Search
Now showing items 1-10 of 36
A framework for the dynamic generation of workflows for network management
(IEEE, 2021-06-30)
A demonstration of the application of dynamically generated workflows to the management of a network environment is presented. A proposed workflow management framework (WMF) uses dynamically generated workflows to control ...
A review of unstructured data analysis and parsing methods
(IEEE, 2020-03)
Computer applications generate an enormous amount of data every day through their logs, system-generated files or other reports. This generated data depicts the state of the running system and contains abundant information ...
Block-chain empowered multi-robot collaboration to fight COVID-19 and future pandemics
(IEEE, 2021-03-25)
This conceptual paper overviews how blockchain technology is involving the operation
of multi-robot collaboration for combating COVID-19 and future pandemics. Robots are a promising
technology for providing many tasks ...
Hop-by-hop congrestion measurement and practical active queue management in NDN
(IEEE, 2020-12)
Content replication and name-based routing in Named Data Network (NDN) naturally lead to connectionless multi-source and multipath transmissions. Traditional congestion control designed for end-to-end connections cannot ...
Delay-based network utility maximization modelling for congestion control in name data networking
(IEEE, 2021-10-05)
Content replication and name-based routing lead to a natural multi-source and multipath transmission paradigm in NDN. Due to the unique connectionless characteristic of NDN, current end-to-end multipath congestion control ...
Low-complexity high-performance deep learning model for real time low cost embedded fire detection system.
(Elsevier, 2020)
Correct and timely detection of fires has been an active area of research. Both shallow learning (with manual feature engineering),
as well as deep learning (with its promise of automatically extracting meaningful ...
Preserving chain-of-evidence in surveillance videos for authentication and trust-enabled sharing
(IEEE, 2020)
Surveillance video recording is a powerful method of deterring unlawful activities. A robust data protection-by-design solution can be helpful in terms of making a captured video immutable, as such recordings cannot become ...
Tunable memristor emulator using off-the-shelf components.
(Elsevier, 2020)
Emerging memristor technology is as of late drawing broad consideration due to its potential for several applications. But, the non-availability of solid-state memristive devices puts a practical limitation. So, this paper ...
Digital twins collaboration for automatic erratic operational data detection in industry 4.0
(MDPI, 2021-04-02)
Digital twin (DT) plays a pivotal role in the vision of Industry 4.0. The idea is that the real product and its virtual counterpart are twins that travel a parallel journey from design and development to production and ...
Cooperative industrial multi robot system using multi agent reinforcement learning
(Athlone Institute of Technology, 2020-06)
This poster describes the research definition process for thisearly stage PhD.
Our goal is to investigate the feasibility of using multi-agent deep learning (MADRL) as an approach for solving cooperative multi robot system ...