Collections in this community

Recent Submissions

  • Substring search over encrypted data 

    Shikfa, Abdullatif ( Hamad bin Khalifa University Press (HBKU Press) , 2018 , Conference Paper)
    Our data, be it personal or professional, is increasingly outsourced. This results from the development of cloud computing in the past ten years, a paradigm that shifts computing to a utility. Even without realizing it, ...
  • Framework for Visualizing Browsing Patterns Captured in Computer Logs 

    Fetais, Noora and Fernandez, Rachael ( Hamad bin Khalifa University Press (HBKU Press) , 2018 , Conference Paper)
    Research ProblemAn Intrusion Detection System (IDS) is used for preventing security breaches by monitoring and analyzing the data recorded in log files. An IDS analyst is responsible for detecting intrusions in a system ...
  • Distributed interference management using Q-Learning in cognitive femtocell networks: New USRP-based implementation 

    Elsayed M.H.M.; Mohamed A. ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)
    Femtocell networks have become a promising solution in supporting high data rates for 5G systems, where cell densification is performed using the small femtocells. However, femtocell networks have many challenges. One of ...
  • Traffic Analysis Attacks on Tor: A Survey 

    Basyoni L.; Fetais N.; Erbad A.; Mohamed A.; Guizani M. ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
    The Tor anonymity network is one of the most popular and widely used tools to protect the privacy of online users. Tor provides defenses against multiple adversarial activities aiming to identify or trace the users. Traffic ...
  • Optimizing Energy-Distortion Trade-off for Vital Signs Delivery in Mobile Health Applications 

    Almarridi A.; Kharbach S.; Yaacoub E.; Mohamed A. ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
    Healthcare is considered a top priority worldwide, considering the swift increase in the number of chronic patients who require continuous monitoring. This motivates the researchers to develop scalable remote health ...
  • Proportionally fair approach for tor's circuits scheduling 

    Basyoni L.; Erbad A.; Mohamed A.; Refaey A.; Guizani M. ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
    The number of users adopting Tor to protect their online privacy is increasing rapidly. With a limited number of volunteered relays in the network, the number of clients' connections sharing the same relays is increasing ...
  • QuicTor: Enhancing Tor for Real-Time Communication Using QUIC Transport Protocol 

    Basyoni L.; Erbad A.; Alsabah M.; Fetais N.; Mohamed A.; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)
    In the past decades, the internet has emerged as the fastest way to access information. However, this revolutionary information age comes with its own set of challenges. The privacy of Internet users is at increasing risk ...
  • Fuzzy Identification-Based Encryption for healthcare user face authentication 

    Aggarwal, Mahima; Zubair, Mohammed; Unal, Devrim; Al-Ali, Abdulla; Reimann, Thomas; ... more authors ( Hamad bin Khalifa University Press (HBKU Press) , 2022 , Article)
    Background: Internet of Medical Things (IOMT) has the potential to monitor health continuously and in real-time. One of the main issues that arise in IOMT is how securely the data can be transmitted to the clinical team. ...
  • Optimal sizing of a stand-alone hybrid PV-WT-BT system using artificial intelligence based technique 

    Hussain, Shahbaz; Alammari, Rashid; Iqbal, Atif; Shikfa, Abdullatif ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
    Nowadays, conventional energy system is being replaced by renewable energy system. Especially, PV systems and wind energy systems are gaining much attention due to their future sustainability and eco-friendly nature. ...
  • Cybersecurity for next generation healthcare in Qatar 

    Zubair, Mohammad; Unal, Devrim; Al-Ali, Abdulla; Reimann, Thomas; Alinier, Guillaume ( Hamad bin Khalifa University Press (HBKU Press) , 2021 , Article)
    Background: IoMT (Internet of Medical Things) devices (often referred to IoMT domain) have the potential to quickly diagnose and monitor patients outside the hospital by transmitting information through the cloud domain ...
  • Design and implementation of a modular ECMO simulator 

    Aldisi, Mohammed; Alsalemi, Abdullah; Alhomsi, Yahya; Ahmed, Ibrahim; Bensaali, Fayçal; ... more authors ( Hamad bin Khalifa University Press (HBKU Press) , 2016 , Article)
    Background: Extracorporeal membrane oxygenation (ECMO) is a high-complexity life-saving procedure riddled with mechanical complications that can place the patient in a critical state where fast and coordinated actions are ...
  • Using thermochromic ink for medical simulations 

