Search
Now showing items 11-20 of 24
Anonymizing transactional datasets
(
IOS Press
, 2015 , Article)
In this paper, we study the privacy breach caused by unsafe correlations in transactional data where individuals have multiple tuples in a dataset. We provide two safety constraints to guarantee safe correlation of the ...
ECG encryption and identification based security solution on the Zynq SoC for connected health systems
(
Academic Press Inc.
, 2017 , Article)
Connected health is a technology that associates medical devices, security devices and communication technologies. It enables patients to be monitored and treated remotely from their home. Patients' data and medical records ...
Inpatient Discharges Forecasting for Singapore Hospitals by Machine Learning
(
Institute of Electrical and Electronics Engineers Inc.
, 2022 , Article)
Hospitals can predetermine the admission rate and facilitate resource allocation based on valid emergency requests and bed capacity estimation. The excess unoccupied beds can be determined with the help of forecasting the ...
An iterative cyclic tri-strategy hybrid stochastic fractal with adaptive differential algorithm for global numerical optimization
(
Elsevier Inc.
, 2023 , Article)
Many real-life problems can be formulated as numerical optimization problems. Such problems pose a challenge for researchers when designing efficient techniques that are capable of finding the desired solution without ...
SOLD: A node-Splitting algorithm for R-tree based on Objects' Locations Distribution
(
SAGE Publications Ltd
, 2019 , Article)
Spatial data indexing methods are of extreme importance as they massively build up as a result of the explosive growth in capturing data with spatial features. No matter how much the data size is, eventually it will reside ...
QuicTor: Enhancing Tor for Real-Time Communication Using QUIC Transport Protocol
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
In the past decades, the internet has emerged as the fastest way to access information. However, this revolutionary information age comes with its own set of challenges. The privacy of Internet users is at increasing risk ...
Reasoning about Policies in Security-Aware Service Discovery Using Answer Set Programming
(
World Scientific Publishing Co. Pte Ltd
, 2016 , Article)
In order to enable a secure interaction between dynamically discovered software services and the client's application in a cooperative information system such as service oriented system, one of the pre-requisites is the ...
Parallelizing exact motif finding algorithms on multi-core
(
Springer Science+Business Media
, 2014 , Article)
The motif finding problem is one of the important and challenging problems in bioinformatics. A variety of sequential algorithms have been proposed to find exact motifs, but the running time is still not suitable due to ...
Enabling broadcast communications in presence of jamming via probabilistic pairing
(
Elsevier B.V.
, 2017 , Article)
This paper presents a thorough analysis of Freedom of Speech (FoS): a lightweight, fully distributed, and probabilistic protocol that assures the delivery of a message to be broadcast notwithstanding the presence of a ...
Compressive sensing based electronic nose platform
(
Elsevier
, 2017 , Article)
Electronic nose (EN) systems play a significant role for gas monitoring and identification in gas plants. Using an EN system which consists of an array of sensors provides a high performance. Nevertheless, this performance ...