Security of Crypto systems is usually analyzed through different cryptanalytic methods. Since Advance
Encryption Standard (AES) is one of the most widely used and popular block cipher, a number of attacks have already
been ...
Diabetes Mellitus type 2 (DM2) is a disease with the leading cause of death in the world. Recent statistics from world
health organization projects that by 2030 this disease will be the seventh leading cause of death. The ...
In this paper, a reconfigurable queuing scheme based on Gentle Random Early Dropping (GRED) algorithm has been proposed. Two nonlinear GRED algorithms have been suggested to study the effect of maximum threshold (maxth) ...
Re-usability & Reliability are eminent factors in development of new software’s to control the increasing costs and development period. The suppliers need to customize software as per the customers, however managing the ...
Demand response (DR) is playing a revolutionary role in changing the way demand at the distribution end is managed. In the literature, a number of centralized energy management schemes have been discussed. Due to large ...
With the increasing use of the Internet of things (IoT), heterogeneous IoT services are being offered to satisfy various needs. The Fed4IoT project aims to develop an IoT virtualization technology that could realize the ...
The focal point of this work is to develop an intelligent camera surveillance system which englobes the key functionalities of existing surveillance systems. Other than regular functionalities such as motion detection, ...
Cost reduction is one of the attractive features offered by the cloud. Spot leasing is one way to reduce the cost even more. Spot leasing is done by leasing the unused excess instances with low price. Spot instances are ...
Al Majed, Ali; Lacy, Fred; Ismail, Yasser(2020-09-01)
Object detection is one of the most essential and challenging tasks in computer vision and deep learning. The main goal of object detection is to determine whether the image has an object from predefined categories and ...
Smart cities possess several technologies in collecting pedestrian activity data, which may be used to manage city planning. A growing body of research exists on video processing based pedestrian counting methods, due to ...
Alofe, Olasunkanmi Matthew; Fatema, Kaniz; Azad, Muhammad Ajmal; Kurugollu, Fatih(2020-11-01)
The number of attacks on innocent victims in moving vehicles, and abduction of individuals in their vehicles has risen alarmingly in the past few years. One common scenario evident from the modus operandi of this kind of ...
Rehman, Muhammad Muneeb Ur; Rehman, Hafiz Zia Ur; Khan, Zeashan Hameed(2020-11-01)
This paper describes the vulnerability of the medical implants due to cyber-attacks, which can result in unexpected behavior of these devices thus causing severe damage to human safety. Although, it seems hard to believe ...
The current level of security of energy supply in the GCC Member States is quite satisfactory, and the network connection supports any risk faced by a GCC Member State. The Lost Load Value (VoLL) assists in assessing each ...
Virtual Desktop Infrastructure (VDI) technology is advancing rapidly. Organizations, including hospitals, banks, Oil and Gas companies, and universities have considered VDI as an alternative to the typical office workstation. ...
The paper considers a two-sided market of mobile cross-platform applications. The most important elements of the market are identified. They comprise consumers of the first category who are simultaneously subscribers of a ...
Al-anni, Maad Kamal; Almuttairi, Rafah M.; Alsaadi, Husam Ibrahiem Husain(2020-11-01)
obliquely, the obfuscation becomes the vital mannerism for preserving the surreptitious data, so far it is necessary to pay more attention to the art of hiding important images for the purpose of sending crucial decisions ...
This study enlightens the impact of Machine Learning algorithms and practices in
the context of Healthcare Informatics. In the domain of Healthcare Informatics
(HI), Machine Learning (ML) procedures have been classified ...
M. Jamel, Thamer; Al-Shuwaili, Ali; M. Mansoor, Bashar(2020-11-01)
To date, there are very few researches on performance investigation or application of adaptive beam-forming that is based on the Fast Euclidean Direction Search (FEDS) algorithm. Correspondingly, one of our primary goals ...
Safety is critical for autonomous vehicle, therefore quality management system method is crucial for the risks that may impact human beings. Quality management system help identify customer requirements and finally meet ...
Previous information systems studies focused on studying the receptivity of people towards innovation acceptance using variables borrowed from the psychology theories that focus on behavioral determinants. There is a lack ...