- Home
- Conference Proceedings
- Qatar Foundation Annual Research Conference Proceedings
- Conference Proceeding
Qatar Foundation Annual Research Conference Proceedings Volume 2018 Issue 3
- Conference date: 19-20 Mar 2018
- Location: Qatar National Convention Center (QNCC), Doha, Qatar
- Volume number: 2018
- Published: 15 March 2018
41 - 60 of 77 results
-
-
Coexistence of IEEE 802154g and WLAN
Authors: Saad Mohamed Shalbia, Ridha Hamila and Naofal Al-DhahirThe aging electric grid was established hundred years ago when electricity needs were simple. The power plants were centralized and most homes had only small energy demands such as few lamps and radios. The grid role was to carry electricity from utilities to consumers’ homes. This limited one way interaction makes it difficult for the grid to respond to the sudden changes and higher demands of energy of the 21st century. T Read More
-
-
-
Data Privacy in Online Social Networks With FineGrained Access Control
Authors: Ahmed Khalil Abdulla and Dr. Spiridon BakirasOnline Social Networks (OSNs), such as Facebook and Twitter, are popular platforms that enable users to interact and socialize through their networked devices. However, the social nature of such applications forces users to share a great amount of personal data with other users and the OSN service providers, including pictures, location check-ins, etc. Even though some OSNs offer configurable privacy controls that limit a Read More
-
-
-
Resilient Output Feedback Control of Cyberphysical Systems
By Nader MeskinCyber-physical system architectures are being used in many different applications such as power systems, transportation systems, process control systems, large-scale manufacturing systems, ecological systems, and health-care systems. Many of these applications involve safetycritical systems, and hence, any failures or cyber attacks can cause catastrophic damage to the physical system being controlled resulting in dr Read More
-
-
-
On Dependability Traffic Load and Energy Consumption Tradeoff in Data Center Networks
Authors: Zina Chkirbene, Ala Gouissem, Ridha Hamila and Sebti FoufouMega data centers (DCs) are considered as efficient and promising infrastructures for supporting numerous cloud computing services such as online office, online social networking, Web search and IT infrastructure out-sourcing. The scalability of these services is influenced by the performance and dependability characteristics of the DCs. Consequently, the DC networks are constructed with a large number of netw Read More
-
-
-
Visualization of Electricity Consumption in Qatar
Authors: Salma Tarek Shalaby, Engy Khaled Soliman and Noora FetaisThe amount of raw data related to electricity consumption is increasing rapidly with the increase of construction sites, population and Qatar preparation for 2022 world cup. By this increase, managers will find difficulties in studying the data and keeping track of the consumption. Thus, taking actions and future planning will be a hard task and the decisions taken might not be beneficial because of the miss understanding Read More
-
-
-
Saffara: Intelligent queuing application for improving clinical workflow
This paper examines the impact on patient experience through the creation of a bespoke patient queuing and communication application using in-house developed technologies. Sidra Medicine hospital's outpatient pharmacy was experiencing mismanaged queue lines, dissatisfied patients, and the lack of data necessary to determine the length of time elapsing in obtaining medication. After analyzing patient surveys through the Read More
-
-
-
Advances in Databased Process Monitoring and Applications
Authors: M. Ziyan Sheriff, hazem Nounou, M. Nazmul Karim and Mohamed NounouMany processes utilize statistical process monitoring (SPM) methods in order to ensure that process safety and product quality is maintained. Principal Component Analysis (PCA) is a data-based modeling and fault detection technique that it widely used by the industry [1]. PCA is a dimensionality reduction technique that transforms multivariate data into a new set of variables, called principal components, which cap Read More
-
-
-
Haralick feature extraction from timefrequency images for automatic detection and classification of audio anomalies for road surveillance
More LessIn this paper, we propose a novel method for the detection of road accidents by analyzing audio streams for road surveillance application. In the last decade, due to the increase in a number of people and transportation vehicles, traffic accidents have become one of a major public issue worldwide. The vast number of injuries and death due to road traffic accident reveals the story of a global crisis of road safety. A total of Read More
-
-
-
Annotation Guidelines for Text Analytics in Social Media
Authors: Wajdi Zaghouani and Anis CharfiAnnotation Guidelines for Text Analytics in Social Media A person's language use reveals much about their profile, however, research in author profiling has always been constrained by the limited availability of training data, since collecting textual data with the appropriate meta-data requires a large collection and annotation effort (Maamouri et al. 2010; Diab et al. 2008; Hawwari et al. 2013).For every text, the charac Read More
-
-
-
Towards OpenDomain CrossLanguage Question Answering
Authors: Ines Abbes, Alberto Barrón-Cedeño and Mohamed JemniWe present MATQAM (Multilingual Answer Triggering Question Answering Machine) a multilingual answer triggering open-domain QA system, focusing on answering questions whose answers might be in free texts in multiple languages within Wikipedia.Obtaining relevant information from the Web has become more challenging, since online communities and social media tend to confine people to bounded trends and ways Read More
