Computer Science & Engineering: المرسلات الحديثة
السجلات المعروضة 161 -- 180 من 2427
-
Stochastic Geometry-Based Physical-Layer Security Performance Analysis of a Hybrid NOMA-PDM-Based IoT System
( Institute of Electrical and Electronics Engineers Inc. , 2024 , Article)With the development of low-cost computer chips and wireless networks, any object or thing can become a component of the Internet of Things (IoT). As a result, these disparate things will gain digital intelligence, enabling ... -
Fire Alarm System for Smart Cities Using Edge Computing
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference)The current urban planning trend is to build smart cities that are advanced, safe and sustainable. To build these cities several technologies could be exploited including the Internet of Things (IoT) and edge computing. ... -
Improving remote health monitoring: A low-complexity ECG compression approach
( Multidisciplinary Digital Publishing Institute (MDPI) , 2018 , Article)Recent advances in mobile technology have created a shift towards using battery-driven devices in remote monitoring settings and smart homes. Clinicians are carrying out diagnostic and screening procedures based on the ... -
Biometric-based authentication scheme for Implantable Medical Devices during emergency situations
( Elsevier , 2019 , Article)Biometric recognition and analysis are among the most trusted features to be used by Implantable Medical Devices (IMDs). We aim to secure these devices by using these features in emergency scenarios. As patients can witness ... -
Unveiling the Shadows: Leveraging Current Drone Detection Vulnerabilities to Design and Build a Stealth Drone
( Institute of Electrical and Electronics Engineers Inc. , 2024 , Conference)Drones have become a popular tool for illegal activities and attacks, causing serious threats to global security. In order to address this issue, our project aims to demonstrate the limitations of current drone detection ... -
Investigation of TCP protocols in dynamically varying bandwidth conditions
( Springer Verlag , 2015 , Conference)Cognitive radio (CR) networks experience fluctuating spectrum availability that impacts the end to end bandwidth of a connection. In this paper, we conduct an extensive simulation study of three different window-based TCP ... -
Restoration of motion-corrupted EEG signals using attention-guided operational CycleGAN
( Elsevier , 2024 , Article)Electroencephalogram (EEG) signals suffer substantially from motion artifacts even in ambulatory settings. Signal processing techniques for removing motion artifacts from EEG signals have limitations, and the potential of ... -
Audio-visual feature fusion for speaker identification
( Springer , 2012 , Conference)Analyses of facial and audio features have been considered separately in conventional speaker identification systems. Herein, we propose a robust algorithm for text-independent speaker identification based on a decision-level ... -
Speaker identification using multimodal neural networks and wavelet analysis
( Institution of Engineering and Technology , 2015 , Article)The rapid momentum of the technology progress in the recent years has led to a tremendous rise in the use of biometric authentication systems. The objective of this research is to investigate the problem of identifying a ... -
3D Gaussian Descriptor for Video-based Person Re-Identification
( Vaclav Skala Union Agency , 2019 , Conference)Despite being often considered less challenging than image-based person re-identification (re-id), video-based person re-id is still appealing as it mimics a more realistic scenario owing to the availability of pedestrian ... -
Using e-journaling to improve self-regulated learning in introductory computer programming course
( IEEE , 2014 , Conference)Usually, students face different difficulties when learning computer programming, this leads many of them to drop out of computing major, or continue with fear of programming assignments in subsequent courses. The main ... -
Bringing Computer Science Education to Schools in Qatar: Challenges of the implementation
( IEEE , 2023 , Conference)Many countries have started national curriculum changes to make computer science (CS) as a compulsory subject for all students in schools. In 2018, a new national computing curriculum has been developed in Qatar for all ... -
Low Rate DoS Attack Detection in IoT - SDN using Deep Learning
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference)The lack of standardization and the heterogeneous nature of IoT, exacerbated the issue of security and privacy. In recent literature, to improve security at the network level, the possibility of using SDN for IoT networks ... -
Study on Characteristics of Metric-aware Multipath Algorithms in Real Heterogeneous Networks
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference)Multipath transmission is considered one of the promising solutions to improve wireless resource utilization where there are many kinds of heterogeneous networks around. Most scheduling algorithms rely on real-time network ... -
Feasibility Evaluation of Mixed Reality Obstacles on Treadmill using HoloLens to Elicit Real Obstacle Negotiation
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference)An ability of visually-guided and anticipatory adjustments of locomotion corresponding to upcoming obstacles is important to avoid trip-induced fall. For establishing gait training based on visually-guided and anticipatory ... -
Cryptocurrencies and artificial intelligence: Challenges and opportunities
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)Decentralized cryptocurrencies have gained a lot of attention over the last decade. Bitcoin was introduced as the first cryptocurrency to allow direct online payments without relying on centralized financial entities. The ... -
Privacy-Preserving Fog Aggregation of Smart Grid Data Using Dynamic Differentially-Private Data Perturbation
( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)The edge of the smart grid has a massive number of power and resource-constrained interconnected devices. Mainly, smart meters report power consumption data from consumer homes, industrial buildings, and other connected ... -
Anomalies detection in software by conceptual learning from normal executions
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)Could we detect anomalies during the run-time of a program by learning from the analysis of its previous traces for normally completed executions? In this paper we create a featured data set from program traces at run time, ... -
Data consistency in multi-cloud storage systems with passive servers and non-communicating clients
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)Multi-cloud storage systems are becoming more popular due to the ever-expanding amount of consumer data. This growth is accompanied by increasing concerns regarding security, privacy, and reliability of cloud storage ... -
Securing Aggregate Queries for DNA Databases
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)This paper addresses the problem of sharing person-specific genomic sequences without violating the privacy of their data subjects to support large-scale biomedical research projects. The proposed method builds on the ...