Now showing items 474-493 of 2127

    • Caloric expenditure estimation for health games 

      Erbad, Aiman ( Hamad bin Khalifa University Press (HBKU Press) , 2013 , Conference Paper)
      With the decline in physical activities among young people, it is essential to monitor their physical activity and ensure their calorie expenditure is within the range necessary to lead a healthy life style. For many ...
    • CamNav: a computer-vision indoor navigation system 

      Karkar A.G.; Al-Maadeed, Somaya; Kunhoth J.; Bouridane A. ( Springer , 2021 , Article)
      We present CamNav, a vision-based navigation system that provides users with indoor navigation services. CamNav captures images in real time while the user is walking to recognize their current location. It does not require ...
    • Can genetic algorithms with the symmetric heuristic find the Ramsey number R(5,5) 

      Aija'am, Jihad Mohamad ( IEEE , 2010 , Conference Paper)
      Ramsey Theory studies the existence of highly regular patterns within a large system and proves that the complete disorder doesn't exist. The role of Ramsey numbers is to quantify some of the general existential theorems ...
    • Candidate MDS array codes for tolerating three disk failures in RAID-7 architectures 

      Punekar, Mayur; Malluhi, Qutaibah; Wang, Yongge; Desmedt, Yvo ( Association for Computing Machinery, Inc , 2017 , Conference Paper)
      Current storage systems use RAID-5 and RAID-6 architectures to provide protection against one and two disk failures, respectively. However, as the size of storage system grows rapidly three concurrent disk failures are ...
    • Canny edge detection and Hough transform for high resolution video streams using Hadoop and Spark 

      Iqbal, Bilal; Iqbal, Waheed; Khan, Nazar; Mahmood, Arif; Erradi, Abdelkarim ( Springer , 2020 , Article)
      Nowadays, video cameras are increasingly used for surveillance, monitoring, and activity recording. These cameras generate high resolution image and video data at large scale. Processing such large scale video streams to ...
    • Capacity and delay analysis for data gathering with compressive sensing in wireless sensor networks 

      Zheng, Haifeng; Xiao, Shilin; Wang, Xinbing; Tian, Xiaohua; Guizani, Mohsen (2013 , Article)
      Compressive sensing (CS) provides a new paradigm for efficient data gathering in wireless sensor networks (WSNs). In this paper, with the assumption that sensor data is sparse we apply the theory of CS to data gathering ...
    • Car Make And Model Detection System 

      Al-maadeed, Somaya; Boubezari, Rayana; Kunhoth, Suchithra; Bouridane, Ahmed ( Hamad bin Khalifa University Press (HBKU Press) , 2014 , Conference Paper)
      The deployment of highly intelligent and efficient machine vision systems accomplished to achieve new heights in multiple fields of human activity. A successful replacement of manual intervention with their automated systems ...
    • Carrier aggregation for LTE-advanced: Uplink multiple access and transmission enhancement features 

      Rui, Yun; Cheng, Peng; Li, Mingqi; Zhang, Q.T.; Guizani, Mohsen (2013 , Article)
      Multiple access and transmission enhancement in support of carrier aggregation techniques has been actively studied in the 3GPP LTEAdvanced standardization process of the nextgeneration mobile broadband communication ...
    • CAT: Credibility Analysis of Arabic Content on Twitter 

      El Ballouli, Rim; El-Hajj, Wassim; Ghandour, Ahmad; Elbassuoni, Shady; Hajj, Hazem; ... more authors ( Association for Computational Linguistics (ACL) , 2017 , Conference Paper)
      Data generated on Twitter has become a rich source for various data mining tasks. Those data analysis tasks that are dependent on the tweet semantics, such as sentiment analysis, emotion mining, and rumor detection among ...
    • CE-D2D: Collaborative and Popularity-aware Proactive Chunks Caching in Edge Networks 

      Baccour E.; Erbad A.; Mohamed A.; Guizani M.; Hamdi M. ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      Leveraging video caching to collaborative Mobile Edge Computing (MEC) servers is an emerging paradigm, where cloud computing services are extended to edge networks to allocate multimedia contents close to end-users. However, ...
    • CE-D2D: Dual framework chunks caching and offloading in collaborative edge networks with D2D communication 

