Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Logistics
biblio
A risk assessment model for supply chain design. Implementation at Kuehne amp;\#x002B; Nagel Luxembourg
Submitted by aekwall on Mon, 02/25/2019 - 11:43am
international regulations force enterprises
Supply Chain Risk Assesment
sustainable matters
sustainable development
sustainability
supply chain management
supply chain design
Supply Chain
risk assessment model
Performance
national regulations force enterprises
Nagel Luxembourg implementation
Logistics
Kuehne implementation
pubcrawl
indicators
green matters
Economics
decisions making
customers growing awareness
customer satisfaction
Companies
communication and information systems
risk management
Decision Making
supply chains
Metrics
biblio
Ubiquitous System to Monitor Transport and Logistics
Submitted by aekwall on Mon, 02/18/2019 - 12:54pm
security
Scalability
Resiliency
Human behavior
pubcrawl
Logistics
ubiquitous system
wireless technologies
supply chain security
biblio
Big Data Analytics for Air Quality Monitoring at a Logistics Shipping Base via Autonomous Wireless Sensor Network Technologies
Submitted by grigby1 on Mon, 12/03/2018 - 1:52pm
Temperature measurement
indoor air quality
industrial workplace air quality
industrial workplace buildings
industrial workplaces
logistics shipping base
Monitoring
on-shore logistics base a regional shipping industry
oxygen displacer
perceived levels
potential BD problems
reported medical health
shipping industry
Humidity
Temperature sensors
Transportation
visualization approach
Wireless Sensor Network Technologies
wireless sensor networks
workplace environments
WSN technologies
pubcrawl
Metrics
Resiliency
Scalability
CO2
supply chain risk assessment
Logistics
Big Data
resilience
air quality
air quality monitoring
air temperature
autonomous assessment
autonomous wireless sensor network technologies
Big Data Analytics
Buildings
Carbon dioxide
supply chain management
confined spaces humans
continuous assessment
critical role
data analytics approach
Decision Making
effective decision making
Employment
ergonomics
health and safety
Heart rate
high risk industries
biblio
A virtual laboratory approach for risk assessment of aerospace electronics trust techniques
Submitted by grigby1 on Mon, 12/03/2018 - 1:51pm
supply chain management
pubcrawl
Reliability
resilience
Resiliency
risk management
Scalability
semiconductor technologies
space vehicle electronics
procurement path
supply chain risk
supply chain risk assessment
supply chains
testing
trusted procurement options
US Department of Defense
virtual instrumentation
virtual laboratory approach
faulty component risk
aerospace electronic component risk assessment methodology
aerospace electronics trust techniques
aerospace testing
component criticality risk tolerance
component testing
Consumer electronics
counterfeit mitigation calculations
counterfeit risk
actionable decision data
Logistics
Metrics
microelectronics trust assurance
mitigation strategies
nontrusted procurement options
optimal test
part reliability
Procurement
biblio
Cryptographic protocol for multipart missions involving two independent and distributed decision levels in a military context
Submitted by grigby1 on Wed, 05/16/2018 - 1:47pm
Metrics
security levels
security level
secure protocol
secure cryptographic protocol
secrecy
Resiliency
resilience
Repudiation
pubcrawl
non-repudiation
multipart missions
multipart military missions
military mission
military context
military computing
authentication
man-in-the-middle attack
Logistics
internet
independent distributed decision levels
independent decision
human factor
Human behavior
encryption
distributed decision
digital signatures
decision level
Cryptographic Protocols
cryptographic protocol
critical military missions
composability
biblio
A Regression Model Based Approach for Identifying Security Requirements in Open Source Software Development
Submitted by grigby1 on Mon, 03/05/2018 - 1:08pm
open source software development
up-front RE
textual information retrieval techniques
testing
software engineering
security requirements identification methods
security requirements identification
security of data
security
Resiliency
resilience
requirements engineering
regression model based approach
regression analysis
pubcrawl
OSS projects
coding theory
Open Source Software
Metrics
Measurement
Logistics
logistic regression
lightweight representation
just-in-time requirements engineering
information retrieval
Formal Specification
Cryptography
Compositionality
Complexity theory
comment writing
comment security aspect
biblio
An ensemble model with hierarchical decomposition and aggregation for highly scalable and robust classification
Submitted by grigby1 on Thu, 12/28/2017 - 1:17pm
highly scalable classification
Xgboost
Training
sub-model training
sub-model integration
regression analysis
pubcrawl
Predictive models
pattern classification
model decomposition
Metrics
machine learning
Logistics
logistic regression
learning (artificial intelligence)
binary classification problem
Hearthstone
game state information
flexible robust scheme
feature extraction
extreme gradient boosted decision trees
ensemble model
deep learning
decomposition
Decision trees
Data models
computer games
computer game
Computational modeling
Compositionality
biblio
Biometric Image Encryption Using DNA Sequences and Chaotic Systems
Submitted by grigby1 on Wed, 12/27/2017 - 1:09pm
distributed network systems
Resiliency
pubcrawl
performance computation
nonlinear deterministic system
network security
Metrics
Logistics
Image Processing
hyper chaotic system
encryption
dynamic system
DNA sequence
DNA cryptography
DNA computing
DNA
biocomputing
Cryptography
Correlation
composability
complex problems
communication technologies
chaotic theory
Chaotic systems
chaotic cryptography
chaotic communication
chaos
biometrics (access control)
biometrics
biometric image encryption
biometric digital image encryption
biblio
Mixed chaotic maps based encryption for high crypto secrecy
Submitted by grigby1 on Wed, 12/27/2017 - 1:09pm
Logistics
Transposition
Substitution
statistical analysis
standards
simple chaotic maps
secure image encryption techniques
secure image encryption
Resiliency
pubcrawl
mixed chaotic maps
Metrics
chaos
initial conditions
Image Processing
high crypto secrecy
encryption
Elliptic curve cryptography
Cryptography
cryptographic algorithms
composability
chaotic cryptography
chaotic communication
chaos based image encryption technique
biblio
Reversible Chaotic Encryption Techniques For Images
Submitted by grigby1 on Wed, 12/27/2017 - 1:09pm
Image Processing
UACI
tent map
Signal processing algorithms
signal processing
reversible chaotic encryption technique
Resiliency
pubcrawl
PSNR
pixel shuffling
NPCR
MSE
Metrics
Logistics
logistic map
Arnold cat map
image pixels
image encryption security
image encryption
encryption
Cryptography
composability
civilian systems
Chaotic techniques
Chaotic maps
chaotic cryptography
chaotic communication
Cats
Arnold's cat map
« first
‹ previous
1
2
3
4
5
6
next ›
last »