- Home
- Conference Proceedings
- Qatar Foundation Annual Research Conference Proceedings
- Conference Proceeding
Qatar Foundation Annual Research Conference Proceedings Volume 2018 Issue 3
- Conference date: 19-20 Mar 2018
- Location: Qatar National Convention Center (QNCC), Doha, Qatar
- Volume number: 2018
- Published: 15 March 2018
1 - 50 of 77 results
-
-
Towards a multimodal classification of cultural heritage
Authors: Abdelhak Belhi and Abdelaziz BourasThe humanity has always learned from the previous experiences and thus for many reasons. The national heritage proves to be a great way to discover and access a nation's history. As a result, these priceless cultural items have a special attention and requires a special care. However, Since the wide adoption of new digital technologies, documenting, storing, and exhibiting cultural heritage assets became more afforda Read More
-
-
-
Education/Industry Collaboration Modeling: An Ontological Approach
Authors: Houssem Gasmi and Abdelaziz BourasOne of the main suppliers of the workforce for the engineering industry and the economy in general is the higher education sector. The higher education sector is consistently being challenged by the fast evolving industry and hence it is under constant pressure to fulfill the industry's ever-changing needs. It needs to adapt its academic curricula to supply the industry with students who have update-to-date and relevant co Read More
-
-
-
Framework of experiential learning to enhance student engineering skill
Authors: Fadi Ghemri, Abdelaziz Bouras and Houssem GasmiIn this research work, we propose a framework of experiential learning to enhance student work skills and experience. This research main to contribute to the development and expansion of local industry, through the conduct of long-term fundamental research that contributes to the science base and understanding needs of national economy, through industrial by providing an adapted method to enhance the teachin Read More
-
-
-
UAVbased flying IoT Gateway for Delay Tolerant Data Transfer
Authors: Hamid Menouar, Ahmed Abuzrara and Nour AlsahanMany statistics show the number of connected devices (Internet of Things; IoT) worldwide to grow drastically in the next few years, to exceed 30 billion just by 2020. All these devices need to be connected to the internet, to establish tow ways communication with the backend applications. The list of applications and services that can be enabled by using IoT can be endless, covering different areas such as smart cities, smart ho Read More
-
-
-
Measurement and Analysis of Bitcoin Transactions of Ransomware
Authors: Husam Basil Al Jawaheri, Mashael Al Sabah and Yazan BoshmafRecently, more than 100,000 cases for ransomware attacks were reported in the Middle East, Turkey and Africa region [2]. Ransomware is a malware category that limits the access of users to their files by encrypting them. This malware requires victims to pay in order to get access to the decryption keys. In order to remain anonymous, ransomware requires victims to pay through the Bitcoin network. However, due to Read More
-
-
-
Artificial Intelligence and Social Media to Aid Disaster Response and Management
Authors: Muhammad Imran, Firoj Alam, Ferda Ofli and Michael AupetitExtended AbstractPeople increasingly use social media such as Facebook and Twitter during disasters and emergencies. Research studies have demonstrated the usefulness of social media information for a number of humanitarian relief operations ranging from situational awareness to actionable information extraction. Moreover, the use of social media platforms during sudden-onset disasters could potentially bridge th Read More
-
-
-
Fault Tolerant Control of Multiple Mobile Robots
Authors: Nader Meskin and Parisa YazdjerdiRecently, usage of autonomous wheeled mobile robots (WMRs) is significantly increased in different industries such as manufacturing, health care and military and there exist stringent requirements for their safe and reliable operation in industrial/commercial environments. In addition, autonomous multi-agent mobile robot systems in which specific numbers of robots are cooperating with each other to accomplish a tas Read More
-
-
-
Wearable V2X solution for Children and Vulnerable Road Users Safety on the Road
Authors: Hamid Menouar, Nour Alsahan and Mouhamed Ben BrahimAccording to Energy Technology Perspectives 2014, there are approximately 900 million light duty vehicles (not counting two- and three-wheelers) today, and that number will be doubled by 2050 to reach 2 billion. Such a considerable increase will bring-in further challenges for road safety and traffic efficiency. Motor vehicle crashes are the leading cause of death for children and young adults in the United States, with an annual Read More
