Browsing Computer Science & Engineering by Title
Now showing items 619-638 of 2261
-
Cooperative Q-learning techniques for distributed online power allocation in femtocell networks
( John Wiley & Sons, Ltd. , 2015 , Article)In this paper, we address the problem of distributed interference management of femtocells that share the same frequency band with macrocells using distributed multi-agent Q-learning. We formulate and solve two problems ... -
Cooperative Secondary Encryption for Primary Privacy Preserving in Cognitive Radio Networks
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)Aiming at protecting primary privacy messages and supporting secondary quality-of-service (QoS), we propose a secondary encrypted secure strategy for cognitive radio networks. In this scheme, a primary system directly ... -
Cooperative Secondary Users selection in Cognitive Radio Ad Hoc Networks
( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)Secondary Users (SUs) have capability to sense available licensed spectrum in Cognitive Radio Networks (CRNs). Hence, SUs can opportunistically access to the licensed spectrum without disturbing Primary Users (PUs). In ... -
Cooperative spectrum sharing in cognitive radio networks: A distributed matching approach
( Institute of Electrical and Electronics Engineers Inc. , 2014 , Article)We study the relay-based communication schemes for cooperative spectrum sharing among multiple primary users (PUs) and multiple secondary users (SUs) with incomplete information. Inspired by the matching theory, we model ... -
Coordinated robotic system for civil structural health monitoring
( EDP Sciences , 2017 , Conference Paper)With the recent advances in sensors, robotics, unmanned aerial vehicles, communication, and information technologies, it is now feasible to move towards the vision of ubiquitous cities, where virtually everything throughout ... -
Coordinated Robotic System for Civil Structural Health Monitoring
( Hamad bin Khalifa University Press (HBKU Press) , 2018 , Conference Paper)With the recent advances in sensors, robotics, unmanned aerial vehicles, communication, and information technologies, it is now feasible to move towards the vision of ubiquitous cities, where virtually everything throughout ... -
Copy limited flooding over opportunistic networks
(2013 , Conference Paper)Mobile devices with local wireless interfaces can be organized into opportunistic networks which exploit communication opportunities arising from the movement of their users. With the proliferation and increasing capabilities ... -
CorrAUC: A Malicious Bot-IoT Traffic Detection Method in IoT Network Using Machine-Learning Techniques
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)Identification of anomaly and malicious traffic in the Internet-of-Things (IoT) network is essential for the IoT security to keep eyes and block unwanted traffic flows in the IoT network. For this purpose, numerous ... -
Correction to: Multilayered-quality education ecosystem (MQEE): an intelligent education modal for sustainable quality education
( Springer , 2021 , Other)The original version of this article unfortunately contained an error and it has been corrected with this erratum. The Acknowledgements section was missing from this article and should have read "The third author acknowledges ... -
Cost effective assessment of transformers using machine learning approach
( IEEE Computer Society , 2014 , Conference Paper)Furan content in transformer oil is highly correlated with the transformer insulation paper aging. In this paper, the ranges of furan content in power transformer is predicted using measurements of transformer oil tests ... -
Cost Optimization Algorithms for Hot and Cool Tiers Cloud Storage Services
( IEEE Computer Society , 2018 , Conference Paper)In this paper, we consider the data placement problem in the new generation tiered cloud storage services offering hot and cool tiers that are characterized by differentiated Quality of Service (i.e, access latency, ... -
CouchDB Based Real-Time Wireless Communication System for Clinical Simulation
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)Medical simulators are advancing in technology and complexity to enhance realism and hence implementing a real-time communication system for such simulators is a challenge that engineers face. This paper follows up on the ... -
Covid -19 lockdown-challenges to higher education in qatar
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)Covid 19 is a pandemic disease and it has spread all over the world. Due to the concern for the health of students, colleges and school authorities all over the world have decided to close the education institution and ... -
COVID-19 lesion segmentation using lung CT scan images: Comparative study based on active contour models
( MDPI , 2021 , Article)Pneumonia is a lung infection that threatens all age groups. In this paper, we use CT scans to investigate the effectiveness of active contour models (ACMs) for segmentation of pneumonia caused by the Coronavirus disease ... -
COVID-19 Optimizer Algorithm, Modeling and Controlling of Coronavirus Distribution Process
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)The emergence of novel COVID-19 is causing an overload on public health sector and a high fatality rate. The key priority is to contain the epidemic and reduce the infection rate. It is imperative to stress on ensuring ... -
COVID-19: Modeling, AI and Innovative Technologies to Flatten the Curve
( College of Engineering - Qatar University , 2020 , Video)NA -
CPSLP: A Cloud-Based Scheme for Protecting Source Location Privacy in Wireless Sensor Networks Using Multi-Sinks
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)Source location privacy is a major problem in wireless sensor networks (WSNs). WSNs are usually deployed in random areas with no protection. The source location reveals valuable information about targets. If an adversary ... -
Cranial reconstruction after decompressive craniectomy: Prediction of complications using fuzzy logic
( IEEE , 2011 , Article)Introduction: Cranial reconstruction after decompressive craniectomy (DC) has been shown to be associated with a relatively high complication rate (16.4%-34%) compared with standard neurosurgical procedures (2%-5%). Most ... -
Credit default swap pricing using artificial neural networks
(2010 , Conference Paper)The credit derivatives market has experienced unprecedented growth over the past few years. As such, there is a growing interest in tools for pricing the most prominent credit derivative, the credit default swap. In this ... -
Cross Layer NOMA Interference Mitigation for Femtocell Users in 5G Environment
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)In this paper, we propose a joint channel allocation and power control algorithm by using cognitive radio non-orthogonal multiple access (CR-NOMA) for femtocell users (FUs). The aim is to maximize the sum rate of the FUs ...