Browsing Information Intelligence by Publication Date
Now showing items 1-20 of 93
-
Automatic generation of optimized workflow for distributed computations on large-scale matrices
( Springer Verlag , 2014 , Conference Paper)Efficient evaluation of distributed computation on large-scale data is prominent in modern scientific computation; especially analysis of big data, image processing and data mining applications. This problem is particularly ... -
A model driven framework for secure outsourcing of computation to the cloud
( IEEE Computer Society , 2014 , Conference Paper)This paper presents a model driven approach to define then coordinate the execution of protocols for secure outsourcing of computation of large datasets in cloud computing environments. First we present our Outsourcing ... -
Reasoning about security policies of services using answer set programming
( Institute of Electrical and Electronics Engineers Inc. , 2014 , Conference Paper)In this paper, we propose a formal framework for checking the consistency of security policies of services using Answer Set Programming (ASP). We illustrate that the formalisation of security policies of the service providers ... -
Intelligent Fuzzy Classifier for pre-seizure detection from real epileptic data
( Institute of Electrical and Electronics Engineers Inc. , 2014 , Conference Paper)In this paper, a classification method is presented using an Fuzzy Inference Engine to detect the incidences of pre-seizures in real/raw Epilepsy data. The system distinguishes between 'Normal', 'Pre-Seizure' and 'Seizure' ... -
Embedded wearable EEG seizure detection in ambulatory state
( UK Simulation Society , 2014 , Article)This paper describes a classification method is presented using a Fuzzy System to detect the occurrences of Partial Seizures from Epilepsy data, which can be implemented in any embedded system as a wearable detection system. ... -
Wirelessly controlled mimicing humanoid robot
( IEEE , 2014 , Conference Paper)Educational humanoid robots have started to find there place in institutions for children with special needs and Autism Spectrum Disorder (ASD) children therapy centers. Most of the humanoid robots are expensive, or come ... -
Retinal image enhancement using Laplacian pyramidal multi-scaling
( Institute of Electrical and Electronics Engineers Inc. , 2014 , Conference Paper)Early detection of retinal diseases is important to avoid complications and permanent vision loss. In this paper retinal neovascularization and molecular degeneration has been emphasized. Neovascularization is in form of ... -
Detection of partial seizure: An application of fuzzy rule system for wearable ambulatory systems
( IEEE , 2014 , Conference Paper)Electroencephalography (EEG) plays an intelligent role, especially EEG based health diagnosis of brain disorder, as well as brain-computer interface (BCI) applications. One such research field is related to epilepsy. The ... -
Parallelizing exact motif finding algorithms on multi-core
( Springer Science+Business Media , 2014 , Article)The motif finding problem is one of the important and challenging problems in bioinformatics. A variety of sequential algorithms have been proposed to find exact motifs, but the running time is still not suitable due to ... -
Distributed interference management using Q-Learning in cognitive femtocell networks: New USRP-based implementation
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)Femtocell networks have become a promising solution in supporting high data rates for 5G systems, where cell densification is performed using the small femtocells. However, femtocell networks have many challenges. One of ... -
A Domain Specific Language for Secure Outsourcing of Computation to the Cloud
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)Secure outsourcing of computation has gained importance with the proliferation of cloud services. However, existing outsourcing protocol specification languages are mainly suitable for secure multi-party computation. They ... -
Paillier's encryption: Implementation and cloud applications
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)Paillier's additive homomorphic encryption is increasingly used in recent research in the field of cloud secure outsourcing and privacy-preserving computation in addition to other cryptographic tools such as garbled circuits. ... -
Data Obfuscation for Privacy and Confidentiality in Cloud Computing
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)This paper proposes a data obfuscation approach in outsourcing matrix multiplication to cloud computing. It is primarily based on splitting the rows and columns of matrices to alter their actual dimension coupled with ... -
Anonymizing transactional datasets
( IOS Press , 2015 , Article)In this paper, we study the privacy breach caused by unsafe correlations in transactional data where individuals have multiple tuples in a dataset. We provide two safety constraints to guarantee safe correlation of the ... -
Evaluation of combined genome assemblies: A case study with fungal genomes
( Springer , 2015 , Conference Paper)The rapid advances in genome sequencing leads to the generation of huge amount of data in a single sequencing experiment. Several genome assemblers with different objectives were developed to process these genomic data. ... -
Can immersive type of Virtual Reality bring EMG pattern changes post facial palsy?
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)The loss of facial expression via facial paralysis is a devastating condition, both functionally and aesthetically. However, given the life-long plasticity of the brain one could assume that recovery could be facilitated ... -
Reasoning about Policies in Security-Aware Service Discovery Using Answer Set Programming
( World Scientific Publishing Co. Pte Ltd , 2016 , Article)In order to enable a secure interaction between dynamically discovered software services and the client's application in a cooperative information system such as service oriented system, one of the pre-requisites is the ... -
Design and implementation of a modular ECMO simulator
( Hamad bin Khalifa University Press (HBKU Press) , 2016 , Article)Background: Extracorporeal membrane oxygenation (ECMO) is a high-complexity life-saving procedure riddled with mechanical complications that can place the patient in a critical state where fast and coordinated actions are ... -
A new technique for compacting secret key in attribute-based broadcast encryption
( Springer Verlag , 2016 , Conference Paper)Public-key encryption has been generalized to adapt to more and more practical applications. Broadcast encryption, introduced by Fiat and Naor in 1993, aims for applications in pay-TV or satellite transmission and allows ... -
Image stitching system with scanning microscopy for histopathological applications
( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)Histopathological analysis of biopsy or surgical specimen is a common clinical practice for diagnostic purposes. Essentially, the process involves slicing the biopsy or surgical sample into very thin slices, placing them ...