تصفح Network & Distributed Systems حسب العنوان
السجلات المعروضة 1 -- 20 من 70
-
A Blockchain-Based Security Scheme for Vehicular Ad Hoc Networks in Smart Cities
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)The development of Vehicular Ad Hoc Networks (VANET) has brought many advantages to facilitate the deployment of the Intelligent Transportation System (ITS). However, without proper protection, VANETs can be vulnerable to ... -
A Practical Universal Consortium Blockchain Paradigm for Patient Data Portability on the Cloud Utilizing Delegated Identity Management
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)This paper presents a blockchain system that exploits the base modular features of the Hyperledger Fabric framework to allow for a new, patient-centric, practical data portability paradigm. The system empowers patients by ... -
A Reconfigurable Multipurpose SoC Mobile Platform for metal detection
( Hamad bin Khalifa University Press (HBKU Press) , 2018 , Conference Paper)Background and Objectives One of the key problems in mobile robotics is the ability to understand and analyze the surrounding environment in a useful way. This is especially important in dangerous applications where human ... -
Active Computing Toward 5G Internet of Things
( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)The Internet of Things (IoT) contains enormous computing resources. How to fully and efficiently use computing power is a very important research issue. This article proposes an active computing (AC) concept toward IoT. ... -
Almost BPXOR Coding Technique for Tolerating Three Disk Failures in RAID7 Architectures
( Hamad bin Khalifa University Press (HBKU Press) , 2018 , Conference Paper)Redundant Array of Independent Disks (RAID) storage architectures provide protection of digital infrastructure against potential disks failures. For example, RAID-5 and RAID-6 architectures provide protection against one ... -
Automatic variable reduction
( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)A variable reduction strategy (VRS) is an effective method to accelerate the optimization process of evolutionary algorithms (EAs) by simplifying the corresponding optimization problems. Unfortunately, the VRS is manually ... -
Certrust: An SDN-Based Framework for the Trust of Certificates against Crossfire Attacks in IoT Scenarios
( Tech Science Press , 2023 , Article)The low-intensity attack flows used by Crossfire attacks are hard to distinguish from legitimate flows. Traditional methods to identify the malicious flows in Crossfire attacks are rerouting, which is based on statistics. ... -
CloudFlow: A data-aware programming model for cloud workflow applications on modern HPC systems
( Elsevier , 2015 , Article)Traditional High-Performance Computing (HPC) based big-data applications are usually constrained by having to move large amount of data to compute facilities for real-time processing purpose. Modern HPC systems, represented ... -
CloudSafe: A tool for an automated security analysis for cloud computing
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)Cloud computing has been adopted widely, providing on-demand computing resources to improve performance and reduce operational costs. However, these new functionalities also bring new ways to exploit the cloud computing ... -
Collaborative Truck-Drone Routing for Contactless Parcel Delivery during the Epidemic
( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)The COVID-19 pandemic calls for contactless deliveries. To prevent the further spread of the disease and ensure the timely delivery of supplies, this paper investigates a collaborative truck-drone routing problem for ... -
Context-aware RAON middleware for opportunistic network
( Elsevier B.V. , 2017 , Article)Application development and deployment on Mobile Ad Hoc Networks (MANET) is a major challenge in the widespread use of MANET. The increasing D2D communication in 5G networks has renewed interest in an effective middleware ... -
Cybersecurity of multi-cloud healthcare systems: A hierarchical deep learning approach
( Elsevier Ltd , 2022 , Article)With the increase in sophistication and connectedness of the healthcare networks, their attack surfaces and vulnerabilities increase significantly. Malicious agents threaten patients’ health and life by stealing or altering ... -
A decomposition-based hybrid ensemble CNN framework for driver fatigue recognition
( Elsevier Inc. , 2023 , Article)Electroencephalogram (EEG) has become increasingly popular in driver fatigue monitoring systems. Several decomposition methods have been attempted to analyze the EEG signals that are complex, nonlinear and non-stationary ... -
Deep Reservoir Computing Based Random Vector Functional Link for Non-sequential Classification
( Institute of Electrical and Electronics Engineers Inc. , 2022 , Conference Paper)Reservoir Computing (RC) is well-suited for simpler sequential tasks which require inexpensive, rapid training, and the Echo State Network (ESN) plays a significant role in RC. In this article, we proposed variations of ... -
Design and Implementation of a Threat-Specific Security Risk Assessment Tool
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)Security threats posed to individual cloud computing clients vary depending on their specific security requirements. However, Cloud Providers apply generic security risk assessment approaches which result do not consider ... -
Detection of Botnet Attacks against Industrial IoT Systems by Multilayer Deep Learning Approaches
( Hindawi Limited , 2022 , Article)Industry 4.0 is the next revolution in manufacturing technology that is going to change the production and distribution of goods and services within the following decade. Powered by different enabling technologies that are ... -
DQN based Blockchain Data Storage in Resource-constrained IoT System
( Institute of Electrical and Electronics Engineers Inc. , 2023 , Conference Paper)Applying blockchain technology in the Internet of Things (IoT) systems to realize massive data storage is a promising technology, which can eliminate the dependence of IoT on central servers and protect data security ... -
Dynamic ensemble deep echo state network for significant wave height forecasting
( Elsevier Ltd , 2023 , Article)Forecasts of the wave heights can assist in the data-driven control of wave energy systems. However, the dynamic properties and extreme fluctuations of the historical observations pose challenges to the construction of ... -
Edge computing-enabled green multisource fusion indoor positioning algorithm based on adaptive particle filter
( Springer , 2023 , Article)Edge computing enables portable devices to provide smart applications, and the indoor positioning technique offers accurate location-based indoor navigation and personalized smart services. To achieve the high positioning ... -
Edge intelligence-enabled cyber-physical systems
( John Wiley and Sons Ltd , 2023 , Article)With the advent of the Internet of everything era, people's demand for intelligent Internet of Things (IoT) devices is steadily increasing. A more intelligent cyber-physical system (CPS) is needed to meet the diverse ...