College of Engineering: Recent submissions
Now showing items 2801-2820 of 8384
-
Stress Detection Using Experience Sampling: A Systematic Mapping Study
( MDPI , 2022 , Article)Stress has been designated the "Health Epidemic of the 21st Century" by the World Health Organization and negatively affects the quality of individuals' lives by detracting most body systems. In today's world, different ... -
Applications of deep learning for phishing detection: a systematic literature review
( Springer Science and Business Media Deutschland GmbH , 2022 , Article)Phishing attacks aim to steal confidential information using sophisticated methods, techniques, and tools such as phishing through content injection, social engineering, online social networks, and mobile applications. To ... -
Analysis of cyber security knowledge gaps based on cyber security body of knowledge
( Springer , 2022 , Article)Due to the increasing number of cyber incidents and overwhelming skills shortage, it is required to evaluate the knowledge gap between cyber security education and industrial needs. As such, the objective of this study is ... -
Malware detection based on graph attention networks for intelligent transportation systems
( MDPI , 2021 , Article)Intelligent Transportation Systems (ITS) aim to make transportation smarter, safer, reliable, and environmentally friendly without detrimentally affecting the service quality. ITS can face security issues due to their ... -
Hybrid Blockchain Platforms for the Internet of Things (IoT): A Systematic Literature Review
( MDPI , 2022 , Article Review)In recent years, research into blockchain technology and the Internet of Things (IoT) has grown rapidly due to an increase in media coverage. Many different blockchain applications and platforms have been developed for ... -
Applications of deep learning for mobile malware detection: A systematic literature review
( Springer Science and Business Media Deutschland GmbH , 2022 , Article Review)For detecting and resolving the various types of malware, novel techniques are proposed, among which deep learning algorithms play a crucial role. Although there has been a lot of research on the development of DL-based ... -
The automation of the development of classification models and improvement of model quality using feature engineering techniques
( Elsevier , 2023 , Article)Recently pipelines of machine learning-based classification models have become important to codify, orchestrate, and automate the workflow to produce an effective machine learning model. In this article, we propose a ... -
Identification of phantom movements with an ensemble learning approach
( Elsevier , 2022 , Article)Phantom limb pain after amputation is a debilitating condition that negatively affects activities of daily life and the quality of life of amputees. Most amputees are able to control the movement of the missing limb, which ... -
Metamorphic relation automation: Rationale, challenges, and solution directions
( John Wiley and Sons Ltd , 2022 , Article Review)Metamorphic testing addresses the issue of the oracle problem by comparing results transformation from multiple test executions. The relationship that governs the output transformation is called metamorphic relation. ... -
Lightweight Mutual Authentication Protocol for V2G Using Physical Unclonable Function
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)Electric vehicles (EVs) have been slowly replacing conventional fuel based vehicles since the last decade. EVs are not only environment-friendly but when used in conjunction with a smart grid, also open up new possibilities ... -
IoT malicious traffic identification using wrapper-based feature selection mechanisms
( Elsevier Ltd , 2020 , Article)Machine Learning (ML) plays very significant role in the Internet of Things (IoT) cybersecurity for malicious and intrusion traffic identification. In other words, ML algorithms are widely applied for IoT traffic identification ... -
A blockchainized privacy-preserving support vector machine classification on mobile crowd sensed data
( Elsevier B.V. , 2020 , Article)The voluminous amount of data generated by individuals’ mobile sensors and wearable devices is considered of a great value for the benefits of patients and clinical research. Recent advances incorporating data mining and ... -
An Energy-Efficient Resource Allocation Scheme for SWIPT-NOMA Based Femtocells Users with Imperfect CSI
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)In this paper, we propose, an energy-efficient resource allocation scheme for simultaneous wireless information and power transfer (SWIPT)-Non-orthogonal multiple access (NOMA) based femtocell users with imperfect channel ... -
Context-Aware Object Detection for Vehicular Networks Based on Edge-Cloud Cooperation
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)Due to high mobility and high dynamic environments, object detection for vehicular networks is one of the most challenging tasks. However, the development of integration techniques, such as software-defined networking (SDN) ... -
An Efficient, Accountable, and Privacy-Preserving Access Control Scheme for Internet of Things in a Sharing Economy Environment
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)The Internet of Things (IoT) has set off a new information technology revolution due to its convenience and efficiency. An IoT enables sharing economy, as more people are willing to share their own things (mostly mobile ... -
Inaugural Editorial
( John Wiley and Sons Inc , 2020 , Other)The fundamental research of Bennett and Brassard has emerged as a key work when considering the development of the principles of quantum cryptography and communication. The exploration of quantum cryptography is considered ... -
A Dynamic Trust Evaluation and Update Mechanism Based on C4.5 Decision Tree in Underwater Wireless Sensor Networks
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)At present, Underwater Wireless Sensor Networks (UWSNs) have been widely used in enormous applications, and simultaneously face many security threats. The trust management mechanism plays an important role in protecting ... -
Zeolitic imidazolate framework (ZIF-8) based polymer nanocomposite membranes for gas separation
( Royal Society of Chemistry , 2012 , Article)As synthesised ZIF-8 nanoparticles (size ∼ 60 nm and specific surface area ∼ 1300–1600 m2 g−1) were directly incorporated into a model polymer matrix (Matrimid® 5218) by solution mixing. This produces flexible transparent ... -
Virtual mimic of lab experiment using the computer-based Aspen Plus® Sensitivity Analysis Tool to boost the attainment of experiment's learning outcomes and mitigate potential pandemic confinements
( John Wiley and Sons Inc , 2022 , Article)The computer-based Aspen Plus® Sensitivity Analysis Tool (APSAT) was used as a virtual environment to mimic a gas absorption lab experiment in the Unit Operations Lab within the curriculum for the Bachelor of Science in ... -
Weakly Conjugated Hybrid Zinc Porphyrin Sensitizers for Solid-State Dye-Sensitized Solar Cells
( Wiley-VCH Verlag , 2016 , Article)Molecularly engineered weakly conjugated hybrid porphyrin systems are presented as efficient sensitizers for solid-state dye-sensitized solar cells. By incorporating the quinolizino acridine and triazatruxene based unit ...