Browsing Information Intelligence by Title
Now showing items 66-85 of 93
-
Real-Time Scheduling for Electric Vehicles Charging/Discharging Using Reinforcement Learning
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)With the increase in Electric Vehicles (EVs) penetration, their charging needs form an additional burden on the grid. Thus, charging coordination is necessary for safe and efficient EV use. The scheduling of EVs is especially ... -
Reasoning about Policies in Security-Aware Service Discovery Using Answer Set Programming
( World Scientific Publishing Co. Pte Ltd , 2016 , Article)In order to enable a secure interaction between dynamically discovered software services and the client's application in a cooperative information system such as service oriented system, one of the pre-requisites is the ... -
Reasoning about security policies of services using answer set programming
( Institute of Electrical and Electronics Engineers Inc. , 2014 , Conference Paper)In this paper, we propose a formal framework for checking the consistency of security policies of services using Answer Set Programming (ASP). We illustrate that the formalisation of security policies of the service providers ... -
RES-EV: Identifying EV-Households under High AC Load Using a Residual-Based Model
( Institute of Electrical and Electronics Engineers Inc. , 2024 , Conference Paper)This paper introduces a novel residual-based model to identify households with Battery Electric Vehicles (EVs) under high Air Conditioning (AC) load. The considerable energy demands of AC units can obscure charging events ... -
Retinal image enhancement using Laplacian pyramidal multi-scaling
( Institute of Electrical and Electronics Engineers Inc. , 2014 , Conference Paper)Early detection of retinal diseases is important to avoid complications and permanent vision loss. In this paper retinal neovascularization and molecular degeneration has been emphasized. Neovascularization is in form of ... -
Robotic probe positioning system for structural health monitoring
( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)Structural health Monitoring (SHM) is a very critical component for sustainable civil and mechanical structures in modern urban settings. The sky-scrappers and huge bridges in modern metropolis today are essential aspects ... -
Role updating in information systems using model checking
( Springer London , 2017 , Article)The role-based access control (RBAC) has significantly simplified the management of users and permissions in information systems. In dynamic environments, systems are constantly undergoing changes, and accordingly, the ... -
Secure Bluetooth Communication in Smart Healthcare Systems: A Novel Community Dataset and Intrusion Detection System
( MDPI , 2022 , Article)Smart health presents an ever-expanding attack surface due to the continuous adoption of a broad variety of Internet of Medical Things (IoMT) devices and applications. IoMT is a common approach to smart city solutions that ... -
Securing Aggregate Queries for DNA Databases
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)This paper addresses the problem of sharing person-specific genomic sequences without violating the privacy of their data subjects to support large-scale biomedical research projects. The proposed method builds on the ... -
Short survey of techniques for visualizing events recorded in logs
( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)Nowadays, data is being generated in large volumes and the users are left with a staggering amount of textual data that needs to be transformed into information to derive some knowledge from it. However, transforming and ... -
SLiFi: Exploiting Visible Light Communication VLC to Authenticate WiFi Access Points
( Hamad bin Khalifa University Press (HBKU Press) , 2018 , Conference Paper)This work presents an effective and efficient solution (SLiFi) to the evil twin attack in wireless networks. The evil twin is a rogue Wifi Access Point (AP) that pretends to be an authentic one by using the same network ... -
Smart energy usage and visualization based on micro-moments
( Springer Verlag , 2020 , Conference Paper)Due to global energy demands and overwhelming environmental dilemmas, exorbitant domestic energy usage is a colossal barrier towards energy efficiency. Tremendous research efforts have been poured into a plethora of methods ... -
Smart Grid Cybersecurity: Standards and Technical Countermeasures
( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)Cybersecurity in smart grids is of critical importance given the heavy reliance of modern societies on electricity and the recent cyberattacks that resulted in blackouts. The evolution of the legacy electric grid to a ... -
SOLD: A node-Splitting algorithm for R-tree based on Objects' Locations Distribution
( SAGE Publications Ltd , 2019 , Article)Spatial data indexing methods are of extreme importance as they massively build up as a result of the explosive growth in capturing data with spatial features. No matter how much the data size is, eventually it will reside ... -
SpiralSRA: A threat-specific security risk assessment framework for the cloud
( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)Conventional security risk assessment approaches for cloud infrastructures do not explicitly consider risk with respect to specific threats. This is a challenge for a cloud provider because it may apply the same risk ... -
Stateless Security Risk Assessment for Dynamic Networks
( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)Emerging networking technologies, such as cloud and Software Defined Networking, provide flexibility, elasticity and functionalities to change the network configurations over time. However, changes also impose unpredictable ... -
Substring search over encrypted data
( Hamad bin Khalifa University Press (HBKU Press) , 2018 , Conference Paper)Our data, be it personal or professional, is increasingly outsourced. This results from the development of cloud computing in the past ten years, a paradigm that shifts computing to a utility. Even without realizing it, ... -
Survey of Information Visualization Techniques for Enhancing Visual Analysis
( Institute of Electrical and Electronics Engineers Inc. , 2017 , Conference Paper)Visualization of data helps to transform a problem into a perceptual task that is easier to comprehend. It helps users to perceive patterns from large amount of data in order to make informed decisions. When visualization ... -
Systematic identification of threats in the cloud: A Survey
( Elsevier B.V. , 2019 , Article)When a vulnerability is discovered in a system, some key questions often asked by the security analyst are what threat(s) does it pose, what attacks may exploit it, and which parts of the system it affects. Answers to those ... -
The role of EEG and EMG combined virtual reality gaming system in facial palsy rehabilitation - A case report
( Churchill Livingstone , 2019 , Article)Background The recovery rates for facial palsy are usually excellent; however, regularly patients present with problems with their fine facial movements that affect their emotional expressions. Objective To discover the ...