Now showing items 5938-5957 of 7859

    • Principles of time-frequency feature extraction for change detection in non-stationary signals: Applications to newborn EEG abnormality detection 

      Boashash B.; Azemi G.; Ali Khan N. ( Elsevier Ltd , 2015 , Article)
      This paper considers the general problem of detecting change in non-stationary signals using features observed in the time-frequency (t,f) domain, obtained using a class of quadratic time-frequency distributions (QTFDs). ...
    • Prior zero forcing for cognitive relaying 

      Song S.H.; Hasna , Mazen; Letaief K.B. ( IEEE , 2013 , Article)
      Relaying primary signals by cognitive base-stations (CBSs) can help the primary system and thus win CBSs a higher chance to transmit their own signals. For this purpose, conventional zero-forcing (CZF) beamforming is a ...
    • Prioritisation of lean construction barriers in Qatari context: A fuzzy AHP approach 

      Al Sayed, Abdulla Yaqoub; Seth, Dinesh; Hamouda, Abdel Magid S. ( Inderscience Enterprises Ltd. , 2019 , Article)
      This study identifies, reviews and prioritises lean construction barriers in Qatari context. Lean has been widely adopted in manufacturing and service sectors, but its applications in construction sector are found in scarce. ...
    • Prioritising solutions for Lean Six Sigma adoption barriers through fuzzy AHP-modified TOPSIS framework 

      Yadav G.; Seth D.; Desai T.N. ( Emerald Group Publishing Ltd. , 2018 , Article)
      Purpose: This paper aims to guide about prioritisation and ranking of the solutions and overcoming barriers to facilitate the adoption of Lean Six Sigma (LSS) by using a hybrid framework. Design/methodology/approach: It ...
    • Prioritizing deadline-constrained data flows in cloud datacenter networks 

      Khabbaz, Maurice; Shaban, Khaled; Assi, Chadi; Qu, Long ( Association for Computing Machinery , 2016 , Conference Paper)
      Real-time interactive application workloads (e.g. web search, social networking, etc.) are composed of a remarkably large number of mini request partitions that require stringent delayminimal aggregation of responses and ...
    • Priority-based medium access control for wireless body area networks with high-performance design 

      Sun G.; Wang K.; Yu H.; Du X.; Guizani M. ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)
      The wireless body area network (WBAN) has attracted considerable attention. Two main problems exist in WBANs: 1) the quality of service (QoS) requirements and 2) the energy efficiency of data transmission. To solve the ...
    • Priority-based scheduling for limited energy cognitive relaying 

      Elsaadany M.; Khattab T.; Hasna , Mazen; Abdallah M.; Khairy M. ( IEEE , 2010 , Conference Paper)
      We study the problem of cognitive relaying with limited-energy constraint in opportunistic spectrum access cognitive networks. Under this network setting, the cognitive user increases the spectrum availability for its own ...
    • Priority-based zero-forcing in spectrum sharing cognitive systems 

      Hamdi K.; Hasna , Mazen; Ghrayeb A.; Letaief K.B. ( IEEE , 2013 , Article)
      We consider a spectrum sharing scenario between cognitive radio (CR) users and a licensed primary user (PU), in which the PU is not able to successfully transmit data to its destined receiver. The cognitive base station ...
    • Privacy and security issues in online social networks 

      Ali, Shaukat; Islam, Naveed; Rauf, Azhar; Din, Ikram U.; Guizani, Mohsen; ... more authors ( MDPI AG , 2018 , Article)
      The advent of online social networks (OSN) has transformed a common passive reader into a content contributor. It has allowed users to share information and exchange opinions, and also express themselves in online virtual ...
    • Privacy Leakage in Smart Homes and Its Mitigation: IFTTT as a Case Study 

      Xu, Rixin; Zeng, Qiang; Zhu, Liehuang; Chi, Haotian; Du, Xiaojiang; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)
      The combination of smart home platforms and automation apps introduce many conveniences to smart home users. However, this also brings the potential of privacy leakage. If a smart home platform is permitted to collect all ...
    • Privacy-Aware Collaborative Task Offloading in Fog Computing 

