Computer Science & Engineering: Recent submissions
Now showing items 221-240 of 2484
-
Biometric-based authentication scheme for Implantable Medical Devices during emergency situations
( Elsevier , 2019 , Article)Biometric recognition and analysis are among the most trusted features to be used by Implantable Medical Devices (IMDs). We aim to secure these devices by using these features in emergency scenarios. As patients can witness ... -
Unveiling the Shadows: Leveraging Current Drone Detection Vulnerabilities to Design and Build a Stealth Drone
( Institute of Electrical and Electronics Engineers Inc. , 2024 , Conference)Drones have become a popular tool for illegal activities and attacks, causing serious threats to global security. In order to address this issue, our project aims to demonstrate the limitations of current drone detection ... -
Investigation of TCP protocols in dynamically varying bandwidth conditions
( Springer Verlag , 2015 , Conference)Cognitive radio (CR) networks experience fluctuating spectrum availability that impacts the end to end bandwidth of a connection. In this paper, we conduct an extensive simulation study of three different window-based TCP ... -
Restoration of motion-corrupted EEG signals using attention-guided operational CycleGAN
( Elsevier , 2024 , Article)Electroencephalogram (EEG) signals suffer substantially from motion artifacts even in ambulatory settings. Signal processing techniques for removing motion artifacts from EEG signals have limitations, and the potential of ... -
Audio-visual feature fusion for speaker identification
( Springer , 2012 , Conference)Analyses of facial and audio features have been considered separately in conventional speaker identification systems. Herein, we propose a robust algorithm for text-independent speaker identification based on a decision-level ... -
Speaker identification using multimodal neural networks and wavelet analysis
( Institution of Engineering and Technology , 2015 , Article)The rapid momentum of the technology progress in the recent years has led to a tremendous rise in the use of biometric authentication systems. The objective of this research is to investigate the problem of identifying a ... -
3D Gaussian Descriptor for Video-based Person Re-Identification
( Vaclav Skala Union Agency , 2019 , Conference)Despite being often considered less challenging than image-based person re-identification (re-id), video-based person re-id is still appealing as it mimics a more realistic scenario owing to the availability of pedestrian ... -
Using e-journaling to improve self-regulated learning in introductory computer programming course
( IEEE , 2014 , Conference)Usually, students face different difficulties when learning computer programming, this leads many of them to drop out of computing major, or continue with fear of programming assignments in subsequent courses. The main ... -
Bringing Computer Science Education to Schools in Qatar: Challenges of the implementation
( IEEE , 2023 , Conference)Many countries have started national curriculum changes to make computer science (CS) as a compulsory subject for all students in schools. In 2018, a new national computing curriculum has been developed in Qatar for all ... -
Low Rate DoS Attack Detection in IoT - SDN using Deep Learning
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference)The lack of standardization and the heterogeneous nature of IoT, exacerbated the issue of security and privacy. In recent literature, to improve security at the network level, the possibility of using SDN for IoT networks ... -
Study on Characteristics of Metric-aware Multipath Algorithms in Real Heterogeneous Networks
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference)Multipath transmission is considered one of the promising solutions to improve wireless resource utilization where there are many kinds of heterogeneous networks around. Most scheduling algorithms rely on real-time network ... -
Feasibility Evaluation of Mixed Reality Obstacles on Treadmill using HoloLens to Elicit Real Obstacle Negotiation
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference)An ability of visually-guided and anticipatory adjustments of locomotion corresponding to upcoming obstacles is important to avoid trip-induced fall. For establishing gait training based on visually-guided and anticipatory ... -
Cryptocurrencies and artificial intelligence: Challenges and opportunities
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)Decentralized cryptocurrencies have gained a lot of attention over the last decade. Bitcoin was introduced as the first cryptocurrency to allow direct online payments without relying on centralized financial entities. The ... -
Privacy-Preserving Fog Aggregation of Smart Grid Data Using Dynamic Differentially-Private Data Perturbation
( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)The edge of the smart grid has a massive number of power and resource-constrained interconnected devices. Mainly, smart meters report power consumption data from consumer homes, industrial buildings, and other connected ... -
Anomalies detection in software by conceptual learning from normal executions
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)Could we detect anomalies during the run-time of a program by learning from the analysis of its previous traces for normally completed executions? In this paper we create a featured data set from program traces at run time, ... -
Data consistency in multi-cloud storage systems with passive servers and non-communicating clients
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)Multi-cloud storage systems are becoming more popular due to the ever-expanding amount of consumer data. This growth is accompanied by increasing concerns regarding security, privacy, and reliability of cloud storage ... -
Securing Aggregate Queries for DNA Databases
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)This paper addresses the problem of sharing person-specific genomic sequences without violating the privacy of their data subjects to support large-scale biomedical research projects. The proposed method builds on the ... -
Similarity Group-By operators for multi-dimensional relational data
( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference)The SQL group-by operator plays an important role in summarizing and aggregating large datasets in a data analytics stack. The Similarity SQL-based Group-By operator (SGB, for short) extends the semantics of the standard ... -
Battery-Induced Load Hiding and Its Utility Consequences
( Institute of Electrical and Electronics Engineers Inc. , 2024 , Conference)The introduction of smart grids allows utility providers to collect detailed data about consumers, which can be utilized to enhance grid efficiency and reliability. However, this data collection also raises privacy concerns. ... -
RES-EV: Identifying EV-Households under High AC Load Using a Residual-Based Model
( Institute of Electrical and Electronics Engineers Inc. , 2024 , Conference)This paper introduces a novel residual-based model to identify households with Battery Electric Vehicles (EVs) under high Air Conditioning (AC) load. The considerable energy demands of AC units can obscure charging events ...