• 3-sCHSL: Three-Stage Cyclic Hybrid SFS and L-SHADE Algorithm for Single Objective Optimization 

      Abdel-Nabi, Heba; Ali, Mostafa Z.; Awajan, Arafat; Alazrai, Rami; Daoud, Mohammad I.; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2023 , Conference)
      This paper proposes a novel hybridization of two metaheuristic algorithms to solve the real-parameter single objective numerical optimization problems. The proposed Three-stage Cyclic Hybrid SFS and L-SHADE (3-sCHSL) ...
    • A Blockchain-Based Security Scheme for Vehicular Ad Hoc Networks in Smart Cities 

      Li, Xue Jun; Ma, Maode; Yong, Yong Xing ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference)
      The development of Vehicular Ad Hoc Networks (VANET) has brought many advantages to facilitate the deployment of the Intelligent Transportation System (ITS). However, without proper protection, VANETs can be vulnerable to ...
    • A Domain Specific Language for Secure Outsourcing of Computation to the Cloud 

      Nassar, Mohamed; Erradi, Abdelkarim; Malluhi, Qutaibah M. ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference)
      Secure outsourcing of computation has gained importance with the proliferation of cloud services. However, existing outsourcing protocol specification languages are mainly suitable for secure multi-party computation. They ...
    • A model driven framework for secure outsourcing of computation to the cloud 

      Nassar, Mohamed; Erradi, Abdelkarim; Sabry, Farida; Malluhi, Qutaibah M. ( IEEE Computer Society , 2014 , Conference)
      This paper presents a model driven approach to define then coordinate the execution of protocols for secure outsourcing of computation of large datasets in cloud computing environments. First we present our Outsourcing ...
    • A new technique for compacting secret key in attribute-based broadcast encryption 

      Canard, Sébastien; Phan, Duong Hieu; Trinh, Viet Cuong ( Springer Verlag , 2016 , Conference)
      Public-key encryption has been generalized to adapt to more and more practical applications. Broadcast encryption, introduced by Fiat and Naor in 1993, aims for applications in pay-TV or satellite transmission and allows ...
    • A novel multi-hop body-To-body routing protocol for disaster and emergency networks 

      Ben Arbia, Dhafer; Alam, Muhammad Mahtab; Attia, Rabah; Ben Hamida, Elye ( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference)
      In this paper, a new multi-hop routing protocol (called ORACE-Net) for disaster and emergency networks is proposed. The proposed hierarchical protocol creates an ad-hoc network through body-To-body (B2B) communication ...
    • A Practical Universal Consortium Blockchain Paradigm for Patient Data Portability on the Cloud Utilizing Delegated Identity Management 

      Sabir, Abdulbadi; Fetais, Noora ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference)
      This paper presents a blockchain system that exploits the base modular features of the Hyperledger Fabric framework to allow for a new, patient-centric, practical data portability paradigm. The system empowers patients by ...
    • A Reconfigurable Multipurpose SoC Mobile Platform for metal detection 

      Al Rshid Abazeed, Omran; Mhaisen, Naram; Al-Hariri, Youssef; Nawaz, Naveed; Amira, Abbes ( Hamad bin Khalifa University Press (HBKU Press) , 2018 , Conference)
      Background and Objectives One of the key problems in mobile robotics is the ability to understand and analyze the surrounding environment in a useful way. This is especially important in dangerous applications where human ...
    • A scalable solution for finding overlaps between sequences using map-reduce 

      Haj Rachid, Maan; Malluhi, Qutaibah M. ( The International Society for Computers and Their Applications (ISCA) , 2016 , Conference)
      The overlap stage of a string graph-based assembler is considered one of the most time- and space-consuming stages in any de novo overlap-based assembler. This is due to the huge output of the next-generation sequencing ...
    • A Two-Stage Evolutionary Framework for Multi-Objective Optimization 

      Chen, Peng; Liang, Jing; Qiao, Kangjia; Suganthan, Ponnuthurai Nagaratnam; Ban, Xuanxuan ( Institute of Electrical and Electronics Engineers Inc. , 2024 , Conference)
      In the field of evolutionary multi-objective optimization, the approximation of the Pareto front (PF) is achieved by utilizing a collection of representative candidate solutions that exhibit desirable convergence and ...
    • Adaptive Scaling for U-Net in Time Series Classification 

