Browsing Computer Science & Engineering by Publisher "IEEE Computer Society"
Now showing items 1-20 of 121
-
A Bi-layered parallel training architecture for large-scale convolutional neural networks
( IEEE Computer Society , 2019 , Article)Benefitting from large-scale training datasets and the complex training network, Convolutional Neural Networks (CNNs) are widely applied in various fields with high accuracy. However, the training process of CNNs is very ... -
A Blockchain-Enabled Privacy-Preserving Verifiable Query Framework for Securing Cloud-Assisted Industrial Internet of Things Systems
( IEEE Computer Society , 2022 , Article)Advanced Industrial Internet-of-Things (IIoT), such as smart grids, 5G-enabled unmanned aerial vehicles (UAV), and supply chain 4.o, can be used to facilitate smart management. Nevertheless, IIoT systems generate huge ... -
A cost-aware model for risk mitigation in Cloud computing systems
( IEEE Computer Society , 2016 , Conference Paper)Security is an important element in Cloud computing. Intruders may exploit clouds for their advantage. This paper presents a cost-aware model for risk mitigation in cloud computing systems. The proposed model is integrated ... -
A distributed control approach for autonomic performance management in cloud computing environment
( IEEE Computer Society , 2013 , Conference Paper)In this paper, a distributed control based performance management approach is developed for a general class of web services deployed in a cloud computing environment. This approach is developed using interaction balance ... -
A distributed gateway selection algorithm for UAV networks
( IEEE Computer Society , 2015 , Article)In recent years, unmanned aerial vehicle (UAV) has been widely adopted in military and civilian applications. For small UAVs, cooperation based on communication networks can effectively expand their working area. Although ... -
A framework for modelling blockchain based supply chain management system to ensure soundness of smart contract workflow
( IEEE Computer Society , 2021 , Conference Paper)We propose a smart contract workflow verification framework for blockchain-based supply chain management systems. The proposed framework introduces a Petri-Net-based formalism to model smart contract workflow in a supply-chain ... -
A new WDM Application Response Time in WLAN Network and Fixed WiMAX using Distributed
( IEEE Computer Society , 2014 , Conference Paper)Worldwide Interoperability for Microwave Access (WiMAX) and Wireless LAN (WLAN) has emerged as a promising solution for last mile access technology to provide high speed internet access in the residential as well as small ... -
A Parallel Random Forest Algorithm for Big Data in a Spark Cloud Computing Environment
( IEEE Computer Society , 2017 , Article)With the emergence of the big data age, the issue of how to obtain valuable knowledge from a dataset efficiently and accurately has attracted increasingly attention from both academia and industry. This paper presents a ... -
A Scheme for Three-way Secure and Verifiable E-Voting
( IEEE Computer Society , 2019 , Conference Paper)Online voting systems are gaining acceptance with the widespread use of secure web services and cloud computing such as electronic currency and online banking. However, they still face privacy, security and accountability ... -
A study on the design and effectiveness of tactile feedback in sriving simulator
( IEEE Computer Society , 2014 , Conference Paper)Driving simulations are widely used to send navigational and warning information to help drivers navigate safely. The traditional approaches are to use visual and auditory channels which can cause sensory overloading. ... -
A survey of clustering algorithms for big data: Taxonomy and empirical analysis
( IEEE Computer Society , 2014 , Article)Clustering algorithms have emerged as an alternative powerful meta-learning tool to accurately analyze the massive volume of data generated by modern applications. In particular, their main goal is to categorize data into ... -
ACPN: A novel authentication framework with conditional privacy-preservation and non-repudiation for VANETs
( IEEE Computer Society , 2015 , Article)In Vehicular Ad hoc NETworks (VANETs), authentication is a crucial security service for both inter-vehicle and vehicle-roadside communications. On the other hand, vehicles have to be protected from the misuse of their ... -
Adaptive de Algorithm for Novel Energy Control Framework Based on Edge Computing in IIoT Applications
( IEEE Computer Society , 2021 , Article)With the development of the industrial Internet of Things and the advancements in wireless sensor networking technologies, the smart grid based on edge computing now is regarded as being essential for real-time monitoring ... -
Adaptive de Algorithm for Novel Energy Control Framework Based on Edge Computing in IIoT Applications
( IEEE Computer Society , 2021 , Article)With the development of the industrial Internet of Things and the advancements in wireless sensor networking technologies, the smart grid based on edge computing now is regarded as being essential for real-time monitoring ... -
Adaptive energy-aware encoding for DWT-based wireless EEG tele-monitoring system
( IEEE Computer Society , 2013 , Conference Paper)Recent technological advances in wireless body sensor networks (WBSN) have made it possible for the development of innovative medical applications to improve health care and the quality of life. Electroencephalography ... -
An adaptive route optimization scheme for nested mobile IPv6 NEMO environment
( IEEE Computer Society , 2014 , Conference Paper)We address the route optimization problem for a nested mobile IPv6 NEtwork MObility (NEMO) environment. We propose an adaptive scheme which can optimize the routing process of the data communication, and minimize the ... -
An e-learning mobile system to generate illustrations for Arabic text
( IEEE Computer Society , 2016 , Conference Paper)Smart devices applications can assist children in improving their learning capabilities and comprehension skills. However most applications are built without taking into consideration the effective needs and background of ... -
An Efficient Distributed Trust Model for Wireless Sensor Networks
( IEEE Computer Society , 2015 , Article)Trust models have been recently suggested as an effective security mechanism for Wireless Sensor Networks (WSNs). Considerable research has been done on modeling trust. However, most current research work only takes ... -
An efficient hybrid prediction approach for predicting cloud consumer resource needs
( IEEE Computer Society , 2016 , Conference Paper)The prediction of cloud consumer resource needs is a vital step for several cloud deployment applications such as capacity planning, workload management, and dynamic allocation of cloud resources. In this paper, we develop ... -
An experience to develop a web portal about the historical and archeological sites in qatar
( IEEE Computer Society , 2010 , Conference Paper)Qatar is located in the heart of the Arabian Peninsula. The country possesses many magnificent historical and archaeological sites which are the common heritage and history of the Arab and Muslim people. However, a little ...