KINDI Center for Computing Research: المرسلات الحديثة
السجلات المعروضة 101 -- 120 من 178
-
The simultaneous impact of EV charging and PV inverter reactive power on the hosting distribution system's performance: A case study in kuwait
( MDPI AG , 2020 , Article)Recently, electric vehicles (EVs) have become an increasingly important topic in the field of sustainable transportation research, alongside distributed generation, reactive power compensation, charging optimization, and ... -
Qatar Green Schools Initiative: Energy Management System with Cost-Efficient and Lightweight Networked IoT
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)With the growing need of developing real-time energy management and automation systems, building energy efficiency is of large focus in recent research. In particular, school buildings require special attention to occupants' ... -
Performance Evaluation of No-Pairing ECC-Based KPABE on IoT Platforms
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)Internet of Things (IoT) networks operating in lightweight resource-constrained devices have been growing constantly in a wide range of areas. Such networks collect sensitive information over time that represent the users' ... -
Lightweight KPABE Architecture Enabled in Mesh Networked Resource-Constrained IoT Devices
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)Internet of Things (IoT) environments are widely employed in industrial applications including intelligent transportation systems, healthcare systems, and building energy management systems. For such environments of highly ... -
Real-time cooperative data routing and scheduling in software defined vehicular networks
( Elsevier B.V. , 2022 , Article)Links in vehicular networks are highly dynamic and generally exist only for a limited amount of time. Moreover, data packets are generally transmitted over multiple hops and have diverse latency requirements. The above ... -
A privacy-preserving handover authentication protocol for a group of MTC devices in 5G networks
( Elsevier Ltd , 2022 , Article)Machine Type Communication (MTC) has been emerging for a wide range of applications and services for the Internet of Things (IoT). In some scenarios, a large group of MTC devices (MTCDs) may enter the communication coverage ... -
Substring search over encrypted data
( Hamad bin Khalifa University Press (HBKU Press) , 2018 , Conference Paper)Our data, be it personal or professional, is increasingly outsourced. This results from the development of cloud computing in the past ten years, a paradigm that shifts computing to a utility. Even without realizing it, ... -
Framework for Visualizing Browsing Patterns Captured in Computer Logs
( Hamad bin Khalifa University Press (HBKU Press) , 2018 , Conference Paper)Research ProblemAn Intrusion Detection System (IDS) is used for preventing security breaches by monitoring and analyzing the data recorded in log files. An IDS analyst is responsible for detecting intrusions in a system ... -
Distributed interference management using Q-Learning in cognitive femtocell networks: New USRP-based implementation
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)Femtocell networks have become a promising solution in supporting high data rates for 5G systems, where cell densification is performed using the small femtocells. However, femtocell networks have many challenges. One of ... -
Traffic Analysis Attacks on Tor: A Survey
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)The Tor anonymity network is one of the most popular and widely used tools to protect the privacy of online users. Tor provides defenses against multiple adversarial activities aiming to identify or trace the users. Traffic ... -
Optimizing Energy-Distortion Trade-off for Vital Signs Delivery in Mobile Health Applications
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)Healthcare is considered a top priority worldwide, considering the swift increase in the number of chronic patients who require continuous monitoring. This motivates the researchers to develop scalable remote health ... -
Proportionally fair approach for tor's circuits scheduling
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)The number of users adopting Tor to protect their online privacy is increasing rapidly. With a limited number of volunteered relays in the network, the number of clients' connections sharing the same relays is increasing ... -
QuicTor: Enhancing Tor for Real-Time Communication Using QUIC Transport Protocol
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)In the past decades, the internet has emerged as the fastest way to access information. However, this revolutionary information age comes with its own set of challenges. The privacy of Internet users is at increasing risk ... -
Fuzzy Identification-Based Encryption for healthcare user face authentication
( Hamad bin Khalifa University Press (HBKU Press) , 2022 , Article)Background: Internet of Medical Things (IOMT) has the potential to monitor health continuously and in real-time. One of the main issues that arise in IOMT is how securely the data can be transmitted to the clinical team. ... -
Optimal sizing of a stand-alone hybrid PV-WT-BT system using artificial intelligence based technique
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)Nowadays, conventional energy system is being replaced by renewable energy system. Especially, PV systems and wind energy systems are gaining much attention due to their future sustainability and eco-friendly nature. ... -
Design and implementation of a modular ECMO simulator
( Hamad bin Khalifa University Press (HBKU Press) , 2016 , Article)Background: Extracorporeal membrane oxygenation (ECMO) is a high-complexity life-saving procedure riddled with mechanical complications that can place the patient in a critical state where fast and coordinated actions are ... -
Cybersecurity for next generation healthcare in Qatar
( Hamad bin Khalifa University Press (HBKU Press) , 2021 , Article)Background: IoMT (Internet of Medical Things) devices (often referred to IoMT domain) have the potential to quickly diagnose and monitor patients outside the hospital by transmitting information through the cloud domain ... -
Using thermochromic ink for medical simulations
( Hamad bin Khalifa University Press (HBKU Press) , 2017 , Article)Background: In medical simulation and training, blood is used to exhibit its different behaviors in context. In some cases, blood color differential is an imperative visual effect to ensure high-fidelity training and ... -
Real-Time Scheduling for Electric Vehicles Charging/Discharging Using Reinforcement Learning
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)With the increase in Electric Vehicles (EVs) penetration, their charging needs form an additional burden on the grid. Thus, charging coordination is necessary for safe and efficient EV use. The scheduling of EVs is especially ... -
Breath Analysis for the in Vivo Detection of Diabetic Ketoacidosis
( American Chemical Society , 2022 , Article)Human breath analysis of volatile organic compounds has gained significant attention recently because of its rapid and noninvasive potential to detect various metabolic diseases. The detection of ketones in the breath and ...