• Image stitching system with scanning microscopy for histopathological applications 

      Qidwai, Uvais; Akbar, Muhammad Ali ( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)
      Histopathological analysis of biopsy or surgical specimen is a common clinical practice for diagnostic purposes. Essentially, the process involves slicing the biopsy or surgical sample into very thin slices, placing them ...
    • Real-time robotic avatar control using fuzzy gaze-classification for people with disability 

      Qidwai, Uvais; Shakir, Mohamed; Bahameish, Mariam ( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)
      Robotic control with gaze-classification has been an area of interest for quite some time. In this paper, a novel solution of implementing sensing system with intelligent visualization has been presented. Such a system can ...
    • Design and implementation of a modular ECMO simulator 

      Aldisi, Mohammed; Alsalemi, Abdullah; Alhomsi, Yahya; Ahmed, Ibrahim; Bensaali, Fayçal; ... more authors ( Hamad bin Khalifa University Press (HBKU Press) , 2016 , Article)
      Background: Extracorporeal membrane oxygenation (ECMO) is a high-complexity life-saving procedure riddled with mechanical complications that can place the patient in a critical state where fast and coordinated actions are ...
    • Garbled computation in cloud 

      Wang, Yongge; Malluhi, Qutaibah M.; Khan, Khaled MD ( Elsevier , 2016 , Article)
      With the wide adoption of cloud computing paradigm, it is important to develop appropriate techniques to protect client data privacy in the cloud. Encryption is one of the major techniques that could be used to achieve ...
    • Green operator cooperation for radio frequency transmission minimization 

      Amamou, Lamis; Boujelben, Maissa; Ghazzai, Hakim; Bouallegue, Ammar; Besbes, Hichem ( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)
      The increasing demand for reliable mobile services with faster communications speed requires high capital investment in the radio access networks. This leads to enormous energy consumption, high operational costs (OPEX), ...
    • A new technique for compacting secret key in attribute-based broadcast encryption 

      Canard, Sébastien; Phan, Duong Hieu; Trinh, Viet Cuong ( Springer Verlag , 2016 , Conference Paper)
      Public-key encryption has been generalized to adapt to more and more practical applications. Broadcast encryption, introduced by Fiat and Naor in 1993, aims for applications in pay-TV or satellite transmission and allows ...
    • A novel multi-hop body-To-body routing protocol for disaster and emergency networks 

      Ben Arbia, Dhafer; Alam, Muhammad Mahtab; Attia, Rabah; Ben Hamida, Elye ( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)
      In this paper, a new multi-hop routing protocol (called ORACE-Net) for disaster and emergency networks is proposed. The proposed hierarchical protocol creates an ad-hoc network through body-To-body (B2B) communication ...
    • Reasoning about Policies in Security-Aware Service Discovery Using Answer Set Programming 

      Asuncion, Vernon; Khan, Khaled M.; Erradi, Abdelkarim; Alhazbi, Saleh ( World Scientific Publishing Co. Pte Ltd , 2016 , Article)
      In order to enable a secure interaction between dynamically discovered software services and the client's application in a cooperative information system such as service oriented system, one of the pre-requisites is the ...
    • Using thermochromic ink for medical simulations 

      Alsalemi, Abdullah; Aldisi, Mohammed; Alhomsi, Yahya; Ahmed, Ibrahim; Bensaali, Faycal; ... more authors ( Hamad bin Khalifa University Press (HBKU Press) , 2017 , Article)
      Background: In medical simulation and training, blood is used to exhibit its different behaviors in context. In some cases, blood color differential is an imperative visual effect to ensure high-fidelity training and ...
    • Role updating in information systems using model checking 

      Hu, Jinwei; Khan, Khaled M.; Zhang, Yan; Bai, Yun; Li, Ruixuan ( Springer London , 2017 , Article)
      The role-based access control (RBAC) has significantly simplified the management of users and permissions in information systems. In dynamic environments, systems are constantly undergoing changes, and accordingly, the ...
    • Data confidentiality in cloud-based pervasive system 

