Now showing items 120-139 of 140

    • Takagi–Sugeno fuzzy based power system fault section diagnosis models via genetic learning adaptive GSK algorithm 

      Li, Changsong; Xiong, Guojiang; Fu, Xiaofan; Mohamed, Ali Wagdy; Yuan, Xufeng; ... more authors ( Elsevier B.V. , 2022 , Article)
      To effectively deal with the operating uncertainties of protective relays and circuit breakers existing in the power system faults, an improved fault section diagnosis (FSD) method is proposed by using Takagi–Sugeno fuzzy ...
    • The role of EEG and EMG combined virtual reality gaming system in facial palsy rehabilitation - A case report 

      Qidwai U.; Ajimsha M.S.; Shakir M. ( Churchill Livingstone , 2019 , Article)
      Background The recovery rates for facial palsy are usually excellent; however, regularly patients present with problems with their fine facial movements that affect their emotional expressions. Objective To discover the ...
    • The similarity-aware relational intersect database operator 

      Al Marri, Wadha J.; Malluhi, Qutaibah; Ouzzani, Mourad; Tang, Mingjie; Aref, Walid G. ( Springer International Publishing , 2014 , Conference Paper)
      Identifying similarities in large datasets is an essential operation in many applications such as bioinformatics, pattern recognition, and data integration. To make the underlying database system similarity-aware, the core ...
    • The simultaneous impact of EV charging and PV inverter reactive power on the hosting distribution system's performance: A case study in kuwait 

      Abdullah, Heba M.; Kamel, Rashad M.; Tahir, Anas; Sleit, Azzam; Gastli, Adel ( MDPI AG , 2020 , Article)
      Recently, electric vehicles (EVs) have become an increasingly important topic in the field of sustainable transportation research, alongside distributed generation, reactive power compensation, charging optimization, and ...
    • Threat-specific security risk evaluation in the cloud 

      Nhlabatsi, Armstrong; Hong, Jin B.; Kim, Dong Seong; Fernandez, Rachael; Hussein, Alaa; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)
      Existing security risk evaluation approaches (e.g., asset-based) do not consider specific security requirements of individual cloud computing clients in the security risk evaluation. In this paper, we propose a threat-specific ...
    • ThreatRiskEvaluator: A Tool for Assessing Threat-Specific Security Risks in the Cloud 

      Nhlabatsi A.; Hussein A.; Fernandez R.; Fetais N.; Hong J.; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)
      In cloud computing, security risks posed to individual clients are different based on their specific security requirements. In current practice, cloud providers usually apply generic protection mechanisms that may not be ...
    • Time Series Forecasting Using Online Performance-based Ensemble Deep Random Vector Functional Link Neural Network 

      Du, Liang; Gao, Ruobin; Suganthan, Ponnuthurai Nagaratnam; Wang, David Z.W. ( Institute of Electrical and Electronics Engineers Inc. , 2022 , Conference Paper)
      Time series forecasting remains a challenging task in data science while it is of great relevance to decision-making in various industries such as transportation, finance, electricity resource management, meteorology. ...
    • Traffic Analysis Attacks on Tor: A Survey 

      Basyoni L.; Fetais N.; Erbad A.; Mohamed A.; Guizani M. ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      The Tor anonymity network is one of the most popular and widely used tools to protect the privacy of online users. Tor provides defenses against multiple adversarial activities aiming to identify or trace the users. Traffic ...
    • Using block cipher for confidentiality of images in cloud-based systems 

      Rihan, Rana Adnan; Khan, Khaled M. ( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)
      This paper deals with outsourcing of computing to cloud servers where clients' images are computed and stored. It proposes a technique that obfuscates images before sending them to servers. Cloud servers can perform ...
    • Using Sparse Matrices to Prevent Information Leakage in Cloud Computing 

