بحث بسيط
السجلات المعروضة 1 -- 10 من 22
To chain or not to chain: A reinforcement learning approach for blockchain-enabled IoT monitoring applications
(
Elsevier B.V.
, 2020 , Article)
Traceability and autonomous business logic execution are highly desirable features in IoT monitoring applications. Traceability enables verifying signals history for security or analytical purposes. On the other hand, the ...
Towards a Comprehensive Study of Fatigue Deducing Techniques for Evaluating the Quality of Experience of Haptic-Visual Applications
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
With the advancement of cellular communications and the achievement of 5th Generation (5G) mobile networks, a new class of multimedia systems, refereed to as the Tactile Internet, is becoming more prominent. Consequently, ...
Traffic Analysis Attacks on Tor: A Survey
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
The Tor anonymity network is one of the most popular and widely used tools to protect the privacy of online users. Tor provides defenses against multiple adversarial activities aiming to identify or trace the users. Traffic ...
Performance Analysis of IoT Physical layer Security Using 3-D Stochastic Geometry
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
The internet of things (IoT) is becoming part of the infrastructure supporting various services in every day's life. Due to the complex nature of IoT systems with heterogeneous devices, the needed security and privacy ...
A survey of blockchain enabled cyber-physical systems
(
MDPI AG
, 2020 , Article Review)
Cyber-physical systems (CPS) is a setup that controls and monitors the physical world around us. The advancement of these systems needs to incorporate an unequivocal spotlight on making these systems efficient. Blockchains ...
Wireless Power Transmission for the Internet of Things (IoT)
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
In some cases, long battery life may be essential to IoT devices, and early failures of actuators and sensors because of the rapid discharging of battery may lead to unacceptably high replacement costs. Critical to the ...
Generating Images from Arabic Story-Text using Scene Graph
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
In this paper, we propose a new approach to generate descriptive images from simple Arabic text of stories for children to build a flexible and rich multimedia repository. To make it successful, we need to transform the ...
LFR face dataset:Left-Front-Right dataset for pose-invariant face recognition in the wild
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
In this work, a new multitask convolutional neural network (CNN) is proposed aiming for the recognition of face under pose variations. Furthermore, the combination of pose estimation for each corresponding pose in a separate ...
A Scene-to-Speech Mobile based Application: Multiple Trained Models Approach
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
The concept of Scene-to-Speech (STS) is to recognize elements in a captured image or a video clip to speak loudly an informative textual content that describes the scene. The contemporary progression in convolution neural ...
IoT malicious traffic identification using wrapper-based feature selection mechanisms
(
Elsevier Ltd
, 2020 , Article)
Machine Learning (ML) plays very significant role in the Internet of Things (IoT) cybersecurity for malicious and intrusion traffic identification. In other words, ML algorithms are widely applied for IoT traffic identification ...