Browsing Network & Distributed Systems by Title
Now showing items 58-70 of 70
-
Situation Awareness Recognition Using EEG and Eye-Tracking data: a pilot study
( Institute of Electrical and Electronics Engineers Inc. , 2022 , Conference Paper)Since situation awareness (SA) plays an important role in many fields, the measure of SA is one of the most concerning problems. Using physiological signals to evaluate SA is becoming a popular research topic because of ... -
Takagi–Sugeno fuzzy based power system fault section diagnosis models via genetic learning adaptive GSK algorithm
( Elsevier B.V. , 2022 , Article)To effectively deal with the operating uncertainties of protective relays and circuit breakers existing in the power system faults, an improved fault section diagnosis (FSD) method is proposed by using Takagi–Sugeno fuzzy ... -
A Testbed Implementation of a Biometric Identity-Based Encryption for IoMT-enabled Healthcare System
( Association for Computing Machinery , 2021 , Conference Paper)Historically, health data was stored locally on the hospital's server as patient health records, and we had to rely on the planned check-up during doctor's visits. Now, we can monitor health continuously and in real-time. ... -
The Future of Aerial Communications: A Survey of IRS-Enhanced UAV Communication Technologies
( IEEE , 2024 , Conference Paper)The advent of Intelligent Reflecting Surfaces (IRS) and Unmanned Aerial Vehicles (UAVs) is setting a new benchmark in the field of wireless communications. IRS, with their groundbreaking ability to manipulate electromagnetic ... -
The simultaneous impact of EV charging and PV inverter reactive power on the hosting distribution system's performance: A case study in kuwait
( MDPI AG , 2020 , Article)Recently, electric vehicles (EVs) have become an increasingly important topic in the field of sustainable transportation research, alongside distributed generation, reactive power compensation, charging optimization, and ... -
Threat-specific security risk evaluation in the cloud
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)Existing security risk evaluation approaches (e.g., asset-based) do not consider specific security requirements of individual cloud computing clients in the security risk evaluation. In this paper, we propose a threat-specific ... -
ThreatRiskEvaluator: A Tool for Assessing Threat-Specific Security Risks in the Cloud
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)In cloud computing, security risks posed to individual clients are different based on their specific security requirements. In current practice, cloud providers usually apply generic protection mechanisms that may not be ... -
Time Series Forecasting Using Online Performance-based Ensemble Deep Random Vector Functional Link Neural Network
( Institute of Electrical and Electronics Engineers Inc. , 2022 , Conference Paper)Time series forecasting remains a challenging task in data science while it is of great relevance to decision-making in various industries such as transportation, finance, electricity resource management, meteorology. ... -
Using block cipher for confidentiality of images in cloud-based systems
( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)This paper deals with outsourcing of computing to cloud servers where clients' images are computed and stored. It proposes a technique that obfuscates images before sending them to servers. Cloud servers can perform ... -
A Voting-Mechanism-Based Ensemble Framework for Constraint Handling Techniques
( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)Effective constraint handling techniques (CHTs) are of great significance for evolutionary algorithms (EAs) dealing with constrained optimization problems (COPs). To date, many CHTs, such as penalty function, superiority ... -
Watermarking: A review of software and hardware techniques
( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)Watermarking is a well-known technique traditionally used in banknotes and other documents to discourage counterfeiting. It usually consists of semi-transparent symbols embedded on paper. Similar concepts were applied to ... -
Weighting and pruning based ensemble deep random vector functional link network for tabular data classification
( Elsevier Ltd , 2022 , Article)In this paper, we first integrate normalization to the Ensemble Deep Random Vector Functional Link network (edRVFL). This re-normalization step can help the network avoid divergence of the hidden features. Then, we propose ... -
Wireless Network Slice Assignment with Incremental Random Vector Functional Link Network
( IEEE Computer Society , 2022 , Article)This paper presents an artificial intelligence-assisted network slice prediction method, which utilizes a novel incremental random vector functional link (IRVFL) network to deal with the wireless network slice assignment ...