
Nader MeskinQatar University · Department of Electrical Engineering
Nader Meskin
PhD
About
313
Publications
40,185
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
3,743
Citations
Introduction
Additional affiliations
November 2015 - present
January 2011 - October 2015
January 2010 - December 2011
Education
August 2004 - October 2008
September 1998 - July 2001
September 1994 - June 1998
Publications
Publications (313)
Sports facilities (SFs) consume massive energy given their unique demand profiles and operation requirements. Intelligent and effective solutions are necessary to tackle the matter of facilities’ sustainability and efficiency. Promoting efficient and environmentally sustainable SFs is pivotal towards environmentally friendly and socially resilient...
Sports facilities are considered complex buildings due to their high energy demand and occupancy profiles. Therefore, their management and optimization are crucial for reducing their energy consumption and carbon footprint while maintaining an appropriate indoor environmental quality. This work is part of the SportE3.Q project, which aims to manage...
Immune checkpoint blockade (ICB)-based therapy is revolutionizing cancer treatment by fostering successful immune surveillance and effector cell responses against various types of cancers. However, patients with HER2+ cancers are yet to benefit from this therapeutic strategy. Precisely, several questions regarding the right combination of drugs, dr...
Despite AI's significant growth, its "black box" nature creates challenges in generating adequate trust. Thus, it is seldom utilized as a standalone unit in IoT high-risk applications, such as critical industrial infrastructures, medical systems, and financial applications, etc. Explainable AI (XAI) has emerged to help with this problem. However, d...
Background:
Training is an essential aspect of providing high-quality treatment and ensuring patient safety in any medical practice. Because extracorporeal membrane oxygenation (ECMO) is a complicated operation with various elements, variables, and irregular situations, doctors must be experienced and knowledgeable about all conventional protocols...
In this paper, a self-triggered scheme is proposed to optimally control the traffic flow of Connected and Automated Vehicles (CAVs) at conflict areas of a traffic network with the main aim of reducing the data exchange among CAVs in the control zone and at the same to minimize the travel time and energy consumption. The safety constraints and the v...
We address the problem of controlling Connected and Automated Vehicles (CAVs) in conflict areas of a traffic network subject to hard safety constraints. It has been shown that such problems can be solved through a combination of tractable optimal control problem formulations and the use of Control Barrier Functions (CBFs) that guarantee the satisfa...
This paper presents a model-free fault detection and isolation (FDI) method for nonlinear dynamical systems using Koopman operator theory and linear geometric technique. The key idea is to obtain a Koopman-based reduced-order model of a nonlinear dynamical system and apply the linear geometric FDI method to detect and isolate faults in the system....
Smart transportation cities are based on intelligent systems and data sharing, whereas human drivers generally have limited capabilities and imperfect traffic observations. The perception of Connected and Autonomous Vehicle (CAV) utilizes data sharing through Vehicle-To-Vehicle (V2V) and Vehicle-To-Infrastructure (V2I) communications to improve dri...
Networked control systems which transfer data over communication networks may suffer from malicious cyber attacks by injecting false data to the transferred information. Such attacks can cause performance degradation of the closed-loop system and the filtering problem. The sequential importance sampling (SIS) particle filtering (PF) methods employ...
Despite AI’s significant growth, its “black box" nature creates challenges in generating adequate trust. Thus, it is seldom utilized as a standalone unit in IoT high-risk applications, such as critical industrial infrastructures, medical systems, and financial applications, etc. Explainable AI (XAI) has emerged to help with this problem. However, d...
Sports tourism in the Gulf region started to flourish where several international sports events
were secured for the next decade. This reflects on the number of sports facilities, their energy
consumption, and CO2 emissions mainly due to the indoor and outdoor air conditioning
requirements. This paper aims to emphasize the significance of energy ma...
This article introduces a systematic approach to synthesize linear parameter‐varying (LPV) representations of nonlinear (NL) systems which are described by input affine state‐space (SS) representations. The conversion approach results in LPV‐SS representations in the observable canonical form. Based on the relative degree concept, first the SS desc...
In this short paper, development of an adaptive fault tolerant control (FTC) using a virtual actuator framework is presented for one-sided Lipschitz nonlinear systems subjected to time-varying loss of effectiveness and additive actuator faults. The proposed controller does not require to have a separate unit to detect, isolate, and identify a fault...
