Now showing items 102-121 of 140

    • Sample-Based Data Augmentation Based on Electroencephalogram Intrinsic Characteristics 

      Li, Ruilin; Wang, Lipo; Suganthan, P. N.; Sourina, Olga ( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)
      Deep learning for electroencephalogram-based classification is confronted with data scarcity, due to the time-consuming and expensive data collection procedure. Data augmentation has been shown as an effective way to improve ...
    • Secure Bluetooth Communication in Smart Healthcare Systems: A Novel Community Dataset and Intrusion Detection System 

      Zubair, Mohammed; Ghubaish, Ali; Unal, Devrim; Al-Ali, Abdulla; Reimann, Thomas; ... more authors ( MDPI , 2022 , Article)
      Smart health presents an ever-expanding attack surface due to the continuous adoption of a broad variety of Internet of Medical Things (IoMT) devices and applications. IoMT is a common approach to smart city solutions that ...
    • Secure smart contract-enabled control of battery energy storage systems against cyber-attacks 

      Mhaisen N.; Fetais N.; Massoud A. ( Elsevier B.V. , 2019 , Article)
      Battery Energy Storage Systems (BESSs) are an integral part of a sustainable and resilient smart grid. The security of such critical cyber-physical infrastructure is considered as a major priority for both industry and ...
    • Secure Vehicular Platoon Management against Sybil Attacks 

      Junaidi, Danial Ritzuan; Ma, Maode; Su, Rong ( MDPI , 2022 , Article)
      The capacity of highways has been an ever-present constraint in the 21st century, bringing about the issue of safety with greater likelihoods of traffic accidents occurring. Furthermore, recent global oil prices have ...
    • Short survey of techniques for visualizing events recorded in logs 

      Fernandez R.; Fetais N. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
      Nowadays, data is being generated in large volumes and the users are left with a staggering amount of textual data that needs to be transformed into information to derive some knowledge from it. However, transforming and ...
    • Significant wave height forecasting using hybrid ensemble deep randomized networks with neurons pruning 

      Gao, Ruobin; Li, Ruilin; Hu, Minghui; Suganthan, Ponnuthurai Nagaratnam; Yuen, Kum Fai ( Elsevier Ltd , 2023 , Article)
      The reliable control of wave energy devices highly relies on the forecasts of wave heights. However, the dynamic characteristics and significant fluctuation of waves’ historical data pose challenges to precise predictions. ...
    • Similarity Group-by Operators for Multi-Dimensional Relational Data 

      Tang, Mingjie; Tahboub, Ruby Y.; Aref, Walid G.; Atallah, Mikhail J.; Malluhi, Qutaibah M.; ... more authors ( IEEE Computer Society , 2016 , Conference Paper)
      The SQL group-by operator plays an important role in summarizing and aggregating large datasets in a data analytics stack. While the standard group-by operator, which is based on equality, is useful in several applications, ...
    • Situation Awareness Recognition Using EEG and Eye-Tracking data: a pilot study 

      Li, Ruilin; Cui, Jian; Gao, Ruobin; Suganthan, P. N.; Sourina, Olga; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2022 , Conference Paper)
      Since situation awareness (SA) plays an important role in many fields, the measure of SA is one of the most concerning problems. Using physiological signals to evaluate SA is becoming a popular research topic because of ...
    • Skyline Discovery and Composition of Multi-Cloud Mashup Services 

      Zhang, Fan; Hwang, Kai; Khan, Samee U.; Malluhi, Qutaibah M. ( Institute of Electrical and Electronics Engineers , 2016 , Article)
      A cloud mashup is composed of multiple services with shared datasets and integrated functionalities. For example, the elastic compute cloud (EC2) provided by Amazon Web Service (AWS), the authentication and authorization ...
    • SLiFi: Exploiting Visible Light Communication VLC to Authenticate WiFi Access Points 

      Amin, Hafsa; Asadulla, Faryal; Jaffar, Aisha; Oligeri, Gabriele; Al-Sabah, Mashael ( Hamad bin Khalifa University Press (HBKU Press) , 2018 , Conference Paper)
      This work presents an effective and efficient solution (SLiFi) to the evil twin attack in wireless networks. The evil twin is a rogue Wifi Access Point (AP) that pretends to be an authentic one by using the same network ...
    • Smart energy usage and visualization based on micro-moments 

