Search Results - "Narman, Husnu S"
-
1
A Review of Sensing and Communication, Human Factors, and Controller Aspects for Information-Aware Connected and Automated Vehicles
Published in IEEE transactions on intelligent transportation systems (01-01-2020)“…Information-aware connected and automated vehicles (CAVs) have drawn great attention in recent years due to their potentially significant positive impacts on…”
Get full text
Journal Article -
2
Use of Machine Learning in Interactive Cybersecurity and Network Education
Published in Sensors (Basel, Switzerland) (09-03-2023)“…Cybersecurity is a complex subject for students to pursue. Hands-on online learning through labs and simulations can help students become more familiar with…”
Get full text
Journal Article -
3
Popularity-Aware Multi-Failure Resilient and Cost-Effective Replication for High Data Durability in Cloud Storage
Published in IEEE transactions on parallel and distributed systems (01-10-2019)“…Large-scale data stores are an increasingly important component of cloud datacenter services. However, cloud storage system usually experiences data loss,…”
Get full text
Journal Article -
4
Random Partition Based Adaptive Distributed Kernelized SVM for Big Data
Published in IEEE access (2022)“…In this paper, we present a distributed classification technique for big data by efficiently using distributed storage architecture and data processing units…”
Get full text
Journal Article -
5
A Low-Cost Multi-Failure Resilient Replication Scheme for High-Data Availability in Cloud Storage
Published in IEEE/ACM transactions on networking (01-08-2021)“…Data availability is one of the most important performance factors in cloud storage systems. To enhance data availability, replication is a common approach to…”
Get full text
Journal Article -
6
DA-DRLS: Drift adaptive deep reinforcement learning based scheduling for IoT resource management
Published in Journal of network and computer applications (15-07-2019)“…In order to fulfill the tremendous resource demand by diverse IoT applications, the large-scale resource-constrained IoT ecosystem requires a robust resource…”
Get full text
Journal Article -
7
An enhanced ride sharing model based on human characteristics, machine learning recommender system, and user threshold time
Published in Journal of ambient intelligence and humanized computing (2021)“…The ubiquitous availability of the Internet and advanced computing systems has resulted in the rapid development of smart cities. From connected devices to…”
Get full text
Journal Article -
8
Scheduling internet of things applications in cloud computing
Published in Annales des télécommunications (01-02-2017)“…Internet of Things (IoT) is one of the greatest technology revolutions in the history. Due to IoT potential, daily objects will be consciously worked in…”
Get full text
Journal Article -
9
A Feasibility Study of Real-Time Image Processing Techniques for Small Flying Object Detection in Drones
Published in 2024 IEEE International Conference on Consumer Electronics (ICCE) (06-01-2024)“…Drone usage is increasing significantly in our daily life, from military to delivery purposes. Although drones are also used to detect objects by using…”
Get full text
Conference Proceeding -
10
Evaluating fine tuned deep learning models for real-time earthquake damage assessment with drone-based images
Published in AI in civil engineering (01-12-2024)“…Earthquakes pose a significant threat to life and property worldwide. Rapid and accurate assessment of earthquake damage is crucial for effective disaster…”
Get full text
Journal Article -
11
Joint and selective periodic component carrier assignment for LTE-A
Published in Computer networks (Amsterdam, Netherlands : 1999) (09-12-2016)“…The bandwidth demand for mobile Internet access is significantly increased with the number of mobile users. Carrier aggregation has been proposed to answer…”
Get full text
Journal Article -
12
Domain Flux-based DGA Botnet Detection Using Feedforward Neural Network
Published in MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM) (01-11-2019)“…Botnets have been a major area of concern in the field of cybersecurity. There have been a lot of research works for detection of botnets. However, everyday…”
Get full text
Conference Proceeding -
13
An Intelligent System for Preventing SSL Stripping-based Session Hijacking Attacks
Published in MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM) (01-11-2019)“…An intelligent system to prevent SSL Stripping based session hijacking attacks is proposed in this paper. The system is designed to strike a delicate balance…”
Get full text
Conference Proceeding -
14
Preventing Session Hijacking using Encrypted One-Time-Cookies
Published in 2020 Wireless Telecommunications Symposium (WTS) (01-04-2020)“…Hypertext Transfer Protocol (HTTP) cookies are pieces of information shared between HTTP server and client to remember stateful information for the stateless…”
Get full text
Conference Proceeding -
15
The Cybersecurity Packet Control Simulator: CSPCS
Published in 2022 IEEE Global Humanitarian Technology Conference (GHTC) (08-09-2022)“…Games have been used as a learning tool for centuries. Through game-based learning, students actively learn and practice the right way to do things. A project…”
Get full text
Conference Proceeding -
16
A Hybrid Encryption Technique based on DNA Cryptography and Steganography
Published in 2022 IEEE 13th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON) (12-10-2022)“…The importance of data and its transmission rate are increasing as the world is moving towards online services every day. Thus, providing data security is…”
Get full text
Conference Proceeding -
17
Designing Crowdsourcing Software to Inform Municipalities About Infrastructure Condition
Published in 2021 IEEE 18th International Conference on Smart Communities: Improving Quality of Life Using ICT, IoT and AI (HONET) (11-10-2021)“…Determining how to utilize and allocate budgets for public infrastructure is an essential issue that local governments face. For a beneficial budgeting plan to…”
Get full text
Conference Proceeding -
18
A Machine Learning-Based Automatic Feedback System to Teach Cybersecurity Principles to K-12 and College Students
Published in 2022 IEEE Global Humanitarian Technology Conference (GHTC) (08-09-2022)“…Feedback is an essential part of education to help students understand and learn from their mistakes. However, while students learn new content, there is…”
Get full text
Conference Proceeding -
19
An IoT-Based Complete Smart Drainage System for a Smart City
Published in 2021 IEEE 12th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON) (27-10-2021)“…With the technological advancements, every application from our day to day life is becoming Internet-oriented, leading to the concept of Internet of Things…”
Get full text
Conference Proceeding -
20
Impacts of Positive and Negative Comments of Social Media Users to Cryptocurrency
Published in 2020 International Conference on Computing, Networking and Communications (ICNC) (01-02-2020)“…Blockchain implementation brought several benefits to many areas. One of the usages of blockchain is in digital currencies. Digital currency (cryptocurrency)…”
Get full text
Conference Proceeding