Search
Now showing items 11-20 of 37
An optimal uplink traffic offloading algorithm via opportunistic communications based on machine learning
(
Springer
, 2020 , Article)
Opportunistic communications as an efficient traffic offloading method can be used to offload uplink traffic of cellular networks to Wi-Fi networks. However, because of its contact pattern (contact frequency and contact ...
Fault and performance management in multi-cloud virtual network services using AI: A tutorial and a case study
(
Elsevier B.V.
, 2019 , Article)
Carriers find Network Function Virtualization (NFV) and multi-cloud computing a potent combination for deploying their network services. The resulting virtual network services (VNS) offer great flexibility and cost advantages ...
RF-based drone detection and identification using deep learning approaches: An initiative towards a large open source drone database
(
Elsevier B.V.
, 2019 , Article)
The omnipresence of unmanned aerial vehicles, or drones, among civilians can lead to technical, security, and public safety issues that need to be addressed, regulated and prevented. Security agencies are in continuous ...
An integrated framework for the interaction and 3D visualization of cultural heritage
(
Springer
, 2023 , Article)
In this study, the aim is to design and develop a 3D acquisition, visualization, and interaction framework to preserve cultural heritage and provide new ways to enable museum visitors and cultural audiences to virtually ...
IoT malicious traffic identification using wrapper-based feature selection mechanisms
(
Elsevier Ltd
, 2020 , Article)
Machine Learning (ML) plays very significant role in the Internet of Things (IoT) cybersecurity for malicious and intrusion traffic identification. In other words, ML algorithms are widely applied for IoT traffic identification ...
A new approach of clustering based machine-learning algorithm
(
Elsevier B.V.
, 2005 , Article)
Machine-learning research is to study and apply the computer modeling of learning processes in their multiple manifestations, which facilitate the development of intelligent system. In this paper, we have introduced a ...
TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
Machine learning techniques are becoming mainstream in intrusion detection systems as they allow real-time response and have the ability to learn and adapt. By using a comprehensive dataset with multiple attack types, a ...
MASACAD: A multi-agent approach to information customization for the purpose of academic advising of students
(
Elsevier B.V.
, 2006 , Article)
The growth and advancement in the Internet and the World Wide Web has led to an explosion in the amount of available information. This staggering amount of information has made it extremely difficult for users to locate ...
An Intelligent Resource Reservation for Crowdsourced Live Video Streaming Applications in Geo-Distributed Cloud Environment
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
Crowdsourced live video streaming (livecast) services such as Facebook Live, YouNow, Douyu, and Twitch are gaining more momentum recently. Allocating the limited resources in a cost-effective manner while maximizing the ...
Energy-Aware Distributed Edge ML for mHealth Applications with Strict Latency Requirements
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
Edge machine learning (Edge ML) is expected to serve as a key enabler for real-time mobile health (mHealth) applications. However, its reliability is governed by the limited energy and computing resources of user equipment ...