      Baccour, Emna; Erbad, Aiman; Mohamed, Amr; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)
      The advancement of technology has pushed the cloud computing capabilities to the edge networks, paving the way for network operators and multimedia service providers to leverage video caching and transcoding to the Mobile ...
    • Cell phenotyping in multi-tag fluorescent bioimages 

      Khan, Adnan M.; Raza, Shan-E.-Ahmed; Khan, Michael; Rajpoot, Nasir M. ( Elsevier B.V. , 2014 , Article)
      Multi-tag bioimaging systems have recently emerged as powerful tools which provide spatiotemporal localization of several different proteins in the same tissue specimen. The analysis of such multivariate bioimages requires ...
    • Centralized and Distributed Cognitive Relay-Selection Schemes for SWIPT Cognitive Networks 

      Salama A.M.; Samy I.; El Shafie A.; Mohamed A.; Khattab T. ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)
      We investigate the model of a single primary-transceiver pair with multiple secondary-transceiver pairs. The secondary pairs can act as relays for the primary transmitter enabling access to its channel resources. Each ...
    • Challenges and Countermeasures for Adversarial Attacks on Deep Reinforcement Learning 

      Ilahi, Inaam; Usama, Muhammad; Qadir, Junaid; Janjua, Muhammad Umar; Al-Fuqaha, Ala; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)
      Deep reinforcement learning (DRL) has numerous applications in the real world, thanks to its ability to achieve high performance in a range of environments with little manual oversight. Despite its great advantages, DRL ...
    • Challenges of Physical Layer Security in a Satellite-Terrestrial Network 

      Han, Shuai; Li, Jixi; Meng, Weixiao; Guizani, Mohsen; Sun, Siyue ( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)
      Integrated satellite-terrestrial networks (ISTNs) are one of the new research directions for future 5G networks. Satellite coverage enables 5G communication throughout most of the world. However, the security concerns ...
    • Changing Dynamics of network security involving hacking/cracking with next generation firewalls (NGFW) 

      Vishwakarma, Alok; Wafa Waheeda, S. ( IGI Global , 2016 , Book chapter)
      With increasing number of users on the internet, risk of security and probability of vulnerable attacks are increasing day by day. For every user connected to network, security attacks like hacking and cracking are very ...
    • Channel Aware and Queue Aware Scheduling in LTE Uplink 

      Hajipour J.; Mohamed A.; Leung V.C.M. ( SpringerLink , 2012 , Conference Paper)
      Long Term Evolution (LTE) uses single carrier frequency division multiple access (SCFDMA) technique as the multiple access scheme in the uplink, due to its low peak to average power ratio (PAPR) compared to orthogonal ...
    • Channel Measurement and Resource Allocation Scheme for Dual-Band Airborne Access Networks 

      Zhang, Ruonan; Guo, Qi; Zhai, Daosen; Zhou, Deyun; Du, Xiaojiang; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)
      The aerial base stations (ABSs) can be quickly deployed to provide emergency communications and airborne network infrastructures. How to ensure wide coverage, reliable links, and high throughput for ground users under the ...
    • Channel secondary random process for robust secret key generation 

      Badawy A.; Khattab T.; Elfouly T.; Chiasserini C.-F.; Mohamed A.; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)
      The broadcast nature of wireless communications imposes the risk of information leakage to adversarial users or unauthorized receivers. Therefore, information security between intended users remains a challenging issue. ...
    • Channel-, Queue-, and Delay-Aware Resource Allocation in Buffer-Aided Relay-Enhanced OFDMA Networks 

      Hajipour, Javad; Mohamed, Amr; Leung, Victor C.M. ( Institute of Electrical and Electronics Engineers Inc. , 2016 , Article)
      Resource allocation is an important factor in providing different varieties of services in next-generation broadband wireless systems. In this paper, we consider dynamic routing and subchannel allocation for providing ...