Publications by authors named "Guizani Mohsen"

In order to alleviate the issue of data sparsity, knowledge graphs are introduced into recommender systems because they contain diverse information about items. The existing knowledge graph enhanced recommender systems utilize both user-item interaction data and knowledge graph, but those methods ignore the semantic difference between interaction data and knowledge graph. On the other hand, for the item representations obtained from two kinds of graph structure data respectively, the existing methods of fusing representations only consider the item representations themselves, without considering the personalized preference of users.

View Article and Find Full Text PDF

Machine learning, powered by cloud servers, has found application in medical diagnosis, enhancing the capabilities of smart healthcare services. Research literature demonstrates that the support vector machine (SVM) consistently demonstrates remarkable accuracy in medical diagnosis. Nonetheless, safeguarding patients' health data privacy and preserving the intellectual property of diagnosis models is of paramount importance.

View Article and Find Full Text PDF

Background And Objective: Chronic Obstructive Pulmonary Disease (COPD) is one of the world's worst diseases; its early diagnosis using existing methods like statistical machine learning techniques, medical diagnostic tools, conventional medical procedures, and other methods is challenging due to misclassification results of COPD diagnosis and takes a long time to perform accurate prediction. Due to the severe consequences of COPD, detection and accurate diagnosis of COPD at an early stage is essential. This paper aims to design and develop a multimodal framework for early diagnosis and accurate prediction of COPD patients based on prepared Computerized Tomography (CT) scan images and lung sound/cough (audio) samples using machine learning techniques, which are presented in this study.

View Article and Find Full Text PDF

Blockchain data mining has the potential to reveal the operational status and behavioral patterns of anonymous participants in blockchain systems, thus providing valuable insights into system operation and participant behavior. However, traditional blockchain analysis methods suffer from the problems of being unable to handle the data due to its large volume and complex structure. With powerful computing and analysis capabilities, graph learning can solve the current problems through handling each node's features and linkage relationships separately and exploring the implicit properties of data from a graph perspective.

View Article and Find Full Text PDF

Background And Objective: COVID-19 outbreak has become one of the most challenging problems for human being. It is a communicable disease caused by a new coronavirus strain, which infected over 375 million people already and caused almost 6 million deaths. This paper aims to develop and design a framework for early diagnosis and fast classification of COVID-19 symptoms using multimodal Deep Learning techniques.

View Article and Find Full Text PDF

With rapid advancements in the technology, almost all the devices around are becoming smart and contribute to the Internet of Things (IoT) network. When a new IoT device is added to the network, it is important to verify the authenticity of the device before allowing it to communicate with the network. Hence, access control is a crucial security mechanism that allows only the authenticated node to become the part of the network.

View Article and Find Full Text PDF

The wide spread of the novel COVID-19 virus all over the world has caused major economical and social damages combined with the death of more than two million people so far around the globe. Therefore, the design of a model that can predict the persons that are most likely to be infected is a necessity to control the spread of this infectious disease as well as any other future novel pandemic. In this paper, an Internet of Things (IoT) sensing network is designed to anonymously track the movement of individuals in crowded zones through collecting the beacons of WiFi and Bluetooth devices from mobile phones to triangulate and estimate the locations of individuals inside buildings without violating their privacy.

View Article and Find Full Text PDF

The COVID-19 pandemic has caused serious consequences in the last few months and trying to control it has been the most important objective. With effective prevention and control methods, the epidemic has been gradually under control in some countries and it is essential to ensure safe work resumption in the future. Although some approaches are proposed to measure people's healthy conditions, such as filling health information forms or evaluating people's travel records, they cannot provide a fine-grained assessment of the epidemic risk.

View Article and Find Full Text PDF

This paper proposes a two-way multi-ringed forest (TMR-Forest) to estimating the malignancy of the pulmonary nodules for false positive reduction (FPR). Based on our previous work of deep decision framework, named MR-Forest, we generate a growing path mode on predefined pseudo-timeline of L time slots to build pseudo-spatiotemporal features. It synchronously works with FPR based on MR-Forest to help predict the labels from a dynamic perspective.

View Article and Find Full Text PDF

This article provides a literature review of state-of-the-art machine learning (ML) algorithms for disaster and pandemic management. Most nations are concerned about disasters and pandemics, which, in general, are highly unlikely events. To date, various technologies, such as IoT, object sensing, UAV, 5G, and cellular networks, smartphone-based system, and satellite-based systems have been used for disaster and pandemic management.

View Article and Find Full Text PDF

Recently, underwater wireless sensor networks (UWSNs) have been considered as a powerful technique for many applications. However, acoustic communications in UWSNs bring in huge QoS issues for time-critical applications. Additionally, excessive control packets and multiple copies during the data transmission process exacerbate this challenge.

View Article and Find Full Text PDF

Wi-Fi uploading is considered an effective method for offloading the traffic of cellular networks generated by the data uploading process of mobile crowd sensing applications. However, previously proposed Wi-Fi uploading schemes mainly focus on optimizing one performance objective: the offloaded cellular traffic or the reduced uploading cost. In this paper, we propose an Intelligent Data Uploading Selection Mechanism (IDUSM) to realize a trade-off between the offloaded traffic of cellular networks and participants' uploading cost considering the differences among participants' data plans and direct and indirect opportunistic transmissions.

