Search
Now showing items 21-30 of 31
Implementing and Analyzing a Recursive Technique for Building Path Oblivious RAM
(
Hamad bin Khalifa University Press (HBKU Press)
, 2018 , Conference Paper)
It has been demonstrated that encrypting confidential data before storing it is not sufficient because data access patterns can leak significant information about the data itself (Goldreich & Ostrovsky, 1996). Oblivious ...
Effective Realtime Tweet Summarization
(
Hamad bin Khalifa University Press (HBKU Press)
, 2018 , Conference Paper)
Twitter has been developed as an immense information creation and sharing network through which users post information. Information could vary from the world»s breaking news to other topics such as sports, science, religion, ...
Virtual Reality Glove for Falconry
(
Hamad bin Khalifa University Press (HBKU Press)
, 2018 , Conference Paper)
Falconry hunting is an Arabic traditional sport and has great significance in Qatari society, as it is a major part of their culture. Falconry is about hunting small birds or animals, by using different types of falcons. ...
Privacy and security issues in online social networks
(
MDPI AG
, 2018 , Article)
The advent of online social networks (OSN) has transformed a common passive reader into a content contributor. It has allowed users to share information and exchange opinions, and also express themselves in online virtual ...
Deciding Your Own Anonymity: User-Oriented Node Selection in I2P
(
Institute of Electrical and Electronics Engineers Inc.
, 2018 , Article)
With the development of Internet applications, anonymous communication technology plays a very significant role in protecting personal privacy. As one of the most popular anonymous communication systems, I2P provides strong ...
ECG Signal Reconstruction on the IoT-Gateway and Efficacy of Compressive Sensing under Real-Time Constraints
(
Institute of Electrical and Electronics Engineers Inc.
, 2018 , Article)
Remote health monitoring is becoming indispensable, though, Internet of Things (IoTs)-based solutions have many implementation challenges, including energy consumption at the sensing node, and delay and instability due to ...
Symmetric encryption relying on chaotic henon system for secure hardware-friendly wireless communication of implantable medical systems
(
MDPI AG
, 2018 , Article)
Healthcare remote devices are recognized as a promising technology for treating health related issues. Among them are the wireless Implantable Medical Devices (IMDs): These electronic devices are manufactured to treat, ...
Heterogeneous wireless networks for smart grid distribution systems: Advantages and limitations
(
MDPI AG
, 2018 , Article)
Supporting a conventional power grid with advanced communication capabilities is a cornerstone to transferring it to a smart grid. A reliable communication infrastructure with a high throughput can lay the foundation towards ...
Towards Extended Bit Tracking for Scalable and Robust RFID Tag Identification Systems
(
Institute of Electrical and Electronics Engineers Inc.
, 2018 , Article)
The surge in demand for Internet of Things (IoT) systems and applications has motivated a paradigm shift in the development of viable radio frequency identification technology (RFID)-based solutions for ubiquitous real-Time ...
Breast cancer image classification using pattern-based Hyper Conceptual Sampling method
(
Elsevier Ltd
, 2018 , Article)
The increase in biomedical data has given rise to the need for developing data sampling techniques. With the emergence of big data and the rise of popularity of data science, sampling or reduction techniques have been ...