• Design and Implementation of a Threat-Specific Security Risk Assessment Tool 

      Nhlabatsi, Armstrong; Hussein, Alaa; Fetais, Noora; Khan, Khaled M. ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      Security threats posed to individual cloud computing clients vary depending on their specific security requirements. However, Cloud Providers apply generic security risk assessment approaches which result do not consider ...
    • Detection of partial seizure: An application of fuzzy rule system for wearable ambulatory systems 

      Shakir, Mohamed; Malik, Aamir Saeed; Kamel, Nidal; Qidwai, Uvais ( IEEE , 2014 , Conference Paper)
      Electroencephalography (EEG) plays an intelligent role, especially EEG based health diagnosis of brain disorder, as well as brain-computer interface (BCI) applications. One such research field is related to epilepsy. The ...
    • Distributed interference management using Q-Learning in cognitive femtocell networks: New USRP-based implementation 

      Elsayed M.H.M.; Mohamed A. ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)
      Femtocell networks have become a promising solution in supporting high data rates for 5G systems, where cell densification is performed using the small femtocells. However, femtocell networks have many challenges. One of ...
    • DQN based Blockchain Data Storage in Resource-constrained IoT System 

      Lei, Boyi; Zhou, Jianhong; Ma, Maode; Niu, Xianhua ( Institute of Electrical and Electronics Engineers Inc. , 2023 , Conference Paper)
      Applying blockchain technology in the Internet of Things (IoT) systems to realize massive data storage is a promising technology, which can eliminate the dependence of IoT on central servers and protect data security ...
    • Empirical performance evaluation of QUIC protocol for Tor anonymity network 

      Basyoni, Lamiaa; Erbad, Aiman; Alsabah, Mashael; Fetais, Noora; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)
      Tor's anonymity network is one of the most widely used anonymity networks online, it consists of thousands of routers run by volunteers. Tor preserves the anonymity of its users by relaying the traffic through a number of ...
    • Empowering users of cloud computing on data confidentiality 

      Khan, Khaled M.; Shaheen, Mahboob ( IEEE , 2014 , Conference Paper)
      Cloud networking is an integral part of interconnected data centres operated in cloud environment. Cloud users heavily rely on cloud networking to transmit to and receive data from data centres. In this context, we explore ...
    • An Enhanced Multi-Phase Stochastic Differential Evolution Framework for Numerical Optimization 

      Abdel-Nabi, Heba; Ali, Mostafa; Daoud, Mohammad; Alazrai, Rami; Awajan, Arafat; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2022 , Conference Paper)
      Real-life problems can be expressed as optimization problems. These problems pose a challenge for researchers to design efficient algorithms that are capable of finding optimal solutions with the least budget. Stochastic ...
    • Evaluation of Loss Functions for Segmentation of Corneal Nerves 

      Salahuddin, Tooba; Qidwai, Uvais ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)
      Corneal confocal microscopy (CCM) has been advocated as a non-invasive technique for objective diagnosis of very early neuropathy in patients by scanning the corneal subbasal nerve plexus. The obtained images provide a ...
    • Exploration of Carbonate Aggregates in Road Construction using Ultrasonic and Artificial Intelligence Approaches 

      Abdelhedi, Mohamed; Jabbar, Rateb; Abbes, Chedly ( Qatar University Press , 2023 , Conference Paper)
      The COVID-19 pandemic has significantly impacted the construction sector, which is highly sensitive to economic cycles. In order to boost value and efficiency in this sector, the use of innovative exploration technologies ...
    • A formal model-based testing framework for validating an IoT solution for blockchain-based vehicles communication 

      Jabbar, Rateb; Krichen, Moez; Kharbeche, Mohamed; Fetais, Noora; Barkaoui, Kamel ( SciTePress , 2020 , Conference Paper)
      The emergence of embedded and connected smart technologies, systems, and devices has enabled the concept of smart cities by connecting every "thing" to the Internet and in particular in transportation through the Internet ...
    • Framework for Visualizing Browsing Patterns Captured in Computer Logs 

