- Home
- Conference Proceedings
- Qatar Foundation Annual Research Forum Proceedings
- Conference Proceeding
Qatar Foundation Annual Research Forum Volume 2012 Issue 1
- Conference date: 21-23 Oct 2012
- Location: Qatar National Convention Center (QNCC), Doha, Qatar
- Volume number: 2012
- Published: 01 October 2012
321 - 340 of 469 results
-
-
Analysis of mobility impact on interference for short-range cognitive radio networks
Authors: Ali Riza Ekti, Erchin Serpedin and Khalid A QaraqeBackground & Objectives: Cognitive radios (CRs) strive to utilize the white holes in the radio frequency (RF) spectrum in an opportunistic manner. Because interference is an inherent and a very critical design parameter for all sorts of wireless communication systems, many of the recently emerging wireless technologies prefer smaller size coverage with reduced transmit power in order to decrease interference. Prominent Read More
-
-
-
Image processing on the Cloud: Characterizing edge detection on biomedical images
Authors: Majd Sakr, Mohammad Hammoud and Manoj Dareddy ReddyIn order to analyze and deduce valuable information from big image data, we have developed a framework for distributed image processing in Hadoop MapReduce. A vast amount of scientific data is now represented in the form of images from sources like medical tomography. Applying algorithms on these images has been continually limited by the processing capacity of a single machine. MapReduce created by Google Read More
-
-
-
Analysing existing set theoretic and program specification diagrams
Authors: Noora Fetais and Peter ChengThis research is aimed at evaluating the usability of notational systems that are used for specifying programs. We provide a conceptual analysis of the development of constraint diagrams (CD) as a diagrammatic notation which developed to support program specification. A detailed analysis of multi-case comparisons of formal languages and graphical systems for expressing logic and program constructs was conducted in order Read More
-
-
-
Empirical evaluation of constraint diagrams notation
Authors: Noora Fetais and Peter ChengAn empirical evaluation of constraint diagrams (CD) as a program specification language is conducted by comparing it to natural language (NL) with computer science students included two experiments, one on the interpretation of CD to evaluate the comprehension of notational system, and the other on the construction of program specifications. The first experiment took the form of a web-based competition in which 33 Read More
-
-
-
Minimum-selection maximum ratio transmission schemes in underlay cognitive radio systems
Authors: Zied Bouida, Ali Ghrayeb and Khalid QaraqeUnder the scenario of an underlay cognitive radio network, we introduce the concept of minimum-selection maximum ratio transmission (MS-MRT). Inspired by the mode of operation of the minimum-selection generalized selection combining (MS-GSC) technique, the main idea behind MS-MRT is to present an adaptive variation of the existing maximum ratio transmission (MRT) technique. While in the MRT scheme, all the transmit Read More
-
-
-
Wireless smart home monitoring and surveillance system
More LessWireless technology such as GSM/GPRS and Wi-Fi has taken on an important role in our daily life. The noticeable improvement of these technologies has led to advancement in home automation, where people can enjoy comfort and secure living places. This project proposes a ZigBee-based cost effective solution to control and monitor home appliances remotely and to enable home security against intrusion in the absence of a ho Read More
-
-
-
Malware.inc: analyzing the security of popular web/mobile frameworks
Authors: Talal Al Haddad, Manoj Reddy, Fahim Dalvi, Baljit Singh, Ossama Obeid, Rami Al Rihawi, Omar Abou Selo, Aly Elgazar and Thierry SansBackground and Objectives: A new generation of software emerged with mobile devices, cloud computing and the web. New usages come with new security threats, and a new generation of malware (malicious software) is emerging as well. Recent security reports show that these malware are on the increase. The goal of this project is to evaluate the risk of exposure to malware in popular app ecosystems such as Apple iOS, Read More
-
-
-
Variations in giving directions across arabic and English native speakers
Authors: Huda Gedawy, Micheline Ziadee and Majd SakrThis work explores the differences in direction-giving strategies between two groups, native Arabic and native English speakers. This study will help influence design decisions for multi-lingual, cross-cultural human robot interaction. There are clear cultural influences on modes of communication. Previous research studies found that direction-giving techniques and strategies vary between different cultural groups. Burhanudeen co Read More
-
-
-
Enhanced formulations for the arrival-departure aircraft scheduling problem
Authors: Sara Yousef Al-Haidous, Ameer Al-Salem, Mohamed Kharbeche and Fajr Al-AnsariBackground and Objectives: The target of this work is to construct a mathematical model to help resolve aircraft scheduling over multiple runways. This problem is considered a hard topic in transportation research due to the constantly increasing aviation traffic volume around the world. Surprisingly, although there exists an impressive amount of literature for the landing and arrival cases, there is no proposed exact soluti Read More
-
-
-
Performance analysis of cognitive radio multiple-access channels over dynamic fading environments
Authors: Sabit Ekin, Khalid A. Qaraqe and Erchin SerpedinDue to the requirement of high data rates and broad utilization of wireless technologies (e.g., 3G, 4G and beyond), the radio frequency (RF) spectrum has become a very limited resource for modern wireless communication systems. Studies indicate that the spectrum is being under-utilized. As a promising solution, cognitive radio (CR) is an encouraging candidate to achieve more efficient RF spectrum utilization. The Read More