View Article and Find Full Text PDF

With the emergence of vehicular Internet-of-Things (IoT) applications, it is a significant challenge for vehicular IoT systems to obtain higher throughput in vehicle-to-cloud multipath transmission. Network Coding (NC) has been recognized as a promising paradigm for improving vehicular wireless network throughput by reducing packet loss in transmission. However, existing researches on NC do not consider the influence of the rapid quality change of wireless links on NC schemes, which poses a great challenge to dynamically adjust the coding rate according to the variation of link quality in vehicle-to-cloud multipath transmission in order to avoid consuming unnecessary bandwidth resources and to increase network throughput.

View Article and Find Full Text PDF

Unmanned Aerial Vehicles (UAV) have revolutionized the aircraft industry in this decade. UAVs are now capable of carrying out remote sensing, remote monitoring, courier delivery, and a lot more. A lot of research is happening on making UAVs more robust using energy harvesting techniques to have a better battery lifetime, network performance and to secure against attackers.

View Article and Find Full Text PDF

With the exponentially growing COVID-19 (coronavirus disease 2019) pandemic, clinicians continue to seek accurate and rapid diagnosis methods in addition to virus and antibody testing modalities. Because radiographs such as X-rays and computed tomography (CT) scans are cost-effective and widely available at public health facilities, hospital emergency rooms (ERs), and even at rural clinics, they could be used for rapid detection of possible COVID-19-induced lung infections. Therefore, toward automating the COVID-19 detection, in this paper, we propose a viable and efficient deep learning-based chest radiograph classification (DL-CRC) framework to distinguish the COVID-19 cases with high accuracy from other abnormal (e.

View Article and Find Full Text PDF

Cognitive radio (CR) is a critical technique to solve the conflict between the explosive growth of traffic and severe spectrum scarcity. Reasonable radio resource allocation with CR can effectively achieve spectrum sharing and co-channel interference (CCI) mitigation. In this paper, we propose a joint channel selection and power adaptation scheme for the underlay cognitive radio network (CRN), maximizing the data rate of all secondary users (SUs) while guaranteeing the quality of service (QoS) of primary users (PUs).

View Article and Find Full Text PDF

The emergence of novel COVID-19 is causing an overload on public health sector and a high fatality rate. The key priority is to contain the epidemic and reduce the infection rate. It is imperative to stress on ensuring extreme social distancing of the entire population and hence slowing down the epidemic spread.

View Article and Find Full Text PDF

Wireless sensor networks have been widely adopted, and neighbor discovery is an essential step to construct the networks. Most existing studies on neighbor discovery are designed on the assumption that either all nodes are fully connected or only two nodes compose the network. However, networks are partially connected in reality: some nodes are within radio range of each other, while others are not.

View Article and Find Full Text PDF

Cyber-physical systems (CPS) is a setup that controls and monitors the physical world around us. The advancement of these systems needs to incorporate an unequivocal spotlight on making these systems efficient. Blockchains and their inherent combination of consensus algorithms, distributed data storage, and secure protocols can be utilized to build robustness and reliability in these systems.

View Article and Find Full Text PDF

As one of the main applications of the Internet of things (IoT), the vehicular ad-hoc network (VANET) is the core of the intelligent transportation system (ITS). Air-ground integrated vehicular networks (AGIVNs) assisted by unmanned aerial vehicles (UAVs) have the advantages of wide coverage and flexible configuration, which outperform the ground-based VANET in terms of communication quality. However, the complex electromagnetic interference (EMI) severely degrades the communication performance of UAV sensors.

View Article and Find Full Text PDF

The explosive number of vehicles has given rise to a series of traffic problems, such as traffic congestion, road safety, and fuel waste. Collecting vehicles' speed information is an effective way to monitor the traffic conditions and avoid vehicles' congestion, however it may threaten vehicles' location and trajectory privacy. Motivated by the fact that traffic monitoring does not need to know each individual vehicle's speed and the average speed would be sufficient, we propose a privacy-preserving traffic monitoring (PPTM) scheme to aggregate vehicles' speeds at different locations.

View Article and Find Full Text PDF

Intelligent medical service system integrates wireless internet of things (WIoT), including medical sensors, wireless communications, and middleware techniques, so as to collect and analyze patients' data to examine their physical conditions by many personal health devices (PHDs) in real time. However, large amount of malicious codes on the Android system can compromise consumers' privacy, and further threat the hospital management or even the patients' health. Furthermore, this sensor-rich system keeps generating large amounts of data and saturates the middleware system.

View Article and Find Full Text PDF

Many IoT (Internet of Things) systems run Android systems or Android-like systems. With the continuous development of machine learning algorithms, the learning-based Android malware detection system for IoT devices has gradually increased. However, these learning-based detection models are often vulnerable to adversarial samples.

View Article and Find Full Text PDF

In recent years, with the development of the marine industry, the ship navigation environment has become more complicated. Some artificial intelligence technologies, such as computer vision, can recognize, track and count sailing ships to ensure maritime security and facilitate management for Smart Ocean systems. Aiming at the scaling problem and boundary effect problem of traditional correlation filtering methods, we propose a self-selective correlation filtering method based on box regression (BRCF).

View Article and Find Full Text PDF

Throughout the past decade, vehicular networks have attracted a great deal of interest in various fields. The increasing number of vehicles has led to challenges in traffic regulation. Vehicle-type detection is an important research topic that has found various applications in numerous fields.

View Article and Find Full Text PDF