-
-
-
Evaluation of Hardware Accelerators for Lattice Boltzmann based Aneurysm Blood Flow Measurement
Clipping is a potential treatment for ruptured/unruptured brain aneurysm patients. In order to determine the profitable treatment and also clip's location, surgeons need to have the measurements such as velocity and blood pressure in and around the aneurysm.Typically, simulating the blood fluid and finding the corresponding measurements require heavy computation resources. The Lattice Boltzmann (LB) method is the con Read More
-
-
-
Effective Realtime Tweet Summarization
Authors: Reem Suwaileh and Tamer ElsayedTwitter has been developed as an immense information creation and sharing network through which users post information. Information could vary from the world»s breaking news to other topics such as sports, science, religion, and even personal daily updates. Although a user would regularly check her Twitter timeline to stay up-to-date on her topics of interest, it is impossible to cope with manual tracking of those topics while t Read More
-
-
-
A Reconfigurable Multipurpose SoC Mobile Platform for metal detection
Authors: Omran Al Rshid Abazeed, Naram Mhaisen, Youssef Al-Hariri, Naveed Nawaz and Abbes AmiraBackground and Objectives One of the key problems in mobile robotics is the ability to understand and analyze the surrounding environment in a useful way. This is especially important in dangerous applications where human involvement should be avoided. A clear example of employing the robots in dangerous applications is mine detection which is mostly done through metal detection techniques. Among the various types o Read More
-
-
-
MultiObjective SearchBased Requirements Traceability Recovery for Adaptive Systems
Authors: Mohamed Salah Hamdi, Adnane Ghannem and Hany AmmarComplex adaptive systems exhibit emergent behavior. This type of behavior occurs in volatile environments involving cyber-physical systems, such as those aimed at smart cities operations. Adaptive systems’ maintenance aims at improving their performance by dealing with the treatment of continuous and frequently changing requirements. Adaptive systems’ behavior requires therefore up-to-date requirements traceability. Read More
-
-
-
SLiFi: Exploiting Visible Light Communication VLC to Authenticate WiFi Access Points
Authors: Hafsa Amin, Faryal Asadulla, Aisha Jaffar, Gabriele Oligeri and Mashael Al-SabahThis work presents an effective and efficient solution (SLiFi) to the evil twin attack in wireless networks. The evil twin is a rogue Wifi Access Point (AP) that pretends to be an authentic one by using the same network configuration, including the (i) Service Set Identifier (SSID), (ii) the communication channel, and finally (iii) the MAC address of the purported AP. The evil twin is a trap set-up by an adversary willing to eav Read More
-
-
-
QEvents: RealTime Recommendation of Neighboring Events
Authors: Heba Hussein, Sofiane Abbar and Monishaa ArulalanTechnology always seeks to improve the little details in our lives for a faster and a more efficient life-pace. One of these little problems we face in our daily lives is finding relevant events. For example you visit a place like Katara with your kids and you spend your time in vain looking for a fun event, and after you leave the venue a friend of yours tells you about this interesting “Henna and face painting workshop organized in b Read More
-
-
-
Driver Drowsiness Detection Study using Heart Rate Variability analysis in Virtual Reality Environment
Introduction Mobility and road safety is one of the grand challenges that Qatar is facing during the last decade. There are many ways to enhance the road safety. One way is to characterize the factors contributing to the road fatalities. According to Transport Accident Commission, about 20% of fatal road accidents are caused by driver fatigue [1]. As reported by Monthly Qatar Statistics in [2], the total number of deaths for the Read More
-
-
-
Scientific Data Visualization in an Immersive and Collaborative Environment
More LessTremendous interest in visualizing massive datasets has promoted tiled-display wall systems that offer an immersive and collaborative environment with an extremely high-resolution. To achieve an efficient visualization, the rendering process should be parallelized and distributed among multiple nodes. The Data Observatory at Imperial College London has a unique setup consisting of 64 screens powered by 32 machines providing Read More
-
-
-
Virtual Reality Game for Falconry
