السجلات المعروضة 2105 -- 2124 من 2264

    • Towards energy efficient relay placement and load balancing in future wireless networks 

      Lateef H.Y.; Chiasserini C.F.; Elbatt T.; Mohamed A.; Guizani M. ( Institute of Electrical and Electronics Engineers Inc. , 2014 , Conference Paper)
      This paper presents an energy efficient relay deployment algorithm that determines the optimal location and number of relays for future wireless networks, including Long Term Evolution (LTE)-Advanced heterogeneous networks. ...
    • Towards energy-aware 5G heterogeneous networks 

      Lateef, Hafiz Yasar; Dohler, Mischa; Mohammed, Amr; Guizani, Mohsen Mokhtar; Chiasserini, Carla Fabiana ( Springer International Publishing , 2016 , Book chapter)
      Over the past decade, the telecommunication industry has witnessed excessive growth in the number of mobile users. Market forecasts envision that there will be nearly 8.6 billion mobile devices worldwide by 2017. This ...
    • Towards Extended Bit Tracking for Scalable and Robust RFID Tag Identification Systems 

      Fahim A.; Elbatt T.; Mohamed A.; Al-Ali A. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Article)
      The surge in demand for Internet of Things (IoT) systems and applications has motivated a paradigm shift in the development of viable radio frequency identification technology (RFID)-based solutions for ubiquitous real-Time ...
    • Towards model-based management of database fragmentation 

      Ali, Asim; Jia, Rui; Erradi, Abdelkarim; Abdelwahed, Sherif; Hadjidj, Rachid ( USENIX Association , 2013 , Conference Paper)
      The performance of a database can significantly deteriorate due to the fragmentation of data/index files. Manual database defragmentation and performance optimization remain time consuming and even infeasible as it requires ...
    • Towards NLP-based Semi-automatic Preparation of Content for Language Learning using LingoSnacks m-Learning Platform 

      Erradi, Abdelkarim; Hind, Almerekhi; Sajeda, Nahia ( Institute of information System and Research Center (IISRC) , 2013 , Article)
      Vocabulary growth is an important element for language learning but it requires repeated and varied exposure to the new words and their usage in different context. However preparing suitable learning content for effective ...
    • Towards On-Device Dehydration Monitoring Using Machine Learning from Wearable Device's Data 

      Sabry, Farida; Eltaras, Tamer; Labda, Wadha; Hamza, Fatima; Alzoubi, Khawla; ... more authors ( MDPI , 2022 , Article)
      With the ongoing advances in sensor technology and miniaturization of electronic chips, more applications are researched and developed for wearable devices. Hydration monitoring is among the problems that have been recently ...
    • Towards pedagogy-driven learning design: A case study of problem-based learning design 

      Miao, Yongwu; Ally, Mohamed; Samaka, Mohammed; Tsinakos, Avgoustos A. ( Springer Verlag , 2014 , Conference Paper)
      Existing learning design languages are pedagogy-neutral. They provide insufficient support to explicitly represent pedagogy-specific approaches such as problem-based learning (PBL). As the first step towards pedagogy-driven ...
    • Towards Proactive Fault Management of Enterprise Systems 

      Jia, Rui; Abdelwahed, Sherif; Erradi, Abdelkarim ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)
      This paper introduces a model-based approach for autonomic fault management of computing systems. The proposed approach can recover a system from common faults while minimizing the impact on the system's quality of service ...
    • Towards scalable traffic management in cloud data centers 

      Assi, Chadi; Ayoubi, Sara; Sebbah, Samir; Shaban, Khaled ( Institute of Electrical and Electronics Engineers Inc. , 2014 , Article)
      Cloud Computing is becoming a mainstream paradigm, as organizations, large and small, begin to harness its benefits. This novel technology brings new challenges, mostly in the protocols that govern its underlying infrastructure. ...
    • Towards secure and efficient energy trading in IIoT-enabled energy internet: A blockchain approach 

      Guan, Zhitao; Lu, Xin; Wang, Naiyu; Wu, Jun; Du, Xiaojiang; ... more authors ( Elsevier B.V. , 2019 , Article)
      Nowadays, with the rapid development and wide application of Internet of Things technology, Industrial Internet of Things (IIoT) has become an essential part of industrial systems. A large number of IoT devices has enabled ...
    • Towards Secure IoT Networks in Healthcare Applications: A Game Theoretic Anti-Jamming Framework 

