Level Crossing Rate of Ratio of Product of Two k-u Random Variables and Nakagami-m Random Variable
Conference Proceeding
Krstie, D., Romdhani, I., Yassein, M. M. B., Minić, S., Petković, G., & Milacic, P. (2015)
Level Crossing Rate of Ratio of Product of Two k-u Random Variables and Nakagami-m Random Variable. In 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing, (1620-1625). https://doi.org/10.1109/cit/iucc/dasc/picom.2015.244
In this paper, ratio of product of two k-μ random variables and Nakagami-m random variable is analyzed. Statistical characteristics of ratio of product of two k-μ random varia...
A Chain Topology for Efficient Monitoring of Food Grain Storage using Smart Sensors
Conference Proceeding
Kumar Mishra, A., Kumar Tripathy, A., Obaidat, M. S., Tan, Z., Prasad, M., Sadoun, B., & Puthal, D. (2018)
A Chain Topology for Efficient Monitoring of Food Grain Storage using Smart Sensors. In Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, (89-98). https://doi.org/10.5220/0006850602550264
Due to lack of an efficient monitoring system to periodically record environmental parameters for food grain storage, a huge loss of food grains in storage is reported every y...
Pseudorandom number generation in smart cards: an Implementation, performance and randomness analysis.
Conference Proceeding
Akram, R. N., Markantonakis, K., & Mayes, K. (2012)
Pseudorandom number generation in smart cards: an Implementation, performance and randomness analysis. In A. Mana, & M. Klonowski (Eds.), 5th International Conference on New Technologies, Mobility and Security (NTMS), 1-7. https://doi.org/10.1109/NTMS.2012.6208760
Smart cards rely on pseudorandom number generators to provide uniqueness and freshness in their cryptographic services i.e. encryption and digital signatures. Their implementa...
A scalable broadcast algorithm for multiport meshes with minimum communication steps
Conference Proceeding
Al-Dubai, A., & Ould-Khaoua, M. (2003)
A scalable broadcast algorithm for multiport meshes with minimum communication steps. In Proceedings of the Ninth International Conference on Parallel and Distributed Systems (ICPADS’02), 203-208. doi:10.1109/icpads.2002.1183400
Many broadcast algorithms have been proposed for the mesh over the past decade. However, most of these algorithms do not exhibit good scalability properties as the network siz...
Migration of mobile agents in ad-hoc wireless networks.
Conference Proceeding
Migas, N., Buchanan, W. J., & McArtney, K. (2004)
Migration of mobile agents in ad-hoc wireless networks. In Proceeding of the 11th IEEE International Conference and Workshop on the Engineering of Computer-based systems, 530-535. https://doi.org/10.1109/ECBS.2004.1316743
This paper focuses on the design and development of a novel architecture called MARIAN, which utilises static agents, mobile agents, and also a hybrid approach, in order to pe...
Ethical assessment in e-Health
Conference Proceeding
Gonzalez-Pinto, A., Ruiz de Azua, S., Mival, O. H., Thuernmler, C., Jumelle, A. K. L., Ispas, I., …González-Pinto, A. (2015)
Ethical assessment in e-Health. In 2014 IEEE 16th International Conference on e-Health Networking, Applications and Services (Healthcom), 262-268. https://doi.org/10.1109/healthcom.2014.7001852
While innovative e-Health and m-Health technologies and solutions will eventually change the way health and social care are delivered, it raises many challenges regarding what...
Battery Aware Beacon Enabled IEEE802.15.4: An Adaptive and Cross-Layer Approach
Conference Proceeding
Salayma, M., Al-Dubai, A., Romdhani, I., & Yassein, M. B. (2015)
Battery Aware Beacon Enabled IEEE802.15.4: An Adaptive and Cross-Layer Approach. In M. Ganzha, L. Maciaszek, & M. Paprzycki (Eds.), Proceedings of the 2015 Federated Conference on Computer Science and Information Systems, (1267-1272). https://doi.org/10.15439/2015F118
In Wireless Sensor Networks (WSNs), energy conservation is one of the main concerns challenging the cutting-edge standards and protocols. Most existing studies focus on the de...
Can Federated Models Be Rectified Through Learning Negative Gradients?
Conference Proceeding
Tahir, A., Tan, Z., & Babaagba, K. O. (2024)
Can Federated Models Be Rectified Through Learning Negative Gradients?. In Big Data Technologies and Applications (18-32). https://doi.org/10.1007/978-3-031-52265-9_2
Federated Learning (FL) is a method to train machine learning (ML) models in a decentralised manner, while preserving the privacy of data from multiple clients. However, FL is...
Distributed and compressed MIKEY mode to secure end-to-end communications in the Internet of things.
Conference Proceeding
Abdmeziem, R., Tandjaoui, D., & Romdhani, I. (2016)
Distributed and compressed MIKEY mode to secure end-to-end communications in the Internet of things
Multimedia Internet KEYing protocol (MIKEY) aims at establishing secure credentials between two communicating entities. However, existing MIKEY modes fail to meet the requirem...
An agent based Bayesian forecasting model for enhanced network security.
Conference Proceeding
Pikoulas, J., Buchanan, W. J., Mannion, M., & Triantafyllopoulos, K. (2001)
An agent based Bayesian forecasting model for enhanced network security. In Proceedings. Eighth Annual IEEE International Conference and Workshop On the Engineering of Computer-Based Systems-ECBS 2001. , (247-254). https://doi.org/10.1109/ECBS.2001.922429
Security has become a major issue in many organisations, but most systems still rely on operating systems, and a user ID and password system to provide user authentication and...