السجلات المعروضة 161 -- 180 من 2427

    • Stochastic Geometry-Based Physical-Layer Security Performance Analysis of a Hybrid NOMA-PDM-Based IoT System 

      Chamkhia, Hela; Erbad, Aiman; Mohamed, Amr; Hussein, Ahmed Refaey; Al-Ali, Abdulla Khalid; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2024 , Article)
      With the development of low-cost computer chips and wireless networks, any object or thing can become a component of the Internet of Things (IoT). As a result, these disparate things will gain digital intelligence, enabling ...
    • Fire Alarm System for Smart Cities Using Edge Computing 

      Mahgoub, Asma; Tarrad, Nourhan; Elsherif, Rana; Ismail, Loay; Al-Ali, Abdulla ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference)
      The current urban planning trend is to build smart cities that are advanced, safe and sustainable. To build these cities several technologies could be exploited including the Internet of Things (IoT) and edge computing. ...
    • Improving remote health monitoring: A low-complexity ECG compression approach 

      Elgendi, Mohamed; Al-Ali, Abdulla; Mohamed, Amr; Ward, Rabab ( Multidisciplinary Digital Publishing Institute (MDPI) , 2018 , Article)
      Recent advances in mobile technology have created a shift towards using battery-driven devices in remote monitoring settings and smart homes. Clinicians are carrying out diagnostic and screening procedures based on the ...
    • Biometric-based authentication scheme for Implantable Medical Devices during emergency situations 

      Belkhouja, Taha; Du, Xiaojiang; Mohamed, Amr; Al-Ali, Abdulla K.; Guizani, Mohsen ( Elsevier , 2019 , Article)
      Biometric recognition and analysis are among the most trusted features to be used by Implantable Medical Devices (IMDs). We aim to secure these devices by using these features in emergency scenarios. As patients can witness ...
    • Unveiling the Shadows: Leveraging Current Drone Detection Vulnerabilities to Design and Build a Stealth Drone 

      Ahmed, Fatimaelzahraa; Qassmi, Noof; Fatima Rizvi, Syeda Warisha; Al-Ali, Adulla ( Institute of Electrical and Electronics Engineers Inc. , 2024 , Conference)
      Drones have become a popular tool for illegal activities and attacks, causing serious threats to global security. In order to address this issue, our project aims to demonstrate the limitations of current drone detection ...
    • Investigation of TCP protocols in dynamically varying bandwidth conditions 

      Zhou F.; Ali A.A.; Chowdhury K. ( Springer Verlag , 2015 , Conference)
      Cognitive radio (CR) networks experience fluctuating spectrum availability that impacts the end to end bandwidth of a connection. In this paper, we conduct an extensive simulation study of three different window-based TCP ...
    • Restoration of motion-corrupted EEG signals using attention-guided operational CycleGAN 

      Mahmud, Sakib; Chowdhury, Muhammad E.H.; Kiranyaz, Serkan; Al Emadi, Nasser; Tahir, Anas M.; ... more authors ( Elsevier , 2024 , Article)
      Electroencephalogram (EEG) signals suffer substantially from motion artifacts even in ambulatory settings. Signal processing techniques for removing motion artifacts from EEG signals have limitations, and the potential of ...
    • Audio-visual feature fusion for speaker identification 

      Almaadeed, Noor; Aggoun, Amar; Amira, Abbes ( Springer , 2012 , Conference)
      Analyses of facial and audio features have been considered separately in conventional speaker identification systems. Herein, we propose a robust algorithm for text-independent speaker identification based on a decision-level ...
    • Speaker identification using multimodal neural networks and wavelet analysis 

      Almaadeed, Noor; Aggoun, Amar; Amira, Abbes ( Institution of Engineering and Technology , 2015 , Article)
      The rapid momentum of the technology progress in the recent years has led to a tremendous rise in the use of biometric authentication systems. The objective of this research is to investigate the problem of identifying a ...
    • 3D Gaussian Descriptor for Video-based Person Re-Identification 

