• Blockchain technology for healthcare: Enhancing shared electronic health record interoperability and integrity 

      Jabbar, Rateb; Fetais, Noora; Krichen, Moez; Barkaoui, Kamel ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      The Electronic Health Records (EHR) sharing system is the state of art for delivering healthcare. The tools within the system can predict outcomes during the patient's lifetime, monitor how effective are treatments, track ...
    • Breath Analysis for the in Vivo Detection of Diabetic Ketoacidosis 

      Shabil Sha, Mizaj; Maurya, Muni Raj; Shafath, Sadiyah; Cabibihan, John-John; Al-Ali, Abdulaziz; ... more authors ( American Chemical Society , 2022 , Article)
      Human breath analysis of volatile organic compounds has gained significant attention recently because of its rapid and noninvasive potential to detect various metabolic diseases. The detection of ketones in the breath and ...
    • Can immersive type of Virtual Reality bring EMG pattern changes post facial palsy? 

      Qidwai, Uvais; Ajimsha, M. S. ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)
      The loss of facial expression via facial paralysis is a devastating condition, both functionally and aesthetically. However, given the life-long plasticity of the brain one could assume that recovery could be facilitated ...
    • Challenges and Mitigation of Cyber Threat in Automated Vehicle: An Integrated Approach 

      Al Mamun A.; Abdullah Al Mamun M.; Shikfa A. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
      The technological development of automated vehicles opens novel cybersecurity threats and risks for road safety. Increased connectivity often results in increased risks of a cyber-security attacks, which is one of the ...
    • A comprehensive review of the deep learning-based tumor analysis approaches in histopathological images: segmentation, classification and multi-learning tasks 

      Abdel-Nabi, Heba; Ali, Mostafa; Awajan, Arafat; Daoud, Mohammad; Alazrai, Rami; ... more authors ( Springer , 2023 , Other)
      Medical Imaging has become a vital technique that has been embraced in the diagnosis and treatment process of cancer. Histopathological slides, which microscopically examine the suspicious tissue, are considered the golden ...
    • Compressive sensing based electronic nose platform 

      Djelouat, Hamza; Ait Si Ali, Amine; Amira, Abbes; Bensaali, Faycal ( Elsevier , 2017 , Article)
      Electronic nose (EN) systems play a significant role for gas monitoring and identification in gas plants. Using an EN system which consists of an array of sensors provides a high performance. Nevertheless, this performance ...
    • Cybersecurity for next generation healthcare in Qatar 

      Zubair, Mohammad; Unal, Devrim; Al-Ali, Abdulla; Reimann, Thomas; Alinier, Guillaume ( Hamad bin Khalifa University Press (HBKU Press) , 2021 , Article)
      Background: IoMT (Internet of Medical Things) devices (often referred to IoMT domain) have the potential to quickly diagnose and monitor patients outside the hospital by transmitting information through the cloud domain ...
    • Data confidentiality in cloud-based pervasive system 

      Khan, Khaled M.; Shaheen, Mahboob; Wang, Yongge ( Association for Computing Machinery , 2017 , Conference Paper)
      Data confidentiality and privacy is a serious concern in pervasive systems where cloud computing is used to process huge amount of data such as matrix multiplications typically used in HPC. Due to limited processing ...
    • Data Obfuscation for Privacy and Confidentiality in Cloud Computing 

      Khan, Khaled M.; Shaheen, Mahboob ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)
      This paper proposes a data obfuscation approach in outsourcing matrix multiplication to cloud computing. It is primarily based on splitting the rows and columns of matrices to alter their actual dimension coupled with ...
    • Deep learning for detection of routing attacks in the internet of things 

      YAVUZ, Furkan Yusuf; Unal, Devrim; GÜL, Ensar ( Atlantis Press , 2018 , Article)
      Cyber threats are a showstopper for Internet of Things (IoT) has recently been used at an industrial scale. Network layer attacks on IoT can cause significant disruptions and loss of information. Among such attacks, routing ...
    • Design and implementation of a modular ECMO simulator 

