A software-defined architecture for control of IoT cyberphysical systems
A Darabseh, NM Freris - Cluster Computing, 2019 - Springer
Based on software-defined principles, we propose a holistic architecture for cyberphysical
systems (CPS) and internet of things (IoT) applications, and highlight the merits pertaining to …
systems (CPS) and internet of things (IoT) applications, and highlight the merits pertaining to …
Remote detection of humans and animals
D Tahmoush, J Silvious - 2009 IEEE Applied Imagery Pattern …, 2009 - ieeexplore.ieee.org
Detecting humans and distinguishing them from natural fauna is an important issue in
border security applications. In particular, it is important to detect and classify people who …
border security applications. In particular, it is important to detect and classify people who …
In the shadows we trust: A secure aggregation tolerant watermark for data streams
AS Panah, R van Schyndel, T Sellis… - 2015 IEEE 16th …, 2015 - ieeexplore.ieee.org
In many applications such as sensor networks, e-healthcare and environmental monitoring,
data is continuously streamed and combined from multiple resources in order to make …
data is continuously streamed and combined from multiple resources in order to make …
A software defined architecture for cyberphysical systems
NM Freris - … Conference on Software Defined Systems (SDS), 2017 - ieeexplore.ieee.org
The explosive proliferation of smart devices and cloud computing has ushered the era of
Cyberphysical Systems (CPS), a congruence of physical dynamical systems with the …
Cyberphysical Systems (CPS), a congruence of physical dynamical systems with the …
On data publishing with clustering preservation
The emergence of cloud-based storage services is opening up new avenues in data
exchange and data dissemination. This has amplified the interest in right-protection …
exchange and data dissemination. This has amplified the interest in right-protection …
[PDF][PDF] ENHANCED ALGORITHMS FOR MINING OPTIMIZED POSITIVE AND NEGATIVE ASSOCIATION RULE FROM CANCER DATASET.
I Jingle, J Celin - ICTACT Journal on soft computing, 2018 - core.ac.uk
The most important research aspect nowadays is the data. Association rule mining is vital
mining used in data which mines many eventual informations and associations from …
mining used in data which mines many eventual informations and associations from …
Privacy-preserving watermarking transformation technique in a distributed environment
AA Allami, MK Mohania, W Jiang - 2018 IEEE Conference on …, 2018 - ieeexplore.ieee.org
Watermarking relational data is an important topic in the field of copyright protection, given
the increasing prevalence of piracy and illegal duplication of databases. While there exist …
the increasing prevalence of piracy and illegal duplication of databases. While there exist …
SDCache: Software defined data caching control for cloud services
The complexity of traditional control approaches typically features slow response times to
system and component changes and runs the risk of accessing outdated information …
system and component changes and runs the risk of accessing outdated information …
[PDF][PDF] A Survey on Protecting Information in Datasets
CSWJR Yemul - academia.edu
Privacy preserving in data mining plays a vital role in which one can more likely enters in a
system with privacy assurance. Many times data in a datasets are correlated with each other …
system with privacy assurance. Many times data in a datasets are correlated with each other …
[PDF][PDF] Effective Watermarking Techniques on Structured Datasets
M Joswin, D Bhardwaj - academia.edu
The data that floats on the web has a wide exposure to authorized and unauthorized users
who may copy and reuse or manipulate the data. This can lead to serious breach in the …
who may copy and reuse or manipulate the data. This can lead to serious breach in the …