Search
Now showing items 1-10 of 30
ECG encryption and identification based security solution on the Zynq SoC for connected health systems
(
Academic Press Inc.
, 2017 , Article)
Connected health is a technology that associates medical devices, security devices and communication technologies. It enables patients to be monitored and treated remotely from their home. Patients' data and medical records ...
Reasoning about Policies in Security-Aware Service Discovery Using Answer Set Programming
(
World Scientific Publishing Co. Pte Ltd
, 2016 , Article)
In order to enable a secure interaction between dynamically discovered software services and the client's application in a cooperative information system such as service oriented system, one of the pre-requisites is the ...
The role of EEG and EMG combined virtual reality gaming system in facial palsy rehabilitation - A case report
(
Churchill Livingstone
, 2019 , Article)
Background
The recovery rates for facial palsy are usually excellent; however, regularly patients present with problems with their fine facial movements that affect their emotional expressions.
Objective
To discover the ...
SOLD: A node-Splitting algorithm for R-tree based on Objects' Locations Distribution
(
SAGE Publications Ltd
, 2019 , Article)
Spatial data indexing methods are of extreme importance as they massively build up as a result of the explosive growth in capturing data with spatial features. No matter how much the data size is, eventually it will reside ...
Role updating in information systems using model checking
(
Springer London
, 2017 , Article)
The role-based access control (RBAC) has significantly simplified the management of users and permissions in information systems. In dynamic environments, systems are constantly undergoing changes, and accordingly, the ...
Parallelizing exact motif finding algorithms on multi-core
(
Springer Science+Business Media
, 2014 , Article)
The motif finding problem is one of the important and challenging problems in bioinformatics. A variety of sequential algorithms have been proposed to find exact motifs, but the running time is still not suitable due to ...
Prediction of infarction volume and infarction growth rate in acute ischemic stroke
(
Nature Publishing Group
, 2017 , Article)
The prediction of infarction volume after stroke onset depends on the shape of the growth dynamics of the infarction. To understand growth patterns that predict lesion volume changes, we studied currently available models ...
MLP Neural Network Based Gas Classification System on Zynq SoC
(
Institute of Electrical and Electronics Engineers Inc.
, 2016 , Article)
Systems based on wireless gas sensor networks offer a powerful tool to observe and analyze data in complex environments over long monitoring periods. Since the reliability of sensors is very important in those systems, gas ...
Deep learning for detection of routing attacks in the internet of things
(
Atlantis Press
, 2018 , Article)
Cyber threats are a showstopper for Internet of Things (IoT) has recently been used at an industrial scale. Network layer attacks on IoT can cause significant disruptions and loss of information. Among such attacks, routing ...
Using thermochromic ink for medical simulations
(
Hamad bin Khalifa University Press (HBKU Press)
, 2017 , Article)
Background: In medical simulation and training, blood is used to exhibit its different behaviors in context. In some cases, blood color differential is an imperative visual effect to ensure high-fidelity training and ...