Search
Now showing items 61-70 of 97
Exploitation of additional degrees of freedom of multiphase drives in low-frequency operation of modular multilevel converters
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
MMC encounters serious limitations in the zero and low-frequency operation of variable-speed motor drives. In MMC, the voltage ripples of SubModule (SM) capacitor is inversely proportional to the phase current frequency. ...
Learning predictive autoscaling policies for cloud-hosted microservices using trace-driven modeling
(
IEEE Computer Society
, 2019 , Conference Paper)
Autoscaling methods are important to ensure response time guarantees for cloud-hosted microservices. Most of the existing state-of-the-art autoscaling methods use rule-based reactive policies with static thresholds defined ...
Spiral Antenna Mounted on the t-Shirt to Harvested RF Energy
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
The purpose of this work is to present new technology of acquiring energy from the Ultra-wideband (UWB) station and stored in a super-capacitor to charge any electronic device. Many electronic devices operate in critical ...
Joint security and energy efficiency in iot networks through clustering and bit flipping
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
Channel-aware encryption is investigated as a physical layer security technique in internet of things (IoT) scenarios. Clustering algorithms for grouping sensor nodes into cooperative clusters are proposed, with the purpose ...
A bio-inspired framework to mitigate dos attacks in software defined networking
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
Software Defined Networking (SDN) is an emerging architecture providing services on a priority basis for real-time communication, by pulling out the intelligence from the hardware and developing a better management system ...
Compress or Interfere?
(
IEEE Computer Society
, 2019 , Conference Paper)
Rapid evolution of wireless medical devices and network technologies has fostered the growth of remote monitoring systems. Such new technologies enable monitoring patients' medical records anytime and anywhere without ...
Detecting False Data Injection Attacks in Linear Parameter Varying Cyber-Physical Systems
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
In this paper, we investigate the process of detection of False Data Injection (FDI) in a Linear Parameter Varying (LPV) cyber-physical system (CPS). We design a model based FDI detector capable of detecting false data ...
Cold-start cybersecurity ontology population using information extraction with LSTM
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
In this paper, we discuss how Long Short Time Memory (LSTM) neural networks can be applied to cyber security knowledge base population. Assuming we have an empty ontology that models the field of vulnerabilities description ...
Identifying opinion mining elements based on dependency relations and fuzzy logic
(
CSREA Press
, 2019 , Conference Paper)
Opinion mining mainly involves three elements: feature and feature-of relations, opinion expressions and the related opinion attributes (e.g. Polarity), and feature-opinion relations. Although many works are emerged to ...
POKs based secure and energy-efficient access control for implantable medical devices
(
Springer
, 2019 , Conference Paper)
Implantable medical devices (IMDs), such as pacemakers, implanted cardiac defibrillators and neurostimulators are medical devices implanted into patients' bodies for monitoring physiological signals and performing medical ...