KINDI Center for Computing Research: Recent submissions
Now showing items 121-140 of 250
-
Edge computing-enabled green multisource fusion indoor positioning algorithm based on adaptive particle filter
( Springer , 2023 , Article)Edge computing enables portable devices to provide smart applications, and the indoor positioning technique offers accurate location-based indoor navigation and personalized smart services. To achieve the high positioning ... -
DQN based Blockchain Data Storage in Resource-constrained IoT System
( Institute of Electrical and Electronics Engineers Inc. , 2023 , Conference)Applying blockchain technology in the Internet of Things (IoT) systems to realize massive data storage is a promising technology, which can eliminate the dependence of IoT on central servers and protect data security ... -
Secure Vehicular Platoon Management against Sybil Attacks
( MDPI , 2022 , Article)The capacity of highways has been an ever-present constraint in the 21st century, bringing about the issue of safety with greater likelihoods of traffic accidents occurring. Furthermore, recent global oil prices have ... -
Preface : Journal of Physics: Conference Series
( Institute of Physics , 2022 , Other)2022 2nd International Conference on Electron Devices and Applications was held virtually during May 13-15, 2022 via Zoom platform due to the pandemic of COVID-19. With a satisfactory ending of ICEDA 2021, ICEDA 2022 has ... -
Enhanced Beidou user equipment access authentication protocol based on location key
( Editorial Board of Journal on Communications , 2022 , Article)In order to solve the shortcomings of the existing Beidou user equipment access solutions such as prolonged authentication, and in response to the need of user privacy protection, a user equipment access authentication ... -
Active Computing Toward 5G Internet of Things
( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)The Internet of Things (IoT) contains enormous computing resources. How to fully and efficiently use computing power is a very important research issue. This article proposes an active computing (AC) concept toward IoT. ... -
Blockchain technology for healthcare: Enhancing shared electronic health record interoperability and integrity
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference)The Electronic Health Records (EHR) sharing system is the state of art for delivering healthcare. The tools within the system can predict outcomes during the patient's lifetime, monitor how effective are treatments, track ... -
Adopting formal verification and model-based testing techniques for validating a blockchain-based healthcare records sharing system
( SciTePress , 2020 , Conference)The Electronic Health Records (EHR) sharing system is the modern tool for delivering efficient healthcare to patients. Its functions include tracking of therapies, monitoring of the treatment effectiveness, prediction of ... -
A formal model-based testing framework for validating an IoT solution for blockchain-based vehicles communication
( SciTePress , 2020 , Conference)The emergence of embedded and connected smart technologies, systems, and devices has enabled the concept of smart cities by connecting every "thing" to the Internet and in particular in transportation through the Internet ... -
Virtual reality for ambulance simulation environment
( Springer , 2022 , Article)Simulations are beneficial in evaluating clinicians' empirical competencies through practical skills, prioritizing, and decision-making as part of patient care scenarios generally run in a full-scale physical context. ... -
Exploration of Carbonate Aggregates in Road Construction using Ultrasonic and Artificial Intelligence Approaches
( Qatar University Press , 2023 , Conference)The COVID-19 pandemic has significantly impacted the construction sector, which is highly sensitive to economic cycles. In order to boost value and efficiency in this sector, the use of innovative exploration technologies ... -
Secure Bluetooth Communication in Smart Healthcare Systems: A Novel Community Dataset and Intrusion Detection System
( MDPI , 2022 , Article)Smart health presents an ever-expanding attack surface due to the continuous adoption of a broad variety of Internet of Medical Things (IoMT) devices and applications. IoMT is a common approach to smart city solutions that ... -
An enhanced ensemble deep random vector functional link network for driver fatigue recognition
( Elsevier , 2023 , Article)This work investigated the use of an ensemble deep random vector functional link (edRVFL) network for electroencephalogram (EEG)-based driver fatigue recognition. Against the low feature learning capability of the edRVFL ... -
Automatic generation of optimized workflow for distributed computations on large-scale matrices
( Springer Verlag , 2014 , Conference)Efficient evaluation of distributed computation on large-scale data is prominent in modern scientific computation; especially analysis of big data, image processing and data mining applications. This problem is particularly ... -
A Domain Specific Language for Secure Outsourcing of Computation to the Cloud
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference)Secure outsourcing of computation has gained importance with the proliferation of cloud services. However, existing outsourcing protocol specification languages are mainly suitable for secure multi-party computation. They ... -
A model driven framework for secure outsourcing of computation to the cloud
( IEEE Computer Society , 2014 , Conference)This paper presents a model driven approach to define then coordinate the execution of protocols for secure outsourcing of computation of large datasets in cloud computing environments. First we present our Outsourcing ... -
Paillier's encryption: Implementation and cloud applications
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference)Paillier's additive homomorphic encryption is increasingly used in recent research in the field of cloud secure outsourcing and privacy-preserving computation in addition to other cryptographic tools such as garbled circuits. ... -
Reasoning about security policies of services using answer set programming
( Institute of Electrical and Electronics Engineers Inc. , 2014 , Conference)In this paper, we propose a formal framework for checking the consistency of security policies of services using Answer Set Programming (ASP). We illustrate that the formalisation of security policies of the service providers ... -
Integration of federated machine learning and blockchain for the provision of secure big data analytics for Internet of Things
( Elsevier , 2021 , Article)Big data enables the optimization of complex supply chains through Machine Learning (ML)-based data analytics. However, data analytics comes with challenges such as the loss of control and privacy leading to increased risk ... -
Situation Awareness Recognition Using EEG and Eye-Tracking data: a pilot study
( Institute of Electrical and Electronics Engineers Inc. , 2022 , Conference)Since situation awareness (SA) plays an important role in many fields, the measure of SA is one of the most concerning problems. Using physiological signals to evaluate SA is becoming a popular research topic because of ...