scispace - formally typeset
Search or ask a question
Author

Mohsen Guizani

Bio: Mohsen Guizani is an academic researcher from Qatar University. The author has contributed to research in topics: Computer science & Cloud computing. The author has an hindex of 79, co-authored 1110 publications receiving 31282 citations. Previous affiliations of Mohsen Guizani include Jaypee Institute of Information Technology & University College for Women.


Papers
More filters
Journal ArticleDOI
TL;DR: In this paper, the authors analyze the electromagnetic propagation inside jet engine turbines and extract the field values from arbitrarily shaped model geometries having large sizes, complex terminations, and cross-section variations.
Abstract: Analyzing electromagnetic propagation inside jet engine turbines is a challenging and important research topic due to its potential applications in both civil and military fields. Electromagnetic modeling of such complex cavities is very difficult due to their complex geometry and the harsh surrounding environment, as well as the rotating metallic parts they contain. In addition, it is extremely difficult to extract the field values from arbitrarily shaped model geometries having large sizes, complex terminations, and cross-section variations.

3 citations

Proceedings ArticleDOI
01 Dec 2018
TL;DR: This paper investigates the joint optimization of route planning and task assignment for UAV-aided MCS from an energy efficiency perspective and demonstrates that significant performance improvement can be achieved by the proposed scheme.
Abstract: With the increasing popularity of unmanned aerial vehicles (UAVs), it is foreseen that they will play an important role in broadening the horizon of mobile crowd sensing (MCS). However, the on- board battery capacity of UAVs imposes a limitation on their endurance capability and performance. In this paper, we investigate the joint optimization of route planning and task assignment for UAV-aided MCS from an energy efficiency perspective. The formulated NP-hard problem is transformed into a two-sided two-stage matching problem, in which the route planning problem is solved in the first stage based on dynamic programming (DP), and the task assignment problem is addressed in the second stage by exploring the Gale-Shapley (GS) algorithm. Numerical results demonstrate that significant performance improvement can be achieved by the proposed scheme.

3 citations

Journal ArticleDOI
TL;DR: In this paper , the authors provide a comprehensive description on access control protocols for the Internet of Things (IoT) and discuss open research issues and challenges in a blockchain-envisioned IoT network.
Abstract: With rapid advancements in the technology, almost all the devices around are becoming smart and contribute to the Internet of Things (IoT) network. When a new IoT device is added to the network, it is important to verify the authenticity of the device before allowing it to communicate with the network. Hence, access control is a crucial security mechanism that allows only the authenticated node to become the part of the network. An access control mechanism also supports confidentiality, by establishing a session key that accomplishes secure communications in open public channels. Recently, blockchain has been implemented in access control protocols to provide a better security mechanism. The foundation of this survey article is laid on IoT, where a detailed description on IoT, its architecture and applications is provided. Further, various security challenges and issues, security attacks possible in IoT and their countermeasures are also provided. We emphasize on the blockchain technology and its evolution in IoT. A detailed description on existing consensus mechanisms and how blockchain can be used to overpower IoT vulnerabilities is highlighted. Moreover, we provide a comprehensive description on access control protocols. The protocols are classified into certificate-based, certificate-less and blockchain-based access control mechanisms for better understanding. We then elaborate on each use case like smart home, smart grid, health care and smart agriculture while describing access control mechanisms. The detailed description not only explains the implementation of the access mechanism, but also gives a wider vision on IoT applications. Next, a rigorous comparative analysis is performed to showcase the efficiency of all protocols in terms of computation and communication costs. Finally, we discuss open research issues and challenges in a blockchain-envisioned IoT network.

3 citations

Journal ArticleDOI
TL;DR: An effective method to query-based object localization that uses artificial intelligence techniques to automatically locate the queried object in the complex background and is far superior to other algorithms in the synthesis datasets and outperforms most existing trackers on the OTB and VOT datasets.

