Now showing items 428-447 of 2266

    • Autonomous corrosion detection in gas pipelines: A hybrid-fuzzy classifier approach using ultrasonic nondestructive evaluation protocols 

      Qidwai, Uvais A. ( IEEE , 2009 , Article)
      In this paper, a customized classifier is presented for the industry-practiced nondestructive evaluation (NDE) protocols using a hybrid-fuzzy inference system (FIS) to classify the corrosion and distinguish it from the ...
    • Autonomous vehicle sunshade using aluminum panels 

      Bin Abul Kashem, Saad; Shahid, Fawad; Qidwai, Uvais; Suresh, P.; Ahmed, Jubaer; ... more authors ( Springer Science and Business Media Deutschland GmbH , 2021 , Conference Paper)
      The heat build-up inside of a vehicle cabin due to the direct composure of thermal energy when parked outside during the day can be a huge dilemma, the intensity of the problem can be decreased by covering the windows of ...
    • B5G: Predictive Container Auto-Scaling for Cellular Evolved Packet Core 

      Bello Y.; Abdellatif A.A.; Allahham M.S.; Hussein A.R.; Erbad A.; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)
      In order to maintain a satisfactory performance in the midst of rapid growth of mobile traffic, the mobile network infrastructure needs to be scaled. Thus there has been significant interest in scalability of mobile core ...
    • B5G: Predictive Container Auto-Scaling for Cellular Evolved Packet Core 

      Bello Y.; Allahham M.S.; Refaey A.; Erbad A.; Mohamed A.; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)
      The increase in mobile traffic which is accompanied by a random workload, variations necessitate an upgrade of mobile network infrastructure to maintain acceptable network performance. Scaling the mobile core network ...
    • Background-Foreground Modeling Based on Spatiotemporal Sparse Subspace Clustering 

      Javed, Sajid; Mahmood, Arif; Bouwmans, Thierry; Jung, Soon Ki ( Institute of Electrical and Electronics Engineers Inc. , 2017 , Article)
      Background estimation and foreground segmentation are important steps in many high-level vision tasks. Many existing methods estimate background as a low-rank component and foreground as a sparse matrix without incorporating ...
    • Backscatter-Enabled Efficient V2X Communication with Non-Orthogonal Multiple Access 

      Khan, Wali Ullah; Jameel, Furqan; Kumar, Neeraj; Jantti, Riku; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)
      Non-orthogonal multiple access (NOMA) and backscatter communications are considered to be promising technologies for beyond the fifth-generation (5G) due to their applications in large-scale Internet-of-things networks for ...
    • BADR: A Talking Face To Teach Arabic Vocabulary Under COVID-19 

      Ali, Zeyad; Saleh, Moutaz; Al-Maadeed, Sumaya; AlJa'am, Jihad; Massaro, Dominic; ... more authors ( IEEE , 2022 , Conference Paper)
      We propose an Arabic talking face called Badr to teach the language vocabulary for young students under COVID-19 pandemic. Badr is built on the previous talking face Baldi (e.g., an American English talking face) with many ...
    • Battery status-aware authentication scheme for V2G networks in smart grid 

      Liu, Hong; Ning, Huansheng; Zhang, Yan; Guizani, Mohsen (2013 , Article)
      Vehicle-to-grid (V2G) is emerging as an attractive paradigm in smart grid, and provides power and information services by periodically collecting power status of battery vehicles (BVs). During a BV's interaction with power ...
    • Battery-Induced Load Hiding and Its Utility Consequences 

      Aly, Hussein; Altamimi, Emran; Al-Ali, Abdulaziz; Al-Ali, Abdulla; Malluhi, Qutaibah ( Institute of Electrical and Electronics Engineers Inc. , 2024 , Conference Paper)
      The introduction of smart grids allows utility providers to collect detailed data about consumers, which can be utilized to enhance grid efficiency and reliability. However, this data collection also raises privacy concerns. ...
    • Bayesian Beamforming for Mobile Millimeter Wave Channel Tracking in the Presence of DOA Uncertainty 

      Yang, Yan; Dang, Shuping; Wen, Miaowen; Mumtaz, Shahid; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)
      This paper proposes a Bayesian approach for angle-based hybrid beamforming and tracking that is robust to uncertain or erroneous direction-of-arrival (DOA) estimation in millimeter wave (mmWave) multiple input multiple ...
    • Bayesian Hierarchical Clustering for Studying Cancer Gene Expression Data with Unknown Statistics 

