Nader Meskin

Nader Meskin
Qatar University · Department of Electrical Engineering

PhD

About

313
Publications
40,185
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
3,743
Citations
Additional affiliations
November 2015 - present
Qatar University
Position
  • Professor (Associate)
January 2011 - October 2015
Qatar University
Position
  • Professor (Assistant)
January 2010 - December 2011
Texas A&M University at Qatar
Position
  • PostDoc Position
Education
August 2004 - October 2008
Concordia University Montreal
Field of study
  • Electrical Engineering (Control Systems)
September 1998 - July 2001
University of Tehran
Field of study
  • Electrical Engineering (Control Systems)
September 1994 - June 1998
Sharif University of Technology
Field of study
  • Electrical Engineering (Control System)

Publications

Publications (313)
Article
Sports facilities (SFs) consume massive energy given their unique demand profiles and operation requirements. Intelligent and effective solutions are necessary to tackle the matter of facilities’ sustainability and efficiency. Promoting efficient and environmentally sustainable SFs is pivotal towards environmentally friendly and socially resilient...
Article
Sports facilities are considered complex buildings due to their high energy demand and occupancy profiles. Therefore, their management and optimization are crucial for reducing their energy consumption and carbon footprint while maintaining an appropriate indoor environmental quality. This work is part of the SportE3.Q project, which aims to manage...
Preprint
Full-text available
Immune checkpoint blockade (ICB)-based therapy is revolutionizing cancer treatment by fostering successful immune surveillance and effector cell responses against various types of cancers. However, patients with HER2+ cancers are yet to benefit from this therapeutic strategy. Precisely, several questions regarding the right combination of drugs, dr...
Preprint
Full-text available
Despite AI's significant growth, its "black box" nature creates challenges in generating adequate trust. Thus, it is seldom utilized as a standalone unit in IoT high-risk applications, such as critical industrial infrastructures, medical systems, and financial applications, etc. Explainable AI (XAI) has emerged to help with this problem. However, d...
Article
Background: Training is an essential aspect of providing high-quality treatment and ensuring patient safety in any medical practice. Because extracorporeal membrane oxygenation (ECMO) is a complicated operation with various elements, variables, and irregular situations, doctors must be experienced and knowledgeable about all conventional protocols...
Preprint
Full-text available
In this paper, a self-triggered scheme is proposed to optimally control the traffic flow of Connected and Automated Vehicles (CAVs) at conflict areas of a traffic network with the main aim of reducing the data exchange among CAVs in the control zone and at the same to minimize the travel time and energy consumption. The safety constraints and the v...
Preprint
Full-text available
We address the problem of controlling Connected and Automated Vehicles (CAVs) in conflict areas of a traffic network subject to hard safety constraints. It has been shown that such problems can be solved through a combination of tractable optimal control problem formulations and the use of Control Barrier Functions (CBFs) that guarantee the satisfa...
Article
This paper presents a model-free fault detection and isolation (FDI) method for nonlinear dynamical systems using Koopman operator theory and linear geometric technique. The key idea is to obtain a Koopman-based reduced-order model of a nonlinear dynamical system and apply the linear geometric FDI method to detect and isolate faults in the system....
Article
Smart transportation cities are based on intelligent systems and data sharing, whereas human drivers generally have limited capabilities and imperfect traffic observations. The perception of Connected and Autonomous Vehicle (CAV) utilizes data sharing through Vehicle-To-Vehicle (V2V) and Vehicle-To-Infrastructure (V2I) communications to improve dri...
Article
Networked control systems which transfer data over communication networks may suffer from malicious cyber attacks by injecting false data to the transferred information. Such attacks can cause performance degradation of the closed-loop system and the filtering problem. The sequential importance sampling (SIS) particle filtering (PF) methods employ...
Article
Despite AI’s significant growth, its “black box" nature creates challenges in generating adequate trust. Thus, it is seldom utilized as a standalone unit in IoT high-risk applications, such as critical industrial infrastructures, medical systems, and financial applications, etc. Explainable AI (XAI) has emerged to help with this problem. However, d...
Conference Paper
Full-text available
Sports tourism in the Gulf region started to flourish where several international sports events were secured for the next decade. This reflects on the number of sports facilities, their energy consumption, and CO2 emissions mainly due to the indoor and outdoor air conditioning requirements. This paper aims to emphasize the significance of energy ma...
Article
Full-text available
This article introduces a systematic approach to synthesize linear parameter‐varying (LPV) representations of nonlinear (NL) systems which are described by input affine state‐space (SS) representations. The conversion approach results in LPV‐SS representations in the observable canonical form. Based on the relative degree concept, first the SS desc...
