• English
    • العربية
  • English
  • تسجيل الدخول
  • جامعة قطر
  • مكتبة جامعة قطر
  •  الصفحة الرئيسية
  • الوحدات والمجموعات
  • المساعدة
    • إرسال الأعمال الأكاديمية
    • سياسات الناشر
    • أدلة المستخدم
    • الأسئلة الأكثر تكراراً
  • عن المستودع الرقمي
    • الرؤية والرسالة
تصفح حسب العنوان 
  •   مركز المجموعات الرقمية لجامعة قطر
  • المستودع الرقمي لجامعة قطر
  • أكاديمية
  • مراكز البحث
  • مركز الكندي لبحوث الحوسبة
  • الشبكات وخدمات البنية التحتية للمعلومات والبيانات
  • تصفح حسب العنوان
  • مركز المجموعات الرقمية لجامعة قطر
  • المستودع الرقمي لجامعة قطر
  • أكاديمية
  • مراكز البحث
  • مركز الكندي لبحوث الحوسبة
  • الشبكات وخدمات البنية التحتية للمعلومات والبيانات
  • تصفح حسب العنوان
  •      
  •  
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    تصفح Network & Distributed Systems حسب العنوان

    • 0-9
    • A
    • B
    • C
    • D
    • E
    • F
    • G
    • H
    • I
    • J
    • K
    • L
    • M
    • N
    • O
    • P
    • Q
    • R
    • S
    • T
    • U
    • V
    • W
    • X
    • Y
    • Z

    فرز حسب:

    طلب:

    النتائج:

    السجلات المعروضة 1 -- 20 من 142

    • العنوان
    • تاريخ الاصدار
    • تاريخ الإرسال
    • تصاعدي
    • تنازلي
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100
      • 3-sCHSL: Three-Stage Cyclic Hybrid SFS and L-SHADE Algorithm for Single Objective Optimization 

        Abdel-Nabi, Heba; Ali, Mostafa Z.; Awajan, Arafat; Alazrai, Rami; Daoud, Mohammad I.; Suganthan, Ponnuthurai N.; Reynolds, Robert... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2023 , Conference)
        This paper proposes a novel hybridization of two metaheuristic algorithms to solve the real-parameter single objective numerical optimization problems. The proposed Three-stage Cyclic Hybrid SFS and L-SHADE (3-sCHSL) ...
      • A Blockchain-Based Security Scheme for Vehicular Ad Hoc Networks in Smart Cities 

        Li, Xue Jun; Ma, Maode; Yong, Yong Xing ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference)
        The development of Vehicular Ad Hoc Networks (VANET) has brought many advantages to facilitate the deployment of the Intelligent Transportation System (ITS). However, without proper protection, VANETs can be vulnerable to ...
      • A cultural evolution with a modified selection function and adaptive α-cognition procedure for numerical optimization 

        Ali, Mostafa Z.; Abdel-Nabi, Heba; Alazrai, Rami; AlHijawi, Bushra; AlWadi, Mazen G.; Al-Badarneh, Amer F.; Suganthan, Ponnuthurai N.; Daoud, Mohammad I.; Reynolds, Robert G.... more authors ... less authors ( Elsevier , 2023 , Article)
        In recent years, several population-based evolutionary and swarm algorithms have been developed and used in the literature. This work introduces an improved Cultural Algorithm with a modified selection function and a dynamic ...
      • A Greedy Cooperative Co-Evolutionary Algorithm With Problem-Specific Knowledge for Multiobjective Flowshop Group Scheduling Problems 

        He, Xuan; Pan, Quan-Ke; Gao, Liang; Wang, Ling; Suganthan, Ponnuthurai Nagaratnam ( Institute of Electrical and Electronics Engineers Inc. , 2023 , Article)
        The flowshop sequence-dependent group scheduling problem (FSDGSP) with the production efficiency measures has been extensively studied due to its wide industrial applications. However, energy efficiency indicators are often ...
      • Thumbnail

        A Practical Universal Consortium Blockchain Paradigm for Patient Data Portability on the Cloud Utilizing Delegated Identity Management 