      Sirinukunwattana, Korsuk; Savage, Richard S.; Bari, Muhammad F.; Snead, David R.J.; Rajpoot, Nasir M. ( Public Library of Science , 2013 , Article)
      Clustering analysis is an important tool in studying gene expression data. The Bayesian hierarchical clustering (BHC) algorithm can automatically infer the number of clusters and uses Bayesian model selection to improve ...
    • Bayesian network based heuristic for energy aware EEG signal classification 

      Mohamed A.; Shaban K.B.; Mohamed A. ( SpringerLink , 2013 , Conference Paper)
      A major challenge in the current research of wireless electroencephalograph (EEG) sensor-based medical or Brain Computer Interface applications is how to classify EEG signals as accurately and energy efficient as possible. ...
    • BEC: A novel routing protocol for balanced energy consumption in Wireless Body Area Networks 

      Moid Sahndhu, Muhammad; Javaid, Nadeem; Imran, Muhammad; Guizani, Mohsen; Khan, Zahoor Ali; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)
      Wireless Body Area Networks (WBANs) are getting growing interest because of their suitability for wide range of medical and non-medical applications. These applications demand WBAN to stay functional for a longer time which ...
    • Behaviour of RC beams strengthened in shear using near surface embedded FRCM 

      Ebead U.; Wakjira T.G. ( Institute of Physics Publishing , 2018 , Conference Paper)
      This paper presents an experimental study on the efficacy of a lately introduced "near surface embedded" technique (NSE) for fabric reinforced cementitious matrix (FRCM) for the strengthening of reinforced concrete (RC) ...
    • BEMD-3DCNN-based method for COVID-19 detection 

      Riahi, A.; Elharrouss, O.; Al-Maadeed, Somaya ( Elsevier Ltd , 2022 , Article)
      The coronavirus outbreak continues to spread around the world and no one knows when it will stop. Therefore, from the first day of the identification of the virus in Wuhan, China, scientists have launched numerous research ...
    • Bi-attention DoubleUNet: A deep learning approach for carotid artery segmentation in transverse view images for non-invasive stenosis diagnosis 

      Najmath, Ottakath; Akbari, Younes; Al-Maadeed, Somaya Ali; Bouridane, Ahmed; Zughaier, Susu M.; ... more authors ( Elsevier , 2024 , Article)
      The carotid artery is a vital blood vessel that supplies oxygenated blood to the brain. Blockages in this artery can lead to life-threatening illnesses, making accurate diagnosis essential. While ultrasound (US) imaging ...
    • Bidirectional Parallel Capacitive Data Links: Modeling and Experimental Results 

      Sawma C.; Hassan A.; Kassem A.; Al-Maadeed S.; Sawan M. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Article)
      We present, in this paper, a bidirectional capacitive data link. Enhancement of the spatial pulse position modulation used on the downlink is introduced, and a load-shift keying modulation is implemented for the uplink. ...
    • Big data perspective with otological modeling for long term traceability of cultural heritage 

      Naeem, Muhammad; Fahad, Muhammad; Moalla, Néjib; Ouzrout, Yacine; Bouras, Abdelaziz ( Springer New York LLC , 2015 , Conference Paper)
      The safeguarding of cultural heritage has brought forward the generation of heterogeneous, complex, diversified and irreplaceable digital data. It becomes difficult for an object with missing characteristics to perform the ...
    • BigCrypt for big data encryption 

      Al Mamun, Abdullah; Salah, Khaled; Al-maadeed, Somaya; Sheltami, Tarek R. ( Institute of Electrical and Electronics Engineers Inc. , 2017 , Conference Paper)
      as data size is growing up, cloud storage is becoming more familiar to store a significant amount of private information. Government and private organizations require transferring plenty of business files from one end to ...
    • BigIR at CLEF 2018: Detection and verification of check-worthy political claims 

      Yasser K.; Kutlu M.; Elsayed T. ( CEUR-WS , 2018 , Conference Paper)
      With the enormous amount of misinformation spread over the Internet, manual fact-checking is no longer feasible to prevent its negative impact. There is an urgent need for automated systems that can make fact-checking ...