Search
Now showing items 1-10 of 15
Access control policy enforcement for zero-trust-networking.
(IEEE, 2018-06)
The evolution of the enterprise computing landscape towards emerging trends such as fog/edge computing and the Industrial Internet of Things (IIoT) are leading to a change of approach to securing computer networks to deal ...
Dynamic collaboration of centralized & Edge processing for coordinated data management in an IoT paradigm.
(IEEE, 2018-05)
Over the past decade, much focus in the area of Technology has deviated towards two relatively new areas; "The Internet of Things" and "Machine Learning". Although completely separate technologies, they have one major ...
Affective computing using speech and eye gaze: a review and bimodal system proposal for continuous affect prediction.
(2018)
Speech has been a widely used modality in the field of affective computing. Recently however, there has been a growing interest in the use of multi-modal affective computing systems. These multi-modal systems incorporate ...
A governance architecture for self-adaption & control in IoT applications.
(IEEE, 2018-06-25)
The “Internet of Things” has become a reality with
projections of 28 billion connected devices by 2021. Much
R&D is currently focused on creating methods to efficiently
handle an influx of data. Flow based programming, ...
An architecture for intelligent data processing on IoT edge devices.
(IEEE, 2018-05-17)
As the Internet of Things edges closer to
mainstream adoption, with it comes an exponential rise in data
transmission across the current Internet architecture.
Capturing and analyzing this data will lead to a wealth ...
Fall detection system by machine learning framework for public health.
(Elsevier, 2018-11)
The elderly population is growing every year in Brazil. Consequently, health risks in elderly is a concern for public health system.
During the aging process, the mobility is affected, and falls are more frequent causing ...
FireNet: a specialized lightweight fire & smoke detection model for real-time IoT applications.
(arXiv, 2018-05-28)
Fire disasters typically result in lot of loss to life
and property. It is therefore imperative that precise, fast, and
possibly portable solutions to detect fire be made readily available
to the masses at reasonable ...
Joint crypto-stego scheme for enhanced image protection with nearest-centroid clustering.
(IEEE, 2018-03-12)
Owing to the exceptional growth of information exchange over open communication
channels within the public Internet, confidential transmission of information has become a vital current
concern for organizations and ...
Host based intrusion detection system with combined CNN/RNN model.
(Springer, 2018-09)
Cyber security has become one of the most challenging aspects of modern world digital technology and it has become imperative to minimize and possibly avoid the impact of cybercrimes. Host based intrusion detection systems ...
An adaptive policy approach to video quality assurance.
(IEEE, 2018-12)
Video in all its forms is probably the most important service carried on networks today and few would argue that video quality assurance is one of the most daunting network management challenges. Quite often, video ...