Browsing KINDI Center for Computing Research by Title
Now showing items 41-60 of 156
-
Detection of Botnet Attacks against Industrial IoT Systems by Multilayer Deep Learning Approaches
( Hindawi Limited , 2022 , Article)Industry 4.0 is the next revolution in manufacturing technology that is going to change the production and distribution of goods and services within the following decade. Powered by different enabling technologies that are ... -
Distributed interference management using Q-Learning in cognitive femtocell networks: New USRP-based implementation
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)Femtocell networks have become a promising solution in supporting high data rates for 5G systems, where cell densification is performed using the small femtocells. However, femtocell networks have many challenges. One of ... -
DQN based Blockchain Data Storage in Resource-constrained IoT System
( Institute of Electrical and Electronics Engineers Inc. , 2023 , Conference Paper)Applying blockchain technology in the Internet of Things (IoT) systems to realize massive data storage is a promising technology, which can eliminate the dependence of IoT on central servers and protect data security ... -
Dynamic ensemble deep echo state network for significant wave height forecasting
( Elsevier Ltd , 2023 , Article)Forecasts of the wave heights can assist in the data-driven control of wave energy systems. However, the dynamic properties and extreme fluctuations of the historical observations pose challenges to the construction of ... -
Dynamic security metrics for measuring the effectiveness of moving target defense techniques
( Elsevier Ltd , 2018 , Article)Moving Target Defense (MTD) utilizes granularity, flexibility and elasticity properties of emerging networking technologies in order to continuously change the attack surface. There are many different MTD techniques proposed ... -
ECG encryption and identification based security solution on the Zynq SoC for connected health systems
( Academic Press Inc. , 2017 , Article)Connected health is a technology that associates medical devices, security devices and communication technologies. It enables patients to be monitored and treated remotely from their home. Patients' data and medical records ... -
Edge computing-enabled green multisource fusion indoor positioning algorithm based on adaptive particle filter
( Springer , 2023 , Article)Edge computing enables portable devices to provide smart applications, and the indoor positioning technique offers accurate location-based indoor navigation and personalized smart services. To achieve the high positioning ... -
Edge intelligence-enabled cyber-physical systems
( John Wiley and Sons Ltd , 2023 , Other)With the advent of the Internet of everything era, people's demand for intelligent Internet of Things (IoT) devices is steadily increasing. A more intelligent cyber-physical system (CPS) is needed to meet the diverse ... -
EEG-based emotion recognition using random Convolutional Neural Networks
( Elsevier Ltd , 2022 , Article)Emotion recognition based on electroencephalogram (EEG) signals is helpful in various fields, including medical healthcare. One possible medical application is to diagnose emotional disorders in patients. Humans tend to ... -
Empirical performance evaluation of QUIC protocol for Tor anonymity network
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)Tor's anonymity network is one of the most widely used anonymity networks online, it consists of thousands of routers run by volunteers. Tor preserves the anonymity of its users by relaying the traffic through a number of ... -
Empowering users of cloud computing on data confidentiality
( IEEE , 2014 , Conference Paper)Cloud networking is an integral part of interconnected data centres operated in cloud environment. Cloud users heavily rely on cloud networking to transmit to and receive data from data centres. In this context, we explore ... -
Enabling broadcast communications in presence of jamming via probabilistic pairing
( Elsevier B.V. , 2017 , Article)This paper presents a thorough analysis of Freedom of Speech (FoS): a lightweight, fully distributed, and probabilistic protocol that assures the delivery of a message to be broadcast notwithstanding the presence of a ... -
Enhanced Beidou user equipment access authentication protocol based on location key
( Editorial Board of Journal on Communications , 2022 , Article)In order to solve the shortcomings of the existing Beidou user equipment access solutions such as prolonged authentication, and in response to the need of user privacy protection, a user equipment access authentication ... -
An Enhanced Multi-Phase Stochastic Differential Evolution Framework for Numerical Optimization
( Institute of Electrical and Electronics Engineers Inc. , 2022 , Conference Paper)Real-life problems can be expressed as optimization problems. These problems pose a challenge for researchers to design efficient algorithms that are capable of finding optimal solutions with the least budget. Stochastic ... -
Ensemble deep learning: A review
( Elsevier Ltd , 2022 , Other)Ensemble learning combines several individual models to obtain better generalization performance. Currently, deep learning architectures are showing better performance compared to the shallow or traditional models. Deep ... -
Ensemble of Metaheuristic and Exact Algorithm Based on the Divide-And-Conquer Framework for Multisatellite Observation Scheduling
( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)Satellite observation scheduling plays a significant role in improving the efficiency of Earth observation systems. To solve the large-scale multisatellite observation scheduling problem, this article proposes an ensemble ... -
Evolutionary Multitask Optimization: Fundamental research questions, practices, and directions for the future
( Elsevier B.V. , 2022 , Article)Transfer Optimization has gained a remarkable attention from the Swarm and Evolutionary Computation community in the recent years. It is undeniable that the concepts underlying Transfer Optimization are formulated on solid ... -
Experimental evaluation of stochastic configuration networks: Is SC algorithm inferior to hyper-parameter optimization method?
( Elsevier Ltd , 2022 , Article)To overcome the pitfalls of Random Vector Functional Link (RVFL), a network called Stochastic Configuration Networks (SCN) has been proposed. By constraining and adaptively selecting the range of randomized parameters using ... -
Exploration of Carbonate Aggregates in Road Construction using Ultrasonic and Artificial Intelligence Approaches
( Qatar University Press , 2023 , Conference Paper)The COVID-19 pandemic has significantly impacted the construction sector, which is highly sensitive to economic cycles. In order to boost value and efficiency in this sector, the use of innovative exploration technologies ... -
Factors Affecting the Performance of Sub-1 GHz IoT Wireless Networks
( Hindawi Limited , 2021 , Article)Internet of Things (IoT) devices frequently utilize wireless networks operating in the Industrial, Scientific, and Medical (ISM) Sub-1 GHz spectrum bands. Compared with higher frequency bands, the Sub-1 GHz band provides ...