Browsing KINDI Center for Computing Research by Title
Now showing items 114-133 of 163
-
Recent Advances in the Internet-of-Medical-Things (IoMT) Systems Security
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)The rapid evolutions in microcomputing, mini-hardware manufacturing, and machine-to-machine (M2M) communications have enabled novel Internet-of-Things (IoT) solutions to reshape many networking applications. Healthcare ... -
Representation learning using deep random vector functional link networks for clustering: Representation learning using deep RVFL for clustering
( Elsevier Ltd , 2022 , Article)Random Vector Functional Link (RVFL) Networks have received a lot of attention due to the fast training speed as the non-iterative solution characteristic. Currently, the main research direction of RVFLs has supervised ... -
Retinal image enhancement using Laplacian pyramidal multi-scaling
( Institute of Electrical and Electronics Engineers Inc. , 2014 , Conference Paper)Early detection of retinal diseases is important to avoid complications and permanent vision loss. In this paper retinal neovascularization and molecular degeneration has been emphasized. Neovascularization is in form of ... -
Robotic probe positioning system for structural health monitoring
( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)Structural health Monitoring (SHM) is a very critical component for sustainable civil and mechanical structures in modern urban settings. The sky-scrappers and huge bridges in modern metropolis today are essential aspects ... -
Role updating in information systems using model checking
( Springer London , 2017 , Article)The role-based access control (RBAC) has significantly simplified the management of users and permissions in information systems. In dynamic environments, systems are constantly undergoing changes, and accordingly, the ... -
Sample-Based Data Augmentation Based on Electroencephalogram Intrinsic Characteristics
( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)Deep learning for electroencephalogram-based classification is confronted with data scarcity, due to the time-consuming and expensive data collection procedure. Data augmentation has been shown as an effective way to improve ... -
A secure and efficient Internet of Things cloud encryption scheme with forensics investigation compatibility based on identity-based encryption
( Elsevier B.V. , 2021 , Article)Data security is a challenge for end-users of cloud services as the users have no control over their data once it is transmitted to the cloud. A potentially corrupt cloud service provider can obtain the end-users’ data. ... -
Secure Bluetooth Communication in Smart Healthcare Systems: A Novel Community Dataset and Intrusion Detection System
( MDPI , 2022 , Article)Smart health presents an ever-expanding attack surface due to the continuous adoption of a broad variety of Internet of Medical Things (IoMT) devices and applications. IoMT is a common approach to smart city solutions that ... -
Secure smart contract-enabled control of battery energy storage systems against cyber-attacks
( Elsevier B.V. , 2019 , Article)Battery Energy Storage Systems (BESSs) are an integral part of a sustainable and resilient smart grid. The security of such critical cyber-physical infrastructure is considered as a major priority for both industry and ... -
Secure Vehicular Platoon Management against Sybil Attacks
( MDPI , 2022 , Article)The capacity of highways has been an ever-present constraint in the 21st century, bringing about the issue of safety with greater likelihoods of traffic accidents occurring. Furthermore, recent global oil prices have ... -
Security concerns on machine learning solutions for 6G networks in mmWave beam prediction
( Elsevier B.V. , 2022 , Article)6G – sixth generation – is the latest cellular technology currently under development for wireless communication systems. In recent years, machine learning (ML) algorithms have been applied widely in various fields, such ... -
Short survey of techniques for visualizing events recorded in logs
( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)Nowadays, data is being generated in large volumes and the users are left with a staggering amount of textual data that needs to be transformed into information to derive some knowledge from it. However, transforming and ... -
Significant wave height forecasting using hybrid ensemble deep randomized networks with neurons pruning
( Elsevier Ltd , 2023 , Article)The reliable control of wave energy devices highly relies on the forecasts of wave heights. However, the dynamic characteristics and significant fluctuation of waves’ historical data pose challenges to precise predictions. ... -
Similarity Group-by Operators for Multi-Dimensional Relational Data
( IEEE Computer Society , 2016 , Conference Paper)The SQL group-by operator plays an important role in summarizing and aggregating large datasets in a data analytics stack. While the standard group-by operator, which is based on equality, is useful in several applications, ... -
Situation Awareness Recognition Using EEG and Eye-Tracking data: a pilot study
( Institute of Electrical and Electronics Engineers Inc. , 2022 , Conference Paper)Since situation awareness (SA) plays an important role in many fields, the measure of SA is one of the most concerning problems. Using physiological signals to evaluate SA is becoming a popular research topic because of ... -
Skyline Discovery and Composition of Multi-Cloud Mashup Services
( Institute of Electrical and Electronics Engineers , 2016 , Article)A cloud mashup is composed of multiple services with shared datasets and integrated functionalities. For example, the elastic compute cloud (EC2) provided by Amazon Web Service (AWS), the authentication and authorization ... -
SLiFi: Exploiting Visible Light Communication VLC to Authenticate WiFi Access Points
( Hamad bin Khalifa University Press (HBKU Press) , 2018 , Conference Paper)This work presents an effective and efficient solution (SLiFi) to the evil twin attack in wireless networks. The evil twin is a rogue Wifi Access Point (AP) that pretends to be an authentic one by using the same network ... -
Smart energy usage and visualization based on micro-moments
( Springer Verlag , 2020 , Conference Paper)Due to global energy demands and overwhelming environmental dilemmas, exorbitant domestic energy usage is a colossal barrier towards energy efficiency. Tremendous research efforts have been poured into a plethora of methods ... -
Smart Grid Cybersecurity: Standards and Technical Countermeasures
( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)Cybersecurity in smart grids is of critical importance given the heavy reliance of modern societies on electricity and the recent cyberattacks that resulted in blackouts. The evolution of the legacy electric grid to a ... -
SOLD: A node-Splitting algorithm for R-tree based on Objects' Locations Distribution
( SAGE Publications Ltd , 2019 , Article)Spatial data indexing methods are of extreme importance as they massively build up as a result of the explosive growth in capturing data with spatial features. No matter how much the data size is, eventually it will reside ...