Article
In this short paper, development of an adaptive fault tolerant control (FTC) using a virtual actuator framework is presented for one-sided Lipschitz nonlinear systems subjected to time-varying loss of effectiveness and additive actuator faults. The proposed controller does not require to have a separate unit to detect, isolate, and identify a fault...
Article
Full-text available
Abstract Intrusion detection in supervisory control and data acquisition (SCADA) systems is integral because of the critical roles of these systems in industries. However, available approaches in the literature lack representative flow‐based datasets and reliable real‐time adaption and evaluation. A publicly available labelled dataset to support fl...
Article
Full-text available
This paper investigates the development of an adaptive cooperative control scheme for the consensus of uncertain nonlinear multi-agent systems subjected to uncertain time-varying control direction, disturbances, and dead-zone nonlinearity. The dead-zone nonlinearity is described by an uncertain nonlinear function of the control input which can repr...
Article
Full-text available
Simulators for extracorporeal membrane oxygenation (ECMO) have problems of bulky devices and low-fidelity methodologies. Hence, ongoing efforts for optimizing modern solutions focus on minimizing expenses and blending training with the intensive care unit. This is particularly evident following the coronavirus pandemic, where economic resources hav...
Article
Full-text available
Mathematical model-based analysis has proven its potential as a critical tool in the battle against COVID-19 by enabling better understanding of the disease transmission dynamics, deeper analysis of the cost-effectiveness of various scenarios, and more accurate forecast of the trends with and without interventions. However, due to the outpouring of...
Article
Full-text available
This paper presents a new method for robot interception planning based on the proportional navigation. Guidance laws are basically developed for aerospace applications where a pursuer impacts a target using these methods, however in the robotic application it is required to have a smooth grasp between the robot and the goal. In this method, a new t...
Article
Full-text available
Connectivity and autonomy are considered two of the most promising technologies to improve mobility, fuel consumption, travel time, and traffic safety in the automated transportation industry. These benefits can be realized through vehicle platooning. A vehicle platoon is composed of a group of connected automated vehicles (CAVs) traveling together...
Article
Full-text available
In this paper, the problem of simultaneous robust fault detection and isolation and control in the presence of the stochastic, energy bounded, and peak bounded disturbances for linear Roesser systems through the network with limited resources is investigated. Toward this goal, a novel event-triggered integrated fault detection, isolation and contro...
Article
Full-text available
Despite many advancements in extracorporeal membrane oxygenation (ECMO), the procedure is still correlated with a high risk of patient complications. Simulation-based training provides the opportunity for ECMO staff to practice on real-life scenarios without exposing ECMO patients to medical errors while practicing. At Hamad Medical Corporation (HM...
Preprint
Full-text available
This paper considers distributed estimation of linear systems when the state observations are corrupted with Gaussian noise of unbounded support and under possible random adversarial attacks. We consider sensors equipped with single time-scale estimators and local chi-square ($\chi^2$) detectors to simultaneously opserve the states, share informati...
Article
Full-text available
In this paper, time-varying loss of effectiveness and time-varying additive actuator faults in nonlinear heterogeneous multi-agent systems (MAS) are considered and an adaptive fault tolerant-control (FTC) scheme based on the virtual actuator framework is proposed. The proposed FTC scheme does not need any separate fault detection, isolation, and id...
Article
Full-text available
The importance of the security of building management systems (BMSs) has increased given the advances in the technologies used. Since the Heating, Ventilation, and Air Conditioning (HVAC) system in buildings accounts for about 40% of the total energy consumption, threats targeting the HVAC system can be quite severe and costly. Given the limitation...
Article
Heating, ventilation, and air conditioning (HVAC) systems are used to condition the indoor environment in buildings. They can be subjected to malfunctioning since they are the most extensively operated buildings' components that account alone for almost half of the total building energy usage. Therefore, fault diagnosis (FD) of the HVAC system is i...
Article
Full-text available
In this paper, the problem of distributed event-based control of large scale power systems in presence of denial-of-service (DoS) cyber attacks is addressed. Towards this end, a direct current (DC) microgrid composed of multiple interconnected distributed generation units (DGUs) is considered. Voltage stability is guaranteed by utilizing decentrali...
Article
Full-text available
Globally, informed decision on the most effective set of restrictions for the containment of COVID-19 has been the subject of intense debates. There is a significant need for a structured dynamic framework to model and evaluate different intervention scenarios and how they perform under different national characteristics and constraints. This work...
