Search
Now showing items 31-40 of 146
CloudSafe: A tool for an automated security analysis for cloud computing
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
Cloud computing has been adopted widely, providing on-demand computing resources to improve performance and reduce operational costs. However, these new functionalities also bring new ways to exploit the cloud computing ...
Graphene-filled PDMS Composite for Tactile Sensing of Surgical Graspers
(
IEEE Computer Society
, 2019 , Conference Paper)
For tactile sensors to become useful technology, the required features should be flexibility, durability, and its sensitivity to physical contact. Conductive elastomer nanocomposites are widely used in fabricating a variety ...
Edms model verification considering remarkable changes in airport traffic system
(
Hungarian Meteorological Service
, 2016 , Conference Paper)
This paper presents the verification process of the Emission and Dispersion Modeling System adapted to evaluate the air quality of Liszt Ferenc International Airport. One receptor point was selected at the Airport, at ...
Improvement of PVA gel properties for cell immobilization
(
Avestia Publishing
, 2019 , Conference Paper)
This study investigates the characterization and the ability of polyvinyl alcohol (PVA) gel to be used in the area of wastewater treatment as biomass immobilization matrix. The PVA matrix was prepared through the ...
Real-time robotic avatar control using fuzzy gaze-classification for people with disability
(
Institute of Electrical and Electronics Engineers Inc.
, 2016 , Conference Paper)
Robotic control with gaze-classification has been an area of interest for quite some time. In this paper, a novel solution of implementing sensing system with intelligent visualization has been presented. Such a system can ...
ThreatRiskEvaluator: A Tool for Assessing Threat-Specific Security Risks in the Cloud
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
In cloud computing, security risks posed to individual clients are different based on their specific security requirements. In current practice, cloud providers usually apply generic protection mechanisms that may not be ...
An overview of pedestrian signal setting and implementation in the State of Qatar
(
Elsevier B.V.
, 2017 , Conference Paper)
Pedestrian signal control is a main influencing factor on the Level of Service of crossing facilities and on the safety performance considering conflicts with vehicles. In signal design, pedestrian clearance time is a key ...
Wirelessly controlled mimicing humanoid robot
(
IEEE
, 2014 , Conference Paper)
Educational humanoid robots have started to find there place in institutions for children with special needs and Autism Spectrum Disorder (ASD) children therapy centers. Most of the humanoid robots are expensive, or come ...
Data Obfuscation for Privacy and Confidentiality in Cloud Computing
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
This paper proposes a data obfuscation approach in outsourcing matrix multiplication to cloud computing. It is primarily based on splitting the rows and columns of matrices to alter their actual dimension coupled with ...
Detection of partial seizure: An application of fuzzy rule system for wearable ambulatory systems
(
IEEE
, 2014 , Conference Paper)
Electroencephalography (EEG) plays an intelligent role, especially EEG based health diagnosis of brain disorder, as well as brain-computer interface (BCI) applications. One such research field is related to epilepsy. The ...