Now showing items 21-40 of 172

    • Automated layer-wise solution for ensemble deep randomized feed-forward neural network 

      Hu, Minghui; Gao, Ruobin; Suganthan, Ponnuthurai N.; Tanveer, M. ( Elsevier B.V. , 2022 , Article)
      The randomized feed-forward neural network is a single hidden layer feed-forward neural network that enables efficient learning by optimizing only the output weights. The ensemble deep learning framework significantly ...
    • Automatic generation of optimized workflow for distributed computations on large-scale matrices 

      Sabry, Farida; Erradi, Abdelkarim; Nassar, Mohamed; Malluhi, Qutaibah M. ( Springer Verlag , 2014 , Conference Paper)
      Efficient evaluation of distributed computation on large-scale data is prominent in modern scientific computation; especially analysis of big data, image processing and data mining applications. This problem is particularly ...
    • Automatic variable reduction 

      Song, Aijuan; Wu, Guohua; Suganthan, P. N.; Pedrycz, Witold ( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)
      A variable reduction strategy (VRS) is an effective method to accelerate the optimization process of evolutionary algorithms (EAs) by simplifying the corresponding optimization problems. Unfortunately, the VRS is manually ...
    • Battery-Induced Load Hiding and Its Utility Consequences 

      Aly, Hussein; Altamimi, Emran; Al-Ali, Abdulaziz; Al-Ali, Abdulla; Malluhi, Qutaibah ( Institute of Electrical and Electronics Engineers Inc. , 2024 , Conference Paper)
      The introduction of smart grids allows utility providers to collect detailed data about consumers, which can be utilized to enhance grid efficiency and reliability. However, this data collection also raises privacy concerns. ...
    • Blockchain technology for healthcare: Enhancing shared electronic health record interoperability and integrity 

      Jabbar, Rateb; Fetais, Noora; Krichen, Moez; Barkaoui, Kamel ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      The Electronic Health Records (EHR) sharing system is the state of art for delivering healthcare. The tools within the system can predict outcomes during the patient's lifetime, monitor how effective are treatments, track ...
    • Breath Analysis for the in Vivo Detection of Diabetic Ketoacidosis 

      Shabil Sha, Mizaj; Maurya, Muni Raj; Shafath, Sadiyah; Cabibihan, John-John; Al-Ali, Abdulaziz; ... more authors ( American Chemical Society , 2022 , Article)
      Human breath analysis of volatile organic compounds has gained significant attention recently because of its rapid and noninvasive potential to detect various metabolic diseases. The detection of ketones in the breath and ...
    • Bringing Coordination Languages Back to the Future Using Blockchain Smart Contracts 

      Hammoudeh, Mohammad; Adebisi, Bamidele; Unal, Devrim; Laouid, Abdelkader ( Association for Computing Machinery , 2021 , Conference Paper)
      This paper presents a blockchain extension of the run-time Sensing as a Service SOA (3SOA) approach presented in [5]. 3SOA defines a practical approach for implementing service-oriented Internet of Things (IoT) using ...
    • Can immersive type of Virtual Reality bring EMG pattern changes post facial palsy? 

      Qidwai, Uvais; Ajimsha, M. S. ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)
      The loss of facial expression via facial paralysis is a devastating condition, both functionally and aesthetically. However, given the life-long plasticity of the brain one could assume that recovery could be facilitated ...
    • Certrust: An SDN-Based Framework for the Trust of Certificates against Crossfire Attacks in IoT Scenarios 

      Yan, Lei; Ma, ode; Li, Dandan; Huang, Xiaohong; Ma, Yan; ... more authors ( Tech Science Press , 2023 , Article)
      The low-intensity attack flows used by Crossfire attacks are hard to distinguish from legitimate flows. Traditional methods to identify the malicious flows in Crossfire attacks are rerouting, which is based on statistics. ...
    • Challenges and Mitigation of Cyber Threat in Automated Vehicle: An Integrated Approach 

      Al Mamun A.; Abdullah Al Mamun M.; Shikfa A. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
      The technological development of automated vehicles opens novel cybersecurity threats and risks for road safety. Increased connectivity often results in increased risks of a cyber-security attacks, which is one of the ...
    • CloudFlow: A data-aware programming model for cloud workflow applications on modern HPC systems 

