Now showing items 80-99 of 140

    • Paillier's encryption: Implementation and cloud applications 

      Nassar, Mohamed; Erradi, Abdelkarim; Malluhi, Qutaibah M. ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)
      Paillier's additive homomorphic encryption is increasingly used in recent research in the field of cloud secure outsourcing and privacy-preserving computation in addition to other cryptographic tools such as garbled circuits. ...
    • Parallelizing exact motif finding algorithms on multi-core 

      Abbas, Mostafa M.; Bahig, Hazem M.; Abouelhoda, Mohamed; Mohie-Eldin, M.M. ( Springer Science+Business Media , 2014 , Article)
      The motif finding problem is one of the important and challenging problems in bioinformatics. A variety of sequential algorithms have been proposed to find exact motifs, but the running time is still not suitable due to ...
    • Performance Evaluation of No-Pairing ECC-Based KPABE on IoT Platforms 

      Hijawi, Ula; Unal, Devrim; Hamila, Ridha; Gastli, Adel; Ellabban, Omar ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      Internet of Things (IoT) networks operating in lightweight resource-constrained devices have been growing constantly in a wide range of areas. Such networks collect sensitive information over time that represent the users' ...
    • A Practical and Scalable Tool to Find Overlaps between Sequences 

      Rachid, Maan Haj; Malluhi, Qutaibah ( Hindawi , 2015 , Article)
      The evolution of the next generation sequencing technology increases the demand for efficient solutions, in terms of space and time, for several bioinformatics problems. This paper presents a practical and easy-to-implement ...
    • Prediction of infarction volume and infarction growth rate in acute ischemic stroke 

      Kamran, Saadat; Akhtar, Naveed; Alboudi, Ayman; Kamran, Kainat; Ahmad, Arsalan; ... more authors ( Nature Publishing Group , 2017 , Article)
      The prediction of infarction volume after stroke onset depends on the shape of the growth dynamics of the infarction. To understand growth patterns that predict lesion volume changes, we studied currently available models ...
    • Preface 

      Ma, Maode ( Institute of Physics , 2022 , Other)
      2022 2nd International Conference on Electron Devices and Applications was held virtually during May 13-15, 2022 via Zoom platform due to the pandemic of COVID-19. With a satisfactory ending of ICEDA 2021, ICEDA 2022 has ...
    • Privacy preserving computation in cloud using noise-free fully homomorphic encryption (FHE) schemes 

      Wang, Yongge; Malluhi, Qutaibah M. ( Springer Verlag , 2016 , Conference Paper)
      With the wide adoption of cloud computing paradigm, it is important to develop appropriate techniques to protect client data privacy in the cloud. Encryption is one of the major techniques that could be used to achieve ...
    • A privacy-preserving handover authentication protocol for a group of MTC devices in 5G networks 

      Xiaobei, Yan; Ma, Maode ( Elsevier Ltd. , 2022 , Article)
      Machine Type Communication (MTC) has been emerging for a wide range of applications and services for the Internet of Things (IoT). In some scenarios, a large group of MTC devices (MTCDs) may enter the communication coverage ...
    • PriviPK: Certificate-less and secure email communication 

      AlSabah, Mashael; Tomescu, Alin; Lebedev, Ilia; Serpanos, Dimitrios; Devadas, Srini ( Elsevier Ltd , 2017 , Article)
      We introduce PriviPK, an infrastructure that is based on a novel combination of certificateless (CL) cryptography and key transparency techniques to enable e2e email encryption. Our design avoids (1) key escrow and deployment ...
    • Proportionally fair approach for tor's circuits scheduling 

      Basyoni L.; Erbad A.; Mohamed A.; Refaey A.; Guizani M. ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      The number of users adopting Tor to protect their online privacy is increasing rapidly. With a limited number of volunteered relays in the network, the number of clients' connections sharing the same relays is increasing ...
    • Qatar Green Schools Initiative: Energy Management System with Cost-Efficient and Lightweight Networked IoT 

