Software Research Institute (Midlands): Recent submissions
Now showing items 61-80 of 137
-
Tunable memristor emulator using off-the-shelf components.
(Elsevier, 2020)Emerging memristor technology is as of late drawing broad consideration due to its potential for several applications. But, the non-availability of solid-state memristive devices puts a practical limitation. So, this paper ... -
Shallow and deep learning approaches for network intrusion alert prediction.
(Elsevier, 2020)The ever-increasing frequency and intensity of intrusion attacks on computer networks worldwide has necessitated intense research efforts towards the design of attack detection and prediction mechanisms. While there are a ... -
Low-complexity high-performance deep learning model for real time low cost embedded fire detection system.
(Elsevier, 2020)Correct and timely detection of fires has been an active area of research. Both shallow learning (with manual feature engineering), as well as deep learning (with its promise of automatically extracting meaningful ... -
Trace model for cyclic behavior in wireless LANS.
(Pakistan Association for the Advancement of Science, 2018-09): For the estimation of cycle time in WLANs different parameters were used to analyze the cyclic behavior like packet loss cycle, successful packet cycle and collision cycle. This paper proposes a model to control all ... -
Property based attestation for a secure cloud monitoring system.
(IEEE, 2014-02)—In this paper, we consider the problem of trust in cloud monitoring systems. We design and develop a novel scheme for trust certification using property based attestation (PBA). The PBA is based on a trusted platform ... -
Single system image: a survey
(Elsevier, 2016-04)Single system image is a computing paradigm where a number of distributed computing resources are aggregated and presented via an interface that maintains the illusion of interaction with a single system. This approach ... -
SVS - a secure scheme for video streaming using SRTP AES and DH.
(Euro Journals, 2010)Video streaming technologies are becoming immensely important with the growth of the multimedia technology. With streaming, the end user can start watching the file almost as soon as it begins downloading. Security becomes ... -
MIKEY and SRTP integration for multicast streaming.
(Euro Journals, 2006)This paper presents the design and implementation of key management architecture for secure multimedia audio streaming to multicast receivers. It describes the methods and techniques which are used in making a multicast ... -
Effectiveness of cleaning and disinfection procedures on the removal of enterotoxigenic Bacillus cereus from infant feeding bottles.
(International Association for Food Protection, 1998)Reconstituted infant milk formulas are considered a food class of high risk because of the susceptibility of the infant population to enteric bacterial pathogens, severe response to enterotoxins, and increased mortality. ... -
Vehicular cloud networks: architecture, applications and security issues.
(IEEE, 2016-03-14)Vehicular Ad Hoc Networks (VANET) are the largest real life application of ad-hoc networks where nodes are represented via fast moving vehicles. This paper introduces the future emerging technology, i.e., Vehicular Cloud ... -
A container-based edge cloud PaaS architecture based on Raspberry Pi Clusters.
(IEEE, 2016-08)Cloud technology is moving towards multi-cloud environments with the inclusion of various devices. Cloud and IoT integration resulting in so-called edge cloud and fog computing has started. This requires the combination ... -
Containers and clusters for edge cloud architectures - a technology review.
(IEEE, 2015-10-26)Cloud technology is moving towards more distribution across multi-clouds and the inclusion of various devices, as evident through IoT and network integration in the context of edge cloud and fog computing. Generally, ... -
Audio masking effect on inter-component skews in olfaction-enhanced multimedia presentations.
(ACM, 2016-08)Media-rich content plays a vital role in consumer applications today, as these applications try to find new and interesting ways to engage their users. Video, audio, and the more traditional forms of media content continue ... -
IProIoT: an in-network processing framework for IoT using information centric networking
(IEEE, 2017-07-27)The Internet of Things (IoT) network supports various network applications through billions of heterogeneous connected devices. Efficient processing of enormous amounts of IoT data collected and exchanged by these devices ... -
A flow based architecture for efficient distribution of vehicular information in smart cities.
(IEEE, 2019-12-23)The Introduction of the Internet of Things has made the vision of “Smart Cities” a very reachable goal. Aggregating data from a wealth of sensors throughout a city, with the aim of improving quality of life for its ... -
A governance architecture for self-adaption & control in IoT applications.
(IEEE, 2018-06-25)The “Internet of Things” has become a reality with projections of 28 billion connected devices by 2021. Much R&D is currently focused on creating methods to efficiently handle an influx of data. Flow based programming, ... -
Transparent encryption with scalable video communication: Lower-latency, CABAC-based schemes
(Elsevier, 2017-05)Selective encryption masks all of the content without completely hiding it, as full encryption would do at a cost in encryption delay and increased bandwidth. Many commercial applications of video encryption do not even ... -
A hybrid machine learning/policy approach to optimise video path selection.
(IEEE, 2020-02-27)Services such as interactive video and real time gaming are ubiquitous on modern networks. The approaching realisation of 5G as well as the virtualisation and scalability of network functions made possible by technologies ... -
An architecture for intelligent data processing on IoT edge devices.
(IEEE, 2018-05-17)As the Internet of Things edges closer to mainstream adoption, with it comes an exponential rise in data transmission across the current Internet architecture. Capturing and analyzing this data will lead to a wealth ... -
Joint crypto-stego scheme for enhanced image protection with nearest-centroid clustering.
(IEEE, 2018-03-12)Owing to the exceptional growth of information exchange over open communication channels within the public Internet, confidential transmission of information has become a vital current concern for organizations and ...