Search
Now showing items 1-9 of 9
Hop-by-hop congrestion measurement and practical active queue management in NDN
(IEEE, 2020-12)
Content replication and name-based routing in Named Data Network (NDN) naturally lead to connectionless multi-source and multipath transmissions. Traditional congestion control designed for end-to-end connections cannot ...
Preserving chain-of-evidence in surveillance videos for authentication and trust-enabled sharing
(IEEE, 2020)
Surveillance video recording is a powerful method of deterring unlawful activities. A robust data protection-by-design solution can be helpful in terms of making a captured video immutable, as such recordings cannot become ...
Cooperative industrial multi robot system using multi agent reinforcement learning
(Athlone Institute of Technology, 2020-06)
This poster describes the research definition process for thisearly stage PhD.
Our goal is to investigate the feasibility of using multi-agent deep learning (MADRL) as an approach for solving cooperative multi robot system ...
Implementation of reinforcement learning algorithms for robotic pick and place with non-visual sensing
(TUS Midlands Midwest, 2022)
The term ‘Industry 4.0’ appeared for the first time in 2011 and saw the
introduction of many cutting-edge technologies such as Cyber-Physical
Systems (CPS), Internet of Things (IoT), and Digital Twins (DT). World
leading ...
Evaluation of ethereum end-to-end transaction
(Athlone Institute of Technology, 2020-06)
Ethereum is a conventional but evolving blockchain
approach to support smart contract by enabling Turingcomplete
computations at miners. With smart contract as a
back-end support, anyone can publish their Decentralize ...
Smart contract driven resource management for edge computing
(Athlone Institute of Technology, 2020-06)
Edge computing has witnessed a rapid growth in the past few years
as more and more and resources are getting connected to the
Internet. The Internet is not gaining any benefits from the current
implementation of ad hoc ...
MuLViS: multi-level encryption based security system for surveillance videos
(IEEE, 2020-09-18)
Video Surveillance (VS) systems are commonly deployed for real-time abnormal event detection and autonomous video analytics. Video captured by surveillance cameras in real-time often contains identifiable personal information, ...
Blockchain for decentralized multi-drone to combat COVID-19
(Wiley, 2021-03-17)
Currently, drones represent a promising technology for combating Coronavirus disease 2019 (COVID-19) due to the transport of goods, medical supplies to a given target location in the quarantine areas experiencing an epidemic ...
A workflow management framework for the dynamic generation of workflows that is independent of the application environment
(IEEE, 2021-06-30)
Workflow is a well-known and widely used technology in business management. Traditional workflow solutions are designed for humans and generally use a graphical representation of workflow elements that reflect the involvement ...