Information Intelligence: Recent submissions
Now showing items 61-80 of 98
-
Breath Analysis for the in Vivo Detection of Diabetic Ketoacidosis
( American Chemical Society , 2022 , Article)Human breath analysis of volatile organic compounds has gained significant attention recently because of its rapid and noninvasive potential to detect various metabolic diseases. The detection of ketones in the breath and ... -
Real-Time Scheduling for Electric Vehicles Charging/Discharging Using Reinforcement Learning
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference)With the increase in Electric Vehicles (EVs) penetration, their charging needs form an additional burden on the grid. Thus, charging coordination is necessary for safe and efficient EV use. The scheduling of EVs is especially ... -
Virtual Reality Game for Falconry
( Hamad bin Khalifa University Press (HBKU Press) , 2018 , Conference)Traditions and culture play a major role in our society, as they are the source of a person's pride and honor. One of Qatar's National Vision 2030 pillars that relates to the social development aims at preserving Qatar's ... -
SLiFi: Exploiting Visible Light Communication VLC to Authenticate WiFi Access Points
( Hamad bin Khalifa University Press (HBKU Press) , 2018 , Conference)This work presents an effective and efficient solution (SLiFi) to the evil twin attack in wireless networks. The evil twin is a rogue Wifi Access Point (AP) that pretends to be an authentic one by using the same network ... -
Image Stitching System With Scanning Microscopy for Histopathological Applications
( Hamad bin Khalifa University Press (HBKU Press) , 2018 , Conference)Histopathological analysis of biopsy or surgical specimen is a common clinical practice for diagnostic purposes. Essentially, the process involves slicing the biopsy or surgical sample into very thin slices, placing them ... -
A new technique for compacting secret key in attribute-based broadcast encryption
( Springer Verlag , 2016 , Conference)Public-key encryption has been generalized to adapt to more and more practical applications. Broadcast encryption, introduced by Fiat and Naor in 1993, aims for applications in pay-TV or satellite transmission and allows ... -
MLP Neural Network Based Gas Classification System on Zynq SoC
( Institute of Electrical and Electronics Engineers Inc. , 2016 , Article)Systems based on wireless gas sensor networks offer a powerful tool to observe and analyze data in complex environments over long monitoring periods. Since the reliability of sensors is very important in those systems, gas ... -
Monitoring DVT cuffs for long-term operation: A fuzzy approach
( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference)Stroke patients, as well as all those patients who are bed-bound for a long period of time are highly susceptible to deep vein thrombosis (DVT) as secondary complexity. DVT poses more dangers of a loose blood clot obstructing ... -
Real-time robotic avatar control using fuzzy gaze-classification for people with disability
( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference)Robotic control with gaze-classification has been an area of interest for quite some time. In this paper, a novel solution of implementing sensing system with intelligent visualization has been presented. Such a system can ... -
Image stitching system with scanning microscopy for histopathological applications
( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference)Histopathological analysis of biopsy or surgical specimen is a common clinical practice for diagnostic purposes. Essentially, the process involves slicing the biopsy or surgical sample into very thin slices, placing them ... -
Reasoning about Policies in Security-Aware Service Discovery Using Answer Set Programming
( World Scientific Publishing Co. Pte Ltd , 2016 , Article)In order to enable a secure interaction between dynamically discovered software services and the client's application in a cooperative information system such as service oriented system, one of the pre-requisites is the ... -
Group owner election in Wi-Fi direct
( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference)Wi-Fi Direct is a new protocol that standardizes the direct communication between Wi-Fi enabled mobile devices without requiring an access point. The specification proposes enhanced peer-to-peer functions to be supported ... -
Green operator cooperation for radio frequency transmission minimization
( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference)The increasing demand for reliable mobile services with faster communications speed requires high capital investment in the radio access networks. This leads to enormous energy consumption, high operational costs (OPEX), ... -
A novel multi-hop body-To-body routing protocol for disaster and emergency networks
( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference)In this paper, a new multi-hop routing protocol (called ORACE-Net) for disaster and emergency networks is proposed. The proposed hierarchical protocol creates an ad-hoc network through body-To-body (B2B) communication ... -
An efficient instance hiding scheme
( Association for Computing Machinery , 2016 , Conference)Delegating computation, which is applicable to many practical contexts such as cloud computing or pay-TV system, concerns the task where a computationally weak client wants to securely compute a very complex function f on ... -
ECG encryption and identification based security solution on the Zynq SoC for connected health systems
( Academic Press Inc. , 2017 , Article)Connected health is a technology that associates medical devices, security devices and communication technologies. It enables patients to be monitored and treated remotely from their home. Patients' data and medical records ... -
Role updating in information systems using model checking
( Springer London , 2017 , Article)The role-based access control (RBAC) has significantly simplified the management of users and permissions in information systems. In dynamic environments, systems are constantly undergoing changes, and accordingly, the ... -
Data confidentiality in cloud-based pervasive system
( Association for Computing Machinery , 2017 , Conference)Data confidentiality and privacy is a serious concern in pervasive systems where cloud computing is used to process huge amount of data such as matrix multiplications typically used in HPC. Due to limited processing ... -
Enabling broadcast communications in presence of jamming via probabilistic pairing
( Elsevier B.V. , 2017 , Article)This paper presents a thorough analysis of Freedom of Speech (FoS): a lightweight, fully distributed, and probabilistic protocol that assures the delivery of a message to be broadcast notwithstanding the presence of a ... -
An Interactive Visualization Web Solution for Electricity Consumption in Qatar
( Institute of Electrical and Electronics Engineers Inc. , 2017 , Conference)The amount of raw data related to electricity companies is increasing rapidly with the increase of construction sites, population and Qatar preparation for 2022 world cup. A question arises from this situation is: How can ...