      Razaq, Mian Muaz; Tak, Byungchul; Peng, Limei; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)
      Numerous new applications have been proliferated with the mature of 5G, which generates a large number of latency-sensitive and computationally intensive mobile data requests. The real-time requirement of these mobile data ...
    • Privacy-preserving artificial intelligence in healthcare: Techniques and applications 

      Khalid, Nazish; Qayyum, Adnan; Bilal, Muhammad; Al-Fuqaha, Ala; Qadir, Junaid ( Elsevier , 2023 , Article Review)
      There has been an increasing interest in translating artificial intelligence (AI) research into clinically-validated applications to improve the performance, capacity, and efficacy of healthcare services. Despite substantial ...
    • Privacy-Preserving Distributed IDS Using Incremental Learning for IoT Health Systems 

      Tabassum A.; Erbad A.; Mohamed A.; Guizani M. ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)
      Existing techniques for incremental learning are computationally expensive and produce duplicate features leading to higher false positive and true negative rates. We propose a novel privacy-preserving intrusion detection ...
    • A Privacy-Preserving Medical Data Sharing Scheme Based on Consortium Blockchain 

      Liu, Jingwei; Liang, Tianyu; Sun, Rong; Du, Xiaojiang; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      Electronic medical records (EMRs) can provide medical institutes with a number of research materials, which could promote the development of medical field. In order to protect patients' privacy while achieving efficient ...
    • Privacy-Preserving Support Vector Machine Training over Blockchain-Based Encrypted IoT Data in Smart Cities 

      Shen M.; Tang X.; Zhu L.; Du X.; Guizani M. ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)
      Machine learning (ML) techniques have been widely used in many smart city sectors, where a huge amount of data is gathered from various (IoT) devices. As a typical ML model, support vector machine (SVM) enables efficient ...
    • PRNU Estimation based on Weighted Averaging for Source Smartphone Video Identification 

      Lawgaly, Ashref; Khelifi, Fouad; Bouridane, Ahmed; Al-Maaddeed, Somaya; Akbari, Younes ( Institute of Electrical and Electronics Engineers Inc. , 2022 , Conference Paper)
      Photo response non-uniformity (PRNU) noise is a sensor pattern noise characterizing imperfections in the imaging device. The PRNU is a unique noise for each sensor device, and it has been generally utilized in the literature ...
    • PRNU-Net: a Deep Learning Approach for Source Camera Model Identification based on Videos Taken with Smartphone 

      Akbari, Younes; Almaadeed, Noor; Al-Maadeed, Somaya; Khelifi, Fouad; Bouridane, Ahmed ( Institute of Electrical and Electronics Engineers Inc. , 2022 , Conference Paper)
      Recent advances in digital imaging have meant that every smartphone has a video camera that can record high-quality video for free and without restrictions. In addition, rapidly developing Internet technology has contributed ...
    • Proactive power allocation and caching node selection for regular service guarantees 

      Abdellatif B.; Tadrous J.; Khafagy M.G.; Khattab T. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
      This paper studies the potential of proactive resource allocation to prolong the communication sessions in networks with limited energy budgets and stringent quality-of-service (QoS) requirement, particularly a regular ...
    • Proactive spectrum sharing incentive for physical layer security enhancement using outdated CSI 

      Tourki, Kamel; Hasna, Mazen O. ( Institute of Electrical and Electronics Engineers Inc. , 2016 , Article)
      We investigate the spectrum sharing possibility as an incentive to enhancing the physical layer security. The concept behind this is that a legitimate source-destination pair, communicating in the presence of a passive ...
    • Proactive Video Chunks Caching and Processing for Latency and Cost Minimization in Edge Networks 

      Baccour E.; Erbad A.; Mohamed A.; Bilal K.; Guizani M. ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)
      Recently, the growing demand for rich multimedia content such as Video on Demand (VoD) has made the data transmission from content delivery networks (CDN) to end-users quite challenging. Edge networks have been proposed ...