      Gouissem, A.; Abualsaud, K.; Yaacoub, E.; Khattab, T.; Guizani, M. ( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)
      The internet of Things (IoT) is used to interconnect a massive number of heterogeneous resource constrained smart devices. This makes such networks exposed to various types of malicious attacks. In particular, jamming ...
    • Towards secure private and trustworthy human-centric embedded machine learning: An emotion-aware facial recognition case study 

      Butt, Muhammad Atif; Qayyum, Adnan; Ali, Hassan; Al-Fuqaha, Ala; Qadir, Junaid ( Elsevier , 2023 , Article)
      The use of artificial intelligence (AI) at the edge is transforming every aspect of the lives of human beings from scheduling daily activities to personalized shopping recommendations. Since the success of AI is to be ...
    • Towards Sustainable Energy: A Systematic Review of Renewable Energy Sources, Technologies, and Public Opinions 

      Qazi, Atika; Hussain, Fayaz; Rahim, Nasrudin ABD.; Hardaker, Glenn; Alghazzawi, Daniyal; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)
      The use of renewable energy resources, such as solar, wind, and biomass will not diminish their availability. Sunlight being a constant source of energy is used to meet the ever-increasing energy need. This review discusses ...
    • Towards the design of smart video-surveillance system 

      Beghdadi A.; Asim M.; Almaadeed N.; Qureshi M.A. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
      Security and monitoring systems are increasingly demanding in terms of quality, reliability and flexibility especially those dedicated to video surveillance. The aim of this study is to identify some limiting factors in ...
    • TPPR: A Trust-Based and Privacy-Preserving Platoon Recommendation Scheme in VANET 

      Zhang, Chuan; Zhu, Liehuang; Xu, Chang; Sharif, Kashif; Ding, Kai; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)
      Vehicle platoon, a novel vehicle driving paradigm that organizes a group of vehicles in the nose-to-tail structure, has been considered as a potential solution to reduce traffic congestion and increase travel comfort. In ...
    • Traceability for adaptive information security in the cloud 

      Nhlabatsi, Armstrong; Thun, Thein; Khan, Niamul; Yu, Yijun; Bandara, Arosha; ... more authors ( IEEE Computer Society , 2014 , Conference Paper)
      One of the key challenges in cloud computing is the security of the consumer data stored and processed by cloud machines. When the usage context of a cloud application changes, or when the context is unknown, there is a ...
    • Tracking and constraining authorization provenance 

      Hu, Jinwei; Khan, Khaled M.; Bai, Yun; Zhang, Yan ( Springer Berlin Heidelberg , 2012 , Conference Paper)
      Authorization provenance concerns how an authorization is derived. It appears important to define authorization provenance to (1) analyze policy bases, (2) defend against a class of attacks, and (3) audit authorizations. ...
    • Trading wireless information and power transfer: Relay selection to minimize the outage probability 

      Butt M.M.; Nasir A.; Mohamed A.; Guizani M. ( Institute of Electrical and Electronics Engineers Inc. , 2014 , Conference Paper)
      This paper studies the outage probability minimization problem for a multiple relay network with energy harvesting constraints. The relays are hybrid nodes used for simultaneous wireless information and power transfer from ...
    • Trading wireless information and power transfer: Relay selection to minimize the outage probability 

      Butt, M. Majid; Nasir, Adnan; Mohamed, Amr; Guizani, Mohsen ( IEEE , 2014 , Conference Paper)
      This paper studies the outage probability minimization problem for a multiple relay network with energy harvesting constraints. The relays are hybrid nodes used for simultaneous wireless information and power transfer from ...
    • Traffic Analysis Attacks on Tor: A Survey 

      Basyoni L.; Fetais N.; Erbad A.; Mohamed A.; Guizani M. ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      The Tor anonymity network is one of the most popular and widely used tools to protect the privacy of online users. Tor provides defenses against multiple adversarial activities aiming to identify or trace the users. Traffic ...