• A Domain Specific Language for Secure Outsourcing of Computation to the Cloud 

      Nassar, Mohamed; Erradi, Abdelkarim; Malluhi, Qutaibah M. ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)
      Secure outsourcing of computation has gained importance with the proliferation of cloud services. However, existing outsourcing protocol specification languages are mainly suitable for secure multi-party computation. They ...
    • A model driven framework for secure outsourcing of computation to the cloud 

      Nassar, Mohamed; Erradi, Abdelkarim; Sabry, Farida; Malluhi, Qutaibah M. ( IEEE Computer Society , 2014 , Conference Paper)
      This paper presents a model driven approach to define then coordinate the execution of protocols for secure outsourcing of computation of large datasets in cloud computing environments. First we present our Outsourcing ...
    • A new technique for compacting secret key in attribute-based broadcast encryption 

      Canard, Sébastien; Phan, Duong Hieu; Trinh, Viet Cuong ( Springer Verlag , 2016 , Conference Paper)
      Public-key encryption has been generalized to adapt to more and more practical applications. Broadcast encryption, introduced by Fiat and Naor in 1993, aims for applications in pay-TV or satellite transmission and allows ...
    • A novel multi-hop body-To-body routing protocol for disaster and emergency networks 

      Ben Arbia, Dhafer; Alam, Muhammad Mahtab; Attia, Rabah; Ben Hamida, Elye ( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)
      In this paper, a new multi-hop routing protocol (called ORACE-Net) for disaster and emergency networks is proposed. The proposed hierarchical protocol creates an ad-hoc network through body-To-body (B2B) communication ...
    • A Practical Universal Consortium Blockchain Paradigm for Patient Data Portability on the Cloud Utilizing Delegated Identity Management 

      Sabir, Abdulbadi; Fetais, Noora ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      This paper presents a blockchain system that exploits the base modular features of the Hyperledger Fabric framework to allow for a new, patient-centric, practical data portability paradigm. The system empowers patients by ...
    • A Reconfigurable Multipurpose SoC Mobile Platform for metal detection 

      Al Rshid Abazeed, Omran; Mhaisen, Naram; Al-Hariri, Youssef; Nawaz, Naveed; Amira, Abbes ( Hamad bin Khalifa University Press (HBKU Press) , 2018 , Conference Paper)
      Background and Objectives One of the key problems in mobile robotics is the ability to understand and analyze the surrounding environment in a useful way. This is especially important in dangerous applications where human ...
    • A scalable solution for finding overlaps between sequences using map-reduce 

      Haj Rachid, Maan; Malluhi, Qutaibah M. ( The International Society for Computers and Their Applications (ISCA) , 2016 , Conference Paper)
      The overlap stage of a string graph-based assembler is considered one of the most time- and space-consuming stages in any de novo overlap-based assembler. This is due to the huge output of the next-generation sequencing ...
    • A Service-Oriented Approach for Sensing in the Internet of Things: Intelligent Transportation Systems and Privacy Use Cases 

      Hammoudeh, Mohammad; Epiphaniou, Gregory; Belguith, Sana; Unal, Devrim; Adebisi, Bamidele; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)
      This paper presents a Sensing-as-a-Service run-time Service Oriented Architecture (SOA), called 3SOA, for the development of Internet of Things (IoT) applications. 3SOA aims to allow interoperability among various IoT ...
    • Active Computing Toward 5G Internet of Things 

      Liu, Chunpeng; Meng, Wei Xiao; Li, Cheng; Ma, Maode ( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)
      The Internet of Things (IoT) contains enormous computing resources. How to fully and efficiently use computing power is a very important research issue. This article proposes an active computing (AC) concept toward IoT. ...
    • Adopting formal verification and model-based testing techniques for validating a blockchain-based healthcare records sharing system 

      Jabbar, Rateb; Krichen, Moez; Fetais, Noora; Barkaoui, Kamel ( SciTePress , 2020 , Conference Paper)
      The Electronic Health Records (EHR) sharing system is the modern tool for delivering efficient healthcare to patients. Its functions include tracking of therapies, monitoring of the treatment effectiveness, prediction of ...
    • Almost BPXOR Coding Technique for Tolerating Three Disk Failures in RAID7 Architectures 

