Osman Hasan

ORCID: 0000-0003-2562-2669
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Formal Methods in Verification
  • Software Reliability and Analysis Research
  • Logic, programming, and type systems
  • Low-power high-performance VLSI design
  • Embedded Systems Design Techniques
  • Radiation Effects in Electronics
  • Software Testing and Debugging Techniques
  • Safety Systems Engineering in Autonomy
  • VLSI and Analog Circuit Testing
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Smart Grid Security and Resilience
  • Parallel Computing and Optimization Techniques
  • Security and Verification in Computing
  • Logic, Reasoning, and Knowledge
  • Petri Nets in System Modeling
  • Real-Time Systems Scheduling
  • Robotic Path Planning Algorithms
  • Risk and Safety Analysis
  • Numerical Methods and Algorithms
  • Semiconductor materials and devices
  • Advancements in Semiconductor Devices and Circuit Design
  • Surgical Simulation and Training
  • Advanced Memory and Neural Computing
  • Model-Driven Software Engineering Techniques
  • Integrated Circuits and Semiconductor Failure Analysis

National University of Sciences and Technology
2016-2025

Kuwait University
2025

Kuwait Petroleum Corporation (Kuwait)
2025

Concordia University
2013-2024

Tun Hussein Onn University of Malaysia
2024

University of the Sciences
2012-2023

University of Nizwa
2022

College of Applied Sciences, Nizwa
2022

Qassim University
2022

ORCID
2020

Many sampling based algorithms have been introduced recently. Among them Rapidly Exploring Random Tree (RRT) is one of the quickest and most efficient obstacle free path finding algorithm. Although it ensures probabilistic completeness, cannot guarantee optimal path. Star (RRT*), a recently proposed extension RRT, claims to achieve convergence towards solution thus ensuring asymptotic optimality along with completeness. However, has proven take an infinite time do so slow rate. In this paper...

10.5772/56718 article EN cc-by International Journal of Advanced Robotic Systems 2013-01-01

Rapidly Exploring Random Tree (RRT) is one of the quickest and most efficient obstacle free path finding algorithm. However, it cannot guarantee optimal path. A recently proposed extension RRT, known as Star (RRT*), claims to achieve convergence towards solution but has been proven take an infinite time do so with a slow rate. To overcome these limitations, we propose RRT*, called RRT*-Smart, which aims accelerate its rate reach optimum or near at much faster reduced execution time. Our...

10.1109/icma.2012.6284384 article EN 2012-08-01

10.1016/j.jnca.2016.11.008 article EN Journal of Network and Computer Applications 2016-11-21

Approximate adders are widely being advocated as a means to achieve performance gain in error resilient applications. In this paper, generic methodology for analytical modeling of probability occurrence and the Probability Mass Function (PMF) value selected class approximate is presented, which can serve metrics comparative analysis various their configurations. The proposed model applicable that comprise subadder units uniform well non-uniform lengths. Using systematic methodology, we...

10.1109/tc.2016.2605382 article EN IEEE Transactions on Computers 2016-09-01

Hand deformities often become a major obstacle in conducting everyday tasks for many people around the globe. Rehabilitation procedures are widely used strengthening hand muscles, which turn leads to restoration of functionality affected hand. This paper conducts survey various wearable technologies that can be accurately quantify rehabilitation progress terms fingers' joint angles. Based on data acquisition methods, these mainly divided into six categories: 1) Flex sensor based; 2)...

10.1016/j.mejo.2018.01.014 article EN Microelectronics Journal 2018-02-02

Abstract Background Chronic Kidney Disease (CKD), i.e., gradual decrease in the renal function spanning over a duration of several months to years without any major symptoms, is life-threatening disease. It progresses six stages according severity level. categorized into various based on Glomerular Filtration Rate (GFR), which turn utilizes attributes, like age, sex, race and Serum Creatinine. Among multiple available models for estimating GFR value, Epidemiology Collaboration (CKD-EPI),...

10.1186/s12882-021-02474-z article EN cc-by BMC Nephrology 2021-08-09

Sign language recognition (SLR) enables the deaf and speech-impaired community to integrate communicate effectively with rest of society. Word level or isolated SLR is a fundamental yet complex task main objective using models correctly recognize signed words. consists very fast hand, body, face movements, mouthing cues that make challenging. Several input modalities; RGB, optical Flow, RGB-D, pose/skeleton have been proposed for SLR. However, complexity these modalities state-of-the-art...

10.1109/access.2023.3247761 article EN cc-by-nc-nd IEEE Access 2023-01-01

Users hesitate to submit negative feedback in reputation systems due the fear of retaliation from recipient user. A privacy preserving protocol protects users by hiding their individual and revealing only score. We present a for malicious adversarial model. The this model actively attempt learn private values honest as well disrupt protocol. Our does not require centralized entities, trusted third parties, or specialized platforms, such anonymous networks hardware. Moreover, our is...

10.1109/tifs.2013.2258914 article EN IEEE Transactions on Information Forensics and Security 2013-04-18

Abstract Background Stunting is a major public health issue in most of developing countries. Although, its worldwide prevalence decreasing slowly but the number stunted children still rising Pakistan. highly associated with several long-term consequences, including higher rate mortality and morbidity, deficient cognitive growth, school performance, learning capacity, work capacity productivity. To prevent stunting, we proposed Diagnostic Education app. This app includes detailed knowledge...