      Khan K.; Shaheen M.; Wang Y. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
      Cloud computing represents the promise of outsourcing of scientific computing such as matrix multiplication. However, this can introduce new vulnerabilities such as information leakage. Cloud server intentionally or ...
    • Using the Sadakane compressed suffix tree to solve the all-pairs suffix-prefix problem 

      Rachid, Maan Haj; Malluhi, Qutaibah; Abouelhoda, Mohamed ( Hindawi , 2014 , Article)
      The all-pairs suffix-prefix matching problem is a basic problem in string processing. It has an application in the de novo genome assembly task, which is one of the major bioinformatics problems. Due to the large size of ...
    • Using thermochromic ink for medical simulations 

      Alsalemi, Abdullah; Aldisi, Mohammed; Alhomsi, Yahya; Ahmed, Ibrahim; Bensaali, Faycal; ... more authors ( Hamad bin Khalifa University Press (HBKU Press) , 2017 , Article)
      Background: In medical simulation and training, blood is used to exhibit its different behaviors in context. In some cases, blood color differential is an imperative visual effect to ensure high-fidelity training and ...
    • Virtual Reality Falconry: Simulation of a Traditional Qatari Sport Methodology and Techniques 

      Kharbach S.; Ahmad S.S.; Haj Ahmed N.M.; Fetais N. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
      This paper talks about the process of developing a game called 'Virtual Reality Falconry'. The game is a simulation of the traditional Qatari hunting sport. Falconry refers to the process of hunting wild preys in their ...
    • Virtual reality for ambulance simulation environment 

      Halabi, O.; Salahuddin, T.; Karkar, A.G.; Alinier, G. ( Springer , 2022 , Article)
      Simulations are beneficial in evaluating clinicians' empirical competencies through practical skills, prioritizing, and decision-making as part of patient care scenarios generally run in a full-scale physical context. ...
    • Virtual Reality Game for Falconry 

      Fetais, Noora; Lotfi Kharbach, Sarah; Ahmad, Nour Moslem Haj; Ahmad, Salma Salah ( Hamad bin Khalifa University Press (HBKU Press) , 2018 , Conference Paper)
      Traditions and culture play a major role in our society, as they are the source of a person's pride and honor. One of Qatar's National Vision 2030 pillars that relates to the social development aims at preserving Qatar's ...
    • Virtual Reality Glove for Falconry 

      Al-Hathal T.; Fetais N. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
      This project is a virtual reality based game. Basically it's about hunting pray-using different types of falcons. And the main idea behind this project is to give more knowledge to the player about a cultural game in more ...
    • Visualization as a mean of big data management: Using Qatar's electricity consumption data 

      Soliman E.; Fetais N. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
      Visualization as a mean of big data management is the new century revolution. Managing data has become a great challenge today, as the amount of raw data size is increasing rapidly. For data like electricity consumption, ...
    • A Voting-Mechanism-Based Ensemble Framework for Constraint Handling Techniques 

      Wu, Guohua; Wen, Xupeng; Wang, Ling; Pedrycz, Witold; Suganthan, Ponnuthurai Nagaratnam ( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)
      Effective constraint handling techniques (CHTs) are of great significance for evolutionary algorithms (EAs) dealing with constrained optimization problems (COPs). To date, many CHTs, such as penalty function, superiority ...
    • Watermarking: A review of software and hardware techniques 

      Sleit, Azzam; Fetais, Noora ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
      Watermarking is a well-known technique traditionally used in banknotes and other documents to discourage counterfeiting. It usually consists of semi-transparent symbols embedded on paper. Similar concepts were applied to ...
    • Weighting and pruning based ensemble deep random vector functional link network for tabular data classification 

      Shi, Qiushi; Hu, Minghui; Suganthan, Ponnuthurai Nagaratnam; Katuwal, Rakesh ( Elsevier Ltd , 2022 , Article)
      In this paper, we first integrate normalization to the Ensemble Deep Random Vector Functional Link network (edRVFL). This re-normalization step can help the network avoid divergence of the hidden features. Then, we propose ...