Skip to main content

Showing 1–36 of 36 results for author: Ali, I

  1. arXiv:2406.15359  [pdf, other

    cs.CL cs.CV

    Constructing Multilingual Visual-Text Datasets Revealing Visual Multilingual Ability of Vision Language Models

    Authors: Jesse Atuhurra, Iqra Ali, Tatsuya Hiraoka, Hidetaka Kamigaito, Tomoya Iwakura, Taro Watanabe

    Abstract: Large language models (LLMs) have increased interest in vision language models (VLMs), which process image-text pairs as input. Studies investigating the visual understanding ability of VLMs have been proposed, but such studies are still preliminary because existing datasets do not permit a comprehensive evaluation of the fine-grained visual linguistic abilities of VLMs across multiple languages.… ▽ More

    Submitted 29 March, 2024; originally announced June 2024.

  2. arXiv:2309.14557  [pdf, other

    cs.LG cs.ET

    Disruption Detection for a Cognitive Digital Supply Chain Twin Using Hybrid Deep Learning

    Authors: Mahmoud Ashraf, Amr Eltawil, Islam Ali

    Abstract: Purpose: Recent disruptive events, such as COVID-19 and Russia-Ukraine conflict, had a significant impact of global supply chains. Digital supply chain twins have been proposed in order to provide decision makers with an effective and efficient tool to mitigate disruption impact. Methods: This paper introduces a hybrid deep learning approach for disruption detection within a cognitive digital supp… ▽ More

    Submitted 25 September, 2023; originally announced September 2023.

  3. arXiv:2306.16692  [pdf, other

    cs.NI

    Performance Evaluation of Transport Protocols and Roadmap to a High-Performance Transport Design for Immersive Applications

    Authors: Inayat Ali, Seungwoo Hong, Pyung-koo Park, Tae Yeon Kim

    Abstract: Immersive technologies such as virtual reality (VR), augmented reality (AR), and holograms will change users' digital experience. These immersive technologies have a multitude of applications, including telesurgeries, teleconferencing, Internet shopping, computer games, etc. Holographic-type communication (HTC) is a type of augmented reality media that provides an immersive experience to Internet… ▽ More

    Submitted 30 June, 2023; v1 submitted 29 June, 2023; originally announced June 2023.

    Comments: Accepted in The 14th International Conference on Ubiquitous and Future Networks (ICUFN 2023), Paris France, July 4-7 2023

  4. arXiv:2306.06764  [pdf, other

    cs.NI cs.CR

    IoT-AD: A Framework To Detect Anomalies Among Interconnected IoT Devices

    Authors: Hasniuj Zahan, Md Washik Al Azad, Ihsan Ali, Spyridon Mastorakis

    Abstract: In an Internet of Things (IoT) environment (e.g., smart home), several IoT devices may be available that are interconnected with each other. In such interconnected environments, a faulty or compromised IoT device could impact the operation of other IoT devices. In other words, anomalous behavior exhibited by an IoT device could propagate to other devices in an IoT environment. In this paper, we ar… ▽ More

    Submitted 11 June, 2023; originally announced June 2023.

    Comments: Accepted for publication by the IEEE Internet of Things Journal. The copyright is with IEEE

  5. arXiv:2303.00616  [pdf, other

    cs.RO cs.CV

    Prediction of SLAM ATE Using an Ensemble Learning Regression Model and 1-D Global Pooling of Data Characterization

    Authors: Islam Ali, Bingqing, Wan, Hong Zhang

    Abstract: Robustness and resilience of simultaneous localization and mapping (SLAM) are critical requirements for modern autonomous robotic systems. One of the essential steps to achieve robustness and resilience is the ability of SLAM to have an integrity measure for its localization estimates, and thus, have internal fault tolerance mechanisms to deal with performance degradation. In this work, we introdu… ▽ More

    Submitted 1 March, 2023; originally announced March 2023.

  6. arXiv:2212.13691  [pdf

    cs.CV cs.LG

    Efficient Semantic Segmentation on Edge Devices

    Authors: Farshad Safavi, Irfan Ali, Venkatesh Dasari, Guanqun Song, Ting Zhu, Maryam Rahnemoonfar

    Abstract: Semantic segmentation works on the computer vision algorithm for assigning each pixel of an image into a class. The task of semantic segmentation should be performed with both accuracy and efficiency. Most of the existing deep FCNs yield to heavy computations and these networks are very power hungry, unsuitable for real-time applications on portable devices. This project analyzes current semantic… ▽ More

    Submitted 15 January, 2023; v1 submitted 27 December, 2022; originally announced December 2022.

