Browsing KINDI Center for Computing Research by Type "Conference Paper"
Now showing items 21-40 of 74
-
Design and Implementation of a Threat-Specific Security Risk Assessment Tool
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)Security threats posed to individual cloud computing clients vary depending on their specific security requirements. However, Cloud Providers apply generic security risk assessment approaches which result do not consider ... -
Detection of partial seizure: An application of fuzzy rule system for wearable ambulatory systems
( IEEE , 2014 , Conference Paper)Electroencephalography (EEG) plays an intelligent role, especially EEG based health diagnosis of brain disorder, as well as brain-computer interface (BCI) applications. One such research field is related to epilepsy. The ... -
Distributed interference management using Q-Learning in cognitive femtocell networks: New USRP-based implementation
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)Femtocell networks have become a promising solution in supporting high data rates for 5G systems, where cell densification is performed using the small femtocells. However, femtocell networks have many challenges. One of ... -
DQN based Blockchain Data Storage in Resource-constrained IoT System
( Institute of Electrical and Electronics Engineers Inc. , 2023 , Conference Paper)Applying blockchain technology in the Internet of Things (IoT) systems to realize massive data storage is a promising technology, which can eliminate the dependence of IoT on central servers and protect data security ... -
Empirical performance evaluation of QUIC protocol for Tor anonymity network
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)Tor's anonymity network is one of the most widely used anonymity networks online, it consists of thousands of routers run by volunteers. Tor preserves the anonymity of its users by relaying the traffic through a number of ... -
Empowering users of cloud computing on data confidentiality
( IEEE , 2014 , Conference Paper)Cloud networking is an integral part of interconnected data centres operated in cloud environment. Cloud users heavily rely on cloud networking to transmit to and receive data from data centres. In this context, we explore ... -
An Enhanced Multi-Phase Stochastic Differential Evolution Framework for Numerical Optimization
( Institute of Electrical and Electronics Engineers Inc. , 2022 , Conference Paper)Real-life problems can be expressed as optimization problems. These problems pose a challenge for researchers to design efficient algorithms that are capable of finding optimal solutions with the least budget. Stochastic ... -
Evaluation of Loss Functions for Segmentation of Corneal Nerves
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)Corneal confocal microscopy (CCM) has been advocated as a non-invasive technique for objective diagnosis of very early neuropathy in patients by scanning the corneal subbasal nerve plexus. The obtained images provide a ... -
Exploration of Carbonate Aggregates in Road Construction using Ultrasonic and Artificial Intelligence Approaches
( Qatar University Press , 2023 , Conference Paper)The COVID-19 pandemic has significantly impacted the construction sector, which is highly sensitive to economic cycles. In order to boost value and efficiency in this sector, the use of innovative exploration technologies ... -
A formal model-based testing framework for validating an IoT solution for blockchain-based vehicles communication
( SciTePress , 2020 , Conference Paper)The emergence of embedded and connected smart technologies, systems, and devices has enabled the concept of smart cities by connecting every "thing" to the Internet and in particular in transportation through the Internet ... -
Framework for Visualizing Browsing Patterns Captured in Computer Logs
( Hamad bin Khalifa University Press (HBKU Press) , 2018 , Conference Paper)Research ProblemAn Intrusion Detection System (IDS) is used for preventing security breaches by monitoring and analyzing the data recorded in log files. An IDS analyst is responsible for detecting intrusions in a system ... -
Green operator cooperation for radio frequency transmission minimization
( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)The increasing demand for reliable mobile services with faster communications speed requires high capital investment in the radio access networks. This leads to enormous energy consumption, high operational costs (OPEX), ... -
Group owner election in Wi-Fi direct
( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)Wi-Fi Direct is a new protocol that standardizes the direct communication between Wi-Fi enabled mobile devices without requiring an access point. The specification proposes enhanced peer-to-peer functions to be supported ... -
Image stitching system with scanning microscopy for histopathological applications
( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)Histopathological analysis of biopsy or surgical specimen is a common clinical practice for diagnostic purposes. Essentially, the process involves slicing the biopsy or surgical sample into very thin slices, placing them ... -
Image Stitching System With Scanning Microscopy for Histopathological Applications
( Hamad bin Khalifa University Press (HBKU Press) , 2018 , Conference Paper)Histopathological analysis of biopsy or surgical specimen is a common clinical practice for diagnostic purposes. Essentially, the process involves slicing the biopsy or surgical sample into very thin slices, placing them ... -
Intelligent Fuzzy Classifier for pre-seizure detection from real epileptic data
( Institute of Electrical and Electronics Engineers Inc. , 2014 , Conference Paper)In this paper, a classification method is presented using an Fuzzy Inference Engine to detect the incidences of pre-seizures in real/raw Epilepsy data. The system distinguishes between 'Normal', 'Pre-Seizure' and 'Seizure' ... -
Minimum Variance Embedded Random Vector Functional Link Network with Privileged Information
( Institute of Electrical and Electronics Engineers Inc. , 2022 , Conference Paper)A teacher in a school plays significant role in classroom while teaching the students. Similarly, learning via privileged information (LUPI) gives extra information generated by a teacher to 'teach' the learning algorithm ... -
Monitoring DVT cuffs for long-term operation: A fuzzy approach
( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)Stroke patients, as well as all those patients who are bed-bound for a long period of time are highly susceptible to deep vein thrombosis (DVT) as secondary complexity. DVT poses more dangers of a loose blood clot obstructing ... -
Multi-Objective Security Hardening Optimisation for Dynamic Networks
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)Hardening the dynamic networks is a very challenging task due to their complexity and dynamicity. Moreover, there may be multi-objectives to satisfy, while containing the solutions within the constraints (e.g., fixed budget, ... -
Optimal sizing of a stand-alone hybrid PV-WT-BT system using artificial intelligence based technique
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)Nowadays, conventional energy system is being replaced by renewable energy system. Especially, PV systems and wind energy systems are gaining much attention due to their future sustainability and eco-friendly nature. ...