Now showing items 49-68 of 155

    • EEG-based emotion recognition using random Convolutional Neural Networks 

      Cheng, Wen Xin; Gao, Ruobin; Suganthan, P. N.; Yuen, Kum Fai ( Elsevier Ltd , 2022 , Article)
      Emotion recognition based on electroencephalogram (EEG) signals is helpful in various fields, including medical healthcare. One possible medical application is to diagnose emotional disorders in patients. Humans tend to ...
    • Empirical performance evaluation of QUIC protocol for Tor anonymity network 

      Basyoni, Lamiaa; Erbad, Aiman; Alsabah, Mashael; Fetais, Noora; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)
      Tor's anonymity network is one of the most widely used anonymity networks online, it consists of thousands of routers run by volunteers. Tor preserves the anonymity of its users by relaying the traffic through a number of ...
    • Empowering users of cloud computing on data confidentiality 

      Khan, Khaled M.; Shaheen, Mahboob ( IEEE , 2014 , Conference Paper)
      Cloud networking is an integral part of interconnected data centres operated in cloud environment. Cloud users heavily rely on cloud networking to transmit to and receive data from data centres. In this context, we explore ...
    • Enabling broadcast communications in presence of jamming via probabilistic pairing 

      Pietro, Roberto Di; Oligeri, Gabriele ( Elsevier B.V. , 2017 , Article)
      This paper presents a thorough analysis of Freedom of Speech (FoS): a lightweight, fully distributed, and probabilistic protocol that assures the delivery of a message to be broadcast notwithstanding the presence of a ...
    • Enhanced Beidou user equipment access authentication protocol based on location key 

      Cao, Jin; Bu, Qiuyu; Yang, Yuanyuan; Li, Hui; Liu, Qiao; ... more authors ( Editorial Board of Journal on Communications , 2022 , Article)
      In order to solve the shortcomings of the existing Beidou user equipment access solutions such as prolonged authentication, and in response to the need of user privacy protection, a user equipment access authentication ...
    • An Enhanced Multi-Phase Stochastic Differential Evolution Framework for Numerical Optimization 

      Abdel-Nabi, Heba; Ali, Mostafa; Daoud, Mohammad; Alazrai, Rami; Awajan, Arafat; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2022 , Conference Paper)
      Real-life problems can be expressed as optimization problems. These problems pose a challenge for researchers to design efficient algorithms that are capable of finding optimal solutions with the least budget. Stochastic ...
    • Ensemble deep learning: A review 

      Ganaie, M. A.; Hu, Minghui; Malik, A. K.; Tanveer, M.; Suganthan, P. N. ( Elsevier Ltd , 2022 , Other)
      Ensemble learning combines several individual models to obtain better generalization performance. Currently, deep learning architectures are showing better performance compared to the shallow or traditional models. Deep ...
    • Ensemble of Metaheuristic and Exact Algorithm Based on the Divide-And-Conquer Framework for Multisatellite Observation Scheduling 

      Wu, Guohua; Luo, Qizhang; Du, Xiao; Chen, Yingguo; Suganthan, Ponnuthurai Nagaratnam; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)
      Satellite observation scheduling plays a significant role in improving the efficiency of Earth observation systems. To solve the large-scale multisatellite observation scheduling problem, this article proposes an ensemble ...
    • Evolutionary Multitask Optimization: Fundamental research questions, practices, and directions for the future 

      Osaba, Eneko; Del Ser, Javier; Suganthan, Ponnuthurai N. ( Elsevier B.V. , 2022 , Article)
      Transfer Optimization has gained a remarkable attention from the Swarm and Evolutionary Computation community in the recent years. It is undeniable that the concepts underlying Transfer Optimization are formulated on solid ...
    • Experimental evaluation of stochastic configuration networks: Is SC algorithm inferior to hyper-parameter optimization method? 