  7. arXiv:2212.08241  [pdf

    cs.CR

    H-LPS: a hybrid approach for user's location privacy in location-based services

    Authors: Sonia Sabir, Inayat Ali, Eraj Khan

    Abstract: Applications providing location-based services (LBS) have gained much attention and importance with the notion of the internet of things (IoT). Users are utilizing LBS by providing their location information to third-party service providers. However, location data is very sensitive that can reveal user's private life to adversaries. The passive and pervasive data collection in IoT upsurges serious… ▽ More

    Submitted 15 December, 2022; originally announced December 2022.

  8. arXiv:2209.06316  [pdf, other

    cs.RO cs.CV

    Optimizing SLAM Evaluation Footprint Through Dynamic Range Coverage Analysis of Datasets

    Authors: Islam Ali, Hong Zhang

    Abstract: Simultaneous Localization and Mapping (SLAM) is considered an ever-evolving problem due to its usage in many applications. Evaluation of SLAM is done typically using publicly available datasets which are increasing in number and the level of difficulty. Each dataset provides a certain level of dynamic range coverage that is a key aspect of measuring the robustness and resilience of SLAM. In this p… ▽ More

    Submitted 1 March, 2023; v1 submitted 13 September, 2022; originally announced September 2022.

  9. Evaluating Plant Disease Detection Mobile Applications: Quality and Limitations

    Authors: Ayesha Siddiqua, Muhammad Ashad Kabir, Tanzina Ferdous, Israt Bintea Ali, Leslie A. Weston

    Abstract: In this technologically advanced era, with the proliferation of artificial intelligence, many mobile apps are available for plant disease detection, diagnosis, and treatment, each with a variety of features. These apps need to be categorized and reviewed following a proper framework that ensures their quality. This study aims to present an approach to evaluating plant disease detection mobile apps… ▽ More

    Submitted 4 August, 2022; originally announced August 2022.

    Journal ref: Agronomy, 12(8), 2022

  10. arXiv:2207.10811  [pdf, other

    cs.CR cs.SD eess.AS

    Smart speaker design and implementation with biometric authentication and advanced voice interaction capability

    Authors: Bharath Sudharsan, Peter Corcoran, Muhammad Intizar Ali

    Abstract: Advancements in semiconductor technology have reduced dimensions and cost while improving the performance and capacity of chipsets. In addition, advancement in the AI frameworks and libraries brings possibilities to accommodate more AI at the resource-constrained edge of consumer IoT devices. Sensors are nowadays an integral part of our environment which provide continuous data streams to build in… ▽ More

    Submitted 17 July, 2022; originally announced July 2022.

  11. arXiv:2204.10183  [pdf, other

    cs.LG cs.DC

    Multi-Component Optimization and Efficient Deployment of Neural-Networks on Resource-Constrained IoT Hardware

    Authors: Bharath Sudharsan, Dineshkumar Sundaram, Pankesh Patel, John G. Breslin, Muhammad Intizar Ali, Schahram Dustdar, Albert Zomaya, Rajiv Ranjan

    Abstract: The majority of IoT devices like smartwatches, smart plugs, HVAC controllers, etc., are powered by hardware with a constrained specification (low memory, clock speed and processor) which is insufficient to accommodate and execute large, high-quality models. On such resource-constrained devices, manufacturers still manage to provide attractive functionalities (to boost sales) by following the tradi… ▽ More

    Submitted 20 April, 2022; originally announced April 2022.

  12. Mapping Temporary Slums from Satellite Imagery using a Semi-Supervised Approach

    Authors: M. Fasi ur Rehman, Izza Ali, Waqas Sultani, Mohsen Ali

    Abstract: One billion people worldwide are estimated to be living in slums, and documenting and analyzing these regions is a challenging task. As compared to regular slums; the small, scattered and temporary nature of temporary slums makes data collection and labeling tedious and time-consuming. To tackle this challenging problem of temporary slums detection, we present a semi-supervised deep learning segme… ▽ More

    Submitted 9 April, 2022; originally announced April 2022.

