Osman Abul

ORCID: 0000-0002-9284-6112
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Privacy-Preserving Technologies in Data
  • Cryptography and Data Security
  • Internet Traffic Analysis and Secure E-voting
  • Data Mining Algorithms and Applications
  • Bioinformatics and Genomic Networks
  • Genomics and Chromatin Dynamics
  • Genomics and Phylogenetic Studies
  • Mobile Crowdsensing and Crowdsourcing
  • Gene expression and cancer classification
  • Gene Regulatory Network Analysis
  • Human Mobility and Location-Based Analysis
  • Privacy, Security, and Data Protection
  • Social Media and Politics
  • Misinformation and Its Impacts
  • Vehicular Ad Hoc Networks (VANETs)
  • Cloud Computing and Resource Management
  • Data Management and Algorithms
  • Sentiment Analysis and Opinion Mining
  • Reinforcement Learning in Robotics
  • Caching and Content Delivery
  • Hate Speech and Cyberbullying Detection
  • Computational Drug Discovery Methods
  • Fractal and DNA sequence analysis
  • Music and Audio Processing
  • Rough Sets and Fuzzy Logic

University of Sharjah
2023-2025

TOBB University of Economics and Technology
2014-2023

Norwegian University of Science and Technology
2006-2008

Istituto di Scienza e Tecnologie dell'Informazione "Alessandro Faedo"
2007

Middle East Technical University
2000-2006

Mental Illness Fellowship
2006

University of Calgary
2004

Preserving individual privacy when publishing data is a problem that receiving increasing attention. According to the fc-anonymity principle, each release of must be such indistinguishable from at least k - 1 other individuals. In this paper we study anonymity preserving in moving objects databases. We propose novel concept k-anonymity based on co-localization exploits inherent uncertainty object's whereabouts. Due sampling and positioning systems (e.g., GPS) imprecision, trajectory object...

10.1109/icde.2008.4497446 article EN 2008-04-01

Despite efforts to explore how employees react corporate social responsibility (CSR), the research on this topic within hospitality industry has yet reach its mature stage. Anchored in exchange theory, present endeavours address critical gap by proposing that employees’ perceptions of CSR lead improved job performance. The study also hypothesizes perceived organizational support (POS) acts as a mediator. Additionally, role gender moderator been proposed. Results based data from 396 hotel...

10.1177/09722629251320483 article EN Vision The Journal of Business Perspective 2025-03-28

Learning in a partially observable and nonstationary environment is still one of the challenging problems area multiagent (MA) learning. Reinforcement learning generic method that suits needs MA many aspects. This paper presents two new based domain independent coordination mechanisms for reinforcement learning; multiple agents do not require explicit communication among themselves to learn coordinated behavior. The first mechanism perceptual mechanism, where other are included state...

10.1109/5326.897075 article EN IEEE Transactions on Systems Man and Cybernetics Part C (Applications and Reviews) 2000-01-01

An important step in annotation of sequenced genomes is the identification transcription factor binding sites. More than a hundred different computational methods have been proposed, and it difficult to make an informed choice. Therefore, robust assessment motif discovery becomes important, both for validation existing tools promising directions future research. We use machine learning perspective analyze collections factors with known Algorithms are presented finding position weight...

10.1186/1471-2105-8-193 article EN cc-by BMC Bioinformatics 2007-06-08

This paper presents a privacy-preserving framework for the protection of sensitive positions in real time trajectories. We assume scenario which sensitivity user's is space-varying, and so depends on spatial context, while movement confined to road networks places. Typical users are non-anonymous members geo-social network who agree share their exact position whenever such does not fall within place, e.g. hospital. Suspending location sharing user inside place an appropriate solution because...

10.1109/mdm.2012.48 article EN 2012-07-01

The process of discovering relevant patterns holding in a database was first indicated as threat to security by O'Leary in. Since then, many different approaches for knowledge hiding have emerged over the years, mainly context association rules and frequent item sets mining. Following real-world data application demands, this paper, we shift problem contexts where both extracted sequential structure. We define show its NP-hardness. Thus, devise heuristics polynomial sanitization algorithm....

10.1109/tkde.2009.213 article EN IEEE Transactions on Knowledge and Data Engineering 2010-01-12

Purpose This study aims to investigate the potential positive correlation between inclusive leadership and hotel frontline employees’ (FLEs) customer stewardship (CS) behavior, using conservation of resource theory as its foundation. It hypothesizes that role breadth self-efficacy (RBSE) acts a mediating factor in this relationship, with employee conscientiousness serving significant moderating variable. Design/methodology/approach A time-lagged survey design was used, spanning over three...

10.1108/jabs-11-2023-0462 article EN Journal of Asia Business Studies 2024-04-27

Computational discovery of regulatory elements is an important area bioinformatics research and more than a hundred motif methods have been published. Traditionally, most these addressed the problem single - discovering binding motifs for individual transcription factors. In higher organisms, however, factors usually act in combination with nearby bound to induce specific behaviours. Hence, recent focus has shifted from sets by multiple cooperating factors, so called composite or...

