بحث بسيط
السجلات المعروضة 21 -- 30 من 33
ThreatBased Security Risk Evaluation in the Cloud
(
Hamad bin Khalifa University Press (HBKU Press)
, 2018 , Conference Paper)
Research ProblemCyber attacks are targeting the cloud computing systems, where enterprises, governments, and individuals are outsourcing their storage and computational resources for improved scalability and dynamic ...
Deciding Your Own Anonymity: User-Oriented Node Selection in I2P
(
Institute of Electrical and Electronics Engineers Inc.
, 2018 , Article)
With the development of Internet applications, anonymous communication technology plays a very significant role in protecting personal privacy. As one of the most popular anonymous communication systems, I2P provides strong ...
Virtual Reality Glove for Falconry
(
Hamad bin Khalifa University Press (HBKU Press)
, 2018 , Conference Paper)
Falconry hunting is an Arabic traditional sport and has great significance in Qatari society, as it is a major part of their culture. Falconry is about hunting small birds or animals, by using different types of falcons. ...
Privacy and security issues in online social networks
(
MDPI AG
, 2018 , Article)
The advent of online social networks (OSN) has transformed a common passive reader into a content contributor. It has allowed users to share information and exchange opinions, and also express themselves in online virtual ...
On Dependability Traffic Load and Energy Consumption Tradeoff in Data Center Networks
(
Hamad bin Khalifa University Press (HBKU Press)
, 2018 , Conference Paper)
Mega data centers (DCs) are considered as efficient and promising infrastructures for supporting numerous cloud computing services such as online office, online social networking, Web search and IT infrastructure out-sourcing. ...
Embedded system for motion control of an omnidirectional mobile robot
(
Institute of Electrical and Electronics Engineers Inc.
, 2018 , Article)
In this paper, an embedded system for motion control of omnidirectional mobile robots is presented. An omnidirectional mobile robot is a type of holonomic robots. It can move simultaneously and independently in translation ...
Heterogeneous wireless networks for smart grid distribution systems: Advantages and limitations
(
MDPI AG
, 2018 , Article)
Supporting a conventional power grid with advanced communication capabilities is a cornerstone to transferring it to a smart grid. A reliable communication infrastructure with a high throughput can lay the foundation towards ...
Your Behavior Signals Your Reliability: Modeling Crowd Behavioral Traces to Ensure Quality Relevance Annotations
(
AAAI Press
, 2018 , Conference Paper)
While peer-agreement and gold checks are well-established methods for ensuring quality in crowdsourced data collection, we explore a relatively new direction for quality control: estimating work quality directly from ...
Towards Extended Bit Tracking for Scalable and Robust RFID Tag Identification Systems
(
Institute of Electrical and Electronics Engineers Inc.
, 2018 , Article)
The surge in demand for Internet of Things (IoT) systems and applications has motivated a paradigm shift in the development of viable radio frequency identification technology (RFID)-based solutions for ubiquitous real-Time ...
A Deep Learning Approach for Vital Signs Compression and Energy Efficient Delivery in mhealth Systems
(
Institute of Electrical and Electronics Engineers Inc.
, 2018 , Article)
© 2013 IEEE. Due to the increasing number of chronic disease patients, continuous health monitoring has become the top priority for health-care providers and has posed a major stimulus for the development of scalable and ...