10.1186/s12887-020-02139-0 article EN cc-by BMC Pediatrics 2020-05-19

The risk of sustaining heavy injuries through accidental falls creates a major medical problem for elderly people. This paper conducts survey the various automatic techniques and methods proposed to detect anomalies in movements elderly, monitoring their daily life activities. These can be broadly divided into three main categories: 1) Video Analysis Based; 2) Acoustic Ambience Sensor 3) Kinematic Based. critically analyzes methodologies, comparing strengths weaknesses. We further propose...

10.1109/iciet.2010.5625702 article EN International Conference on Information and Emerging Technologies 2010-06-01

Despite its great importance, modern network infrastructure is remarkable for the lack of rigor in engineering. The Internet which began as a research experiment was never designed to handle users and applications it hosts today. formalization architecture meant limited abstractions modularity, especially control management planes, thus requiring every new need protocol built from scratch. This led an unwieldy ossified resistant any attempts at formal verification, culture where expediency...

10.1109/comst.2014.2345792 article EN IEEE Communications Surveys & Tutorials 2014-08-07

The Internet of Things (IoT) is being deployed for a plethora use-case scenarios. In any deployment, number configuration choices are available that achieve the mission goal. However, IoT security incidents have demonstrated different configurations vulnerable to varied risk levels. We propose IoTRiskAnalyzer framework formally and quantitatively analyze these risks using probabilistic model checking. takes vulnerability scores, candidate configurations, attacker's capabilities as inputs. It...

10.1109/access.2017.2696031 article EN cc-by-nc-nd IEEE Access 2017-01-01

Approximate multipliers are gaining importance in energy-efficient computing and require careful error analysis. In this paper, we present the probability analysis for recursive approximate with partial products. Since these constructed from smaller multiplier building blocks, propose to derive an arbitrary bit-width probabilistic model of basic block distributions inputs. The is based on common features identified by carefully studying behavioral state-of-the-art designs. By further upon...

10.1109/tc.2017.2709542 article EN IEEE Transactions on Computers 2017-05-29

Globalization trends in integrated circuit (IC) design are leading to increased vulnerability of ICs against hardware Trojans (HT). Recently, several side channel parameters based techniques have been developed detect these that require golden as a reference model, but due the widespread usage IPs, most system-on-chip (SoC) do not reference. Hardware intellectual property (IP)-based SoC designs considered major concern for future circuits. Most state-of-the-art runtime Trojan detection...

10.23919/date.2017.7927002 article EN Design, Automation & Test in Europe Conference & Exhibition (DATE), 2015 2017-03-01

Approximate circuits exploit error resilience property of applications to tradeoff computation quality (accuracy) for gaining advantage in terms performance, power, and/or area. While state-of-the-art low-latency approximate adders provide an accuracy-area-latency configurable design space, the selection a particular configuration from space is still manually done. In this paper, we analytically analyze different structural properties formulate new adder model, Quality-area optimal...

10.1145/3061639.3062306 article EN 2017-06-13

The Multiply-Accumulate Unit (MAC) is an integral computational component of all digital signal processing (DSP) architectures and thus has a significant impact on their speed power dissipation. Due to extraordinary explosion in the number battery-powered “Internet Things” (IoT) devices, need for reducing consumption DSP tremendously increased. Approximate computing (AxC) been proposed as potential solution this problem targeting error-resilient applications. In paper, we present novel FPGA...

10.1109/access.2019.2946513 article EN cc-by IEEE Access 2019-01-01

Approximate multipliers are widely being advocated for energy-efficient computing in applications that exhibit an inherent tolerance to inaccuracy. In this paper, we identify three decisions design and evaluation of approximate multiplier circuits: (1) the type full adder (FA) used construct multiplier, (2) architecture, i.e., array or tree, (3) placement sub-modules exact target module. Based on FA cells implemented at transistor level (TSMC65nm), developed several building blocks 8x8...

10.1145/3194554.3194626 article EN Proceedings of the Great Lakes Symposium on VLSI 2022 2018-05-30

Globalization trends in integrated circuit (IC) design using deep submicron (DSM) technologies are leading to increased vulnerability of ICs against malicious intrusions. These intrusions referred as hardware Trojans. One way address this threat is utilize unique electrical signatures ICs. However, technique requires analyzing extensive sensor data detect the intruded circuits. In order overcome limitation, we propose combine signature extraction mechanism with machine learning algorithms...

10.1109/iscas.2016.7538895 article EN 2022 IEEE International Symposium on Circuits and Systems (ISCAS) 2016-05-01

Low-power approximate adders provide basic building blocks for computing hardware that have shown remarkable energy efficiency error-resilient applications (like image/video processing, computer vision, etc.), especially battery-driven portable systems. In this paper, we present a novel scalable, fast yet accurate analytical method to evaluate the output error probability of multi-bit low power predetermined input bits. Our recursively computes by considering cases only, which are...

10.1145/3061639.3062319 article EN 2017-06-13
Coming Soon ...