Now showing items 31-50 of 140

    • Data confidentiality in cloud-based pervasive system 

      Khan, Khaled M.; Shaheen, Mahboob; Wang, Yongge ( Association for Computing Machinery , 2017 , Conference Paper)
      Data confidentiality and privacy is a serious concern in pervasive systems where cloud computing is used to process huge amount of data such as matrix multiplications typically used in HPC. Due to limited processing ...
    • A decomposition-based hybrid ensemble CNN framework for driver fatigue recognition 

      Li, Ruilin; Gao, Ruobin; Suganthan, Ponnuthurai Nagaratnam ( Elsevier Inc. , 2023 , Article)
      Electroencephalogram (EEG) has become increasingly popular in driver fatigue monitoring systems. Several decomposition methods have been attempted to analyze the EEG signals that are complex, nonlinear and non-stationary ...
    • Deep learning for detection of routing attacks in the internet of things 

      YAVUZ, Furkan Yusuf; Unal, Devrim; GÜL, Ensar ( Atlantis Press , 2018 , Article)
      Cyber threats are a showstopper for Internet of Things (IoT) has recently been used at an industrial scale. Network layer attacks on IoT can cause significant disruptions and loss of information. Among such attacks, routing ...
    • Deep Reservoir Computing Based Random Vector Functional Link for Non-sequential Classification 

      Hu, Minghui; Gao, Ruobin; Suganthan, P. N. ( Institute of Electrical and Electronics Engineers Inc. , 2022 , Conference Paper)
      Reservoir Computing (RC) is well-suited for simpler sequential tasks which require inexpensive, rapid training, and the Echo State Network (ESN) plays a significant role in RC. In this article, we proposed variations of ...
    • Design and implementation of a modular ECMO simulator 

      Aldisi, Mohammed; Alsalemi, Abdullah; Alhomsi, Yahya; Ahmed, Ibrahim; Bensaali, Fayçal; ... more authors ( Hamad bin Khalifa University Press (HBKU Press) , 2016 , Article)
      Background: Extracorporeal membrane oxygenation (ECMO) is a high-complexity life-saving procedure riddled with mechanical complications that can place the patient in a critical state where fast and coordinated actions are ...
    • Design and Implementation of a Threat-Specific Security Risk Assessment Tool 

      Nhlabatsi, Armstrong; Hussein, Alaa; Fetais, Noora; Khan, Khaled M. ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      Security threats posed to individual cloud computing clients vary depending on their specific security requirements. However, Cloud Providers apply generic security risk assessment approaches which result do not consider ...
    • Distributed interference management using Q-Learning in cognitive femtocell networks: New USRP-based implementation 

      Elsayed M.H.M.; Mohamed A. ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)
      Femtocell networks have become a promising solution in supporting high data rates for 5G systems, where cell densification is performed using the small femtocells. However, femtocell networks have many challenges. One of ...
    • DQN based Blockchain Data Storage in Resource-constrained IoT System 

      Lei, Boyi; Zhou, Jianhong; Ma, Maode; Niu, Xianhua ( Institute of Electrical and Electronics Engineers Inc. , 2023 , Conference Paper)
      Applying blockchain technology in the Internet of Things (IoT) systems to realize massive data storage is a promising technology, which can eliminate the dependence of IoT on central servers and protect data security ...
    • Dynamic ensemble deep echo state network for significant wave height forecasting 

      Gao, Ruobin; Li, Ruilin; Hu, Minghui; Suganthan, Ponnuthurai Nagaratnam; Yuen, Kum Fai ( Elsevier Ltd , 2023 , Article)
      Forecasts of the wave heights can assist in the data-driven control of wave energy systems. However, the dynamic properties and extreme fluctuations of the historical observations pose challenges to the construction of ...
    • Dynamic security metrics for measuring the effectiveness of moving target defense techniques 

      Hong J.B.; Enoch S.Y.; Kim D.S.; Nhlabatsi A.; Fetais N.; ... more authors ( Elsevier Ltd , 2018 , Article)
      Moving Target Defense (MTD) utilizes granularity, flexibility and elasticity properties of emerging networking technologies in order to continuously change the attack surface. There are many different MTD techniques proposed ...
    • ECG encryption and identification based security solution on the Zynq SoC for connected health systems 

