Browsing KINDI Center for Computing Research by Title
Now showing items 53-72 of 178
-
ECG encryption and identification based security solution on the Zynq SoC for connected health systems
( Academic Press Inc. , 2017 , Article)Connected health is a technology that associates medical devices, security devices and communication technologies. It enables patients to be monitored and treated remotely from their home. Patients' data and medical records ... -
Edge computing-enabled green multisource fusion indoor positioning algorithm based on adaptive particle filter
( Springer , 2023 , Article)Edge computing enables portable devices to provide smart applications, and the indoor positioning technique offers accurate location-based indoor navigation and personalized smart services. To achieve the high positioning ... -
Edge intelligence-enabled cyber-physical systems
( John Wiley and Sons Ltd , 2023 , Other)With the advent of the Internet of everything era, people's demand for intelligent Internet of Things (IoT) devices is steadily increasing. A more intelligent cyber-physical system (CPS) is needed to meet the diverse ... -
EEG-based emotion recognition using random Convolutional Neural Networks
( Elsevier Ltd , 2022 , Article)Emotion recognition based on electroencephalogram (EEG) signals is helpful in various fields, including medical healthcare. One possible medical application is to diagnose emotional disorders in patients. Humans tend to ... -
Embedded wearable EEG seizure detection in ambulatory state
( UK Simulation Society , 2014 , Article)This paper describes a classification method is presented using a Fuzzy System to detect the occurrences of Partial Seizures from Epilepsy data, which can be implemented in any embedded system as a wearable detection system. ... -
Empirical performance evaluation of QUIC protocol for Tor anonymity network
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)Tor's anonymity network is one of the most widely used anonymity networks online, it consists of thousands of routers run by volunteers. Tor preserves the anonymity of its users by relaying the traffic through a number of ... -
Empowering users of cloud computing on data confidentiality
( IEEE , 2014 , Conference Paper)Cloud networking is an integral part of interconnected data centres operated in cloud environment. Cloud users heavily rely on cloud networking to transmit to and receive data from data centres. In this context, we explore ... -
Enabling broadcast communications in presence of jamming via probabilistic pairing
( Elsevier B.V. , 2017 , Article)This paper presents a thorough analysis of Freedom of Speech (FoS): a lightweight, fully distributed, and probabilistic protocol that assures the delivery of a message to be broadcast notwithstanding the presence of a ... -
Enhanced Beidou user equipment access authentication protocol based on location key
( Editorial Board of Journal on Communications , 2022 , Article)In order to solve the shortcomings of the existing Beidou user equipment access solutions such as prolonged authentication, and in response to the need of user privacy protection, a user equipment access authentication ... -
An Enhanced Multi-Phase Stochastic Differential Evolution Framework for Numerical Optimization
( Institute of Electrical and Electronics Engineers Inc. , 2022 , Conference Paper)Real-life problems can be expressed as optimization problems. These problems pose a challenge for researchers to design efficient algorithms that are capable of finding optimal solutions with the least budget. Stochastic ... -
Enhancing Healthcare Systems With Deep Reinforcement Learning: Insights Into D2D Communications and Remote Monitoring
( IEEE , 2024 , Article)The traditional healthcare system is increasingly challenged by its dependence on inperson consultations and manual monitoring, struggling with issues of scalability, the immediacy of care, and efficient resource allocation. ... -
Ensemble deep learning: A review
( Elsevier Ltd , 2022 , Other)Ensemble learning combines several individual models to obtain better generalization performance. Currently, deep learning architectures are showing better performance compared to the shallow or traditional models. Deep ... -
Ensemble of Metaheuristic and Exact Algorithm Based on the Divide-And-Conquer Framework for Multisatellite Observation Scheduling
( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)Satellite observation scheduling plays a significant role in improving the efficiency of Earth observation systems. To solve the large-scale multisatellite observation scheduling problem, this article proposes an ensemble ... -
Evaluation of combined genome assemblies: A case study with fungal genomes
( Springer , 2015 , Conference Paper)The rapid advances in genome sequencing leads to the generation of huge amount of data in a single sequencing experiment. Several genome assemblers with different objectives were developed to process these genomic data. ... -
Evaluation of Loss Functions for Segmentation of Corneal Nerves
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)Corneal confocal microscopy (CCM) has been advocated as a non-invasive technique for objective diagnosis of very early neuropathy in patients by scanning the corneal subbasal nerve plexus. The obtained images provide a ... -
Evolutionary Multitask Optimization: Fundamental research questions, practices, and directions for the future
( Elsevier B.V. , 2022 , Article)Transfer Optimization has gained a remarkable attention from the Swarm and Evolutionary Computation community in the recent years. It is undeniable that the concepts underlying Transfer Optimization are formulated on solid ... -
Experimental evaluation of stochastic configuration networks: Is SC algorithm inferior to hyper-parameter optimization method?
( Elsevier Ltd , 2022 , Article)To overcome the pitfalls of Random Vector Functional Link (RVFL), a network called Stochastic Configuration Networks (SCN) has been proposed. By constraining and adaptively selecting the range of randomized parameters using ... -
Exploration of Carbonate Aggregates in Road Construction using Ultrasonic and Artificial Intelligence Approaches
( Qatar University Press , 2023 , Conference Paper)The COVID-19 pandemic has significantly impacted the construction sector, which is highly sensitive to economic cycles. In order to boost value and efficiency in this sector, the use of innovative exploration technologies ... -
Factors Affecting the Performance of Sub-1 GHz IoT Wireless Networks
( Hindawi Limited , 2021 , Article)Internet of Things (IoT) devices frequently utilize wireless networks operating in the Industrial, Scientific, and Medical (ISM) Sub-1 GHz spectrum bands. Compared with higher frequency bands, the Sub-1 GHz band provides ... -
FastRNABindR: Fast and Accurate Prediction of Protein-RNA Interface Residues
( Public Library of Science (PLoS) , 2016 , Article)A wide range of biological processes, including regulation of gene expression, protein synthesis, and replication and assembly of many viruses are mediated by RNA-protein interactions. However, experimental determination ...