• Convolutional Autoencoder Approach for EEG Compression and Reconstruction in m-Health Systems 

      Al-Marridi A.Z.; Mohamed A.; Erbad A. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
      In the last few years, the number of patients with chronic diseases requiring constant monitoring increased rapidly, which motivates researchers to develop scalable remote health applications. Nevertheless, the amount of ...
    • Cooperative access in cognitive radio networks: Stable throughput and delay tradeoffs 

      Ashour, Mahmoud; El-Sherif, Amr A.; Elbatt, Tamer; Mohamed, Amr ( IEEE , 2014 , Conference Paper)
      In this paper, we study and analyze fundamental throughput-delay tradeoffs in cooperative multiple access for cognitive radio systems. We focus on the class of randomized cooperative policies, whereby the secondary user ...
    • Cooperative Conceptual Retrieval for Heterogeneous Information 

      Nafkha, Ibtissem; Jaoua, Ali ( IEEE , 2006 , Conference Paper)
      The potentials of formal concept analysis (FCA) for information retrieval have been highlighted by a number of research studies since its inception. With the advent of the Web along with the unprecedented amount of information ...
    • Cooperative education development: Towards ICT reference models 

      Bouras, Abdelaziz; Veillard, Laurent; Tralongo, Stéphanie; Lenir, Michel ( Institute of Electrical and Electronics Engineers Inc. , 2014 , Conference Paper)
      The paper focuses on the modeling of new Information and Communication Technology competences and skills. Competencies as abstractions of work human behavior, have emerged as a promising concept to make human skills and ...
    • Cooperative information security/cybersecurity curriculum development 

      Bouras, Abdelaziz; Gasmi, Houssem; Ghemri, Fadi ( Springer Verlag , 2018 , Conference Paper)
      It is often difficult to meaningfully convey concepts like security incident management cycle, information sharing, cooperation, as well as the roles of people, processes and technology in information and cybersecurity ...
    • Cooperative joint power splitting and allocation approach for simultaneous energy delivery and data transfer 

      Ben Ghorbel, Mahdi; Guizani, Mohsen; Khalfi, Bassem; Hamdaoui, Bechir ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)
      In this paper, we propose to minimize the total energy consumption cost of a simultaneous data transmission and power delivery from different sources. The receiver is designed to simultaneously process information and ...
    • Cooperative Machine Learning Techniques for Cloud Intrusion Detection 

      Chkirbene, Zina; Hamila, Ridha; Erbad, Aiman; Kiranyaz, Serkan; Al-Emadi, Nasser; ... more authors ( IEEE , 2021 , Conference Paper)
      Cloud computing is attracting a lot of attention in the past few years. Although, even with its wide acceptance, cloud security is still one of the most essential concerns of cloud computing. Many systems have been proposed ...
    • Cooperative Q-learning techniques for distributed online power allocation in femtocell networks 

      Saad, H.; Mohamed, A.; ElBatt, T. ( John Wiley & Sons, Ltd. , 2015 , Article)
      In this paper, we address the problem of distributed interference management of femtocells that share the same frequency band with macrocells using distributed multi-agent Q-learning. We formulate and solve two problems ...
    • Cooperative Secondary Encryption for Primary Privacy Preserving in Cognitive Radio Networks 

      Wang, Dawei; Zhang, Ruonan; Li, Lixin; Men, Shaoyang; Zhou, Deyun; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)
      Aiming at protecting primary privacy messages and supporting secondary quality-of-service (QoS), we propose a secondary encrypted secure strategy for cognitive radio networks. In this scheme, a primary system directly ...
    • Cooperative Secondary Users selection in Cognitive Radio Ad Hoc Networks 

      Li, Aohan; Han, Guangjie; Shu, Lei; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)
      Secondary Users (SUs) have capability to sense available licensed spectrum in Cognitive Radio Networks (CRNs). Hence, SUs can opportunistically access to the licensed spectrum without disturbing Primary Users (PUs). In ...
    • Cooperative spectrum sharing in cognitive radio networks: A distributed matching approach 