    Alsalemi, Abdullah; Aldisi, Mohammed; Alhomsi, Yahya; Ahmed, Ibrahim; Bensaali, Faycal; ... more authors ( Hamad bin Khalifa University Press (HBKU Press) , 2017 , Article)
    Background: In medical simulation and training, blood is used to exhibit its different behaviors in context. In some cases, blood color differential is an imperative visual effect to ensure high-fidelity training and ...
  • Real-Time Scheduling for Electric Vehicles Charging/Discharging Using Reinforcement Learning 

    Mhaisen, N.; Fetais, N.; Massoud, Ahmed ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
    With the increase in Electric Vehicles (EVs) penetration, their charging needs form an additional burden on the grid. Thus, charging coordination is necessary for safe and efficient EV use. The scheduling of EVs is especially ...
  • Breath Analysis for the in Vivo Detection of Diabetic Ketoacidosis 

    Shabil Sha, Mizaj; Maurya, Muni Raj; Shafath, Sadiyah; Cabibihan, John-John; Al-Ali, Abdulaziz; ... more authors ( American Chemical Society , 2022 , Article)
    Human breath analysis of volatile organic compounds has gained significant attention recently because of its rapid and noninvasive potential to detect various metabolic diseases. The detection of ketones in the breath and ...
  • Virtual Reality Game for Falconry 

    Fetais, Noora; Lotfi Kharbach, Sarah; Ahmad, Nour Moslem Haj; Ahmad, Salma Salah ( Hamad bin Khalifa University Press (HBKU Press) , 2018 , Conference paper)
    Traditions and culture play a major role in our society, as they are the source of a person's pride and honor. One of Qatar's National Vision 2030 pillars that relates to the social development aims at preserving Qatar's ...
  • Image Stitching System With Scanning Microscopy for Histopathological Applications 

    Akbar, Muhammad Ali ( Hamad bin Khalifa University Press (HBKU Press) , 2018 , Conference Paper)
    Histopathological analysis of biopsy or surgical specimen is a common clinical practice for diagnostic purposes. Essentially, the process involves slicing the biopsy or surgical sample into very thin slices, placing them ...
  • A Reconfigurable Multipurpose SoC Mobile Platform for metal detection 

    Al Rshid Abazeed, Omran; Mhaisen, Naram; Al-Hariri, Youssef; Nawaz, Naveed; Amira, Abbes ( Hamad bin Khalifa University Press (HBKU Press) , 2018 , Conference Paper)
    Background and Objectives One of the key problems in mobile robotics is the ability to understand and analyze the surrounding environment in a useful way. This is especially important in dangerous applications where human ...
  • SLiFi: Exploiting Visible Light Communication VLC to Authenticate WiFi Access Points 

    Amin, Hafsa; Asadulla, Faryal; Jaffar, Aisha; Oligeri, Gabriele; Al-Sabah, Mashael ( Hamad bin Khalifa University Press (HBKU Press) , 2018 , Conference Paper)
    This work presents an effective and efficient solution (SLiFi) to the evil twin attack in wireless networks. The evil twin is a rogue Wifi Access Point (AP) that pretends to be an authentic one by using the same network ...
  • Almost BPXOR Coding Technique for Tolerating Three Disk Failures in RAID7 Architectures 

    Mhaisen, Naram; Punkar, Mayur; Wang, Yongge; Desmedt, Yvo; Malluhi, Qutaibah ( Hamad bin Khalifa University Press (HBKU Press) , 2018 , Conference Paper)
    Redundant Array of Independent Disks (RAID) storage architectures provide protection of digital infrastructure against potential disks failures. For example, RAID-5 and RAID-6 architectures provide protection against one ...
  • Skyline Discovery and Composition of Multi-Cloud Mashup Services 

    Zhang, Fan; Hwang, Kai; Khan, Samee U.; Malluhi, Qutaibah M. ( Institute of Electrical and Electronics Engineers , 2016 , Article)
    A cloud mashup is composed of multiple services with shared datasets and integrated functionalities. For example, the elastic compute cloud (EC2) provided by Amazon Web Service (AWS), the authentication and authorization ...

View more