Now showing items 70-89 of 140

    • Lightweight KPABE Architecture Enabled in Mesh Networked Resource-Constrained IoT Devices 

      Hijawi, Ula; Unal, Devrim; Hamila, Ridha; Gastli, Adel; Ellabban, Omar ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)
      Internet of Things (IoT) environments are widely employed in industrial applications including intelligent transportation systems, healthcare systems, and building energy management systems. For such environments of highly ...
    • Minimizing energy consumption of IoT devices for O-RAN based IoT systems 

      Wang, Liping; Zhou, Jianhong; Ma, Maode; Niu, Xianhua ( Elsevier , 2023 , Article)
      The implementation of Open Radio Access Network (O-RAN) architecture in Internet of Things (IoT) systems has garnered significant attention as a means to fulfill the stringent requirements of ultra-low latency and ultra-low ...
    • Minimum Variance Embedded Random Vector Functional Link Network with Privileged Information 

      Ganaie, M. A.; Tanveer, M.; Malik, A. K.; Suganthan, P. N. ( Institute of Electrical and Electronics Engineers Inc. , 2022 , Conference Paper)
      A teacher in a school plays significant role in classroom while teaching the students. Similarly, learning via privileged information (LUPI) gives extra information generated by a teacher to 'teach' the learning algorithm ...
    • MLP Neural Network Based Gas Classification System on Zynq SoC 

      Zhai, Xiaojun; Ali, Amine Ait Si; Amira, Abbes; Bensaali, Faycal ( Institute of Electrical and Electronics Engineers Inc. , 2016 , Article)
      Systems based on wireless gas sensor networks offer a powerful tool to observe and analyze data in complex environments over long monitoring periods. Since the reliability of sensors is very important in those systems, gas ...
    • Monitoring DVT cuffs for long-term operation: A fuzzy approach 

      Qidwai, Uvais; Kamran, Saadat; Al-Sulaiti, Sara; Ahmed, Ghadeer; Hegazy, Asmaa ( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)
      Stroke patients, as well as all those patients who are bed-bound for a long period of time are highly susceptible to deep vein thrombosis (DVT) as secondary complexity. DVT poses more dangers of a loose blood clot obstructing ...
    • Multi-moth flame optimization for solving the link prediction problem in complex networks 

      Barham R.; Sharieh A.; Sleit A. ( Springer Verlag , 2019 , Article)
      Providing a solution for the link prediction problem attracts several computer science fields and becomes a popular challenge in researches. This challenge is presented by introducing several approaches keen to provide the ...
    • Multi-Objective Security Hardening Optimisation for Dynamic Networks 

      Enoch S.Y.; Hong J.B.; Ge M.; Khan K.M.; Kim D.S. ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)
      Hardening the dynamic networks is a very challenging task due to their complexity and dynamicity. Moreover, there may be multi-objectives to satisfy, while containing the solutions within the constraints (e.g., fixed budget, ...
    • Oblique and rotation double random forest 

      Ganaie, M. A.; Tanveer, M.; Suganthan, P. N.; Snasel, V. ( Elsevier Ltd , 2022 , Article)
      Random Forest is an ensemble of decision trees based on the bagging and random subspace concepts. As suggested by Breiman, the strength of unstable learners and the diversity among them are the ensemble models’ core strength. ...
    • Optimal sizing of a stand-alone hybrid PV-WT-BT system using artificial intelligence based technique 

      Hussain, Shahbaz; Alammari, Rashid; Iqbal, Atif; Shikfa, Abdullatif ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      Nowadays, conventional energy system is being replaced by renewable energy system. Especially, PV systems and wind energy systems are gaining much attention due to their future sustainability and eco-friendly nature. ...
    • Optimizing Energy-Distortion Trade-off for Vital Signs Delivery in Mobile Health Applications 