      Khan, Khaled M.; Shaheen, Mahboob; Wang, Yongge ( Association for Computing Machinery , 2017 , Conference Paper)
      Data confidentiality and privacy is a serious concern in pervasive systems where cloud computing is used to process huge amount of data such as matrix multiplications typically used in HPC. Due to limited processing ...
    • Survey of Information Visualization Techniques for Enhancing Visual Analysis 

      Fernandez, Rachael; Fetais, Noora ( Institute of Electrical and Electronics Engineers Inc. , 2017 , Conference Paper)
      Visualization of data helps to transform a problem into a perceptual task that is easier to comprehend. It helps users to perceive patterns from large amount of data in order to make informed decisions. When visualization ...
    • ECG encryption and identification based security solution on the Zynq SoC for connected health systems 

      Zhai, Xiaojun; Ait Si Ali, Amine; Amira, Abbes; Bensaali, Faycal ( Academic Press Inc. , 2017 , Article)
      Connected health is a technology that associates medical devices, security devices and communication technologies. It enables patients to be monitored and treated remotely from their home. Patients' data and medical records ...
    • An Interactive Visualization Web Solution for Electricity Consumption in Qatar 

      Soliman, Engy; Shalaby, Salma; Fetais, Noora ( Institute of Electrical and Electronics Engineers Inc. , 2017 , Conference Paper)
      The amount of raw data related to electricity companies is increasing rapidly with the increase of construction sites, population and Qatar preparation for 2022 world cup. A question arises from this situation is: How can ...
    • Enabling broadcast communications in presence of jamming via probabilistic pairing 

      Pietro, Roberto Di; Oligeri, Gabriele ( Elsevier B.V. , 2017 , Article)
      This paper presents a thorough analysis of Freedom of Speech (FoS): a lightweight, fully distributed, and probabilistic protocol that assures the delivery of a message to be broadcast notwithstanding the presence of a ...
    • Compressive sensing based electronic nose platform 

      Djelouat, Hamza; Ait Si Ali, Amine; Amira, Abbes; Bensaali, Faycal ( Elsevier , 2017 , Article)
      Electronic nose (EN) systems play a significant role for gas monitoring and identification in gas plants. Using an EN system which consists of an array of sensors provides a high performance. Nevertheless, this performance ...
    • Prediction of infarction volume and infarction growth rate in acute ischemic stroke 

      Kamran, Saadat; Akhtar, Naveed; Alboudi, Ayman; Kamran, Kainat; Ahmad, Arsalan; ... more authors ( Nature Publishing Group , 2017 , Article)
      The prediction of infarction volume after stroke onset depends on the shape of the growth dynamics of the infarction. To understand growth patterns that predict lesion volume changes, we studied currently available models ...
    • Substring search over encrypted data 

      Shikfa, Abdullatif ( Hamad bin Khalifa University Press (HBKU Press) , 2018 , Conference Paper)
      Our data, be it personal or professional, is increasingly outsourced. This results from the development of cloud computing in the past ten years, a paradigm that shifts computing to a utility. Even without realizing it, ...
    • Virtual Reality Game for Falconry 

      Fetais, Noora; Lotfi Kharbach, Sarah; Ahmad, Nour Moslem Haj; Ahmad, Salma Salah ( Hamad bin Khalifa University Press (HBKU Press) , 2018 , Conference Paper)
      Traditions and culture play a major role in our society, as they are the source of a person's pride and honor. One of Qatar's National Vision 2030 pillars that relates to the social development aims at preserving Qatar's ...
    • Smart Grid Cybersecurity: Standards and Technical Countermeasures 

      Hussain S.; Meraj M.; Abughalwa M.; Shikfa A. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
      Cybersecurity in smart grids is of critical importance given the heavy reliance of modern societies on electricity and the recent cyberattacks that resulted in blackouts. The evolution of the legacy electric grid to a ...