• Intelligent Fuzzy Classifier for pre-seizure detection from real epileptic data 

      Shakir, Mohamed; Malik, Aamir Saeed; Kamel, Nidal; Qidwai, Uvais ( Institute of Electrical and Electronics Engineers Inc. , 2014 , Conference Paper)
      In this paper, a classification method is presented using an Fuzzy Inference Engine to detect the incidences of pre-seizures in real/raw Epilepsy data. The system distinguishes between 'Normal', 'Pre-Seizure' and 'Seizure' ...
    • Minimum Variance Embedded Random Vector Functional Link Network with Privileged Information 

      Ganaie, M. A.; Tanveer, M.; Malik, A. K.; Suganthan, P. N. ( Institute of Electrical and Electronics Engineers Inc. , 2022 , Conference Paper)
      A teacher in a school plays significant role in classroom while teaching the students. Similarly, learning via privileged information (LUPI) gives extra information generated by a teacher to 'teach' the learning algorithm ...
    • Monitoring DVT cuffs for long-term operation: A fuzzy approach 

      Qidwai, Uvais; Kamran, Saadat; Al-Sulaiti, Sara; Ahmed, Ghadeer; Hegazy, Asmaa ( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)
      Stroke patients, as well as all those patients who are bed-bound for a long period of time are highly susceptible to deep vein thrombosis (DVT) as secondary complexity. DVT poses more dangers of a loose blood clot obstructing ...
    • Multi-Objective Security Hardening Optimisation for Dynamic Networks 

      Enoch S.Y.; Hong J.B.; Ge M.; Khan K.M.; Kim D.S. ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)
      Hardening the dynamic networks is a very challenging task due to their complexity and dynamicity. Moreover, there may be multi-objectives to satisfy, while containing the solutions within the constraints (e.g., fixed budget, ...
    • Optimal sizing of a stand-alone hybrid PV-WT-BT system using artificial intelligence based technique 

      Hussain, Shahbaz; Alammari, Rashid; Iqbal, Atif; Shikfa, Abdullatif ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      Nowadays, conventional energy system is being replaced by renewable energy system. Especially, PV systems and wind energy systems are gaining much attention due to their future sustainability and eco-friendly nature. ...
    • Optimizing Energy-Distortion Trade-off for Vital Signs Delivery in Mobile Health Applications 

      Almarridi A.; Kharbach S.; Yaacoub E.; Mohamed A. ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      Healthcare is considered a top priority worldwide, considering the swift increase in the number of chronic patients who require continuous monitoring. This motivates the researchers to develop scalable remote health ...
    • Paillier's encryption: Implementation and cloud applications 

      Nassar, Mohamed; Erradi, Abdelkarim; Malluhi, Qutaibah M. ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)
      Paillier's additive homomorphic encryption is increasingly used in recent research in the field of cloud secure outsourcing and privacy-preserving computation in addition to other cryptographic tools such as garbled circuits. ...
    • Performance Evaluation of No-Pairing ECC-Based KPABE on IoT Platforms 

      Hijawi, Ula; Unal, Devrim; Hamila, Ridha; Gastli, Adel; Ellabban, Omar ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      Internet of Things (IoT) networks operating in lightweight resource-constrained devices have been growing constantly in a wide range of areas. Such networks collect sensitive information over time that represent the users' ...
    • Privacy preserving computation in cloud using noise-free fully homomorphic encryption (FHE) schemes 

      Wang, Yongge; Malluhi, Qutaibah M. ( Springer Verlag , 2016 , Conference Paper)
      With the wide adoption of cloud computing paradigm, it is important to develop appropriate techniques to protect client data privacy in the cloud. Encryption is one of the major techniques that could be used to achieve ...
    • Proportionally fair approach for tor's circuits scheduling 

      Basyoni L.; Erbad A.; Mohamed A.; Refaey A.; Guizani M. ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      The number of users adopting Tor to protect their online privacy is increasing rapidly. With a limited number of volunteered relays in the network, the number of clients' connections sharing the same relays is increasing ...
    • Qatar Green Schools Initiative: Energy Management System with Cost-Efficient and Lightweight Networked IoT 

