Search
Now showing items 41-50 of 54
An analysis of alterations to the SCTP RTO calculation mechanism for WLAN environments
(Springer, 2008-01)
As a connection oriented transport layer protocol the Stream Control
Transmission Protocol (SCTP) inherits many of the features of the Transmission
Control Protocol (TCP) including the mechanism by which Retransmission ...
MR-Edge: a MapReduce-based Protocol for IoT Edge Computing with resource constraints.
(IEEE Xplore, 2019)
Edge computing is proposed to remedy the
Cloud-only processing architecture for Internet of Things (IoT)
because of the massive amounts of IoT data. The challenge is
how to deploy and execute data processing tasks ...
Digital twin: origin to future
(MDPI, 2021-05-24)
Digital Twin (DT) refers to the virtual copy or model of any physical entity (physical twin)
both of which are interconnected via exchange of data in real time. Conceptually, a DT mimics the
state of its physical twin ...
B-ICP: Backpressure Interest Control Protocol for Multipath Communication in NDN.
(IEEE, 2018-01)
Named Data Networking (NDN) is a promising communication paradigm to support content distribution for the Future Internet. The objective of this paper is to maximize the consumer downloading rate by retrieving content via ...
PIoT: Programmable IoT using Information Centric Networking.
(IEEE, 2016)
The Internet of Things (IoT) places significant
demands on network infrastructure in order to process data
captured by ubiquitous sensor devices. One existing technique to
support this sensor data processing involves ...
Visual surveillance within the EU general data protection regulation: a technology perspective.
(IEEE, 2019-08-23)
From an individual's perspective, technological advancement has merits and demerits. Video captured by surveillance cameras while a person goes about their daily life may improve their personal safety but the images collected ...
A reinforcement learning based collaboration framework for autonomous mobile robots
(Technological University of the Shannon Midlands Midwest, 2022)
Manufacturing has shifted from mass production to mass customisation. The increased product varieties have created significant challenges in the manufacturing process. This
demands reconfigurable work cells and manufacturing ...
Anomalous distributed traffic: detecting cyber security attacks amongst microservices using graph convolutional networks
(Elsevier, 2022-04-22)
Currently, microservices are trending as the most popular software application design architecture. Software organisations are also being targeted by more cyber-attacks every day and newer security measures are in high ...
Pixdoor: a pixel-space backdoor attack on deep learning models
(IEEE, 2021-08-23)
Deep learning algorithms outperform the machine
learning techniques in various fields and are widely deployed
for recognition and classification tasks. However, recent research
focuses on exploring these deep learning ...
Invisible encoded backdoor attack on DNNs using conditional GAN
(IEEE, 2023-02-17)
Deep Learning (DL) models deliver superior performance and have achieved remarkable results for classification and vision tasks. However, recent research focuses on exploring these Deep Neural Networks (DNNs) weaknesses ...