Browsing Conferences - Software Research Institute by Issue Date
Now showing items 21-40 of 46
-
An architecture pattern for trusted orchestration in IoT Edge clouds.
(IEEE, 2018-04)Fog and edge architectures provide a link between centralised clouds and the world of IoT and sensors. The architectures consist of devices of different sizes that coordinate the communication with sensors and cloud services, ... -
Dynamic collaboration of centralized & Edge processing for coordinated data management in an IoT paradigm.
(IEEE, 2018-05)Over the past decade, much focus in the area of Technology has deviated towards two relatively new areas; "The Internet of Things" and "Machine Learning". Although completely separate technologies, they have one major ... -
An architecture for intelligent data processing on IoT edge devices.
(IEEE, 2018-05-17)As the Internet of Things edges closer to mainstream adoption, with it comes an exponential rise in data transmission across the current Internet architecture. Capturing and analyzing this data will lead to a wealth ... -
Access control policy enforcement for zero-trust-networking.
(IEEE, 2018-06)The evolution of the enterprise computing landscape towards emerging trends such as fog/edge computing and the Industrial Internet of Things (IIoT) are leading to a change of approach to securing computer networks to deal ... -
A governance architecture for self-adaption & control in IoT applications.
(IEEE, 2018-06-25)The “Internet of Things” has become a reality with projections of 28 billion connected devices by 2021. Much R&D is currently focused on creating methods to efficiently handle an influx of data. Flow based programming, ... -
Host based intrusion detection system with combined CNN/RNN model.
(Springer, 2018-09)Cyber security has become one of the most challenging aspects of modern world digital technology and it has become imperative to minimize and possibly avoid the impact of cybercrimes. Host based intrusion detection systems ... -
Fall detection system by machine learning framework for public health.
(Elsevier, 2018-11)The elderly population is growing every year in Brazil. Consequently, health risks in elderly is a concern for public health system. During the aging process, the mobility is affected, and falls are more frequent causing ... -
An adaptive policy approach to video quality assurance.
(IEEE, 2018-12)Video in all its forms is probably the most important service carried on networks today and few would argue that video quality assurance is one of the most daunting network management challenges. Quite often, video ... -
A federated learning system for optimised environmental control of consecutive areas.
(IADIS, 2019)Building management systems have led to artificially controlled environmental conditions. While new infrastructure will lead to a lower carbon footprint and a better working environment, the costs cannot justify the rewards ... -
Memristor-based tunable analog filter for physiological signal acquisition for electrooculography.
(SpringerLink, 2019-01-09)In this paper we demonstrate that Memristors can be used in conjunction with CMOS to implement a continuous-time tunable analog bandpass filter for use in the area of biomedical signal acquisition. The idea here is to ... -
A quality of experience evaluation system and research challenges for networked virtual reality-based teleoperation applications.
(ACM, 2019-06)Teleoperation applications are designed to assist humans in operating complex mechanical systems. Interfaces to teleoperation systems have always been challenging. Recently the potential of virtual reality (VR) has been ... -
Low-cost gaze detection with real-time ocular movements using coordinate-convolutional neural networks
(United Kingdom Simulation Society, 2019-10)Detection of ocular-movements unfolds various possibilities in computer vision but requires large datasets, expensive hardware and computational power. Prior research substantiates the belief that Convolutional Neural ... -
Towards improved trust in threat intelligence sharing using Blockchain and trusted computing.
(IEEE Xplore, 2019-10)Threat intelligence sharing is posited as an important aid to help counter cybersecurity attacks and a number of threat intelligence sharing communities exist. There is a general consensus that many challenges remain to ... -
Muselmedia data representation based on multi-image concept.
(IMCL, 2019-10-31)MulseMedia technology enables operation with multimodal data sets that requires their complex representation. In this paper, we propose a mathematical background of MulseMedia data representation. The application of both ... -
Tethered balloon technology for green communication in smart cities and health environment.
(ICOICE, 2019-12)—The development and adopting of advanced communication technologies provide mobile users more convenience to connect any wireless network anytime and anywhere. Therefore, a large number of base stations (BS) are demanded ... -
A flow based architecture for efficient distribution of vehicular information in smart cities.
(IEEE, 2019-12-23)The Introduction of the Internet of Things has made the vision of “Smart Cities” a very reachable goal. Aggregating data from a wealth of sensors throughout a city, with the aim of improving quality of life for its ... -
A hybrid machine learning/policy approach to optimise video path selection.
(IEEE, 2020-02-27)Services such as interactive video and real time gaming are ubiquitous on modern networks. The approaching realisation of 5G as well as the virtualisation and scalability of network functions made possible by technologies ... -
A physiology-based QoE comparison of interactive augmented reality and tablet-based applications.
(IEEE Xplore, 2020-03)The availability of affordable head-mounted display technology has facilitated new, potentially more immersive, interactive multimedia experiences. These technologies were traditionally focused on entertainment; however, ... -
Unsupervised noise detection in unstructured data for automatic parsing
(IEEE, 2020-11-30)The telecommunications industry makes extensive use of data extracted from logs, alarms, traces, diagnostics, and other monitoring devices. Analyzing the generated data requires that the data be parsed, re-structured, and ... -
Hop-by-hop congrestion measurement and practical active queue management in NDN
(IEEE, 2020-12)Content replication and name-based routing in Named Data Network (NDN) naturally lead to connectionless multi-source and multipath transmissions. Traditional congestion control designed for end-to-end connections cannot ...