Match!
Mohsen Guizani
Qatar University
817Publications
40H-index
8,231Citations
Publications 817
Newest
#1Saif ul IslamH-Index: 2
#2Hasan Ali Khattak (CUI: COMSATS Institute of Information Technology)H-Index: 1
Last.Jean-Marc PiersonH-Index: 17
view all 5 authors...
Abstract With the explosive increase in Internet users and ultimately its infrastructure, efficient resource utilization has become one of the most prominent challenges in large-scale distributed systems. Content Distribution Networks (CDNs) are among the favored large-scale distributed systems that are currently handling around 40 % of the Internet traffic. In literature, different approaches have been proposed to improve the CDN performance by improving CDN utility. The CDN utility is the rati...
#1Xiaolei Liu (University of Electronic Science and Technology of China)H-Index: 1
#2Xiaojiang Du (TU: Temple University)H-Index: 31
Last.Mohsen Guizani (Qatar University)H-Index: 40
view all 0 authors...
Abstract With the wide application of Unmanned Aerial Vehicles (UAVs) in production and life, more and more attention has been paid to the autonomous track planning of UAVs. When UAV path planning algorithm is dealing with flying in an unknown complex environment, there are some problems, such as inability to dynamically plan the track and slow speed to calculate the path. This paper proposes a dynamic path planning based on an improved evolutionary optimization algorithm. The experimental resul...
Abstract In modern e-Healthcare systems, human activity recognition (HAR) is one of the most challenging tasks in remote monitoring of patients suffering from mental illness or disabilities for necessary assistance. One of the major issues is to provide security to a number of different connected devices to the Internet, known as Internet of Things (IoT). A potential solution to this problem is the blockchain-based architecture. In addition, the complex nature of activities performed by humans i...
#1Ikram Ud Din (University of Haripur)H-Index: 3
#2Mohsen Guizani (Qatar University)H-Index: 40
Last.Valery V. KorotaevH-Index: 6
view all 5 authors...
Abstract Machine learning is one of the emerging technologies that has grabbed the attention of academicians and industrialists, and is expected to evolve in the near future. Machine learning techniques are anticipated to provide pervasive connections for wireless nodes. In fact, machine learning paves the way for the Internet of Things (IoT)—a network that supports communications among various devices without human interactions. Machine learning techniques are being utilized in several fields s...
#1Jiawen KangH-Index: 9
#2Zehui XiongH-Index: 7
Last.Mohsen GuizaniH-Index: 40
view all 0 authors...
Federated learning, as a promising machine learning approach, has emerged to leverage a distributed personalized dataset from a number of nodes, e.g., mobile devices, to improve performance while simultaneously providing privacy preservation for mobile users. In the federated learning, training data is widely distributed and maintained on the mobile devices as workers. A central aggregator updates a global model by collecting local updates from mobile devices using their local training data to t...
#1Weina Niu (Sichuan University)
#2Xiaosong Zhang (University of Electronic Science and Technology of China)H-Index: 8
Last.Mohsen Guizani (Qatar University)H-Index: 40
view all 0 authors...
Abstract Computer system vulnerabilities, computer viruses, and cyber attacks are rooted in software vulnerabilities. Reducing software defects, improving software reliability and security are urgent problems in the development of software. The core content is the discovery and location of software vulnerability. However, traditional human experts-based approaches are labor-consuming and time-consuming. Thus, some automatic detection approaches are proposed to solve the problem. But, they have a...
The Vehicular Ad hoc Networks (VANETs) are emerging networks that provide essential services to drivers on the road. To exchange data, vehicles as network nodes route information between source and destination using the V-to-V infrastructure. To retrieve the best path, routing algorithms are used. We focus in this paper on the Ad hoc On-demand Multipath Distance Vector (AOMDV) routing algorithm, which is able to retrieve at least three paths. Despite, its efficiency for VANET, the AOMDV protocol...
12345678910