• English
    • العربية
  • English
  • تسجيل الدخول
  • جامعة قطر
  • مكتبة جامعة قطر
  •  الصفحة الرئيسية
  • الوحدات والمجموعات
  • المساعدة
    • إرسال الأعمال الأكاديمية
    • سياسات الناشر
    • أدلة المستخدم
    • الأسئلة الأكثر تكراراً
  • عن المستودع الرقمي
    • الرؤية والرسالة
تصفح حسب العنوان 
  •   مركز المجموعات الرقمية لجامعة قطر
  • المستودع الرقمي لجامعة قطر
  • أكاديمية
  • مراكز البحث
  • مركز الكندي لبحوث الحوسبة
  • الذكاء المعلوماتي
  • تصفح حسب العنوان
  • مركز المجموعات الرقمية لجامعة قطر
  • المستودع الرقمي لجامعة قطر
  • أكاديمية
  • مراكز البحث
  • مركز الكندي لبحوث الحوسبة
  • الذكاء المعلوماتي
  • تصفح حسب العنوان
  •      
  •  
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    تصفح Information Intelligence حسب العنوان

    • 0-9
    • A
    • B
    • C
    • D
    • E
    • F
    • G
    • H
    • I
    • J
    • K
    • L
    • M
    • N
    • O
    • P
    • Q
    • R
    • S
    • T
    • U
    • V
    • W
    • X
    • Y
    • Z

    فرز حسب:

    طلب:

    النتائج:

    السجلات المعروضة 1 -- 20 من 98

    • العنوان
    • تاريخ الاصدار
    • تاريخ الإرسال
    • تصاعدي
    • تنازلي
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100
      • Thumbnail

        A Domain Specific Language for Secure Outsourcing of Computation to the Cloud 

        Nassar, Mohamed; Erradi, Abdelkarim; Malluhi, Qutaibah M. ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference)
        Secure outsourcing of computation has gained importance with the proliferation of cloud services. However, existing outsourcing protocol specification languages are mainly suitable for secure multi-party computation. They ...
      • Thumbnail

        A model driven framework for secure outsourcing of computation to the cloud 

        Nassar, Mohamed; Erradi, Abdelkarim; Sabry, Farida; Malluhi, Qutaibah M. ( IEEE Computer Society , 2014 , Conference)
        This paper presents a model driven approach to define then coordinate the execution of protocols for secure outsourcing of computation of large datasets in cloud computing environments. First we present our Outsourcing ...
      • Thumbnail

        A new technique for compacting secret key in attribute-based broadcast encryption 

        Canard, Sébastien; Phan, Duong Hieu; Trinh, Viet Cuong ( Springer Verlag , 2016 , Conference)
        Public-key encryption has been generalized to adapt to more and more practical applications. Broadcast encryption, introduced by Fiat and Naor in 1993, aims for applications in pay-TV or satellite transmission and allows ...
      • Thumbnail

        A novel multi-hop body-To-body routing protocol for disaster and emergency networks 

        Ben Arbia, Dhafer; Alam, Muhammad Mahtab; Attia, Rabah; Ben Hamida, Elye ( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference)
        In this paper, a new multi-hop routing protocol (called ORACE-Net) for disaster and emergency networks is proposed. The proposed hierarchical protocol creates an ad-hoc network through body-To-body (B2B) communication ...
      • Thumbnail

        A resource provisioning framework for bioinformatics applications in multi-cloud environments 

        Senturk, Izzet F.; Balakrishnan, P.; Abu-Doleh, Anas; Kaya, Kamer; Malluhi, Qutaibah; Çatalyürek, Ümit V.... more authors ... less authors ( Elsevier , 2018 , Article)
        The significant advancement in Next Generation Sequencing (NGS) have enabled the generation of several gigabytes of raw data in a single sequencing run. This amount of raw data introduces new scalability challenges in ...
      • Thumbnail

        A Service-Oriented Approach for Sensing in the Internet of Things: Intelligent Transportation Systems and Privacy Use Cases 

