Search
Now showing items 1-10 of 12
Empirical performance evaluation of QUIC protocol for Tor anonymity network
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
Tor's anonymity network is one of the most widely used anonymity networks online, it consists of thousands of routers run by volunteers. Tor preserves the anonymity of its users by relaying the traffic through a number of ...
A New Approach to Robust MPC Design for LPV Systems in Input-Output Form
(
Elsevier B.V.
, 2018 , Conference Paper)
In this paper, a robust model predictive control (MPC) technique is introduced to control MIMO linear parameter-varying (LPV) systems subject to input-output constraints. The LPV system is represented in input-output form, ...
Rational Contracts: Data-driven Service Provisioning in Blockchain-powered Systems
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Conference Paper)
Smart Contracts (SCs), which are software programs that run on blockchain platforms, provide appealing security guarantees characterized by decentralized, autonomous, and verifiable execution. On the other hand, Service ...
Investigation on the effect of mud additives on the gelation performance of PAM/PEI system for lost circulation control
(
Society of Petroleum Engineers
, 2021 , Conference Paper)
Lost circulation is one of the most common problems in the drilling of oil and gas wells where mud escapes through natural or induced fractures. Lost circulation can have severe consequences from increasing the operational ...
Gelation Performance of PAM/PEI Polymer-Based Mud System for Lost Circulation Control
(
EAGE Publishing BV
, 2021 , Conference Paper)
Lost circulation is one of the most common problems in the drilling of oil and gas wells where mud escapes through natural or induced fractures. Lost circulation can have severe consequences from increasing the operational ...
Modelling, analysis and performance improvement of an SRU's access request queue in multi-channel V2I communications
(
Elsevier B.V.
, 2015 , Conference Paper)
This paper presents a concise yet comprehensive description of a multi-channel Vehicle-to-Infrastructure (V2I) communication system. Existing mathematical models for such a system overlook some of its essential behavioural ...
On physical layer security of correlated multiantenna cognitive radio receivers
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Conference Paper)
In limited space scenarios, the antennas in the multiantenna cognitive radio (CR) system are closely spaced and often experience correlation among them. In this work, the secrecy performance of correlated multiantenna CR ...
A Characterization Study of Arabic Twitter Data with a Benchmarking for State-of-the-Art Opinion Mining Models
(
Association for Computational Linguistics (ACL)
, 2017 , Conference Paper)
Opinion mining in Arabic is a challenging task given the rich morphology of the language. The task becomes more challenging when it is applied to Twitter data, which contains additional sources of noise, such as the use ...
A need for functionally graded stiffness femoral stem for reduction in stress shielding and promoting bone growth: Computational analysis
(
American Society of Mechanical Engineers (ASME)
, 2017 , Conference Paper)
Total Hip Arthroplasty (THA) is an orthopaedic procedure that is available to reduce pain and restore the functionality of hip joints. THA has been successfully implemented for the last 40 years. However, after more than ...
Light-weight, Conservative, yet Effective: Scalable Real-time Tweet Summarization
(
National Institute of Standards and Technology (NIST)
, 2016 , Conference Paper)
Microblogging platforms and Twitter specifically have become a major resource for exploring diverse topics of interest that vary from the world's breaking news to other topics such as sports, science, religion and even ...