Abstract Intrusion detection in supervisory control and data acquisition (SCADA) systems is integral because of the critical roles of these systems in industries. However, available approaches in the literature lack representative flow‐based datasets and reliable real‐time adaption and evaluation. A publicly available labelled dataset to support fl...
This paper investigates the development of an adaptive cooperative control scheme for the consensus of uncertain nonlinear multi-agent systems subjected to uncertain time-varying control direction, disturbances, and dead-zone nonlinearity. The dead-zone nonlinearity is described by an uncertain nonlinear function of the control input which can repr...
Simulators for extracorporeal membrane oxygenation (ECMO) have problems of bulky devices and low-fidelity methodologies. Hence, ongoing efforts for optimizing modern solutions focus on minimizing expenses and blending training with the intensive care unit. This is particularly evident following the coronavirus pandemic, where economic resources hav...
Mathematical model-based analysis has proven its potential as a critical tool in the battle against COVID-19 by enabling better understanding of the disease transmission dynamics, deeper analysis of the cost-effectiveness of various scenarios, and more accurate forecast of the trends with and without interventions. However, due to the outpouring of...
This paper presents a new method for robot interception planning based on the proportional navigation. Guidance laws are basically developed for aerospace applications where a pursuer impacts a target using these methods, however in the robotic application it is required to have a smooth grasp between the robot and the goal. In this method, a new t...
Connectivity and autonomy are considered two of the most promising technologies to improve mobility, fuel consumption, travel time, and traffic safety in the automated transportation industry. These benefits can be realized through vehicle platooning. A vehicle platoon is composed of a group of connected automated vehicles (CAVs) traveling together...
In this paper, the problem of simultaneous robust fault detection and isolation and control in the presence of the stochastic, energy bounded, and peak bounded disturbances for linear Roesser systems through the network with limited resources is investigated. Toward this goal, a novel event-triggered integrated fault detection, isolation and contro...
Despite many advancements in extracorporeal membrane oxygenation (ECMO), the procedure is still correlated with a high risk of patient complications. Simulation-based training provides the opportunity for ECMO staff to practice on real-life scenarios without exposing ECMO patients to medical errors while practicing. At Hamad Medical Corporation (HM...
This paper considers distributed estimation of linear systems when the state observations are corrupted with Gaussian noise of unbounded support and under possible random adversarial attacks. We consider sensors equipped with single time-scale estimators and local chi-square ($\chi^2$) detectors to simultaneously opserve the states, share informati...
In this paper, time-varying loss of effectiveness and time-varying additive actuator faults in nonlinear heterogeneous multi-agent systems (MAS) are considered and an adaptive fault tolerant-control (FTC) scheme based on the virtual actuator framework is proposed. The proposed FTC scheme does not need any separate fault detection, isolation, and id...
The importance of the security of building management systems (BMSs) has increased given the advances in the technologies used. Since the Heating, Ventilation, and Air Conditioning (HVAC) system in buildings accounts for about 40% of the total energy consumption, threats targeting the HVAC system can be quite severe and costly. Given the limitation...
Heating, ventilation, and air conditioning (HVAC) systems are used to condition the indoor environment in buildings. They can be subjected to malfunctioning since they are the most extensively operated buildings' components that account alone for almost half of the total building energy usage. Therefore, fault diagnosis (FD) of the HVAC system is i...
In this paper, the problem of distributed event-based control of large scale power systems in presence of denial-of-service (DoS) cyber attacks is addressed. Towards this end, a direct current (DC) microgrid composed of multiple interconnected distributed generation units (DGUs) is considered. Voltage stability is guaranteed by utilizing decentrali...
Globally, informed decision on the most effective set of restrictions for the containment of COVID-19 has been the subject of intense debates. There is a significant need for a structured dynamic framework to model and evaluate different intervention scenarios and how they perform under different national characteristics and constraints. This work...
This paper introduces a systematic approach to synthesize linear parameter-varying (LPV) representations of nonlinear (NL) systems which are described by input affine state-space (SS) representations. The conversion approach results in LPV-SS representations in the observable canonical form. Based on the relative degree concept, first the SS descri...