Preprint
Full-text available
This paper introduces a systematic approach to synthesize linear parameter-varying (LPV) representations of nonlinear (NL) systems which are described by input affine state-space (SS) representations. The conversion approach results in LPV-SS representations in the observable canonical form. Based on the relative degree concept, first the SS descri...
Article
With the rapid advancement in the industrial control technologies and the increased deployment of the industrial Internet of Things (IoT) in the buildings sector, this work presents an analysis of the security of the Heating, Ventilation, and Air Conditioning (HVAC) system which is a major component of the Building Management System (BMS), has beco...
Article
Full-text available
Due to recent increase in deployment of Cyber-Physical Industrial Control Systems in different critical infrastructures, addressing cyber-security challenges of these systems is vital for assuring their reliability and secure operation in presence of malicious cyber attacks. Towards this end, developing a testbed to generate real-time data-sets for...
Chapter
Hormone therapy or endocrine therapy is used along with other treatment strategies to alleviate different types of human cancers including prostate and breast [1, 2, 3, 4]. The idea of using hormone therapy for the regression of cancer stems from the understanding that many hormones play key roles in the progression of certain cancers. Hence, hormo...
Chapter
Experimental and clinical evidence suggest that many single agent-based therapeutic approaches that are discussed in Chaps. 3– 8 show an improved potency (additive or synergistic effects) when used in combination [1, 2, 3, 4, 5]. Such combination therapy approaches can bring together the positive aspects of each therapy method involved to improve t...
Chapter
In this chapter, various steps involved in building and validating mathematical models using the data of tumor dynamics observed experimentally are discussed. Experimental designs and data collection, various types of growth models, treatment models, model fitting algorithms, metrics used for fitting assessment and model validation, and equilibrium...
Chapter
Anti-angiogenic therapy is used to interrupt the development of blood vessels towards and into the tumors from the existing blood vessels that surround the tumor micro-environment [1]. Anti-angiogenic therapy models primarily involves the dynamics of tumor cells, endothelial cells, angiogenesis inhibitory agents, and angiogenesis stimulatory agents...
Chapter
Novel drugs and treatment methods are introduced for the management of cancer at a very fast pace. Given the complexity and heterogeneity of the disease, decision making regarding the right choice of the drug, dose, drug combination, and treatment schedule has become a perplexing task. Cancer scientists and oncologists worldwide are looking at usin...
Chapter
Immunotherapy is a treatment strategy that uses external adjuvants to boost our immune system and thus make use of our body’s inherent mechanisms to fight cancer [1]. In this chapter, first some of the components and mechanisms pertaining to tumor dynamics are provided which are significant in facilitating immunotherapy in particular, then five mat...
Chapter
Radiotherapy methods for cancer treatment involves the use of high energy beams of photons (X-rays), protons, and neutrons to bring about detrimental changes in the irradiated cells. These ionizing radiations primarily cause damage to the DNA of the cells and thereby impair the cell mitosis which eventually leads to cell death [3]. In case of mathe...
Chapter
In this chapter, an overview of the mechanisms involved in the tumor growth, tumor interactions with the environment, types of therapeutic strategies used for management of the disease, and a general mathematical model of tumor dynamics are presented.
Conference Paper
The purpose of this work is to design a covert agent structure that can create a non-zero frequency deviation in the load frequency control (LFC) system and illustrate the necessity of a secure communication network for the load frequency control. LFC systems are one of the most time-consuming control loops of power systems that are vulnerable to c...
Article
The problem of distributed fast fault detection for a direct current (dc) microgrid that is composed of multiple interconnected distributed generation units (DGUs) is addressed in this article. A local fault detector is designed for each DGU based on the measured local state of the subsystem as well as the transmitted variables of neighboring measu...
Book
This book provides a unified framework for various currently available mathematical models that are used to analyze progression and regression in cancer development, and to predict its dynamics with respect to therapeutic interventions. Accurate and reliable model representations of cancer dynamics are milestones in the field of cancer research. Ma...
Article
In this article, a fault‐tolerant control (FTC) scheme for linear multiagent systems (MASs) subject to time‐varying loss of effectiveness and time‐varying additive actuator faults as well as external disturbance is investigated. The main objective of the proposed FTC approach is to keep the performance of an MAS after the occurrence of actuator fau...
Chapter
In Chaps. 10.1007/978-981-15-8640-8_3–10.1007/978-981-15-8640-8_7, five major therapeutic approaches currently in use for cancer management are discussed. In this chapter, mathematical models of cancer dynamics under gene therapy, oncolytic virotherapy, nanocarrier-based therapy, and stem cell therapy are presented. Most of these therapeutic strate...
