• A Domain Specific Language for Secure Outsourcing of Computation to the Cloud 

      Nassar, Mohamed; Erradi, Abdelkarim; Malluhi, Qutaibah M. ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)
      Secure outsourcing of computation has gained importance with the proliferation of cloud services. However, existing outsourcing protocol specification languages are mainly suitable for secure multi-party computation. They ...
    • A novel multi-hop body-To-body routing protocol for disaster and emergency networks 

      Ben Arbia, Dhafer; Alam, Muhammad Mahtab; Attia, Rabah; Ben Hamida, Elye ( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)
      In this paper, a new multi-hop routing protocol (called ORACE-Net) for disaster and emergency networks is proposed. The proposed hierarchical protocol creates an ad-hoc network through body-To-body (B2B) communication ...
    • A Practical Universal Consortium Blockchain Paradigm for Patient Data Portability on the Cloud Utilizing Delegated Identity Management 

      Sabir, Abdulbadi; Fetais, Noora ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      This paper presents a blockchain system that exploits the base modular features of the Hyperledger Fabric framework to allow for a new, patient-centric, practical data portability paradigm. The system empowers patients by ...
    • A Service-Oriented Approach for Sensing in the Internet of Things: Intelligent Transportation Systems and Privacy Use Cases 

      Hammoudeh, Mohammad; Epiphaniou, Gregory; Belguith, Sana; Unal, Devrim; Adebisi, Bamidele; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)
      This paper presents a Sensing-as-a-Service run-time Service Oriented Architecture (SOA), called 3SOA, for the development of Internet of Things (IoT) applications. 3SOA aims to allow interoperability among various IoT ...
    • Active Computing Toward 5G Internet of Things 

      Liu, Chunpeng; Meng, Wei Xiao; Li, Cheng; Ma, Maode ( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)
      The Internet of Things (IoT) contains enormous computing resources. How to fully and efficiently use computing power is a very important research issue. This article proposes an active computing (AC) concept toward IoT. ...
    • An Interactive Visualization Web Solution for Electricity Consumption in Qatar 

      Soliman, Engy; Shalaby, Salma; Fetais, Noora ( Institute of Electrical and Electronics Engineers Inc. , 2017 , Conference Paper)
      The amount of raw data related to electricity companies is increasing rapidly with the increase of construction sites, population and Qatar preparation for 2022 world cup. A question arises from this situation is: How can ...
    • Automatic variable reduction 

      Song, Aijuan; Wu, Guohua; Suganthan, P. N.; Pedrycz, Witold ( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)
      A variable reduction strategy (VRS) is an effective method to accelerate the optimization process of evolutionary algorithms (EAs) by simplifying the corresponding optimization problems. Unfortunately, the VRS is manually ...
    • Battery-Induced Load Hiding and Its Utility Consequences 

      Aly, Hussein; Altamimi, Emran; Al-Ali, Abdulaziz; Al-Ali, Abdulla; Malluhi, Qutaibah ( Institute of Electrical and Electronics Engineers Inc. , 2024 , Conference Paper)
      The introduction of smart grids allows utility providers to collect detailed data about consumers, which can be utilized to enhance grid efficiency and reliability. However, this data collection also raises privacy concerns. ...
    • Blockchain technology for healthcare: Enhancing shared electronic health record interoperability and integrity 

      Jabbar, Rateb; Fetais, Noora; Krichen, Moez; Barkaoui, Kamel ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      The Electronic Health Records (EHR) sharing system is the state of art for delivering healthcare. The tools within the system can predict outcomes during the patient's lifetime, monitor how effective are treatments, track ...
    • Can immersive type of Virtual Reality bring EMG pattern changes post facial palsy? 

      Qidwai, Uvais; Ajimsha, M. S. ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)
      The loss of facial expression via facial paralysis is a devastating condition, both functionally and aesthetically. However, given the life-long plasticity of the brain one could assume that recovery could be facilitated ...
    • Challenges and Mitigation of Cyber Threat in Automated Vehicle: An Integrated Approach 

      Al Mamun A.; Abdullah Al Mamun M.; Shikfa A. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
      The technological development of automated vehicles opens novel cybersecurity threats and risks for road safety. Increased connectivity often results in increased risks of a cyber-security attacks, which is one of the ...
    • CloudSafe: A tool for an automated security analysis for cloud computing 

      An S.; Eom T.; Park J.S.; Hong J.B.; Nhlabatsi A.; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)
      Cloud computing has been adopted widely, providing on-demand computing resources to improve performance and reduce operational costs. However, these new functionalities also bring new ways to exploit the cloud computing ...
    • Collaborative Truck-Drone Routing for Contactless Parcel Delivery during the Epidemic 

      Wu, Guohua; Mao, Ni; Luo, Qizhang; Xu, Binjie; Shi, Jianmai; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)
      The COVID-19 pandemic calls for contactless deliveries. To prevent the further spread of the disease and ensure the timely delivery of supplies, this paper investigates a collaborative truck-drone routing problem for ...
    • Data Obfuscation for Privacy and Confidentiality in Cloud Computing 

      Khan, Khaled M.; Shaheen, Mahboob ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)
      This paper proposes a data obfuscation approach in outsourcing matrix multiplication to cloud computing. It is primarily based on splitting the rows and columns of matrices to alter their actual dimension coupled with ...
    • Deep Reservoir Computing Based Random Vector Functional Link for Non-sequential Classification 

      Hu, Minghui; Gao, Ruobin; Suganthan, P. N. ( Institute of Electrical and Electronics Engineers Inc. , 2022 , Conference Paper)
      Reservoir Computing (RC) is well-suited for simpler sequential tasks which require inexpensive, rapid training, and the Echo State Network (ESN) plays a significant role in RC. In this article, we proposed variations of ...
    • Design and Implementation of a Threat-Specific Security Risk Assessment Tool 

      Nhlabatsi, Armstrong; Hussein, Alaa; Fetais, Noora; Khan, Khaled M. ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      Security threats posed to individual cloud computing clients vary depending on their specific security requirements. However, Cloud Providers apply generic security risk assessment approaches which result do not consider ...
    • Distributed interference management using Q-Learning in cognitive femtocell networks: New USRP-based implementation 

      Elsayed M.H.M.; Mohamed A. ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)
      Femtocell networks have become a promising solution in supporting high data rates for 5G systems, where cell densification is performed using the small femtocells. However, femtocell networks have many challenges. One of ...
    • DQN based Blockchain Data Storage in Resource-constrained IoT System 

      Lei, Boyi; Zhou, Jianhong; Ma, Maode; Niu, Xianhua ( Institute of Electrical and Electronics Engineers Inc. , 2023 , Conference Paper)
      Applying blockchain technology in the Internet of Things (IoT) systems to realize massive data storage is a promising technology, which can eliminate the dependence of IoT on central servers and protect data security ...
    • Empirical performance evaluation of QUIC protocol for Tor anonymity network 

      Basyoni, Lamiaa; Erbad, Aiman; Alsabah, Mashael; Fetais, Noora; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)
      Tor's anonymity network is one of the most widely used anonymity networks online, it consists of thousands of routers run by volunteers. Tor preserves the anonymity of its users by relaying the traffic through a number of ...
    • An Enhanced Multi-Phase Stochastic Differential Evolution Framework for Numerical Optimization 

      Abdel-Nabi, Heba; Ali, Mostafa; Daoud, Mohammad; Alazrai, Rami; Awajan, Arafat; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2022 , Conference Paper)
      Real-life problems can be expressed as optimization problems. These problems pose a challenge for researchers to design efficient algorithms that are capable of finding optimal solutions with the least budget. Stochastic ...