      Hu, Minghui; Suganthan, P. N. ( Elsevier Ltd , 2022 , Article)
      To overcome the pitfalls of Random Vector Functional Link (RVFL), a network called Stochastic Configuration Networks (SCN) has been proposed. By constraining and adaptively selecting the range of randomized parameters using ...
    • Exploration of Carbonate Aggregates in Road Construction using Ultrasonic and Artificial Intelligence Approaches 

      Abdelhedi, Mohamed; Jabbar, Rateb; Abbes, Chedly ( Qatar University Press , 2023 , Conference Paper)
      The COVID-19 pandemic has significantly impacted the construction sector, which is highly sensitive to economic cycles. In order to boost value and efficiency in this sector, the use of innovative exploration technologies ...
    • Factors Affecting the Performance of Sub-1 GHz IoT Wireless Networks 

      Yang, Z.; Ghubaish, Ali; Unal, Devrim; Jain, Raj ( Hindawi Limited , 2021 , Article)
      Internet of Things (IoT) devices frequently utilize wireless networks operating in the Industrial, Scientific, and Medical (ISM) Sub-1 GHz spectrum bands. Compared with higher frequency bands, the Sub-1 GHz band provides ...
    • FastRNABindR: Fast and Accurate Prediction of Protein-RNA Interface Residues 

      EL-Manzalawy, Yasser; Abbas, Mostafa; Malluhi, Qutaibah; Honavar, Vasant ( Public Library of Science (PLoS) , 2016 , Article)
      A wide range of biological processes, including regulation of gene expression, protein synthesis, and replication and assembly of many viruses are mediated by RNA-protein interactions. However, experimental determination ...
    • A formal model-based testing framework for validating an IoT solution for blockchain-based vehicles communication 

      Jabbar, Rateb; Krichen, Moez; Kharbeche, Mohamed; Fetais, Noora; Barkaoui, Kamel ( SciTePress , 2020 , Conference Paper)
      The emergence of embedded and connected smart technologies, systems, and devices has enabled the concept of smart cities by connecting every "thing" to the Internet and in particular in transportation through the Internet ...
    • Framework for Visualizing Browsing Patterns Captured in Computer Logs 

      Fetais, Noora and Fernandez, Rachael ( Hamad bin Khalifa University Press (HBKU Press) , 2018 , Conference Paper)
      Research ProblemAn Intrusion Detection System (IDS) is used for preventing security breaches by monitoring and analyzing the data recorded in log files. An IDS analyst is responsible for detecting intrusions in a system ...
    • Fuzzy Identification-Based Encryption for healthcare user face authentication 

      Aggarwal, Mahima; Zubair, Mohammed; Unal, Devrim; Al-Ali, Abdulla; Reimann, Thomas; ... more authors ( Hamad bin Khalifa University Press (HBKU Press) , 2022 , Article)
      Background: Internet of Medical Things (IOMT) has the potential to monitor health continuously and in real-time. One of the main issues that arise in IOMT is how securely the data can be transmitted to the clinical team. ...
    • Garbled computation in cloud 

      Wang, Yongge; Malluhi, Qutaibah M.; Khan, Khaled MD ( Elsevier , 2016 , Article)
      With the wide adoption of cloud computing paradigm, it is important to develop appropriate techniques to protect client data privacy in the cloud. Encryption is one of the major techniques that could be used to achieve ...
    • Graph ensemble deep random vector functional link network for traffic forecasting 

      Du, Liang; Gao, Ruobin; Suganthan, Ponnuthurai Nagaratnam; Wang, David Z.W. (2022 , Article)
      Traffic forecasting is crucial to achieving a smart city as it facilitates public transportation management, autonomous driving, and the resource relocation of the sharing economy. Traffic forecasting belongs to the ...
    • Green operator cooperation for radio frequency transmission minimization 

      Amamou, Lamis; Boujelben, Maissa; Ghazzai, Hakim; Bouallegue, Ammar; Besbes, Hichem ( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)
      The increasing demand for reliable mobile services with faster communications speed requires high capital investment in the radio access networks. This leads to enormous energy consumption, high operational costs (OPEX), ...
    • Group owner election in Wi-Fi direct 

      Khan, Muhammad Asif; Cherif, Wael; Filali, Fethi ( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)
      Wi-Fi Direct is a new protocol that standardizes the direct communication between Wi-Fi enabled mobile devices without requiring an access point. The specification proposes enhanced peer-to-peer functions to be supported ...