Browsing Information Intelligence by Publication Date
Now showing items 21-40 of 93
-
Image stitching system with scanning microscopy for histopathological applications
( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)Histopathological analysis of biopsy or surgical specimen is a common clinical practice for diagnostic purposes. Essentially, the process involves slicing the biopsy or surgical sample into very thin slices, placing them ... -
Real-time robotic avatar control using fuzzy gaze-classification for people with disability
( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)Robotic control with gaze-classification has been an area of interest for quite some time. In this paper, a novel solution of implementing sensing system with intelligent visualization has been presented. Such a system can ... -
Design and implementation of a modular ECMO simulator
( Hamad bin Khalifa University Press (HBKU Press) , 2016 , Article)Background: Extracorporeal membrane oxygenation (ECMO) is a high-complexity life-saving procedure riddled with mechanical complications that can place the patient in a critical state where fast and coordinated actions are ... -
Garbled computation in cloud
( Elsevier , 2016 , Article)With the wide adoption of cloud computing paradigm, it is important to develop appropriate techniques to protect client data privacy in the cloud. Encryption is one of the major techniques that could be used to achieve ... -
Green operator cooperation for radio frequency transmission minimization
( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)The increasing demand for reliable mobile services with faster communications speed requires high capital investment in the radio access networks. This leads to enormous energy consumption, high operational costs (OPEX), ... -
A new technique for compacting secret key in attribute-based broadcast encryption
( Springer Verlag , 2016 , Conference Paper)Public-key encryption has been generalized to adapt to more and more practical applications. Broadcast encryption, introduced by Fiat and Naor in 1993, aims for applications in pay-TV or satellite transmission and allows ... -
A novel multi-hop body-To-body routing protocol for disaster and emergency networks
( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)In this paper, a new multi-hop routing protocol (called ORACE-Net) for disaster and emergency networks is proposed. The proposed hierarchical protocol creates an ad-hoc network through body-To-body (B2B) communication ... -
Reasoning about Policies in Security-Aware Service Discovery Using Answer Set Programming
( World Scientific Publishing Co. Pte Ltd , 2016 , Article)In order to enable a secure interaction between dynamically discovered software services and the client's application in a cooperative information system such as service oriented system, one of the pre-requisites is the ... -
Using thermochromic ink for medical simulations
( Hamad bin Khalifa University Press (HBKU Press) , 2017 , Article)Background: In medical simulation and training, blood is used to exhibit its different behaviors in context. In some cases, blood color differential is an imperative visual effect to ensure high-fidelity training and ... -
Role updating in information systems using model checking
( Springer London , 2017 , Article)The role-based access control (RBAC) has significantly simplified the management of users and permissions in information systems. In dynamic environments, systems are constantly undergoing changes, and accordingly, the ... -
Data confidentiality in cloud-based pervasive system
( Association for Computing Machinery , 2017 , Conference Paper)Data confidentiality and privacy is a serious concern in pervasive systems where cloud computing is used to process huge amount of data such as matrix multiplications typically used in HPC. Due to limited processing ... -
Survey of Information Visualization Techniques for Enhancing Visual Analysis
( Institute of Electrical and Electronics Engineers Inc. , 2017 , Conference Paper)Visualization of data helps to transform a problem into a perceptual task that is easier to comprehend. It helps users to perceive patterns from large amount of data in order to make informed decisions. When visualization ... -
ECG encryption and identification based security solution on the Zynq SoC for connected health systems
( Academic Press Inc. , 2017 , Article)Connected health is a technology that associates medical devices, security devices and communication technologies. It enables patients to be monitored and treated remotely from their home. Patients' data and medical records ... -
An Interactive Visualization Web Solution for Electricity Consumption in Qatar
( Institute of Electrical and Electronics Engineers Inc. , 2017 , Conference Paper)The amount of raw data related to electricity companies is increasing rapidly with the increase of construction sites, population and Qatar preparation for 2022 world cup. A question arises from this situation is: How can ... -
Enabling broadcast communications in presence of jamming via probabilistic pairing
( Elsevier B.V. , 2017 , Article)This paper presents a thorough analysis of Freedom of Speech (FoS): a lightweight, fully distributed, and probabilistic protocol that assures the delivery of a message to be broadcast notwithstanding the presence of a ... -
Compressive sensing based electronic nose platform
( Elsevier , 2017 , Article)Electronic nose (EN) systems play a significant role for gas monitoring and identification in gas plants. Using an EN system which consists of an array of sensors provides a high performance. Nevertheless, this performance ... -
Prediction of infarction volume and infarction growth rate in acute ischemic stroke
( Nature Publishing Group , 2017 , Article)The prediction of infarction volume after stroke onset depends on the shape of the growth dynamics of the infarction. To understand growth patterns that predict lesion volume changes, we studied currently available models ... -
Substring search over encrypted data
( Hamad bin Khalifa University Press (HBKU Press) , 2018 , Conference Paper)Our data, be it personal or professional, is increasingly outsourced. This results from the development of cloud computing in the past ten years, a paradigm that shifts computing to a utility. Even without realizing it, ... -
Virtual Reality Game for Falconry
( Hamad bin Khalifa University Press (HBKU Press) , 2018 , Conference Paper)Traditions and culture play a major role in our society, as they are the source of a person's pride and honor. One of Qatar's National Vision 2030 pillars that relates to the social development aims at preserving Qatar's ... -
Smart Grid Cybersecurity: Standards and Technical Countermeasures
( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)Cybersecurity in smart grids is of critical importance given the heavy reliance of modern societies on electricity and the recent cyberattacks that resulted in blackouts. The evolution of the legacy electric grid to a ...