        Hammoudeh, Mohammad; Epiphaniou, Gregory; Belguith, Sana; Unal, Devrim; Adebisi, Bamidele; Baker, Thar; Kayes, A. S. M.; Watters, Paul... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)
        This paper presents a Sensing-as-a-Service run-time Service Oriented Architecture (SOA), called 3SOA, for the development of Internet of Things (IoT) applications. 3SOA aims to allow interoperability among various IoT ...
      • Thumbnail

        Advanced Deep Learning for Resource Allocation and Security Aware Data Offloading in Industrial Mobile Edge Computing 

        Elgendy, Ibrahim A.; Muthanna, Ammar; Hammoudeh, Mohammad; Shaiba, Hadil; Unal, Devrim; Khayyat, Mashael... more authors ... less authors ( Mary Ann Liebert Inc. , 2021 , Article)
        The Internet of Things (IoT) is permeating our daily lives through continuous environmental monitoring and data collection. The promise of low latency communication, enhanced security, and efficient bandwidth utilization ...
      • Thumbnail

        An efficient instance hiding scheme 

        Malluhi, Qutaibah M.; Shikfa, Abdullatif; Trinh, Viet Cuong ( Association for Computing Machinery , 2016 , Conference)
        Delegating computation, which is applicable to many practical contexts such as cloud computing or pay-TV system, concerns the task where a computationally weak client wants to securely compute a very complex function f on ...
      • Thumbnail

        An enhanced ensemble deep random vector functional link network for driver fatigue recognition 

        Li, Ruilin; Gao, Ruobin; Yuan, Liqiang; Suganthan, P.N.; Wang, Lipo; Sourina, Olga... more authors ... less authors ( Elsevier , 2023 , Article)
        This work investigated the use of an ensemble deep random vector functional link (edRVFL) network for electroencephalogram (EEG)-based driver fatigue recognition. Against the low feature learning capability of the edRVFL ...
      • Thumbnail

        An Interactive Visualization Web Solution for Electricity Consumption in Qatar 

        Soliman, Engy; Shalaby, Salma; Fetais, Noora ( Institute of Electrical and Electronics Engineers Inc. , 2017 , Conference)
        The amount of raw data related to electricity companies is increasing rapidly with the increase of construction sites, population and Qatar preparation for 2022 world cup. A question arises from this situation is: How can ...
      • Thumbnail

        Analysis of Predictive Models for Revealing Household Characteristics using Smart Grid Data 

        Aly, Hussein; Al-Ali, Abdulaziz; Al-Ali, Abdulla; Malluhi, Qutaibah ( IEEE Computer Society , 2023 , Conference)
        The Smart Grid Advanced Metering Infrastructure (AMI) has revolutionized the smart grid network, generating vast amounts of data that can be utilized for diverse objectives, one of which is Household Characteristics ...
      • Thumbnail

        Anonymizing transactional datasets 

        AL Bouna, Becharaa; Clifton, Chrisc; Malluhi, Qutaibah ( IOS Press , 2015 , Article)
        In this paper, we study the privacy breach caused by unsafe correlations in transactional data where individuals have multiple tuples in a dataset. We provide two safety constraints to guarantee safe correlation of the ...
      • Thumbnail

        Applying zero trust security principles to defence mechanisms against data exfiltration attacks 

        Egerton, Hugo; Hammoudeh, Mohammad; Unal, Devrim; Adebisi, Bamidele ( wiley , 2021 , Book chapter)
        The zero-trust principle explicitly verifies that the authentication and authorization of all actions are performed regardless of the requesting user's credentials or permissions. This chapter presents the details of a ...
      • Thumbnail

        Automated layer-wise solution for ensemble deep randomized feed-forward neural network 

        Hu, Minghui; Gao, Ruobin; Suganthan, Ponnuthurai N.; Tanveer, M. ( Elsevier B.V. , 2022 , Article)
        The randomized feed-forward neural network is a single hidden layer feed-forward neural network that enables efficient learning by optimizing only the output weights. The ensemble deep learning framework significantly ...
      • Thumbnail

