Software Research Institute (Midlands): Recent submissions
Now showing items 41-60 of 137
-
Digital twins collaboration for automatic erratic operational data detection in industry 4.0
(MDPI, 2021-04-02)Digital twin (DT) plays a pivotal role in the vision of Industry 4.0. The idea is that the real product and its virtual counterpart are twins that travel a parallel journey from design and development to production and ... -
Green internet of things using UAVs in B5G networks: a review of applications and strategies
(Elsevier, 2021-04-03)Recently, Unmanned Aerial Vehicles (UAVs) present a promising advanced technology that can enhance people life quality and smartness of cities dramatically and increase overall economic efficiency. UAVs have attained a ... -
Hop-by-hop congrestion measurement and practical active queue management in NDN
(IEEE, 2020-12)Content replication and name-based routing in Named Data Network (NDN) naturally lead to connectionless multi-source and multipath transmissions. Traditional congestion control designed for end-to-end connections cannot ... -
Deep learning based stable and unstable candle flame detection
(Springer, 2021-02-06)This paper presents a deep learning based solution for identification of normal and abnormal candle flames, controlled and uncontrolled flames. Candle flames affected by external factors like wind, improper combustion of ... -
Industry 4.0 towards Forestsry 4.0: fire dection use case
(MDPI, 2021-01-20)Forestry 4.0 is inspired by the Industry 4.0 concept, which plays a vital role in the next industrial generation revolution. It is ushering in a new era for efficient and sustainable forest management. Environmental ... -
Towards estimation of emotions from eye pupillometry with low-cost devices
(IEEE, 2021-01-11)Emotional care is important for some patients and their caregivers. Within a clinical or home care situation, technology can be employed to remotely monitor the emotional response of such people. This paper considers ... -
Four quadrant analog multiplier based memristor emulator using single active element
(Elsevier, 2020-02)This paper presents a novel Four Quadrant Analog Multiplier (FQAM) circuit and its applications using a single active element Current Differencing Transconductance Amplifier (CDTA) and two NMOS. This circuit has a cascadability ... -
Low-cost gaze detection with real-time ocular movements using coordinate-convolutional neural networks
(United Kingdom Simulation Society, 2019-10)Detection of ocular-movements unfolds various possibilities in computer vision but requires large datasets, expensive hardware and computational power. Prior research substantiates the belief that Convolutional Neural ... -
Antioxidant, antibacterial and antitumoral activities of kraft lignin from hardwood factionated by acid precipitation
(Elsevier, 2020-11-10)Kraft lignin, so far useful for energy generation, has been gathering considerable attention as an alternative material to replace fossil-based resources mainly due to its high phenolic content. However, the wide molecular ... -
Smart contract driven resource management for edge computing
(Athlone Institute of Technology, 2020-06)Edge computing has witnessed a rapid growth in the past few years as more and more and resources are getting connected to the Internet. The Internet is not gaining any benefits from the current implementation of ad hoc ... -
Evaluation of ethereum end-to-end transaction
(Athlone Institute of Technology, 2020-06)Ethereum is a conventional but evolving blockchain approach to support smart contract by enabling Turingcomplete computations at miners. With smart contract as a back-end support, anyone can publish their Decentralize ... -
Cooperative industrial multi robot system using multi agent reinforcement learning
(Athlone Institute of Technology, 2020-06)This poster describes the research definition process for thisearly stage PhD. Our goal is to investigate the feasibility of using multi-agent deep learning (MADRL) as an approach for solving cooperative multi robot system ... -
A review of unstructured data analysis and parsing methods
(IEEE, 2020-03)Computer applications generate an enormous amount of data every day through their logs, system-generated files or other reports. This generated data depicts the state of the running system and contains abundant information ... -
Convergence of machine learning and robotics communication in collaborative assembly: mobility, connectivity and future perpectives.
(Springer, 2019-10-16)Collaborative assemblies of robots are promising the next generation of robot applications by ensuring that safe and reliable robots work collectively toward a common goal. To maintain this collaboration and harmony, ... -
PRISENIT - a probabilistic search recommendation algorithm to improe search efficiency for network intelligence and troubleshooting
(UKSIM, 2015-03)When searching for data in a telecommunications network management application, large search result sets are common. In order to refine the results to retrieve useful information existing systems normally require additional ... -
SLEPX: an efficient lightweight cipher for visual protection of scalable HEVC extension
(IEEE, 2020-10-12)This paper proposes a lightweight cipher scheme aimed at the scalable extension of the High Efficiency Video Coding (HEVC) codec, referred to as the Scalable HEVC (SHVC) standard. This stream cipher, S ymmetric Cipher for ... -
MuLViS: multi-level encryption based security system for surveillance videos
(IEEE, 2020-09-18)Video Surveillance (VS) systems are commonly deployed for real-time abnormal event detection and autonomous video analytics. Video captured by surveillance cameras in real-time often contains identifiable personal information, ... -
The context aware security policy language for Zero Trust Network
(Athlone Institute of Technology, 2020-06)With the development of the pervasive computing, the number of devices accessing to network is increasing. Though this condition brings us a more convenient and intelligent lifestyle, accompanying with it is the higher ... -
An analysis of alterations to the SCTP RTO calculation mechanism for WLAN environments
(Springer, 2008-01)As a connection oriented transport layer protocol the Stream Control Transmission Protocol (SCTP) inherits many of the features of the Transmission Control Protocol (TCP) including the mechanism by which Retransmission ... -
Preserving chain-of-evidence in surveillance videos for authentication and trust-enabled sharing
(IEEE, 2020)Surveillance video recording is a powerful method of deterring unlawful activities. A robust data protection-by-design solution can be helpful in terms of making a captured video immutable, as such recordings cannot become ...