Search
Now showing items 1-10 of 13
Hop-by-hop congrestion measurement and practical active queue management in NDN
(IEEE, 2020-12)
Content replication and name-based routing in Named Data Network (NDN) naturally lead to connectionless multi-source and multipath transmissions. Traditional congestion control designed for end-to-end connections cannot ...
Preserving chain-of-evidence in surveillance videos for authentication and trust-enabled sharing
(IEEE, 2020)
Surveillance video recording is a powerful method of deterring unlawful activities. A robust data protection-by-design solution can be helpful in terms of making a captured video immutable, as such recordings cannot become ...
Cooperative industrial multi robot system using multi agent reinforcement learning
(Athlone Institute of Technology, 2020-06)
This poster describes the research definition process for thisearly stage PhD.
Our goal is to investigate the feasibility of using multi-agent deep learning (MADRL) as an approach for solving cooperative multi robot system ...
The context aware security policy language for Zero Trust Network
(Athlone Institute of Technology, 2020-06)
With the development of the pervasive computing, the number of devices accessing to network is increasing. Though this condition brings us a more convenient and intelligent lifestyle, accompanying with it is the higher ...
Shallow and deep learning approaches for network intrusion alert prediction.
(Elsevier, 2020)
The ever-increasing frequency and intensity of intrusion attacks on computer networks worldwide has necessitated intense research efforts towards the design of attack detection and prediction mechanisms. While there are a ...
MR-Edge: a MapReduce-based protocol for IoT Edge computing
(Athlone Institute of Technology, 2020-06)
As
the Internet of Things ( grows exponentially,
so do the volumes of data it produces Cloud
computing is a popular choice to process enormous
amounts of IoT data because of its rich power and
resources However, this ...
A QoE Evaluation of an Augmented Reality Procedure Assistance Application
(2020-05)
Augmented reality (AR) is a key technology to enhance worker effectiveness during increasing automation of repetitive jobs in the workplace. AR will achieve this by assisting the user to successfully perform complex and ...
Evaluation of ethereum end-to-end transaction
(Athlone Institute of Technology, 2020-06)
Ethereum is a conventional but evolving blockchain
approach to support smart contract by enabling Turingcomplete
computations at miners. With smart contract as a
back-end support, anyone can publish their Decentralize ...
Anomaly detection in cyber security
(Athlone Institute of Technology, 2020-06)
Identify anomalous (outliers) system call sequences in security domain (Host based Intrusion Detection System).
Smart contract driven resource management for edge computing
(Athlone Institute of Technology, 2020-06)
Edge computing has witnessed a rapid growth in the past few years
as more and more and resources are getting connected to the
Internet. The Internet is not gaining any benefits from the current
implementation of ad hoc ...