Article

Model-Driven Approach to Fading-Aware Wireless Network Planning Leveraging Multiobjective Optimization and Deep Learning

Published in: Mathematical Problems in Engineering

Apr 08, 2022

Dragana Krstic Nenad Petrovic / Issam Al-Azzoni

Efficient resource planning is recognized as one of the key enablers making the large-scale deployment of next-generation wireless networks available for mass usage. Modelling, planning, and software simulation tools reduce both the time needed and costs of their tuning and realization. In this paper, we propose a model-driven framework for proactive network planning relying on synergy of deep learning and multiobjective optimization. The predictions about service demand and energy consumption ...


Conference Paper

Model-Driven Approach to COVID-19 Vaccination Planning Leveraging Multi-Objective Optimization and Deep Learning

Published in: Small Systems Simulation Symposium (SSSS)

Feb 28, 2022

Nenad Petrovic / Issam Al-Azzoni

Vaccination is recognized as one of crucial measures in battle against COVID-19, contributing to both the reduction of its negative impact on infected person and overall spread reduction. In this paper, we focus on adoption of model-driven approach to proactive and cost-effective vaccine distribution, relying on deep-learning (for vaccine-demand predictions) and multi-objective optimization (for solving the allocation problem). As outcome, software simulation tool for efficient vaccination plan...


Article

A Framework for Privacy and Security Requirements Analysis and Conflict Resolution for Supporting GDPR Compliance Through Privacy-by-Design

Published in: Communications in Computer and Information Science book series

Feb 11, 2022

Duaa Alkubaisy Luca Piras Mohammed Ghazi Al-Obeidallah Karl Cox Haralambos Mouratidis

Requirements elicitation, analysis, and, above all, early detection of conflicts and resolution, are among the most important, strategic, complex and crucial activities for preventing software system failures, and reducing costs related to reengineering/fixing actions. This is especially important when critical Requirements Classes are involved, such as Privacy and Security Requirements. Recently, organisations have been heavily fined for lack of compliance with data protection regulations, suc...


Displaying 21-24 of 212 result(s).