      Zhai, Xiaojun; Ait Si Ali, Amine; Amira, Abbes; Bensaali, Faycal ( Academic Press Inc. , 2017 , Article)
      Connected health is a technology that associates medical devices, security devices and communication technologies. It enables patients to be monitored and treated remotely from their home. Patients' data and medical records ...
    • Edge computing-enabled green multisource fusion indoor positioning algorithm based on adaptive particle filter 

      Li, Mengyao; Zhu, Rongbo; Ding, Qianao; Wang, Jun; Wan, Shaohua; ... more authors ( Springer , 2023 , Article)
      Edge computing enables portable devices to provide smart applications, and the indoor positioning technique offers accurate location-based indoor navigation and personalized smart services. To achieve the high positioning ...
    • Edge intelligence-enabled cyber-physical systems 

      Zhu, Rongbo; Anjum, Ashiq; Li, Hongxiang; Ma, Maode ( John Wiley and Sons Ltd , 2023 , Other)
      With the advent of the Internet of everything era, people's demand for intelligent Internet of Things (IoT) devices is steadily increasing. A more intelligent cyber-physical system (CPS) is needed to meet the diverse ...
    • EEG-based emotion recognition using random Convolutional Neural Networks 

      Cheng, Wen Xin; Gao, Ruobin; Suganthan, P. N.; Yuen, Kum Fai ( Elsevier Ltd , 2022 , Article)
      Emotion recognition based on electroencephalogram (EEG) signals is helpful in various fields, including medical healthcare. One possible medical application is to diagnose emotional disorders in patients. Humans tend to ...
    • Empirical performance evaluation of QUIC protocol for Tor anonymity network 

      Basyoni, Lamiaa; Erbad, Aiman; Alsabah, Mashael; Fetais, Noora; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)
      Tor's anonymity network is one of the most widely used anonymity networks online, it consists of thousands of routers run by volunteers. Tor preserves the anonymity of its users by relaying the traffic through a number of ...
    • Empowering users of cloud computing on data confidentiality 

      Khan, Khaled M.; Shaheen, Mahboob ( IEEE , 2014 , Conference Paper)
      Cloud networking is an integral part of interconnected data centres operated in cloud environment. Cloud users heavily rely on cloud networking to transmit to and receive data from data centres. In this context, we explore ...
    • Enabling broadcast communications in presence of jamming via probabilistic pairing 

      Pietro, Roberto Di; Oligeri, Gabriele ( Elsevier B.V. , 2017 , Article)
      This paper presents a thorough analysis of Freedom of Speech (FoS): a lightweight, fully distributed, and probabilistic protocol that assures the delivery of a message to be broadcast notwithstanding the presence of a ...
    • Enhanced Beidou user equipment access authentication protocol based on location key 

      Cao, Jin; Bu, Qiuyu; Yang, Yuanyuan; Li, Hui; Liu, Qiao; ... more authors ( Editorial Board of Journal on Communications , 2022 , Article)
      In order to solve the shortcomings of the existing Beidou user equipment access solutions such as prolonged authentication, and in response to the need of user privacy protection, a user equipment access authentication ...
    • An Enhanced Multi-Phase Stochastic Differential Evolution Framework for Numerical Optimization 

      Abdel-Nabi, Heba; Ali, Mostafa; Daoud, Mohammad; Alazrai, Rami; Awajan, Arafat; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2022 , Conference Paper)
      Real-life problems can be expressed as optimization problems. These problems pose a challenge for researchers to design efficient algorithms that are capable of finding optimal solutions with the least budget. Stochastic ...
    • Ensemble deep learning: A review 

      Ganaie, M. A.; Hu, Minghui; Malik, A. K.; Tanveer, M.; Suganthan, P. N. ( Elsevier Ltd , 2022 , Other)
      Ensemble learning combines several individual models to obtain better generalization performance. Currently, deep learning architectures are showing better performance compared to the shallow or traditional models. Deep ...