Search
Now showing items 21-30 of 74
A resource provisioning framework for bioinformatics applications in multi-cloud environments
(
Elsevier
, 2018 , Article)
The significant advancement in Next Generation Sequencing (NGS) have enabled the generation of several gigabytes of raw data in a single sequencing run. This amount of raw data introduces new scalability challenges in ...
Applying zero trust security principles to defence mechanisms against data exfiltration attacks
(
wiley
, 2021 , Book chapter)
The zero-trust principle explicitly verifies that the authentication and authorization of all actions are performed regardless of the requesting user's credentials or permissions. This chapter presents the details of a ...
Evaluation of combined genome assemblies: A case study with fungal genomes
(
Springer
, 2015 , Conference Paper)
The rapid advances in genome sequencing leads to the generation of huge amount of data in a single sequencing experiment. Several genome assemblers with different objectives were developed to process these genomic data. ...
Intelligent Fuzzy Classifier for pre-seizure detection from real epileptic data
(
Institute of Electrical and Electronics Engineers Inc.
, 2014 , Conference Paper)
In this paper, a classification method is presented using an Fuzzy Inference Engine to detect the incidences of pre-seizures in real/raw Epilepsy data. The system distinguishes between 'Normal', 'Pre-Seizure' and 'Seizure' ...
Securing Aggregate Queries for DNA Databases
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
This paper addresses the problem of sharing person-specific genomic sequences without violating the privacy of their data subjects to support large-scale biomedical research projects. The proposed method builds on the ...
Can immersive type of Virtual Reality bring EMG pattern changes post facial palsy?
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
The loss of facial expression via facial paralysis is a devastating condition, both functionally and aesthetically. However, given the life-long plasticity of the brain one could assume that recovery could be facilitated ...
Advanced Deep Learning for Resource Allocation and Security Aware Data Offloading in Industrial Mobile Edge Computing
(
Mary Ann Liebert Inc.
, 2021 , Article)
The Internet of Things (IoT) is permeating our daily lives through continuous environmental monitoring and data collection. The promise of low latency communication, enhanced security, and efficient bandwidth utilization ...
Blockchain technology for healthcare: Enhancing shared electronic health record interoperability and integrity
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
The Electronic Health Records (EHR) sharing system is the state of art for delivering healthcare. The tools within the system can predict outcomes during the patient's lifetime, monitor how effective are treatments, track ...
Garbled computation in cloud
(
Elsevier
, 2016 , Article)
With the wide adoption of cloud computing paradigm, it is important to develop appropriate techniques to protect client data privacy in the cloud. Encryption is one of the major techniques that could be used to achieve ...
RES-EV: Identifying EV-Households under High AC Load Using a Residual-Based Model
(
Institute of Electrical and Electronics Engineers Inc.
, 2024 , Conference Paper)
This paper introduces a novel residual-based model to identify households with Battery Electric Vehicles (EVs) under high Air Conditioning (AC) load. The considerable energy demands of AC units can obscure charging events ...