Browsing Information Intelligence by Title
Now showing items 12-31 of 74
-
Blockchain technology for healthcare: Enhancing shared electronic health record interoperability and integrity
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)The Electronic Health Records (EHR) sharing system is the state of art for delivering healthcare. The tools within the system can predict outcomes during the patient's lifetime, monitor how effective are treatments, track ... -
Breath Analysis for the in Vivo Detection of Diabetic Ketoacidosis
( American Chemical Society , 2022 , Article)Human breath analysis of volatile organic compounds has gained significant attention recently because of its rapid and noninvasive potential to detect various metabolic diseases. The detection of ketones in the breath and ... -
Challenges and Mitigation of Cyber Threat in Automated Vehicle: An Integrated Approach
( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)The technological development of automated vehicles opens novel cybersecurity threats and risks for road safety. Increased connectivity often results in increased risks of a cyber-security attacks, which is one of the ... -
A comprehensive review of the deep learning-based tumor analysis approaches in histopathological images: segmentation, classification and multi-learning tasks
( Springer , 2023 , Other)Medical Imaging has become a vital technique that has been embraced in the diagnosis and treatment process of cancer. Histopathological slides, which microscopically examine the suspicious tissue, are considered the golden ... -
Compressive sensing based electronic nose platform
( Elsevier , 2017 , Article)Electronic nose (EN) systems play a significant role for gas monitoring and identification in gas plants. Using an EN system which consists of an array of sensors provides a high performance. Nevertheless, this performance ... -
Cybersecurity for next generation healthcare in Qatar
( Hamad bin Khalifa University Press (HBKU Press) , 2021 , Article)Background: IoMT (Internet of Medical Things) devices (often referred to IoMT domain) have the potential to quickly diagnose and monitor patients outside the hospital by transmitting information through the cloud domain ... -
Data confidentiality in cloud-based pervasive system
( Association for Computing Machinery , 2017 , Conference Paper)Data confidentiality and privacy is a serious concern in pervasive systems where cloud computing is used to process huge amount of data such as matrix multiplications typically used in HPC. Due to limited processing ... -
Deep learning for detection of routing attacks in the internet of things
( Atlantis Press , 2018 , Article)Cyber threats are a showstopper for Internet of Things (IoT) has recently been used at an industrial scale. Network layer attacks on IoT can cause significant disruptions and loss of information. Among such attacks, routing ... -
Design and implementation of a modular ECMO simulator
( Hamad bin Khalifa University Press (HBKU Press) , 2016 , Article)Background: Extracorporeal membrane oxygenation (ECMO) is a high-complexity life-saving procedure riddled with mechanical complications that can place the patient in a critical state where fast and coordinated actions are ... -
Distributed interference management using Q-Learning in cognitive femtocell networks: New USRP-based implementation
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)Femtocell networks have become a promising solution in supporting high data rates for 5G systems, where cell densification is performed using the small femtocells. However, femtocell networks have many challenges. One of ... -
Dynamic security metrics for measuring the effectiveness of moving target defense techniques
( Elsevier Ltd , 2018 , Article)Moving Target Defense (MTD) utilizes granularity, flexibility and elasticity properties of emerging networking technologies in order to continuously change the attack surface. There are many different MTD techniques proposed ... -
ECG encryption and identification based security solution on the Zynq SoC for connected health systems
( Academic Press Inc. , 2017 , Article)Connected health is a technology that associates medical devices, security devices and communication technologies. It enables patients to be monitored and treated remotely from their home. Patients' data and medical records ... -
Enabling broadcast communications in presence of jamming via probabilistic pairing
( Elsevier B.V. , 2017 , Article)This paper presents a thorough analysis of Freedom of Speech (FoS): a lightweight, fully distributed, and probabilistic protocol that assures the delivery of a message to be broadcast notwithstanding the presence of a ... -
Ensemble deep learning: A review
( Elsevier Ltd , 2022 , Other)Ensemble learning combines several individual models to obtain better generalization performance. Currently, deep learning architectures are showing better performance compared to the shallow or traditional models. Deep ... -
Evolutionary Multitask Optimization: Fundamental research questions, practices, and directions for the future
( Elsevier B.V. , 2022 , Article)Transfer Optimization has gained a remarkable attention from the Swarm and Evolutionary Computation community in the recent years. It is undeniable that the concepts underlying Transfer Optimization are formulated on solid ... -
Exploration of Carbonate Aggregates in Road Construction using Ultrasonic and Artificial Intelligence Approaches
( Qatar University Press , 2023 , Conference Paper)The COVID-19 pandemic has significantly impacted the construction sector, which is highly sensitive to economic cycles. In order to boost value and efficiency in this sector, the use of innovative exploration technologies ... -
A formal model-based testing framework for validating an IoT solution for blockchain-based vehicles communication
( SciTePress , 2020 , Conference Paper)The emergence of embedded and connected smart technologies, systems, and devices has enabled the concept of smart cities by connecting every "thing" to the Internet and in particular in transportation through the Internet ... -
Framework for Visualizing Browsing Patterns Captured in Computer Logs
( Hamad bin Khalifa University Press (HBKU Press) , 2018 , Conference Paper)Research ProblemAn Intrusion Detection System (IDS) is used for preventing security breaches by monitoring and analyzing the data recorded in log files. An IDS analyst is responsible for detecting intrusions in a system ... -
Fuzzy Identification-Based Encryption for healthcare user face authentication
( Hamad bin Khalifa University Press (HBKU Press) , 2022 , Article)Background: Internet of Medical Things (IOMT) has the potential to monitor health continuously and in real-time. One of the main issues that arise in IOMT is how securely the data can be transmitted to the clinical team. ... -
Green operator cooperation for radio frequency transmission minimization
( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)The increasing demand for reliable mobile services with faster communications speed requires high capital investment in the radio access networks. This leads to enormous energy consumption, high operational costs (OPEX), ...