Research, Innovation & Enterprise: Recent submissions
Now showing items 341-360 of 510
-
Joint crypto-stego scheme for enhanced image protection with nearest-centroid clustering.
(IEEE, 2018-03-12)Owing to the exceptional growth of information exchange over open communication channels within the public Internet, confidential transmission of information has become a vital current concern for organizations and ... -
Effectiveness of crypto-transcoding for H.264/AVC and HEVC video bit-streams.
(Springer, 2019-03-22)To avoid delays arising from a need to decrypt a video prior to transcoding and then re-encrypt it afterwards, this paper assesses a selective encryption (SE) content protection scheme. The scheme is suited to both recent ... -
Visual surveillance within the EU general data protection regulation: a technology perspective.
(IEEE, 2019-08-23)From an individual's perspective, technological advancement has merits and demerits. Video captured by surveillance cameras while a person goes about their daily life may improve their personal safety but the images collected ... -
Establishing trust in cloud services via integration of cloud trust protocol with a trust label system.
(Springer, 2017-04)Cloud computing has transformed the computing landscape by enabling flexible compute-resource provisioning. The rapid growth of cloud computing and its large-scale nature provide many advantages to business enterprises. ... -
Situational awareness based risk-adaptable access control in enterprise networks.
(Association for Computing Machinery, 2017-03)As the computing landscape evolves towards distributed architectures such as Internet of Things (IoT), enterprises are moving away from traditional perimeter based security models toward so called “zero trust networking” ... -
Host based intrusion detection system with combined CNN/RNN model.
(Springer, 2018-09)Cyber security has become one of the most challenging aspects of modern world digital technology and it has become imperative to minimize and possibly avoid the impact of cybercrimes. Host based intrusion detection systems ... -
Fuzzy‑logic threat classification for multi‑level selective encryption over real‑time video streams.
(Springer, 2020-04-22)This paper proposes a Fuzzy-logic Threat Classification (FTC) model as the basis of a method to auto-detect three different confidentiality levels for videos streamed from heterogeneous, mobile devices via web edge servers, ... -
β-Glucan extracts from the same edible shiitake mushroom Lentinus edodes produce differential in-vitro immunomodulatory and pulmonary cytoprotective effects — Implications for coronavirus disease (COVID-19) immunotherapies.
(Elsevier, 2020-05-11)Coronavirus pneumonia is accompanied by rapid virus replication, where a large number of inflammatory cell infiltration and cytokine storm may lead to acute lung injury, acute respiratory distress syndrome (ARDS) and death. ... -
NetFlow anomaly detection through parallel cluster density analysis in continuous time-series.
(Springer, 2017-06)The increase in malicious network based attacks has resulted in a growing interest in network anomaly detection. The ability to detect unauthorized or malicious activity on a network is of importance to any organization. ... -
B-ICP: Backpressure Interest Control Protocol for Multipath Communication in NDN.
(IEEE, 2018-01)Named Data Networking (NDN) is a promising communication paradigm to support content distribution for the Future Internet. The objective of this paper is to maximize the consumer downloading rate by retrieving content via ... -
Material testing, design & construction of a laboratory-scale FRP composite.
(ACIC, 2017-09)Pedestrian loading on flexible structures such as footbridges, grandstands and lightweight floors is an area, which is receiving significant attention from the research community of late. One of the key parameters in ... -
Dielectric polarization enhancement of thermoplastic elastomers for sensing and energy harvesting applications.
(IJMMM, 2016-11)Nano-structured dielectric thermoplastic elastomers (DTEs) such as poly(styrene-co-ethylene-co-butylene-styrene) [SEBS] and poly(styrene-co-ethylene-co-butylene-styrene) –grafted- maleic anhydride[SEBS-g-MA] triblock ... -
HLAF: heterogeneous-latency adaptive forwarding strategy for peer-assisted video streaming in NDN.
(IEEE, 2017-09)Named Data Networking (NDN) is a promising Future Internet architecture to support efficient content distribution. Specifically, P2P may gain benefits from NDN, as NDN inherently provides a flexible forwarding plane for ... -
Silver nanoparticles in the environment: sources, detection and ecotoxicology.
(Elsevier, 2017-01)The environmental impact of silver nanoparticles (AgNP) has become a topic of interest recently, this is due to the fact that AgNPs have been included in numerous consumer products including textiles, medical products, ... -
The relationship between pedestrian loading and dynamic response of an FRP composite footbridge.
(Taylor & Francis, 2017)Pedestrian loading on flexible structures such as footbridges, grandstands and lightweight floors is an area, which is receiving significant attention from the research community of late. One of the key parameters in ... -
An architecture pattern for trusted orchestration in IoT Edge clouds.
(IEEE, 2018-04)Fog and edge architectures provide a link between centralised clouds and the world of IoT and sensors. The architectures consist of devices of different sizes that coordinate the communication with sensors and cloud services, ... -
Dynamic collaboration of centralized & Edge processing for coordinated data management in an IoT paradigm.
(IEEE, 2018-05)Over the past decade, much focus in the area of Technology has deviated towards two relatively new areas; "The Internet of Things" and "Machine Learning". Although completely separate technologies, they have one major ... -
Addressing challenges and opportunities of the European seafood sector under a circular economy framework.
(Elsevier, 2020-02)The European seafood and aquaculture sectors are facing important challenges in terms of environmental threats (climate change, marine debris, resources depletion), social development (worker rights, consumer's awareness) ... -
An adaptive policy approach to video quality assurance.
(IEEE, 2018-12)Video in all its forms is probably the most important service carried on networks today and few would argue that video quality assurance is one of the most daunting network management challenges. Quite often, video ... -
A tutorial for olfaction-based multisensorial media application design and evaluation.
(ACM, 2017-09)Recently, multimedia researchers have added several so-called new media to the traditional multimedia components (e.g., olfaction, haptic, and gustation). Evaluating multimedia user-perceived Quality of Experience (QoE) ...