Browsing Information Intelligence by Title
Now showing items 1-20 of 68
-
A Domain Specific Language for Secure Outsourcing of Computation to the Cloud
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)Secure outsourcing of computation has gained importance with the proliferation of cloud services. However, existing outsourcing protocol specification languages are mainly suitable for secure multi-party computation. They ... -
A model driven framework for secure outsourcing of computation to the cloud
( IEEE Computer Society , 2014 , Conference Paper)This paper presents a model driven approach to define then coordinate the execution of protocols for secure outsourcing of computation of large datasets in cloud computing environments. First we present our Outsourcing ... -
A new technique for compacting secret key in attribute-based broadcast encryption
( Springer Verlag , 2016 , Conference Paper)Public-key encryption has been generalized to adapt to more and more practical applications. Broadcast encryption, introduced by Fiat and Naor in 1993, aims for applications in pay-TV or satellite transmission and allows ... -
A novel multi-hop body-To-body routing protocol for disaster and emergency networks
( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)In this paper, a new multi-hop routing protocol (called ORACE-Net) for disaster and emergency networks is proposed. The proposed hierarchical protocol creates an ad-hoc network through body-To-body (B2B) communication ... -
An efficient instance hiding scheme
( Association for Computing Machinery , 2016 , Conference Paper)Delegating computation, which is applicable to many practical contexts such as cloud computing or pay-TV system, concerns the task where a computationally weak client wants to securely compute a very complex function f on ... -
An enhanced ensemble deep random vector functional link network for driver fatigue recognition
( Elsevier , 2023 , Article)This work investigated the use of an ensemble deep random vector functional link (edRVFL) network for electroencephalogram (EEG)-based driver fatigue recognition. Against the low feature learning capability of the edRVFL ... -
An Interactive Visualization Web Solution for Electricity Consumption in Qatar
( Institute of Electrical and Electronics Engineers Inc. , 2017 , Conference Paper)The amount of raw data related to electricity companies is increasing rapidly with the increase of construction sites, population and Qatar preparation for 2022 world cup. A question arises from this situation is: How can ... -
Automated layer-wise solution for ensemble deep randomized feed-forward neural network
( Elsevier B.V. , 2022 , Article)The randomized feed-forward neural network is a single hidden layer feed-forward neural network that enables efficient learning by optimizing only the output weights. The ensemble deep learning framework significantly ... -
Automatic generation of optimized workflow for distributed computations on large-scale matrices
( Springer Verlag , 2014 , Conference Paper)Efficient evaluation of distributed computation on large-scale data is prominent in modern scientific computation; especially analysis of big data, image processing and data mining applications. This problem is particularly ... -
Breath Analysis for the in Vivo Detection of Diabetic Ketoacidosis
( American Chemical Society , 2022 , Article)Human breath analysis of volatile organic compounds has gained significant attention recently because of its rapid and noninvasive potential to detect various metabolic diseases. The detection of ketones in the breath and ... -
Challenges and Mitigation of Cyber Threat in Automated Vehicle: An Integrated Approach
( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)The technological development of automated vehicles opens novel cybersecurity threats and risks for road safety. Increased connectivity often results in increased risks of a cyber-security attacks, which is one of the ... -
A comprehensive review of the deep learning-based tumor analysis approaches in histopathological images: segmentation, classification and multi-learning tasks
( Springer , 2023 , Other)Medical Imaging has become a vital technique that has been embraced in the diagnosis and treatment process of cancer. Histopathological slides, which microscopically examine the suspicious tissue, are considered the golden ... -
Compressive sensing based electronic nose platform
( Elsevier , 2017 , Article)Electronic nose (EN) systems play a significant role for gas monitoring and identification in gas plants. Using an EN system which consists of an array of sensors provides a high performance. Nevertheless, this performance ... -
Cybersecurity for next generation healthcare in Qatar
( Hamad bin Khalifa University Press (HBKU Press) , 2021 , Article)Background: IoMT (Internet of Medical Things) devices (often referred to IoMT domain) have the potential to quickly diagnose and monitor patients outside the hospital by transmitting information through the cloud domain ... -
Data confidentiality in cloud-based pervasive system
( Association for Computing Machinery , 2017 , Conference Paper)Data confidentiality and privacy is a serious concern in pervasive systems where cloud computing is used to process huge amount of data such as matrix multiplications typically used in HPC. Due to limited processing ... -
Deep learning for detection of routing attacks in the internet of things
( Atlantis Press , 2018 , Article)Cyber threats are a showstopper for Internet of Things (IoT) has recently been used at an industrial scale. Network layer attacks on IoT can cause significant disruptions and loss of information. Among such attacks, routing ... -
Design and implementation of a modular ECMO simulator
( Hamad bin Khalifa University Press (HBKU Press) , 2016 , Article)Background: Extracorporeal membrane oxygenation (ECMO) is a high-complexity life-saving procedure riddled with mechanical complications that can place the patient in a critical state where fast and coordinated actions are ... -
Distributed interference management using Q-Learning in cognitive femtocell networks: New USRP-based implementation
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)Femtocell networks have become a promising solution in supporting high data rates for 5G systems, where cell densification is performed using the small femtocells. However, femtocell networks have many challenges. One of ... -
Dynamic security metrics for measuring the effectiveness of moving target defense techniques
( Elsevier Ltd , 2018 , Article)Moving Target Defense (MTD) utilizes granularity, flexibility and elasticity properties of emerging networking technologies in order to continuously change the attack surface. There are many different MTD techniques proposed ... -
ECG encryption and identification based security solution on the Zynq SoC for connected health systems
( Academic Press Inc. , 2017 , Article)Connected health is a technology that associates medical devices, security devices and communication technologies. It enables patients to be monitored and treated remotely from their home. Patients' data and medical records ...