Now showing items 1355-1374 of 2288

    • A load-adaptive fair access protocol for MAC in underwater acoustic sensor networks 

      Zhang, Wenbo; Wang, Xin; Han, Guangjie; Peng, Yan; Guizani, Mohsen; ... more authors ( Academic Press , 2021 , Article)
      To address time unfairness access problems in the dynamic channel, an underwater adaptive contention window (CW) adjustment backoff algorithm (QL-UACW) based on Q-learning is presented in this paper. That algorithm employs ...
    • Locality Sensitive Deep Learning for Detection and Classification of Nuclei in Routine Colon Cancer Histology Images 

      Sirinukunwattana, Korsuk; Raza, Shan E Ahmed; Tsang, Yee-Wah; Snead, David R. J.; Cree, Ian A.; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2016 , Article)
      Detection and classification of cell nuclei in histopathology images of cancerous tissue stained with the standard hematoxylin and eosin stain is a challenging task due to cellular heterogeneity. Deep learning approaches ...
    • Location privacy preservation for mobile users in location-based services 

      Sun, Gang; Cai, Shuai; Yu, Hongfang; Maharjan, Sabita; Chang, Victor; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)
      Because location-based cyber services are increasingly found in mobile applications (e.g., social networking and maps), user location privacy preservation is essential and remains one of the several ongoing research ...
    • Location-Based Seeds Selection for Influence Blocking Maximization in Social Networks 

      Zhu, Wenlong; Yang, Wu; Xuan, Shichang; Man, Dapeng; Wang, Wei; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)
      Influence blocking maximization (IBM) is a key problem for viral marketing in competitive social networks. Although the IBM problem has been extensively studied, existing works neglect the fact that the location information ...
    • LocationSpark: A distributed in-memory data management system for big spatial data 

      Tang, Mingjie; Yu, Yongyang; Malluhi, Qutaibah M.; Ouzzani, Mourad; Aref, Walid G. ( VLDB Endowment , 2015 , Conference Paper)
      We present LocationSpark, a spatial data processing system built on top of Apache Spark, a widely used distributed data processing system. LocationSpark offers a rich set of spatial query operators, e.g., range search, ...
    • Logic programs with ordered disjunction: First-order semantics and expressiveness 

      Asuncion, Vernon; Zhang, Yan; Zhang, Heng ( AAAI Publications , 2014 , Conference Paper)
      Logic programs with ordered disjunction (LPODs) (Brewka 2002) generalize normal logic programs by combining alternative and ranked options in the heads of rules. It has been showed that LPODs are useful in a number of areas ...
    • Long-Term Power Procurement Scheduling Method for Smart-Grid Powered Communication Systems 

      Ben Ghorbel M.; Hamdaoui B.; Guizani M.; Mohamed A. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Article)
      With the emergence of smart grids, adopting dynamic energy pricing models has become both possible and desirable. With such a pricing dynamicity, great savings in energy costs can be achieved in telecommunication systems ...
    • Low complexity closed-loop strategy for mmWave communication in industrial intelligent systems 

      Chen, Ning; Lin, Hongyue; Zhao, Yifeng; Huang, Lianfen; Du, Xiaojiang; ... more authors ( John Wiley and Sons Ltd , 2022 , Article)
      Modern communication and computing technology is the basic support of the industrial intelligent systems (IIS). As a key component of IIS, the smart port is essential to be offered low-complexity and high-reliability ...
    • Low complexity target coverage heuristics using mobile cameras 

      Neishaboori A.; Saeed A.; Harras K.A.; Mohamed A. ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)
      Wireless sensor and actuator networks have been extensively deployed for enhancing industrial control processes and supply-chains, and many forms of surveillance and environmental monitoring. The availability of low-cost ...
    • Low Rate DoS Attack Detection in IoT - SDN using Deep Learning 

      Ilango, Harun Surej; Ma, Maode; Su, Rong ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)
      The lack of standardization and the heterogeneous nature of IoT, exacerbated the issue of security and privacy. In recent literature, to improve security at the network level, the possibility of using SDN for IoT networks ...
    • Low-quality facial biometric verification via dictionary-based random pooling 

