College of Engineering: Recent submissions
Now showing items 1261-1280 of 8768
-
Laboratory-scale pull-out tests on a geothermal energy pile in dry sand subjected to heating cycles
( National Research Council of Canada , 2020 , Article)Ground source heat pumps coupled with energy piles operate intermittently, subjecting the piles to temperature cycles throughout their lifetime. The research presented in this paper focuses on studying the thermomechanical ... -
Effect of bond enhancement using carbon nanotubes on flexural behavior of RC beams strengthened with externally bonded CFRP sheets
( Springer Nature , 2022 , Article)This paper studied the effect of incorporation of carbon nanotubes (CNTs) in carbon fiber reinforced polymer (CFRP) on strengthening of reinforced concrete (RC) beams. The RC beams were prepared, strengthened in flexure ... -
Development of sustainable geopolymer composites for repair application: Workability and setting time evaluation
( Elsevier , 2023 , Article)One of the most used construction materials worldwide is concrete. It has a lot of advantages over the other construction materials. However, the production process of concrete produces a huge amount of carbon dioxide. ... -
Repair of Heat-Damaged RC Beams Using Micro-concrete Modified with Carbon Nanotubes
( Korean Society of Civil Engineers , 2021 , Article)This paper investigates the use of micro-concrete modified with carbon nanotubes (CNTs) for the repair of heat-damaged reinforced concrete (RC) beams. Ten RC beams were cast and then subjected to elevated temperature of ... -
Effect of carbon nanotubes on the bonding mechanism of non-corrosive reinforcements to concrete
( Elsevier , 2024 , Article)This study aimed to assess the impact of waterborne pre-dispersed multiwall carbon nanotubes (MWCNTs) at a concentration of 0.2 wt % on the bond strength between concrete and non-corrosive reinforcements, including stainless ... -
A Machine Learning Based Framework for Real-Time Detection and Mitigation of Sensor False Data Injection Cyber-Physical Attacks in Industrial Control Systems
( Institute of Electrical and Electronics Engineers Inc. , 2023 , Article)In light of the advancement of the technologies used in industrial control systems, securing their operation has become crucial, primarily since their activity is consistently associated with integral elements related to ... -
Constraint-enhanced role engineering via answer set programming
( Association for Computing Machinery , 2012 , Conference)Role engineering (RE) aims to develop and maintain appropriate role-based access control (RBAC) configurations. However, RE with constraints in place is not well-studied. Constraints usually describe organizations' security ... -
Compliance checking for usage-constrained credentials in trust negotiation systems
( Springer Berlin Heidelberg , 2012 , Conference)We propose an approach to placing usage-constraints on RT credentials; issuers specify constraints by designing non-deterministic finite automata. We show by examples that this approach can express constraints of practical ... -
Automatic verification of health regulatory compliance in cloud computing
( IEEE , 2013 , Conference)This paper aims to develop an approach that enables cloud computing clients to verify health regulatory compliance claimed by cloud computing providers. In this approach, clients of cloud computing could check automatically ... -
Role of contextual properties in enterprise service migration to cloud computing
( John Wiley and Sons Ltd , 2013 , Article Review)This paper attempts to identify the role of contextual properties of enterprise systems architecture in relation to service migration to cloud computing. In a cloud-based service architecture, the shift of ownership, scope, ... -
Social access control language (SocACL)
( Association for Computing Machinery , 2013 , Conference)Online Social Networks hold vast amounts of readily accessible personal information leaving them particularly vulnerable to privacy breach attacks [6]. With the impact these breaches varying from simply embarrassing the ... -
Traceability for adaptive information security in the cloud
( IEEE Computer Society , 2014 , Conference)One of the key challenges in cloud computing is the security of the consumer data stored and processed by cloud machines. When the usage context of a cloud application changes, or when the context is unknown, there is a ... -
Secure cloud services: Matrix multiplication revisited
( IEEE , 2013 , Conference)This paper revisits the issue of secure outsourcing of services. It proposes a data scrambling approach of transforming private data into public without public key encryption in the cloud computing context. The approach ... -
A Process Model for Customisation of Software in Multi-tenant SaaS Model
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference)This paper outlines a generic process framework for customisation of software in cloud computing. The flexibility for client-specific customisation of the software offered by software-as-a-service (SaaS) is limited. The ... -
Trust in cloud services: Providing more controls to clients
( IEEE , 2013 , Article)Trust is more important than money and will ultimately determine cloud computing's success. -
Security-oriented service composition and evolution
( IEEE , 2006 , Conference)This paper introduces a framework for security-oriented software service composition and evolution. Key building blocks of the framework are a semantic model for specifying the security objectives and properties at the ... -
Identifying contextual properties of software architecture in cloud computing
( IEEE , 2011 , Conference)This paper argues that the contextual properties of cloud-enabled software architecture should be identified and understood differently by cloud consumers. The existing architectures are not designed to exploit the contextual ... -
Selecting Web services with security compliances: A managerial perspective
( dblp computer science bibliography , 2007 , Conference)This paper proposes a framework of a decision support system (DSS) for the assessment process of selecting Web services with security compliances consistent with the enterprise business goal. The proposed DSS framework is ... -
A modal logic for information system security
( Australian Computer Society, Inc. , 2011 , Article)As a security mechanism, authorization or access control ensures that all accesses to the system resources occur exclusively according to the access polices and rules specified by the systemsecurity agent. Authorization ... -
Profile-based security assurances for service software
( Springer Verlag , 2011 , Conference)In service software, it is highly desirable to have a service composition mechanism that supports automatic reasoning about the security assurances of services. Service consumers such as human, machine, even application ...