-
-
-
New perspectives, extensions and applications of De Bruijn identity
Authors: Sangwoo Park, Erchin Serpedin and Khalid QaraqeTwo significant identities-de Bruijn and Stein-were independently studied in information theory and statistics. De Bruijn identity shows a connection between two fundamental concepts in information theory and signal processing: differential entropy and Fisher information. On the other hand, Stein identity represents a relationship between the expectation of a function and its first-order derivative. Due to their several applicati Read More
-
-
-
Performance of digitally modulated RFID energy detector for moisture sensing applications for oil and gas quality monitoring in Qatar
Authors: Adnan Nasir, Ali Riza Ekti, Khalid A Qaraqe and Erchin SerpedinBackground & Objectives: Advances in the radio frequency identification (RFID) technology have made it ubiquitously present. Due to the recently emerging applications, RFIDs have been used in a plethora of different scenarios. Oil and gas industry is no exception; developments in the RFID technology enabled it to be used in oil and gas quality and pipeline infrastructure monitoring through low frequency RFID tags. The pres Read More
-
-
-
Outage and SER performance of an opportunistic multi-user underlay cognitive network
Authors: Fahd Ahmed Khan, Kamel Tourki, Mohamed-Slim Alouini and Khalid QaraqeHaving multiple users gives rise to multi-user diversity which can be exploited to give good quality-of-service to each user in the network and also increase the overall capacity of the network. In a spectrum-sharing setting, the multi-user diversity can be exploited; however, this is different from the traditional multi-user case because of the interference power constraints imposed on the secondary users. In this work, we consider Read More
-
-
-
Experimental analysis of energy detection for digitally modulated signals: Indoor measurements
Authors: Ali Riza Ekti, Erchin Serpedin and Khalid A QaraqeBackground & Objectives: Spectrum sensing is a feature of cognitive radio (CR) systems which is proposed to improve spectral utilization of wireless signals. One of the sensing methods is the non-coherent energy detector, and even though it is computationally more effective than coherent methods, it has critical drawbacks, e.g. requirement of certain signal-to-noise ratio and number of samples. Moreover, type of digital m Read More
-
-
-
Efficient parallel implementation of the SHRiMP sequence alignment tool using MapReduce
Authors: Rawan AlSaad, Qutaibah Malluhi and Mohamed AbouelhodaWith the advent of ultra high-throughput DNA sequencing technologies used in Next-Generation Sequencing (NGS) machines, we are facing a daunting new era in petabyte scale bioinformatics data. The enormous amounts of data produced by NGS machines lead to storage, scalability, and performance challenges. At the same time, cloud computing architectures are rapidly emerging as robust and economical solutions to h Read More
-
-
-
Incremental pseudo-conceptual organization of information relative to a domain
Authors: Sahar Ismail and Ali JaouaInformation resources over the World Wide Web are increasingly growing in size and creating immense demand for relevant and context-sensitive information. Thus, information retrieval and knowledge management systems need to exhibit high capacity for the mass of information available and most importantly should be able to handle the constant and rapid changes in information in order to produce results in a reasonabl Read More
-
-
-
Binary consensus in sensor motes
Authors: Noor Al-Nakhala, Abderrazak Abdaoui, Ryan Riley and Tarek El-FoulyBackground and Objectives: In this work, we explore the implementation of the binary consensus algorithm in wireless sensor networks. Binary consensus is used to allow a collection of distributed entities to reach consensus regarding the answer to a binary question. Existing work on the algorithm focuses on simulation of the algorithm under the assumption of a fully connected network topology and unlimited messaging Read More
-
-
-
Qatar Carbonates and Carbon Storage Research Centre: Status update after three years of fundamental research
Authors: Iain Macdonald and Geoffrey MaitlandThere are still specific areas where our knowledge of carbon storage is in need of improvement, particularly in carbonate reservoirs, since currently we extrapolate data from limited sources and the predictive modelling technologies employed have a level of uncertainty that needs to be addressed. We will highlight our efforts through the Qatar Carbonates and Carbon Storage Research Centre (a $70 million, 10 year re Read More
-
-
-
Artificial ground water recharge using treated wastewater effluents
Authors: Mohamed Hamoda, Mohamed Daerish and Rabi MohtarWater-related problems are increasingly recognized as one of the most immediate and serious environmental threats to mankind. In particular, all the GCC countries being located in an arid region, suffer from lack of natural freshwater resources. Groundwater is the major source of water for irrigation in these countries. The groundwater aquifers contain either fresh or brackish waters. In countries like Kuwait and Qatar the gr Read More
-
-
-
Breakthrough coastal research of Qatar as input to geological and reservoir modeling
Authors: Sabla Y Alnouri and Patrick LinkeMaximizing recovery in oil and gas fields relies on geological models that realistically portray the spatial complexity, composition, and properties of reservoir units. Present day arid climate coastal systems, like the coastline of Qatar provide analogues for depositional and diagenetic processes that control reservoir quality in ancient reservoirs. Many major reservoirs in Qatar are formed under conditions that are remarkably simi Read More
-