      Al-Maadeed, Somaya; Bourif, Mehdi; Bouridane, Ahmed; Jiang, Richard ( Elsevier Ltd , 2016 , Article)
      In the past decade, visual surveillance has emerged as an effective tool in public security applications. Due to the technical limitations of both surveillance cameras and transmission speed, videos collected from surveillance ...
    • LWKPCA: A New Robust Method for Face Recognition Under Adverse Conditions 

      Maafiri, Ayyad; Bir-Jmel, Ahmed; Elharrouss, Omar; Khelifi, Fouad; Chougdali, Khalid ( Institute of Electrical and Electronics Engineers Inc. (IEEE) , 2022 , Article)
      Over the last two decades, face recognition (FR) has become one of the most prevailing biometric applications for effective people identification as it offers practical advantages over other biometric modalities. However, ...
    • M-LEARNING FOR TRAINING ENGLISH AT WORKPLACE 

      Samaka, Mohammed; Ismail, Loay; Abu Abdulla, Nosayba; Clark, Brendan ( IATED Digital Library , 2012 , Article)
      The research project described in this paper involves in using of a mobile learning approach to train newly recruited trainees on workplace English, so they can become more effective when communicating in the workplace. ...
    • Machine learning aided load balance routing scheme considering queue utilization 

      Yao, Haipeng; Yuan, Xin; Zhang, Peiying; Wang, Jingjing; Jiang, Chunxiao; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)
      Due to the rapid development of network techniques, packet-switched systems experience high-speed growth of traffic, which imposes a heavy and unbalanced burden on the routers. Hence, efficient routing schemes are required ...
    • Machine Learning and Digital Heritage: The CEPROQHA Project Perspective 

      Belhi, Abdelhak; Gasmi, Houssem; Bouras, Abdelaziz; Alfaqheri, Taha; Aondoakaa, Akuha Solomon; ... more authors ( Springer , 2020 , Conference Paper)
      Through this paper, we aim at investigating the impact of artificial intelligence technologies on cultural heritage promotion and long-term preservation in terms of digitization effectiveness, attractiveness of the assets, ...
    • Machine Learning Based Cloud Computing Anomalies Detection 

      Chkirbene Z.; Erbad A.; Hamila R.; Gouissem A.; Mohamed A.; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)
      Recently, machine learning algorithms have been proposed to design new security systems for anomalies detection as they exhibit fast processing with real-time predictions. However, one of the major challenges in machine ...
    • Machine Learning for Anomaly Detection and Categorization in Multi-Cloud Environments 

      Salman, Tara; Bhamare, Deval; Erbad, Aiman; Jain, Raj; Samaka, Mohammed ( Institute of Electrical and Electronics Engineers Inc. , 2017 , Conference Paper)
      Cloud computing has been widely adopted by application service providers (ASPs) and enterprises to reduce both capital expenditures (CAPEX) and operational expenditures (OPEX). Applications and services previously running ...
    • Machine Learning for Healthcare Wearable Devices: The Big Picture 

      Sabry, Farida; Eltaras, Tamer; Labda, Wadha; Alzoubi, Khawla; Malluhi, Qutaibah ( John Wiley and Sons Inc , 2022 , Article Review)
      Using artificial intelligence and machine learning techniques in healthcare applications has been actively researched over the last few years. It holds promising opportunities as it is used to track human activities and ...
    • Machine learning for prediction of the uniaxial compressive strength within carbonate rocks 

      Abdelhedi, Mohamed; Jabbar, Rateb; Said, Ahmed Ben; Fetais, Noora; Abbes, Chedly ( Springer Science and Business Media Deutschland GmbH , 2023 , Article)
      The Uniaxial Compressive Strength (UCS) is an essential parameter in various fields (e.g., civil engineering, geotechnical engineering, mechanical engineering, and material sciences). Indeed, the determination of UCS in ...
    • Machine learning in the Internet of Things: Designed techniques for smart cities 

      Din I.U.; Guizani M.; Rodrigues J.J.P.C.; Hassan S.; Korotaev V.V. ( Elsevier B.V. , 2019 , Article)
      Machine learning is one of the emerging technologies that has grabbed the attention of academicians and industrialists, and is expected to evolve in the near future. Machine learning techniques are anticipated to provide ...