تصفح Faculty Contributions حسب العنوان
السجلات المعروضة 12902 -- 12921 من 17983
-
Prioritizing the Issues extracted for Getting Right People on Right Project in Software Project Management from Vendors' Perspective
( IEEE , 2021 , Article)Software project management inspires and urges the spirit of software developing team members which continues until project completion. Obviously, success of every project based on right selection of team members that ... -
Prioritizing the multi-criterial features based on comparative approaches for enhancing security of IoT devices
( Elsevier , 2023 , Article)The Internet of Things (IoT) technologies continuously expand with time due to the advances in automated, connected device technology, mobility, and wide access to information. IoT is the collection of many linked devices ... -
Priority setting for the prevention and control of cardiovascular diseases: multi-criteria decision analysis in four eastern Mediterranean countries
( Springer Verlag , 2015 , Article)Objectives To explore the feasibility of using a simple multi-criteria decision analysis method with policy makers/key stakeholders to prioritize cardiovascular disease (CVD) policies in four Mediterranean countries: ... -
Priority-based medium access control for wireless body area networks with high-performance design
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)The wireless body area network (WBAN) has attracted considerable attention. Two main problems exist in WBANs: 1) the quality of service (QoS) requirements and 2) the energy efficiency of data transmission. To solve the ... -
Priority-based scheduling for limited energy cognitive relaying
( IEEE , 2010 , Conference Paper)We study the problem of cognitive relaying with limited-energy constraint in opportunistic spectrum access cognitive networks. Under this network setting, the cognitive user increases the spectrum availability for its own ... -
Priority-based zero-forcing in spectrum sharing cognitive systems
( IEEE , 2013 , Article)We consider a spectrum sharing scenario between cognitive radio (CR) users and a licensed primary user (PU), in which the PU is not able to successfully transmit data to its destined receiver. The cognitive base station ... -
Privacy and gendered spaces in Arab Gulf homes
( Taylor & Francis , 2015 , Article)We report the findings of a qualitative study of Qatari homes in the Arab Gulf. We identify the significance of privacy and gender segregation as anchors for identity, both national and religious. Maintaining these anchors ... -
Privacy and security issues in online social networks
( MDPI AG , 2018 , Article)The advent of online social networks (OSN) has transformed a common passive reader into a content contributor. It has allowed users to share information and exchange opinions, and also express themselves in online virtual ... -
Privacy Leakage in Smart Homes and Its Mitigation: IFTTT as a Case Study
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)The combination of smart home platforms and automation apps introduce many conveniences to smart home users. However, this also brings the potential of privacy leakage. If a smart home platform is permitted to collect all ... -
Privacy Preservation of Aggregated Data Using Virtual Battery in the Smart Grid
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)Smart Meters (SM) are IoT end devices used to collect user utility consumption with limited processing power on the edge of the smart grid (SG). While SMs have great applications in providing data analysis to the utility ... -
Privacy Preserving Computation in Cloud Using Reusable Garbled Oblivious RAMs
( Springer , 2022 , Conference Paper)When users store encrypted data in a cloud environment, it is important for users to ask cloud to carry out some computation on the remote data remotely. ORAM is a good potential approach to carry out this kind of remote ... -
Privacy-Aware Collaborative Task Offloading in Fog Computing
( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)Numerous new applications have been proliferated with the mature of 5G, which generates a large number of latency-sensitive and computationally intensive mobile data requests. The real-time requirement of these mobile data ... -
Privacy-preserving artificial intelligence in healthcare: Techniques and applications
( Elsevier , 2023 , Article Review)There has been an increasing interest in translating artificial intelligence (AI) research into clinically-validated applications to improve the performance, capacity, and efficacy of healthcare services. Despite substantial ... -
Privacy-preserving Deep-learning Models for Fingerprint Data using Differential Privacy
( Association for Computing Machinery, Inc , 2023 , Conference Paper)Fingerprint recognition is a widely adopted biometric authentication method that leverages the unique characteristics of fingerprints to identify individuals. Its applications range from access control and authentication ... -
Privacy-Preserving Distributed IDS Using Incremental Learning for IoT Health Systems
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)Existing techniques for incremental learning are computationally expensive and produce duplicate features leading to higher false positive and true negative rates. We propose a novel privacy-preserving intrusion detection ... -
Privacy-preserving federated learning cyber-threat detection for intelligent transport systems with blockchain-based security
( John Wiley and Sons Inc , 2022 , Article)Artificial intelligence (AI) techniques implemented at a large scale in intelligent transport systems (ITS), have considerably enhanced the vehicles' autonomous behaviour in making independent decisions about cyber threats, ... -
Privacy-Preserving Fog Aggregation of Smart Grid Data Using Dynamic Differentially-Private Data Perturbation
( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)The edge of the smart grid has a massive number of power and resource-constrained interconnected devices. Mainly, smart meters report power consumption data from consumer homes, industrial buildings, and other connected ... -
A Privacy-Preserving Medical Data Sharing Scheme Based on Consortium Blockchain
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)Electronic medical records (EMRs) can provide medical institutes with a number of research materials, which could promote the development of medical field. In order to protect patients' privacy while achieving efficient ... -
Privacy-Preserving Support Vector Machine Training over Blockchain-Based Encrypted IoT Data in Smart Cities
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)Machine learning (ML) techniques have been widely used in many smart city sectors, where a huge amount of data is gathered from various (IoT) devices. As a typical ML model, support vector machine (SVM) enables efficient ... -
Private Function Evaluation Using Intel's SGX
( John Wiley and Sons Inc , 2020 , Article)Private Function Evaluation (PFE) is the problem of evaluating one party's private data using a private function owned by another party. Existing solutions for PFE are based on universal circuits evaluated in secure ...