Browsing Conferences - Software Research Institute by Title
Now showing items 21-40 of 46
-
Hop-by-hop congrestion measurement and practical active queue management in NDN
(IEEE, 2020-12)Content replication and name-based routing in Named Data Network (NDN) naturally lead to connectionless multi-source and multipath transmissions. Traditional congestion control designed for end-to-end connections cannot ... -
Host based intrusion detection system with combined CNN/RNN model.
(Springer, 2018-09)Cyber security has become one of the most challenging aspects of modern world digital technology and it has become imperative to minimize and possibly avoid the impact of cybercrimes. Host based intrusion detection systems ... -
A hybrid machine learning/policy approach to optimise video path selection.
(IEEE, 2020-02-27)Services such as interactive video and real time gaming are ubiquitous on modern networks. The approaching realisation of 5G as well as the virtualisation and scalability of network functions made possible by technologies ... -
The impact of scent type on olfaction-enhanced multimedia quality of experience.
(IEEE, 2017-09)In the quest to increase user perceived Quality of Experience (QoE), the classic audio-visual content paradigm can be extended to include media components that stimulate other human senses. Among these, olfaction-enhanced ... -
The influence of human factors on olfaction based mulsemedia quality of experience.
(IEEE, 2016)With the aim to enrich users’ perceived multimedia experience, the authors present the results of an empirical study which looked at user perception of olfaction based mulsemedia. The goal is to evaluate the influence ... -
Intelligent monitoring of IoT devices using neural networks
(IEEE, 2021-03-29)The Internet of Things (IoT) has seen expeditious growth in recent times with 7 billion connected devices in 2020, thus leading to the vital importance of real-time monitoring of IoT devices. Through this paper, we demonstrate ... -
Invisible encoded backdoor attack on DNNs using conditional GAN
(IEEE, 2023-02-17)Deep Learning (DL) models deliver superior performance and have achieved remarkable results for classification and vision tasks. However, recent research focuses on exploring these Deep Neural Networks (DNNs) weaknesses ... -
IProIoT: an in-network processing framework for IoT using information centric networking
(IEEE, 2017-07-27)The Internet of Things (IoT) network supports various network applications through billions of heterogeneous connected devices. Efficient processing of enormous amounts of IoT data collected and exchanged by these devices ... -
Low-cost gaze detection with real-time ocular movements using coordinate-convolutional neural networks
(United Kingdom Simulation Society, 2019-10)Detection of ocular-movements unfolds various possibilities in computer vision but requires large datasets, expensive hardware and computational power. Prior research substantiates the belief that Convolutional Neural ... -
Memristor-based tunable analog filter for physiological signal acquisition for electrooculography.
(SpringerLink, 2019-01-09)In this paper we demonstrate that Memristors can be used in conjunction with CMOS to implement a continuous-time tunable analog bandpass filter for use in the area of biomedical signal acquisition. The idea here is to ... -
Muselmedia data representation based on multi-image concept.
(IMCL, 2019-10-31)MulseMedia technology enables operation with multimodal data sets that requires their complex representation. In this paper, we propose a mathematical background of MulseMedia data representation. The application of both ... -
Nano-enhanced food contanct materials and the in vitro toxicity to human intestinal cells of nano-ZnO at low dose.
(IOP Science, 2011)Nano Zinc Oxide (nZnO) has been shown to display antimicrobial effects which have lead to its application in a number of areas such as antimicrobial surface coatings, anti bacterial wound dressings and more recently in ... -
NetFlow anomaly detection through parallel cluster density analysis in continuous time-series.
(Springer, 2017-06)The increase in malicious network based attacks has resulted in a growing interest in network anomaly detection. The ability to detect unauthorized or malicious activity on a network is of importance to any organization. ... -
A physiology-based QoE comparison of interactive augmented reality and tablet-based applications.
(IEEE Xplore, 2020-03)The availability of affordable head-mounted display technology has facilitated new, potentially more immersive, interactive multimedia experiences. These technologies were traditionally focused on entertainment; however, ... -
PIoT: Programmable IoT using Information Centric Networking.
(IEEE, 2016)The Internet of Things (IoT) places significant demands on network infrastructure in order to process data captured by ubiquitous sensor devices. One existing technique to support this sensor data processing involves ... -
PRISENIT - a probabilistic search recommendation algorithm to improe search efficiency for network intelligence and troubleshooting
(UKSIM, 2015-03)When searching for data in a telecommunications network management application, large search result sets are common. In order to refine the results to retrieve useful information existing systems normally require additional ... -
Property based attestation for a secure cloud monitoring system.
(IEEE, 2014-02)—In this paper, we consider the problem of trust in cloud monitoring systems. We design and develop a novel scheme for trust certification using property based attestation (PBA). The PBA is based on a trusted platform ... -
A quality of experience evaluation system and research challenges for networked virtual reality-based teleoperation applications.
(ACM, 2019-06)Teleoperation applications are designed to assist humans in operating complex mechanical systems. Interfaces to teleoperation systems have always been challenging. Recently the potential of virtual reality (VR) has been ... -
Situational awareness based risk-adaptable access control in enterprise networks.
(Association for Computing Machinery, 2017-03)As the computing landscape evolves towards distributed architectures such as Internet of Things (IoT), enterprises are moving away from traditional perimeter based security models toward so called “zero trust networking” ... -
Subjective evaluation of an olfaction enhanced immersive virtual reality environment.
(ACM, 2017-10)Recent1 research efforts have reported findings on user Quality of Experience (QoE) of immersive virtual reality (VR) experiences. Truly immersive multimedia experiences also include multisensory components such as ...