تصفح KINDI Center for Computing Research حسب النوع "Article"
السجلات المعروضة 21 -- 40 من 82
-
Dynamic security metrics for measuring the effectiveness of moving target defense techniques
( Elsevier Ltd , 2018 , Article)Moving Target Defense (MTD) utilizes granularity, flexibility and elasticity properties of emerging networking technologies in order to continuously change the attack surface. There are many different MTD techniques proposed ... -
ECG encryption and identification based security solution on the Zynq SoC for connected health systems
( Academic Press Inc. , 2017 , Article)Connected health is a technology that associates medical devices, security devices and communication technologies. It enables patients to be monitored and treated remotely from their home. Patients' data and medical records ... -
Edge computing-enabled green multisource fusion indoor positioning algorithm based on adaptive particle filter
( Springer , 2023 , Article)Edge computing enables portable devices to provide smart applications, and the indoor positioning technique offers accurate location-based indoor navigation and personalized smart services. To achieve the high positioning ... -
EEG-based emotion recognition using random Convolutional Neural Networks
( Elsevier Ltd , 2022 , Article)Emotion recognition based on electroencephalogram (EEG) signals is helpful in various fields, including medical healthcare. One possible medical application is to diagnose emotional disorders in patients. Humans tend to ... -
Embedded wearable EEG seizure detection in ambulatory state
( UK Simulation Society , 2014 , Article)This paper describes a classification method is presented using a Fuzzy System to detect the occurrences of Partial Seizures from Epilepsy data, which can be implemented in any embedded system as a wearable detection system. ... -
Enabling broadcast communications in presence of jamming via probabilistic pairing
( Elsevier B.V. , 2017 , Article)This paper presents a thorough analysis of Freedom of Speech (FoS): a lightweight, fully distributed, and probabilistic protocol that assures the delivery of a message to be broadcast notwithstanding the presence of a ... -
Enhanced Beidou user equipment access authentication protocol based on location key
( Editorial Board of Journal on Communications , 2022 , Article)In order to solve the shortcomings of the existing Beidou user equipment access solutions such as prolonged authentication, and in response to the need of user privacy protection, a user equipment access authentication ... -
Ensemble of Metaheuristic and Exact Algorithm Based on the Divide-And-Conquer Framework for Multisatellite Observation Scheduling
( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)Satellite observation scheduling plays a significant role in improving the efficiency of Earth observation systems. To solve the large-scale multisatellite observation scheduling problem, this article proposes an ensemble ... -
Evolutionary Multitask Optimization: Fundamental research questions, practices, and directions for the future
( Elsevier B.V. , 2022 , Article)Transfer Optimization has gained a remarkable attention from the Swarm and Evolutionary Computation community in the recent years. It is undeniable that the concepts underlying Transfer Optimization are formulated on solid ... -
Experimental evaluation of stochastic configuration networks: Is SC algorithm inferior to hyper-parameter optimization method?
( Elsevier Ltd , 2022 , Article)To overcome the pitfalls of Random Vector Functional Link (RVFL), a network called Stochastic Configuration Networks (SCN) has been proposed. By constraining and adaptively selecting the range of randomized parameters using ... -
Factors Affecting the Performance of Sub-1 GHz IoT Wireless Networks
( Hindawi Limited , 2021 , Article)Internet of Things (IoT) devices frequently utilize wireless networks operating in the Industrial, Scientific, and Medical (ISM) Sub-1 GHz spectrum bands. Compared with higher frequency bands, the Sub-1 GHz band provides ... -
FastRNABindR: Fast and Accurate Prediction of Protein-RNA Interface Residues
( Public Library of Science (PLoS) , 2016 , Article)A wide range of biological processes, including regulation of gene expression, protein synthesis, and replication and assembly of many viruses are mediated by RNA-protein interactions. However, experimental determination ... -
Fuzzy Identification-Based Encryption for healthcare user face authentication
( Hamad bin Khalifa University Press (HBKU Press) , 2022 , Article)Background: Internet of Medical Things (IOMT) has the potential to monitor health continuously and in real-time. One of the main issues that arise in IOMT is how securely the data can be transmitted to the clinical team. ... -
Garbled computation in cloud
( Elsevier , 2016 , Article)With the wide adoption of cloud computing paradigm, it is important to develop appropriate techniques to protect client data privacy in the cloud. Encryption is one of the major techniques that could be used to achieve ... -
Graph ensemble deep random vector functional link network for traffic forecasting
(2022 , Article)Traffic forecasting is crucial to achieving a smart city as it facilitates public transportation management, autonomous driving, and the resource relocation of the sharing economy. Traffic forecasting belongs to the ... -
Hybrid Multi-Objective Optimization Approach With Pareto Local Search for Collaborative Truck-Drone Routing Problems Considering Flexible Time Windows
( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)The collaboration of drones and trucks for last-mile delivery has attracted much attention. In this paper, we address a collaborative routing problem of the truck-drone system, in which a truck collaborates with multiple ... -
Inpatient Discharges Forecasting for Singapore Hospitals by Machine Learning
( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)Hospitals can predetermine the admission rate and facilitate resource allocation based on valid emergency requests and bed capacity estimation. The excess unoccupied beds can be determined with the help of forecasting the ... -
Integration of federated machine learning and blockchain for the provision of secure big data analytics for Internet of Things
( Elsevier , 2021 , Article)Big data enables the optimization of complex supply chains through Machine Learning (ML)-based data analytics. However, data analytics comes with challenges such as the loss of control and privacy leading to increased risk ... -
Intrusion Detection System for Healthcare Systems Using Medical and Network Data: A Comparison Study
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)Introducing IoT systems to healthcare applications has made it possible to remotely monitor patients' information and provide proper diagnostics whenever needed. However, providing high-security features that guarantee the ... -
An iterative cyclic tri-strategy hybrid stochastic fractal with adaptive differential algorithm for global numerical optimization
( Elsevier Inc. , 2023 , Article)Many real-life problems can be formulated as numerical optimization problems. Such problems pose a challenge for researchers when designing efficient techniques that are capable of finding the desired solution without ...