      Cheng, Wen Xin; Suganthan, Ponnuthurai Nagaratnam ( Springer Science and Business Media Deutschland GmbH , 2023 , Conference)
      Convolutional Neural Networks such as U-Net are recently getting popular among researchers in many applications, such as Biomedical Image Segmentation. U-Net is one of the popular deep Convolutional Neural Networks which ...
    • Adopting formal verification and model-based testing techniques for validating a blockchain-based healthcare records sharing system 

      Jabbar, Rateb; Krichen, Moez; Fetais, Noora; Barkaoui, Kamel ( SciTePress , 2020 , Conference)
      The Electronic Health Records (EHR) sharing system is the modern tool for delivering efficient healthcare to patients. Its functions include tracking of therapies, monitoring of the treatment effectiveness, prediction of ...
    • Advanced Ensemble Deep Random Vector Functional Link for Eye-Tracking-based Situation Awareness Recognition 

      Li, Ruilin; Gao, Ruobin; Cui, Jian; Suganthan, P.N.; Sourina, Olga ( Institute of Electrical and Electronics Engineers Inc. , 2022 , Conference)
      Situation awareness (SA) plays a significant role in takeover transitions from autonomous to manual driving. Previous researchers have shown that eye movement signals can be used for SA recognition. Moreover, ensemble deep ...
    • Almost BPXOR Coding Technique for Tolerating Three Disk Failures in RAID7 Architectures 

      Mhaisen, Naram; Punkar, Mayur; Wang, Yongge; Desmedt, Yvo; Malluhi, Qutaibah ( Hamad bin Khalifa University Press (HBKU Press) , 2018 , Conference)
      Redundant Array of Independent Disks (RAID) storage architectures provide protection of digital infrastructure against potential disks failures. For example, RAID-5 and RAID-6 architectures provide protection against one ...
    • An efficient instance hiding scheme 

      Malluhi, Qutaibah M.; Shikfa, Abdullatif; Trinh, Viet Cuong ( Association for Computing Machinery , 2016 , Conference)
      Delegating computation, which is applicable to many practical contexts such as cloud computing or pay-TV system, concerns the task where a computationally weak client wants to securely compute a very complex function f on ...
    • An Interactive Visualization Web Solution for Electricity Consumption in Qatar 

      Soliman, Engy; Shalaby, Salma; Fetais, Noora ( Institute of Electrical and Electronics Engineers Inc. , 2017 , Conference)
      The amount of raw data related to electricity companies is increasing rapidly with the increase of construction sites, population and Qatar preparation for 2022 world cup. A question arises from this situation is: How can ...
    • Analysis of Predictive Models for Revealing Household Characteristics using Smart Grid Data 

      Aly, Hussein; Al-Ali, Abdulaziz; Al-Ali, Abdulla; Malluhi, Qutaibah ( IEEE Computer Society , 2023 , Conference)
      The Smart Grid Advanced Metering Infrastructure (AMI) has revolutionized the smart grid network, generating vast amounts of data that can be utilized for diverse objectives, one of which is Household Characteristics ...
    • Android Malware Detection and Classification using Stacked Machine Learning 

      Nawshin, F.; Gad, R.; Unal, D.; Suganthan, P.N. ( Institute of Electrical and Electronics Engineers Inc. , 2023 , Conference)
      The widespread use of Android smartphones in daily life can be attributed to the extensive prevalence stemming from the Android OS and the availability of open-source applications. People have become accustomed to performing ...
    • Assessing the Effect of Model Poisoning Attacks on Federated Learning in Android Malware Detection 

      Nawshin, Faria; Arnal, Romain; Unal, Devrim; Suganthan, Ponnuthurai; Touseau, Lionel ( Association for Computing Machinery , 2024 , Conference)
      Android devices are central to our daily lives, which leads to an increase in mobile security threats. Attackers try to exploit vulnerabilities and steal personal information from the installed applications on these devices. ...
    • Automatic generation of optimized workflow for distributed computations on large-scale matrices 

      Sabry, Farida; Erradi, Abdelkarim; Nassar, Mohamed; Malluhi, Qutaibah M. ( Springer Verlag , 2014 , Conference)
      Efficient evaluation of distributed computation on large-scale data is prominent in modern scientific computation; especially analysis of big data, image processing and data mining applications. This problem is particularly ...