      Hijawi, Ula; Gastli, Adel; Hamila, Ridha; Ellabban, Omar; Unal, Devrim ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      With the growing need of developing real-time energy management and automation systems, building energy efficiency is of large focus in recent research. In particular, school buildings require special attention to occupants' ...
    • Quantifying Satisfaction of Security Requirements of Cloud Software Systems 

      Nhlabatsi, Armstrong; Khan, Khaled MD; Hong, Jin B.; Kim, Dong Seong; Fernandez, Rachael; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2023 , Article)
      The satisfaction of a software requirement is commonly stated as a Boolean value, that is, a security requirement is either satisfied (true) or not (false). However, a discrete Boolean value to measure the satisfaction ...
    • QuicTor: Enhancing Tor for Real-Time Communication Using QUIC Transport Protocol 

      Basyoni L.; Erbad A.; Alsabah M.; Fetais N.; Mohamed A.; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)
      In the past decades, the internet has emerged as the fastest way to access information. However, this revolutionary information age comes with its own set of challenges. The privacy of Internet users is at increasing risk ...
    • Random vector functional link neural network based ensemble deep learning for short-term load forecasting 

      Gao, Ruobin; Du, Liang; Suganthan, Ponnuthurai Nagaratnam; Zhou, Qin; Yuen, Kum Fai ( Elsevier Ltd , 2022 , Article)
      Electric load forecasting is essential for the planning and maintenance of power systems. However, its un-stationary and non-linear properties impose significant difficulties in predicting future demand. This paper proposes ...
    • Real-time cooperative data routing and scheduling in software defined vehicular networks 

      Kalupahana Liyanage Kushan, Sudheera; Ma, Maode; Chong, Peter Han Joo ( Elsevier B.V. , 2022 , Article)
      Links in vehicular networks are highly dynamic and generally exist only for a limited amount of time. Moreover, data packets are generally transmitted over multiple hops and have diverse latency requirements. The above ...
    • Real-time robotic avatar control using fuzzy gaze-classification for people with disability 

      Qidwai, Uvais; Shakir, Mohamed; Bahameish, Mariam ( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)
      Robotic control with gaze-classification has been an area of interest for quite some time. In this paper, a novel solution of implementing sensing system with intelligent visualization has been presented. Such a system can ...
    • Real-Time Scheduling for Electric Vehicles Charging/Discharging Using Reinforcement Learning 

      Mhaisen, N.; Fetais, N.; Massoud, Ahmed ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      With the increase in Electric Vehicles (EVs) penetration, their charging needs form an additional burden on the grid. Thus, charging coordination is necessary for safe and efficient EV use. The scheduling of EVs is especially ...
    • Reasoning about Policies in Security-Aware Service Discovery Using Answer Set Programming 

      Asuncion, Vernon; Khan, Khaled M.; Erradi, Abdelkarim; Alhazbi, Saleh ( World Scientific Publishing Co. Pte Ltd , 2016 , Article)
      In order to enable a secure interaction between dynamically discovered software services and the client's application in a cooperative information system such as service oriented system, one of the pre-requisites is the ...
    • Reasoning about security policies of services using answer set programming 

      Asuncion, Vernon; Khan, Khaled M.; Erradi, Abdelkarim; Alhazbi, Saleh ( Institute of Electrical and Electronics Engineers Inc. , 2014 , Conference Paper)
      In this paper, we propose a formal framework for checking the consistency of security policies of services using Answer Set Programming (ASP). We illustrate that the formalisation of security policies of the service providers ...
    • Representation learning using deep random vector functional link networks for clustering: Representation learning using deep RVFL for clustering 

      Hu, Minghui; Suganthan, P. N. ( Elsevier Ltd , 2022 , Article)
      Random Vector Functional Link (RVFL) Networks have received a lot of attention due to the fast training speed as the non-iterative solution characteristic. Currently, the main research direction of RVFLs has supervised ...