      Hijawi, Ula; Gastli, Adel; Hamila, Ridha; Ellabban, Omar; Unal, Devrim ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      With the growing need of developing real-time energy management and automation systems, building energy efficiency is of large focus in recent research. In particular, school buildings require special attention to occupants' ...
    • Real-time robotic avatar control using fuzzy gaze-classification for people with disability 

      Qidwai, Uvais; Shakir, Mohamed; Bahameish, Mariam ( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)
      Robotic control with gaze-classification has been an area of interest for quite some time. In this paper, a novel solution of implementing sensing system with intelligent visualization has been presented. Such a system can ...
    • Real-Time Scheduling for Electric Vehicles Charging/Discharging Using Reinforcement Learning 

      Mhaisen, N.; Fetais, N.; Massoud, Ahmed ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      With the increase in Electric Vehicles (EVs) penetration, their charging needs form an additional burden on the grid. Thus, charging coordination is necessary for safe and efficient EV use. The scheduling of EVs is especially ...
    • Reasoning about security policies of services using answer set programming 

      Asuncion, Vernon; Khan, Khaled M.; Erradi, Abdelkarim; Alhazbi, Saleh ( Institute of Electrical and Electronics Engineers Inc. , 2014 , Conference Paper)
      In this paper, we propose a formal framework for checking the consistency of security policies of services using Answer Set Programming (ASP). We illustrate that the formalisation of security policies of the service providers ...
    • RES-EV: Identifying EV-Households under High AC Load Using a Residual-Based Model 

      Aly, Hussein; Al-Ali, Abdulaziz; Al-Ali, Abdulla; Malluhi, Qutaibah ( Institute of Electrical and Electronics Engineers Inc. , 2024 , Conference Paper)
      This paper introduces a novel residual-based model to identify households with Battery Electric Vehicles (EVs) under high Air Conditioning (AC) load. The considerable energy demands of AC units can obscure charging events ...
    • Retinal image enhancement using Laplacian pyramidal multi-scaling 

      Khan, Sharifuzzaman; Qidwai, Uvais; Muhammad, Hamed; Qidwai, Umair ( Institute of Electrical and Electronics Engineers Inc. , 2014 , Conference Paper)
      Early detection of retinal diseases is important to avoid complications and permanent vision loss. In this paper retinal neovascularization and molecular degeneration has been emphasized. Neovascularization is in form of ...
    • Robotic probe positioning system for structural health monitoring 

      Qidwai U.; Ijaz A.; Akbar A. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
      Structural health Monitoring (SHM) is a very critical component for sustainable civil and mechanical structures in modern urban settings. The sky-scrappers and huge bridges in modern metropolis today are essential aspects ...
    • Security-Driven Performance Analysis of Lightweight Cryptography for Energy Efficiency Applications 

      Al-Hasan, Tamim M.; Sayed, Aya N.; Bensaali, Faycal; Nhlabatsi, Armstrong; Hamila, Ridha ( IEEE , 2024 , Conference Paper)
      This paper provides a comprehensive analysis of the security-centric performance of the Lightweight Cryptography (LWC) algorithms ASCON, TinyJambu, and Xoodyak, finalists in the NIST standardization process, through their ...
    • Short survey of techniques for visualizing events recorded in logs 

      Fernandez R.; Fetais N. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
      Nowadays, data is being generated in large volumes and the users are left with a staggering amount of textual data that needs to be transformed into information to derive some knowledge from it. However, transforming and ...
    • Similarity Group-by Operators for Multi-Dimensional Relational Data 

      Tang, Mingjie; Tahboub, Ruby Y.; Aref, Walid G.; Atallah, Mikhail J.; Malluhi, Qutaibah M.; ... more authors ( IEEE Computer Society , 2016 , Conference Paper)
      The SQL group-by operator plays an important role in summarizing and aggregating large datasets in a data analytics stack. While the standard group-by operator, which is based on equality, is useful in several applications, ...