Browsing Conferences - Software Research Institute by Title
Now showing items 24-43 of 46
-
The impact of scent type on olfaction-enhanced multimedia quality of experience.
(IEEE, 2017-09)In the quest to increase user perceived Quality of Experience (QoE), the classic audio-visual content paradigm can be extended to include media components that stimulate other human senses. Among these, olfaction-enhanced ... -
The influence of human factors on olfaction based mulsemedia quality of experience.
(IEEE, 2016)With the aim to enrich users’ perceived multimedia experience, the authors present the results of an empirical study which looked at user perception of olfaction based mulsemedia. The goal is to evaluate the influence ... -
Intelligent monitoring of IoT devices using neural networks
(IEEE, 2021-03-29)The Internet of Things (IoT) has seen expeditious growth in recent times with 7 billion connected devices in 2020, thus leading to the vital importance of real-time monitoring of IoT devices. Through this paper, we demonstrate ... -
Invisible encoded backdoor attack on DNNs using conditional GAN
(IEEE, 2023-02-17)Deep Learning (DL) models deliver superior performance and have achieved remarkable results for classification and vision tasks. However, recent research focuses on exploring these Deep Neural Networks (DNNs) weaknesses ... -
IProIoT: an in-network processing framework for IoT using information centric networking
(IEEE, 2017-07-27)The Internet of Things (IoT) network supports various network applications through billions of heterogeneous connected devices. Efficient processing of enormous amounts of IoT data collected and exchanged by these devices ... -
Low-cost gaze detection with real-time ocular movements using coordinate-convolutional neural networks
(United Kingdom Simulation Society, 2019-10)Detection of ocular-movements unfolds various possibilities in computer vision but requires large datasets, expensive hardware and computational power. Prior research substantiates the belief that Convolutional Neural ... -
Memristor-based tunable analog filter for physiological signal acquisition for electrooculography.
(SpringerLink, 2019-01-09)In this paper we demonstrate that Memristors can be used in conjunction with CMOS to implement a continuous-time tunable analog bandpass filter for use in the area of biomedical signal acquisition. The idea here is to ... -
Muselmedia data representation based on multi-image concept.
(IMCL, 2019-10-31)MulseMedia technology enables operation with multimodal data sets that requires their complex representation. In this paper, we propose a mathematical background of MulseMedia data representation. The application of both ... -
Nano-enhanced food contanct materials and the in vitro toxicity to human intestinal cells of nano-ZnO at low dose.
(IOP Science, 2011)Nano Zinc Oxide (nZnO) has been shown to display antimicrobial effects which have lead to its application in a number of areas such as antimicrobial surface coatings, anti bacterial wound dressings and more recently in ... -
NetFlow anomaly detection through parallel cluster density analysis in continuous time-series.
(Springer, 2017-06)The increase in malicious network based attacks has resulted in a growing interest in network anomaly detection. The ability to detect unauthorized or malicious activity on a network is of importance to any organization. ... -
A physiology-based QoE comparison of interactive augmented reality and tablet-based applications.
(IEEE Xplore, 2020-03)The availability of affordable head-mounted display technology has facilitated new, potentially more immersive, interactive multimedia experiences. These technologies were traditionally focused on entertainment; however, ... -
PIoT: Programmable IoT using Information Centric Networking.
(IEEE, 2016)The Internet of Things (IoT) places significant demands on network infrastructure in order to process data captured by ubiquitous sensor devices. One existing technique to support this sensor data processing involves ... -
PRISENIT - a probabilistic search recommendation algorithm to improe search efficiency for network intelligence and troubleshooting
(UKSIM, 2015-03)When searching for data in a telecommunications network management application, large search result sets are common. In order to refine the results to retrieve useful information existing systems normally require additional ... -
Property based attestation for a secure cloud monitoring system.
(IEEE, 2014-02)—In this paper, we consider the problem of trust in cloud monitoring systems. We design and develop a novel scheme for trust certification using property based attestation (PBA). The PBA is based on a trusted platform ... -
A quality of experience evaluation system and research challenges for networked virtual reality-based teleoperation applications.
(ACM, 2019-06)Teleoperation applications are designed to assist humans in operating complex mechanical systems. Interfaces to teleoperation systems have always been challenging. Recently the potential of virtual reality (VR) has been ... -
Situational awareness based risk-adaptable access control in enterprise networks.
(Association for Computing Machinery, 2017-03)As the computing landscape evolves towards distributed architectures such as Internet of Things (IoT), enterprises are moving away from traditional perimeter based security models toward so called “zero trust networking” ... -
Subjective evaluation of an olfaction enhanced immersive virtual reality environment.
(ACM, 2017-10)Recent1 research efforts have reported findings on user Quality of Experience (QoE) of immersive virtual reality (VR) experiences. Truly immersive multimedia experiences also include multisensory components such as ... -
Subjective evaluation of olfactory and visual media synchronization.
(ACM, 2013)As a step towards enhancing users' perceived multimedia quality levels beyond the level offered by the classic audiovisual systems, the authors present the results of an experimental study which looked at user's perception ... -
Tethered balloon technology for green communication in smart cities and health environment.
(ICOICE, 2019-12)—The development and adopting of advanced communication technologies provide mobile users more convenience to connect any wireless network anytime and anywhere. Therefore, a large number of base stations (BS) are demanded ... -
Towards improved trust in threat intelligence sharing using Blockchain and trusted computing.
(IEEE Xplore, 2019-10)Threat intelligence sharing is posited as an important aid to help counter cybersecurity attacks and a number of threat intelligence sharing communities exist. There is a general consensus that many challenges remain to ...