تصفح KINDI Center for Computing Research حسب العنوان
السجلات المعروضة 44 -- 63 من 178
-
Deep Reservoir Computing Based Random Vector Functional Link for Non-sequential Classification
( Institute of Electrical and Electronics Engineers Inc. , 2022 , Conference Paper)Reservoir Computing (RC) is well-suited for simpler sequential tasks which require inexpensive, rapid training, and the Echo State Network (ESN) plays a significant role in RC. In this article, we proposed variations of ... -
Design and implementation of a modular ECMO simulator
( Hamad bin Khalifa University Press (HBKU Press) , 2016 , Article)Background: Extracorporeal membrane oxygenation (ECMO) is a high-complexity life-saving procedure riddled with mechanical complications that can place the patient in a critical state where fast and coordinated actions are ... -
Design and Implementation of a Threat-Specific Security Risk Assessment Tool
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)Security threats posed to individual cloud computing clients vary depending on their specific security requirements. However, Cloud Providers apply generic security risk assessment approaches which result do not consider ... -
Detection of Botnet Attacks against Industrial IoT Systems by Multilayer Deep Learning Approaches
( Hindawi Limited , 2022 , Article)Industry 4.0 is the next revolution in manufacturing technology that is going to change the production and distribution of goods and services within the following decade. Powered by different enabling technologies that are ... -
Detection of partial seizure: An application of fuzzy rule system for wearable ambulatory systems
( IEEE , 2014 , Conference Paper)Electroencephalography (EEG) plays an intelligent role, especially EEG based health diagnosis of brain disorder, as well as brain-computer interface (BCI) applications. One such research field is related to epilepsy. The ... -
Distributed interference management using Q-Learning in cognitive femtocell networks: New USRP-based implementation
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)Femtocell networks have become a promising solution in supporting high data rates for 5G systems, where cell densification is performed using the small femtocells. However, femtocell networks have many challenges. One of ... -
DQN based Blockchain Data Storage in Resource-constrained IoT System
( Institute of Electrical and Electronics Engineers Inc. , 2023 , Conference Paper)Applying blockchain technology in the Internet of Things (IoT) systems to realize massive data storage is a promising technology, which can eliminate the dependence of IoT on central servers and protect data security ... -
Dynamic ensemble deep echo state network for significant wave height forecasting
( Elsevier Ltd , 2023 , Article)Forecasts of the wave heights can assist in the data-driven control of wave energy systems. However, the dynamic properties and extreme fluctuations of the historical observations pose challenges to the construction of ... -
Dynamic security metrics for measuring the effectiveness of moving target defense techniques
( Elsevier Ltd , 2018 , Article)Moving Target Defense (MTD) utilizes granularity, flexibility and elasticity properties of emerging networking technologies in order to continuously change the attack surface. There are many different MTD techniques proposed ... -
ECG encryption and identification based security solution on the Zynq SoC for connected health systems
( Academic Press Inc. , 2017 , Article)Connected health is a technology that associates medical devices, security devices and communication technologies. It enables patients to be monitored and treated remotely from their home. Patients' data and medical records ... -
Edge computing-enabled green multisource fusion indoor positioning algorithm based on adaptive particle filter
( Springer , 2023 , Article)Edge computing enables portable devices to provide smart applications, and the indoor positioning technique offers accurate location-based indoor navigation and personalized smart services. To achieve the high positioning ... -
Edge intelligence-enabled cyber-physical systems
( John Wiley and Sons Ltd , 2023 , Other)With the advent of the Internet of everything era, people's demand for intelligent Internet of Things (IoT) devices is steadily increasing. A more intelligent cyber-physical system (CPS) is needed to meet the diverse ... -
EEG-based emotion recognition using random Convolutional Neural Networks
( Elsevier Ltd , 2022 , Article)Emotion recognition based on electroencephalogram (EEG) signals is helpful in various fields, including medical healthcare. One possible medical application is to diagnose emotional disorders in patients. Humans tend to ... -
Embedded wearable EEG seizure detection in ambulatory state
( UK Simulation Society , 2014 , Article)This paper describes a classification method is presented using a Fuzzy System to detect the occurrences of Partial Seizures from Epilepsy data, which can be implemented in any embedded system as a wearable detection system. ... -
Empirical performance evaluation of QUIC protocol for Tor anonymity network
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)Tor's anonymity network is one of the most widely used anonymity networks online, it consists of thousands of routers run by volunteers. Tor preserves the anonymity of its users by relaying the traffic through a number of ... -
Empowering users of cloud computing on data confidentiality
( IEEE , 2014 , Conference Paper)Cloud networking is an integral part of interconnected data centres operated in cloud environment. Cloud users heavily rely on cloud networking to transmit to and receive data from data centres. In this context, we explore ... -
Enabling broadcast communications in presence of jamming via probabilistic pairing
( Elsevier B.V. , 2017 , Article)This paper presents a thorough analysis of Freedom of Speech (FoS): a lightweight, fully distributed, and probabilistic protocol that assures the delivery of a message to be broadcast notwithstanding the presence of a ... -
Enhanced Beidou user equipment access authentication protocol based on location key
( Editorial Board of Journal on Communications , 2022 , Article)In order to solve the shortcomings of the existing Beidou user equipment access solutions such as prolonged authentication, and in response to the need of user privacy protection, a user equipment access authentication ... -
An Enhanced Multi-Phase Stochastic Differential Evolution Framework for Numerical Optimization
( Institute of Electrical and Electronics Engineers Inc. , 2022 , Conference Paper)Real-life problems can be expressed as optimization problems. These problems pose a challenge for researchers to design efficient algorithms that are capable of finding optimal solutions with the least budget. Stochastic ... -
Enhancing Healthcare Systems With Deep Reinforcement Learning: Insights Into D2D Communications and Remote Monitoring
( IEEE , 2024 , Article)The traditional healthcare system is increasingly challenged by its dependence on inperson consultations and manual monitoring, struggling with issues of scalability, the immediacy of care, and efficient resource allocation. ...