Now showing items 466-485 of 2100

    • C-SAR: Class-Specific and Adaptive Recognition for Arabic Handwritten Cheques 

      Hamdi, Ali; Al-Nuzaili, Qais; Ghaleb, Fuad A.; Shaban, Khaled ( Springer Science and Business Media Deutschland GmbH , 2022 , Book chapter)
      We propose C-SAR, a Class-specific and Adaptive Recognition algorithm for Arabic handwritten Cheques. Existing methods suffer from low accuracy due to the complex structure of Arabic script and high-dimensional datasets. ...
    • CAE Adaptive Compression, Transmission Energy and Cost Optimization for m-Health Systems 

      Al-Marridi A.Z.; Mohamed A.; Erbad A.; Guizani M. ( IEEE Computer Society , 2021 , Conference Paper)
      The rapid increase in the number of patients requiring constant monitoring inspires researchers to investigate the area of mobile health (m-Health) systems for intelligent and sustainable remote healthcare applications. ...
    • Calibration & Temperature Controlled Setup for Air Quality Sensors 

      Ijaz, Ali; Benammar, Mohieddine Amor; Touati, Farid; Kadri, Abdullah ( Hamad bin Khalifa University Press (HBKU Press) , 2016 , Conference Paper)
      Indoor air pollution is a major issue affecting public health. Due to hot climate, humidity and lack of natural green spaces, life is mostly confined indoors in many countries of the MENA region. Vulnerable population, ...
    • Caloric expenditure estimation for health games 

      Erbad, Aiman ( Hamad bin Khalifa University Press (HBKU Press) , 2013 , Conference Paper)
      With the decline in physical activities among young people, it is essential to monitor their physical activity and ensure their calorie expenditure is within the range necessary to lead a healthy life style. For many ...
    • CamNav: a computer-vision indoor navigation system 

      Karkar A.G.; Al-Maadeed, Somaya; Kunhoth J.; Bouridane A. ( Springer , 2021 , Article)
      We present CamNav, a vision-based navigation system that provides users with indoor navigation services. CamNav captures images in real time while the user is walking to recognize their current location. It does not require ...
    • Can genetic algorithms with the symmetric heuristic find the Ramsey number R(5,5) 

      Aija'am, Jihad Mohamad ( IEEE , 2010 , Conference Paper)
      Ramsey Theory studies the existence of highly regular patterns within a large system and proves that the complete disorder doesn't exist. The role of Ramsey numbers is to quantify some of the general existential theorems ...
    • Candidate MDS array codes for tolerating three disk failures in RAID-7 architectures 

      Punekar, Mayur; Malluhi, Qutaibah; Wang, Yongge; Desmedt, Yvo ( Association for Computing Machinery, Inc , 2017 , Conference Paper)
      Current storage systems use RAID-5 and RAID-6 architectures to provide protection against one and two disk failures, respectively. However, as the size of storage system grows rapidly three concurrent disk failures are ...
    • Canny edge detection and Hough transform for high resolution video streams using Hadoop and Spark 

      Iqbal, Bilal; Iqbal, Waheed; Khan, Nazar; Mahmood, Arif; Erradi, Abdelkarim ( Springer , 2020 , Article)
      Nowadays, video cameras are increasingly used for surveillance, monitoring, and activity recording. These cameras generate high resolution image and video data at large scale. Processing such large scale video streams to ...
    • Capacity and delay analysis for data gathering with compressive sensing in wireless sensor networks 

      Zheng, Haifeng; Xiao, Shilin; Wang, Xinbing; Tian, Xiaohua; Guizani, Mohsen (2013 , Article)
      Compressive sensing (CS) provides a new paradigm for efficient data gathering in wireless sensor networks (WSNs). In this paper, with the assumption that sensor data is sparse we apply the theory of CS to data gathering ...
    • Car Make And Model Detection System 

      Al-maadeed, Somaya; Boubezari, Rayana; Kunhoth, Suchithra; Bouridane, Ahmed ( Hamad bin Khalifa University Press (HBKU Press) , 2014 , Conference Paper)
      The deployment of highly intelligent and efficient machine vision systems accomplished to achieve new heights in multiple fields of human activity. A successful replacement of manual intervention with their automated systems ...
    • Carrier aggregation for LTE-advanced: Uplink multiple access and transmission enhancement features 