Authors: Noora Fetais, Sarah Lotfi Kharbach, Nour Moslem Haj Ahmad and Salma Salah AhmadTraditions and culture play a major role in our society, as they are the source of a person's pride and honor. One of Qatar's National Vision 2030 pillars that relates to the social development aims at preserving Qatar's national heritage. Thus, from this perspective, an innovative idea to use Virtual Reality (VR) technology to preserve traditions evolved. The game simulates the genuine Qatari Hunting Sport, which is considere Read More
-
-
-
Robotic Probe Positioning System for Structural Health Monitoring
Authors: Ali Ijaz, Muhammad Ali Akbar and Uvais QidwaiStructural health Monitoring (SHM) is a very critical component for sustainable civil and mechanical structures in modern urban settings. The sky-scrappers and huge bridges in modern metropolis today are essential aspects of the prosperity and development of a country but at the same time they present a great challenge in terms of maintaining and sustaining the structures in a good health. Due to the complex designs of the Read More
-
-
-
Coordinated Robotic System for Civil Structural Health Monitoring
Authors: Muhammad Ali Akbar and Uvais Ahmed QidwaiWith the recent advances in sensors, robotics, unmanned aerial vehicles, communication, and information technologies, it is now feasible to move towards the vision of ubiquitous cities, where virtually everything throughout the city is linked to an information system through technologies such as wireless networking and radio-frequency identification (RFID) tags, to provide systematic and more efficient management of urban sy Read More
-
-
-
Visualization of Wearable Data and Biometrics for Analysis and Recommendations in Childhood Obesity
Authors: Michael Aupetit, Luis Fernandez-Luque, Meghna Singh, Mohamed Ahmedna and Jaideep SrivastavaObesity is one of the major health risk factors behind the rise of non-communicable conditions. Understanding the factors influencing obesity is very complex since there are many variables that can affect the health behaviors leading to it. Nowadays, multiple data sources can be used to study health behaviors, such as wearable sensors for physical activity and sleep, social media, mobile and health data. In this paper we Read More
-
-
-
Variable Message Sign strategies for Congestion Warning on Motorways
Authors: Wael Khaleel Mohammad Alhajyaseen, Nora Reinolsmann, Kris Brijs and Tom Brijs1. Introduction Motorways are the safest roads by design and regulation. Still, motorways in the European Union accounted for nearly 27,500 fatalities from 2004 to 2013 (Adminaite, Allsop, & Jost, 2015). The likelihood of the occurrence of rear-end collisions increases with higher traffic densities. This is alarming considering the proportion of traffic on motorways has increased over the past decade (Adminaite et al., 2015 Read More
-
-
-
Qatar Meteorology Department Security Enhancement Recommendations
More LessThe Internet has become part of almost every organizational culture where security threats increase with the increase use of the Internet. Therefore, security practice has become increasingly important for almost every organization where is the same case of the Qatar Meteorology Department (QMD) in the state of Qatar. The aim of this research is to evaluate the current security level of the QMD by examining the Read More
-
-
-
A Reverse MultipleChoice Based mLearning System
Authors: AbdelGhani Karkar, Indu Anand and Lamia DjoudiMobile learning can help in accelerating the students’ learning strengths and comprehension skills. Due to the immediacy and effectiveness of mobile learning, many mobile educational systems with diverse assessments techniques have been proposed. However, we observe a common limitation in existing assessments techniques, such as, the learner cannot correlate question and answer choices or freely adapt answer Read More
-
-
-
Tackling item coldstart in recommender systems using word embedding
By Manoj ReddyWe live in the digital age where most of our activities and services are carried out over the internet. Items such as music, movies, products etc. are being consumed over the web by millions of users. The number of such items is large enough that it is impossible for a user to experience everything. This is where recommender systems come into play. Recommender systems are employed to play a crucial role of filtering Read More
-
-
-
Analyze Unstructured Data Patterns for Conceptual Representation
Authors: Aboubakr Aqle, Dena Al-Thani and Ali JaouaOnline news media provides aggregated news and stories from different sources all over the world and up-to-date news coverage. The main goal of this study is to find a solution that is considered as a homogeneous source for the news and to represent the news in a new conceptual framework. Furthermore, the user can easily and quickly find different updated news in a fast way through the designed interface. The Read More
