Browsing KINDI Center for Computing Research by Type "Article"
Now showing items 41-60 of 83
-
Jointly optimized ensemble deep random vector functional link network for semi-supervised classification
( Elsevier Ltd , 2022 , Article)Randomized neural networks have become more and more attractive recently since they use closed-form solutions for parameter training instead of gradient-based approaches. Among them, the random vector functional link network ... -
Lightweight KPABE Architecture Enabled in Mesh Networked Resource-Constrained IoT Devices
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)Internet of Things (IoT) environments are widely employed in industrial applications including intelligent transportation systems, healthcare systems, and building energy management systems. For such environments of highly ... -
Minimizing energy consumption of IoT devices for O-RAN based IoT systems
( Elsevier , 2023 , Article)The implementation of Open Radio Access Network (O-RAN) architecture in Internet of Things (IoT) systems has garnered significant attention as a means to fulfill the stringent requirements of ultra-low latency and ultra-low ... -
MLP Neural Network Based Gas Classification System on Zynq SoC
( Institute of Electrical and Electronics Engineers Inc. , 2016 , Article)Systems based on wireless gas sensor networks offer a powerful tool to observe and analyze data in complex environments over long monitoring periods. Since the reliability of sensors is very important in those systems, gas ... -
Multi-moth flame optimization for solving the link prediction problem in complex networks
( Springer Verlag , 2019 , Article)Providing a solution for the link prediction problem attracts several computer science fields and becomes a popular challenge in researches. This challenge is presented by introducing several approaches keen to provide the ... -
Oblique and rotation double random forest
( Elsevier Ltd , 2022 , Article)Random Forest is an ensemble of decision trees based on the bagging and random subspace concepts. As suggested by Breiman, the strength of unstable learners and the diversity among them are the ensemble models’ core strength. ... -
Parallelizing exact motif finding algorithms on multi-core
( Springer Science+Business Media , 2014 , Article)The motif finding problem is one of the important and challenging problems in bioinformatics. A variety of sequential algorithms have been proposed to find exact motifs, but the running time is still not suitable due to ... -
Policy specification and verification for blockchain and smart contracts in 5G networks
( Korean Institute of Communications Information Sciences , 2020 , Article)Blockchain offers unprecedented opportunities for innovation in financial transactions. A whole new world of opportunities for banking, lending, insurance, money transfer, investments, and stock markets awaits. However, ... -
A Practical and Scalable Tool to Find Overlaps between Sequences
( Hindawi , 2015 , Article)The evolution of the next generation sequencing technology increases the demand for efficient solutions, in terms of space and time, for several bioinformatics problems. This paper presents a practical and easy-to-implement ... -
Prediction of infarction volume and infarction growth rate in acute ischemic stroke
( Nature Publishing Group , 2017 , Article)The prediction of infarction volume after stroke onset depends on the shape of the growth dynamics of the infarction. To understand growth patterns that predict lesion volume changes, we studied currently available models ... -
A privacy-preserving handover authentication protocol for a group of MTC devices in 5G networks
( Elsevier Ltd , 2022 , Article)Machine Type Communication (MTC) has been emerging for a wide range of applications and services for the Internet of Things (IoT). In some scenarios, a large group of MTC devices (MTCDs) may enter the communication coverage ... -
PriviPK: Certificate-less and secure email communication
( Elsevier Ltd , 2017 , Article)We introduce PriviPK, an infrastructure that is based on a novel combination of certificateless (CL) cryptography and key transparency techniques to enable e2e email encryption. Our design avoids (1) key escrow and deployment ... -
Quantifying Satisfaction of Security Requirements of Cloud Software Systems
( Institute of Electrical and Electronics Engineers Inc. , 2023 , Article)The satisfaction of a software requirement is commonly stated as a Boolean value, that is, a security requirement is either satisfied (true) or not (false). However, a discrete Boolean value to measure the satisfaction ... -
QuicTor: Enhancing Tor for Real-Time Communication Using QUIC Transport Protocol
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)In the past decades, the internet has emerged as the fastest way to access information. However, this revolutionary information age comes with its own set of challenges. The privacy of Internet users is at increasing risk ... -
Random vector functional link neural network based ensemble deep learning for short-term load forecasting
( Elsevier Ltd , 2022 , Article)Electric load forecasting is essential for the planning and maintenance of power systems. However, its un-stationary and non-linear properties impose significant difficulties in predicting future demand. This paper proposes ... -
Real-time cooperative data routing and scheduling in software defined vehicular networks
( Elsevier B.V. , 2022 , Article)Links in vehicular networks are highly dynamic and generally exist only for a limited amount of time. Moreover, data packets are generally transmitted over multiple hops and have diverse latency requirements. The above ... -
Reasoning about Policies in Security-Aware Service Discovery Using Answer Set Programming
( World Scientific Publishing Co. Pte Ltd , 2016 , Article)In order to enable a secure interaction between dynamically discovered software services and the client's application in a cooperative information system such as service oriented system, one of the pre-requisites is the ... -
Recent Advances in the Internet-of-Medical-Things (IoMT) Systems Security
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)The rapid evolutions in microcomputing, mini-hardware manufacturing, and machine-to-machine (M2M) communications have enabled novel Internet-of-Things (IoT) solutions to reshape many networking applications. Healthcare ... -
Representation learning using deep random vector functional link networks for clustering: Representation learning using deep RVFL for clustering
( Elsevier Ltd , 2022 , Article)Random Vector Functional Link (RVFL) Networks have received a lot of attention due to the fast training speed as the non-iterative solution characteristic. Currently, the main research direction of RVFLs has supervised ... -
Role updating in information systems using model checking
( Springer London , 2017 , Article)The role-based access control (RBAC) has significantly simplified the management of users and permissions in information systems. In dynamic environments, systems are constantly undergoing changes, and accordingly, the ...