Now showing items 81-100 of 250

    • RES-EV: Identifying EV-Households under High AC Load Using a Residual-Based Model 

      Aly, Hussein; Al-Ali, Abdulaziz; Al-Ali, Abdulla; Malluhi, Qutaibah ( Institute of Electrical and Electronics Engineers Inc. , 2024 , Conference)
      This paper introduces a novel residual-based model to identify households with Battery Electric Vehicles (EVs) under high Air Conditioning (AC) load. The considerable energy demands of AC units can obscure charging events ...
    • LocationSpark: In-memory Distributed Spatial Query Processing and Optimization 

      Tang, Mingjie; Yu, Yongyang; Mahmood, Ahmed R.; Malluhi, Qutaibah M.; Ouzzani, Mourad; ... more authors ( Frontiers Media S.A. , 2020 , Article)
      Due to the ubiquity of spatial data applications and the large amounts of spatial data that these applications generate and process, there is a pressing need for scalable spatial query processing. In this paper, we present ...
    • Analysis of Predictive Models for Revealing Household Characteristics using Smart Grid Data 

      Aly, Hussein; Al-Ali, Abdulaziz; Al-Ali, Abdulla; Malluhi, Qutaibah ( IEEE Computer Society , 2023 , Conference)
      The Smart Grid Advanced Metering Infrastructure (AMI) has revolutionized the smart grid network, generating vast amounts of data that can be utilized for diverse objectives, one of which is Household Characteristics ...
    • A resource provisioning framework for bioinformatics applications in multi-cloud environments 

      Senturk, Izzet F.; Balakrishnan, P.; Abu-Doleh, Anas; Kaya, Kamer; Malluhi, Qutaibah; ... more authors ( Elsevier , 2018 , Article)
      The significant advancement in Next Generation Sequencing (NGS) have enabled the generation of several gigabytes of raw data in a single sequencing run. This amount of raw data introduces new scalability challenges in ...
    • Anonymizing transactional datasets 

      AL Bouna, Becharaa; Clifton, Chrisc; Malluhi, Qutaibah ( IOS Press , 2015 , Article)
      In this paper, we study the privacy breach caused by unsafe correlations in transactional data where individuals have multiple tuples in a dataset. We provide two safety constraints to guarantee safe correlation of the ...
    • Evaluation of combined genome assemblies: A case study with fungal genomes 

      Abbas, Mostafa M.; Balakrishnan, Ponnuraman; Malluhi, Qutaibah M. ( Springer , 2015 , Conference)
      The rapid advances in genome sequencing leads to the generation of huge amount of data in a single sequencing experiment. Several genome assemblers with different objectives were developed to process these genomic data. ...
    • Smoking induced salivary microbiome dysbiosis and is correlated with lipid biomarkers 

      Mohammed, Layla I.; Razali, Rozaimi; Zakaria, Zain Zaki; Benslimane, Fatiha M.; Cyprian, Farhan; ... more authors ( Springer Nature , 2024 , Article)
      Background: The oral microbiome plays an essential role in maintaining oral homeostasis and health; smoking significantly affects it, leading to microbial dysbiosis. The study aims to investigate changes in the oral ...
    • Evaluation of Loss Functions for Segmentation of Corneal Nerves 

      Salahuddin, Tooba; Qidwai, Uvais ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference)
      Corneal confocal microscopy (CCM) has been advocated as a non-invasive technique for objective diagnosis of very early neuropathy in patients by scanning the corneal subbasal nerve plexus. The obtained images provide a ...
    • Intelligent Fuzzy Classifier for pre-seizure detection from real epileptic data 

      Shakir, Mohamed; Malik, Aamir Saeed; Kamel, Nidal; Qidwai, Uvais ( Institute of Electrical and Electronics Engineers Inc. , 2014 , Conference)
      In this paper, a classification method is presented using an Fuzzy Inference Engine to detect the incidences of pre-seizures in real/raw Epilepsy data. The system distinguishes between 'Normal', 'Pre-Seizure' and 'Seizure' ...
    • Embedded wearable EEG seizure detection in ambulatory state 

      Shakir, Mohamed; Malik, Aamir Saeed; Kamel, Nidal; Qidwai, Uvais ( UK Simulation Society , 2014 , Article)
      This paper describes a classification method is presented using a Fuzzy System to detect the occurrences of Partial Seizures from Epilepsy data, which can be implemented in any embedded system as a wearable detection system. ...
    • Can immersive type of Virtual Reality bring EMG pattern changes post facial palsy? 