-
-
-
A Machine Learning Approach for Detecting Mental Stress Based on Biomedical Signal Processing
Authors: Sami Elzeiny and Dr. Marwa QaraqeMental stress occurs when a person perceives abnormal demands or pressures that influence the sense of well-being. These high demands sometimes exceed human capabilities to cope with. Stressors such as workload, inflexible working hours, financial problem, or handling more than one task can cause work-related stress which in turn leads to less productive employees. Lost productivity costs global economy approxi Read More
-
-
-
Inhomogeneous Underwater Visible Light Communications: Performance Evaluation
Authors: Noha Hassan Anous, Mohamed Abdallah and Khalid QaraqeIn this work, an underwater visible light communications (VLC) vertical link performance is evaluated. Underwater environment is known of its inhomogeneous nature versus depth. A mathematical model for the received power (Pr) is derived and bit error rates (BER) are computed under different underwater conditions. A numerical example is given for illustration of the deduced model. Our results suggest that an optimu Read More
-
-
-
Framework of experiential learning to enhance student engineering skill
Authors: Fadi Ghemri, Houssem Fadi and Abdelaziz BourasIn this research work, we propose a framework of experiential learning to enhance student work skills and experience. This research main to contribute to the development and expansion of local industry, through the conduct of long-term fundamental research that contributes to the science base and understanding needs of national economy through industrial by providing an adapted method, enhance the teaching c Read More
-
-
-
QCRI's Live Speech Translation System
Authors: Fahim Dalvi, Yifan Zhang, Sameer Khurana, Nadir Durrani, Hassan Sajjad, Ahmed Abdelali, Hamdy Mubarak, Ahmed Ali and Stephan VogelIn this work, we present Qatar Computing Research Institute»s live speech translation system. Our system works with both Arabic and English. It is designed using an array of modern web technologies to capture speech in real time, and transcribe and translate it using state-of-the-art Automatic Speech Recognition (ASR) and Machine Translation (MT) systems. The platform is designed to be useful in a wide variety of situations like Read More
-
-
-
Humans and bots in controversial environments: A closer look at their interactions
Authors: Reham Al Tamime, Richard Giordano and Wendy HallWikipedia is the most influential popular information source on the Internet, and is ranked as the fifth most visited website [1] (Alexa, 2017). The English-language Wikipedia is a prominent source of online health information compared to other providers such as MedlinePlus and NHS Direct (Laurent and Vickers, 2009). Wikipedia has challenged the way that traditional medical encyclopaedia knowledge is built by creating an Read More
-
-
-
Nonorthogonal Multiple Access for Visible Light Communications: Complementary Technology Enabling High Data Rate Services for 5G Networks
Authors: Galymzhan Nauryzbayev and Mohamed AbdallahIntroduction: The last decades have been remarkably noticed by an explosive growth of myriad applications in wireless communications, which become an inevitable part of everyday life. Apparently, such services can be characterized by high data content and consequently require high data rates. With respect to the fundamentals of information theory, the data rate at which information can be delivered to the receiver Read More
-
-
-
Deep Learning for Traffic Analytics Application FIFA2022
Authors: Abdelkader Baggag, Abdulaziz Yousuf Al-Homaid, Tahar Zanouda and Michael AupetitAs urban data keeps getting bigger, deep learning is coming to play a key role in providing big data predictive analytics solutions. We are interested in developing a new generation of deep learning based computational technologies that predict traffic congestion and crowd management. In this work, we are mainly interested in efficiently predicting future traffic with high accuracy. The proposed deep learning solution allows the r Read More
-
-
-
Virtual Reality Glove for Falconry
More LessFalconry hunting is an Arabic traditional sport and has great significance in Qatari society, as it is a major part of their culture. Falconry is about hunting small birds or animals, by using different types of falcons. The falconry in virtual reality (VR) can preserve Qatari culture by making the sport easy to access for all stream of people. The main idea behind this project is to educate and experience real time falconry to the p Read More