  13. arXiv:2204.03331  [pdf, other

    cs.CV

    Sparse Optical Flow-Based Line Feature Tracking

    Authors: Qiang Fu, Hongshan Yu, Islam Ali, Hong Zhang

    Abstract: In this paper we propose a novel sparse optical flow (SOF)-based line feature tracking method for the camera pose estimation problem. This method is inspired by the point-based SOF algorithm and developed based on an observation that two adjacent images in time-varying image sequences satisfy brightness invariant. Based on this observation, we re-define the goal of line feature tracking: track two… ▽ More

    Submitted 14 April, 2022; v1 submitted 7 April, 2022; originally announced April 2022.

  14. arXiv:2204.01524  [pdf, other

    cs.CV eess.IV

    Bi-directional Loop Closure for Visual SLAM

    Authors: Ihtisham Ali, Sari Peltonen, Atanas Gotchev

    Abstract: A key functional block of visual navigation system for intelligent autonomous vehicles is Loop Closure detection and subsequent relocalisation. State-of-the-Art methods still approach the problem as uni-directional along the direction of the previous motion. As a result, most of the methods fail in the absence of a significantly similar overlap of perspectives. In this study, we propose an approac… ▽ More

    Submitted 1 April, 2022; originally announced April 2022.

    Comments: 11 pages, 11 figures

  15. arXiv:2202.12689  [pdf, other

    eess.SP cs.LG

    Domain Adaptation: the Key Enabler of Neural Network Equalizers in Coherent Optical Systems

    Authors: Pedro J. Freire, Bernhard Spinnler, Daniel Abode, Jaroslaw E. Prilepsky, Abdallah A. I. Ali, Nelson Costa, Wolfgang Schairer, Antonio Napoli, Andrew D. Ellis, Sergei K. Turitsyn

    Abstract: We introduce the domain adaptation and randomization approach for calibrating neural network-based equalizers for real transmissions, using synthetic data. The approach renders up to 99\% training process reduction, which we demonstrate in three experimental setups.

    Submitted 25 February, 2022; originally announced February 2022.

    Comments: Paper Accepted at OFC 2022

  16. arXiv:2202.11312  [pdf, other

    cs.RO cs.CV

    Are We Ready for Robust and Resilient SLAM? A Framework For Quantitative Characterization of SLAM Datasets

    Authors: Islam Ali, Hong Zhang

    Abstract: Reliability of SLAM systems is considered one of the critical requirements in modern autonomous systems. This directed the efforts to developing many state-of-the-art systems, creating challenging datasets, and introducing rigorous metrics to measure SLAM performance. However, the link between datasets and performance in the robustness/resilience context has rarely been explored. In order to fill… ▽ More

    Submitted 15 July, 2022; v1 submitted 23 February, 2022; originally announced February 2022.

    Comments: 7 Pages, Accepted to IROS 2022, updating to the latest submitted version

    Journal ref: IEEE/RSJ International Conference on Intelligent Robots and Systems, IROS 2022, Kyoto, Japan

  17. arXiv:2104.10519  [pdf

    cs.LG cs.LO

    Bearings Fault Detection Using Hidden Markov Models and Principal Component Analysis Enhanced Features

    Authors: Akthem Rehab, Islam Ali, Walid Gomaa, M. Nashat Fors

    Abstract: Asset health monitoring continues to be of increasing importance on productivity, reliability, and cost reduction. Early Fault detection is a keystone of health management as part of the emerging Prognostics and Health Management (PHM) philosophy. This paper proposes a Hidden Markov Model (HMM) to assess the machine health degradation. using Principal Component Analysis (PCA) to enhance features e… ▽ More

    Submitted 21 April, 2021; originally announced April 2021.

  18. A Practical Approach towards Causality Mining in Clinical Text using Active Transfer Learning

    Authors: Musarrat Hussain, Fahad Ahmed Satti, Jamil Hussain, Taqdir Ali, Syed Imran Ali, Hafiz Syed Muhammad Bilal, Gwang Hoon Park, Sungyoung Lee

    Abstract: Objective: Causality mining is an active research area, which requires the application of state-of-the-art natural language processing techniques. In the healthcare domain, medical experts create clinical text to overcome the limitation of well-defined and schema driven information systems. The objective of this research work is to create a framework, which can convert clinical text into causal kn… ▽ More

    Submitted 10 December, 2020; originally announced December 2020.