With the rapid advancement in the industrial control technologies and the increased deployment of the industrial Internet of Things (IoT) in the buildings sector, this work presents an analysis of the security of the Heating, Ventilation, and Air Conditioning (HVAC) system which is a major component of the Building Management System (BMS), has beco...
Due to recent increase in deployment of Cyber-Physical Industrial Control Systems in different critical infrastructures, addressing cyber-security challenges of these systems is vital for assuring their reliability and secure operation in presence of malicious cyber attacks. Towards this end, developing a testbed to generate real-time data-sets for...
Hormone therapy or endocrine therapy is used along with other treatment strategies to alleviate different types of human cancers including prostate and breast [1, 2, 3, 4]. The idea of using hormone therapy for the regression of cancer stems from the understanding that many hormones play key roles in the progression of certain cancers. Hence, hormo...
Experimental and clinical evidence suggest that many single agent-based therapeutic approaches that are discussed in Chaps. 3– 8 show an improved potency (additive or synergistic effects) when used in combination [1, 2, 3, 4, 5]. Such combination therapy approaches can bring together the positive aspects of each therapy method involved to improve t...
In this chapter, various steps involved in building and validating mathematical models using the data of tumor dynamics observed experimentally are discussed. Experimental designs and data collection, various types of growth models, treatment models, model fitting algorithms, metrics used for fitting assessment and model validation, and equilibrium...
Anti-angiogenic therapy is used to interrupt the development of blood vessels towards and into the tumors from the existing blood vessels that surround the tumor micro-environment [1]. Anti-angiogenic therapy models primarily involves the dynamics of tumor cells, endothelial cells, angiogenesis inhibitory agents, and angiogenesis stimulatory agents...
Novel drugs and treatment methods are introduced for the management of cancer at a very fast pace. Given the complexity and heterogeneity of the disease, decision making regarding the right choice of the drug, dose, drug combination, and treatment schedule has become a perplexing task. Cancer scientists and oncologists worldwide are looking at usin...
Immunotherapy is a treatment strategy that uses external adjuvants to boost our immune system and thus make use of our body’s inherent mechanisms to fight cancer [1]. In this chapter, first some of the components and mechanisms pertaining to tumor dynamics are provided which are significant in facilitating immunotherapy in particular, then five mat...
Radiotherapy methods for cancer treatment involves the use of high energy beams of photons (X-rays), protons, and neutrons to bring about detrimental changes in the irradiated cells. These ionizing radiations primarily cause damage to the DNA of the cells and thereby impair the cell mitosis which eventually leads to cell death [3]. In case of mathe...
In this chapter, an overview of the mechanisms involved in the tumor growth, tumor interactions with the environment, types of therapeutic strategies used for management of the disease, and a general mathematical model of tumor dynamics are presented.
The purpose of this work is to design a covert agent structure that can create a non-zero frequency deviation in the load frequency control (LFC) system and illustrate the necessity of a secure communication network for the load frequency control. LFC systems are one of the most time-consuming control loops of power systems that are vulnerable to c...
The problem of distributed fast fault detection for a direct current (dc) microgrid that is composed of multiple interconnected distributed generation units (DGUs) is addressed in this article. A local fault detector is designed for each DGU based on the measured local state of the subsystem as well as the transmitted variables of neighboring measu...
This book provides a unified framework for various currently available mathematical models that are used to analyze progression and regression in cancer development, and to predict its dynamics with respect to therapeutic interventions. Accurate and reliable model representations of cancer dynamics are milestones in the field of cancer research. Ma...
In this article, a fault‐tolerant control (FTC) scheme for linear multiagent systems (MASs) subject to time‐varying loss of effectiveness and time‐varying additive actuator faults as well as external disturbance is investigated. The main objective of the proposed FTC approach is to keep the performance of an MAS after the occurrence of actuator fau...
In Chaps. 10.1007/978-981-15-8640-8_3–10.1007/978-981-15-8640-8_7, five major therapeutic approaches currently in use for cancer management are discussed. In this chapter, mathematical models of cancer dynamics under gene therapy, oncolytic virotherapy, nanocarrier-based therapy, and stem cell therapy are presented. Most of these therapeutic strate...