-
-
-
Enabling Efficient Secure Multiparty Computation Development in ANSI C
Authors: Ahmad Musleh, Soha Hussein, Khaled M. Khan and Qutaibah M. MalluhiSecure Multi-Party Computation (SMPC) enables parties to compute a pub- lic function over private inputs. A classical example is the millionaires problem, where two millionaires want to figure out who is wealthier without revealing their actual wealth to each other. The insight gained from the secure computa- tion is nothing more than what is revealed by the output (in this case, who was wealthier but not the actual value of th Read More
-
-
-
Demonstration of DRS: Dynamic Resource Scheduler for Distributed Stream Processing
By Yin YangWe propose to demonstrate DRS, a novel dynamic resource scheduler module for distributed stream processing engines (SPEs). The main idea is to model the system response time as a function of input characteristics, including the volume, velocity, and distribution statistics of the streaming data. Based on this model, DRS decides on the amount of resource to allocate to each streaming operator to the system, so that (i) the Read More
-
-
-
Integration of Multisensor data and Deep Learning for realtime Occupancy Detection for Building Environment Control Strategies
Authors: Dabeeruddin Syed and Amine BermakOne of the most prominent areas of energy consumption in residential units is for heating, ventilation and air-conditioning (HVAC) systems. The conventional systems for HVAC depend on the wired thermostats that are deployed at fixed locations and hence, are not convenient and do not respond to the dynamic nature of the thermal envelope of the buildings. Moreover, it is important to note that the distribution of the spa Read More
-
-
-
Challenges and Success in setting up 3D Printing Lab integrated with EMR and VNA in a Tertiary care hospital in Middle East
Authors: Zafar Iqbal, Sofia Ferreira, Avez Rizvi, Smail Morsi, Fareed Ahmed and Deepak KauraIn recent years’ 3D printing, has shown exponential growth in clinical medicine, research, and education (Carlos et al.). Imaging departments are at the center of 3D printing service delivery, efforts of establishing a 3D printing lab, and making it a unique contribution towards patient care (Kent Thielen et al.). Building a fully electronic medical record (EMR) integrated workflow to deliver 3D services offers unique advantages for cl Read More
-
-
-
ELearning for person with disabilities
More LessE-learning is the use of Internet technologies or computer-assisted instruction, to enhance and improve knowledge and performance, because knowledge is the basic right for a human right that should be accessible by everyone regardless of the status of they disabilities. E-learning technologies offer learners control over content, learning sequence, pace of learning, time, and often media, allowing them to tailor thei Read More
-
-
-
Proactive Automated Threat Intelligence Platform
More LessImagine you are sitting at a public coffee shop and using their free wifi on your work device. As long as you are connected to corporate VPN, you are well protected. The moment you go off, you are no longer protected. Your laptop is now open to being hacked and attacked at public wifi locations like airports, hotels, coffee shops, parks etc. My proposed solution involves an automated proactive cloud based threat intellige Read More
-
-
-
A Passive RFID Sense Tag for Switchgear Thermal Monitoring in Power Grid
Authors: Bo Wang and Tsz-Ngai LinI. Background In power grid, circuit breakers in switchgears are often the last line of defense when big systems must be protected from faults [1], sudden switchgear failures could cause long outages, huge economic losses and even present threats to the public safety. Based on field experience, the major causes of switchgear failure are loose or corroded metal connections, degraded cable insulation and external ag Read More
-
-
-
Coexistence of IEEE 802154g and WLAN
Authors: Saad Mohamed Shalbia, Ridha Hamila and Naofal Al-DhahirThe aging electric grid was established hundred years ago when electricity needs were simple. The power plants were centralized and most homes had only small energy demands such as few lamps and radios. The grid role was to carry electricity from utilities to consumers’ homes. This limited one way interaction makes it difficult for the grid to respond to the sudden changes and higher demands of energy of the 21st century. T Read More
-
-
-
Data Privacy in Online Social Networks With FineGrained Access Control