    Journal ref: Journal of Biomedical Informatics 123 (2021) 103932

  19. arXiv:2010.09687  [pdf, other

    cs.DC cs.AI cs.LG

    A Demonstration of Smart Doorbell Design Using Federated Deep Learning

    Authors: Vatsal Patel, Sarth Kanani, Tapan Pathak, Pankesh Patel, Muhammad Intizar Ali, John Breslin

    Abstract: Smart doorbells have been playing an important role in protecting our modern homes. Existing approaches of sending video streams to a centralized server (or Cloud) for video analytics have been facing many challenges such as latency, bandwidth cost and more importantly users' privacy concerns. To address these challenges, this paper showcases the ability of an intelligent smart doorbell based on F… ▽ More

    Submitted 19 October, 2020; originally announced October 2020.

    Comments: 6

  20. arXiv:2010.07680  [pdf, other

    cs.CY cs.CV cs.DC

    Demonstration of a Cloud-based Software Framework for Video Analytics Application using Low-Cost IoT Devices

    Authors: Bhavin Joshi, Tapan Pathak, Vatsal Patel, Sarth Kanani, Pankesh Patel, Muhammad Intizar Ali, John Breslin

    Abstract: The design of products and services such as a Smart doorbell, demonstrating video analytics software/algorithm functionality, is expected to address a new kind of requirements such as designing a scalable solution while considering the trade-off between cost and accuracy; a flexible architecture to deploy new AI-based models or update existing models, as user requirements evolve; as well as seamle… ▽ More

    Submitted 29 September, 2020; originally announced October 2020.

    Comments: arXiv admin note: substantial text overlap with arXiv:2009.09065

  21. arXiv:2009.13869  [pdf

    cs.SE

    An Study of The Role of Software Project Manger in the Outcome of the Project

    Authors: Israr Ali, Aarij Mahmood Hussaan, Syed Hasan Adil

    Abstract: This paper describes an in depth analysis of successful and unsuccessful software Projects and the Role of Software Project Mangers in that success. One of the main reason in software project success is manager. Software houses are investing too much in this regard but the average ratio of software project failure is on the high side. Project managers experience, technical knowledge, and skills ar… ▽ More

    Submitted 29 September, 2020; originally announced September 2020.

  22. arXiv:2009.13868  [pdf

    cs.CR

    Intrusion Detection Framework for SQL Injection

    Authors: Israr Ali, Syed Hasan Adil, Mansoor Ebrahim

    Abstract: In this era of internet, E-Business and e-commerce applications are using Databases as their integral part. These Databases irrespective of the technology used are vulnerable to SQL injection attacks. These Attacks are considered very dangerous as well as very easy to use for attackers and intruders. In this paper, we are proposing a new approach to detect intrusion from attackers by using SQL inj… ▽ More

    Submitted 29 September, 2020; originally announced September 2020.

    Comments: 7 pages, 5 Figures,ASIAN JOURNAL OF ENGINEERING, SCIENCES & TECHNOLOGY,VOL.6, ISSUE 2

  23. arXiv:2009.09065  [pdf, other

    cs.CY

    A Distributed Framework to Orchestrate Video Analytics Applications

    Authors: Tapan Pathak, Vatsal Patel, Sarth Kanani, Shailesh Arya, Pankesh Patel, Muhammad Intizar Ali, John Breslin

    Abstract: The concept of the Internet of Things (IoT) is a reality now. This paradigm shift has caught everyones attention in a large class of applications, including IoT-based video analytics using smart doorbells. Due to its growing application segments, various efforts exist in scientific literature and many video-based doorbell solutions are commercially available in the market. However, contemporary of… ▽ More

    Submitted 17 September, 2020; originally announced September 2020.

    Comments: 9

  24. arXiv:2009.07462  [pdf, other

    cs.RO cs.CV

    PL-VINS: Real-Time Monocular Visual-Inertial SLAM with Point and Line Features

    Authors: Qiang Fu, Jialong Wang, Hongshan Yu, Islam Ali, Feng Guo, Yijia He, Hong Zhang

    Abstract: Leveraging line features to improve localization accuracy of point-based visual-inertial SLAM (VINS) is gaining interest as they provide additional constraints on scene structure. However, real-time performance when incorporating line features in VINS has not been addressed. This paper presents PL-VINS, a real-time optimization-based monocular VINS method with point and line features, developed ba… ▽ More

    Submitted 14 April, 2022; v1 submitted 16 September, 2020; originally announced September 2020.