Chemotherapy involves the use of different types of drugs or drug combinations that can reduce the abnormal proliferation of cancer cells and lead to cell death. In this chapter, six mathematical models are discussed that depict different aspects of cancer dynamics under chemotherapy. Analysis of these models reveals that the dynamics of various ce...
Reverse Osmosis (RO) is an efficient and clean membrane-based technology for water desalination. This work presents a full-scale seawater reverse osmosis (SWRO) desalination plant simulator using MATLAB/Simulink that has been validated using the operational data from a local plant. It allows simulating the system behavior under different operating...
In this project, the hybrid testbed architecture is selected for the development of ICS testbed where the Tennessee Eastman (TE) plant is simulated inside PC and the remaining components are implemented using real industrial hardware. TE plant is selected as the industrial process for the developed cybersecur ity testbed due to the following reason...
This paper considers the problem of simultaneous sensor fault detection, isolation, and networked estimation of linear full-rank dynamical systems. The proposed networked estimation is a variant of single time-scale protocol and is based on (i) consensus on a-priori estimates and (ii) measurement innovation. The necessary connectivity condition on...
This paper considers the problem of simultaneous sensor fault detection, isolation, and networked estimation of linear full-rank dynamical systems. The proposed networked estimation is a variant of single time-scale protocol and is based on (i) consensus on \textit{a-priori} estimates and (ii) measurement innovation. The necessary connectivity cond...
In this paper, the problem of simultaneous cyber attack and fault detection and isolation (CAFDI) in cyber-physical systems (CPS) is studied. The proposed solution methodology consists of two filters on the plant and the command and control (C\&C) sides of the CPS and an unknown input observer (UIO) based detector on the plant side. Conditions unde...
This paper aims at investigating a novel type of cyber attack that is injected to multi-agent systems (MAS) having an underlying directed graph. The cyber attack, which is designated as the controllability attack, is injected by the malicious adversary into the communication links among the agents. The adversary, leveraging the compromised communic...
The objective in this paper is to study and develop conditions for a network of multi-agent cyber-physical systems (MAS) where a malicious adversary can utilize vulnerabilities in order to ensure and maintain cyber attacks undetectable. We classify these cyber attacks as undetectable in the sense that their impact cannot be observed in the generate...
In this article, an event-triggered particle filtering method is presented to estimate the states of stochastic nonlinear systems with the ultimate goal to reduce the information exchange in networked systems. In the event-triggered estimation, measurements are transferred to an estimator only if certain event conditions are satisfied. Using these...
Estimation of the state variables of dynamical systems in the presence of noise, disturbance, and fault is an important problem in the control and monitoring field. In this article, the mentioned issue is addressed for singular 2-D systems in Fornasini–Marchesini first model (FM-I). In this regard, a functional unknown input observer is proposed to...
Power systems are complex systems that have great importance to socio-economic development due to the fact that the entire world relies on the electric network power supply for day-to-day life. Therefore, for the stable operation of power systems, several protection and control techniques are necessary. The power system controllers should have the...
This study is concerned with the design of a distributed simultaneous fault estimation and fault-tolerant control scheme for linear multi-agent systems subject to actuator faults. For each agent, a sliding-mode observer-based estimator/controller module is proposed that uses the available local relative output measurements and the information trans...
Network protocols are applied to reduce the amount of data which are transmitted simultaneously over the network. In this article, round-robin protocol (RRP) and try-once-discard protocol (TODP) are studied for state estimation over network where information of different sensor nodes are fused. Using these protocols, at each time sample, only one s...
Finite-time stability of networked control systems under Denial of Service (DoS) attacks are investigated in this paper, where the communication between the plant and the controller is compromised at some time intervals. Toward this goal, first an event-triggered mechanism based on the variation rate of the Lyapunov function is proposed such that t...
Finite-time stability of networked control systems under Denial of Service (DoS) attacks are investigated in this paper, where the communication between the plant and the controller is compromised at some time intervals. Toward this goal, first an event-triggered mechanism based on the variation rate of the Lyapunov function is proposed such that t...
In this article, a distributed observer-based tracking control protocol is proposed for linear multiagent systems having a leader with unknown nonzero input. The leader is assumed to be uncooperative, i.e., no communication link is available for the leader to transmit its state or control input to the followers. Based on the relative output measure...