Search
Now showing items 1-8 of 8
Supervised machine learning techniques for efficient network intrusion detection
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
Cloud computing is gaining significant traction and virtualized data centers are becoming popular as a cost-effective infrastructure in telecommunication industry. Infrastructure as a Service (IaaS), Platform as a Service ...
Efficient EEG mobile edge computing and optimal resource allocation for smart health applications
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
In the past few years, a rapid increase in the number of patients requiring constant monitoring, which inspires researchers to develop intelligent and sustainable remote smart healthcare services. However, the transmission ...
Important complexity reduction of random forest in multi-classification problem
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
Algorithm complexity in machine learning problems has been a real concern especially with large-scaled systems. By increasing data dimensionality, a particular emphasis is placed on designing computationally efficient ...
CE-D2D: Dual framework chunks caching and offloading in collaborative edge networks with D2D communication
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
The advancement of technology has pushed the cloud computing capabilities to the edge networks, paving the way for network operators and multimedia service providers to leverage video caching and transcoding to the Mobile ...
A survey on recent approaches in intrusion detection system in IoTs
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
Internet of Things (IoTs) are Internet-connected devices that integrate physical objects and internet in diverse areas of life like industries, home automation, hospitals and environment monitoring. Although IoTs ease daily ...
Empirical performance evaluation of QUIC protocol for Tor anonymity network
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
Tor's anonymity network is one of the most widely used anonymity networks online, it consists of thousands of routers run by volunteers. Tor preserves the anonymity of its users by relaying the traffic through a number of ...
Green data center networks: A holistic survey and design guidelines
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
Data Center Networks (DCNs) are attracting immense interest from the industry, research and academia to keep pace with the increase of Internet services demands. One of the major concerns that draws the attention of ...
Compress or Interfere?
(
IEEE Computer Society
, 2019 , Conference Paper)
Rapid evolution of wireless medical devices and network technologies has fostered the growth of remote monitoring systems. Such new technologies enable monitoring patients' medical records anytime and anywhere without ...