بحث بسيط
السجلات المعروضة 81 -- 90 من 325
Breaking HK17 in Practice
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
In November 2017, Hecht and Kamlofsky submitted HK17, a quaternion(octonion)-based Diffie-Hellman key exchange protocol, to NIST post-quantum cryptography project, and thought that at least O(p8) arithmetic operations are ...
Strengthening of RC beams using near surface embedded-FRCM
(
ISEC Press
, 2019 , Conference Paper)
Fibre reinforced cementitious matrix (FRCM) systems are mostly externally bonded (EB) for the strengthening of reinforced concrete (RC) and masonry structures. In this paper, the relatively new concept of near-surface ...
Solving security problems in MEC systems
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
We propose an algorithm for constructing efficient security strategies in the mobile edge computing (MEC), where the protected targets are nodes connected to the MEC and the mobile users (MUs) are agents capable of preventing ...
Optimal Allocation of Multiple Distributed Generators and Shunt Capacitors in Distribution System Using Flower Pollination Algorithm
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
Optimal siting and sizing of Distributed generators (DGs) and capacitors helps in enhancing the overall performance of distribution system. A proficient method to optimally allocate DGs and shunt capacitors in distribution ...
Deep learning and cultural heritage: The CEPROQHA project case study
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
Cultural heritage takes an important part of the history of humankind as it is one of the most powerful tools for the transfer and preservation of moral identity. As a result, these cultural assets are considered highly ...
Leveraging Quality of Service and Cost in Cyber-Physical Systems Design
(
Springer
, 2019 , Conference Paper)
Cyber-Physical Systems (CPSs) comprise multiple cyberparts, physical processes, and human participants (end-users) that affect them, and vice versa. During the design of such systems, it is critical for the designer to ...
On the Ergodic Secrecy Rate of Massive MIMO Transmission with Partial Legitimate User CSI
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
In this paper, we consider the downlink transmission over a single-cell massive multiple-input-multiple-output (MIMO) system in the presence of multiple single-antenna eavesdroppers (massive MIMOME). We concentrate on the ...
Improvement of PVA gel properties for cell immobilization
(
Avestia Publishing
, 2019 , Conference Paper)
This study investigates the characterization and the ability of polyvinyl alcohol (PVA) gel to be used in the area of wastewater treatment as biomass immobilization matrix. The PVA matrix was prepared through the ...
A bio-inspired framework to mitigate dos attacks in software defined networking
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
Software Defined Networking (SDN) is an emerging architecture providing services on a priority basis for real-time communication, by pulling out the intelligence from the hardware and developing a better management system ...
A Matlab/Simulink-Based Average-Value Model of Multi-Terminal HVDC Network
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
Multi-terminal High-Voltage Direct Current (MTDC) networks are emerging as the promising technology in modern transmission systems for efficient and bulky renewable energy sources transfer over long distances. Nonetheless, ...