Now showing items 2107-2126 of 2211

    • Understanding the topologies of BitTorrent networks: A measurement view 

      Su, Majing; Zhang, Hongli; Du, Xiaojiang; Fang, Binxing; Guizani, Mohsen (2012 , Conference Paper)
      BitTorrent (BT) is one of the most popular Peer-to-Peer (P2P) network applications. Most characteristics (except the topology) of BT network have been examined extensively by measurement approaches. In this work, we deploy ...
    • Unleashing the secure potential of the wireless physical layer: Secret key generation methods 

      Badawy, Ahmed; Elfouly, Tarek; Khattab, Tamer; Mohamed, Amr; Guizani, Mohsen ( Elsevier B.V. , 2016 , Report)
      Within the paradigm of physical layer security, a physical layer characteristic is used as a common source of randomness to generate the secret key. This key is then used to encrypt the data to hide information from ...
    • Unlocking Unlicensed Band Potential to Enable URLLC in Cloud Robotics for Ubiquitous IoT 

      Bajracharya, Rojeena; Shrestha, Rakesh; Hassan, Syed Ali; Jung, Haejoon; Ansari, Rafay Iqbal; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)
      Cloud robotics (CR) support extremely high reliability and low-latency communications in ubiquitous Internet of Things applications. However, many of those applications currently rely on wired connection, limiting their ...
    • Unsupervised adaptive microblog filtering for broad dynamic topics 

      Magdy, Walid; Elsayed, Tamer ( Elsevier , 2016 , Article)
      Information filtering has been a major task of study in the field of information retrieval (IR) for a long time, focusing on filtering well-formed documents such as news articles. Recently, more interest was directed towards ...
    • Unsupervised feature selection method for improved human gait recognition 

      Rida I.; Al-Maadeed, Somaya; Bouridane A. ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)
      Gait recognition is an emerging biometric technology which aims to identify people purely through the analysis of the way they walk. The technology has attracted interest as a method of identification because it is ...
    • Unsupervised learning approach for web application auto-decomposition into microservices 

      Abdullah M.; Iqbal W.; Erradi A. ( Elsevier Inc. , 2019 , Article)
      Nowadays, large monolithic web applications are manually decomposed into microservices for many reasons including adopting a modern architecture to ease maintenance and increase reusability. However, the existing approaches ...
    • Unsupervised Technique for Anomaly Detection in Qatar Stock Market 

      Al-Thani H.; Hassen H.; Al-Maadced S.; Fetais N.; Jaoua A. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
      The aim of anomaly detection is to find patterns or data points that are not confirming the expected behavior inside the dataset. Techniques from a variety of disciplines like machine learning, statistics, information ...
    • Untrained Neural Network Priors for Inverse Imaging Problems: A Survey 

      Qayyum, Adnan; Ilahi, Inaam; Shamshad, Fahad; Boussaid, Farid; Bennamoun, Mohammed; ... more authors ( IEEE Computer Society , 2023 , Article)
      In recent years, advancements in machine learning (ML) techniques, in particular, deep learning (DL) methods have gained a lot of momentum in solving inverse imaging problems, often surpassing the performance provided by ...
    • Up and away: A visually-controlled easy-to-deploy wireless UAV Cyber-Physical testbed 

      Saeed A.; Neishaboori A.; Mohamed A.; Harras K.A. ( IEEE Computer Society , 2014 , Conference Paper)
      Cyber-Physical Systems (CPS) have the promise of presenting the next evolution in computing with potential applications that include aerospace, transportation, and various automation systems. These applications motivate ...
    • Urban air pollution monitoring system with forecasting models 

      Shaban, Khaled Bashir; Kadri, Abdullah; Rezk, Eman ( Institute of Electrical and Electronics Engineers Inc. , 2016 , Article)
      A system for monitoring and forecasting urban air pollution is presented in this paper. The system uses low-cost air-quality monitoring motes that are equipped with an array of gaseous and meteorological sensors. These ...
    • Use of combination of PCA and ANFIS in infarction volume growth rate prediction in ischemic stroke 

      Ali, Rahma; Qidwai, Uvais; Ilyas, Saadat K. ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)
      Stroke is one of the leading causes of death in the world today. Treatment of stroke using a procedure called Decompressive Hemicraniectomy requires the patient to undergo multiple CT scans in order to determine the size ...
    • Use of mobile learning apps in workplace learning 

      Ally, Mohamed; Samaka, Mohammed; Ismail, Loay; Impagliazzo, John ( IEEE Computer Society , 2013 , Article)
      Organizations are starting to use mobile learning to train workers and to provide professional development of workers so that they can function on the job. The training can be delivered using mobile apps which provides the ...
    • User privacy and data trustworthiness in mobile crowd sensing 

      He, Daojing; Chan, Sammy; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Article)
      Smartphones and other trendy mobile wearable devices are rapidly becoming the dominant sensing, computing and communication devices in peoples' daily lives. Mobile crowd sensing is an emerging technology based on the sensing ...
    • User Scheduling in Federated Learning over Energy Harvesting Wireless Networks 

      Hamdi, Rami; Chen, Mingzhe; Ben Said, Ahmed; Qaraqe, Marwa; Poor, H. Vincent ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)
      In this paper, the deployment of federated learning (FL) is investigated in an energy harvesting wireless network in which the base station (BS) is equipped with a massive multiple-input multiple-output (MIMO) system and ...
    • User-centric network selection in multi-RAT systems 

      Awad, Alaa; Mohamed, Amr; Chiasserini, Carla-Fabiana ( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)
      Rising numbers of mobile devices and wireless access technologies motivate network operators to leverage spectrum across multiple radio access networks, in order to significantly enhance quality of service as well as network ...
    • Using a PBL authoring tool to train teachers in designing an online PBL unit 

      Miao, Yongwu; Samaka, Mohammed; Wang, Disi; Ali, Zeyad; Romanowski, Michael H. ( Asia-Pacific Society for Computers in Education , 2014 , Conference Paper)
      Problem-based learning (PBL) is proposed as one of the most well-known alternatives to subject-based learning in educating graduates to become independent workers, critical thinkers, problem solvers, lifelong learners, and ...
    • Using an outcome-based approach to assess computing programs 

      Impagliazzo, John ( ACM New York, NY, USA , 2007 , Poster)
      In this poster, the author provides a pictorial demonstration of the elements associated with assessment and its relationship to the newly developed requirements by accrediting agencies in various countries. The presentation ...
    • Using block cipher for confidentiality of images in cloud-based systems 

      Rihan, Rana Adnan; Khan, Khaled M. ( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)
      This paper deals with outsourcing of computing to cloud servers where clients' images are computed and stored. It proposes a technique that obfuscates images before sending them to servers. Cloud servers can perform ...
    • Using Bloom Filter to Generate a Physiological Signal-Based Key for Wireless Body Area Networks 

      Yao X.; Liao W.; Du X.; Cheng X.; Guizani M. ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)
      Wireless body area networks (WBANs) are often used to provide communication services for the data from the body. Since the data in WBANs are always closely related to individuals, they need to be kept secret with integrity. ...
    • Using casual reasoning for anomaly detection among ECG live data streams in ubiquitous healthcare monitoring systems 

      Qidwai U.; Chaudhry J.; Jabbar S.; Zeeshan H.M.A.; Janjua N.; ... more authors ( Springer Verlag , 2019 , Article)
      Anomalies in cardiac functionality can be fatal. Early detection of these anomalies, and in many cases their precursors, can save lives. The probability of the occurrence of these anomalies is extremely among people with ...