Now showing items 994-1013 of 2127

    • G-RAT | A novel graphical randomized authentication technique for consumer smart devices 

      Khan M.A.; Ud Din I.; Jadoon S.U.; Khan M.K.; Guizani M.; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)
      User authentication is the process that is exercised millions of times around the globe by using different techniques and methods. The most prominent way of authentication is alphanumerical password forms that have been ...
    • Gait recognition based on modified phase-only correlation 

      Rida, Imad; Almaadeed, Somaya; Bouridane, Ahmed ( Springer-Verlag London Ltd , 2016 , Article)
      Gait recognition is an emerging biometric technology aiming to identify people purely through the analysis of the way they walk. The technology has attracted interest as a method of identification because it is noncontact ...
    • Gait recognition for person re-identification 

      Elharrouss O.; Almaadeed N.; Al-Maadeed, Somaya; Bouridane A. ( Springer , 2021 , Article)
      Person re-identification across multiple cameras is an essential task in computer vision applications, particularly tracking the same person in different scenes. Gait recognition, which is the recognition based on the ...
    • Game theoretic data privacy preservation: Equilibrium and pricing 

      Xu, Lei; Jiang, Chunxiao; Wang, Jian; Ren, Yong; Yuan, Jian; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)
      Privacy issues arising in the process of collecting, publishing and mining individuals' personal data have attracted much attention in recent years. In this paper, we consider a scenario where a data collector collects ...
    • Game Theoretical Model for Cybersecurity Risk Assessment of Industrial Control Systems 

      Nassar, Mohamed; Khoury, Joseph; Erradi, Abdelkarim; Bou-Harb, Elias ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)
      Supervisory Control and Data Acquisition (SCADA) and Distributed Control Systems (DCS) use advanced computing, sensors, control systems, and communication networks to monitor and control industrial processes and distributed ...
    • Game Theory Based Opportunistic Computation Offloading in Cloud-Enabled IoV 

      Liwang, Minghui; Wang, Jiexiang; Gao, Zhibin; Du, Xiaojiang; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)
      With the growing popularity of the fifth-generation (5G) wireless systems and cloud-enabled Internet of Vehicles, vehicular cloud has been introduced as a novel mobile device computing mode, which enables vehicles to offload ...
    • Game Theory for Anti-Jamming Strategy in Multichannel Slow Fading IoT Networks 

      Gouissem, Ala; Abualsaud, Khalid; Yaacoub, Elias; Khattab, Tamer; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)
      The open nature of the wireless communication medium renders it vulnerable to jamming attacks by malicious users. To detect their presence and to avoid such attacks, several techniques are present in the literature. Most ...
    • Game-based micro-learning approach for language vocabulary acquisition using LingoSnacks 

      Erradi, Abdelkarim; Hind, Almerekhi; Sajeda, Nahia ( IEEE , 2013 , Conference Paper)
      Acquisition of new vocabulary is an important element for language learning but it requires repeated and varied exposure to the new words and their usage. This paper reports the experience of designing and developing a ...
    • Garbled computation in cloud 

      Wang, Yongge; Malluhi, Qutaibah M.; Khancb, Khaled MD ( Elsevier , 2016 , Article)
      With the wide adoption of cloud computing paradigm, it is important to develop appropriate techniques to protect client data privacy in the cloud. Encryption is one of the major techniques that could be used to achieve ...
    • Garbled computation in cloud 

      Wang, Yongge; Malluhi, Qutaibah M.; Khan, Khaled MD ( Elsevier , 2016 , Article)
      With the wide adoption of cloud computing paradigm, it is important to develop appropriate techniques to protect client data privacy in the cloud. Encryption is one of the major techniques that could be used to achieve ...
    • General learning approach for event extraction: Case of management change event 

      Elloumi, Samir; Jaoua, Ali; Ferjani, Fethi; Semmar, Nasredine; Besançon, Romaric; ... more authors ( SAGE Publications Ltd , 2013 , Article)
      Starting from an ontology of a targeted financial domain corresponding to transaction, performance and management change news, relevant segments of text containing at least a domain keyword are extracted. The linguistic ...
    • Generating haptic texture using solid noise 

