Software Research Institute (Midlands)
Browse by
Collections in this community
Recent Submissions
-
A policy language for context-aware access control in zero-trust network
(Technological University of the Shannon: Midlands Midwest, 2023-06)Evolving computing technologies such as cloud, edge computing, and the Internet of Things (IoT) are creating a more complex, dispersed, and dynamic enterprise operational environment. New security enterprise architectures ... -
Information centric networking based collaborative edge computing framework for the Internet of Things
(Technological University of the Shannon: Midlands Midwest, 2023-08)The Internet of Things (IoT) has connected billions of devices and its proliferation will continue. As IoT grows, so do the volumes of data it produced and exchanged. The challenge lies in efficiently processing the ... -
Deep reinforcement learning-based industrial robotic manipulation
(Technological University of the Shannon: Midlands Midwest, 2023-09)Pick and place robotic systems can be found in all major industries in order to increase throughput and efficiency. But most of the pick-and-place applications in the industry today have been designed through hard-coded, ... -
Denoising of Nifti (MRI) images with a regularized neighborhood pixel similarity wavelet algorithm
(MDPI, 2023-09-10)The recovery of semantics from corrupted images is a significant challenge in image processing. Noise can obscure features, interfere with accurate analysis, and bias results. To address this issue, the Regularized ... -
ECE: Exactly-Once-Computation for Collaborative Edge in IoT using Information Centric Networking
(IEEE, 2023-05-11)—Exactly-once data processing/delivery can be guaranteed in traditional big data processing systems, e.g. Apache Flink. Checkpoint is commonly used as the solution. Each operator in these systems can restart from the ... -
Prehensile and non-prehensile robotic pick-and-place of objects in clutter using deep reinforcement learning
(MDPI, 2023-01-29)In this study, we develop a framework for an intelligent and self-supervised industrial pick-and-place operation for cluttered environments. Our target is to have the agent learn to perform prehensile and non-prehensile ... -
Privacy preserved video summarization of road traffic events for IoT smart cities
(MDPI, 2023-02-09)The purpose of smart surveillance systems for automatic detection of road traffic accidents is to quickly respond to minimize human and financial losses in smart cities. However, along with the self-evident benefits of ... -
Invisible encoded backdoor attack on DNNs using conditional GAN
(IEEE, 2023-02-17)Deep Learning (DL) models deliver superior performance and have achieved remarkable results for classification and vision tasks. However, recent research focuses on exploring these Deep Neural Networks (DNNs) weaknesses ... -
Big data testing techniques: taxonomy, challenges and future trends
(Tech Science Press, 2022-10-31)Big Data is reforming many industrial domains by providing decision support through analyzing large data volumes. Big Data testing aims to ensure that Big Data systems run smoothly and error-free while maintaining the ... -
SoK: context and risk aware access control for zero trust systems
(Wiley/Hindawi, 2022-06-30)Evolving computing technologies such as cloud, edge computing, and the Internet of )ings (IoT) are creating a more complex, dispersed, and dynamic enterprise operational environment. New security enterprise architectures ... -
An ensemble machine learning method for microplastics identification with FTIR spectrum
(Elsevier, 2022-06-20)Microplastics (MPs) (size < 5 mm) marine pollution have been investigated and monitored by many researchers and found in many coasts around the world. These toxic chemicals make their way into human diet through food ... -
Anomalous distributed traffic: detecting cyber security attacks amongst microservices using graph convolutional networks
(Elsevier, 2022-04-22)Currently, microservices are trending as the most popular software application design architecture. Software organisations are also being targeted by more cyber-attacks every day and newer security measures are in high ... -
Discrete event simulation of a multi robot pick and place system for reinforcement learning research
(Technological University of the Shannon Midlands Midwest, 2022-01)This poster described a implementation of simulation environment for a Pick and Place conveyer belt for multi robot system based on the Gym library to be used to train Reinforcement Learning agents - see figure below. ... -
Joint crypto-blockchain scheme for trust-enabled CCTC video sharing
(Technological University of the Shannon Midlands Midwest, 2022-01)Does the selective encryption serve the purpose of Data Protection Regulation compliant privacy protection of monitored individuals by CCTV cameras? What information can be helpful for the validation of visual data using ... -
A survey of modern deep learning based object detection models
(Elsevier, 2022-06-30)Object Detection is the task of classification and localization of objects in an image or video. It has gained prominence in recent years due to its widespread applications. This article surveys recent developments in deep ... -
Zero-padding and spatial augmentation-based gas sensor node optimization approach in resource-constrained 6G-IoT paradigm
(MDPI, 2022-04-15)Ultra-low-power is a key performance indicator in 6G-IoT ecosystems. Sensor nodes in this eco-system are also capable of running light-weight artificial intelligence (AI) models. In this work, we have achieved high performance ... -
Survey on unmanned aerial vehicle for Mars exploration: deployment use case
(MDPI, 2021-12-22)In recent years, the area of Unmanned Aerial Vehicles (UAVs) has seen rapid growth. There has been a trend to build and produce UAVs that can carry out planetary exploration throughout the past decade. The technology of ... -
Low computational complexity for optimizing energy efficiency in Mm-wave hybrid precoding system for 5G
(IEEE, 2022-01-13)Millimeter-wave (mm-wave) communication is the spectral frontier to meet the anticipated significant volume of high data traffic processing in next-generation systems. The primary challenges in mm-wave can be overcome ... -
Optimization of Ethereum transaction and block delivery performance
(2022)Blockchain is a type of distributed ledger. It is a chain of blocks. Each block contains a series of transactions. Each transaction is for a value transfer or a smart contract execution. The main purpose of the blockchain ... -
CARM: a blockchain-based content quality assessment and rewarding mechanism
(Technological University of the Shannon Midlands Midwest, 2022)Research has identified a gab in contemporary content creation practices around content quality as well as other variables such as content authenticity. To fill this gab, this study proposes CARM, a Content Quality ...