasive surgical instruments
( John Wiley & Sons , 2022 , Article)Background: Recent tele-mentoring technologies for minimally invasive surgery (MIS) augments the operative field with movements of virtual surgical instruments as visual cues. The objective of this work is to assess different ... -
On Physical Layer Security of Double Shadowed Rician Fading Channels
( Springer Nature , 2022 , Article)With the proliferation of fifth-generation (5G) mobile communication wireless networks, the investigation into the performance of physical layer secrecy is increasingly becoming the center of attention of recent studies. ... -
Free Space Optics Communication for Ultra-High-Speed Train Running in Evacuated Tube
( Multidisciplinary Digital Publishing Institute (MDPI) , 2022 , Article)This paper develops a novel communication method for an ultra-high-speed train that runs in an evacuated tube. The proposed method significantly reduces the number of needed base stations to provide adequate coverage and ... -
Travel Hopping Enabled Resource Allocation (THEResA) and delay tolerant networking through the use of UAVs in railroad networks
( Elsevier , 2021 , Article)This paper investigates the use of unmanned aerial vehicles (UAVs)/drones for providing high data rates to mobile relays (MRs) placed on top of high speed train wagons, thus introducing the concept of Travel Hopping Enabled ... -
A Data-Driven Approach to Assessing Digital Transformation Maturity Factors in Government Institutes
( IEEE , 2023 , Conference)Governments around the world are increasingly using digital transformation to improve their services and operations. Digital maturity assessment models however are mainly designed for business organizations, and there are ... -
Robotic MFL probe design for inspection in structural health monitoring system
( IEEE , 2018 , Conference)Structural health Monitoring (SHM) of civil and mechanical infrastructures using robots is getting a lot of attention in the scientific community. Ultimately, the subsurface defects as well as apparent flaws in the surface ... -
Optimal operation of reverse osmosis desalination process with deep reinforcement learning methods
( Springer , 2024 , Article)The reverse osmosis (RO) process is a well-established desalination technology, wherein energy-efficient techniques and advanced process control methods significantly reduce production costs. This study proposes an optimal ... -
Reverse osmosis desalination process modeling and simulation with membrane fouling
( American Institute of Physics , 2024 , Conference)Analyzing the correlation between the key RO operating conditions and performance indicators requires accurate reverse osmosis (RO) model that facilitates understanding and evaluating membrane performance. This study aims ... -
Cdascaler: a cost-effective dynamic autoscaling approach for containerized microservices
( Springer , 2024 , Article)Microservices are containerized, loosely coupled, interactive smaller units of the application that can be deployed, reused, and maintained independently. In a microservices-based application, allocating the right computing ... -
On Localization of Sources of Hazards Using Search Agents
( IEEE , 2023 , Conference)Localization of sources of hazardous phenomena such as gas leakages in air and oil spells in seawater is of high importance for environmental and civil protection. In this paper, we study variations of bio-inspired search ... -
Design of optimal deep learning based human activity recognition on sensor enabled internet of things environment
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)In recent times, Human Activity Recognition (HAR) has become a major challenge to overcome among computer vision applications in day-To-day lives. HAR is mainly envisioned to be utilized in coordination with other technologies ... -
Network-coded wireless powered cellular networks: Lifetime and throughput analysis
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference)In this paper, we study a wireless powered cellular network (WPCN) supported with network coding capability. In particular, we consider a network consisting of k cellular users (CUs) served by a hybrid access point (HAP) ... -
Malware detection for mobile computing using secure and privacy-preserving machine learning approaches: A comprehensive survey
( Elsevier , 2024 , Article)Mobile devices have become an essential element in our day-to-day lives. The chances of mobile attacks are rapidly increasing with the growing use of mobile devices. Exploiting vulnerabilities from devices as well as ... -
RF-based drone detection and identification using deep learning approaches: An initiative towards a large open source drone database
( Elsevier , 2019 , Article)The omnipresence of unmanned aerial vehicles, or drones, among civilians can lead to technical, security, and public safety issues that need to be addressed, regulated and prevented. Security agencies are in continuous ... -
Content Validity and User Satisfaction Evaluation of Visualization Training Tool for Surgeons for Urethral Dissection during Robot-Assisted Radical Prostatectomy
( Association for Computing Machinery , 2021 , Conference)Training and skills assessment for robotic surgeries has received unprecedented attention in technological research in the last few years due to the gradual adoption of minimally invasive robotic interventions. Robot-assisted ... -
Secure medical treatment with deep learning on embedded board
( Elsevier , 2020 , Book chapter)Deep brain stimulator is among several medical devices known by doctors and scientists for the treatment of movement disorders, such as Parkinson's disease, essential tremor, and dystonia. The security of these devices is ... -
Using learning analytics to measure self-regulated learning: A systematic review of empirical studies in higher education
( John Wiley and Sons Inc , 2024 , Article Review)Background: Measuring students' self-regulation skills is essential to understand how they approach their learning tasks in order to identify areas where they might need additional support. Traditionally, self-report ...