Computer Science & Engineering: Recent submissions
Now showing items 1481-1500 of 2402
-
SsHealth: Toward secure, blockchain-enabled healthcare systems
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)The future of healthcare systems is being shaped by incorporating emerged technological innovations to drive new models for patient care. By acquiring, integrating, analyzing, and exchanging medical data at different system ... -
EEG-based Analysis Study for Patients Receiving Intravenous Antibiotic Medication
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)In this paper, we conduct a biological data collection and analysis study for patients undergoing routine planned intravenous antibiotic treatment. The acquired data (i.e., Electroencephalogram (EEG), temperature and blood ... -
Blockchain Based Decentralized Trust Management framework
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)The blockchain is a storage technology and transmission of information, transparent, secure, and operating without central control. In this paper, we propose a new decentralized trust management and cooperation model where ... -
DistPrivacy: Privacy-Aware Distributed Deep Neural Networks in IoT surveillance systems
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)With the emergence of smart cities, Internet of Things (IoT) devices as well as deep learning technologies have witnessed an increasing adoption. To support the requirements of such paradigm in terms of memory and computation, ... -
Machine Learning Based Cloud Computing Anomalies Detection
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)Recently, machine learning algorithms have been proposed to design new security systems for anomalies detection as they exhibit fast processing with real-time predictions. However, one of the major challenges in machine ... -
Key Generation Based Fuzzy Logic and Elliptic Curve Cryptography for Internet of Things (IoT) Authentication
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)The security and privacy of the network in the Internet of Things is playing an important challenge for researchers and engineers. Considering that packets are exchanged between the end user and the sensing devices, it is ... -
To chain or not to chain: A reinforcement learning approach for blockchain-enabled IoT monitoring applications
( Elsevier B.V. , 2020 , Article)Traceability and autonomous business logic execution are highly desirable features in IoT monitoring applications. Traceability enables verifying signals history for security or analytical purposes. On the other hand, the ... -
Optimizing Energy-Distortion Trade-off for Vital Signs Delivery in Mobile Health Applications
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)Healthcare is considered a top priority worldwide, considering the swift increase in the number of chronic patients who require continuous monitoring. This motivates the researchers to develop scalable remote health ... -
Proportionally fair approach for tor's circuits scheduling
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)The number of users adopting Tor to protect their online privacy is increasing rapidly. With a limited number of volunteered relays in the network, the number of clients' connections sharing the same relays is increasing ... -
Navigation and Obstacle Avoidance System in Unknown Environment
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)Recently, drones have been used in many different applications such as search and rescue operations, extinguishing fires, and environment mapping. As the number of moving drones increases in the sky, the collisions risk ... -
A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)The Internet of Things (IoT) integrates billions of smart devices that can communicate with one another with minimal human intervention. IoT is one of the fastest developing fields in the history of computing, with an ... -
Deep Reinforcement Learning Algorithm for Smart Data Compression under NOMA-Uplink Protocol
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)One of the highly promising radio access strategies for enhancing performance in the next generation cellular communications is non-orthogonal multiple access (NOMA). NOMA offers a number of advantages including better ... -
Dynamic Resource Allocation of eMBB-uRLLC Traffic in 5G New Radio
( IEEE Computer Society , 2020 , Conference Paper)5G technology is intended to support three promising services with heterogeneous requirements: Ultra-Reliable and Low Latency Communication (uRLLC), enhanced Mobile Broadband (eMBB) and massive Machine Type Communication ... -
Performance Analysis of IoT Physical layer Security Using 3-D Stochastic Geometry
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)The internet of things (IoT) is becoming part of the infrastructure supporting various services in every day's life. Due to the complex nature of IoT systems with heterogeneous devices, the needed security and privacy ... -
Multicast at Edge: An Edge Network Architecture for Service-Less Crowdsourced Live Video Multicast
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)Using smartphones, tablets, and other portable/handheld devices, we have become more reliant on the video streaming services for entertainment and remote work. Mobile data traffic has grown eighteen folds over the past ... -
RL-PDNN: Reinforcement Learning for Privacy-Aware Distributed Neural Networks in IoT Systems
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)Due to their high computational and memory demand, deep learning applications are mainly restricted to high-performance units, e.g., cloud and edge servers. Particularly, in Internet of Things (IoT) systems, the data ... -
Collaborative hierarchical caching and transcoding in edge network with CE-D2D communication
( Academic Press , 2020 , Article)To support multimedia applications, Mobile Edge Computing (MEC) servers offer storage and computing capacities to handle videos close to end-users. However, the high load in peak hours consumes the limited available bandwidth ... -
Neuro-fuzzy analytics in athlete development (NueroFATH): a machine learning approach
( Springer Science and Business Media Deutschland GmbH , 2021 , Article)Athletes represent the apex of physical capacity filling in a social picture of performance and build. In light of the fundamental contrasts in athletic capacities required for different games, each game demands an alternate ... -
QuicTor: Enhancing Tor for Real-Time Communication Using QUIC Transport Protocol
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)In the past decades, the internet has emerged as the fastest way to access information. However, this revolutionary information age comes with its own set of challenges. The privacy of Internet users is at increasing risk ... -
An Intelligent Resource Reservation for Crowdsourced Live Video Streaming Applications in Geo-Distributed Cloud Environment
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)Crowdsourced live video streaming (livecast) services such as Facebook Live, YouNow, Douyu, and Twitch are gaining more momentum recently. Allocating the limited resources in a cost-effective manner while maximizing the ...