      Rui, Yun; Cheng, Peng; Li, Mingqi; Zhang, Q.T.; Guizani, Mohsen (2013 , Article)
      Multiple access and transmission enhancement in support of carrier aggregation techniques has been actively studied in the 3GPP LTEAdvanced standardization process of the nextgeneration mobile broadband communication ...
    • CAT: Credibility Analysis of Arabic Content on Twitter 

      El Ballouli, Rim; El-Hajj, Wassim; Ghandour, Ahmad; Elbassuoni, Shady; Hajj, Hazem; ... more authors ( Association for Computational Linguistics (ACL) , 2017 , Conference Paper)
      Data generated on Twitter has become a rich source for various data mining tasks. Those data analysis tasks that are dependent on the tweet semantics, such as sentiment analysis, emotion mining, and rumor detection among ...
    • CE-D2D: Collaborative and Popularity-aware Proactive Chunks Caching in Edge Networks 

      Baccour E.; Erbad A.; Mohamed A.; Guizani M.; Hamdi M. ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      Leveraging video caching to collaborative Mobile Edge Computing (MEC) servers is an emerging paradigm, where cloud computing services are extended to edge networks to allocate multimedia contents close to end-users. However, ...
    • CE-D2D: Dual framework chunks caching and offloading in collaborative edge networks with D2D communication 

      Baccour, Emna; Erbad, Aiman; Mohamed, Amr; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)
      The advancement of technology has pushed the cloud computing capabilities to the edge networks, paving the way for network operators and multimedia service providers to leverage video caching and transcoding to the Mobile ...
    • Cell phenotyping in multi-tag fluorescent bioimages 

      Khan, Adnan M.; Raza, Shan-E.-Ahmed; Khan, Michael; Rajpoot, Nasir M. ( Elsevier B.V. , 2014 , Article)
      Multi-tag bioimaging systems have recently emerged as powerful tools which provide spatiotemporal localization of several different proteins in the same tissue specimen. The analysis of such multivariate bioimages requires ...
    • Centralized and Distributed Cognitive Relay-Selection Schemes for SWIPT Cognitive Networks 

      Salama A.M.; Samy I.; El Shafie A.; Mohamed A.; Khattab T. ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)
      We investigate the model of a single primary-transceiver pair with multiple secondary-transceiver pairs. The secondary pairs can act as relays for the primary transmitter enabling access to its channel resources. Each ...
    • Challenges and Countermeasures for Adversarial Attacks on Deep Reinforcement Learning 

      Ilahi, Inaam; Usama, Muhammad; Qadir, Junaid; Janjua, Muhammad Umar; Al-Fuqaha, Ala; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)
      Deep reinforcement learning (DRL) has numerous applications in the real world, thanks to its ability to achieve high performance in a range of environments with little manual oversight. Despite its great advantages, DRL ...
    • Challenges of Physical Layer Security in a Satellite-Terrestrial Network 

      Han, Shuai; Li, Jixi; Meng, Weixiao; Guizani, Mohsen; Sun, Siyue ( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)
      Integrated satellite-terrestrial networks (ISTNs) are one of the new research directions for future 5G networks. Satellite coverage enables 5G communication throughout most of the world. However, the security concerns ...
    • Changing Dynamics of network security involving hacking/cracking with next generation firewalls (NGFW) 

      Vishwakarma, Alok; Wafa Waheeda, S. ( IGI Global , 2016 , Book chapter)
      With increasing number of users on the internet, risk of security and probability of vulnerable attacks are increasing day by day. For every user connected to network, security attacks like hacking and cracking are very ...
    • Channel Aware and Queue Aware Scheduling in LTE Uplink 

      Hajipour J.; Mohamed A.; Leung V.C.M. ( SpringerLink , 2012 , Conference Paper)
      Long Term Evolution (LTE) uses single carrier frequency division multiple access (SCFDMA) technique as the multiple access scheme in the uplink, due to its low peak to average power ratio (PAPR) compared to orthogonal ...