      Halabi, O.; Khattak, G. ( Elsevier B.V. , 2021 , Article)
      Texture enhances haptic interaction by providing unique, distinguishable, and versatile surfaces. In computer haptics, texture can render environments more realistic and provide useful information. In this paper, an algorithm ...
    • Generating Images from Arabic Story-Text using Scene Graph 

      Zakraoui J.; Saleh M.; Asghar U.; Alja'am J.M.; Al-Maadeed, Somaya ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      In this paper, we propose a new approach to generate descriptive images from simple Arabic text of stories for children to build a flexible and rich multimedia repository. To make it successful, we need to transform the ...
    • Generative emotional AI for speech emotion recognition: The case for synthetic emotional speech augmentation 

      Latif, Siddique; Shahid, Abdullah; Qadir, Junaid ( Elsevier , 2023 , Article)
      Despite advances in deep learning, current state-of-the-art speech emotion recognition (SER) systems still have poor performance due to a lack of speech emotion datasets. This paper proposes augmenting SER systems with ...
    • Get out of the BAG! Silos in AI Ethics Education: Unsupervised Topic Modeling Analysis of Global AI Curricula 

      Javed, Rana Tallal; Nasir, Osama; Borit, Melania; Vanhée, Loïs; Zea, Elias; ... more authors ( AI Access Foundation , 2022 , Article)
      The domain of Artificial Intelligence (AI) ethics is not new, with discussions going back at least 40 years. Teaching the principles and requirements of ethical AI to students is considered an essential part of this domain, ...
    • Glandular Morphometrics for Objective Grading of Colorectal Adenocarcinoma Histology Images 

      Awan, Ruqayya; Sirinukunwattana, Korsuk; Epstein, David; Jefferyes, Samuel; Qidwai, Uvais; ... more authors ( Nature Publishing Group , 2017 , Article)
      Determining the grade of colon cancer from tissue slides is a routine part of the pathological analysis. In the case of colorectal adenocarcinoma (CRA), grading is partly determined by morphology and degree of formation ...
    • Glandular structure-guided classification of microscopic colorectal images using deep learning 

      Awan, Ruqayya; Al-Maadeed, Somaya; Al-Saady, Rafif; Bouridane, Ahmed ( Elsevier Ltd , 2019 , Article)
      In this work, we propose to automate the pre-cancerous tissue abnormality analysis by performing the classification of image patches using a novel two-stage convolutional neural network (CNN) based framework. Rather than ...
    • Global User-Level Perception of COVID-19 Contact Tracing Applications: Data-Driven Approach Using Natural Language Processing 

      Ahmad, Kashif; Alam, Firoj; Qadir, Junaid; Qolomany, Basheer; Khan, Imran; ... more authors ( JMIR Publications Inc. , 2022 , Article Review)
      Background: Contact tracing has been globally adopted in the fight to control the infection rate of COVID-19. To this aim, several mobile apps have been developed. However, there are ever-growing concerns over the working ...
    • A graph convolutional network-based deep reinforcement learning approach for resource allocation in a cognitive radio network 

      Zhao, Di; Qin, Hao; Song, Bin; Han, Beichen; Du, Xiaojiang; ... more authors ( MDPI , 2020 , Article)
      Cognitive radio (CR) is a critical technique to solve the conflict between the explosive growth of traffic and severe spectrum scarcity. Reasonable radio resource allocation with CR can effectively achieve spectrum sharing ...
    • Graph Mapping Offloading Model Based On Deep Reinforcement Learning With Dependent Task 

      Mao, Ning; Chen, Yuanfang; Guizani, Mohsen; Lee, Gyu Myoung ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)
      In order to solve the problem of task offloading with dependent subtasks in mobile edge computing (MEC), we propose a graph mapping offloading model based on deep reinforcement learning (DRL). We model the user's computing ...