• A Reconfigurable Multipurpose SoC Mobile Platform for metal detection 

      Al Rshid Abazeed, Omran; Mhaisen, Naram; Al-Hariri, Youssef; Nawaz, Naveed; Amira, Abbes ( Hamad bin Khalifa University Press (HBKU Press) , 2018 , Conference Paper)
      Background and Objectives One of the key problems in mobile robotics is the ability to understand and analyze the surrounding environment in a useful way. This is especially important in dangerous applications where human ...
    • Active Computing Toward 5G Internet of Things 

      Liu, Chunpeng; Meng, Wei Xiao; Li, Cheng; Ma, Maode ( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)
      The Internet of Things (IoT) contains enormous computing resources. How to fully and efficiently use computing power is a very important research issue. This article proposes an active computing (AC) concept toward IoT. ...
    • Almost BPXOR Coding Technique for Tolerating Three Disk Failures in RAID7 Architectures 

      Mhaisen, Naram; Punkar, Mayur; Wang, Yongge; Desmedt, Yvo; Malluhi, Qutaibah ( Hamad bin Khalifa University Press (HBKU Press) , 2018 , Conference Paper)
      Redundant Array of Independent Disks (RAID) storage architectures provide protection of digital infrastructure against potential disks failures. For example, RAID-5 and RAID-6 architectures provide protection against one ...
    • Automatic variable reduction 

      Song, Aijuan; Wu, Guohua; Suganthan, P. N.; Pedrycz, Witold ( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)
      A variable reduction strategy (VRS) is an effective method to accelerate the optimization process of evolutionary algorithms (EAs) by simplifying the corresponding optimization problems. Unfortunately, the VRS is manually ...
    • Certrust: An SDN-Based Framework for the Trust of Certificates against Crossfire Attacks in IoT Scenarios 

      Yan, Lei; Ma, ode; Li, Dandan; Huang, Xiaohong; Ma, Yan; ... more authors ( Tech Science Press , 2023 , Article)
      The low-intensity attack flows used by Crossfire attacks are hard to distinguish from legitimate flows. Traditional methods to identify the malicious flows in Crossfire attacks are rerouting, which is based on statistics. ...
    • CloudFlow: A data-aware programming model for cloud workflow applications on modern HPC systems 

      Zhang, Fan; Malluhi, Qutaibah M.; Elsayed, Tamer; Khan, Samee U.; Li, Keqin; ... more authors ( Elsevier , 2015 , Article)
      Traditional High-Performance Computing (HPC) based big-data applications are usually constrained by having to move large amount of data to compute facilities for real-time processing purpose. Modern HPC systems, represented ...
    • CloudSafe: A tool for an automated security analysis for cloud computing 

      An S.; Eom T.; Park J.S.; Hong J.B.; Nhlabatsi A.; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)
      Cloud computing has been adopted widely, providing on-demand computing resources to improve performance and reduce operational costs. However, these new functionalities also bring new ways to exploit the cloud computing ...
    • Collaborative Truck-Drone Routing for Contactless Parcel Delivery during the Epidemic 

      Wu, Guohua; Mao, Ni; Luo, Qizhang; Xu, Binjie; Shi, Jianmai; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)
      The COVID-19 pandemic calls for contactless deliveries. To prevent the further spread of the disease and ensure the timely delivery of supplies, this paper investigates a collaborative truck-drone routing problem for ...
    • Context-aware RAON middleware for opportunistic network 

      Lau, G.; Al-Sabah, M.; Jaseemuddin, M.; Razavi, H.; Bhuiyan, M. ( Elsevier B.V. , 2017 , Article)
      Application development and deployment on Mobile Ad Hoc Networks (MANET) is a major challenge in the widespread use of MANET. The increasing D2D communication in 5G networks has renewed interest in an effective middleware ...
    • Cybersecurity of multi-cloud healthcare systems: A hierarchical deep learning approach 

      Gupta, Lav; Salman, Tara; Ghubaish, Ali; Unal, Devrim; Al-Ali, Abdulla Khalid; ... more authors ( Elsevier Ltd , 2022 , Article)
      With the increase in sophistication and connectedness of the healthcare networks, their attack surfaces and vulnerabilities increase significantly. Malicious agents threaten patients’ health and life by stealing or altering ...
    • A decomposition-based hybrid ensemble CNN framework for driver fatigue recognition 

