Computer Science & Engineering: Recent submissions
Now showing items 121-140 of 2402
-
Hybrid Encryption for Securing and Tracking Goods Delivery by Multipurpose Unmanned Aerial Vehicles in Rural Areas Using Cipher Block Chaining and Physical Layer Security
( Multidisciplinary Digital Publishing Institute (MDPI) , 2024 , Article)This paper investigated the use of unmanned aerial vehicles (UAVs) for the delivery of critical goods to remote areas in the absence of network connectivity. Under such conditions, it is important to track the delivery ... -
Wearable bracelet and machine learning for remote diagnosis and pandemic infection detection
( Springer Nature , 2024 , Article)The COVID-19 pandemic has highlighted that effective early infection detection methods are essential, as they play a critical role in controlling the epidemic spread. In this work, we investigate the use of wearable sensors ... -
Robotic MFL probe design for inspection in structural health monitoring system
( IEEE , 2018 , Conference Paper)Structural health Monitoring (SHM) of civil and mechanical infrastructures using robots is getting a lot of attention in the scientific community. Ultimately, the subsurface defects as well as apparent flaws in the surface ... -
A Data-Driven Approach to Assessing Digital Transformation Maturity Factors in Government Institutes
( IEEE , 2023 , Conference Paper)Governments around the world are increasingly using digital transformation to improve their services and operations. Digital maturity assessment models however are mainly designed for business organizations, and there are ... -
Reverse osmosis desalination process modeling and simulation with membrane fouling
( American Institute of Physics , 2024 , Conference Paper)Analyzing the correlation between the key RO operating conditions and performance indicators requires accurate reverse osmosis (RO) model that facilitates understanding and evaluating membrane performance. This study aims ... -
Optimal operation of reverse osmosis desalination process with deep reinforcement learning methods
( Springer , 2024 , Article)The reverse osmosis (RO) process is a well-established desalination technology, wherein energy-efficient techniques and advanced process control methods significantly reduce production costs. This study proposes an optimal ... -
Cdascaler: a cost-effective dynamic autoscaling approach for containerized microservices
( Springer , 2024 , Article)Microservices are containerized, loosely coupled, interactive smaller units of the application that can be deployed, reused, and maintained independently. In a microservices-based application, allocating the right computing ... -
On Localization of Sources of Hazards Using Search Agents
( IEEE , 2023 , Conference Paper)Localization of sources of hazardous phenomena such as gas leakages in air and oil spells in seawater is of high importance for environmental and civil protection. In this paper, we study variations of bio-inspired search ... -
Design of optimal deep learning based human activity recognition on sensor enabled internet of things environment
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)In recent times, Human Activity Recognition (HAR) has become a major challenge to overcome among computer vision applications in day-To-day lives. HAR is mainly envisioned to be utilized in coordination with other technologies ... -
Network-coded wireless powered cellular networks: Lifetime and throughput analysis
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)In this paper, we study a wireless powered cellular network (WPCN) supported with network coding capability. In particular, we consider a network consisting of k cellular users (CUs) served by a hybrid access point (HAP) ... -
Using learning analytics to measure self-regulated learning: A systematic review of empirical studies in higher education
( John Wiley and Sons Inc , 2024 , Article Review)Background: Measuring students' self-regulation skills is essential to understand how they approach their learning tasks in order to identify areas where they might need additional support. Traditionally, self-report ... -
Fire Alarm System for Smart Cities Using Edge Computing
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)The current urban planning trend is to build smart cities that are advanced, safe and sustainable. To build these cities several technologies could be exploited including the Internet of Things (IoT) and edge computing. ... -
Unveiling the Shadows: Leveraging Current Drone Detection Vulnerabilities to Design and Build a Stealth Drone
( Institute of Electrical and Electronics Engineers Inc. , 2024 , Conference Paper)Drones have become a popular tool for illegal activities and attacks, causing serious threats to global security. In order to address this issue, our project aims to demonstrate the limitations of current drone detection ... -
Improving remote health monitoring: A low-complexity ECG compression approach
( Multidisciplinary Digital Publishing Institute (MDPI) , 2018 , Article)Recent advances in mobile technology have created a shift towards using battery-driven devices in remote monitoring settings and smart homes. Clinicians are carrying out diagnostic and screening procedures based on the ... -
Investigation of TCP protocols in dynamically varying bandwidth conditions
( Springer Verlag , 2015 , Conference Paper)Cognitive radio (CR) networks experience fluctuating spectrum availability that impacts the end to end bandwidth of a connection. In this paper, we conduct an extensive simulation study of three different window-based TCP ... -
Malware detection for mobile computing using secure and privacy-preserving machine learning approaches: A comprehensive survey
( Elsevier , 2024 , Article)Mobile devices have become an essential element in our day-to-day lives. The chances of mobile attacks are rapidly increasing with the growing use of mobile devices. Exploiting vulnerabilities from devices as well as ... -
Stochastic Geometry-Based Physical-Layer Security Performance Analysis of a Hybrid NOMA-PDM-Based IoT System
( Institute of Electrical and Electronics Engineers Inc. , 2024 , Article)With the development of low-cost computer chips and wireless networks, any object or thing can become a component of the Internet of Things (IoT). As a result, these disparate things will gain digital intelligence, enabling ... -
RF-based drone detection and identification using deep learning approaches: An initiative towards a large open source drone database
( Elsevier , 2019 , Article)The omnipresence of unmanned aerial vehicles, or drones, among civilians can lead to technical, security, and public safety issues that need to be addressed, regulated and prevented. Security agencies are in continuous ... -
Biometric-based authentication scheme for Implantable Medical Devices during emergency situations
( Elsevier , 2019 , Article)Biometric recognition and analysis are among the most trusted features to be used by Implantable Medical Devices (IMDs). We aim to secure these devices by using these features in emergency scenarios. As patients can witness ... -
Content Validity and User Satisfaction Evaluation of Visualization Training Tool for Surgeons for Urethral Dissection during Robot-Assisted Radical Prostatectomy
( Association for Computing Machinery , 2021 , Conference Paper)Training and skills assessment for robotic surgeries has received unprecedented attention in technological research in the last few years due to the gradual adoption of minimally invasive robotic interventions. Robot-assisted ...