      Fetais, Noora and Fernandez, Rachael ( Hamad bin Khalifa University Press (HBKU Press) , 2018 , Conference Paper)
      Research ProblemAn Intrusion Detection System (IDS) is used for preventing security breaches by monitoring and analyzing the data recorded in log files. An IDS analyst is responsible for detecting intrusions in a system ...
    • Green operator cooperation for radio frequency transmission minimization 

      Amamou, Lamis; Boujelben, Maissa; Ghazzai, Hakim; Bouallegue, Ammar; Besbes, Hichem ( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)
      The increasing demand for reliable mobile services with faster communications speed requires high capital investment in the radio access networks. This leads to enormous energy consumption, high operational costs (OPEX), ...
    • Group owner election in Wi-Fi direct 

      Khan, Muhammad Asif; Cherif, Wael; Filali, Fethi ( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)
      Wi-Fi Direct is a new protocol that standardizes the direct communication between Wi-Fi enabled mobile devices without requiring an access point. The specification proposes enhanced peer-to-peer functions to be supported ...
    • Image stitching system with scanning microscopy for histopathological applications 

      Qidwai, Uvais; Akbar, Muhammad Ali ( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)
      Histopathological analysis of biopsy or surgical specimen is a common clinical practice for diagnostic purposes. Essentially, the process involves slicing the biopsy or surgical sample into very thin slices, placing them ...
    • Image Stitching System With Scanning Microscopy for Histopathological Applications 

      Akbar, Muhammad Ali ( Hamad bin Khalifa University Press (HBKU Press) , 2018 , Conference Paper)
      Histopathological analysis of biopsy or surgical specimen is a common clinical practice for diagnostic purposes. Essentially, the process involves slicing the biopsy or surgical sample into very thin slices, placing them ...
    • Intelligent Fuzzy Classifier for pre-seizure detection from real epileptic data 

      Shakir, Mohamed; Malik, Aamir Saeed; Kamel, Nidal; Qidwai, Uvais ( Institute of Electrical and Electronics Engineers Inc. , 2014 , Conference Paper)
      In this paper, a classification method is presented using an Fuzzy Inference Engine to detect the incidences of pre-seizures in real/raw Epilepsy data. The system distinguishes between 'Normal', 'Pre-Seizure' and 'Seizure' ...
    • Minimum Variance Embedded Random Vector Functional Link Network with Privileged Information 

      Ganaie, M. A.; Tanveer, M.; Malik, A. K.; Suganthan, P. N. ( Institute of Electrical and Electronics Engineers Inc. , 2022 , Conference Paper)
      A teacher in a school plays significant role in classroom while teaching the students. Similarly, learning via privileged information (LUPI) gives extra information generated by a teacher to 'teach' the learning algorithm ...
    • Monitoring DVT cuffs for long-term operation: A fuzzy approach 

      Qidwai, Uvais; Kamran, Saadat; Al-Sulaiti, Sara; Ahmed, Ghadeer; Hegazy, Asmaa ( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)
      Stroke patients, as well as all those patients who are bed-bound for a long period of time are highly susceptible to deep vein thrombosis (DVT) as secondary complexity. DVT poses more dangers of a loose blood clot obstructing ...
    • Multi-Objective Security Hardening Optimisation for Dynamic Networks 

      Enoch S.Y.; Hong J.B.; Ge M.; Khan K.M.; Kim D.S. ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)
      Hardening the dynamic networks is a very challenging task due to their complexity and dynamicity. Moreover, there may be multi-objectives to satisfy, while containing the solutions within the constraints (e.g., fixed budget, ...
    • Optimal sizing of a stand-alone hybrid PV-WT-BT system using artificial intelligence based technique 

      Hussain, Shahbaz; Alammari, Rashid; Iqbal, Atif; Shikfa, Abdullatif ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      Nowadays, conventional energy system is being replaced by renewable energy system. Especially, PV systems and wind energy systems are gaining much attention due to their future sustainability and eco-friendly nature. ...