    Comments: Visual-Inertial SLAM, LSD, Lines, SLAM, VINS-Mono

    ACM Class: I.4.9; I.3.8

  25. arXiv:2007.06537  [pdf, other

    eess.IV cs.CV cs.LG

    Blockchain-Federated-Learning and Deep Learning Models for COVID-19 detection using CT Imaging

    Authors: Rajesh Kumar, Abdullah Aman Khan, Sinmin Zhang, Jay Kumar, Ting Yang, Noorbakhash Amiri Golalirz, Zakria, Ikram Ali, Sidra Shafiq, WenYong Wang

    Abstract: With the increase of COVID-19 cases worldwide, an effective way is required to diagnose COVID-19 patients. The primary problem in diagnosing COVID-19 patients is the shortage and reliability of testing kits, due to the quick spread of the virus, medical practitioners are facing difficulty identifying the positive cases. The second real-world problem is to share the data among the hospitals globall… ▽ More

    Submitted 8 December, 2020; v1 submitted 10 July, 2020; originally announced July 2020.

    Comments: arXiv admin note: text overlap with arXiv:2003.10849 by other authors

  26. arXiv:2004.07948  [pdf, other

    eess.AS cs.LG cs.SD

    Sound of Guns: Digital Forensics of Gun Audio Samples meets Artificial Intelligence

    Authors: Simone Raponi, Isra Ali, Gabriele Oligeri

    Abstract: Classifying a weapon based on its muzzle blast is a challenging task that has significant applications in various security and military fields. Most of the existing works rely on ad-hoc deployment of spatially diverse microphone sensors to capture multiple replicas of the same gunshot, which enables accurate detection and identification of the acoustic source. However, carefully controlled setups… ▽ More

    Submitted 1 March, 2021; v1 submitted 15 April, 2020; originally announced April 2020.

  27. arXiv:1910.11960  [pdf, other

    eess.IV cs.CV

    Data Augmentation for Skin Lesion using Self-Attention based Progressive Generative Adversarial Network

    Authors: Ibrahim Saad Ali, Mamdouh Farouk Mohamed, Yousef Bassyouni Mahdy

    Abstract: Deep Neural Networks (DNNs) show a significant impact on medical imaging. One significant problem with adopting DNNs for skin cancer classification is that the class frequencies in the existing datasets are imbalanced. This problem hinders the training of robust and well-generalizing models. Data Augmentation addresses this by using existing data more effectively. However, standard data augmentati… ▽ More

    Submitted 25 October, 2019; originally announced October 2019.

  28. arXiv:1907.03532  [pdf

    q-bio.BM cs.LG

    Classification of Macromolecule Type Based on Sequences of Amino Acids Using Deep Learning

    Authors: Sarwar Khan, Faisal Ghaffar, Imad Ali, Qazi Mazhar

    Abstract: The classification of amino acids and their sequence analysis plays a vital role in life sciences and is a challenging task. This article uses and compares state-of-the-art deep learning models like convolution neural networks (CNN), long short-term memory (LSTM), and gated recurrent units (GRU) to solve macromolecule classification problems using amino acids. These models have efficient framework… ▽ More

    Submitted 23 July, 2022; v1 submitted 30 June, 2019; originally announced July 2019.

    Comments: under review

  29. Anchor-Less Producer Mobility Management in Named Data Networking for Real-Time Multimedia

    Authors: Inayat Ali, Huhnkuk Lim

    Abstract: Information-centric networking (ICN) is one of the promising solutions that cater to the challenges of IP-based networking. ICN shifts the IP-based access model to a data-centric model. Named Data Networking (NDN) is a flexible ICN architecture, which is based on content distribution considering data as the core entity rather than IP-based hosts. User-generated mobile contents for real-time multim… ▽ More

    Submitted 22 May, 2019; originally announced May 2019.

    Comments: Mobile Information Systems, 2019

  30. Foundations, Properties, and Security Applications of Puzzles: A Survey

    Authors: Isra Mohamed Ali, Maurantonio Caprolu, Roberto Di Pietro

    Abstract: Cryptographic algorithms have been used not only to create robust ciphertexts but also to generate cryptograms that, contrary to the classic goal of cryptography, are meant to be broken. These cryptograms, generally called puzzles, require the use of a certain amount of resources to be solved, hence introducing a cost that is often regarded as a time delay---though it could involve other metrics a… ▽ More

    Submitted 26 April, 2020; v1 submitted 23 April, 2019; originally announced April 2019.

