ICT Express
Papers 363
1 page of 37 pages (363 results)
#1Haythem Bany Salameh (YU: Yarmouk University)H-Index: 21
#2Ghaleb A. El Refae (Al Ain University of Science and Technology)H-Index: 3
Abstract null null Cognitive radio (CR) is a key technology that can enable opportunistic spectrum access, which enables secondary users (SUs) to dynamically exploit the under-utilized channels in the licensed spectrum, owned by primary radio networks (PRNs), referred to as dominant firms. Such sharing is subject to interference, SU QoS and cost constraints, in which SUs should not introduce harmful interference to PR users, achieve QoS rate demand and pay a price for using the licensed PR spect...
#1Rahul JohariH-Index: 11
#2Vivek KumarH-Index: 16
Last. Deo Prakash Vidyarthi (JNU: Jawaharlal Nehru University)H-Index: 19
view all 0 authors...
Abstract null null Today, information security world is witnessing frequent attacks on electronic records by the naive and professional hackers and crackers. Security of Patient’s Electronic Medical Record (EMR) in Hospital Management System is of paramount importance and so warrants immediate attention. In this research work, BlockChain containers running on multiple ports are proposed to be used for holding patient’s medical records. To perform this task effectively, a BlockChain framework nam...
#1Asif Ali Laghari (Sindh Madressatul Islam University)H-Index: 2
#1Asif Ali Laghari (Sindh Madressatul Islam University)H-Index: 12
view all 2 authors...
Abstract The majority of social network (SN) users are using calling service in SN to build communication across the countries, so the live communication between users requires too much network resource to decrease roughness in audio and video calls. So to improve the quality of service SN provider needs user experience so to assess the quality of experience (QoE) of calling service in SN we selected three popular SNs Facebook, hangout, and Wechat. We used a questionnaire to collect QoE of calli...
#1D Aishwarya (SRM University)
#2R. I. Minu (SRM University)H-Index: 9
Abstract Closed Circuit Television (CCTV) based Surveillance has become the fundamental part of the security Systems. In most cases, surveillance feeds are only used as evidence. The emergence of Edge Computing gives hope for enabling real time surveillance systems that focuses on prevention of crimes. The Proposed architecture consists of a Convolutional Neural Network (CNN) enabled in an edge device, with reduced computational complexity, which classifies various actions like Pulling, pushing ...
#1H Sabireen (VIT University)
#2V Neelenarayanan (VIT University)
Abstract With the increasing advancement in the applications of the Internet of Things (IoT), the integrated Cloud Computing (CC) faces numerous threats such as performance, security, latency, and network breakdown. With the discovery of Fog Computing these issues are addressed by taking CC nearer to the Internet of Things (IoT). The key functionality of the fog is to provide the data generated by the IoT devices near the edge. Processing of the data and data storage is done locally at the fog n...
#1Barbara AttanasioH-Index: 1
#2Aurelio La CorteH-Index: 11
Last. Marialisa ScatáH-Index: 7
view all 3 authors...
#1Pushparaj Nimbalkar (COEP: College of Engineering, Pune)
#2Deepak Kshirsagar (COEP: College of Engineering, Pune)H-Index: 6
Abstract Internet of Things (IoT) is suffered from different types of attacks due to vulnerability present in devices. Due to many IoT network traffic features, the machine learning models take time to detect attacks. This paper proposes a feature selection for intrusion detection systems (IDSs) using Information Gain (IG) and Gain Ratio (GR) with the ranked top 50% features for the detection of DoS and DDoS attacks. The proposed system obtains feature subsets using insertion and union operation...
#1Fitri Utaminingrum (UB: University of Brawijaya)H-Index: 11
#2Syam Julio A. Sarosa (UB: University of Brawijaya)H-Index: 1
Last. Randy Cahya Wihandika (UB: University of Brawijaya)H-Index: 5
view all 0 authors...
Abstract null null Smart wheelchairs (SW) technology is one of the solutions to help disabled people who do not have a hand or people to help them. Apart from able to move on its own, a smart wheelchair needs to be safe to use. One of the ways to increase SW safety is the ability to detect obstacles. In this study, we tried to create obstacle detection that can classify the stairs descent and floor based on image processing. To achieve our purpose, Contrast Limited Adaptive Histogram Equalizatio...
#1Anupriya (Deenbandhu Chhotu Ram University of Science and Technology)
#2Anita Singhrova (Deenbandhu Chhotu Ram University of Science and Technology)H-Index: 8
Abstract In today’s scenario the number of mobile devices are increasing leaps and bounds and hence the networks are highly congested. To use the existing networks efficiently, the insight into the amount of traffic beforehand, would be highly beneficial. Mobile traffic forecasting would enable Software Defined Mobile Network(SDMN) to use network resources and bandwidth effectively. Therefore, this paper aims to forecast mobile traffic for SDMN using nature–inspired optimization techniques. The ...
#1Cosmas Ifeanyi Nwakanma (Kumoh National Institute of Technology)H-Index: 4
#2Jae-Woo Kim (Kumoh National Institute of Technology)H-Index: 3
Last. Dong-Seong Kim (Kumoh National Institute of Technology)H-Index: 16
view all 4 authors...
Abstract This paper presents a test bed demonstration of NeuroEdge computing for face recognition using a novel neuromorphic chip- NM500. First, a general description and important specifications of the NM500 are presented. Second, a face recognition test-bed case study is used to demonstrate the efficacy and efficiency of the chip. Neuromorphic technology offers scalability and consistent recognition time, which is required by real-time networked systems, and presents a considerable advantage f...
Top fields of study
Communication channel
Electronic engineering
Computer network
Computer science