Now showing items 41-60 of 1048

    • A Hybrid Energy Sharing Framework for Green Cellular Networks 

      Farooq, Muhammad Junaid; Ghazzai, Hakim; Kadri, Abdullah; ElSawy, Hesham; Alouini, Mohamed-Slim ( Institute of Electrical and Electronics Engineers Inc. , 2017 , Conference Paper)
      Cellular operators are increasingly turning toward renewable energy (RE) as an alternative to using traditional electricity in order to reduce operational expenditure and carbon footprint. Due to the randomness in both RE ...
    • A hybridized genetic algorithm for cost estimation in bridge maintenance systems 

      Shaban, Khaled; Younes, Abdunnaser; Good, Nathan; Iqbal, Mohammed; Lourenco, Richard (2010 , Conference Paper)
      A hybridized genetic algorithm is proposed to determine a repair schedule for a network of bridges. The schedule aims for the lowest overall cost while maintaining each bridge at satisfactory quality conditions. Appreciation, ...
    • A Key Frame Based Video Summarization using Color Features 

      Asim M.; Almaadeed N.; Al-Maadeed S.; Bouridane A.; Beghdadi A. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
      The rapid development of digital video has opened ways for several multimedia applications. A huge amount of video data is uploaded on internet on daily basis, which, consumes additional internet bandwidth and storage ...
    • A light lexicon-based mobile application for sentiment mining of arabic tweets 

      Badaro, Gilbert; Baly, Ramy; Akel, Rana; Fayad, Linda; Khairallah, Jeffrey; ... more authors ( Association for Computational Linguistics (ACL) , 2015 , Conference Paper)
      Most advanced mobile applications require server-based and communication. This often causes additional energy consumption on the already energy-limited mobile devices. In this work, we provide to address these limitations ...
    • A Lightweight Central Learning Approach for Arrhythmia Detection from ECG Signals 

      Aboumadi, Abdulla; Yaacoub, Elias; Abualsaud, Khalid ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)
      With the development of Internet-of-Things (IoT) applications, the concept of smart healthcare applications has gradually emerged to be the main factor in medicine. In fact, this raises the need to have a secure system ...
    • A machine learning approach of load balance routing to support next-generation wireless networks 

      Yao, Haipeng; Yuan, Xin; Zhang, Peiying; Wang, Jingjing; Jiang, Chunxiao; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)
      With the development of Next-generation Wireless Networks (NWNs), delay-sensitive traffic triggered by mobile applications (such as video stream and online games) will become an important part of the NWNs. With the increasing ...
    • A Malware Detection Method for Health Sensor Data Based on Machine Learning 

      Liu, Hanwen; Helu, Xiaohan; Jin, Chengjie; Lu, Hui; Tian, Zhihong; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      Traditional signature-based malware detection approaches are sensitive to small changes in the malware code. Currently, most malware programs are adapted from existing programs. Hence, they share some common patterns but ...
    • A Mobile System for Historical Manuscripts Capturing, Recognition and Classification 

      Al-Maadeed S.; Aikadiry M.; Shaar M.; Alja'Am J.M. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
      This paper proposes a mobile system to capture, recognize and classify historical manuscripts automatically. The user can take a snapshot of a manuscript through his/her mobile camera and send to a dedicated server. An ...
    • A model-based approach to self-protection in computing system 

      Chen, Qian; Abdelwahed, Sherif; Erradi, Abdelkarim ( Association for Computing Machinery, Inc , 2013 , Conference Paper)
      This paper introduces a model-based autonomic security management (ASM) approach to estimate, detect and identify security attacks along with planning a sequence of actions to effectively protect the networked computing ...
    • A Modified Layer of Protection Analysis for Cyber-Physical Systems Security 

      Tantawy, Ashraf; Erradi, Abdelkarim; Abdelwahed, Sherif ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)
      Layer of Protection Analysis (LOPA) is the most commonly used approach for quantitative safety risk assessment in the process control industry to protect a Cyber- Physical System (CPS) from accidental hazards-causing ...
    • A multi-modal face and signature biometric authentication system using a max-of-scores based fusion 