      Qidwai, Uvais; Ajimsha, M. S. ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference)
      The loss of facial expression via facial paralysis is a devastating condition, both functionally and aesthetically. However, given the life-long plasticity of the brain one could assume that recovery could be facilitated ...
    • Wirelessly controlled mimicing humanoid robot 

      Qidwai, Uvais; Shakir, Mohamed; Hakouz, Wa'ed; Musa, Nour ( IEEE , 2014 , Conference)
      Educational humanoid robots have started to find there place in institutions for children with special needs and Autism Spectrum Disorder (ASD) children therapy centers. Most of the humanoid robots are expensive, or come ...
    • Retinal image enhancement using Laplacian pyramidal multi-scaling 

      Khan, Sharifuzzaman; Qidwai, Uvais; Muhammad, Hamed; Qidwai, Umair ( Institute of Electrical and Electronics Engineers Inc. , 2014 , Conference)
      Early detection of retinal diseases is important to avoid complications and permanent vision loss. In this paper retinal neovascularization and molecular degeneration has been emphasized. Neovascularization is in form of ...
    • Detection of partial seizure: An application of fuzzy rule system for wearable ambulatory systems 

      Shakir, Mohamed; Malik, Aamir Saeed; Kamel, Nidal; Qidwai, Uvais ( IEEE , 2014 , Conference)
      Electroencephalography (EEG) plays an intelligent role, especially EEG based health diagnosis of brain disorder, as well as brain-computer interface (BCI) applications. One such research field is related to epilepsy. The ...
    • Vulnerabilities and countermeasures in electrical substations 

      Hussain, Shahbaz; Hernandez Fernandez, Javier; Al-Ali, Abdulla Khalid; Shikfa, Abdullatif ( Elsevier , 2021 , Article)
      The impending and continued threat of cyberattacks on modern utility grids has called for action from the different stakeholders of the electricity sector. This calls for a thorough investigation and review of the weaknesses ...
    • Recent Advances in the Internet-of-Medical-Things (IoMT) Systems Security 

      Ghubaish, Ali; Salman, Tara; Zolanvari, Maede; Unal, Devrim; Al-Ali, Abdulla; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)
      The rapid evolutions in microcomputing, mini-hardware manufacturing, and machine-to-machine (M2M) communications have enabled novel Internet-of-Things (IoT) solutions to reshape many networking applications. Healthcare ...
    • Factors Affecting the Performance of Sub-1 GHz IoT Wireless Networks 

      Yang, Z.; Ghubaish, Ali; Unal, Devrim; Jain, Raj ( Hindawi Limited , 2021 , Article)
      Internet of Things (IoT) devices frequently utilize wireless networks operating in the Industrial, Scientific, and Medical (ISM) Sub-1 GHz spectrum bands. Compared with higher frequency bands, the Sub-1 GHz band provides ...
    • Intrusion Detection System for Healthcare Systems Using Medical and Network Data: A Comparison Study 

      Hady, Anar A.; Ghubaish, Ali; Salman, Tara; Unal, Devrim; Jain, Raj ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)
      Introducing IoT systems to healthcare applications has made it possible to remotely monitor patients' information and provide proper diagnostics whenever needed. However, providing high-security features that guarantee the ...
    • Policy specification and verification for blockchain and smart contracts in 5G networks 

      Unal, Devrim; Hammoudeh, Mohammad; Kiraz, Mehmet Sabir ( Korean Institute of Communications Information Sciences , 2020 , Article)
      Blockchain offers unprecedented opportunities for innovation in financial transactions. A whole new world of opportunities for banking, lending, insurance, money transfer, investments, and stock markets awaits. However, ...
    • A secure and efficient Internet of Things cloud encryption scheme with forensics investigation compatibility based on identity-based encryption 

      Unal, Devrim; Al-Ali, Abdulla; Catak, Ferhat Ozgur; Hammoudeh, Mohammad ( Elsevier B.V. , 2021 , Article)
      Data security is a challenge for end-users of cloud services as the users have no control over their data once it is transmitted to the cloud. A potentially corrupt cloud service provider can obtain the end-users’ data. ...