Browsing Network & Distributed Systems by Title
Now showing items 61-70 of 70
-
The Future of Aerial Communications: A Survey of IRS-Enhanced UAV Communication Technologies
( IEEE , 2024 , Conference Paper)The advent of Intelligent Reflecting Surfaces (IRS) and Unmanned Aerial Vehicles (UAVs) is setting a new benchmark in the field of wireless communications. IRS, with their groundbreaking ability to manipulate electromagnetic ... -
The simultaneous impact of EV charging and PV inverter reactive power on the hosting distribution system's performance: A case study in kuwait
( MDPI AG , 2020 , Article)Recently, electric vehicles (EVs) have become an increasingly important topic in the field of sustainable transportation research, alongside distributed generation, reactive power compensation, charging optimization, and ... -
Threat-specific security risk evaluation in the cloud
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)Existing security risk evaluation approaches (e.g., asset-based) do not consider specific security requirements of individual cloud computing clients in the security risk evaluation. In this paper, we propose a threat-specific ... -
ThreatRiskEvaluator: A Tool for Assessing Threat-Specific Security Risks in the Cloud
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)In cloud computing, security risks posed to individual clients are different based on their specific security requirements. In current practice, cloud providers usually apply generic protection mechanisms that may not be ... -
Time Series Forecasting Using Online Performance-based Ensemble Deep Random Vector Functional Link Neural Network
( Institute of Electrical and Electronics Engineers Inc. , 2022 , Conference Paper)Time series forecasting remains a challenging task in data science while it is of great relevance to decision-making in various industries such as transportation, finance, electricity resource management, meteorology. ... -
Using block cipher for confidentiality of images in cloud-based systems
( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)This paper deals with outsourcing of computing to cloud servers where clients' images are computed and stored. It proposes a technique that obfuscates images before sending them to servers. Cloud servers can perform ... -
A Voting-Mechanism-Based Ensemble Framework for Constraint Handling Techniques
( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)Effective constraint handling techniques (CHTs) are of great significance for evolutionary algorithms (EAs) dealing with constrained optimization problems (COPs). To date, many CHTs, such as penalty function, superiority ... -
Watermarking: A review of software and hardware techniques
( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)Watermarking is a well-known technique traditionally used in banknotes and other documents to discourage counterfeiting. It usually consists of semi-transparent symbols embedded on paper. Similar concepts were applied to ... -
Weighting and pruning based ensemble deep random vector functional link network for tabular data classification
( Elsevier Ltd , 2022 , Article)In this paper, we first integrate normalization to the Ensemble Deep Random Vector Functional Link network (edRVFL). This re-normalization step can help the network avoid divergence of the hidden features. Then, we propose ... -
Wireless Network Slice Assignment with Incremental Random Vector Functional Link Network
( IEEE Computer Society , 2022 , Article)This paper presents an artificial intelligence-assisted network slice prediction method, which utilizes a novel incremental random vector functional link (IRVFL) network to deal with the wireless network slice assignment ...