• ECG encryption and identification based security solution on the Zynq SoC for connected health systems 

      Zhai, Xiaojun; Ait Si Ali, Amine; Amira, Abbes; Bensaali, Faycal ( Academic Press Inc. , 2017 , Article)
      Connected health is a technology that associates medical devices, security devices and communication technologies. It enables patients to be monitored and treated remotely from their home. Patients' data and medical records ...
    • An Interactive Visualization Web Solution for Electricity Consumption in Qatar 

      Soliman, Engy; Shalaby, Salma; Fetais, Noora ( Institute of Electrical and Electronics Engineers Inc. , 2017 , Conference Paper)
      The amount of raw data related to electricity companies is increasing rapidly with the increase of construction sites, population and Qatar preparation for 2022 world cup. A question arises from this situation is: How can ...
    • Survey of Information Visualization Techniques for Enhancing Visual Analysis 

      Fernandez, Rachael; Fetais, Noora ( Institute of Electrical and Electronics Engineers Inc. , 2017 , Conference Paper)
      Visualization of data helps to transform a problem into a perceptual task that is easier to comprehend. It helps users to perceive patterns from large amount of data in order to make informed decisions. When visualization ...
    • Role updating in information systems using model checking 

      Hu, Jinwei; Khan, Khaled M.; Zhang, Yan; Bai, Yun; Li, Ruixuan ( Springer London , 2017 , Article)
      The role-based access control (RBAC) has significantly simplified the management of users and permissions in information systems. In dynamic environments, systems are constantly undergoing changes, and accordingly, the ...
    • Data confidentiality in cloud-based pervasive system 

      Khan, Khaled M.; Shaheen, Mahboob; Wang, Yongge ( Association for Computing Machinery , 2017 , Conference Paper)
      Data confidentiality and privacy is a serious concern in pervasive systems where cloud computing is used to process huge amount of data such as matrix multiplications typically used in HPC. Due to limited processing ...
    • Prediction of infarction volume and infarction growth rate in acute ischemic stroke 

      Kamran, Saadat; Akhtar, Naveed; Alboudi, Ayman; Kamran, Kainat; Ahmad, Arsalan; ... more authors ( Nature Publishing Group , 2017 , Article)
      The prediction of infarction volume after stroke onset depends on the shape of the growth dynamics of the infarction. To understand growth patterns that predict lesion volume changes, we studied currently available models ...
    • Using thermochromic ink for medical simulations 

      Alsalemi, Abdullah; Aldisi, Mohammed; Alhomsi, Yahya; Ahmed, Ibrahim; Bensaali, Faycal; ... more authors ( Hamad bin Khalifa University Press (HBKU Press) , 2017 , Article)
      Background: In medical simulation and training, blood is used to exhibit its different behaviors in context. In some cases, blood color differential is an imperative visual effect to ensure high-fidelity training and ...
    • Enabling broadcast communications in presence of jamming via probabilistic pairing 

      Pietro, Roberto Di; Oligeri, Gabriele ( Elsevier B.V. , 2017 , Article)
      This paper presents a thorough analysis of Freedom of Speech (FoS): a lightweight, fully distributed, and probabilistic protocol that assures the delivery of a message to be broadcast notwithstanding the presence of a ...
    • Compressive sensing based electronic nose platform 

      Djelouat, Hamza; Ait Si Ali, Amine; Amira, Abbes; Bensaali, Faycal ( Elsevier , 2017 , Article)
      Electronic nose (EN) systems play a significant role for gas monitoring and identification in gas plants. Using an EN system which consists of an array of sensors provides a high performance. Nevertheless, this performance ...
    • Robotic probe positioning system for structural health monitoring 

      Qidwai U.; Ijaz A.; Akbar A. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
      Structural health Monitoring (SHM) is a very critical component for sustainable civil and mechanical structures in modern urban settings. The sky-scrappers and huge bridges in modern metropolis today are essential aspects ...
    • Challenges and Mitigation of Cyber Threat in Automated Vehicle: An Integrated Approach 

      Al Mamun A.; Abdullah Al Mamun M.; Shikfa A. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
      The technological development of automated vehicles opens novel cybersecurity threats and risks for road safety. Increased connectivity often results in increased risks of a cyber-security attacks, which is one of the ...
    • SpiralSRA: A threat-specific security risk assessment framework for the cloud 

      Nhlabatsi A.; Hong J.B.; Kim D.S.; Fernandez R.; Fetais N.; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
      Conventional security risk assessment approaches for cloud infrastructures do not explicitly consider risk with respect to specific threats. This is a challenge for a cloud provider because it may apply the same risk ...
    • Visualization as a mean of big data management: Using Qatar's electricity consumption data 

      Soliman E.; Fetais N. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
      Visualization as a mean of big data management is the new century revolution. Managing data has become a great challenge today, as the amount of raw data size is increasing rapidly. For data like electricity consumption, ...
    • Stateless Security Risk Assessment for Dynamic Networks 

      Hong J.B.; Yusuf S.E.; Kim D.S.; Khan K.M. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
      Emerging networking technologies, such as cloud and Software Defined Networking, provide flexibility, elasticity and functionalities to change the network configurations over time. However, changes also impose unpredictable ...
    • Short survey of techniques for visualizing events recorded in logs 

      Fernandez R.; Fetais N. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
      Nowadays, data is being generated in large volumes and the users are left with a staggering amount of textual data that needs to be transformed into information to derive some knowledge from it. However, transforming and ...
    • Deep learning for detection of routing attacks in the internet of things 

      YAVUZ, Furkan Yusuf; Unal, Devrim; GÜL, Ensar ( Atlantis Press , 2018 , Article)
      Cyber threats are a showstopper for Internet of Things (IoT) has recently been used at an industrial scale. Network layer attacks on IoT can cause significant disruptions and loss of information. Among such attacks, routing ...
    • SLiFi: Exploiting Visible Light Communication VLC to Authenticate WiFi Access Points 

      Amin, Hafsa; Asadulla, Faryal; Jaffar, Aisha; Oligeri, Gabriele; Al-Sabah, Mashael ( Hamad bin Khalifa University Press (HBKU Press) , 2018 , Conference Paper)
      This work presents an effective and efficient solution (SLiFi) to the evil twin attack in wireless networks. The evil twin is a rogue Wifi Access Point (AP) that pretends to be an authentic one by using the same network ...
    • Image Stitching System With Scanning Microscopy for Histopathological Applications 

      Akbar, Muhammad Ali ( Hamad bin Khalifa University Press (HBKU Press) , 2018 , Conference Paper)
      Histopathological analysis of biopsy or surgical specimen is a common clinical practice for diagnostic purposes. Essentially, the process involves slicing the biopsy or surgical sample into very thin slices, placing them ...
    • Framework for Visualizing Browsing Patterns Captured in Computer Logs 

      Fetais, Noora and Fernandez, Rachael ( Hamad bin Khalifa University Press (HBKU Press) , 2018 , Conference Paper)
      Research ProblemAn Intrusion Detection System (IDS) is used for preventing security breaches by monitoring and analyzing the data recorded in log files. An IDS analyst is responsible for detecting intrusions in a system ...
    • Substring search over encrypted data 

      Shikfa, Abdullatif ( Hamad bin Khalifa University Press (HBKU Press) , 2018 , Conference Paper)
      Our data, be it personal or professional, is increasingly outsourced. This results from the development of cloud computing in the past ten years, a paradigm that shifts computing to a utility. Even without realizing it, ...