Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Adaptive OFDM (1)
- Chop (1)
- Classification (1)
- Clip (1)
- Cloud Computing (1)
-
- Computational Modelling (1)
- Computer chassis (1)
- Data-centers (1)
- Discrete Fourier transforms (1)
- Encrypted digital watermarks (1)
- Image data encryption (1)
- Information hiding (1)
- Linux Kernel (1)
- Load modelling (1)
- Machine learning (1)
- Measurement (1)
- OpenFlow (1)
- Prediction Methods (1)
- Resource Allocation Algorithms (1)
- Servers (1)
- Signal Processing (1)
- Software Defined Networks (1)
- Source Separation (1)
- Speech Quality Model (1)
- Steganography (1)
- Stochastic Diffusion (1)
- Traffic Classification (1)
- UWB (1)
- Ultrawideband (1)
- Video-on-Demand (1)
Articles 1 - 5 of 5
Full-Text Articles in Computer Engineering
Ml-Based Online Traffic Classification For Sdns, Mohammed Nsaif, Gergely Kovasznai, Mohammed Abboosh, Ali Malik, Ruairí De Fréin
Ml-Based Online Traffic Classification For Sdns, Mohammed Nsaif, Gergely Kovasznai, Mohammed Abboosh, Ali Malik, Ruairí De Fréin
Articles
Traffic classification is a crucial aspect for Software-Defined Networking functionalities. This paper is a part of an on-going project aiming at optimizing power consumption in the environment of software-defined datacenter networks. We have developed a novel routing strategy that can blindly balance between the power consumption and the quality of service for the incoming traffic flows. In this paper, we demonstrate how to classify the network traffic flows so that the quality of service of each flow-class can be guaranteed efficiently. This is achieved by creating a dataset that encompasses different types of network traffic such as video, VoIP, game …
Source Separation Approach To Video Quality Prediction In Computer Networks, Ruairí De Fréin
Source Separation Approach To Video Quality Prediction In Computer Networks, Ruairí De Fréin
Articles
Time-varying loads introduce errors in the estimated model parameters of service-level predictors in Computer Networks. A load-adjusted modification of a traditional unadjusted service-level predictor is contributed, based on Source Separation (SS). It mitigates these errors and improves service-quality predictions for Video-on-Demand (VoD) by :6 to 2dB.
Monitoring Voip Speech Quality For Chopped And Clipped Speech, Andrew Hines, Jan Skoglund, Anil C. Kokaram, Naomi Harte
Monitoring Voip Speech Quality For Chopped And Clipped Speech, Andrew Hines, Jan Skoglund, Anil C. Kokaram, Naomi Harte
Articles
No abstract provided.
Adaptive Ofdm For Wireless Interconnect In Confined Enclosures, Vit Sipal, Javier Gelabert, Christopher J. Stevens, Ben Allen, David Edwards
Adaptive Ofdm For Wireless Interconnect In Confined Enclosures, Vit Sipal, Javier Gelabert, Christopher J. Stevens, Ben Allen, David Edwards
Articles
This letter considers and recommends OFDM with adaptive subcarrier modulation as a suitable candidate for wireless UWB communication in computer chassis. A rigorous measurement campaign studies the guaranteed spectral efficiency. It concludes that enhancement of the existing WiMedia OFDM systems with a bandwidth of 528 MHz in order to support adaptive OFDM would enable data-rates above 1 Gbps over short ranges, i.e. the spectral efficiency would be doubled. Moreover, the guaranteed spectral efficiency is shown to increase with bandwidth, i.e. the guaranteed data-rate increases better than linearly with bandwidth.
Application Of Stochastic Diffusion For Hiding High Fidelity Encrypted Images, Jonathan Blackledge, Abdulrahman Al-Rawi
Application Of Stochastic Diffusion For Hiding High Fidelity Encrypted Images, Jonathan Blackledge, Abdulrahman Al-Rawi
Articles
Cryptography coupled with information hiding has received increased attention in recent years and has become a major research theme because of the importance of protecting encrypted information in any Electronic Data Interchange system in a way that is both discrete and covert. One of the essential limitations in any cryptography system is that the encrypted data provides an indication on its importance which arouses suspicion and makes it vulnerable to attack. Information hiding of Steganography provides a potential solution to this issue by making the data imperceptible, the security of the hidden information being a threat only if its existence …