scispace - formally typeset
Search or ask a question
Author

Mohsen Guizani

Bio: Mohsen Guizani is an academic researcher from Qatar University. The author has contributed to research in topics: Computer science & Cloud computing. The author has an hindex of 79, co-authored 1110 publications receiving 31282 citations. Previous affiliations of Mohsen Guizani include Jaypee Institute of Information Technology & University College for Women.


Papers
More filters
Proceedings ArticleDOI
29 Sep 2016
TL;DR: This article investigates the impact of network structure on epidemic propagation dynamics by analyzing the massive mobile data collected from smart devices carried by the volunteers of Ebola outbreak areas and proposes a simple model to track and recognize the dynamic structure of a network.
Abstract: Understanding the propagation dynamics of information/an epidemic on complex networks is very important for discovering and controlling a terrorist attack, and even for predicting a disease outbreak. As an effective method, with analyzing the structure of a propagation network, a large number of previous studies have analyzed the propagation dynamics. Most of these studies are based on a special network structure to make such analysis. However, a propagation network has dynamically changed structure during the propagation. How to track, recognize and model such dynamic change is a big challenge. Along with the popularity of smart devices and the rapid development of the Internet of Things (IoT), massive mobile data is automatically collected. In this article, as a typical use case, we investigate the impact of network structure on epidemic propagation dynamics by analyzing the massive mobile data collected from smart devices carried by the volunteers of Ebola outbreak areas. From this investigation, we obtain two observations. Based on these observations and the analytical ability of Apache Spark on streaming data and graphs, we propose a simple model to track and recognize the dynamic structure of a network. Moreover, we introduce and discuss open issues and future work for developing this proposed recognition model.

7 citations

Proceedings ArticleDOI
25 Jun 2018
TL;DR: This paper proposes a time-dependent pricing scheme for bandwidth consumption scheduling of multimedia streaming applications, and proposes a greedy algorithm to obtain the optimal congestion price and bandwidth slicing in each time slot based on real-time traffic load as well as users’ preferences for delay.
Abstract: In this paper, we propose a time-dependent pricing (TDP) scheme for bandwidth consumption scheduling of multimedia streaming applications. By decoupling the network control functions from data delivery, software defined network (SDN) enables multimedia streaming users to negotiate their QoS parameters in a on-demand basis. Our key idea is to employ TDP as an incentive mechanism in SDN to motivate users to shift their delay-tolerant traffic demand, and free up resources for delay-sensitive applications in peak-time. Then, a Stackelberg game is formulated to analyze the interactions between the ISP and users. Next, we proposed a greedy algorithm to obtain the optimal congestion price and bandwidth slicing in each time slot based on real-time traffic load as well as users’ preferences for delay. Finally, simulation results confirm that the proposed method can significantly flatten out traffic fluctuation.

7 citations

Proceedings ArticleDOI
25 May 2020
TL;DR: This paper forms the channel selection problem as an adversarial multi-armed bandit (MAB) problem, and combines the exponential-weight algorithm for exploration and exploitation (EXP3) and Lyapunov optimization to develop a learning-based energy-efficient solution named SEB-EXP3.
Abstract: In this paper, we study the channel selection problem in edge computing-empowered cognitive machine-to-machine (CM2M) communications, where a massive number of machine type devices (MTDs) offload their computational tasks to a nearby edge server by opportunistically using the spectra that are temporarily unoccupied by primary users (PUs). We formulate the channel selection problem as an adversarial multi-armed bandit (MAB) problem, and combine the exponential-weight algorithm for exploration and exploitation (EXP3) and Lyapunov optimization to develop a learning-based energy-efficient solution named SEB-EXP3. It can find the long-term optimal channel selection strategy with guaranteed performance based on local information, while simultaneously achieving service reliability awareness, energy awareness, and data backlog awareness. Four heuristic algorithms are compared with SEB-EXP3 to demonstrate its effectiveness and reliability under various simulation settings.

