بحث بسيط
السجلات المعروضة 2371 -- 2380 من 3148
Crashworthiness of pre-impacted glass/epoxy composite tubes
(
Elsevier Ltd
, 2016 , Conference Paper)
Composite materials currently have several uses, including aeronautical, marine, and piping applications. Composites are well-known for their specific strength and stiffness; however, the tolerance of composites to ...
The need for a global response against cybercrime: Qatar as a case study
(
Institute of Electrical and Electronics Engineers Inc.
, 2018 , Conference Paper)
Cybersecurity is one of the most significant concerns of life in the 21st century and safeguarding information systems is an arduous task for governments and companies across the globe. The tremendous growth in wireless ...
Investigations on recent power-aware opportunistic protocols in WSN
(
IEEE Computer Society
, 2018 , Conference Paper)
Nowdays, Wireless Sensor Networks (WSNs), Internet of Things (IoT), Industrial IoT (IIoT), and Cognitive IoT (CIoT), have attracted the attention of many researchers and industrials in different domains due to their wide ...
Maximum achievable throughput and interference mitigation for SUN in coexistence with WLAN
(
Institute of Electrical and Electronics Engineers Inc.
, 2018 , Conference Paper)
An optimum packet length selection scheme to maximize the throughput of a smart utility network (SUN) is introduced under wireless local area network (WLAN) interference system. The traditional and the investigated segmented ...
Mean squared error analysis for OFDMA signals under joint Tx/Rx IQ imbalance
(
Institute of Electrical and Electronics Engineers Inc.
, 2018 , Conference Paper)
In this paper, a normalized mean squared error (NMSE) expression is derived for an orthogonal frequency division multiple access link under the effects of joint transmitter (Tx) and receiver (Rx) in-phase/quadrature imbalance ...
Data-Driven Koopman Operator Based Cyber-Attacks for Nonlinear Control Affine Cyber-Physical Systems
(
Institute of Electrical and Electronics Engineers Inc.
, 2022 , Conference Paper)
This paper studies the data-driven implementation of stealthy cyber-attacks for a class of nonlinear cyber-physical systems (CPS). In particular, we consider and study zero dynamics and covert cyber-attacks. By utilizing ...
Security Analysis of Merging Control for Connected and Automated Vehicles
(
Institute of Electrical and Electronics Engineers Inc.
, 2022 , Conference Paper)
Securing traffic flows in internet of vehicles (IoV) environments for connected and automated vehicles (CAVs) is a critical task as it should be done in real-time to allow vehicles' controllers engagement on time. In this ...
An energy saving mechanism based on vacation queuing theory in data center networks
(
Springer
, 2018 , Conference Paper)
To satisfy the growing need for computing resources, data centers consume a huge amount of power which raises serious concerns regarding the scale of the energy consumption and wastage. One of the important reasons for ...
Crowd Density Estimation using Imperfect Labels
(
IEEE
, 2023 , Conference Paper)
Density estimation is one of the most widely used method for crowd counting in which a deep learning model learns from head annotated crowd images to estimate crowd density in unseen images. Typically, the learning performance ...
Drones-aided Asset Maintenance in Hospitals
(
IEEE
, 2022 , Conference Paper)
The rapid outbreak of COVID-19 pandemic invoked scientists and researchers to prepare the world for future disasters. During the pandemic, global authorities on healthcare urged the importance of disinfection of objects ...