Browsing KINDI Center for Computing Research by Title
Now showing items 29-48 of 178
-
Can immersive type of Virtual Reality bring EMG pattern changes post facial palsy?
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)The loss of facial expression via facial paralysis is a devastating condition, both functionally and aesthetically. However, given the life-long plasticity of the brain one could assume that recovery could be facilitated ... -
Certrust: An SDN-Based Framework for the Trust of Certificates against Crossfire Attacks in IoT Scenarios
( Tech Science Press , 2023 , Article)The low-intensity attack flows used by Crossfire attacks are hard to distinguish from legitimate flows. Traditional methods to identify the malicious flows in Crossfire attacks are rerouting, which is based on statistics. ... -
Challenges and Mitigation of Cyber Threat in Automated Vehicle: An Integrated Approach
( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)The technological development of automated vehicles opens novel cybersecurity threats and risks for road safety. Increased connectivity often results in increased risks of a cyber-security attacks, which is one of the ... -
CloudFlow: A data-aware programming model for cloud workflow applications on modern HPC systems
( Elsevier , 2015 , Article)Traditional High-Performance Computing (HPC) based big-data applications are usually constrained by having to move large amount of data to compute facilities for real-time processing purpose. Modern HPC systems, represented ... -
CloudSafe: A tool for an automated security analysis for cloud computing
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)Cloud computing has been adopted widely, providing on-demand computing resources to improve performance and reduce operational costs. However, these new functionalities also bring new ways to exploit the cloud computing ... -
Collaborative Truck-Drone Routing for Contactless Parcel Delivery during the Epidemic
( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)The COVID-19 pandemic calls for contactless deliveries. To prevent the further spread of the disease and ensure the timely delivery of supplies, this paper investigates a collaborative truck-drone routing problem for ... -
A comprehensive review of the deep learning-based tumor analysis approaches in histopathological images: segmentation, classification and multi-learning tasks
( Springer , 2023 , Other)Medical Imaging has become a vital technique that has been embraced in the diagnosis and treatment process of cancer. Histopathological slides, which microscopically examine the suspicious tissue, are considered the golden ... -
Compressive sensing based electronic nose platform
( Elsevier , 2017 , Article)Electronic nose (EN) systems play a significant role for gas monitoring and identification in gas plants. Using an EN system which consists of an array of sensors provides a high performance. Nevertheless, this performance ... -
Context-aware RAON middleware for opportunistic network
( Elsevier B.V. , 2017 , Article)Application development and deployment on Mobile Ad Hoc Networks (MANET) is a major challenge in the widespread use of MANET. The increasing D2D communication in 5G networks has renewed interest in an effective middleware ... -
Cybersecurity for next generation healthcare in Qatar
( Hamad bin Khalifa University Press (HBKU Press) , 2021 , Article)Background: IoMT (Internet of Medical Things) devices (often referred to IoMT domain) have the potential to quickly diagnose and monitor patients outside the hospital by transmitting information through the cloud domain ... -
Cybersecurity of multi-cloud healthcare systems: A hierarchical deep learning approach
( Elsevier Ltd , 2022 , Article)With the increase in sophistication and connectedness of the healthcare networks, their attack surfaces and vulnerabilities increase significantly. Malicious agents threaten patients’ health and life by stealing or altering ... -
Data confidentiality in cloud-based pervasive system
( Association for Computing Machinery , 2017 , Conference Paper)Data confidentiality and privacy is a serious concern in pervasive systems where cloud computing is used to process huge amount of data such as matrix multiplications typically used in HPC. Due to limited processing ... -
Data Obfuscation for Privacy and Confidentiality in Cloud Computing
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)This paper proposes a data obfuscation approach in outsourcing matrix multiplication to cloud computing. It is primarily based on splitting the rows and columns of matrices to alter their actual dimension coupled with ... -
A decomposition-based hybrid ensemble CNN framework for driver fatigue recognition
( Elsevier Inc. , 2023 , Article)Electroencephalogram (EEG) has become increasingly popular in driver fatigue monitoring systems. Several decomposition methods have been attempted to analyze the EEG signals that are complex, nonlinear and non-stationary ... -
Deep learning for detection of routing attacks in the internet of things
( Atlantis Press , 2018 , Article)Cyber threats are a showstopper for Internet of Things (IoT) has recently been used at an industrial scale. Network layer attacks on IoT can cause significant disruptions and loss of information. Among such attacks, routing ... -
Deep Reservoir Computing Based Random Vector Functional Link for Non-sequential Classification
( Institute of Electrical and Electronics Engineers Inc. , 2022 , Conference Paper)Reservoir Computing (RC) is well-suited for simpler sequential tasks which require inexpensive, rapid training, and the Echo State Network (ESN) plays a significant role in RC. In this article, we proposed variations of ... -
Design and implementation of a modular ECMO simulator
( Hamad bin Khalifa University Press (HBKU Press) , 2016 , Article)Background: Extracorporeal membrane oxygenation (ECMO) is a high-complexity life-saving procedure riddled with mechanical complications that can place the patient in a critical state where fast and coordinated actions are ... -
Design and Implementation of a Threat-Specific Security Risk Assessment Tool
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)Security threats posed to individual cloud computing clients vary depending on their specific security requirements. However, Cloud Providers apply generic security risk assessment approaches which result do not consider ... -
Detection of Botnet Attacks against Industrial IoT Systems by Multilayer Deep Learning Approaches
( Hindawi Limited , 2022 , Article)Industry 4.0 is the next revolution in manufacturing technology that is going to change the production and distribution of goods and services within the following decade. Powered by different enabling technologies that are ... -
Detection of partial seizure: An application of fuzzy rule system for wearable ambulatory systems
( IEEE , 2014 , Conference Paper)Electroencephalography (EEG) plays an intelligent role, especially EEG based health diagnosis of brain disorder, as well as brain-computer interface (BCI) applications. One such research field is related to epilepsy. The ...