Search
Now showing items 41-50 of 63
PTP: path-specified transport protocol for concurrent multipath transmission in named data networks.
(Elsevier, 2018-10)
Named Data Networking (NDN) is a promising Future Internet architecture to support content distribution. Its inherent addressless routing paradigm brings valuable characteristics to improve the transmission robustness and ...
Deep neural networks for sequence based anomaly detection in cyber security
(Athlone Institute of Technology, 2019)
Cyber security has become one of the most challenging
aspects of modern world digital technology and it has
become imperative to minimize and possibly avoid the
impact of cybercrimes. Host based intrusion detection
systems ...
Age and gender influences on perceived olfactory and visual media synchronization.
(IEEE, 2013)
Lately, significant efforts have being put into proposing
various solutions for increasing multimedia viewers’
perceived quality levels. One innovative avenue is to
enhance users’ quality of experience (QoE) by extending ...
Host based intrusion detection system with combined CNN/RNN model.
(Springer International Publishing, 2018)
Cyber security has become one of the most challenging as-
pects of modern world digital technology and it has become imperative
to minimize and possibly avoid the impact of cybercrimes. Host based
intrusion detection ...
Establishing trust in cloud services via integration of cloud trust protocol with a trust label system.
(Springer, 2017-04)
Cloud computing has transformed the computing landscape by enabling flexible compute-resource provisioning.
The rapid growth of cloud computing and its large-scale nature provide many advantages to business
enterprises. ...
An architecture pattern for trusted orchestration in IoT Edge clouds.
(IEEE, 2018-04)
Fog and edge architectures provide a link between centralised clouds and the world of IoT and sensors. The architectures consist of devices of different sizes that coordinate the communication with sensors and cloud services, ...
A new image encryption algorithm based on heterogeneous chaotic neural network generator and dna encoding.
(Springer, 2018-02)
This paper presents a new combined neural network and chaos based pseudorandom
sequence generator and a DNA-rules based chaotic encryption algorithm for secure
transmission and storage of images. The proposed scheme uses ...
MR-Edge: a MapReduce-based Protocol for IoT Edge Computing with resource constraints.
(IEEE Xplore, 2019)
Edge computing is proposed to remedy the
Cloud-only processing architecture for Internet of Things (IoT)
because of the massive amounts of IoT data. The challenge is
how to deploy and execute data processing tasks ...
A quality of experience evaluation comparing augmented reality and paper based instruction for complex task assistance.
(IEEEXplore, 2019-11-18)
Augmented reality (AR) can support a user in
performing an expert task by overlaying real world objects with
the domain specific information required to complete the task.
Understanding how users can process and use ...
An Evaluation of Lower Facial Micro Expressions as an Implicit QoE Metric for an Augmented Reality Procedure Assistance Application.
(2020)
Augmented reality (AR) has been identified as a key technology to enhance worker utility in the context of increasing automation of repeatable procedures. AR can achieve this by assisting the user in performing complex and ...