      Alsalemi, Abdullah; Bensaali, Faycal; Amira, Abbes; Fetais, Noora; Sardianos, Christos; ... more authors ( Springer Verlag , 2020 , Conference Paper)
      Due to global energy demands and overwhelming environmental dilemmas, exorbitant domestic energy usage is a colossal barrier towards energy efficiency. Tremendous research efforts have been poured into a plethora of methods ...
    • Smart Grid Cybersecurity: Standards and Technical Countermeasures 

      Hussain S.; Meraj M.; Abughalwa M.; Shikfa A. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
      Cybersecurity in smart grids is of critical importance given the heavy reliance of modern societies on electricity and the recent cyberattacks that resulted in blackouts. The evolution of the legacy electric grid to a ...
    • SOLD: A node-Splitting algorithm for R-tree based on Objects' Locations Distribution 

      Al-Nsour E.; Sleit A.; Alshraideh M. ( SAGE Publications Ltd , 2019 , Article)
      Spatial data indexing methods are of extreme importance as they massively build up as a result of the explosive growth in capturing data with spatial features. No matter how much the data size is, eventually it will reside ...
    • SpiralSRA: A threat-specific security risk assessment framework for the cloud 

      Nhlabatsi A.; Hong J.B.; Kim D.S.; Fernandez R.; Fetais N.; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
      Conventional security risk assessment approaches for cloud infrastructures do not explicitly consider risk with respect to specific threats. This is a challenge for a cloud provider because it may apply the same risk ...
    • Stateless Security Risk Assessment for Dynamic Networks 

      Hong J.B.; Yusuf S.E.; Kim D.S.; Khan K.M. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
      Emerging networking technologies, such as cloud and Software Defined Networking, provide flexibility, elasticity and functionalities to change the network configurations over time. However, changes also impose unpredictable ...
    • Substring search over encrypted data 

      Shikfa, Abdullatif ( Hamad bin Khalifa University Press (HBKU Press) , 2018 , Conference Paper)
      Our data, be it personal or professional, is increasingly outsourced. This results from the development of cloud computing in the past ten years, a paradigm that shifts computing to a utility. Even without realizing it, ...
    • Survey of Information Visualization Techniques for Enhancing Visual Analysis 

      Fernandez, Rachael; Fetais, Noora ( Institute of Electrical and Electronics Engineers Inc. , 2017 , Conference Paper)
      Visualization of data helps to transform a problem into a perceptual task that is easier to comprehend. It helps users to perceive patterns from large amount of data in order to make informed decisions. When visualization ...
    • Systematic identification of threats in the cloud: A Survey 

      Hong J.B.; Nhlabatsi A.; Kim D.S.; Hussein A.; Fetais N.; ... more authors ( Elsevier B.V. , 2019 , Article)
      When a vulnerability is discovered in a system, some key questions often asked by the security analyst are what threat(s) does it pose, what attacks may exploit it, and which parts of the system it affects. Answers to those ...
    • Takagi–Sugeno fuzzy based power system fault section diagnosis models via genetic learning adaptive GSK algorithm 

      Li, Changsong; Xiong, Guojiang; Fu, Xiaofan; Mohamed, Ali Wagdy; Yuan, Xufeng; ... more authors ( Elsevier B.V. , 2022 , Article)
      To effectively deal with the operating uncertainties of protective relays and circuit breakers existing in the power system faults, an improved fault section diagnosis (FSD) method is proposed by using Takagi–Sugeno fuzzy ...
    • The role of EEG and EMG combined virtual reality gaming system in facial palsy rehabilitation - A case report 

      Qidwai U.; Ajimsha M.S.; Shakir M. ( Churchill Livingstone , 2019 , Article)
      Background The recovery rates for facial palsy are usually excellent; however, regularly patients present with problems with their fine facial movements that affect their emotional expressions. Objective To discover the ...