Conferences - Software Research Institute: Recent submissions
Now showing items 1-20 of 46
-
Invisible encoded backdoor attack on DNNs using conditional GAN
(IEEE, 2023-02-17)Deep Learning (DL) models deliver superior performance and have achieved remarkable results for classification and vision tasks. However, recent research focuses on exploring these Deep Neural Networks (DNNs) weaknesses ... -
Unsupervised noise detection in unstructured data for automatic parsing
(IEEE, 2020-11-30)The telecommunications industry makes extensive use of data extracted from logs, alarms, traces, diagnostics, and other monitoring devices. Analyzing the generated data requires that the data be parsed, re-structured, and ... -
A crowdsourcing-based QoE evaluation of an immersive VR autonomous driving experience
(IEEE, 2021-06-30)Due to COVID-19, crowdsourcing has gained momentum as an alternative methodology for continuing research and for Quality of Experience (QoE) assessment. Employing this approach, we remotely evaluated the user perceived QoE ... -
A workflow management framework for the dynamic generation of workflows that is independent of the application environment
(IEEE, 2021-06-30)Workflow is a well-known and widely used technology in business management. Traditional workflow solutions are designed for humans and generally use a graphical representation of workflow elements that reflect the involvement ... -
A framework for the dynamic generation of workflows for network management
(IEEE, 2021-06-30)A demonstration of the application of dynamically generated workflows to the management of a network environment is presented. A proposed workflow management framework (WMF) uses dynamically generated workflows to control ... -
Intelligent monitoring of IoT devices using neural networks
(IEEE, 2021-03-29)The Internet of Things (IoT) has seen expeditious growth in recent times with 7 billion connected devices in 2020, thus leading to the vital importance of real-time monitoring of IoT devices. Through this paper, we demonstrate ... -
Hop-by-hop congrestion measurement and practical active queue management in NDN
(IEEE, 2020-12)Content replication and name-based routing in Named Data Network (NDN) naturally lead to connectionless multi-source and multipath transmissions. Traditional congestion control designed for end-to-end connections cannot ... -
Deep learning based stable and unstable candle flame detection
(Springer, 2021-02-06)This paper presents a deep learning based solution for identification of normal and abnormal candle flames, controlled and uncontrolled flames. Candle flames affected by external factors like wind, improper combustion of ... -
Low-cost gaze detection with real-time ocular movements using coordinate-convolutional neural networks
(United Kingdom Simulation Society, 2019-10)Detection of ocular-movements unfolds various possibilities in computer vision but requires large datasets, expensive hardware and computational power. Prior research substantiates the belief that Convolutional Neural ... -
PRISENIT - a probabilistic search recommendation algorithm to improe search efficiency for network intelligence and troubleshooting
(UKSIM, 2015-03)When searching for data in a telecommunications network management application, large search result sets are common. In order to refine the results to retrieve useful information existing systems normally require additional ... -
Property based attestation for a secure cloud monitoring system.
(IEEE, 2014-02)—In this paper, we consider the problem of trust in cloud monitoring systems. We design and develop a novel scheme for trust certification using property based attestation (PBA). The PBA is based on a trusted platform ... -
Vehicular cloud networks: architecture, applications and security issues.
(IEEE, 2016-03-14)Vehicular Ad Hoc Networks (VANET) are the largest real life application of ad-hoc networks where nodes are represented via fast moving vehicles. This paper introduces the future emerging technology, i.e., Vehicular Cloud ... -
A container-based edge cloud PaaS architecture based on Raspberry Pi Clusters.
(IEEE, 2016-08)Cloud technology is moving towards multi-cloud environments with the inclusion of various devices. Cloud and IoT integration resulting in so-called edge cloud and fog computing has started. This requires the combination ... -
Containers and clusters for edge cloud architectures - a technology review.
(IEEE, 2015-10-26)Cloud technology is moving towards more distribution across multi-clouds and the inclusion of various devices, as evident through IoT and network integration in the context of edge cloud and fog computing. Generally, ... -
IProIoT: an in-network processing framework for IoT using information centric networking
(IEEE, 2017-07-27)The Internet of Things (IoT) network supports various network applications through billions of heterogeneous connected devices. Efficient processing of enormous amounts of IoT data collected and exchanged by these devices ... -
A flow based architecture for efficient distribution of vehicular information in smart cities.
(IEEE, 2019-12-23)The Introduction of the Internet of Things has made the vision of “Smart Cities” a very reachable goal. Aggregating data from a wealth of sensors throughout a city, with the aim of improving quality of life for its ... -
A governance architecture for self-adaption & control in IoT applications.
(IEEE, 2018-06-25)The “Internet of Things” has become a reality with projections of 28 billion connected devices by 2021. Much R&D is currently focused on creating methods to efficiently handle an influx of data. Flow based programming, ... -
A hybrid machine learning/policy approach to optimise video path selection.
(IEEE, 2020-02-27)Services such as interactive video and real time gaming are ubiquitous on modern networks. The approaching realisation of 5G as well as the virtualisation and scalability of network functions made possible by technologies ... -
An architecture for intelligent data processing on IoT edge devices.
(IEEE, 2018-05-17)As the Internet of Things edges closer to mainstream adoption, with it comes an exponential rise in data transmission across the current Internet architecture. Capturing and analyzing this data will lead to a wealth ... -
Establishing trust in cloud services via integration of cloud trust protocol with a trust label system.
(Springer, 2017-04)Cloud computing has transformed the computing landscape by enabling flexible compute-resource provisioning. The rapid growth of cloud computing and its large-scale nature provide many advantages to business enterprises. ...