10.1186/1471-2105-9-123 article EN cc-by BMC Bioinformatics 2008-02-26

The process of discovering relevant patterns holding in a database, was first indicated as threat to database security by O' Leary [20]. Since then, many different approaches for knowledge hiding have emerged over the years, mainly context association rules and frequent itemsets mining. Following real-world data applications demands, this paper we shift, problem contexts where both arid extracted sequential structure. We provide statement, some theoretical issues including NP-hardness...

10.1109/icdew.2007.4400985 article EN 2007-04-01

Abstract Background With the recent advances and availability of various high-throughput sequencing technologies, data on many molecular aspects, such as gene regulation, chromatin dynamics, three-dimensional organization DNA, are rapidly being generated in an increasing number laboratories. The variation biological context, increasingly dispersed mode generation, imply a need for precise, interoperable flexible representations genomic features through formats that easy to parse. A host...

10.1186/1471-2105-12-494 article EN cc-by BMC Bioinformatics 2011-12-01

Data science continues to evolve with each passing day and upgrades itself according the exponentially increasing amount of data. The progression provides convenience extract meaningful information from huge data various domains including individual, public health, micro-blogging sensors. ability process volume valuable sometimes scare people especially when individual sensitive is concerned. Many privacy-preserving techniques are developed overcome these fears. Over years, adapted meet...

10.1109/bigdata.2017.8258492 article EN 2021 IEEE International Conference on Big Data (Big Data) 2017-12-01

Cluster validity investigates whether generated clusters are true or due to chance. This is usually done based on subsampling stability analysis. Related this problem estimating number of in a given dataset. There methods described the literature handle both purposes. In paper, we propose three for confidence clustering result. The first method validates result by employing supervised classifiers. dataset divided into training and test sets accuracy classifier evaluated set. computes...

10.1109/icsmc.2003.1244614 article EN 2004-04-23

10.1016/j.datak.2011.10.002 article EN Data & Knowledge Engineering 2011-10-28

10.1007/s10115-017-1146-x article EN Knowledge and Information Systems 2018-01-08

10.1007/s10844-019-00577-6 article EN Journal of Intelligent Information Systems 2019-10-08

Computational discovery of motifs in biomolecular sequences is an established field, with applications both the functional sites proteins and regulatory DNA. In recent years there has been increased attention towards composite motifs, typically occurring cis-regulatory regions genes. This paper describes Compo: a discrete approach to motif that supports richer modeling more realistic background model compared previous methods. Furthermore, multiple parameter threshold settings are tested...

10.1186/1471-2105-9-527 article EN cc-by BMC Bioinformatics 2008-12-01

This paper addresses the control formulation process for probabilistic boolean genetic networks. It is a major problem that has not been investigated enough yet. We argue monitoring stage necessary after providing guidance about evolution of state. For this purpose, we developed methods generating optimal policies each following five cases: finite control, infinite control-infinite monitoring, control-finite and repeated monitoring. Our initial proposal was based on using action cost...

10.1109/bibe.2004.1317363 article EN 2004-11-30

Spatio-temporal traces left behind by moving individuals are increasingly available. On the one hand, mining this kind of data is expected to produce interesting behavioral knowledge enabling novel classes mobility applications; but on other due peculiar nature position data, it creates important privacy concerns. Thus, studying preserving methods for mov- ing object and challenging. In paper, we address problem hiding sensi- tive trajectory patterns from objects databases. The aim modify...

10.1109/icdmw.2007.93 article EN 2007-10-01

Knowledge hiding, hiding rules/patterns that are inferable from published data and attributed sensitive, is extensively studied in the literature context of frequent itemsets association rules mining transactional data. The research this thread focused mainly on developing sophisticated methods achieve less distortion quality. With work, we extend item-set to co-occurring itemset problem. Co-occurring those co-exist output mining. What different classical new sensitivity definition: an set...

10.1145/1698790.1698810 article EN 2009-03-22

Increasing popularity of Twitter in politics is subject to commercial and academic interest. To fully exploit the merits this platform, reaching target audience with desired political leanings critical. This paper extends research on inferring orientations users case 2017 Turkish constitutional referendum. After constructing a targeted dataset tweets, we explore several types potential features build accurate machine learning based predictive models. In our experiments, three-class support...

10.1109/isncc.2018.8531001 article EN 2022 International Symposium on Networks, Computers and Communications (ISNCC) 2018-06-01

10.1016/j.asoc.2021.107743 article EN Applied Soft Computing 2021-07-28

Packet-based mobile networks are increasingly carrying internet traffic mostly for data intensive-applications. Mobile usage, with 67% share worldwide, is very important users. Because of the explosive growth usage demand, speed analysis a essential way to characterize network quality and user experience service providers. Key Performance Indicators (KPIs), measured on segments by current sophisticated systems, may not correctly capture users' Quality Experience (QoE) due actual throughput...

10.1109/isncc.2016.7746114 article EN 2022 International Symposium on Networks, Computers and Communications (ISNCC) 2016-05-01
Coming Soon ...