Information Intelligence
Recent Submissions
-
Substring search over encrypted data
( Hamad bin Khalifa University Press (HBKU Press) , 2018 , Conference Paper)Our data, be it personal or professional, is increasingly outsourced. This results from the development of cloud computing in the past ten years, a paradigm that shifts computing to a utility. Even without realizing it, ... -
Framework for Visualizing Browsing Patterns Captured in Computer Logs
( Hamad bin Khalifa University Press (HBKU Press) , 2018 , Conference Paper)Research ProblemAn Intrusion Detection System (IDS) is used for preventing security breaches by monitoring and analyzing the data recorded in log files. An IDS analyst is responsible for detecting intrusions in a system ... -
Distributed interference management using Q-Learning in cognitive femtocell networks: New USRP-based implementation
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)Femtocell networks have become a promising solution in supporting high data rates for 5G systems, where cell densification is performed using the small femtocells. However, femtocell networks have many challenges. One of ... -
Traffic Analysis Attacks on Tor: A Survey
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)The Tor anonymity network is one of the most popular and widely used tools to protect the privacy of online users. Tor provides defenses against multiple adversarial activities aiming to identify or trace the users. Traffic ... -
Optimizing Energy-Distortion Trade-off for Vital Signs Delivery in Mobile Health Applications
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)Healthcare is considered a top priority worldwide, considering the swift increase in the number of chronic patients who require continuous monitoring. This motivates the researchers to develop scalable remote health ... -
Proportionally fair approach for tor's circuits scheduling
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)The number of users adopting Tor to protect their online privacy is increasing rapidly. With a limited number of volunteered relays in the network, the number of clients' connections sharing the same relays is increasing ... -
QuicTor: Enhancing Tor for Real-Time Communication Using QUIC Transport Protocol
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)In the past decades, the internet has emerged as the fastest way to access information. However, this revolutionary information age comes with its own set of challenges. The privacy of Internet users is at increasing risk ... -
Fuzzy Identification-Based Encryption for healthcare user face authentication
( Hamad bin Khalifa University Press (HBKU Press) , 2022 , Article)Background: Internet of Medical Things (IOMT) has the potential to monitor health continuously and in real-time. One of the main issues that arise in IOMT is how securely the data can be transmitted to the clinical team. ... -
Optimal sizing of a stand-alone hybrid PV-WT-BT system using artificial intelligence based technique
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)Nowadays, conventional energy system is being replaced by renewable energy system. Especially, PV systems and wind energy systems are gaining much attention due to their future sustainability and eco-friendly nature. ... -
Cybersecurity for next generation healthcare in Qatar
( Hamad bin Khalifa University Press (HBKU Press) , 2021 , Article)Background: IoMT (Internet of Medical Things) devices (often referred to IoMT domain) have the potential to quickly diagnose and monitor patients outside the hospital by transmitting information through the cloud domain ... -
Design and implementation of a modular ECMO simulator
( Hamad bin Khalifa University Press (HBKU Press) , 2016 , Article)Background: Extracorporeal membrane oxygenation (ECMO) is a high-complexity life-saving procedure riddled with mechanical complications that can place the patient in a critical state where fast and coordinated actions are ... -
Using thermochromic ink for medical simulations
( Hamad bin Khalifa University Press (HBKU Press) , 2017 , Article)Background: In medical simulation and training, blood is used to exhibit its different behaviors in context. In some cases, blood color differential is an imperative visual effect to ensure high-fidelity training and ... -
Real-Time Scheduling for Electric Vehicles Charging/Discharging Using Reinforcement Learning
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)With the increase in Electric Vehicles (EVs) penetration, their charging needs form an additional burden on the grid. Thus, charging coordination is necessary for safe and efficient EV use. The scheduling of EVs is especially ... -
Breath Analysis for the in Vivo Detection of Diabetic Ketoacidosis
( American Chemical Society , 2022 , Article)Human breath analysis of volatile organic compounds has gained significant attention recently because of its rapid and noninvasive potential to detect various metabolic diseases. The detection of ketones in the breath and ... -
Virtual Reality Game for Falconry
( Hamad bin Khalifa University Press (HBKU Press) , 2018 , Conference paper)Traditions and culture play a major role in our society, as they are the source of a person's pride and honor. One of Qatar's National Vision 2030 pillars that relates to the social development aims at preserving Qatar's ... -
Image Stitching System With Scanning Microscopy for Histopathological Applications
( Hamad bin Khalifa University Press (HBKU Press) , 2018 , Conference Paper)Histopathological analysis of biopsy or surgical specimen is a common clinical practice for diagnostic purposes. Essentially, the process involves slicing the biopsy or surgical sample into very thin slices, placing them ... -
SLiFi: Exploiting Visible Light Communication VLC to Authenticate WiFi Access Points
( Hamad bin Khalifa University Press (HBKU Press) , 2018 , Conference Paper)This work presents an effective and efficient solution (SLiFi) to the evil twin attack in wireless networks. The evil twin is a rogue Wifi Access Point (AP) that pretends to be an authentic one by using the same network ... -
A new technique for compacting secret key in attribute-based broadcast encryption
( Springer Verlag , 2016 , Conference Paper)Public-key encryption has been generalized to adapt to more and more practical applications. Broadcast encryption, introduced by Fiat and Naor in 1993, aims for applications in pay-TV or satellite transmission and allows ... -
MLP Neural Network Based Gas Classification System on Zynq SoC
( Institute of Electrical and Electronics Engineers Inc. , 2016 , Article)Systems based on wireless gas sensor networks offer a powerful tool to observe and analyze data in complex environments over long monitoring periods. Since the reliability of sensors is very important in those systems, gas ... -
Real-time robotic avatar control using fuzzy gaze-classification for people with disability
( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)Robotic control with gaze-classification has been an area of interest for quite some time. In this paper, a novel solution of implementing sensing system with intelligent visualization has been presented. Such a system can ...