      Feng, Xinxin; Sun, Gaofei; Gan, Xiaoying; Yang, Feng; Tian, Xiaohua; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2014 , Article)
      We study the relay-based communication schemes for cooperative spectrum sharing among multiple primary users (PUs) and multiple secondary users (SUs) with incomplete information. Inspired by the matching theory, we model ...
    • Coordinated robotic system for civil structural health monitoring 

      Qidwai, Uvais; Ali Akbar, Muhammad ( EDP Sciences , 2017 , Conference Paper)
      With the recent advances in sensors, robotics, unmanned aerial vehicles, communication, and information technologies, it is now feasible to move towards the vision of ubiquitous cities, where virtually everything throughout ...
    • Coordinated Robotic System for Civil Structural Health Monitoring 

      Ali Akbar, Muhammad; Qidwai, Uvais Ahmed ( Hamad bin Khalifa University Press (HBKU Press) , 2018 , Conference Paper)
      With the recent advances in sensors, robotics, unmanned aerial vehicles, communication, and information technologies, it is now feasible to move towards the vision of ubiquitous cities, where virtually everything throughout ...
    • Copy limited flooding over opportunistic networks 

      Niu, Jianwei; Mingzhu Liu; Lei Shu; Guizani, Mohsen (2013 , Conference Paper)
      Mobile devices with local wireless interfaces can be organized into opportunistic networks which exploit communication opportunities arising from the movement of their users. With the proliferation and increasing capabilities ...
    • CorrAUC: A Malicious Bot-IoT Traffic Detection Method in IoT Network Using Machine-Learning Techniques 

      Shafiq, Muhammad; Tian, Zhihong; Bashir, Ali Kashif; Du, Xiaojiang; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)
      Identification of anomaly and malicious traffic in the Internet-of-Things (IoT) network is essential for the IoT security to keep eyes and block unwanted traffic flows in the IoT network. For this purpose, numerous ...
    • Correction to: Multilayered-quality education ecosystem (MQEE): an intelligent education modal for sustainable quality education 

      Verma, Anil; Singh, Aman; Lughofer, Edwin; Cheng, Xiaochun; Abualsaud, Khalid ( Springer , 2021 , Other)
      The original version of this article unfortunately contained an error and it has been corrected with this erratum. The Acknowledgements section was missing from this article and should have read "The third author acknowledges ...
    • Cost effective assessment of transformers using machine learning approach 

      Benhmed, Kamel; Shaban, Khaled Bashir; El-Hag, Ayman ( IEEE Computer Society , 2014 , Conference Paper)
      Furan content in transformer oil is highly correlated with the transformer insulation paper aging. In this paper, the ranges of furan content in power transformer is predicted using measurements of transformer oil tests ...
    • Cost Optimization Algorithms for Hot and Cool Tiers Cloud Storage Services 

      Mansouri Y.; Erradi A. ( IEEE Computer Society , 2018 , Conference Paper)
      In this paper, we consider the data placement problem in the new generation tiered cloud storage services offering hot and cool tiers that are characterized by differentiated Quality of Service (i.e, access latency, ...
    • CouchDB Based Real-Time Wireless Communication System for Clinical Simulation 

      Alhomsi, Yahya; Alsalemi, Abdullah; Al Disi, Mohammed; Bensaali, Faycal; Amira, Abbes; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)
      Medical simulators are advancing in technology and complexity to enhance realism and hence implementing a real-time communication system for such simulators is a challenge that engineers face. This paper follows up on the ...
    • Covid -19 lockdown-challenges to higher education in qatar 

      Haris R.M.; Al-Maadeed, Somaya ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)
      Covid 19 is a pandemic disease and it has spread all over the world. Due to the concern for the health of students, colleges and school authorities all over the world have decided to close the education institution and ...