        Sabir, Abdulbadi; Fetais, Noora ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference)
        This paper presents a blockchain system that exploits the base modular features of the Hyperledger Fabric framework to allow for a new, patient-centric, practical data portability paradigm. The system empowers patients by ...
      • A problem-specific knowledge based artificial bee colony algorithm for scheduling distributed permutation flowshop problems with peak power consumption 

        Yuan-Zhen, Li; Gao, Kaizhou; Meng, Lei-Lei; Suganthan, Ponnuthurai Nagaratnam ( Elsevier , 2023 , Article)
        A distributed permutation flowshop scheduling problem (DPFSP) with peak power consumption is addressed in this work. The instantaneous energy consumption of each factory cannot exceed a threshold. First, a mathematical ...
      • Thumbnail

        A Reconfigurable Multipurpose SoC Mobile Platform for metal detection 

        Al Rshid Abazeed, Omran; Mhaisen, Naram; Al-Hariri, Youssef; Nawaz, Naveed; Amira, Abbes ( Hamad bin Khalifa University Press (HBKU Press) , 2018 , Conference)
        Background and Objectives One of the key problems in mobile robotics is the ability to understand and analyze the surrounding environment in a useful way. This is especially important in dangerous applications where human ...
      • Thumbnail

        A spectral-ensemble deep random vector functional link network for passive brain-computer interface 

        Li, Ruilin; Gao, Ruobin; Suganthan, Ponnuthurai N.; Cui, Jian; Sourina, Olga; Wang, Lipo... more authors ... less authors ( Elsevier , 2023 , Article)
        Randomized neural networks (RNNs) have shown outstanding performance in many different fields. The superiority of having fewer training parameters and closed-form solutions makes them popular in small datasets analysis. ...
      • A Two-Stage Evolutionary Framework for Multi-Objective Optimization 

        Chen, Peng; Liang, Jing; Qiao, Kangjia; Suganthan, Ponnuthurai Nagaratnam; Ban, Xuanxuan ( Institute of Electrical and Electronics Engineers Inc. , 2024 , Conference)
        In the field of evolutionary multi-objective optimization, the approximation of the Pareto front (PF) is achieved by utilizing a collection of representative candidate solutions that exhibit desirable convergence and ...
      • Accurate parameters extraction of photovoltaic models with multi-strategy gaining-sharing knowledge-based algorithm 

        Guojiang, Xiong; Gu, Zaiyu; Mohamed, Ali Wagdy; Bouchekara, Houssem R.E.H.; Suganthan, Ponnuthurai Nagaratnam ( Elsevier , 2024 , Article)
        The determination of photovoltaic (PV) model parameters has essential theoretical and practical significance for the performance evaluation, power monitoring, and power generation efficiency calculation of PV systems. In ...
      • Thumbnail

        Active Computing Toward 5G Internet of Things 

        Liu, Chunpeng; Meng, Wei Xiao; Li, Cheng; Ma, Maode ( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)
        The Internet of Things (IoT) contains enormous computing resources. How to fully and efficiently use computing power is a very important research issue. This article proposes an active computing (AC) concept toward IoT. ...
      • Thumbnail

        Adaptive Scaling for U-Net in Time Series Classification 

        Cheng, Wen Xin; Suganthan, Ponnuthurai Nagaratnam ( Springer Science and Business Media Deutschland GmbH , 2023 , Conference)
        Convolutional Neural Networks such as U-Net are recently getting popular among researchers in many applications, such as Biomedical Image Segmentation. U-Net is one of the popular deep Convolutional Neural Networks which ...
      • Advanced Ensemble Deep Random Vector Functional Link for Eye-Tracking-based Situation Awareness Recognition 

        Li, Ruilin; Gao, Ruobin; Cui, Jian; Suganthan, P.N.; Sourina, Olga ( Institute of Electrical and Electronics Engineers Inc. , 2022 , Conference)
        Situation awareness (SA) plays a significant role in takeover transitions from autonomous to manual driving. Previous researchers have shown that eye movement signals can be used for SA recognition. Moreover, ensemble deep ...
      • AI-powered malware detection with Differential Privacy for zero trust security in Internet of Things networks 