    Comments: This article has been accepted for publication in ACM Computing Surveys

    Journal ref: ACM Computing Surveys, Volume 53, Issue 4, July 2021

  31. arXiv:1901.07309  [pdf

    cs.CR cs.DC

    Internet of Things Security, Device Authentication and Access Control: A Review

    Authors: Inayat Ali, Sonia Sabir, Zahid Ullah

    Abstract: The Internet of Things (IoT) is one of the emerging technologies that has grabbed the attention of researchers from academia and industry. The idea behind Internet of things is the interconnection of internet enabled things or devices to each other and to humans, to achieve some common goals. In near future IoT is expected to be seamlessly integrated into our environment and human will be wholly s… ▽ More

    Submitted 20 April, 2022; v1 submitted 8 January, 2019; originally announced January 2019.

    Journal ref: International Journal of Computer Science and Information Security (IJCSIS), Vol. 14, No. 8, August 2016

  32. arXiv:1812.04216  [pdf

    cs.CR

    Privacy-preserving data aggregation in resource-constrained sensor nodes in Internet of Things: A review

    Authors: Inayat Ali, Sonia Sabir, Eraj Khan

    Abstract: Privacy problems are lethal and getting more attention than any other issue with the notion of the Internet of Things (IoT). Since IoT has many application areas including smart home, smart grids, smart healthcare system, smart and intelligent transportation and many more. Most of these applications are fueled by the resource-constrained sensor network, such as Smart healthcare system is powered b… ▽ More

    Submitted 10 December, 2018; originally announced December 2018.

    Comments: 9 pages

    Journal ref: Future Computing and Informatics Journal (2017)

  33. arXiv:1804.00114  [pdf, other

    cs.CR

    A Survey of Techniques for Improving Security of GPUs

    Authors: Sparsh Mittal, S. B. Abhinaya, Manish Reddy, Irfan Ali

    Abstract: Graphics processing unit (GPU), although a powerful performance-booster, also has many security vulnerabilities. Due to these, the GPU can act as a safe-haven for stealthy malware and the weakest `link' in the security `chain'. In this paper, we present a survey of techniques for analyzing and improving GPU security. We classify the works on key attributes to highlight their similarities and diffe… ▽ More

    Submitted 30 March, 2018; originally announced April 2018.

  34. arXiv:1611.06939  [pdf

    cs.CV

    Predicting 1p19q Chromosomal Deletion of Low-Grade Gliomas from MR Images using Deep Learning

    Authors: Zeynettin Akkus, Issa Ali, Jiri Sedlar, Timothy L. Kline, Jay P. Agrawal, Ian F. Parney, Caterina Giannini, Bradley J. Erickson

    Abstract: Objective: Several studies have associated codeletion of chromosome arms 1p/19q in low-grade gliomas (LGG) with positive response to treatment and longer progression free survival. Therefore, predicting 1p/19q status is crucial for effective treatment planning of LGG. In this study, we predict the 1p/19q status from MR images using convolutional neural networks (CNN), which could be a noninvasive… ▽ More

    Submitted 21 November, 2016; originally announced November 2016.

    Comments: This work has been presented in Conference on Machine Intelligence in Medical Imaging 2016 and RSNA 2016

  35. arXiv:1608.02388  [pdf

    cs.CV

    Database of handwritten Arabic mathematical formulas images

    Authors: Ibtissem Hadj Ali, Mohammed Ali Mahjoub

    Abstract: Although publicly available, ground-truthed database have proven useful for training, evaluating, and comparing recognition systems in many domains, the availability of such database for handwritten Arabic mathematical formula recognition in particular, is currently quite poor. In this paper, we present a new public database that contains mathematical expressions available in their off-line handwr… ▽ More

    Submitted 8 August, 2016; originally announced August 2016.

    Comments: CGIV 2016

  36. Virtual Machines and Networks - Installation, Performance Study, Advantages and Virtualization Options

    Authors: Ishtiaq Ali, Natarajan Meghanathan

    Abstract: The interest in virtualization has been growing rapidly in the IT industry because of inherent benefits like better resource utilization and ease of system manageability. The experimentation and use of virtualization as well as the simultaneous deployment of virtual software are increasingly getting popular and in use by educational institutions for research and teaching. This paper stresses on th… ▽ More

    Submitted 30 April, 2011; originally announced May 2011.

    Journal ref: International Journal of Network Security and its Applications, vol. 3, no. 1, pp. 1-15, January 2011