- Home
- Conference Proceedings
- Qatar Foundation Annual Research Conference Proceedings
- Conference Proceeding
Qatar Foundation Annual Research Conference Proceedings Volume 2018 Issue 3
- Conference date: 19-20 Mar 2018
- Location: Qatar National Convention Center (QNCC), Doha, Qatar
- Volume number: 2018
- Published: 15 March 2018
61 - 77 of 77 results
-
-
Applied Internet of Things IoT: Car monitoring system for Modeling of Road Safety and Traffic System in the State of Qatar
Authors: Rateb Jabbar, Khalifa Al-Khalifa, Mohamed Kharbeche, Wael Alhajyaseen, Mohsen Jafari and Shan JiangOne of the most interesting new approaches in the transportation research field is the Naturalistic Driver Behavior which is intended to provide insight into driver behavior during everyday trips by recording details about the driver, the vehicle and the surroundings through an unobtrusive data gathering equipment and without experimental control. In this paper, an Internet of Things solution that collects and analyzes data Read More
-
-
-
Importance of CapabilityDriven Requirements for Smart City Operations
Capability oriented requirements engineering is an emerging research area where designers are faced with the challenge of analyzing changes in the business domain, capturing user requirements, and developing adequate IT solutions taking into account these changes and answering user needs. In this context, researching the interplay between design-time and run-time requirements with a focus on adaptability is of great Read More
-
-
-
Secure RF Energy Harvesting Scheme for Future Wireless Networks
More LessWireless communication is shaping the future of seamless and reliable connectivity of billions of devices. The communication sector in Qatar is mainly driven by rising demand of higher data rates and uninterrupted connectivity of wireless devices. Wireless fidelity (Wi-Fi), cellular telephone and computer interface devices (e.g. Bluetooth) are a few of the commonly used applications for wireless distribution of information in Read More
-
-
-
Implementing and Analyzing a Recursive Technique for Building Path Oblivious RAM
Authors: Maan Haj Rachid, Ryan Riley and Qutaibah MalluhiIt has been demonstrated that encrypting confidential data before storing it is not sufficient because data access patterns can leak significant information about the data itself (Goldreich & Ostrovsky, 1996). Oblivious RAM (ORAM) schemes exist in order to protect the access pattern of data in a data-store. Under an ORAM algorithm, a client accesses a data store in such a way that does not reveal which item it is interested in Read More
-
-
-
CONNECT: CONtextual NamE disCovery for blockchainbased services in the IoT
More LessThe Internet of Things is gaining momentum thanks to the provided vision of seamlessly interconnected devices. However, a unified way to discover and to interact with the surrounding smart environment is missing. As an outcome, we have been assisting to the development of heterogeneous ecosystems, where each service provider adopts its own protocol—thus preventing IoT devices from interacting when be Read More
-
-
-
Multiple Input Multiple Output InVivo Communication for Nano Sensor at Terahertz Frequencies
Authors: Aya Fekry Abdelaziz, Ke Yang, Khalid Qaraqe, Joseph Boutros, Qammer Abbasi and Akram AlomainyThis study presents a preliminary feasibility investigation of signal propagation and antenna diversity techniques inside the human skin tissues in the frequency range (0.8-1.2)Terahertz (THz) by applying multiple input-single output (MISO) technique. THz application in in-vivo communication has received a great attention for its unique properties as non ionizing characteristics, strong interaction with water content inside the huma Read More
-
-
-
A Cyberphysical Testbed for Smart Water Networks Research Education and Development in Qatar
Smart water networks integrate sensor data, computation, control, and communication technologies to enhance system performance, reliability and consumer satisfaction. The cyber-physical systems are built from, and rely upon, the tight integration of physical elements of real-time sensors and data integration and cyber algorithmic, control computational and communication layers. A cyber-physical testbed has been develo Read More
-
-
-
Realtime Object Detection on Android using Tensorflow
More LessDetection of images or moving objects have been highly worked upon, and has been integrated and used in commercial, residential and industrial environments. But, most of the strategies and techniques have heavy limitations. One of the limitations is due to low computational resources at user level. Other important limitations that need to be tackled are lack of proper data analysis of the measured trained data, dependenc Read More
-
-
-
An integrated multiparametric system for infrastructure monitoring and earlywarning based on internet of things
