Computer Science & Engineering: Recent submissions
Now showing items 641-660 of 2414
-
Security oriented service composition: A framework
( IEEE , 2012 , Conference)This paper argues that in order to address the challenges of security compatibility checking between the client's software and the service software in a service oriented software environment, the followings have to be ... -
A predictive control approach for fault management of computing systems
( Association for Computing Machinery , 2015 , Conference)In this paper, a model-based predictive control approach for fault management in computing systems is presented. The proposed approach can incorporate existing fault diagnosis methods and fault recovery actions to facilitate ... -
Modeling security importance and preferences of software services
( IEEE , 2012 , Conference)This paper proposes a modeling framework on how to specify security preferences and importance of software services, and compute a quantifiable value. Our approach advocates for an automatic calculation of the results of ... -
Game Theoretical Model for Cybersecurity Risk Assessment of Industrial Control Systems
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference)Supervisory Control and Data Acquisition (SCADA) and Distributed Control Systems (DCS) use advanced computing, sensors, control systems, and communication networks to monitor and control industrial processes and distributed ... -
Multiview topological data analysis for crowdsourced service supply-demand gap prediction
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference)The widespread of smart devices equipped with high sensing capabilities opened the door to the new paradigm of mobile crowdsourcing. This paradigm relies on the crowd contribution and participation to collect data and ... -
A Modified Layer of Protection Analysis for Cyber-Physical Systems Security
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference)Layer of Protection Analysis (LOPA) is the most commonly used approach for quantitative safety risk assessment in the process control industry to protect a Cyber- Physical System (CPS) from accidental hazards-causing ... -
Semantics-based approach for dynamic evolution of trust negotiation protocols in cloud collaboration
( Springer Verlag , 2014 , Conference)Many techniques for addressing trust negotiation issues is little concerned with managing the dynamic evolution of trust negotiation protocols (policies), particularly in cases where there exist ongoing negotiations when ... -
Optimal inconsistency repairing of pairwise comparison matrices using integrated linear programming and eigenvector methods
( Hindawi Publishing Corporation , 2014 , Article)Satisfying consistency requirements of pairwise comparison matrix (PCM) is a critical step in decision making methodologies. An algorithm has been proposed to find a new modified consistent PCM in which it can replace the ... -
Stacking-based multi-objective ensemble framework for prediction of hypertension
( Elsevier , 2023 , Article)Hypertension is a common health problem that is costly to treat, difficult to control, and frequently results in serious and fatal disorders like cardiovascular disease (CVD) and stroke. The main objective of this work was ... -
Chatbot Application to Support Smart Agriculture in Thailand
( Institute of Electrical and Electronics Engineers Inc. , 2022 , Conference)A chatbot is a software developed to help reply to text or voice conversations automatically and quickly in real time. In the agriculture sector, the existing smart agriculture systems just use data from sensing and internet ... -
Hybrid Missing Value Imputation Algorithms Using Fuzzy C-Means and Vaguely Quantified Rough Set
( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)In real cases, missing values tend to contain meaningful information that should be acquired or should be analyzed before the incomplete dataset is used for machine learning tasks. In this work, two algorithms named jointly ... -
A Blockchain-Enabled Privacy-Preserving Verifiable Query Framework for Securing Cloud-Assisted Industrial Internet of Things Systems
( IEEE Computer Society , 2022 , Article)Advanced Industrial Internet-of-Things (IIoT), such as smart grids, 5G-enabled unmanned aerial vehicles (UAV), and supply chain 4.o, can be used to facilitate smart management. Nevertheless, IIoT systems generate huge ... -
An adaptive Laplacian weight random forest imputation for imbalance and mixed-type data
( Elsevier , 2023 , Article)As the application of information technology in the medical field is resulting in a large amount of medical data. As early withdrawal and refusal of participants, there are a lot of missing values in medical data. Although ... -
Hypertension Prediction Using Optimal Random Forest and Real Medical Data
( Institute of Electrical and Electronics Engineers Inc. , 2022 , Conference)Long-lasting and difficult-to-treat, hypertension frequently leads to serious and life-threatening diseases. As a result, early risk assessment and prevention of hypertension are crucial. The majority of research currently ... -
An Improvement of Support Vector Machine Imputation Algorithm Based on Multiple Iteration and Grid Search Strategies
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference)Data missing is a vitally important issue that influences the classification results in medical field. This paper proposes an improved support vector machine (SVM) imputation algorithm by using strategies of pre-imputation, ... -
Sustainability performance measurement framework for supply chain management
( Inderscience Publishers , 2015 , Article)Sustainability of supply chains has been recognised as a competitive indicator for business. The most widely used framework for implementing sustainability practices is the triple bottom line (TBL). However, the TBL is a ... -
Designing a competency framework for graduate levels in computing sciences: The middle-east context
( Springer Verlag , 2017 , Conference)This paper focuses on the current research work done within the Pro-Skima project (2015-2018) which aims at providing a suitable method to evolve classical Information Technology Master graduate levels towards some teaching ... -
RULE BASED RECOMMENDATION SYSTEM: TO SUPPORT CROP LIFECYCLE MANAGEMENT
( Editora Mundos Sociais , 2021 , Article)Crop lifecycle management is important for crop care and maintenance throughout its life. The existing recommendation and expert systems do not provide advice for the entire crop lifecycle. However, each stage of the crop's ... -
Open IoT Ecosystem for Sporting Event Management
( Institute of Electrical and Electronics Engineers Inc. , 2017 , Article)By connecting devices, people, vehicles, and infrastructures everywhere in a city, governments and their partners can improve community well-being and other economic and financial aspects (e.g., cost and energy savings). ... -
Field data forecasting using lstm and bi-lstm approaches
( MDPI , 2021 , Article)Water, an essential resource for crop production, is becoming increasingly scarce, while cropland continues to expand due to the world's population growth. Proper irrigation scheduling has been shown to help farmers improve ...