• Reasoning about Policies in Security-Aware Service Discovery Using Answer Set Programming 

      Asuncion, Vernon; Khan, Khaled M.; Erradi, Abdelkarim; Alhazbi, Saleh ( World Scientific Publishing Co. Pte Ltd , 2016 , Article)
      In order to enable a secure interaction between dynamically discovered software services and the client's application in a cooperative information system such as service oriented system, one of the pre-requisites is the ...
    • Image stitching system with scanning microscopy for histopathological applications 

      Qidwai, Uvais; Akbar, Muhammad Ali ( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)
      Histopathological analysis of biopsy or surgical specimen is a common clinical practice for diagnostic purposes. Essentially, the process involves slicing the biopsy or surgical sample into very thin slices, placing them ...
    • Real-time robotic avatar control using fuzzy gaze-classification for people with disability 

      Qidwai, Uvais; Shakir, Mohamed; Bahameish, Mariam ( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)
      Robotic control with gaze-classification has been an area of interest for quite some time. In this paper, a novel solution of implementing sensing system with intelligent visualization has been presented. Such a system can ...
    • Monitoring DVT cuffs for long-term operation: A fuzzy approach 

      Qidwai, Uvais; Kamran, Saadat; Al-Sulaiti, Sara; Ahmed, Ghadeer; Hegazy, Asmaa ( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)
      Stroke patients, as well as all those patients who are bed-bound for a long period of time are highly susceptible to deep vein thrombosis (DVT) as secondary complexity. DVT poses more dangers of a loose blood clot obstructing ...
    • MLP Neural Network Based Gas Classification System on Zynq SoC 

      Zhai, Xiaojun; Ali, Amine Ait Si; Amira, Abbes; Bensaali, Faycal ( Institute of Electrical and Electronics Engineers Inc. , 2016 , Article)
      Systems based on wireless gas sensor networks offer a powerful tool to observe and analyze data in complex environments over long monitoring periods. Since the reliability of sensors is very important in those systems, gas ...
    • A new technique for compacting secret key in attribute-based broadcast encryption 

      Canard, Sébastien; Phan, Duong Hieu; Trinh, Viet Cuong ( Springer Verlag , 2016 , Conference Paper)
      Public-key encryption has been generalized to adapt to more and more practical applications. Broadcast encryption, introduced by Fiat and Naor in 1993, aims for applications in pay-TV or satellite transmission and allows ...
    • Design and implementation of a modular ECMO simulator 

      Aldisi, Mohammed; Alsalemi, Abdullah; Alhomsi, Yahya; Ahmed, Ibrahim; Bensaali, Fayçal; ... more authors ( Hamad bin Khalifa University Press (HBKU Press) , 2016 , Article)
      Background: Extracorporeal membrane oxygenation (ECMO) is a high-complexity life-saving procedure riddled with mechanical complications that can place the patient in a critical state where fast and coordinated actions are ...
    • Garbled computation in cloud 

      Wang, Yongge; Malluhi, Qutaibah M.; Khan, Khaled MD ( Elsevier , 2016 , Article)
      With the wide adoption of cloud computing paradigm, it is important to develop appropriate techniques to protect client data privacy in the cloud. Encryption is one of the major techniques that could be used to achieve ...
    • ECG encryption and identification based security solution on the Zynq SoC for connected health systems 

      Zhai, Xiaojun; Ait Si Ali, Amine; Amira, Abbes; Bensaali, Faycal ( Academic Press Inc. , 2017 , Article)
      Connected health is a technology that associates medical devices, security devices and communication technologies. It enables patients to be monitored and treated remotely from their home. Patients' data and medical records ...
    • An Interactive Visualization Web Solution for Electricity Consumption in Qatar 

      Soliman, Engy; Shalaby, Salma; Fetais, Noora ( Institute of Electrical and Electronics Engineers Inc. , 2017 , Conference Paper)
      The amount of raw data related to electricity companies is increasing rapidly with the increase of construction sites, population and Qatar preparation for 2022 world cup. A question arises from this situation is: How can ...
    • Survey of Information Visualization Techniques for Enhancing Visual Analysis 