7 citations

Journal ArticleDOI
TL;DR: An interference management scheme based on energy-aware architecture is proposed for ultra-dense multi-tier HetNets and can allocate the frequency spectrum equitably, reduce system interference, and improve throughput performance.

6 citations

Proceedings ArticleDOI
11 Dec 2006
TL;DR: A fundamental tradeoff between the system energy consumption and its performance can be found by tuning up the system control parameter CWmin and an enhanced energy-aware scheme based on the IEEE 802.11 MAC protocol is proposed.
Abstract: One of the most crucial requirements of a wireless ad-hoc network is to work efficiently and reliably over a long period of time. It is important to design a control technique that minimizes the transmission power of each mobile node without losing much of the performance while retaining the fairness of the network. The contribution of this paper is twofold. First, we show that the transmission energy consumption and the media access delay can be expressed as a function of the conditional collision probability in the IEEE 802.11 MAC protocol. Based on the analyses, a fundamental tradeoff between the system energy consumption and its performance can be found by tuning up the system control parameter CWmin. Second, we propose an enhanced energy-aware scheme based on the IEEE 802.11 protocol. The simulation results show that this technique is more energy efficient than the original IEEE 802.11 protocol while keeping a similar media access delay and a better fairness.

6 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: Machine learning addresses many of the same research questions as the fields of statistics, data mining, and psychology, but with differences of emphasis.
Abstract: Machine Learning is the study of methods for programming computers to learn. Computers are applied to a wide range of tasks, and for most of these it is relatively easy for programmers to design and implement the necessary software. However, there are many tasks for which this is difficult or impossible. These can be divided into four general categories. First, there are problems for which there exist no human experts. For example, in modern automated manufacturing facilities, there is a need to predict machine failures before they occur by analyzing sensor readings. Because the machines are new, there are no human experts who can be interviewed by a programmer to provide the knowledge necessary to build a computer system. A machine learning system can study recorded data and subsequent machine failures and learn prediction rules. Second, there are problems where human experts exist, but where they are unable to explain their expertise. This is the case in many perceptual tasks, such as speech recognition, hand-writing recognition, and natural language understanding. Virtually all humans exhibit expert-level abilities on these tasks, but none of them can describe the detailed steps that they follow as they perform them. Fortunately, humans can provide machines with examples of the inputs and correct outputs for these tasks, so machine learning algorithms can learn to map the inputs to the outputs. Third, there are problems where phenomena are changing rapidly. In finance, for example, people would like to predict the future behavior of the stock market, of consumer purchases, or of exchange rates. These behaviors change frequently, so that even if a programmer could construct a good predictive computer program, it would need to be rewritten frequently. A learning program can relieve the programmer of this burden by constantly modifying and tuning a set of learned prediction rules. Fourth, there are applications that need to be customized for each computer user separately. Consider, for example, a program to filter unwanted electronic mail messages. Different users will need different filters. It is unreasonable to expect each user to program his or her own rules, and it is infeasible to provide every user with a software engineer to keep the rules up-to-date. A machine learning system can learn which mail messages the user rejects and maintain the filtering rules automatically. Machine learning addresses many of the same research questions as the fields of statistics, data mining, and psychology, but with differences of emphasis. Statistics focuses on understanding the phenomena that have generated the data, often with the goal of testing different hypotheses about those phenomena. Data mining seeks to find patterns in the data that are understandable by people. Psychological studies of human learning aspire to understand the mechanisms underlying the various learning behaviors exhibited by people (concept learning, skill acquisition, strategy change, etc.).

13,246 citations

Christopher M. Bishop1
01 Jan 2006
TL;DR: Probability distributions of linear models for regression and classification are given in this article, along with a discussion of combining models and combining models in the context of machine learning and classification.
Abstract: Probability Distributions.- Linear Models for Regression.- Linear Models for Classification.- Neural Networks.- Kernel Methods.- Sparse Kernel Machines.- Graphical Models.- Mixture Models and EM.- Approximate Inference.- Sampling Methods.- Continuous Latent Variables.- Sequential Data.- Combining Models.

10,141 citations

01 Jan 2002

9,314 citations