Search
Now showing items 1-8 of 8
Vulnerabilities and verification of cryptographic protocols and their future in Wireless Body Area Networks
(
IEEE
, 2012 , Conference Paper)
In network security goals such as confidentiality, authentication, integrity and non-repudiation can be achieved using cryptographic techniques. Cryptographic techniques are techniques to hide information from unauthorized ...
Detecting different tasks using EEG-source-temporal features
(
Springer Nature
, 2012 , Conference Paper)
This study proposes a new type of features extracted from Electroencephalography (EEG) signals to distinguish between different tasks. EEG signals are collected from six children aged between two to six years old during ...
Fuzzy classification-based control of wheelchair using EEG data to assist people with disabilities
(
Springer Nature
, 2012 , Conference Paper)
Electroencephalography (EEG) will play an intelligent role our life: especially EEG based health diagnosis of brain disorder and Brain-Computer Interface (BCI) are growing areas of research. However, these approaches fall ...
Dynamic health level 7 packetizer for on-the-fly integrated healthcare enterprises (IHE) in disaster zones
(
Springer Nature
, 2012 , Conference Paper)
The advent of standards i.e. IEEE 11073 for device connectivity, Health Level 7 (HL7) etc. provide an assimilating platform for medical devices and seamless data flow among modern Health Information Systems (HIS). However, ...
Fuzzy model for detection and estimation of the degree of autism spectrum disorder
(
Springer Nature
, 2012 , Conference Paper)
Early detection of autism spectrum disorder (ASD) is of great significance for early intervention. Besides, knowing the degree of severity in ASD and how it changes with the intervention is imperative for the treatment ...
Performance evaluation of TCP and UDP traffic in IEEE 1451 compliant healthcare infrastructure
(
Springer Nature
, 2012 , Conference Paper)
Wireless ad-hoc and intrastructure networks have become very popular during the last ten years. Due to this reason, wireless security has become a very serious issue, specially in healthcare intrastructure networks. The ...
Power and task management in wireless body area network based medical monitoring systems
(
Springer Nature
, 2012 , Conference Paper)
Intelligent healthcare systems incorporating wireless sensors in a ubiquitous computing environment have the potential to revolutionize outpatient care. Such systems must balance effective and timely reporting of results ...
Fuzzy Expert System for Defect Classification for Non-Destructive Evaluation of Petroleum Pipes
(
IEEE
, 2007 , Conference Paper)
In this paper, an expert system has been outlined to classify the defects in metallic petroleum pipelines using acoustic techniques with non-destructive evaluation (NDE) protocols, the proposed system maps the quantitative ...