3 citations

Journal ArticleDOI
TL;DR: This paper proposes a feasible solution to approximately achieve a globally Pareto-optimal trade-off between SE and EE, and the collision constraints of the multi-objective optimization problem (MOP) can be solved efficiently.
Abstract: Multiple-input multiple-output orthogonal frequency division multiplexing with index modulation (MIMO-OFDM-IM) has recently received increased attention, due to the potential advantage to balance the trade-off between spectral efficiency (SE) and energy efficiency (EE). In this paper, we investigate the application of MIMO-OFDM-IM to millimeter wave (mmWave) communication systems, where a hybrid analogy-digital (HAD) beamforming architecture is employed. Taking advantage of the Pareto-optimal beam design, we propose a feasible solution to approximately achieve a globally Pareto-optimal trade-off between SE and EE, and the collision constraints of the multi-objective optimization problem (MOP) can be solved efficiently. Correspondingly, the MOP of SE-EE trade-off can be converted into a feasible solution for energy-efficient resource usage, by finding the Pareto-optimal set (POS) towards the Pareto front. This combinatorial-oriented resource allocation approach on the SE-EE relation considers the optimal beam design and power control strategies for downlink multi-user mmWave transmission. To ease the system performance evaluation, we adopt the Poisson point process (PPP) to model the mobile data traffic, and the evolutionary algorithm is applied to speed up the search efficiency of the Pareto front. Compared with benchmarks, the experimental results collected from extensive simulations demonstrate that the proposed optimization approach is vastly superior to existing algorithms.

3 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: Machine learning addresses many of the same research questions as the fields of statistics, data mining, and psychology, but with differences of emphasis.
Abstract: Machine Learning is the study of methods for programming computers to learn. Computers are applied to a wide range of tasks, and for most of these it is relatively easy for programmers to design and implement the necessary software. However, there are many tasks for which this is difficult or impossible. These can be divided into four general categories. First, there are problems for which there exist no human experts. For example, in modern automated manufacturing facilities, there is a need to predict machine failures before they occur by analyzing sensor readings. Because the machines are new, there are no human experts who can be interviewed by a programmer to provide the knowledge necessary to build a computer system. A machine learning system can study recorded data and subsequent machine failures and learn prediction rules. Second, there are problems where human experts exist, but where they are unable to explain their expertise. This is the case in many perceptual tasks, such as speech recognition, hand-writing recognition, and natural language understanding. Virtually all humans exhibit expert-level abilities on these tasks, but none of them can describe the detailed steps that they follow as they perform them. Fortunately, humans can provide machines with examples of the inputs and correct outputs for these tasks, so machine learning algorithms can learn to map the inputs to the outputs. Third, there are problems where phenomena are changing rapidly. In finance, for example, people would like to predict the future behavior of the stock market, of consumer purchases, or of exchange rates. These behaviors change frequently, so that even if a programmer could construct a good predictive computer program, it would need to be rewritten frequently. A learning program can relieve the programmer of this burden by constantly modifying and tuning a set of learned prediction rules. Fourth, there are applications that need to be customized for each computer user separately. Consider, for example, a program to filter unwanted electronic mail messages. Different users will need different filters. It is unreasonable to expect each user to program his or her own rules, and it is infeasible to provide every user with a software engineer to keep the rules up-to-date. A machine learning system can learn which mail messages the user rejects and maintain the filtering rules automatically. Machine learning addresses many of the same research questions as the fields of statistics, data mining, and psychology, but with differences of emphasis. Statistics focuses on understanding the phenomena that have generated the data, often with the goal of testing different hypotheses about those phenomena. Data mining seeks to find patterns in the data that are understandable by people. Psychological studies of human learning aspire to understand the mechanisms underlying the various learning behaviors exhibited by people (concept learning, skill acquisition, strategy change, etc.).

13,246 citations

Christopher M. Bishop1
01 Jan 2006
TL;DR: Probability distributions of linear models for regression and classification are given in this article, along with a discussion of combining models and combining models in the context of machine learning and classification.
Abstract: Probability Distributions.- Linear Models for Regression.- Linear Models for Classification.- Neural Networks.- Kernel Methods.- Sparse Kernel Machines.- Graphical Models.- Mixture Models and EM.- Approximate Inference.- Sampling Methods.- Continuous Latent Variables.- Sequential Data.- Combining Models.

10,141 citations

01 Jan 2002

9,314 citations