Now showing items 133-152 of 163

    • SOLD: A node-Splitting algorithm for R-tree based on Objects' Locations Distribution 

      Al-Nsour E.; Sleit A.; Alshraideh M. ( SAGE Publications Ltd , 2019 , Article)
      Spatial data indexing methods are of extreme importance as they massively build up as a result of the explosive growth in capturing data with spatial features. No matter how much the data size is, eventually it will reside ...
    • SpiralSRA: A threat-specific security risk assessment framework for the cloud 

      Nhlabatsi A.; Hong J.B.; Kim D.S.; Fernandez R.; Fetais N.; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
      Conventional security risk assessment approaches for cloud infrastructures do not explicitly consider risk with respect to specific threats. This is a challenge for a cloud provider because it may apply the same risk ...
    • Stateless Security Risk Assessment for Dynamic Networks 

      Hong J.B.; Yusuf S.E.; Kim D.S.; Khan K.M. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
      Emerging networking technologies, such as cloud and Software Defined Networking, provide flexibility, elasticity and functionalities to change the network configurations over time. However, changes also impose unpredictable ...
    • Substring search over encrypted data 

      Shikfa, Abdullatif ( Hamad bin Khalifa University Press (HBKU Press) , 2018 , Conference Paper)
      Our data, be it personal or professional, is increasingly outsourced. This results from the development of cloud computing in the past ten years, a paradigm that shifts computing to a utility. Even without realizing it, ...
    • Survey of Information Visualization Techniques for Enhancing Visual Analysis 

      Fernandez, Rachael; Fetais, Noora ( Institute of Electrical and Electronics Engineers Inc. , 2017 , Conference Paper)
      Visualization of data helps to transform a problem into a perceptual task that is easier to comprehend. It helps users to perceive patterns from large amount of data in order to make informed decisions. When visualization ...
    • Systematic identification of threats in the cloud: A Survey 

      Hong J.B.; Nhlabatsi A.; Kim D.S.; Hussein A.; Fetais N.; ... more authors ( Elsevier B.V. , 2019 , Article)
      When a vulnerability is discovered in a system, some key questions often asked by the security analyst are what threat(s) does it pose, what attacks may exploit it, and which parts of the system it affects. Answers to those ...
    • Takagi–Sugeno fuzzy based power system fault section diagnosis models via genetic learning adaptive GSK algorithm 

      Li, Changsong; Xiong, Guojiang; Fu, Xiaofan; Mohamed, Ali Wagdy; Yuan, Xufeng; ... more authors ( Elsevier B.V. , 2022 , Article)
      To effectively deal with the operating uncertainties of protective relays and circuit breakers existing in the power system faults, an improved fault section diagnosis (FSD) method is proposed by using Takagi–Sugeno fuzzy ...
    • A Testbed Implementation of a Biometric Identity-Based Encryption for IoMT-enabled Healthcare System 

      Aggarwal, Mahima; Zubair, Mohammed; Unal, Devrim; Al-Ali, Abdulla; Reimann, Thomas; ... more authors ( Association for Computing Machinery , 2021 , Conference Paper)
      Historically, health data was stored locally on the hospital's server as patient health records, and we had to rely on the planned check-up during doctor's visits. Now, we can monitor health continuously and in real-time. ...
    • The role of EEG and EMG combined virtual reality gaming system in facial palsy rehabilitation - A case report 

      Qidwai U.; Ajimsha M.S.; Shakir M. ( Churchill Livingstone , 2019 , Article)
      Background The recovery rates for facial palsy are usually excellent; however, regularly patients present with problems with their fine facial movements that affect their emotional expressions. Objective To discover the ...
    • The similarity-aware relational intersect database operator 

      Al Marri, Wadha J.; Malluhi, Qutaibah; Ouzzani, Mourad; Tang, Mingjie; Aref, Walid G. ( Springer International Publishing , 2014 , Conference Paper)
      Identifying similarities in large datasets is an essential operation in many applications such as bioinformatics, pattern recognition, and data integration. To make the underlying database system similarity-aware, the core ...
    • The simultaneous impact of EV charging and PV inverter reactive power on the hosting distribution system's performance: A case study in kuwait 

