Research explorer tool

Date


People

Output Type

Download Available

Dewey Decimal

675 results

An Optimized Speculative Execution Strategy Based on Local Data Prediction in a Heterogeneous Hadoop Environment

Conference Proceeding
Liu, X., & Liu, Q. (2017)
An Optimized Speculative Execution Strategy Based on Local Data Prediction in a Heterogeneous Hadoop Environment. In Proceedings of 2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC), (128-131). https://doi.org/10.1109/cse-euc.2017.208
Hadoop is a famous distributed computing framework that is applied to process large-scale data. "Straggling tasks" have a serious impact on Hadoop performance due to imbalance...

Clustering Moving Data with a Modified Immune Algorithm

Conference Proceeding
Hart, E., & Ross, P. (2001)
Clustering Moving Data with a Modified Immune Algorithm. In E. Boers (Ed.), Applications of Evolutionary Computing, 394-403. https://doi.org/10.1007/3-540-45365-2_41
In this paper we present a prototype of a new model for performing clustering in large, non-static databases. Although many machine learning algorithms for data clustering hav...

Mobile Multicast Route Optimisation

Conference Proceeding
Romdhani, I., Munoz, J., Bettahar, H., & Bouabdallah, A. (2006)
Mobile Multicast Route Optimisation. In IEEE International Conference on Communications, 2006. ICC '06, 1977-1983. doi:10.1109/icc.2006.255060
The multiparty nature of multicast applications presents new challenges for Mobile IP users. Unfortunately, when a multicast receiver is mobile, it will experience additional ...

Comparative analysis of chaotic and non-chaotic image encryption schemes

Conference Proceeding
Younas, M. B., & Ahmad, J. (2014)
Comparative analysis of chaotic and non-chaotic image encryption schemes. In 2014 International Conference on Emerging Technologies (ICET)https://doi.org/10.1109/icet.2014.7021021
In modern era, multimedia technologies have been developed significantly. Multimedia data such as audio, video and image transfers over the internet is open and insecure. Secu...

DNA Sequence Based Medical Image Encryption Scheme

Conference Proceeding
Khan, J. S., Ahmad, J., Abbasi, S. F., Ali, A., & Kayhan, S. K. (2018)
DNA Sequence Based Medical Image Encryption Scheme. In 2018 10th Computer Science and Electronic Engineering (CEEC)https://doi.org/10.1109/ceec.2018.8674221
Medical consultants and doctors store and update patients confidential information on Internet cloud computing platforms. These days, securing medical images from eavesdropper...

Evaluation of a genetic representation for outline shapes

Conference Proceeding
Lapok, P., Lawson, A., & Paechter, B. (2017)
Evaluation of a genetic representation for outline shapes. In GECCO '17 Proceedings of the Genetic and Evolutionary Computation Conference Companion, (1419-1422). https://doi.org/10.1145/3067695.3082501
This work in progress focuses on the evaluation of a genetic representation for outline shapes for planar mechanical levers which addresses the first stage of the complex real...

Who would you trust to identify you in accessing your health record?

Conference Proceeding
Buchanan, W. J., Anderson, C., Smales, A., Varga, J., Burns, N., Uthmani, O., …Lawson, A. (2013)
Who would you trust to identify you in accessing your health record?
Within health and social care there is a strong need to provide access to highly sensitive information, and one which requires high levels of identity assurance. This paper ou...

AGADE how individual guidance leads to group behaviour and how this can be simulated

Conference Proceeding
Farrenkopf, T., Guckert, M., Hoffmann, B., & Urquhart, N. B. (2014)
AGADE how individual guidance leads to group behaviour and how this can be simulated. In J. Muller, M. Weyrich, & A. Bazzan (Eds.), Multiagent System Technologies. , (234-250). https://doi.org/10.1007/978-3-319-11584-9_16
In this paper we will demonstrate how BDI agents can be used to model individuals as participants in social structures where they act as potential buyers in a simple mobile ph...

Real-Time Data Analytics in Support of Network Resource Management Protocols

Conference Proceeding
Moradpoor‫, N., Parr, G., Mcclean, S., Scotney, B., & Owusu, G. (2009)
Real-Time Data Analytics in Support of Network Resource Management Protocols. In Proceedings of 10th PGNET
Communications Networks Resource Management (RM) functions such as dynamic and static resource usage monitoring, real time resource reservation as well as advance resource res...

Secure speech communication algorithm via DCT and TD-ERCS chaotic map

Conference Proceeding
Habib, Z., Khan, J. S., Ahmad, J., Khan, M. A., & Khan, F. A. (2017)
Secure speech communication algorithm via DCT and TD-ERCS chaotic map. In 2017 4th International Conference on Electrical and Electronic Engineering (ICEEE)https://doi.org/10.1109/iceee2.2017.7935827
Secure communication has always been a demanding area in civil, commercial and particularly in military set up. Robust and time-tested efficient algorithms are needed to have ...