Search
Now showing items 1-10 of 13
A framework for the dynamic generation of workflows for network management
(IEEE, 2021-06-30)
A demonstration of the application of dynamically generated workflows to the management of a network environment is presented. A proposed workflow management framework (WMF) uses dynamically generated workflows to control ...
A review of unstructured data analysis and parsing methods
(IEEE, 2020-03)
Computer applications generate an enormous amount of data every day through their logs, system-generated files or other reports. This generated data depicts the state of the running system and contains abundant information ...
A hybrid machine learning/policy approach to optimise video path selection.
(IEEE, 2020-02-27)
Services such as interactive video and real time gaming are ubiquitous on modern networks. The approaching realisation of 5G as well as the virtualisation and scalability of network functions made possible by technologies ...
CARM: a blockchain-based content quality assessment and rewarding mechanism
(Technological University of the Shannon Midlands Midwest, 2022)
Research has identified a gab in contemporary content
creation practices around content quality as well as other
variables such as content authenticity. To fill this gab, this
study proposes CARM, a Content Quality ...
PRISENIT - a probabilistic search recommendation algorithm to improe search efficiency for network intelligence and troubleshooting
(UKSIM, 2015-03)
When searching for data in a telecommunications network management application, large search result sets are common. In order to refine the results to retrieve useful information existing systems normally require additional ...
Low-cost gaze detection with real-time ocular movements using coordinate-convolutional neural networks
(United Kingdom Simulation Society, 2019-10)
Detection of ocular-movements unfolds various possibilities in computer vision but requires large datasets, expensive hardware and computational power. Prior research substantiates the belief that Convolutional Neural ...
NetFlow anomaly detection through parallel cluster density analysis in continuous time-series.
(Springer, 2017-06)
The increase in malicious network based attacks has resulted in a growing interest in network anomaly detection. The ability to detect unauthorized or malicious activity on a network is of importance to any organization. ...
MCP2P: Layer-dependency-aware live MVC video streaming over peer-to-peer networks.
(Elsevier, 2018-07)
Multiview video supports observing a scene from different viewpoints. The Joint Video Team (JVT) developed H.264/MVC to enhance the compression efficiency for multiview video, however, MVC encoded multiview video (MVC ...
An adaptive policy approach to video quality assurance.
(IEEE, 2018-12)
Video in all its forms is probably the most important service carried on networks today and few would argue that video quality assurance is one of the most daunting network management challenges. Quite often, video ...
A workflow management framework for the dynamic generation of workflows that is independent of the application environment
(IEEE, 2021-06-30)
Workflow is a well-known and widely used technology in business management. Traditional workflow solutions are designed for humans and generally use a graphical representation of workflow elements that reflect the involvement ...