• Data confidentiality in cloud-based pervasive system 

      Khan, Khaled M.; Shaheen, Mahboob; Wang, Yongge ( Association for Computing Machinery , 2017 , Conference Paper)
      Data confidentiality and privacy is a serious concern in pervasive systems where cloud computing is used to process huge amount of data such as matrix multiplications typically used in HPC. Due to limited processing ...
    • Data Obfuscation for Privacy and Confidentiality in Cloud Computing 

      Khan, Khaled M.; Shaheen, Mahboob ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)
      This paper proposes a data obfuscation approach in outsourcing matrix multiplication to cloud computing. It is primarily based on splitting the rows and columns of matrices to alter their actual dimension coupled with ...
    • Deep Reservoir Computing Based Random Vector Functional Link for Non-sequential Classification 

      Hu, Minghui; Gao, Ruobin; Suganthan, P. N. ( Institute of Electrical and Electronics Engineers Inc. , 2022 , Conference Paper)
      Reservoir Computing (RC) is well-suited for simpler sequential tasks which require inexpensive, rapid training, and the Echo State Network (ESN) plays a significant role in RC. In this article, we proposed variations of ...
    • Design and Implementation of a Threat-Specific Security Risk Assessment Tool 

      Nhlabatsi, Armstrong; Hussein, Alaa; Fetais, Noora; Khan, Khaled M. ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      Security threats posed to individual cloud computing clients vary depending on their specific security requirements. However, Cloud Providers apply generic security risk assessment approaches which result do not consider ...
    • Detection of partial seizure: An application of fuzzy rule system for wearable ambulatory systems 

      Shakir, Mohamed; Malik, Aamir Saeed; Kamel, Nidal; Qidwai, Uvais ( IEEE , 2014 , Conference Paper)
      Electroencephalography (EEG) plays an intelligent role, especially EEG based health diagnosis of brain disorder, as well as brain-computer interface (BCI) applications. One such research field is related to epilepsy. The ...
    • Distributed interference management using Q-Learning in cognitive femtocell networks: New USRP-based implementation 

      Elsayed M.H.M.; Mohamed A. ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)
      Femtocell networks have become a promising solution in supporting high data rates for 5G systems, where cell densification is performed using the small femtocells. However, femtocell networks have many challenges. One of ...
    • DQN based Blockchain Data Storage in Resource-constrained IoT System 

      Lei, Boyi; Zhou, Jianhong; Ma, Maode; Niu, Xianhua ( Institute of Electrical and Electronics Engineers Inc. , 2023 , Conference Paper)
      Applying blockchain technology in the Internet of Things (IoT) systems to realize massive data storage is a promising technology, which can eliminate the dependence of IoT on central servers and protect data security ...
    • Empirical performance evaluation of QUIC protocol for Tor anonymity network 

      Basyoni, Lamiaa; Erbad, Aiman; Alsabah, Mashael; Fetais, Noora; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)
      Tor's anonymity network is one of the most widely used anonymity networks online, it consists of thousands of routers run by volunteers. Tor preserves the anonymity of its users by relaying the traffic through a number of ...
    • Empowering users of cloud computing on data confidentiality 

      Khan, Khaled M.; Shaheen, Mahboob ( IEEE , 2014 , Conference Paper)
      Cloud networking is an integral part of interconnected data centres operated in cloud environment. Cloud users heavily rely on cloud networking to transmit to and receive data from data centres. In this context, we explore ...
    • An Enhanced Multi-Phase Stochastic Differential Evolution Framework for Numerical Optimization 

      Abdel-Nabi, Heba; Ali, Mostafa; Daoud, Mohammad; Alazrai, Rami; Awajan, Arafat; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2022 , Conference Paper)
      Real-life problems can be expressed as optimization problems. These problems pose a challenge for researchers to design efficient algorithms that are capable of finding optimal solutions with the least budget. Stochastic ...
    • Evaluation of combined genome assemblies: A case study with fungal genomes 

      Abbas, Mostafa M.; Balakrishnan, Ponnuraman; Malluhi, Qutaibah M. ( Springer , 2015 , Conference Paper)
      The rapid advances in genome sequencing leads to the generation of huge amount of data in a single sequencing experiment. Several genome assemblers with different objectives were developed to process these genomic data. ...
    • Evaluation of Loss Functions for Segmentation of Corneal Nerves 

      Salahuddin, Tooba; Qidwai, Uvais ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)
      Corneal confocal microscopy (CCM) has been advocated as a non-invasive technique for objective diagnosis of very early neuropathy in patients by scanning the corneal subbasal nerve plexus. The obtained images provide a ...
    • Exploration of Carbonate Aggregates in Road Construction using Ultrasonic and Artificial Intelligence Approaches 

      Abdelhedi, Mohamed; Jabbar, Rateb; Abbes, Chedly ( Qatar University Press , 2023 , Conference Paper)
      The COVID-19 pandemic has significantly impacted the construction sector, which is highly sensitive to economic cycles. In order to boost value and efficiency in this sector, the use of innovative exploration technologies ...
    • A formal model-based testing framework for validating an IoT solution for blockchain-based vehicles communication 

      Jabbar, Rateb; Krichen, Moez; Kharbeche, Mohamed; Fetais, Noora; Barkaoui, Kamel ( SciTePress , 2020 , Conference Paper)
      The emergence of embedded and connected smart technologies, systems, and devices has enabled the concept of smart cities by connecting every "thing" to the Internet and in particular in transportation through the Internet ...
    • Framework for Visualizing Browsing Patterns Captured in Computer Logs 

      Fetais, Noora and Fernandez, Rachael ( Hamad bin Khalifa University Press (HBKU Press) , 2018 , Conference Paper)
      Research ProblemAn Intrusion Detection System (IDS) is used for preventing security breaches by monitoring and analyzing the data recorded in log files. An IDS analyst is responsible for detecting intrusions in a system ...
    • Green operator cooperation for radio frequency transmission minimization 

      Amamou, Lamis; Boujelben, Maissa; Ghazzai, Hakim; Bouallegue, Ammar; Besbes, Hichem ( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)
      The increasing demand for reliable mobile services with faster communications speed requires high capital investment in the radio access networks. This leads to enormous energy consumption, high operational costs (OPEX), ...
    • Group owner election in Wi-Fi direct 

      Khan, Muhammad Asif; Cherif, Wael; Filali, Fethi ( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)
      Wi-Fi Direct is a new protocol that standardizes the direct communication between Wi-Fi enabled mobile devices without requiring an access point. The specification proposes enhanced peer-to-peer functions to be supported ...
    • Image stitching system with scanning microscopy for histopathological applications 

      Qidwai, Uvais; Akbar, Muhammad Ali ( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)
      Histopathological analysis of biopsy or surgical specimen is a common clinical practice for diagnostic purposes. Essentially, the process involves slicing the biopsy or surgical sample into very thin slices, placing them ...
    • Image Stitching System With Scanning Microscopy for Histopathological Applications 

      Akbar, Muhammad Ali ( Hamad bin Khalifa University Press (HBKU Press) , 2018 , Conference Paper)
      Histopathological analysis of biopsy or surgical specimen is a common clinical practice for diagnostic purposes. Essentially, the process involves slicing the biopsy or surgical sample into very thin slices, placing them ...
    • Improved Handshaking Procedures for Transport Layer Security in Software Defined Networks 

      Li, Xue Jun; Ma, Maode; Hlaing, Cho Wai ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)
      Software defined networking (SDN) has emerged as a new technology to enhance the flexibility, resilience, and automated centralized management of a network. Recently several reports have identified possible vulnerabilities, ...