KINDI Center for Computing Research: Recent submissions
Now showing items 161-178 of 178
-
Visualization as a mean of big data management: Using Qatar's electricity consumption data
( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)Visualization as a mean of big data management is the new century revolution. Managing data has become a great challenge today, as the amount of raw data size is increasing rapidly. For data like electricity consumption, ... -
Short survey of techniques for visualizing events recorded in logs
( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)Nowadays, data is being generated in large volumes and the users are left with a staggering amount of textual data that needs to be transformed into information to derive some knowledge from it. However, transforming and ... -
Using Sparse Matrices to Prevent Information Leakage in Cloud Computing
( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)Cloud computing represents the promise of outsourcing of scientific computing such as matrix multiplication. However, this can introduce new vulnerabilities such as information leakage. Cloud server intentionally or ... -
Smart Grid Cybersecurity: Standards and Technical Countermeasures
( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)Cybersecurity in smart grids is of critical importance given the heavy reliance of modern societies on electricity and the recent cyberattacks that resulted in blackouts. The evolution of the legacy electric grid to a ... -
Virtual Reality Glove for Falconry
( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)This project is a virtual reality based game. Basically it's about hunting pray-using different types of falcons. And the main idea behind this project is to give more knowledge to the player about a cultural game in more ... -
Virtual Reality Falconry: Simulation of a Traditional Qatari Sport Methodology and Techniques
( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)This paper talks about the process of developing a game called 'Virtual Reality Falconry'. The game is a simulation of the traditional Qatari hunting sport. Falconry refers to the process of hunting wild preys in their ... -
Challenges and Mitigation of Cyber Threat in Automated Vehicle: An Integrated Approach
( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)The technological development of automated vehicles opens novel cybersecurity threats and risks for road safety. Increased connectivity often results in increased risks of a cyber-security attacks, which is one of the ... -
Dynamic security metrics for measuring the effectiveness of moving target defense techniques
( Elsevier Ltd , 2018 , Article)Moving Target Defense (MTD) utilizes granularity, flexibility and elasticity properties of emerging networking technologies in order to continuously change the attack surface. There are many different MTD techniques proposed ... -
Deep learning for detection of routing attacks in the internet of things
( Atlantis Press , 2018 , Article)Cyber threats are a showstopper for Internet of Things (IoT) has recently been used at an industrial scale. Network layer attacks on IoT can cause significant disruptions and loss of information. Among such attacks, routing ... -
Robotic probe positioning system for structural health monitoring
( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)Structural health Monitoring (SHM) is a very critical component for sustainable civil and mechanical structures in modern urban settings. The sky-scrappers and huge bridges in modern metropolis today are essential aspects ... -
A Practical and Scalable Tool to Find Overlaps between Sequences
( Hindawi , 2015 , Article)The evolution of the next generation sequencing technology increases the demand for efficient solutions, in terms of space and time, for several bioinformatics problems. This paper presents a practical and easy-to-implement ... -
FastRNABindR: Fast and Accurate Prediction of Protein-RNA Interface Residues
( Public Library of Science (PLoS) , 2016 , Article)A wide range of biological processes, including regulation of gene expression, protein synthesis, and replication and assembly of many viruses are mediated by RNA-protein interactions. However, experimental determination ... -
Empowering users of cloud computing on data confidentiality
( IEEE , 2014 , Conference Paper)Cloud networking is an integral part of interconnected data centres operated in cloud environment. Cloud users heavily rely on cloud networking to transmit to and receive data from data centres. In this context, we explore ... -
Using the Sadakane compressed suffix tree to solve the all-pairs suffix-prefix problem
( Hindawi , 2014 , Article)The all-pairs suffix-prefix matching problem is a basic problem in string processing. It has an application in the de novo genome assembly task, which is one of the major bioinformatics problems. Due to the large size of ... -
The similarity-aware relational intersect database operator
( Springer International Publishing , 2014 , Conference Paper)Identifying similarities in large datasets is an essential operation in many applications such as bioinformatics, pattern recognition, and data integration. To make the underlying database system similarity-aware, the core ... -
Assessing the effects of data selection and representation on the development of reliable E. coli sigma 70 promoter region predictors
( Public Library of Science , 2015 , Article)As the number of sequenced bacterial genomes increases, the need for rapid and reliable tools for the annotation of functional elements (e.g., transcriptional regulatory elements) becomes more desirable. Promoters are the ... -
Parallelizing exact motif finding algorithms on multi-core
( Springer Science+Business Media , 2014 , Article)The motif finding problem is one of the important and challenging problems in bioinformatics. A variety of sequential algorithms have been proposed to find exact motifs, but the running time is still not suitable due to ... -
CloudFlow: A data-aware programming model for cloud workflow applications on modern HPC systems
( Elsevier , 2015 , Article)Traditional High-Performance Computing (HPC) based big-data applications are usually constrained by having to move large amount of data to compute facilities for real-time processing purpose. Modern HPC systems, represented ...