Qatar University Institutional Repository: المرسلات الحديثة
السجلات المعروضة 1181 -- 1200 من 28767
-
Removal of toxic pollutants from produced water by phytoremediation: Applications and mechanistic study
( Elsevier Ltd , 2019 , Article)In this study, a greenhouse experiment of complete randomized design with three replications was conducted to investigate the potential of Medicago sativa, Zea mays, Helianthus annus, Sorghum bicolor, Phragmites australis ... -
Using safety constraint for transactional dataset anonymization
( Springer , 2013 , Conference Paper)In this paper, we address privacy breaches in transactional data where individuals have multiple tuples in a dataset. We provide a safe grouping principle to ensure that correlated values are grouped together in unique ... -
Secure and private outsourcing of shape-based feature extraction
( Springer , 2013 , Conference Paper)There has been much recent work on secure storage outsourcing, where an organization wants to store its data at untrusted remote cloud servers in an encrypted form, such that its own employees can query the encrypted data ... -
Maintaining database anonymity in the presence of queries
( Springer , 2013 , Conference Paper)With the advent of cloud computing there is an increased interest in outsourcing an organization's data to a remote provider in order to reduce the costs associated with self-hosting. If that database contains information ... -
Secure and efficient outsourcing of sequence comparisons
( Springer , 2012 , Conference Paper)We treat the problem of secure outsourcing of sequence comparisons by a client to remote servers, which given two strings λ and μ of respective lengths n and m, consists of finding a minimum-cost sequence of insertions, ... -
Evaluation of combined genome assemblies: A case study with fungal genomes
( Springer , 2015 , Conference Paper)The rapid advances in genome sequencing leads to the generation of huge amount of data in a single sequencing experiment. Several genome assemblers with different objectives were developed to process these genomic data. ... -
Distributed computing and artificial intelligence, 12th international conference
( Springer , 2015 , Conference Paper)The 12th International Symposium on Distributed Computing and Artificial Intelligence 2015 (DCAI 2015) is a forum to present applications of innovative techniques for studying and solving complex problems. The exchange of ... -
Association rule mining on fragmented database
( Springer , 2015 , Conference Paper)Anonymization methods are an important tool to protect privacy. The goal is to release data while preventing individuals from being identified. Most approaches generalize data, reducing the level of detail so that many ... -
Preface : Distributed Computing and Artificial Intelligence, 12th International Conference
( Springer , 2015 , Other)The 12th International Symposium on Distributed Computing and Artificial Intelligence 2015 (DCAI 2015) is a forum to present applications of innovative techniques for solving complex problems in these areas. The exchange ... -
Privacy Preserving Computation in Cloud Using Reusable Garbled Oblivious RAMs
( Springer , 2022 , Conference Paper)When users store encrypted data in a cloud environment, it is important for users to ask cloud to carry out some computation on the remote data remotely. ORAM is a good potential approach to carry out this kind of remote ... -
Computational Aspects of Ideal (t, n)-Threshold Scheme of Chen, Laing, and Martin
( Springer , 2018 , Conference Paper)In CANS 2016, Chen, Laing, and Martin proposed an ideal (t, n)-threshold secret sharing scheme (the CLM scheme) based on random linear code. However, in this paper we show that this scheme is essentially same as the one ... -
An efficient secure data compression technique based on chaos and adaptive Huffman coding
( Springer , 2021 , Article)Data stored in physical storage or transferred over a communication channel includes substantial redundancy. Compression techniques cut down the data redundancy to reduce space and communication time. Nevertheless, compression ... -
Efficient processing of hamming-distance-based similarity-search queries over MapReduce
( OpenProceedings.org, University of Konstanz, University Library , 2015 , Conference Paper)Similarity search is crucial to many applications. Of particular interest are two flavors of the Hamming distance range query, namely, the Hamming select and the Hamming join (Hamming-select and Hamming-join, respectively). ... -
Towards On-Device Dehydration Monitoring Using Machine Learning from Wearable Device's Data
( MDPI , 2022 , Article)With the ongoing advances in sensor technology and miniaturization of electronic chips, more applications are researched and developed for wearable devices. Hydration monitoring is among the problems that have been recently ... -
Decentralized broadcast encryption schemes with constant size ciphertext and fast decryption
( MDPI AG , 2020 , Article)Broadcast encryption (BE) allows a sender to encrypt a message to an arbitrary target set of legitimate users and to prevent non-legitimate users from recovering the broadcast information. BE has numerous practical ... -
AICCSA 08 - 6th IEEE/ACS International Conference on Computer Systems and Applications: Message from the general chairs
( Institute of Electrical and Electronics Engineers Inc. , 2008 , Other)Presents the introductory welcome message from the conference proceedings. -
Anonymizing transactional datasets
( IOS Press , 2015 , Article)In this paper, we study the privacy breach caused by unsafe correlations in transactional data where individuals have multiple tuples in a dataset. We provide two safety constraints to guarantee safe correlation of the ... -
Smart grid public datasets: Characteristics and associated applications
( John Wiley and Sons Inc , 2024 , Article Review)The development of smart grids, traditional power grids, and the integration of internet of things devices have resulted in a wealth of data crucial to advancing energy management and efficiency. Nevertheless, public ... -
ConMR: Concurrent MapReduce programming model for large scale shared-Data applications
( Institute of Electrical and Electronics Engineers Inc. , 2013 , Conference Paper)The rapid growth of large-data processing has brought in the MapReduce programming model as a widely accepted solution. However, MapReduce limits itself to a onemap- To-one-reduce framework. Meanwhile, it lacks built-in ... -
Real-time traffic surveillance using ZigBee
( Institute of Electrical and Electronics Engineers Inc. , 2010 , Conference Paper)This paper describes the design, implementation, and analysis of a proof-of-concept prototype of a traffic surveillance system. The system employs an in-vehicle device for collecting real-time traffic data. The device uses ...