RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
        • 등재정보
        • 학술지명
          펼치기
        • 주제분류
        • 발행연도
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • KCI등재

        An investigation into diesel engine air-borne acoustics using continuous wavelet transform

        Alhussein Albarbar 대한기계학회 2013 JOURNAL OF MECHANICAL SCIENCE AND TECHNOLOGY Vol.27 No.9

        The emitted acoustic signals from diesel engines carry useful indicators about their operating conditions and health status. Unfortunately,those signals are very complex, contain numerous numbers of sources and corrupted by subnational amount of noise. This makes it difficult to extract those condition indicators via the use of conventional time and frequency domain analysis techniques. This paper studies the characteristics of diesel engine air-borne acoustic signals using time-frequency domain techniques. One analysis technique is investigated; continuous wavelet transform (CWT). First, some of the mathematical background of the CWT is reviewed. Second, the detection capabilities of this technique are evaluated using air-borne acoustic signals collected from diesel engine in acoustically untreated laboratory. Consequently, some engine operating conditions and faults are investigated using the CWT techniques. The achieved results prove the technique’s sensitivity to engine speed and load variations. More important the CWT shows excellent capabilities in detecting engine’s injection process and lubrication related faults at early stages.

      • KCI등재

        Opportunistic Spectrum Access Based on a Constrained Multi-Armed Bandit Formulation

        Jing Ai,Alhussein A. Abouzeid 한국통신학회 2009 Journal of communications and networks Vol.11 No.2

        Tracking and exploiting instantaneous spectrum opportunities are fundamental challenges in opportunistic spectrum access (OSA) in presence of the bursty traffic of primary users and the limited spectrum sensing capability of secondary users. In order to take advantage of the history of spectrum sensing and access decisions, a sequential decision framework is widely used to design optimal policies. However, many existing schemes, based on a partially observed Markov decision process (POMDP) framework, reveal that optimal policies are non-stationary in nature which renders them difficult to calculate and implement. Therefore, this work pursues stationary OSA policies, which are thereby efficient yet low-complexity, while still incorporating many practical factors, such as spectrum sensing errors and a priori unknown statistical spectrum knowledge. First, with an approximation on channel evolution, OSA is formulated in a multi-armed bandit (MAB) framework. As a result, the optimal policy is specified by the wellknown Gittins index rule, where the channel with the largest Gittins index is always selected. Then, closed-form formulas are derived for the Gittins indices with tunable approximation, and the design of a reinforcement learning algorithm is presented for calculating the Gittins indices, depending on whether the Markovian channel parameters are available a priori or not. Finally, the superiority of the scheme is presented via extensive experiments compared to other existing schemes in terms of the quality of policies and optimality.

      • Data Randomization and Cluster-Based Partitioning for Botnet Intrusion Detection

        Al-Jarrah, Omar Y.,Alhussein, Omar,Yoo, Paul D.,Muhaidat, Sami,Taha, Kamal,Kwangjo Kim IEEE 2016 IEEE transactions on cybernetics Vol.46 No.8

        <P>Botnets, which consist of remotely controlled compromised machines called bots, provide a distributed platform for several threats against cyber world entities and enterprises. Intrusion detection system (IDS) provides an efficient countermeasure against botnets. It continually monitors and analyzes network traffic for potential vulnerabilities and possible existence of active attacks. A payload-inspection-based IDS (PI-IDS) identifies active intrusion attempts by inspecting transmission control protocol and user datagram protocol packet's payload and comparing it with previously seen attacks signatures. However, the PI-IDS abilities to detect intrusions might be incapacitated by packet encryption. Traffic-based IDS (T-IDS) alleviates the shortcomings of PI-IDS, as it does not inspect packet payload; however, it analyzes packet header to identify intrusions. As the network's traffic grows rapidly, not only the detection-rate is critical, but also the efficiency and the scalability of IDS become more significant. In this paper, we propose a state-of-the-art T-IDS built on a novel randomized data partitioned learning model (RDPLM), relying on a compact network feature set and feature selection techniques, simplified subspacing and a multiple randomized meta-learning technique. The proposed model has achieved 99.984% accuracy and 21.38 s training time on a well-known benchmark botnet dataset. Experiment results demonstrate that the proposed methodology outperforms other well-known machine-learning models used in the same detection task, namely, sequential minimal optimization, deep neural network, C4.5, reduced error pruning tree, and randomTree.</P>

      • SCIESCOPUSKCI등재

        Opportunistic Spectrum Access Based on a Constrained Multi-Armed Bandit Formulation

        Ai, Jing,Abouzeid, Alhussein A. The Korea Institute of Information and Commucation 2009 Journal of communications and networks Vol.11 No.2

        Tracking and exploiting instantaneous spectrum opportunities are fundamental challenges in opportunistic spectrum access (OSA) in presence of the bursty traffic of primary users and the limited spectrum sensing capability of secondary users. In order to take advantage of the history of spectrum sensing and access decisions, a sequential decision framework is widely used to design optimal policies. However, many existing schemes, based on a partially observed Markov decision process (POMDP) framework, reveal that optimal policies are non-stationary in nature which renders them difficult to calculate and implement. Therefore, this work pursues stationary OSA policies, which are thereby efficient yet low-complexity, while still incorporating many practical factors, such as spectrum sensing errors and a priori unknown statistical spectrum knowledge. First, with an approximation on channel evolution, OSA is formulated in a multi-armed bandit (MAB) framework. As a result, the optimal policy is specified by the wellknown Gittins index rule, where the channel with the largest Gittins index is always selected. Then, closed-form formulas are derived for the Gittins indices with tunable approximation, and the design of a reinforcement learning algorithm is presented for calculating the Gittins indices, depending on whether the Markovian channel parameters are available a priori or not. Finally, the superiority of the scheme is presented via extensive experiments compared to other existing schemes in terms of the quality of policies and optimality.