Authors: Ahmed Khalil Abdulla and Dr. Spiridon BakirasOnline Social Networks (OSNs), such as Facebook and Twitter, are popular platforms that enable users to interact and socialize through their networked devices. However, the social nature of such applications forces users to share a great amount of personal data with other users and the OSN service providers, including pictures, location check-ins, etc. Even though some OSNs offer configurable privacy controls that limit a Read More
-
-
-
Resilient Output Feedback Control of Cyberphysical Systems
By Nader MeskinCyber-physical system architectures are being used in many different applications such as power systems, transportation systems, process control systems, large-scale manufacturing systems, ecological systems, and health-care systems. Many of these applications involve safetycritical systems, and hence, any failures or cyber attacks can cause catastrophic damage to the physical system being controlled resulting in dr Read More
-
-
-
On Dependability Traffic Load and Energy Consumption Tradeoff in Data Center Networks
Authors: Zina Chkirbene, Ala Gouissem, Ridha Hamila and Sebti FoufouMega data centers (DCs) are considered as efficient and promising infrastructures for supporting numerous cloud computing services such as online office, online social networking, Web search and IT infrastructure out-sourcing. The scalability of these services is influenced by the performance and dependability characteristics of the DCs. Consequently, the DC networks are constructed with a large number of netw Read More
-
-
-
Visualization of Electricity Consumption in Qatar
Authors: Salma Tarek Shalaby, Engy Khaled Soliman and Noora FetaisThe amount of raw data related to electricity consumption is increasing rapidly with the increase of construction sites, population and Qatar preparation for 2022 world cup. By this increase, managers will find difficulties in studying the data and keeping track of the consumption. Thus, taking actions and future planning will be a hard task and the decisions taken might not be beneficial because of the miss understanding Read More
-
-
-
Saffara: Intelligent queuing application for improving clinical workflow
This paper examines the impact on patient experience through the creation of a bespoke patient queuing and communication application using in-house developed technologies. Sidra Medicine hospital's outpatient pharmacy was experiencing mismanaged queue lines, dissatisfied patients, and the lack of data necessary to determine the length of time elapsing in obtaining medication. After analyzing patient surveys through the Read More
-
-
-
Advances in Databased Process Monitoring and Applications
Authors: M. Ziyan Sheriff, hazem Nounou, M. Nazmul Karim and Mohamed NounouMany processes utilize statistical process monitoring (SPM) methods in order to ensure that process safety and product quality is maintained. Principal Component Analysis (PCA) is a data-based modeling and fault detection technique that it widely used by the industry [1]. PCA is a dimensionality reduction technique that transforms multivariate data into a new set of variables, called principal components, which cap Read More
-
-
-
Haralick feature extraction from timefrequency images for automatic detection and classification of audio anomalies for road surveillance
More LessIn this paper, we propose a novel method for the detection of road accidents by analyzing audio streams for road surveillance application. In the last decade, due to the increase in a number of people and transportation vehicles, traffic accidents have become one of a major public issue worldwide. The vast number of injuries and death due to road traffic accident reveals the story of a global crisis of road safety. A total of Read More
-
-
-
Annotation Guidelines for Text Analytics in Social Media
Authors: Wajdi Zaghouani and Anis CharfiAnnotation Guidelines for Text Analytics in Social Media A person's language use reveals much about their profile, however, research in author profiling has always been constrained by the limited availability of training data, since collecting textual data with the appropriate meta-data requires a large collection and annotation effort (Maamouri et al. 2010; Diab et al. 2008; Hawwari et al. 2013).For every text, the charac Read More
-
-
-
Towards OpenDomain CrossLanguage Question Answering
Authors: Ines Abbes, Alberto Barrón-Cedeño and Mohamed JemniWe present MATQAM (Multilingual Answer Triggering Question Answering Machine) a multilingual answer triggering open-domain QA system, focusing on answering questions whose answers might be in free texts in multiple languages within Wikipedia.Obtaining relevant information from the Web has become more challenging, since online communities and social media tend to confine people to bounded trends and ways Read More
-