Chapter
Chemotherapy involves the use of different types of drugs or drug combinations that can reduce the abnormal proliferation of cancer cells and lead to cell death. In this chapter, six mathematical models are discussed that depict different aspects of cancer dynamics under chemotherapy. Analysis of these models reveals that the dynamics of various ce...
Poster
Full-text available
Reverse Osmosis (RO) is an efficient and clean membrane-based technology for water desalination. This work presents a full-scale seawater reverse osmosis (SWRO) desalination plant simulator using MATLAB/Simulink that has been validated using the operational data from a local plant. It allows simulating the system behavior under different operating...
Conference Paper
Full-text available
In this project, the hybrid testbed architecture is selected for the development of ICS testbed where the Tennessee Eastman (TE) plant is simulated inside PC and the remaining components are implemented using real industrial hardware. TE plant is selected as the industrial process for the developed cybersecur ity testbed due to the following reason...
Article
This paper considers the problem of simultaneous sensor fault detection, isolation, and networked estimation of linear full-rank dynamical systems. The proposed networked estimation is a variant of single time-scale protocol and is based on (i) consensus on a-priori estimates and (ii) measurement innovation. The necessary connectivity condition on...
Preprint
This paper considers the problem of simultaneous sensor fault detection, isolation, and networked estimation of linear full-rank dynamical systems. The proposed networked estimation is a variant of single time-scale protocol and is based on (i) consensus on \textit{a-priori} estimates and (ii) measurement innovation. The necessary connectivity cond...
Preprint
In this paper, the problem of simultaneous cyber attack and fault detection and isolation (CAFDI) in cyber-physical systems (CPS) is studied. The proposed solution methodology consists of two filters on the plant and the command and control (C\&C) sides of the CPS and an unknown input observer (UIO) based detector on the plant side. Conditions unde...
Preprint
Full-text available
This paper aims at investigating a novel type of cyber attack that is injected to multi-agent systems (MAS) having an underlying directed graph. The cyber attack, which is designated as the controllability attack, is injected by the malicious adversary into the communication links among the agents. The adversary, leveraging the compromised communic...
Preprint
The objective in this paper is to study and develop conditions for a network of multi-agent cyber-physical systems (MAS) where a malicious adversary can utilize vulnerabilities in order to ensure and maintain cyber attacks undetectable. We classify these cyber attacks as undetectable in the sense that their impact cannot be observed in the generate...
Article
In this article, an event-triggered particle filtering method is presented to estimate the states of stochastic nonlinear systems with the ultimate goal to reduce the information exchange in networked systems. In the event-triggered estimation, measurements are transferred to an estimator only if certain event conditions are satisfied. Using these...
Article
Estimation of the state variables of dynamical systems in the presence of noise, disturbance, and fault is an important problem in the control and monitoring field. In this article, the mentioned issue is addressed for singular 2-D systems in Fornasini–Marchesini first model (FM-I). In this regard, a functional unknown input observer is proposed to...
Article
Full-text available
Power systems are complex systems that have great importance to socio-economic development due to the fact that the entire world relies on the electric network power supply for day-to-day life. Therefore, for the stable operation of power systems, several protection and control techniques are necessary. The power system controllers should have the...
Article
This study is concerned with the design of a distributed simultaneous fault estimation and fault-tolerant control scheme for linear multi-agent systems subject to actuator faults. For each agent, a sliding-mode observer-based estimator/controller module is proposed that uses the available local relative output measurements and the information trans...
Article
Network protocols are applied to reduce the amount of data which are transmitted simultaneously over the network. In this article, round-robin protocol (RRP) and try-once-discard protocol (TODP) are studied for state estimation over network where information of different sensor nodes are fused. Using these protocols, at each time sample, only one s...
Article
Finite-time stability of networked control systems under Denial of Service (DoS) attacks are investigated in this paper, where the communication between the plant and the controller is compromised at some time intervals. Toward this goal, first an event-triggered mechanism based on the variation rate of the Lyapunov function is proposed such that t...
Preprint
Finite-time stability of networked control systems under Denial of Service (DoS) attacks are investigated in this paper, where the communication between the plant and the controller is compromised at some time intervals. Toward this goal, first an event-triggered mechanism based on the variation rate of the Lyapunov function is proposed such that t...
Article
In this article, a distributed observer-based tracking control protocol is proposed for linear multiagent systems having a leader with unknown nonzero input. The leader is assumed to be uncooperative, i.e., no communication link is available for the leader to transmit its state or control input to the followers. Based on the relative output measure...