      Mhaisen, Naram; Punkar, Mayur; Wang, Yongge; Desmedt, Yvo; Malluhi, Qutaibah ( Hamad bin Khalifa University Press (HBKU Press) , 2018 , Conference Paper)
      Redundant Array of Independent Disks (RAID) storage architectures provide protection of digital infrastructure against potential disks failures. For example, RAID-5 and RAID-6 architectures provide protection against one ...
    • An efficient instance hiding scheme 

      Malluhi, Qutaibah M.; Shikfa, Abdullatif; Trinh, Viet Cuong ( Association for Computing Machinery , 2016 , Conference Paper)
      Delegating computation, which is applicable to many practical contexts such as cloud computing or pay-TV system, concerns the task where a computationally weak client wants to securely compute a very complex function f on ...
    • An enhanced ensemble deep random vector functional link network for driver fatigue recognition 

      Li, Ruilin; Gao, Ruobin; Yuan, Liqiang; Suganthan, P.N.; Wang, Lipo; ... more authors ( Elsevier , 2023 , Article)
      This work investigated the use of an ensemble deep random vector functional link (edRVFL) network for electroencephalogram (EEG)-based driver fatigue recognition. Against the low feature learning capability of the edRVFL ...
    • An Interactive Visualization Web Solution for Electricity Consumption in Qatar 

      Soliman, Engy; Shalaby, Salma; Fetais, Noora ( Institute of Electrical and Electronics Engineers Inc. , 2017 , Conference Paper)
      The amount of raw data related to electricity companies is increasing rapidly with the increase of construction sites, population and Qatar preparation for 2022 world cup. A question arises from this situation is: How can ...
    • Applying zero trust security principles to defence mechanisms against data exfiltration attacks 

      Egerton, Hugo; Hammoudeh, Mohammad; Unal, Devrim; Adebisi, Bamidele ( wiley , 2021 , Book chapter)
      The zero-trust principle explicitly verifies that the authentication and authorization of all actions are performed regardless of the requesting user's credentials or permissions. This chapter presents the details of a ...
    • Assessing the effects of data selection and representation on the development of reliable E. coli sigma 70 promoter region predictors 

      Abbas, Mostafa M.; Mohie-Eldin, Mostafa M.; El-Manzalawy, Yasser ( Public Library of Science , 2015 , Article)
      As the number of sequenced bacterial genomes increases, the need for rapid and reliable tools for the annotation of functional elements (e.g., transcriptional regulatory elements) becomes more desirable. Promoters are the ...
    • Automated layer-wise solution for ensemble deep randomized feed-forward neural network 

      Hu, Minghui; Gao, Ruobin; Suganthan, Ponnuthurai N.; Tanveer, M. ( Elsevier B.V. , 2022 , Article)
      The randomized feed-forward neural network is a single hidden layer feed-forward neural network that enables efficient learning by optimizing only the output weights. The ensemble deep learning framework significantly ...
    • Automatic generation of optimized workflow for distributed computations on large-scale matrices 

      Sabry, Farida; Erradi, Abdelkarim; Nassar, Mohamed; Malluhi, Qutaibah M. ( Springer Verlag , 2014 , Conference Paper)
      Efficient evaluation of distributed computation on large-scale data is prominent in modern scientific computation; especially analysis of big data, image processing and data mining applications. This problem is particularly ...
    • Automatic variable reduction 

      Song, Aijuan; Wu, Guohua; Suganthan, P. N.; Pedrycz, Witold ( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)
      A variable reduction strategy (VRS) is an effective method to accelerate the optimization process of evolutionary algorithms (EAs) by simplifying the corresponding optimization problems. Unfortunately, the VRS is manually ...
    • Blockchain technology for healthcare: Enhancing shared electronic health record interoperability and integrity 

      Jabbar, Rateb; Fetais, Noora; Krichen, Moez; Barkaoui, Kamel ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      The Electronic Health Records (EHR) sharing system is the state of art for delivering healthcare. The tools within the system can predict outcomes during the patient's lifetime, monitor how effective are treatments, track ...