Information Intelligence: Recent submissions
Now showing items 41-60 of 98
-
Evolutionary Multitask Optimization: Fundamental research questions, practices, and directions for the future
( Elsevier B.V. , 2022 , Article)Transfer Optimization has gained a remarkable attention from the Swarm and Evolutionary Computation community in the recent years. It is undeniable that the concepts underlying Transfer Optimization are formulated on solid ... -
A comprehensive review of the deep learning-based tumor analysis approaches in histopathological images: segmentation, classification and multi-learning tasks
( Springer , 2023 , Article)Medical Imaging has become a vital technique that has been embraced in the diagnosis and treatment process of cancer. Histopathological slides, which microscopically examine the suspicious tissue, are considered the golden ... -
An iterative cyclic tri-strategy hybrid stochastic fractal with adaptive differential algorithm for global numerical optimization
( Elsevier Inc. , 2023 , Article)Many real-life problems can be formulated as numerical optimization problems. Such problems pose a challenge for researchers when designing efficient techniques that are capable of finding the desired solution without ... -
Compressive sensing based electronic nose platform
( Elsevier , 2017 , Article)Electronic nose (EN) systems play a significant role for gas monitoring and identification in gas plants. Using an EN system which consists of an array of sensors provides a high performance. Nevertheless, this performance ... -
Smart energy usage and visualization based on micro-moments
( Springer Verlag , 2020 , Conference)Due to global energy demands and overwhelming environmental dilemmas, exorbitant domestic energy usage is a colossal barrier towards energy efficiency. Tremendous research efforts have been poured into a plethora of methods ... -
Lightweight KPABE Architecture Enabled in Mesh Networked Resource-Constrained IoT Devices
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)Internet of Things (IoT) environments are widely employed in industrial applications including intelligent transportation systems, healthcare systems, and building energy management systems. For such environments of highly ... -
Qatar Green Schools Initiative: Energy Management System with Cost-Efficient and Lightweight Networked IoT
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference)With the growing need of developing real-time energy management and automation systems, building energy efficiency is of large focus in recent research. In particular, school buildings require special attention to occupants' ... -
Performance Evaluation of No-Pairing ECC-Based KPABE on IoT Platforms
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference)Internet of Things (IoT) networks operating in lightweight resource-constrained devices have been growing constantly in a wide range of areas. Such networks collect sensitive information over time that represent the users' ... -
Substring search over encrypted data
( Hamad bin Khalifa University Press (HBKU Press) , 2018 , Conference)Our data, be it personal or professional, is increasingly outsourced. This results from the development of cloud computing in the past ten years, a paradigm that shifts computing to a utility. Even without realizing it, ... -
QuicTor: Enhancing Tor for Real-Time Communication Using QUIC Transport Protocol
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)In the past decades, the internet has emerged as the fastest way to access information. However, this revolutionary information age comes with its own set of challenges. The privacy of Internet users is at increasing risk ... -
Framework for Visualizing Browsing Patterns Captured in Computer Logs
( Hamad bin Khalifa University Press (HBKU Press) , 2018 , Conference)Research ProblemAn Intrusion Detection System (IDS) is used for preventing security breaches by monitoring and analyzing the data recorded in log files. An IDS analyst is responsible for detecting intrusions in a system ... -
Optimizing Energy-Distortion Trade-off for Vital Signs Delivery in Mobile Health Applications
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference)Healthcare is considered a top priority worldwide, considering the swift increase in the number of chronic patients who require continuous monitoring. This motivates the researchers to develop scalable remote health ... -
Proportionally fair approach for tor's circuits scheduling
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference)The number of users adopting Tor to protect their online privacy is increasing rapidly. With a limited number of volunteered relays in the network, the number of clients' connections sharing the same relays is increasing ... -
Traffic Analysis Attacks on Tor: A Survey
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference)The Tor anonymity network is one of the most popular and widely used tools to protect the privacy of online users. Tor provides defenses against multiple adversarial activities aiming to identify or trace the users. Traffic ... -
Distributed interference management using Q-Learning in cognitive femtocell networks: New USRP-based implementation
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference)Femtocell networks have become a promising solution in supporting high data rates for 5G systems, where cell densification is performed using the small femtocells. However, femtocell networks have many challenges. One of ... -
Optimal sizing of a stand-alone hybrid PV-WT-BT system using artificial intelligence based technique
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference)Nowadays, conventional energy system is being replaced by renewable energy system. Especially, PV systems and wind energy systems are gaining much attention due to their future sustainability and eco-friendly nature. ... -
Fuzzy Identification-Based Encryption for healthcare user face authentication
( Hamad bin Khalifa University Press (HBKU Press) , 2022 , Article)Background: Internet of Medical Things (IOMT) has the potential to monitor health continuously and in real-time. One of the main issues that arise in IOMT is how securely the data can be transmitted to the clinical team. ... -
Design and implementation of a modular ECMO simulator
( Hamad bin Khalifa University Press (HBKU Press) , 2016 , Article)Background: Extracorporeal membrane oxygenation (ECMO) is a high-complexity life-saving procedure riddled with mechanical complications that can place the patient in a critical state where fast and coordinated actions are ... -
Cybersecurity for next generation healthcare in Qatar
( Hamad bin Khalifa University Press (HBKU Press) , 2021 , Article)Background: IoMT (Internet of Medical Things) devices (often referred to IoMT domain) have the potential to quickly diagnose and monitor patients outside the hospital by transmitting information through the cloud domain ... -
Using thermochromic ink for medical simulations
( Hamad bin Khalifa University Press (HBKU Press) , 2017 , Article)Background: In medical simulation and training, blood is used to exhibit its different behaviors in context. In some cases, blood color differential is an imperative visual effect to ensure high-fidelity training and ...