-
-
-
Toward a Cognitive Evaluation Approach for Machine Translation PostEditing
Authors: Wajdi Zaghouani and Irina TemnikovaMachine Translation (MT) today is used more and more by professional translators, including freelancers, companies, and official organisations, such as, for example, the European Parliament. MT output, especially of publicly available MT engines, such as Google Translate, is, however, well known to contain errors and lack fluency from human expectations» point of view. For this reason, the MT translated texts often need m Read More
-
-
-
A Decomposition Algorithm to Measure Redundancy in Structured Linear Systems
Authors: Vishnu Vijayaraghavan, Kiavash Kianfar, Hamid Parsaei and Yu DingNowadays, inexpensive smart devices with multiple heterogeneous on-board sensors, networked through wired or wireless links and deployable in large numbers, are distributed throughout a physical process or in a physical environment, providing real-time, and dense spatio-temporal measurements and enabling surveillance and monitoring capability that could not be imagined a decade ago. Such a system-wide deplo Read More
-
-
-
Framework for Visualizing Browsing Patterns Captured in Computer Logs
Authors: Noora Fetais and Rachael FernandezResearch ProblemAn Intrusion Detection System (IDS) is used for preventing security breaches by monitoring and analyzing the data recorded in log files. An IDS analyst is responsible for detecting intrusions in a system by manually investigating the vast amounts of textual information captured in these logs. The activities that are performed by the analyst can be split into 3 phases, namely: i) Monitoring ii) Analysis and ii Read More
-
-
-
Automated Service Delivery and Optimal Placement for CRANs
Authors: Aiman Erbad, Deval Bhamare, Raj Jain and Mohammed SamakaTraditionally, in cellular networks, users communicate with the base station that serves the particular cell under coverage. The main functions of a base station can be divided into two, which are the baseband unit (BBU) functionalities and the remote radio head (RRH) functionalities. The RRH module is responsible for digital processing, frequency filtering and power amplification. The main sub-functions of the baseband proces Read More
-
-
-
Does Cultural Affinity Influence Visual Attention An Eye Tracking Study of Human Images in ECommerce Websites
More LessThe objective of this research is to better understand the influence of cultural affinity on the design of Arab e-commerce websites, specifically the use of human images. Three versions of an e-commerce website selling cameras were built for this study – one with the image of an Arab woman holding a camera, another with the image of a Western woman holding a camera, and a third with no human image. All three websites Read More
-
-
-
The political influence of the Internet in the Gulf
More LessI am a current student researching the findings from the QNRF NPRP grant, “Media Use in the Middle East” (NPRP 7-1757-5-261), a seven-nation survey by Northwestern University in Qatar. I am particularly interested in the potential of the Internet to increase feelings of political efficacy among citizens in the Arab region. The Internet has been shown to create feelings of political efficacy in many instances around the worl Read More
-
-
-
A Cheremebased Sign Language Description System
Authors: Abdelhadi Soudi and Corinne VinopolBecause sign languages are not written, it is challenging to describe signs without knowing a spoken language equivalent. Sign language does not represent in any direct way the form of the spoken language either by visually representing sounds or syntactic sequences of words of the spoken language. One sign may mean an entire Arabic phrase and vice versa. Sign language can only be described, animated or videotaped. Fo Read More
-
-
-
Effectiveness of Driver Simulator as a Driving Education Tool
Authors: Semira Omer Mohammed, Wael Alhajyaseen, Rafaat Zriak and Mohammad KhorasaniThe impact and validity of driving simulators as an educational tool in driving schools in the licensing process remains questioned in literature. Many driving schools utilize driving simulators as a tool to assist students to learn required skills faster. Few studies showed conflicting results whether utilizing driving simulator is effective in improving the quality of driving education process. The applications of driving simulators are not Read More
-
-
-
ThreatBased Security Risk Evaluation in the Cloud
Authors: Armstrong Nhlabatsi, Khaled Khan, Noora Fetais, Rachael Fernandez, Jin Hong and Dong Seong KimResearch ProblemCyber attacks are targeting the cloud computing systems, where enterprises, governments, and individuals are outsourcing their storage and computational resources for improved scalability and dynamic management of their data. However, the different types of cyber attacks, as well as the different attack goals, create difficulties providing the right security solution needed. This is because different cyb Read More
-
-
-
Compressive SensingBased Remote Monitoring Systems for IoT applications
Authors: Hamza Djelouat, MOHAMED Al Disi, Abbes Amira and Faycal BensaaliInternet of things (IoT) is shifting the healthcare delivery paradigm from in-person encounters between patients and providers to an «anytime, anywhere» model delivery. Connected health has become more profound than ever due to the availability of wireless wearable sensors, reliable communication protocols and storage infrastructures. Wearable sensors would offer various insights regarding the patient's health (elec Read More
-