Search
Now showing items 351-360 of 442
Game Theoretical Model for Cybersecurity Risk Assessment of Industrial Control Systems
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Conference Paper)
Supervisory Control and Data Acquisition (SCADA) and Distributed Control Systems (DCS) use advanced computing, sensors, control systems, and communication networks to monitor and control industrial processes and distributed ...
The Qatari Identity: Crisis, Change and Transition
(
Gulf Studies center - College of Arts & Sciences - Qatar University
, 2020 , Conference Paper)
The paper presents a set of qualitative and quantitative data (including interviews with policy instigators, academics and social/cultural influencers of different age ranges, backgrounds and professions, as well as an ...
B5G: Predictive Container Auto-Scaling for Cellular Evolved Packet Core
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Conference Paper)
The increase in mobile traffic which is accompanied by a random workload, variations necessitate an upgrade of mobile network infrastructure to maintain acceptable network performance. Scaling the mobile core network ...
Secure Authentication and Key Agreement Protocol for Tactile Internet-based Tele-Surgery Ecosystem
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
With the recent advancements in wireless communications, Tactile Internet (TI) has witnessed a major blow. TI is considered the next big evolution that will provide real-time control in industrial setups, particularly in ...
Carbon footprints across the food supply chain: A microscopic review on food waste-related sustainability assessment
(
IEOM Society
, 2021 , Conference Paper)
Reducing the carbon footprint along the food supply chain neutralizes the cost of climate change-related impacts on the environment. A third of the food produced globally is wasted along the food value chain. This paper ...
Cloud Storage Forensics: BaiduNetDisk, WeiYun, and 115yun on a Wireless Network
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
With the development of cloud computing and wireless networks, cloud storage services are widely used in daily life. People can get access to cloud storage anytime and anywhere. Cloud storage forensics is a computer forensic ...
Block6Tel: Blockchain-based Spectrum Allocation Scheme in 60-envisioned Communications
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Conference Paper)
The 6G-based spectrum bands allocation to telecom providers would guarantee ultra peak rates, high availability, and extremely low-latency for various user applications. However, the spectrum allocation still suffers from ...
An Improvement of Support Vector Machine Imputation Algorithm Based on Multiple Iteration and Grid Search Strategies
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
Data missing is a vitally important issue that influences the classification results in medical field. This paper proposes an improved support vector machine (SVM) imputation algorithm by using strategies of pre-imputation, ...
Third Harmonic Operation of Current Fed Resonant Inverters for Inductive Power Transfer Systems
(
IEEE Computer Society
, 2020 , Conference Paper)
This paper presents Third Harmonic Operation (THO) of Current Fed Parallel Resonant Push-pull Inverter (CFPRPI) for Inductive Power Transfer (IPT) systems. THO is proposed for CFPRPI to achieve higher voltage ratio with ...
A novel Conceptual Machine Learning Method using Random Conceptual Decomposition
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
Formal Concept Analysis (FCA) is emerging in Data Science because of its generality, simplicity, and powerful mathematical foundation. It enabled a uniform data clustering methods into structured space of formal concepts. ...