Search
Now showing items 21-30 of 54
A flow based architecture for efficient distribution of vehicular information in smart cities.
(IEEE, 2019-12-23)
The Introduction of the Internet of Things has made the
vision of “Smart Cities” a very reachable goal. Aggregating data
from a wealth of sensors throughout a city, with the aim of
improving quality of life for its ...
IProIoT: an in-network processing framework for IoT using information centric networking
(IEEE, 2017-07-27)
The Internet of Things (IoT) network supports various network applications through billions of heterogeneous connected devices. Efficient processing of enormous amounts of IoT data collected and exchanged by these devices ...
An evaluation of a 3D multimodal marker-less motion analysis system.
(ACM, 2019-06)
Motion analysis is a technique used by clinicians (among many
others) that quantifies human movement by using camera-based
systems. Marker-based motion analysis systems have been used
across a variety of application ...
NetFlow anomaly detection through parallel cluster density analysis in continuous time-series.
(Springer, 2017-06)
The increase in malicious network based attacks has resulted in a growing interest in network anomaly detection. The ability to detect unauthorized or malicious activity on a network is of importance to any organization. ...
Containers and clusters for edge cloud architectures - a technology review.
(IEEE, 2015-10-26)
Cloud technology is moving towards more distribution across multi-clouds and the inclusion of various devices, as evident through IoT and network integration in the context of edge cloud and fog computing. Generally, ...
FireNet: a specialized lightweight fire & smoke detection model for real-time IoT applications.
(arXiv, 2018-05-28)
Fire disasters typically result in lot of loss to life
and property. It is therefore imperative that precise, fast, and
possibly portable solutions to detect fire be made readily available
to the masses at reasonable ...
Bidirectional LSTM autoencoder for sequence based anomaly detection in cyber security.
(United Kingdom Simulation Society, 2019)
Cyber-security is concerned with protecting information, a vital asset in today’s world. The volume of data that is
generated can be usefully analyzed when cyber-security systems are effectively implemented with the aid ...
Joint crypto-stego scheme for enhanced image protection with nearest-centroid clustering.
(IEEE, 2018-03-12)
Owing to the exceptional growth of information exchange over open communication
channels within the public Internet, confidential transmission of information has become a vital current
concern for organizations and ...
Olfaction-enhanced multimedia: a survey application domains, displays and research challenges.
(ACM, 2016-05)
Recently, the concept of olfaction-enhanced multimedia applications has gained traction as a step towards
further enhancing user quality of experience. The next generation of rich media services will be immersive
and ...
Host based intrusion detection system with combined CNN/RNN model.
(Springer, 2018-09)
Cyber security has become one of the most challenging aspects of modern world digital technology and it has become imperative to minimize and possibly avoid the impact of cybercrimes. Host based intrusion detection systems ...