        Faria, Nawshin; Unal, Devrim; Hammoudeh, Mohammad; Suganthan, Ponnuthurai N. ( Elsevier , 2024 , Article)
        The widespread usage of Android-powered devices in the Internet of Things (IoT) makes them susceptible to evolving cybersecurity threats. Most healthcare devices in IoT networks, such as smart watches, smart thermometers, ...
      • Thumbnail

        Almost BPXOR Coding Technique for Tolerating Three Disk Failures in RAID7 Architectures 

        Mhaisen, Naram; Punkar, Mayur; Wang, Yongge; Desmedt, Yvo; Malluhi, Qutaibah ( Hamad bin Khalifa University Press (HBKU Press) , 2018 , Conference)
        Redundant Array of Independent Disks (RAID) storage architectures provide protection of digital infrastructure against potential disks failures. For example, RAID-5 and RAID-6 architectures provide protection against one ...
      • An evolutionary multiobjective method based on dominance and decomposition for feature selection in classification 

        Liang, Jing; Zhang, Yuyang; Chen, Ke; Qu, Boyang; Yu, Kunjie; Yue, Caitong; Suganthan, Ponnuthurai Nagaratnam... more authors ... less authors ( Science China Press , 2024 , Article)
        Feature selection in classification can be considered a multiobjective problem with the objectives of increasing classification accuracy and decreasing the size of the selected feature subset. Dominance-based and ...
      • Android Malware Detection and Classification using Stacked Machine Learning 

        Nawshin, F.; Gad, R.; Unal, D.; Suganthan, P.N. ( Institute of Electrical and Electronics Engineers Inc. , 2023 , Conference)
        The widespread use of Android smartphones in daily life can be attributed to the extensive prevalence stemming from the Android OS and the availability of open-source applications. People have become accustomed to performing ...
      • Thumbnail

        Assessing the Effect of Model Poisoning Attacks on Federated Learning in Android Malware Detection 

        Nawshin, Faria; Arnal, Romain; Unal, Devrim; Suganthan, Ponnuthurai; Touseau, Lionel ( Association for Computing Machinery , 2024 , Conference)
        Android devices are central to our daily lives, which leads to an increase in mobile security threats. Attackers try to exploit vulnerabilities and steal personal information from the installed applications on these devices. ...
      • Thumbnail

        Automatic variable reduction 

        Song, Aijuan; Wu, Guohua; Suganthan, P. N.; Pedrycz, Witold ( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)
        A variable reduction strategy (VRS) is an effective method to accelerate the optimization process of evolutionary algorithms (EAs) by simplifying the corresponding optimization problems. Unfortunately, the VRS is manually ...
      • Benchmark problems for large-scale constrained multi-objective optimization with baseline results 

        Qiao, Kangjia; Liang, Jing; Yu, Kunjie; Guo, Weifeng; Yue, Caitong; Qu, Boyang; Suganthan, P.N.... more authors ... less authors ( Elsevier , 2024 , Article)
        The interests in evolutionary constrained multiobjective optimization are rapidly increasing during the past two decades. However, most related studies are limited to small-scale problems, despite the fact that many practical ...

        مركز المجموعات الرقمية لجامعة قطر هو مكتبة رقمية تديرها مكتبة جامعة قطر بدعم من إدارة تقنية المعلومات

        اتصل بنا | ارسل ملاحظاتك
        اتصل بنا | ارسل ملاحظاتك | جامعة قطر

         

         

        الصفحة الرئيسية

        أرسل عملك التابع لجامعة قطر

        تصفح

        محتويات مركز المجموعات الرقمية
          الوحدات والمجموعات تاريخ النشر المؤلف العناوين الموضوع النوع اللغة الناشر
        هذه المجموعة
          تاريخ النشر المؤلف العناوين الموضوع النوع اللغة الناشر

        حسابي

        تسجيل الدخول

        عن المستودع الرقمي

        الرؤية والرسالة

        المساعدة

        إرسال الأعمال الأكاديميةسياسات الناشرأدلة المستخدمالأسئلة الأكثر تكراراً

        مركز المجموعات الرقمية لجامعة قطر هو مكتبة رقمية تديرها مكتبة جامعة قطر بدعم من إدارة تقنية المعلومات

        اتصل بنا | ارسل ملاحظاتك
        اتصل بنا | ارسل ملاحظاتك | جامعة قطر