Research, Innovation & Enterprise: Recent submissions
Now showing items 321-340 of 494
-
A governance architecture for self-adaption & control in IoT applications.
(IEEE, 2018-06-25)The “Internet of Things” has become a reality with projections of 28 billion connected devices by 2021. Much R&D is currently focused on creating methods to efficiently handle an influx of data. Flow based programming, ... -
Transparent encryption with scalable video communication: Lower-latency, CABAC-based schemes
(Elsevier, 2017-05)Selective encryption masks all of the content without completely hiding it, as full encryption would do at a cost in encryption delay and increased bandwidth. Many commercial applications of video encryption do not even ... -
A hybrid machine learning/policy approach to optimise video path selection.
(IEEE, 2020-02-27)Services such as interactive video and real time gaming are ubiquitous on modern networks. The approaching realisation of 5G as well as the virtualisation and scalability of network functions made possible by technologies ... -
An architecture for intelligent data processing on IoT edge devices.
(IEEE, 2018-05-17)As the Internet of Things edges closer to mainstream adoption, with it comes an exponential rise in data transmission across the current Internet architecture. Capturing and analyzing this data will lead to a wealth ... -
Joint crypto-stego scheme for enhanced image protection with nearest-centroid clustering.
(IEEE, 2018-03-12)Owing to the exceptional growth of information exchange over open communication channels within the public Internet, confidential transmission of information has become a vital current concern for organizations and ... -
Effectiveness of crypto-transcoding for H.264/AVC and HEVC video bit-streams.
(Springer, 2019-03-22)To avoid delays arising from a need to decrypt a video prior to transcoding and then re-encrypt it afterwards, this paper assesses a selective encryption (SE) content protection scheme. The scheme is suited to both recent ... -
Visual surveillance within the EU general data protection regulation: a technology perspective.
(IEEE, 2019-08-23)From an individual's perspective, technological advancement has merits and demerits. Video captured by surveillance cameras while a person goes about their daily life may improve their personal safety but the images collected ... -
Establishing trust in cloud services via integration of cloud trust protocol with a trust label system.
(Springer, 2017-04)Cloud computing has transformed the computing landscape by enabling flexible compute-resource provisioning. The rapid growth of cloud computing and its large-scale nature provide many advantages to business enterprises. ... -
Situational awareness based risk-adaptable access control in enterprise networks.
(Association for Computing Machinery, 2017-03)As the computing landscape evolves towards distributed architectures such as Internet of Things (IoT), enterprises are moving away from traditional perimeter based security models toward so called “zero trust networking” ... -
Host based intrusion detection system with combined CNN/RNN model.
(Springer, 2018-09)Cyber security has become one of the most challenging aspects of modern world digital technology and it has become imperative to minimize and possibly avoid the impact of cybercrimes. Host based intrusion detection systems ... -
Fuzzy‑logic threat classification for multi‑level selective encryption over real‑time video streams.
(Springer, 2020-04-22)This paper proposes a Fuzzy-logic Threat Classification (FTC) model as the basis of a method to auto-detect three different confidentiality levels for videos streamed from heterogeneous, mobile devices via web edge servers, ... -
β-Glucan extracts from the same edible shiitake mushroom Lentinus edodes produce differential in-vitro immunomodulatory and pulmonary cytoprotective effects — Implications for coronavirus disease (COVID-19) immunotherapies.
(Elsevier, 2020-05-11)Coronavirus pneumonia is accompanied by rapid virus replication, where a large number of inflammatory cell infiltration and cytokine storm may lead to acute lung injury, acute respiratory distress syndrome (ARDS) and death. ... -
NetFlow anomaly detection through parallel cluster density analysis in continuous time-series.
(Springer, 2017-06)The increase in malicious network based attacks has resulted in a growing interest in network anomaly detection. The ability to detect unauthorized or malicious activity on a network is of importance to any organization. ... -
B-ICP: Backpressure Interest Control Protocol for Multipath Communication in NDN.
(IEEE, 2018-01)Named Data Networking (NDN) is a promising communication paradigm to support content distribution for the Future Internet. The objective of this paper is to maximize the consumer downloading rate by retrieving content via ... -
Material testing, design & construction of a laboratory-scale FRP composite.
(ACIC, 2017-09)Pedestrian loading on flexible structures such as footbridges, grandstands and lightweight floors is an area, which is receiving significant attention from the research community of late. One of the key parameters in ... -
Dielectric polarization enhancement of thermoplastic elastomers for sensing and energy harvesting applications.
(IJMMM, 2016-11)Nano-structured dielectric thermoplastic elastomers (DTEs) such as poly(styrene-co-ethylene-co-butylene-styrene) [SEBS] and poly(styrene-co-ethylene-co-butylene-styrene) –grafted- maleic anhydride[SEBS-g-MA] triblock ... -
HLAF: heterogeneous-latency adaptive forwarding strategy for peer-assisted video streaming in NDN.
(IEEE, 2017-09)Named Data Networking (NDN) is a promising Future Internet architecture to support efficient content distribution. Specifically, P2P may gain benefits from NDN, as NDN inherently provides a flexible forwarding plane for ... -
Silver nanoparticles in the environment: sources, detection and ecotoxicology.
(Elsevier, 2017-01)The environmental impact of silver nanoparticles (AgNP) has become a topic of interest recently, this is due to the fact that AgNPs have been included in numerous consumer products including textiles, medical products, ... -
The relationship between pedestrian loading and dynamic response of an FRP composite footbridge.
(Taylor & Francis, 2017)Pedestrian loading on flexible structures such as footbridges, grandstands and lightweight floors is an area, which is receiving significant attention from the research community of late. One of the key parameters in ... -
An architecture pattern for trusted orchestration in IoT Edge clouds.
(IEEE, 2018-04)Fog and edge architectures provide a link between centralised clouds and the world of IoT and sensors. The architectures consist of devices of different sizes that coordinate the communication with sensors and cloud services, ...