• Image stitching system with scanning microscopy for histopathological applications 

      Qidwai, Uvais; Akbar, Muhammad Ali ( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)
      Histopathological analysis of biopsy or surgical specimen is a common clinical practice for diagnostic purposes. Essentially, the process involves slicing the biopsy or surgical sample into very thin slices, placing them ...
    • MLP Neural Network Based Gas Classification System on Zynq SoC 

      Zhai, Xiaojun; Ali, Amine Ait Si; Amira, Abbes; Bensaali, Faycal ( Institute of Electrical and Electronics Engineers Inc. , 2016 , Article)
      Systems based on wireless gas sensor networks offer a powerful tool to observe and analyze data in complex environments over long monitoring periods. Since the reliability of sensors is very important in those systems, gas ...
    • Monitoring DVT cuffs for long-term operation: A fuzzy approach 

      Qidwai, Uvais; Kamran, Saadat; Al-Sulaiti, Sara; Ahmed, Ghadeer; Hegazy, Asmaa ( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)
      Stroke patients, as well as all those patients who are bed-bound for a long period of time are highly susceptible to deep vein thrombosis (DVT) as secondary complexity. DVT poses more dangers of a loose blood clot obstructing ...
    • Multi-Objective Security Hardening Optimisation for Dynamic Networks 

      Enoch S.Y.; Hong J.B.; Ge M.; Khan K.M.; Kim D.S. ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)
      Hardening the dynamic networks is a very challenging task due to their complexity and dynamicity. Moreover, there may be multi-objectives to satisfy, while containing the solutions within the constraints (e.g., fixed budget, ...
    • Parallelizing exact motif finding algorithms on multi-core 

      Abbas, Mostafa M.; Bahig, Hazem M.; Abouelhoda, Mohamed; Mohie-Eldin, M.M. ( Springer Science+Business Media , 2014 , Article)
      The motif finding problem is one of the important and challenging problems in bioinformatics. A variety of sequential algorithms have been proposed to find exact motifs, but the running time is still not suitable due to ...
    • Prediction of infarction volume and infarction growth rate in acute ischemic stroke 

      Kamran, Saadat; Akhtar, Naveed; Alboudi, Ayman; Kamran, Kainat; Ahmad, Arsalan; ... more authors ( Nature Publishing Group , 2017 , Article)
      The prediction of infarction volume after stroke onset depends on the shape of the growth dynamics of the infarction. To understand growth patterns that predict lesion volume changes, we studied currently available models ...
    • Real-time robotic avatar control using fuzzy gaze-classification for people with disability 

      Qidwai, Uvais; Shakir, Mohamed; Bahameish, Mariam ( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)
      Robotic control with gaze-classification has been an area of interest for quite some time. In this paper, a novel solution of implementing sensing system with intelligent visualization has been presented. Such a system can ...
    • Reasoning about Policies in Security-Aware Service Discovery Using Answer Set Programming 

      Asuncion, Vernon; Khan, Khaled M.; Erradi, Abdelkarim; Alhazbi, Saleh ( World Scientific Publishing Co. Pte Ltd , 2016 , Article)
      In order to enable a secure interaction between dynamically discovered software services and the client's application in a cooperative information system such as service oriented system, one of the pre-requisites is the ...
    • Robotic probe positioning system for structural health monitoring 

      Qidwai U.; Ijaz A.; Akbar A. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
      Structural health Monitoring (SHM) is a very critical component for sustainable civil and mechanical structures in modern urban settings. The sky-scrappers and huge bridges in modern metropolis today are essential aspects ...
    • Role updating in information systems using model checking 

      Hu, Jinwei; Khan, Khaled M.; Zhang, Yan; Bai, Yun; Li, Ruixuan ( Springer London , 2017 , Article)
      The role-based access control (RBAC) has significantly simplified the management of users and permissions in information systems. In dynamic environments, systems are constantly undergoing changes, and accordingly, the ...
    • Short survey of techniques for visualizing events recorded in logs 

      Fernandez R.; Fetais N. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
      Nowadays, data is being generated in large volumes and the users are left with a staggering amount of textual data that needs to be transformed into information to derive some knowledge from it. However, transforming and ...
    • Smart Grid Cybersecurity: Standards and Technical Countermeasures 

      Hussain S.; Meraj M.; Abughalwa M.; Shikfa A. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
      Cybersecurity in smart grids is of critical importance given the heavy reliance of modern societies on electricity and the recent cyberattacks that resulted in blackouts. The evolution of the legacy electric grid to a ...
    • SOLD: A node-Splitting algorithm for R-tree based on Objects' Locations Distribution 

      Al-Nsour E.; Sleit A.; Alshraideh M. ( SAGE Publications Ltd , 2019 , Article)
      Spatial data indexing methods are of extreme importance as they massively build up as a result of the explosive growth in capturing data with spatial features. No matter how much the data size is, eventually it will reside ...
    • SpiralSRA: A threat-specific security risk assessment framework for the cloud 

      Nhlabatsi A.; Hong J.B.; Kim D.S.; Fernandez R.; Fetais N.; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
      Conventional security risk assessment approaches for cloud infrastructures do not explicitly consider risk with respect to specific threats. This is a challenge for a cloud provider because it may apply the same risk ...
    • Stateless Security Risk Assessment for Dynamic Networks 

      Hong J.B.; Yusuf S.E.; Kim D.S.; Khan K.M. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
      Emerging networking technologies, such as cloud and Software Defined Networking, provide flexibility, elasticity and functionalities to change the network configurations over time. However, changes also impose unpredictable ...
    • Survey of Information Visualization Techniques for Enhancing Visual Analysis 

      Fernandez, Rachael; Fetais, Noora ( Institute of Electrical and Electronics Engineers Inc. , 2017 , Conference Paper)
      Visualization of data helps to transform a problem into a perceptual task that is easier to comprehend. It helps users to perceive patterns from large amount of data in order to make informed decisions. When visualization ...
    • Systematic identification of threats in the cloud: A Survey 

      Hong J.B.; Nhlabatsi A.; Kim D.S.; Hussein A.; Fetais N.; ... more authors ( Elsevier B.V. , 2019 , Article)
      When a vulnerability is discovered in a system, some key questions often asked by the security analyst are what threat(s) does it pose, what attacks may exploit it, and which parts of the system it affects. Answers to those ...
    • The role of EEG and EMG combined virtual reality gaming system in facial palsy rehabilitation - A case report 

      Qidwai U.; Ajimsha M.S.; Shakir M. ( Churchill Livingstone , 2019 , Article)
      Background The recovery rates for facial palsy are usually excellent; however, regularly patients present with problems with their fine facial movements that affect their emotional expressions. Objective To discover the ...
    • Virtual Reality Falconry: Simulation of a Traditional Qatari Sport Methodology and Techniques 

      Kharbach S.; Ahmad S.S.; Haj Ahmed N.M.; Fetais N. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
      This paper talks about the process of developing a game called 'Virtual Reality Falconry'. The game is a simulation of the traditional Qatari hunting sport. Falconry refers to the process of hunting wild preys in their ...
    • Virtual Reality Glove for Falconry 

      Al-Hathal T.; Fetais N. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
      This project is a virtual reality based game. Basically it's about hunting pray-using different types of falcons. And the main idea behind this project is to give more knowledge to the player about a cultural game in more ...