- Home
- Conference Proceedings
- Qatar Foundation Annual Research Conference Proceedings
- Conference Proceeding
Qatar Foundation Annual Research Conference Proceedings Volume 2016 Issue 1
- Conference date: 22-23 Mar 2016
- Location: Qatar National Convention Center (QNCC), Doha, Qatar
- Volume number: 2016
- Published: 21 March 2016
481 - 500 of 656 results
-
-
Analysis of In-band Full-Duplex OFDM Signals Affected by Phase Noise and I/Q Imbalance
Authors: Lutfi Samara, Ozgur Ozdemir, Mohamed Mokhtar, Ridha Hamila and Tamer KhattabThe idea of the simultaneous transmission and reception of data using the same frequency is a potential candidate to be deployed in the next generation wireless communications standard 5G. The In-Band Full-Duplex (IBFD) concept permits to theoretically double the spectral efficiency as well as to reduce the medium access control (MAC) signaling which will improve the overall throughput of a wireless network. However, I Read More
-
-
-
A System for Big Data Analytics over Diverse Data Processing Platforms
Authors: Jorge Quiane, Divy Agrawal, Sanjay Chawla, Ahmed Elmagarmid, Zoi Kaoudi, Mourad Ouzzani, Paolo Papotti, Nan Tang and Mohammed ZakiData analytics is at the core of any organization that wants to obtain measurable value from its growing data assets. Data analytic tasks may range from simple to extremely complex pipelines, such as data extraction, transformation and loading, online analytical processing, graph processing, and machine learning (ML). Following the dictum “one size does not fit all”, academia and industry have embarked on a race of developi Read More
-
-
-
Secure Communications Using Directional Modulation
Authors: Mohammed Hafez, Tamer Khattab, Tarek El-Fouly and Hüseyin ArslanLimitations on the wireless communication resources (i.e., time and frequency) introduces the need for another domain that can help communication systems to match the increasing demand on high data transfer rates and quality of service (QoS). By using multiple antennas. Besides, the widespread use of wireless technology and its ease of access makes the privacy of the information, transferred over the wi Read More
-
-
-
Building a Global Network of Web Observatories to Study the Web: A Case Study in Integrated Health Management
Authors: Wendy Hall, Thanassis Tiropanis, Ramine Tinati and Xin WangThe Web is barely 25 years old but in that time it has changed every aspect of our lives. Because of its sociotechnical rather than purely engineered nature, not only is the Web changing society but also we shape the way the technology evolves. The whole process is inherently co-constituted and as such its evolution is unlike any other system. In order to understand how the Web might evolve in the future - for good or bad - we ne Read More
-
-
-
Internet of Things Security: We're Walking on Eggshells!
By Aref MeddebSince the Internet of Things (IoT) will be entwined with everything we use in our daily life, the consequence of security flaws escalates. Smart objects will govern most of the home appliances and car engines yielding potential disaster scenarios. In this context, successful attacks could lead to chaos and scary scenarios (www.darkreading.com). Unprotected personal information may expose sensitive and embarrassing data t Read More
-
-
-
Lattices are Good for Communication, Security, and Almost Everything
Authors: Joseph Jean Boutros, Nicola di Pietro, Costas N. Georghiades and Kuma P.R. KumarMathematicians considered lattices as early as the first half of the nineteenth century, e.g. Johann Carl Friedrich Gauss and Joseph-Louis Lagrange explored point lattices in small dimensions. After the pioneering work of Hermann Minkowski around 1900, lattices were extensively studied in the twentieth century until engineering applications in the areas of digital communications, data compression, and cryptography were recen Read More
-
-
-
South Asia's Cyber Insecurity: A Tale of Impending Doom
More LessIn the digital era, India's national security has extricably been linked with its cyber security. However, although India has digitalized its governance, economy and daily life on an industrial scale, it has never paid adequate attention to adopt a programme side-by-side to securitize its digitalization plan. Resultantly, not only India's cyber space but also its physical spheres have been exposed and facing constant attacks from its rivals Read More
-
-
-
Role of Training and Supporting Activities in Moderating the Relationship Between R & D and Introducing KM Systems Within SMEs
More LessThis paper presents an abstract of the final phase of an on-going research project aiming at investigating the antecedents and consequences of research and innovating within Lebanese small and medium-sized enterprises (SMEs). The role of training personnel and introducing supporting activities in moderating the relationship between R & D and introducing knowledge management systems within Lebanese small- mediu Read More
-
-
-
A Survey on Sentiment Analysis and Visualization
More LessOnline Social Networks become the medium for a plethora of applications such as targeted advertising and recommendation services, collaborative filtering, behavior modeling and pre- diction, analysis and identification of aggressive behavior, bullying and stalking, cultural trend monitoring, epidemic studies, crowd mood reading and tracking, revelation of terrorist net- works, even political deliberation. They mainly aim to pr Read More
-
-
-
Full-View Coverage Camera Sensor Network (CSN) for Offshore Oil Fields Surveillance