      Fernandez, Rachael; Fetais, Noora ( Institute of Electrical and Electronics Engineers Inc. , 2017 , Conference Paper)
      Visualization of data helps to transform a problem into a perceptual task that is easier to comprehend. It helps users to perceive patterns from large amount of data in order to make informed decisions. When visualization ...
    • Role updating in information systems using model checking 

      Hu, Jinwei; Khan, Khaled M.; Zhang, Yan; Bai, Yun; Li, Ruixuan ( Springer London , 2017 , Article)
      The role-based access control (RBAC) has significantly simplified the management of users and permissions in information systems. In dynamic environments, systems are constantly undergoing changes, and accordingly, the ...
    • Data confidentiality in cloud-based pervasive system 

      Khan, Khaled M.; Shaheen, Mahboob; Wang, Yongge ( Association for Computing Machinery , 2017 , Conference Paper)
      Data confidentiality and privacy is a serious concern in pervasive systems where cloud computing is used to process huge amount of data such as matrix multiplications typically used in HPC. Due to limited processing ...
    • Prediction of infarction volume and infarction growth rate in acute ischemic stroke 

      Kamran, Saadat; Akhtar, Naveed; Alboudi, Ayman; Kamran, Kainat; Ahmad, Arsalan; ... more authors ( Nature Publishing Group , 2017 , Article)
      The prediction of infarction volume after stroke onset depends on the shape of the growth dynamics of the infarction. To understand growth patterns that predict lesion volume changes, we studied currently available models ...
    • Using thermochromic ink for medical simulations 

      Alsalemi, Abdullah; Aldisi, Mohammed; Alhomsi, Yahya; Ahmed, Ibrahim; Bensaali, Faycal; ... more authors ( Hamad bin Khalifa University Press (HBKU Press) , 2017 , Article)
      Background: In medical simulation and training, blood is used to exhibit its different behaviors in context. In some cases, blood color differential is an imperative visual effect to ensure high-fidelity training and ...
    • Enabling broadcast communications in presence of jamming via probabilistic pairing 

      Pietro, Roberto Di; Oligeri, Gabriele ( Elsevier B.V. , 2017 , Article)
      This paper presents a thorough analysis of Freedom of Speech (FoS): a lightweight, fully distributed, and probabilistic protocol that assures the delivery of a message to be broadcast notwithstanding the presence of a ...
    • Compressive sensing based electronic nose platform 

      Djelouat, Hamza; Ait Si Ali, Amine; Amira, Abbes; Bensaali, Faycal ( Elsevier , 2017 , Article)
      Electronic nose (EN) systems play a significant role for gas monitoring and identification in gas plants. Using an EN system which consists of an array of sensors provides a high performance. Nevertheless, this performance ...
    • Robotic probe positioning system for structural health monitoring 

      Qidwai U.; Ijaz A.; Akbar A. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
      Structural health Monitoring (SHM) is a very critical component for sustainable civil and mechanical structures in modern urban settings. The sky-scrappers and huge bridges in modern metropolis today are essential aspects ...
    • Challenges and Mitigation of Cyber Threat in Automated Vehicle: An Integrated Approach 

      Al Mamun A.; Abdullah Al Mamun M.; Shikfa A. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
      The technological development of automated vehicles opens novel cybersecurity threats and risks for road safety. Increased connectivity often results in increased risks of a cyber-security attacks, which is one of the ...
    • SpiralSRA: A threat-specific security risk assessment framework for the cloud 

      Nhlabatsi A.; Hong J.B.; Kim D.S.; Fernandez R.; Fetais N.; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
      Conventional security risk assessment approaches for cloud infrastructures do not explicitly consider risk with respect to specific threats. This is a challenge for a cloud provider because it may apply the same risk ...