      Li, Ruilin; Gao, Ruobin; Suganthan, Ponnuthurai Nagaratnam ( Elsevier Inc. , 2023 , Article)
      Electroencephalogram (EEG) has become increasingly popular in driver fatigue monitoring systems. Several decomposition methods have been attempted to analyze the EEG signals that are complex, nonlinear and non-stationary ...
    • Deep Reservoir Computing Based Random Vector Functional Link for Non-sequential Classification 

      Hu, Minghui; Gao, Ruobin; Suganthan, P. N. ( Institute of Electrical and Electronics Engineers Inc. , 2022 , Conference Paper)
      Reservoir Computing (RC) is well-suited for simpler sequential tasks which require inexpensive, rapid training, and the Echo State Network (ESN) plays a significant role in RC. In this article, we proposed variations of ...
    • Design and Implementation of a Threat-Specific Security Risk Assessment Tool 

      Nhlabatsi, Armstrong; Hussein, Alaa; Fetais, Noora; Khan, Khaled M. ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      Security threats posed to individual cloud computing clients vary depending on their specific security requirements. However, Cloud Providers apply generic security risk assessment approaches which result do not consider ...
    • Detection of Botnet Attacks against Industrial IoT Systems by Multilayer Deep Learning Approaches 

      Mudassir, Mohammed; Unal, Devrim; Hammoudeh, Mohammad; Azzedin, Farag ( Hindawi Limited , 2022 , Article)
      Industry 4.0 is the next revolution in manufacturing technology that is going to change the production and distribution of goods and services within the following decade. Powered by different enabling technologies that are ...
    • DQN based Blockchain Data Storage in Resource-constrained IoT System 

      Lei, Boyi; Zhou, Jianhong; Ma, Maode; Niu, Xianhua ( Institute of Electrical and Electronics Engineers Inc. , 2023 , Conference Paper)
      Applying blockchain technology in the Internet of Things (IoT) systems to realize massive data storage is a promising technology, which can eliminate the dependence of IoT on central servers and protect data security ...
    • Dynamic ensemble deep echo state network for significant wave height forecasting 

      Gao, Ruobin; Li, Ruilin; Hu, Minghui; Suganthan, Ponnuthurai Nagaratnam; Yuen, Kum Fai ( Elsevier Ltd , 2023 , Article)
      Forecasts of the wave heights can assist in the data-driven control of wave energy systems. However, the dynamic properties and extreme fluctuations of the historical observations pose challenges to the construction of ...
    • Edge computing-enabled green multisource fusion indoor positioning algorithm based on adaptive particle filter 

      Li, Mengyao; Zhu, Rongbo; Ding, Qianao; Wang, Jun; Wan, Shaohua; ... more authors ( Springer , 2023 , Article)
      Edge computing enables portable devices to provide smart applications, and the indoor positioning technique offers accurate location-based indoor navigation and personalized smart services. To achieve the high positioning ...
    • Edge intelligence-enabled cyber-physical systems 

      Zhu, Rongbo; Anjum, Ashiq; Li, Hongxiang; Ma, Maode ( John Wiley and Sons Ltd , 2023 , Other)
      With the advent of the Internet of everything era, people's demand for intelligent Internet of Things (IoT) devices is steadily increasing. A more intelligent cyber-physical system (CPS) is needed to meet the diverse ...
    • EEG-based emotion recognition using random Convolutional Neural Networks 

      Cheng, Wen Xin; Gao, Ruobin; Suganthan, P. N.; Yuen, Kum Fai ( Elsevier Ltd , 2022 , Article)
      Emotion recognition based on electroencephalogram (EEG) signals is helpful in various fields, including medical healthcare. One possible medical application is to diagnose emotional disorders in patients. Humans tend to ...
    • Empirical performance evaluation of QUIC protocol for Tor anonymity network 

      Basyoni, Lamiaa; Erbad, Aiman; Alsabah, Mashael; Fetais, Noora; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)
      Tor's anonymity network is one of the most widely used anonymity networks online, it consists of thousands of routers run by volunteers. Tor preserves the anonymity of its users by relaying the traffic through a number of ...