      Elmir Y.; Al-Maadeed, Somaya; Amira A.; Hassane A. ( Springer , 2012 , Conference Paper)
      Face and signature based multimodal biometric systems are often required in various areas, such as banking biometric systems and secured mobile phone operating systems, among others. Our system combines these two biometric ...
    • A multi-parameter based vertical handover decision scheme for M2M communications in HetMANET 

      Ahmad, Awais; Rathore, M. Mazhar; Paul, Anand; Rho, Seungmin; Imran, Muhammad; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)
      The Machine-to-Machine (M2M) communication has the potential to connect millions of devices in the near future. Since they agree on this potential, several standard organizations need to focus on improved general architecture ...
    • A multiresolution approach to Recommender systems 

      Badaro, Gilbert; Hajj, Hazem; Haddad, Ali; El-Hajj, Wassim; Shaban, Khaled Bashir ( Association for Computing Machinery, Inc , 2014 , Conference Paper)
      Recommender systems face performance challenges when dealing with sparse data. This paper addresses these challenges and proposes the use of Harmonic Analysis. The method provides a novel approach to the user-item matrix ...
    • A native Arabic eLearning mobile application to transpose Arabic text to illustrations 

      Karkar, Abdel Ghani; Al Ja'am, Jihad Mohamad ( IEEE , 2015 , Conference Paper)
      Mobile eLearning are capable to avail children in improving learning capabilities, self-consciousness living, and profession growth. They can inspire the perfection of eLearning with the diverse subservient smart handled ...
    • A Natural User Interface and Blockchain-Based In-Home Smart Health Monitoring System 

      Rahman, Md. Abdur; Abualsaud, Khalid; Barnes, Stuart; Rashid, Mamunur; Abdullah, Syed Maruf ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      In this paper, we propose a gesture-based secure interaction system with smart home IoT health devices to support elderly people or people with special needs. The framework uses a decentralized blockchain consensus for ...
    • A neural network algorithm for hardware-software verification 

      Rebaiaia, M.L.; Jaam, J.M.; Hasnah, A.M. ( IEEE , 2003 , Conference Paper)
      Formal verification is the task of proving that a property holds for a model of a design. This paper examines the idea of a Neural Network-based algorithm used to find the set of states that makes a specification valid. ...
    • A new approach for predicting the shear capacity of FRCM strengthened RC beams in shear 

      Wakjira T.G.; Ebead U. ( Institute of Physics Publishing , 2018 , Conference Paper)
      In spite of the availability of different models proposed to predict the shear capacity of reinforced concrete (RC) beams strengthened in shear using fabric reinforced cementitious matrix (FRCM) system, accurately predicting ...
    • A New Structural View Of The Holy Book Based On Specific Words: Towards Unique Chapters (surat) And Sentences (ayat) Characterization In The Quran 

      Al-saffar, Meshaal; Mohamed Jaoua, Ali; Hassaine, Abdelaali; Elloumi, Samir ( Hamad bin Khalifa University Press (HBKU Press) , 2014 , Conference Paper)
      In the context of web Islamic data analysis and authentication an important task is to be able to authenticate the holy book if published in the net. For that purpose, in order to detect texts contained in the holy book, ...
    • A new WDM Application Response Time in WLAN Network and Fixed WiMAX using Distributed 

      Nisar, Kashif; Lawal, Ibrahim A.; Abualsaud, Khalid; El-Fouly, Tarek Mohamed ( IEEE , 2014 , Conference Paper)
      Worldwide Interoperability for Microwave Access (WiMAX) and Wireless LAN (WLAN) has emerged as a promising solution for last mile access technology to provide high speed internet access in the residential as well as small ...
    • A new WDM Application Response Time in WLAN Network and Fixed WiMAX using Distributed 

      Nisar, Kashif; Lawal, Ibrahim A.; Abualsaud, Khalid; El-Fouly, Tarek Mohamed ( IEEE Computer Society , 2014 , Conference Paper)
      Worldwide Interoperability for Microwave Access (WiMAX) and Wireless LAN (WLAN) has emerged as a promising solution for last mile access technology to provide high speed internet access in the residential as well as small ...