تصفح KINDI Center for Computing Research حسب العنوان
السجلات المعروضة 119 -- 138 من 178
-
Real-time cooperative data routing and scheduling in software defined vehicular networks
( Elsevier B.V. , 2022 , Article)Links in vehicular networks are highly dynamic and generally exist only for a limited amount of time. Moreover, data packets are generally transmitted over multiple hops and have diverse latency requirements. The above ... -
Real-time robotic avatar control using fuzzy gaze-classification for people with disability
( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)Robotic control with gaze-classification has been an area of interest for quite some time. In this paper, a novel solution of implementing sensing system with intelligent visualization has been presented. Such a system can ... -
Real-Time Scheduling for Electric Vehicles Charging/Discharging Using Reinforcement Learning
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)With the increase in Electric Vehicles (EVs) penetration, their charging needs form an additional burden on the grid. Thus, charging coordination is necessary for safe and efficient EV use. The scheduling of EVs is especially ... -
Reasoning about Policies in Security-Aware Service Discovery Using Answer Set Programming
( World Scientific Publishing Co. Pte Ltd , 2016 , Article)In order to enable a secure interaction between dynamically discovered software services and the client's application in a cooperative information system such as service oriented system, one of the pre-requisites is the ... -
Reasoning about security policies of services using answer set programming
( Institute of Electrical and Electronics Engineers Inc. , 2014 , Conference Paper)In this paper, we propose a formal framework for checking the consistency of security policies of services using Answer Set Programming (ASP). We illustrate that the formalisation of security policies of the service providers ... -
Recent Advances in the Internet-of-Medical-Things (IoMT) Systems Security
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)The rapid evolutions in microcomputing, mini-hardware manufacturing, and machine-to-machine (M2M) communications have enabled novel Internet-of-Things (IoT) solutions to reshape many networking applications. Healthcare ... -
Representation learning using deep random vector functional link networks for clustering: Representation learning using deep RVFL for clustering
( Elsevier Ltd , 2022 , Article)Random Vector Functional Link (RVFL) Networks have received a lot of attention due to the fast training speed as the non-iterative solution characteristic. Currently, the main research direction of RVFLs has supervised ... -
RES-EV: Identifying EV-Households under High AC Load Using a Residual-Based Model
( Institute of Electrical and Electronics Engineers Inc. , 2024 , Conference Paper)This paper introduces a novel residual-based model to identify households with Battery Electric Vehicles (EVs) under high Air Conditioning (AC) load. The considerable energy demands of AC units can obscure charging events ... -
Retinal image enhancement using Laplacian pyramidal multi-scaling
( Institute of Electrical and Electronics Engineers Inc. , 2014 , Conference Paper)Early detection of retinal diseases is important to avoid complications and permanent vision loss. In this paper retinal neovascularization and molecular degeneration has been emphasized. Neovascularization is in form of ... -
Robotic probe positioning system for structural health monitoring
( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)Structural health Monitoring (SHM) is a very critical component for sustainable civil and mechanical structures in modern urban settings. The sky-scrappers and huge bridges in modern metropolis today are essential aspects ... -
Role updating in information systems using model checking
( Springer London , 2017 , Article)The role-based access control (RBAC) has significantly simplified the management of users and permissions in information systems. In dynamic environments, systems are constantly undergoing changes, and accordingly, the ... -
Sample-Based Data Augmentation Based on Electroencephalogram Intrinsic Characteristics
( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)Deep learning for electroencephalogram-based classification is confronted with data scarcity, due to the time-consuming and expensive data collection procedure. Data augmentation has been shown as an effective way to improve ... -
A secure and efficient Internet of Things cloud encryption scheme with forensics investigation compatibility based on identity-based encryption
( Elsevier B.V. , 2021 , Article)Data security is a challenge for end-users of cloud services as the users have no control over their data once it is transmitted to the cloud. A potentially corrupt cloud service provider can obtain the end-users’ data. ... -
Secure Bluetooth Communication in Smart Healthcare Systems: A Novel Community Dataset and Intrusion Detection System
( MDPI , 2022 , Article)Smart health presents an ever-expanding attack surface due to the continuous adoption of a broad variety of Internet of Medical Things (IoMT) devices and applications. IoMT is a common approach to smart city solutions that ... -
Secure smart contract-enabled control of battery energy storage systems against cyber-attacks
( Elsevier B.V. , 2019 , Article)Battery Energy Storage Systems (BESSs) are an integral part of a sustainable and resilient smart grid. The security of such critical cyber-physical infrastructure is considered as a major priority for both industry and ... -
Secure Vehicular Platoon Management against Sybil Attacks
( MDPI , 2022 , Article)The capacity of highways has been an ever-present constraint in the 21st century, bringing about the issue of safety with greater likelihoods of traffic accidents occurring. Furthermore, recent global oil prices have ... -
Securing Aggregate Queries for DNA Databases
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)This paper addresses the problem of sharing person-specific genomic sequences without violating the privacy of their data subjects to support large-scale biomedical research projects. The proposed method builds on the ... -
Security concerns on machine learning solutions for 6G networks in mmWave beam prediction
( Elsevier B.V. , 2022 , Article)6G – sixth generation – is the latest cellular technology currently under development for wireless communication systems. In recent years, machine learning (ML) algorithms have been applied widely in various fields, such ... -
Security-Driven Performance Analysis of Lightweight Cryptography for Energy Efficiency Applications
( IEEE , 2024 , Conference Paper)This paper provides a comprehensive analysis of the security-centric performance of the Lightweight Cryptography (LWC) algorithms ASCON, TinyJambu, and Xoodyak, finalists in the NIST standardization process, through their ... -
Short survey of techniques for visualizing events recorded in logs
( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)Nowadays, data is being generated in large volumes and the users are left with a staggering amount of textual data that needs to be transformed into information to derive some knowledge from it. However, transforming and ...