      Riachy, Chirine; Al-Maadeed, Noor; Organisciak, Daniel; Khelifi, Fouad; Bouridane, Ahmed ( Vaclav Skala Union Agency , 2019 , Conference)
      Despite being often considered less challenging than image-based person re-identification (re-id), video-based person re-id is still appealing as it mimics a more realistic scenario owing to the availability of pedestrian ...
    • Using e-journaling to improve self-regulated learning in introductory computer programming course 

      Alhazbi, Saleh ( IEEE , 2014 , Conference)
      Usually, students face different difficulties when learning computer programming, this leads many of them to drop out of computing major, or continue with fear of programming assignments in subsequent courses. The main ...
    • Bringing Computer Science Education to Schools in Qatar: Challenges of the implementation 

      Alhazbi, Saleh ( IEEE , 2023 , Conference)
      Many countries have started national curriculum changes to make computer science (CS) as a compulsory subject for all students in schools. In 2018, a new national computing curriculum has been developed in Qatar for all ...
    • Low Rate DoS Attack Detection in IoT - SDN using Deep Learning 

      Ilango, Harun Surej; Ma, Maode; Su, Rong ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference)
      The lack of standardization and the heterogeneous nature of IoT, exacerbated the issue of security and privacy. In recent literature, to improve security at the network level, the possibility of using SDN for IoT networks ...
    • Study on Characteristics of Metric-aware Multipath Algorithms in Real Heterogeneous Networks 

      Zhang, Xiaoya; Dong, Ping; Du, Xiaojiang; Zhang, Yuyang; Zhang, Hongke; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference)
      Multipath transmission is considered one of the promising solutions to improve wireless resource utilization where there are many kinds of heterogeneous networks around. Most scheduling algorithms rely on real-time network ...
    • Feasibility Evaluation of Mixed Reality Obstacles on Treadmill using HoloLens to Elicit Real Obstacle Negotiation 

      Miyake, Tamon; Al-Sada, Mohammed; Zhong, Tingting; Wang, Wei; Sugano, Shigeki ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference)
      An ability of visually-guided and anticipatory adjustments of locomotion corresponding to upcoming obstacles is important to avoid trip-induced fall. For establishing gait training based on visually-guided and anticipatory ...
    • Cryptocurrencies and artificial intelligence: Challenges and opportunities 

      Sabry, Farida; Labda, Wadha; Erbad, Aiman; Malluhi, Qutaibah ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)
      Decentralized cryptocurrencies have gained a lot of attention over the last decade. Bitcoin was introduced as the first cryptocurrency to allow direct online payments without relying on centralized financial entities. The ...
    • Privacy-Preserving Fog Aggregation of Smart Grid Data Using Dynamic Differentially-Private Data Perturbation 

      Kserawi, Fawaz; Al-Marri, Saeed; Malluhi, Qutaibah ( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)
      The edge of the smart grid has a massive number of power and resource-constrained interconnected devices. Mainly, smart meters report power consumption data from consumer homes, industrial buildings, and other connected ...
    • Anomalies detection in software by conceptual learning from normal executions 

      Alban, Ahmad Qadeib; Islam, Fahad; Malluhi, Qutaibah M.; Jaoua, Ali ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)
      Could we detect anomalies during the run-time of a program by learning from the analysis of its previous traces for normally completed executions? In this paper we create a featured data set from program traces at run time, ...
    • Data consistency in multi-cloud storage systems with passive servers and non-communicating clients 

      Mhaisen, Naram; Malluhi, Qutaibah M. ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)
      Multi-cloud storage systems are becoming more popular due to the ever-expanding amount of consumer data. This growth is accompanied by increasing concerns regarding security, privacy, and reliability of cloud storage ...
    • Securing Aggregate Queries for DNA Databases 

      Nassar, Mohamed; Malluhi, Qutaibah; Atallah, Mikhail; Shikfa, Abdullatif ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)
      This paper addresses the problem of sharing person-specific genomic sequences without violating the privacy of their data subjects to support large-scale biomedical research projects. The proposed method builds on the ...