Search
Now showing items 1-10 of 1357
Multi-sensor fusion based on multiple classifier systems for human activity identification
(
Springer Berlin Heidelberg
, 2019 , Article)
Multimodal sensors in healthcare applications have been increasingly researched because it facilitates automatic and comprehensive monitoring of human behaviors, high-intensity sports management, energy expenditure estimation, ...
Machine Learning-Based Network Vulnerability Analysis of Industrial Internet of Things
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
It is critical to secure the Industrial Internet of Things (IIoT) devices because of potentially devastating consequences in case of an attack. Machine learning (ML) and big data analytics are the two powerful leverages ...
Security services using blockchains: A state of the art survey
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
This paper surveys blockchain-based approaches for several security services. These services include authentication, confidentiality, privacy and access control list, data and resource provenance, and integrity assurance. ...
Information extraction of cybersecurity concepts: An LSTM approach
(
MDPI AG
, 2019 , Article)
Extracting cybersecurity entities and the relationships between them from online textual resources such as articles, bulletins, and blogs and converting these resources into more structured and formal representations has ...
KinFit: A factual aerobic sport game with stimulation support
(
Kassel University Press GmbH
, 2018 , Article)
Overweight and obesity is a situation where a person has stacked too much fat that might affect negatively his/her health. Many people skip doing exercises due to several facts related to the encouragement, health-awareness, ...
On realistic target coverage by autonomous drones
(
Association for Computing Machinery
, 2019 , Article)
Low-cost mini-drones with advanced sensing and maneuverability enable a new class of intelligent sensing systems. To achieve the full potential of such drones, it is necessary to develop new enhanced formulations of both ...
Unleashing the secure potential of the wireless physical layer: Secret key generation methods
(
Elsevier B.V.
, 2016 , Report)
Within the paradigm of physical layer security, a physical layer characteristic is used as a common source of randomness to generate the secret key. This key is then used to encrypt the data to hide information from ...
Palmprint identification using an ensemble of sparse representations
(
Institute of Electrical and Electronics Engineers Inc.
, 2017 , Article)
Among various palmprint identification methods proposed in the literature, sparse representation for classification (SRC) is very attractive offering high accuracy. Although SRC has good discriminative ability, its performance ...
Resource provisioning for cloud-assisted body area network in a smart home environment
(
Institute of Electrical and Electronics Engineers Inc.
, 2017 , Article)
In recent years, cloud-assisted body area network (CABAN) technologies have made their entrance in the Smart healthcare field, such as Smart home environment, and play a significant role for healthcare data storage, ...
HW/SW co-design based implementation of Gas discrimination
(
Institute of Electrical and Electronics Engineers Inc.
, 2016 , Conference Paper)
A gas discrimination system is mainly made of two parts, the sensing part and the processing part. As an alternative solution to pure software or hardware implementation of the processing part of a gas identification system, ...