More LessThe United Arab Emirates (UAE) is the eighth largest oil producing country in the world. It has about 800 km of coastline. Beyond the coastline, its territorial water and exclusive economic zone have very rich and extensive marine life and natural resources. Most of the oil and natural gas in the UAE is produced from the offshore oil fields. Maritime oil exploration and transportation has increased more steeply due to the expansio Read More
-
-
-
Classification of Bisyllabic Lexical Stress Patterns Using Deep Neural Networks
Authors: Mostafa Shahin and Beena AhmedBackground and Objectives: As English is a stress-timed language, lexical stress plays an important role in the perception and processing of speech by native speakers. Incorrect stress placement can reduce the intelligibility of the speaker and their ability to communicate more effectively. The accurate identification of lexical stress patterns is thus a key assessment tool of the speaker's pronunciation in applications such as seco Read More
-
-
-
Mobile Sensing of Human Sunlight Exposure in Cities
Authors: Ahmad Al Shami, Weisi Guo and Yimin WangI. Abstract: Despite recent advances in sensor and mobile technology, there is still a lack of an accurate, scalable, and non-intrusive way to knowing how much sunlight we are exposed to. For the first time, we devise a mobile phone software application (SUN BATH), that utilizes a variety of on-board sensors and data sets to accurately predict the sunlight exposure each person is exposed to. The algorithm is able to take into ac Read More
-
-
-
Information Security in Artificial Intelligence: A Study of the possible intersection
Authors: Tagwa Warrag and Khawla Abd Elmajed1. Introduction Artificial Intelligence or A.I attempts to understand intelligent entities, and strives to build ones. And it is obvious that computers with human-level intelligence (or more) would have huge impact in our everyday lives and the future. A student in physics might reasonably feel that all the good ideas have already been taken by Galileo, Newton, Einstein, and the rest, and that it takes many years of study before one can Read More
-
-
-
Patient Center – A Mobile Based Patient Engagement Solution
More LessPatient Engagement's Research results a mobile Application Patient Center to Manage Appointments, Personal Health Records and to avail Emergency Online Healthcare across all hospitals in Patient Center Network. It's Single Mobile App to manage and engage Patients actively in Healthcare across Qatar. Problem Statement: Healthcare trends moving towards Patient Centric Healthcare Model from Hospital Centric Read More
-
-
-
Partition Clustering Techniques for Big LIDAR Dataset
More LessI. Abstract: Smart cities are collecting and producing massive amount of data from various data sources such as local weather stations, LIDAR data, mobile phones sensors, Internet of Things (iOT) etc. To use such large volume of data for potential daily computing benets, it is important to store and analyse such amount of urban data using handy computing resources and al-gorithms. However, this can be problematic due to ma Read More
-
-
-
Understanding Cross-modal Collaborative Information Seeking
Authors: Dena Ahmed Al-Thani and Tony StockmanI. Introduction Studies reveal that often group members collaborate when searching for information even if they were not explicitly asked to collaborate [1]. The activity that involves a group of people engaging in a common information seeking task is called Collaborative Information Seeking (CIS). Over the past few years, CIS research has focused on providing solutions and frameworks to support the process [2]. How Read More
-
-
-
Geography of Solidarity: Spatial and Temporal Patterns
Authors: Noora Alemadi, Heather Marie Leson, Ji Kim Lucas and Javier Borge-HolthoeferWe would like to propose a panel which discusses this paper but includes special guests from the International and Qatar Humanitarian community to talk about the future of humanitarian research in the MENA region. Abstract: In the new era of data abundance, procedures for crisis and disaster response have changed. As relief forces struggle with assistance on the ground, digital humanitarians step in to provide a collec Read More
-
-
-
Detecting And Tracking Attacks in Mobile Edge Computing Platforms
Authors: Abderrahmen Mtibaa, Khaled A. Harras and Hussein AlnuweiriDevice-to-device (d2d) communication has emerged as a solution that promises high bit rates, low delay and low energy consumption which represents the key for novel technologies such as Google Glass, S Beam, and LTE-Direct. Such d2d communication has enabled computational offloading among collaborative mobile devices for a multitude of purposes such as reducing the overall energy, ensuring resource balan Read More
-
-
-
Computational Calculation of Midpoint Potential of Quinones in the A1 Binding Site of the Photosystem I
Authors: Yasser H.A. Hussein, Velautham Sivakumar, Karuppasamy Ganesh and Gary HastingsQuinones are oxidants; colorants; electrophiles and involved in the electron transfer process of important biological functions such as photosynthesis, respiration, phosphorylation etc. In earth, photosynthesis is the main biological process which converts solar energy into chemical energy. By producing oxygen and assimilating carbon dioxide, it supports the existence of virtually all higher life forms. It is driven by tw Read More
-
-
-
Effective High-level Coordination Programming for Decentralized and Distributed Ensembles
Authors: Edmund Lam and Iliano CervesatoProgramming and coordinating decentralized ensembles of computing devices is extremely hard and error-prone. With cloud computing maturing and the emerging trend of embedding computation into mobile devices, the demand for building reliable distributed and decentralized systems is becoming increasingly common and complex. Because of these growing technical challenges, solutions for effective programming and c Read More
-