      • SCIESCOPUS

        SPSIC: Semi-Physical Simulation for IoT Clouds

        Wang, J.,Shi, X.,Alhussein, M.,Peng, L.,Hu, Y. Springer Science + Business Media 2016 MOBILE NETWORKS AND APPLICATIONS Vol.21 No.5

        <P>Recent years have witnessed various successful demonstrations of the emerging IoT technologies, while the researchers still need to face a lot of technological challenges. It is necessary to verify and evaluate the relevant theories and calculations before the application of IoT, and that is why building a simulation platform for the IoT becomes so important, especially for a large scale IoT to meet the requirement of a scale perception in a large scope. The IoT which always contains a complicated network and communication system has made the network simulation software OPNET Modeler to be a good choice for it. Moreover, the IoT has transfer all kinds of 'objects' that humans need into the form of data by various sensing equipment and intelligent devices, and those data will be stored, analyzed and processed by cloud computing finally. The paper presents an innovative method to establish an intelligent, independent and expandable data driven IoT service platform by OPNET's Semi-Physical Simulation to combine the simulated network for IoT with the real Cloud computing(SPSIC) which applies real network to achieve the long-term surveillance, management, sharing and analysis of the collected data at any time.</P>

      • SCIESCOPUS

        Green data center with IoT sensing and cloud-assisted smart temperature control system

        Liu, Q.,Ma, Y.,Alhussein, M.,Zhang, Y.,Peng, L. Elsevier Science Publishers B.V. 2016 Computer networks Vol.101 No.-

        With the growing shortage of energy around the world, energy efficiency is one of the most important considerations for a data center. In this paper, we propose a green data center air conditioning system assisted by cloud techniques, which consists of two subsystems: a data center air conditioning system and a cloud management platform. The data center air conditioning system includes environment monitoring, air conditioning, ventilation and temperature control, whereas the cloud platform provides data storage and analysis to support upper-layer applications. Moreover, the detailed design and implementation are presented, including the dispatch algorithm for the temperature control, topological structure of the sensor network, and framework for the environment monitoring node. A feasibility evaluation is used to verify that the proposed system can significantly reduce the data center energy consumption without degradation in the cooling performance.

      • KCI등재

        Surgical outcomes of 14 consecutive bilateral cleft lip patients treated with a modified version of the Millard and Manchester methods

        Mustafa Zahi Al-Zajrawee,Mohammed Abd-Alhussein Aljodah,Qays Ahmed Hassan 대한성형외과학회 2019 Archives of Plastic Surgery Vol.46 No.2

        Background Bilateral cleft lip deformity is much more difficult to correct than unilateral cleft lip deformity. The complexity of the deformity and the sensitive relationships between the arrangement of the muscles and the characteristics of the external lip necessitate a comprehensive preoperative plan for management. The purpose of this study was to evaluate the repair of bilateral cleft lip using the Byrd modification of the traditional Millard and Manchester methods. A key component of this repair technique is focused on reconstruction of the central tubercle. Methods Fourteen patients with mean age of 5.7 months presented with bilateral cleft lip deformity and were operated on using a modification of the Millard and Manchester techniques. Patients with a very wide cleft lip and protruded or rotated premaxilla were excluded from this study. We analyzed 30 normal children for a comparison with our patients in terms of anthropometric measurements. Results By the end of the follow-up period (between 9 and 19 months), all our patients had obtained a full central segment with adequate white roll in the central segment and a deep gingivolabial sulcus, and we obtained nearly normal anthropometric measurements in comparison with age-matched normal children. Conclusions We recommend this modified technique for the treatment of bilateral cleft lip deformity.

      • SCOPUSKCI등재

        Surgical outcomes of 14 consecutive bilateral cleft lip patients treated with a modified version of the Millard and Manchester methods

        Al-Zajrawee, Mustafa Zahi,Aljodah, Mohammed Abd-Alhussein,Hassan, Qays Ahmed Korean Society of Plastic and Reconstructive Surge 2019 Archives of Plastic Surgery Vol.46 No.2

        Background Bilateral cleft lip deformity is much more difficult to correct than unilateral cleft lip deformity. The complexity of the deformity and the sensitive relationships between the arrangement of the muscles and the characteristics of the external lip necessitate a comprehensive preoperative plan for management. The purpose of this study was to evaluate the repair of bilateral cleft lip using the Byrd modification of the traditional Millard and Manchester methods. A key component of this repair technique is focused on reconstruction of the central tubercle. Methods Fourteen patients with mean age of 5.7 months presented with bilateral cleft lip deformity and were operated on using a modification of the Millard and Manchester techniques. Patients with a very wide cleft lip and protruded or rotated premaxilla were excluded from this study. We analyzed 30 normal children for a comparison with our patients in terms of anthropometric measurements. Results By the end of the follow-up period (between 9 and 19 months), all our patients had obtained a full central segment with adequate white roll in the central segment and a deep gingivolabial sulcus, and we obtained nearly normal anthropometric measurements in comparison with age-matched normal children. Conclusions We recommend this modified technique for the treatment of bilateral cleft lip deformity.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