      Abdullah, Heba M.; Kamel, Rashad M.; Tahir, Anas; Sleit, Azzam; Gastli, Adel ( MDPI AG , 2020 , Article)
      Recently, electric vehicles (EVs) have become an increasingly important topic in the field of sustainable transportation research, alongside distributed generation, reactive power compensation, charging optimization, and ...
    • Threat-specific security risk evaluation in the cloud 

      Nhlabatsi, Armstrong; Hong, Jin B.; Kim, Dong Seong; Fernandez, Rachael; Hussein, Alaa; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)
      Existing security risk evaluation approaches (e.g., asset-based) do not consider specific security requirements of individual cloud computing clients in the security risk evaluation. In this paper, we propose a threat-specific ...
    • ThreatRiskEvaluator: A Tool for Assessing Threat-Specific Security Risks in the Cloud 

      Nhlabatsi A.; Hussein A.; Fernandez R.; Fetais N.; Hong J.; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)
      In cloud computing, security risks posed to individual clients are different based on their specific security requirements. In current practice, cloud providers usually apply generic protection mechanisms that may not be ...
    • Time Series Forecasting Using Online Performance-based Ensemble Deep Random Vector Functional Link Neural Network 

      Du, Liang; Gao, Ruobin; Suganthan, Ponnuthurai Nagaratnam; Wang, David Z.W. ( Institute of Electrical and Electronics Engineers Inc. , 2022 , Conference Paper)
      Time series forecasting remains a challenging task in data science while it is of great relevance to decision-making in various industries such as transportation, finance, electricity resource management, meteorology. ...
    • Towards robust autonomous driving systems through adversarial test set generation 

      Unal, Devrim; Catak, Ferhat Ozgur; Houkan, Mohammad Talal; Mudassir, Mohammed; Hammoudeh, Mohammad ( ISA - Instrumentation, Systems, and Automation Society , 2023 , Article)
      Correct environmental perception of objects on the road is vital for the safety of autonomous driving. Making appropriate decisions by the autonomous driving algorithm could be hindered by data perturbations and more ...
    • Traffic Analysis Attacks on Tor: A Survey 

      Basyoni L.; Fetais N.; Erbad A.; Mohamed A.; Guizani M. ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      The Tor anonymity network is one of the most popular and widely used tools to protect the privacy of online users. Tor provides defenses against multiple adversarial activities aiming to identify or trace the users. Traffic ...
    • Using block cipher for confidentiality of images in cloud-based systems 

      Rihan, Rana Adnan; Khan, Khaled M. ( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)
      This paper deals with outsourcing of computing to cloud servers where clients' images are computed and stored. It proposes a technique that obfuscates images before sending them to servers. Cloud servers can perform ...
    • Using Sparse Matrices to Prevent Information Leakage in Cloud Computing 

      Khan K.; Shaheen M.; Wang Y. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
      Cloud computing represents the promise of outsourcing of scientific computing such as matrix multiplication. However, this can introduce new vulnerabilities such as information leakage. Cloud server intentionally or ...
    • Using the Sadakane compressed suffix tree to solve the all-pairs suffix-prefix problem 

      Rachid, Maan Haj; Malluhi, Qutaibah; Abouelhoda, Mohamed ( Hindawi , 2014 , Article)
      The all-pairs suffix-prefix matching problem is a basic problem in string processing. It has an application in the de novo genome assembly task, which is one of the major bioinformatics problems. Due to the large size of ...
    • Using thermochromic ink for medical simulations 

      Alsalemi, Abdullah; Aldisi, Mohammed; Alhomsi, Yahya; Ahmed, Ibrahim; Bensaali, Faycal; ... more authors ( Hamad bin Khalifa University Press (HBKU Press) , 2017 , Article)
      Background: In medical simulation and training, blood is used to exhibit its different behaviors in context. In some cases, blood color differential is an imperative visual effect to ensure high-fidelity training and ...