Network & Distributed Systems: Recent submissions
Now showing items 121-140 of 142
-
Takagi–Sugeno fuzzy based power system fault section diagnosis models via genetic learning adaptive GSK algorithm
( Elsevier B.V. , 2022 , Article)To effectively deal with the operating uncertainties of protective relays and circuit breakers existing in the power system faults, an improved fault section diagnosis (FSD) method is proposed by using Takagi–Sugeno fuzzy ... -
Experimental evaluation of stochastic configuration networks: Is SC algorithm inferior to hyper-parameter optimization method?
( Elsevier Ltd , 2022 , Article)To overcome the pitfalls of Random Vector Functional Link (RVFL), a network called Stochastic Configuration Networks (SCN) has been proposed. By constraining and adaptively selecting the range of randomized parameters using ... -
Weighting and pruning based ensemble deep random vector functional link network for tabular data classification
( Elsevier Ltd , 2022 , Article)In this paper, we first integrate normalization to the Ensemble Deep Random Vector Functional Link network (edRVFL). This re-normalization step can help the network avoid divergence of the hidden features. Then, we propose ... -
Significant wave height forecasting using hybrid ensemble deep randomized networks with neurons pruning
( Elsevier Ltd , 2023 , Article)The reliable control of wave energy devices highly relies on the forecasts of wave heights. However, the dynamic characteristics and significant fluctuation of waves’ historical data pose challenges to precise predictions. ... -
Dynamic ensemble deep echo state network for significant wave height forecasting
( Elsevier Ltd , 2023 , Article)Forecasts of the wave heights can assist in the data-driven control of wave energy systems. However, the dynamic properties and extreme fluctuations of the historical observations pose challenges to the construction of ... -
Graph ensemble deep random vector functional link network for traffic forecasting
(2022 , Article)Traffic forecasting is crucial to achieving a smart city as it facilitates public transportation management, autonomous driving, and the resource relocation of the sharing economy. Traffic forecasting belongs to the ... -
A decomposition-based hybrid ensemble CNN framework for driver fatigue recognition
( Elsevier Inc. , 2023 , Article)Electroencephalogram (EEG) has become increasingly popular in driver fatigue monitoring systems. Several decomposition methods have been attempted to analyze the EEG signals that are complex, nonlinear and non-stationary ... -
The simultaneous impact of EV charging and PV inverter reactive power on the hosting distribution system's performance: A case study in kuwait
( MDPI AG , 2020 , Article)Recently, electric vehicles (EVs) have become an increasingly important topic in the field of sustainable transportation research, alongside distributed generation, reactive power compensation, charging optimization, and ... -
Real-time cooperative data routing and scheduling in software defined vehicular networks
( Elsevier B.V. , 2022 , Article)Links in vehicular networks are highly dynamic and generally exist only for a limited amount of time. Moreover, data packets are generally transmitted over multiple hops and have diverse latency requirements. The above ... -
A privacy-preserving handover authentication protocol for a group of MTC devices in 5G networks
( Elsevier Ltd , 2022 , Article)Machine Type Communication (MTC) has been emerging for a wide range of applications and services for the Internet of Things (IoT). In some scenarios, a large group of MTC devices (MTCDs) may enter the communication coverage ... -
A Reconfigurable Multipurpose SoC Mobile Platform for metal detection
( Hamad bin Khalifa University Press (HBKU Press) , 2018 , Conference)Background and Objectives One of the key problems in mobile robotics is the ability to understand and analyze the surrounding environment in a useful way. This is especially important in dangerous applications where human ... -
Almost BPXOR Coding Technique for Tolerating Three Disk Failures in RAID7 Architectures
( Hamad bin Khalifa University Press (HBKU Press) , 2018 , Conference)Redundant Array of Independent Disks (RAID) storage architectures provide protection of digital infrastructure against potential disks failures. For example, RAID-5 and RAID-6 architectures provide protection against one ... -
Using block cipher for confidentiality of images in cloud-based systems
( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference)This paper deals with outsourcing of computing to cloud servers where clients' images are computed and stored. It proposes a technique that obfuscates images before sending them to servers. Cloud servers can perform ... -
PriviPK: Certificate-less and secure email communication
( Elsevier Ltd , 2017 , Article)We introduce PriviPK, an infrastructure that is based on a novel combination of certificateless (CL) cryptography and key transparency techniques to enable e2e email encryption. Our design avoids (1) key escrow and deployment ... -
Context-aware RAON middleware for opportunistic network
( Elsevier B.V. , 2017 , Article)Application development and deployment on Mobile Ad Hoc Networks (MANET) is a major challenge in the widespread use of MANET. The increasing D2D communication in 5G networks has renewed interest in an effective middleware ... -
Empirical performance evaluation of QUIC protocol for Tor anonymity network
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference)Tor's anonymity network is one of the most widely used anonymity networks online, it consists of thousands of routers run by volunteers. Tor preserves the anonymity of its users by relaying the traffic through a number of ... -
CloudSafe: A tool for an automated security analysis for cloud computing
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference)Cloud computing has been adopted widely, providing on-demand computing resources to improve performance and reduce operational costs. However, these new functionalities also bring new ways to exploit the cloud computing ... -
ThreatRiskEvaluator: A Tool for Assessing Threat-Specific Security Risks in the Cloud
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference)In cloud computing, security risks posed to individual clients are different based on their specific security requirements. In current practice, cloud providers usually apply generic protection mechanisms that may not be ... -
Multi-moth flame optimization for solving the link prediction problem in complex networks
( Springer Verlag , 2019 , Article)Providing a solution for the link prediction problem attracts several computer science fields and becomes a popular challenge in researches. This challenge is presented by introducing several approaches keen to provide the ... -
Secure smart contract-enabled control of battery energy storage systems against cyber-attacks
( Elsevier B.V. , 2019 , Article)Battery Energy Storage Systems (BESSs) are an integral part of a sustainable and resilient smart grid. The security of such critical cyber-physical infrastructure is considered as a major priority for both industry and ...