      Almarridi A.; Kharbach S.; Yaacoub E.; Mohamed A. ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      Healthcare is considered a top priority worldwide, considering the swift increase in the number of chronic patients who require continuous monitoring. This motivates the researchers to develop scalable remote health ...
    • Paillier's encryption: Implementation and cloud applications 

      Nassar, Mohamed; Erradi, Abdelkarim; Malluhi, Qutaibah M. ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)
      Paillier's additive homomorphic encryption is increasingly used in recent research in the field of cloud secure outsourcing and privacy-preserving computation in addition to other cryptographic tools such as garbled circuits. ...
    • Parallelizing exact motif finding algorithms on multi-core 

      Abbas, Mostafa M.; Bahig, Hazem M.; Abouelhoda, Mohamed; Mohie-Eldin, M.M. ( Springer Science+Business Media , 2014 , Article)
      The motif finding problem is one of the important and challenging problems in bioinformatics. A variety of sequential algorithms have been proposed to find exact motifs, but the running time is still not suitable due to ...
    • Performance Evaluation of No-Pairing ECC-Based KPABE on IoT Platforms 

      Hijawi, Ula; Unal, Devrim; Hamila, Ridha; Gastli, Adel; Ellabban, Omar ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      Internet of Things (IoT) networks operating in lightweight resource-constrained devices have been growing constantly in a wide range of areas. Such networks collect sensitive information over time that represent the users' ...
    • A Practical and Scalable Tool to Find Overlaps between Sequences 

      Rachid, Maan Haj; Malluhi, Qutaibah ( Hindawi , 2015 , Article)
      The evolution of the next generation sequencing technology increases the demand for efficient solutions, in terms of space and time, for several bioinformatics problems. This paper presents a practical and easy-to-implement ...
    • Prediction of infarction volume and infarction growth rate in acute ischemic stroke 

      Kamran, Saadat; Akhtar, Naveed; Alboudi, Ayman; Kamran, Kainat; Ahmad, Arsalan; ... more authors ( Nature Publishing Group , 2017 , Article)
      The prediction of infarction volume after stroke onset depends on the shape of the growth dynamics of the infarction. To understand growth patterns that predict lesion volume changes, we studied currently available models ...
    • Preface 

      Ma, Maode ( Institute of Physics , 2022 , Other)
      2022 2nd International Conference on Electron Devices and Applications was held virtually during May 13-15, 2022 via Zoom platform due to the pandemic of COVID-19. With a satisfactory ending of ICEDA 2021, ICEDA 2022 has ...
    • Privacy preserving computation in cloud using noise-free fully homomorphic encryption (FHE) schemes 

      Wang, Yongge; Malluhi, Qutaibah M. ( Springer Verlag , 2016 , Conference Paper)
      With the wide adoption of cloud computing paradigm, it is important to develop appropriate techniques to protect client data privacy in the cloud. Encryption is one of the major techniques that could be used to achieve ...
    • A privacy-preserving handover authentication protocol for a group of MTC devices in 5G networks 

      Xiaobei, Yan; Ma, Maode ( Elsevier Ltd. , 2022 , Article)
      Machine Type Communication (MTC) has been emerging for a wide range of applications and services for the Internet of Things (IoT). In some scenarios, a large group of MTC devices (MTCDs) may enter the communication coverage ...
    • PriviPK: Certificate-less and secure email communication 

      AlSabah, Mashael; Tomescu, Alin; Lebedev, Ilia; Serpanos, Dimitrios; Devadas, Srini ( Elsevier Ltd , 2017 , Article)
      We introduce PriviPK, an infrastructure that is based on a novel combination of certificateless (CL) cryptography and key transparency techniques to enable e2e email encryption. Our design avoids (1) key escrow and deployment ...
    • Proportionally fair approach for tor's circuits scheduling 

      Basyoni L.; Erbad A.; Mohamed A.; Refaey A.; Guizani M. ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      The number of users adopting Tor to protect their online privacy is increasing rapidly. With a limited number of volunteered relays in the network, the number of clients' connections sharing the same relays is increasing ...