Authors: Farid Toauti, Damiano Crescini, Alessio Galli and Adel Ben MnaouerOur daily life strictly depends on distributed civil and industrial infrastructures in which Qatar and other heavily industrialized countries have large investments. Recently, fails in such infrastructures have incurred enormous economic losses and development disruptions as well as human lives. Infrastructures are strategic assets for a sustainable development requiring correct management. To this end, their health levels and se Read More
-
-
-
Learning Spatiotemporal Latent Factors of Traffic via a Regularized Tensor Factorization: Imputing Missing Values and Forecasting
Authors: Abdelkader Baggag, Tahar Zanouda, Sofiane Abbar and Fethi FilaliSpatiotemporal data related to traffic has become common place due to the wide availability of cheap sensors and the rapid deployment of IoT platforms. Yet, this data suffer several challenges related to sparsity, incompleteness, and noise, which makes traffic analytics difficult. In this paper, we investigate the problem of missing data or noisy information in the context of real-time monitoring and forecasting of traffic congesti Read More
-
-
-
A Deep Learning Approach for Detection of Electricity Theft Cyber Attacks in Smart Grids
Authors: Muhammad Ismail, Mostafa Shahin, Erchin Serpedin and Khalid QaraqeFuture smart grids rely on advanced metering infrastructure (AMI) networks for monitoring and billing purposes. However, several research works have revealed that such AMI networks are vulnerable to different kinds of cyber attacks. In this research work, we consider one type of such cyber attacks that targets electricity theft and we propose a novel detection mechanism based on a deep machine learning approach. While e Read More
-
-
-
A simple and secure framework for protecting sensitive data stored on the cloud
Authors: Elias Yaacoub, Ali Sakr and Hassan NouraIn the past decade, Cloud-Computing emerged as a new computing concept with a distributed nature using virtual network and systems. Many businesses rely on this technology to keep their systems running but concerns are rising about security breaches in cloud computing. This work presents a secure approach for storing data on the cloud. the proposed methodology is described as follows: 1) The client who wants to Read More
-
-
-
Substring search over encrypted data
More LessOur data, be it personal or professional, is increasingly outsourced. This results from the development of cloud computing in the past ten years, a paradigm that shifts computing to a utility. Even without realizing it, cloud computing has entered our lives inexorably: every owner of a smartphone, every user of a social network is using cloud computing, as most IT companies and tech giants in particular are using infras Read More
-
-
-
Almost BPXOR Coding Technique for Tolerating Three Disk Failures in RAID7 Architectures
Authors: Naram Mhaisen, Mayur Punkar, Yongge Wang, Yvo Desmedt and Qutaibah MalluhiRedundant Array of Independent Disks (RAID) storage architectures provide protection of digital infrastructure against potential disks failures. For example, RAID-5 and RAID-6 architectures provide protection against one and two disk failures, respectively. Recently, the data generation has significantly increased due to the emergence of new technologies. Thus, the size of storage systems is also growing rapidly to accommo Read More
-
-
-
Leveraging Online Social Media Data for Persona Profiling
Authors: Bernard J. Jansen, Soon-gyo Jung, Joni Salminen, Jisun An and Haewoon KwakThe availability of large quantities of online data affords the isolation of key user segments based on demographics and behaviors for many online systems. However, there is an open question of how organizations can best leverage this user information in communication and decision-making. The automatic generation of personas to represent customer segments is an interactive design technique with considerable potential fo Read More
-
-
-
A Fast and Secure Approach for the Transmission of Monitoring Data over MultiRATs
Authors: Elias Yaacoub, Rida Diba and Hassan NouraIn an mHealth remote patient monitoring scenario, usually control units/data aggregators receive data from the body area network (BAN) sensors then send it to the network or “cloud”. The control unit would have to transmit the measurement data to the home access point (AP) using WiFi for example, or directly to a cellular base station (BS), e.g. using the long-term evolution (LTE) technology, or both (e.g. using multi-homing Read More
-
-
-
Crowdsourced MultiView Live Video Streaming using Cloud Computing
Authors: Aiman Erbad and Kashif BilalMulti-view videos are composed of multiple video streams captured simultaneously using multiple cameras from various angles (different viewpoints) of a scene. Multi-view videos offer more appealing and realistic view of the scene leading to higher user satisfaction and enjoyment. However, displaying realistic and live multiview scenes captured from a limited view-points faces multiple challenges, including excessiv Read More
-