      Aldisi, Mohammed; Alsalemi, Abdullah; Alhomsi, Yahya; Ahmed, Ibrahim; Bensaali, Fayçal; ... more authors ( Hamad bin Khalifa University Press (HBKU Press) , 2016 , Article)
      Background: Extracorporeal membrane oxygenation (ECMO) is a high-complexity life-saving procedure riddled with mechanical complications that can place the patient in a critical state where fast and coordinated actions are ...
    • Detection of partial seizure: An application of fuzzy rule system for wearable ambulatory systems 

      Shakir, Mohamed; Malik, Aamir Saeed; Kamel, Nidal; Qidwai, Uvais ( IEEE , 2014 , Conference Paper)
      Electroencephalography (EEG) plays an intelligent role, especially EEG based health diagnosis of brain disorder, as well as brain-computer interface (BCI) applications. One such research field is related to epilepsy. The ...
    • Distributed interference management using Q-Learning in cognitive femtocell networks: New USRP-based implementation 

      Elsayed M.H.M.; Mohamed A. ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)
      Femtocell networks have become a promising solution in supporting high data rates for 5G systems, where cell densification is performed using the small femtocells. However, femtocell networks have many challenges. One of ...
    • Dynamic security metrics for measuring the effectiveness of moving target defense techniques 

      Hong J.B.; Enoch S.Y.; Kim D.S.; Nhlabatsi A.; Fetais N.; ... more authors ( Elsevier Ltd , 2018 , Article)
      Moving Target Defense (MTD) utilizes granularity, flexibility and elasticity properties of emerging networking technologies in order to continuously change the attack surface. There are many different MTD techniques proposed ...
    • ECG encryption and identification based security solution on the Zynq SoC for connected health systems 

      Zhai, Xiaojun; Ait Si Ali, Amine; Amira, Abbes; Bensaali, Faycal ( Academic Press Inc. , 2017 , Article)
      Connected health is a technology that associates medical devices, security devices and communication technologies. It enables patients to be monitored and treated remotely from their home. Patients' data and medical records ...
    • Embedded wearable EEG seizure detection in ambulatory state 

      Shakir, Mohamed; Malik, Aamir Saeed; Kamel, Nidal; Qidwai, Uvais ( UK Simulation Society , 2014 , Article)
      This paper describes a classification method is presented using a Fuzzy System to detect the occurrences of Partial Seizures from Epilepsy data, which can be implemented in any embedded system as a wearable detection system. ...
    • Enabling broadcast communications in presence of jamming via probabilistic pairing 

      Pietro, Roberto Di; Oligeri, Gabriele ( Elsevier B.V. , 2017 , Article)
      This paper presents a thorough analysis of Freedom of Speech (FoS): a lightweight, fully distributed, and probabilistic protocol that assures the delivery of a message to be broadcast notwithstanding the presence of a ...
    • Ensemble deep learning: A review 

      Ganaie, M. A.; Hu, Minghui; Malik, A. K.; Tanveer, M.; Suganthan, P. N. ( Elsevier Ltd , 2022 , Other)
      Ensemble learning combines several individual models to obtain better generalization performance. Currently, deep learning architectures are showing better performance compared to the shallow or traditional models. Deep ...
    • Evaluation of Loss Functions for Segmentation of Corneal Nerves 

      Salahuddin, Tooba; Qidwai, Uvais ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)
      Corneal confocal microscopy (CCM) has been advocated as a non-invasive technique for objective diagnosis of very early neuropathy in patients by scanning the corneal subbasal nerve plexus. The obtained images provide a ...
    • Evolutionary Multitask Optimization: Fundamental research questions, practices, and directions for the future 

      Osaba, Eneko; Del Ser, Javier; Suganthan, Ponnuthurai N. ( Elsevier B.V. , 2022 , Article)
      Transfer Optimization has gained a remarkable attention from the Swarm and Evolutionary Computation community in the recent years. It is undeniable that the concepts underlying Transfer Optimization are formulated on solid ...