      Zhang, Fan; Malluhi, Qutaibah M.; Elsayed, Tamer; Khan, Samee U.; Li, Keqin; ... more authors ( Elsevier , 2015 , Article)
      Traditional High-Performance Computing (HPC) based big-data applications are usually constrained by having to move large amount of data to compute facilities for real-time processing purpose. Modern HPC systems, represented ...
    • CloudSafe: A tool for an automated security analysis for cloud computing 

      An S.; Eom T.; Park J.S.; Hong J.B.; Nhlabatsi A.; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)
      Cloud computing has been adopted widely, providing on-demand computing resources to improve performance and reduce operational costs. However, these new functionalities also bring new ways to exploit the cloud computing ...
    • Collaborative Truck-Drone Routing for Contactless Parcel Delivery during the Epidemic 

      Wu, Guohua; Mao, Ni; Luo, Qizhang; Xu, Binjie; Shi, Jianmai; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)
      The COVID-19 pandemic calls for contactless deliveries. To prevent the further spread of the disease and ensure the timely delivery of supplies, this paper investigates a collaborative truck-drone routing problem for ...
    • A comprehensive review of the deep learning-based tumor analysis approaches in histopathological images: segmentation, classification and multi-learning tasks 

      Abdel-Nabi, Heba; Ali, Mostafa; Awajan, Arafat; Daoud, Mohammad; Alazrai, Rami; ... more authors ( Springer , 2023 , Other)
      Medical Imaging has become a vital technique that has been embraced in the diagnosis and treatment process of cancer. Histopathological slides, which microscopically examine the suspicious tissue, are considered the golden ...
    • Compressive sensing based electronic nose platform 

      Djelouat, Hamza; Ait Si Ali, Amine; Amira, Abbes; Bensaali, Faycal ( Elsevier , 2017 , Article)
      Electronic nose (EN) systems play a significant role for gas monitoring and identification in gas plants. Using an EN system which consists of an array of sensors provides a high performance. Nevertheless, this performance ...
    • Context-aware RAON middleware for opportunistic network 

      Lau, G.; Al-Sabah, M.; Jaseemuddin, M.; Razavi, H.; Bhuiyan, M. ( Elsevier B.V. , 2017 , Article)
      Application development and deployment on Mobile Ad Hoc Networks (MANET) is a major challenge in the widespread use of MANET. The increasing D2D communication in 5G networks has renewed interest in an effective middleware ...
    • Cybersecurity for next generation healthcare in Qatar 

      Zubair, Mohammad; Unal, Devrim; Al-Ali, Abdulla; Reimann, Thomas; Alinier, Guillaume ( Hamad bin Khalifa University Press (HBKU Press) , 2021 , Article)
      Background: IoMT (Internet of Medical Things) devices (often referred to IoMT domain) have the potential to quickly diagnose and monitor patients outside the hospital by transmitting information through the cloud domain ...
    • Cybersecurity of multi-cloud healthcare systems: A hierarchical deep learning approach 

      Gupta, Lav; Salman, Tara; Ghubaish, Ali; Unal, Devrim; Al-Ali, Abdulla Khalid; ... more authors ( Elsevier Ltd , 2022 , Article)
      With the increase in sophistication and connectedness of the healthcare networks, their attack surfaces and vulnerabilities increase significantly. Malicious agents threaten patients’ health and life by stealing or altering ...
    • Data confidentiality in cloud-based pervasive system 

      Khan, Khaled M.; Shaheen, Mahboob; Wang, Yongge ( Association for Computing Machinery , 2017 , Conference Paper)
      Data confidentiality and privacy is a serious concern in pervasive systems where cloud computing is used to process huge amount of data such as matrix multiplications typically used in HPC. Due to limited processing ...
    • Data Obfuscation for Privacy and Confidentiality in Cloud Computing 

      Khan, Khaled M.; Shaheen, Mahboob ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)
      This paper proposes a data obfuscation approach in outsourcing matrix multiplication to cloud computing. It is primarily based on splitting the rows and columns of matrices to alter their actual dimension coupled with ...