Computer Science & Engineering: Recent submissions
Now showing items 141-160 of 2402
-
Secure medical treatment with deep learning on embedded board
( Elsevier , 2020 , Book chapter)Deep brain stimulator is among several medical devices known by doctors and scientists for the treatment of movement disorders, such as Parkinson's disease, essential tremor, and dystonia. The security of these devices is ... -
Restoration of motion-corrupted EEG signals using attention-guided operational CycleGAN
( Elsevier , 2024 , Article)Electroencephalogram (EEG) signals suffer substantially from motion artifacts even in ambulatory settings. Signal processing techniques for removing motion artifacts from EEG signals have limitations, and the potential of ... -
Speaker identification using multimodal neural networks and wavelet analysis
( Institution of Engineering and Technology , 2015 , Article)The rapid momentum of the technology progress in the recent years has led to a tremendous rise in the use of biometric authentication systems. The objective of this research is to investigate the problem of identifying a ... -
3D Gaussian Descriptor for Video-based Person Re-Identification
( Vaclav Skala Union Agency , 2019 , Conference Paper)Despite being often considered less challenging than image-based person re-identification (re-id), video-based person re-id is still appealing as it mimics a more realistic scenario owing to the availability of pedestrian ... -
Audio-visual feature fusion for speaker identification
( Springer , 2012 , Conference Paper)Analyses of facial and audio features have been considered separately in conventional speaker identification systems. Herein, we propose a robust algorithm for text-independent speaker identification based on a decision-level ... -
Bringing Computer Science Education to Schools in Qatar: Challenges of the implementation
( IEEE , 2023 , Conference Paper)Many countries have started national curriculum changes to make computer science (CS) as a compulsory subject for all students in schools. In 2018, a new national computing curriculum has been developed in Qatar for all ... -
Using e-journaling to improve self-regulated learning in introductory computer programming course
( IEEE , 2014 , Conference Paper)Usually, students face different difficulties when learning computer programming, this leads many of them to drop out of computing major, or continue with fear of programming assignments in subsequent courses. The main ... -
Low Rate DoS Attack Detection in IoT - SDN using Deep Learning
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)The lack of standardization and the heterogeneous nature of IoT, exacerbated the issue of security and privacy. In recent literature, to improve security at the network level, the possibility of using SDN for IoT networks ... -
Study on Characteristics of Metric-aware Multipath Algorithms in Real Heterogeneous Networks
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)Multipath transmission is considered one of the promising solutions to improve wireless resource utilization where there are many kinds of heterogeneous networks around. Most scheduling algorithms rely on real-time network ... -
Feasibility Evaluation of Mixed Reality Obstacles on Treadmill using HoloLens to Elicit Real Obstacle Negotiation
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)An ability of visually-guided and anticipatory adjustments of locomotion corresponding to upcoming obstacles is important to avoid trip-induced fall. For establishing gait training based on visually-guided and anticipatory ... -
Using safety constraint for transactional dataset anonymization
( Springer , 2013 , Conference Paper)In this paper, we address privacy breaches in transactional data where individuals have multiple tuples in a dataset. We provide a safe grouping principle to ensure that correlated values are grouped together in unique ... -
Secure and efficient outsourcing of sequence comparisons
( Springer , 2012 , Conference Paper)We treat the problem of secure outsourcing of sequence comparisons by a client to remote servers, which given two strings λ and μ of respective lengths n and m, consists of finding a minimum-cost sequence of insertions, ... -
Maintaining database anonymity in the presence of queries
( Springer , 2013 , Conference Paper)With the advent of cloud computing there is an increased interest in outsourcing an organization's data to a remote provider in order to reduce the costs associated with self-hosting. If that database contains information ... -
Secure and private outsourcing of shape-based feature extraction
( Springer , 2013 , Conference Paper)There has been much recent work on secure storage outsourcing, where an organization wants to store its data at untrusted remote cloud servers in an encrypted form, such that its own employees can query the encrypted data ... -
Association rule mining on fragmented database
( Springer , 2015 , Conference Paper)Anonymization methods are an important tool to protect privacy. The goal is to release data while preventing individuals from being identified. Most approaches generalize data, reducing the level of detail so that many ... -
Preface : Distributed Computing and Artificial Intelligence, 12th International Conference
( Springer , 2015 , Other)The 12th International Symposium on Distributed Computing and Artificial Intelligence 2015 (DCAI 2015) is a forum to present applications of innovative techniques for solving complex problems in these areas. The exchange ... -
Distributed computing and artificial intelligence, 12th international conference
( Springer , 2015 , Conference Paper)The 12th International Symposium on Distributed Computing and Artificial Intelligence 2015 (DCAI 2015) is a forum to present applications of innovative techniques for studying and solving complex problems. The exchange of ... -
An efficient secure data compression technique based on chaos and adaptive Huffman coding
( Springer , 2021 , Article)Data stored in physical storage or transferred over a communication channel includes substantial redundancy. Compression techniques cut down the data redundancy to reduce space and communication time. Nevertheless, compression ... -
Privacy Preserving Computation in Cloud Using Reusable Garbled Oblivious RAMs
( Springer , 2022 , Conference Paper)When users store encrypted data in a cloud environment, it is important for users to ask cloud to carry out some computation on the remote data remotely. ORAM is a good potential approach to carry out this kind of remote ... -
Computational Aspects of Ideal (t, n)-Threshold Scheme of Chen, Laing, and Martin
( Springer , 2018 , Conference Paper)In CANS 2016, Chen, Laing, and Martin proposed an ideal (t, n)-threshold secret sharing scheme (the CLM scheme) based on random linear code. However, in this paper we show that this scheme is essentially same as the one ...