Computer Science & Engineering: Recent submissions
Now showing items 141-160 of 2402
-
Content Validity and User Satisfaction Evaluation of Visualization Training Tool for Surgeons for Urethral Dissection during Robot-Assisted Radical Prostatectomy
( Association for Computing Machinery , 2021 , Conference)Training and skills assessment for robotic surgeries has received unprecedented attention in technological research in the last few years due to the gradual adoption of minimally invasive robotic interventions. Robot-assisted ... -
Restoration of motion-corrupted EEG signals using attention-guided operational CycleGAN
( Elsevier , 2024 , Article)Electroencephalogram (EEG) signals suffer substantially from motion artifacts even in ambulatory settings. Signal processing techniques for removing motion artifacts from EEG signals have limitations, and the potential of ... -
Speaker identification using multimodal neural networks and wavelet analysis
( Institution of Engineering and Technology , 2015 , Article)The rapid momentum of the technology progress in the recent years has led to a tremendous rise in the use of biometric authentication systems. The objective of this research is to investigate the problem of identifying a ... -
3D Gaussian Descriptor for Video-based Person Re-Identification
( Vaclav Skala Union Agency , 2019 , Conference)Despite being often considered less challenging than image-based person re-identification (re-id), video-based person re-id is still appealing as it mimics a more realistic scenario owing to the availability of pedestrian ... -
Audio-visual feature fusion for speaker identification
( Springer , 2012 , Conference)Analyses of facial and audio features have been considered separately in conventional speaker identification systems. Herein, we propose a robust algorithm for text-independent speaker identification based on a decision-level ... -
Bringing Computer Science Education to Schools in Qatar: Challenges of the implementation
( IEEE , 2023 , Conference)Many countries have started national curriculum changes to make computer science (CS) as a compulsory subject for all students in schools. In 2018, a new national computing curriculum has been developed in Qatar for all ... -
Using e-journaling to improve self-regulated learning in introductory computer programming course
( IEEE , 2014 , Conference)Usually, students face different difficulties when learning computer programming, this leads many of them to drop out of computing major, or continue with fear of programming assignments in subsequent courses. The main ... -
Low Rate DoS Attack Detection in IoT - SDN using Deep Learning
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference)The lack of standardization and the heterogeneous nature of IoT, exacerbated the issue of security and privacy. In recent literature, to improve security at the network level, the possibility of using SDN for IoT networks ... -
Study on Characteristics of Metric-aware Multipath Algorithms in Real Heterogeneous Networks
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference)Multipath transmission is considered one of the promising solutions to improve wireless resource utilization where there are many kinds of heterogeneous networks around. Most scheduling algorithms rely on real-time network ... -
Feasibility Evaluation of Mixed Reality Obstacles on Treadmill using HoloLens to Elicit Real Obstacle Negotiation
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference)An ability of visually-guided and anticipatory adjustments of locomotion corresponding to upcoming obstacles is important to avoid trip-induced fall. For establishing gait training based on visually-guided and anticipatory ... -
Using safety constraint for transactional dataset anonymization
( Springer , 2013 , Conference)In this paper, we address privacy breaches in transactional data where individuals have multiple tuples in a dataset. We provide a safe grouping principle to ensure that correlated values are grouped together in unique ... -
Maintaining database anonymity in the presence of queries
( Springer , 2013 , Conference)With the advent of cloud computing there is an increased interest in outsourcing an organization's data to a remote provider in order to reduce the costs associated with self-hosting. If that database contains information ... -
Secure and private outsourcing of shape-based feature extraction
( Springer , 2013 , Conference)There has been much recent work on secure storage outsourcing, where an organization wants to store its data at untrusted remote cloud servers in an encrypted form, such that its own employees can query the encrypted data ... -
Secure and efficient outsourcing of sequence comparisons
( Springer , 2012 , Conference)We treat the problem of secure outsourcing of sequence comparisons by a client to remote servers, which given two strings λ and μ of respective lengths n and m, consists of finding a minimum-cost sequence of insertions, ... -
Preface : Distributed Computing and Artificial Intelligence, 12th International Conference
( Springer , 2015 , Other)The 12th International Symposium on Distributed Computing and Artificial Intelligence 2015 (DCAI 2015) is a forum to present applications of innovative techniques for solving complex problems in these areas. The exchange ... -
Association rule mining on fragmented database
( Springer , 2015 , Conference)Anonymization methods are an important tool to protect privacy. The goal is to release data while preventing individuals from being identified. Most approaches generalize data, reducing the level of detail so that many ... -
Distributed computing and artificial intelligence, 12th international conference
( Springer , 2015 , Conference)The 12th International Symposium on Distributed Computing and Artificial Intelligence 2015 (DCAI 2015) is a forum to present applications of innovative techniques for studying and solving complex problems. The exchange of ... -
An efficient secure data compression technique based on chaos and adaptive Huffman coding
( Springer , 2021 , Article)Data stored in physical storage or transferred over a communication channel includes substantial redundancy. Compression techniques cut down the data redundancy to reduce space and communication time. Nevertheless, compression ... -
Computational Aspects of Ideal (t, n)-Threshold Scheme of Chen, Laing, and Martin
( Springer , 2018 , Conference)In CANS 2016, Chen, Laing, and Martin proposed an ideal (t, n)-threshold secret sharing scheme (the CLM scheme) based on random linear code. However, in this paper we show that this scheme is essentially same as the one ... -
Privacy Preserving Computation in Cloud Using Reusable Garbled Oblivious RAMs
( Springer , 2022 , Conference)When users store encrypted data in a cloud environment, it is important for users to ask cloud to carry out some computation on the remote data remotely. ORAM is a good potential approach to carry out this kind of remote ...