        Automatic generation of optimized workflow for distributed computations on large-scale matrices 

        Sabry, Farida; Erradi, Abdelkarim; Nassar, Mohamed; Malluhi, Qutaibah M. ( Springer Verlag , 2014 , Conference)
        Efficient evaluation of distributed computation on large-scale data is prominent in modern scientific computation; especially analysis of big data, image processing and data mining applications. This problem is particularly ...
      • Thumbnail

        Battery-Induced Load Hiding and Its Utility Consequences 

        Aly, Hussein; Altamimi, Emran; Al-Ali, Abdulaziz; Al-Ali, Abdulla; Malluhi, Qutaibah ( Institute of Electrical and Electronics Engineers Inc. , 2024 , Conference)
        The introduction of smart grids allows utility providers to collect detailed data about consumers, which can be utilized to enhance grid efficiency and reliability. However, this data collection also raises privacy concerns. ...
      • Thumbnail

        Blockchain technology for healthcare: Enhancing shared electronic health record interoperability and integrity 

        Jabbar, Rateb; Fetais, Noora; Krichen, Moez; Barkaoui, Kamel ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference)
        The Electronic Health Records (EHR) sharing system is the state of art for delivering healthcare. The tools within the system can predict outcomes during the patient's lifetime, monitor how effective are treatments, track ...
      • Thumbnail

        Breath Analysis for the in Vivo Detection of Diabetic Ketoacidosis 

        Shabil Sha, Mizaj; Maurya, Muni Raj; Shafath, Sadiyah; Cabibihan, John-John; Al-Ali, Abdulaziz; Malik, Rayaz A.; Sadasivuni, Kishor Kumar... more authors ... less authors ( American Chemical Society , 2022 , Article)
        Human breath analysis of volatile organic compounds has gained significant attention recently because of its rapid and noninvasive potential to detect various metabolic diseases. The detection of ketones in the breath and ...
      • Thumbnail

        Can immersive type of Virtual Reality bring EMG pattern changes post facial palsy? 

        Qidwai, Uvais; Ajimsha, M. S. ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference)
        The loss of facial expression via facial paralysis is a devastating condition, both functionally and aesthetically. However, given the life-long plasticity of the brain one could assume that recovery could be facilitated ...
      • Thumbnail

        Challenges and Mitigation of Cyber Threat in Automated Vehicle: An Integrated Approach 

        Al Mamun A.; Abdullah Al Mamun M.; Shikfa A. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference)
        The technological development of automated vehicles opens novel cybersecurity threats and risks for road safety. Increased connectivity often results in increased risks of a cyber-security attacks, which is one of the ...

        مركز المجموعات الرقمية لجامعة قطر هو مكتبة رقمية تديرها مكتبة جامعة قطر بدعم من إدارة تقنية المعلومات

        اتصل بنا | ارسل ملاحظاتك
        اتصل بنا | ارسل ملاحظاتك | جامعة قطر

         

         

        الصفحة الرئيسية

        أرسل عملك التابع لجامعة قطر

        تصفح

        محتويات مركز المجموعات الرقمية
          الوحدات والمجموعات تاريخ النشر المؤلف العناوين الموضوع النوع اللغة الناشر
        هذه المجموعة
          تاريخ النشر المؤلف العناوين الموضوع النوع اللغة الناشر

        حسابي

        تسجيل الدخول

        عن المستودع الرقمي

        الرؤية والرسالة

        المساعدة

        إرسال الأعمال الأكاديميةسياسات الناشرأدلة المستخدمالأسئلة الأكثر تكراراً

        مركز المجموعات الرقمية لجامعة قطر هو مكتبة رقمية تديرها مكتبة جامعة قطر بدعم من إدارة تقنية المعلومات

        اتصل بنا | ارسل ملاحظاتك
        اتصل بنا | ارسل ملاحظاتك | جامعة قطر