Browsing Articles - Software Research Institute by Title
Now showing items 43-62 of 76
-
Machine learning for smart environments in B5G networks: connectivity and QoS
(Hindawi, 2021-09-20)The number of Internet of Things (IoT) devices to be connected via the Internet is overgrowing. The heterogeneity and complexity of the IoT in terms of dynamism and uncertainty complicate this landscape dramatically and ... -
MCP2P: Layer-dependency-aware live MVC video streaming over peer-to-peer networks.
(Elsevier, 2018-07)Multiview video supports observing a scene from different viewpoints. The Joint Video Team (JVT) developed H.264/MVC to enhance the compression efficiency for multiview video, however, MVC encoded multiview video (MVC ... -
MIKEY and SRTP integration for multicast streaming.
(Euro Journals, 2006)This paper presents the design and implementation of key management architecture for secure multimedia audio streaming to multicast receivers. It describes the methods and techniques which are used in making a multicast ... -
MR-Edge: a MapReduce-based Protocol for IoT Edge Computing with resource constraints.
(IEEE Xplore, 2019)Edge computing is proposed to remedy the Cloud-only processing architecture for Internet of Things (IoT) because of the massive amounts of IoT data. The challenge is how to deploy and execute data processing tasks ... -
Multiple-scent enhanced multimedia synchronization.
(ACM, 2014-09)This study looked at users' perception of inter-stream synchronization between audiovisual media and two olfactory streams. The ability to detect skews, and the perception and impact of skews on user quality of experience ... -
MuLViS: multi-level encryption based security system for surveillance videos
(IEEE, 2020-09-18)Video Surveillance (VS) systems are commonly deployed for real-time abnormal event detection and autonomous video analytics. Video captured by surveillance cameras in real-time often contains identifiable personal information, ... -
A new image encryption algorithm based on heterogeneous chaotic neural network generator and dna encoding.
(Springer, 2018-02)This paper presents a new combined neural network and chaos based pseudorandom sequence generator and a DNA-rules based chaotic encryption algorithm for secure transmission and storage of images. The proposed scheme uses ... -
Olfaction-enhanced multimedia: a survey application domains, displays and research challenges.
(ACM, 2016-05)Recently, the concept of olfaction-enhanced multimedia applications has gained traction as a step towards further enhancing user quality of experience. The next generation of rich media services will be immersive and ... -
Performance investigation of Fin FET based MO-CCII and its applications: resistor-less multi-function bi-quadratic filter and balanced modulator.
(World Scientific Publishing, 2020-01-21)This paper presents an optimal design of a high-performance multi-output second-generation current conveyor (MO-CCII) based on 20nm Fin-Shaped Field Effect Transistor (FinFETs). Proposed MO-CCII has very low port X impedance ... -
Prehensile and non-prehensile robotic pick-and-place of objects in clutter using deep reinforcement learning
(MDPI, 2023-01-29)In this study, we develop a framework for an intelligent and self-supervised industrial pick-and-place operation for cluttered environments. Our target is to have the agent learn to perform prehensile and non-prehensile ... -
The preparation of nanocomposite scaffolds for use in bone tissue engineering.
(AJBAS, 2013)Bone is the second most frequently transplanted tissue in humans. There are 2.2 million bone graft procedures annually, which have several disadvantages such as: donor site morbidity, risk of disease transmission and a ... -
Preserving chain-of-evidence in surveillance videos for authentication and trust-enabled sharing
(IEEE, 2020)Surveillance video recording is a powerful method of deterring unlawful activities. A robust data protection-by-design solution can be helpful in terms of making a captured video immutable, as such recordings cannot become ... -
Privacy preserved video summarization of road traffic events for IoT smart cities
(MDPI, 2023-02-09)The purpose of smart surveillance systems for automatic detection of road traffic accidents is to quickly respond to minimize human and financial losses in smart cities. However, along with the self-evident benefits of ... -
PTP: path-specified transport protocol for concurrent multipath transmission in named data networks.
(Elsevier, 2018-10)Named Data Networking (NDN) is a promising Future Internet architecture to support content distribution. Its inherent addressless routing paradigm brings valuable characteristics to improve the transmission robustness and ... -
Real-time, content-based communication load reduction in the Internet of Multimedia Things.
(MDPI, 2020-02-08)There is an increasing number of devices available for the Internet of Multimedia Things (IoMT). The demands these ever-more complex devices make are also increasing in terms of energy efficiency, reliability, quality-of-service ... -
A reliable and energy efficient dual prediction data reduction approach to WSNs based on Kalman filter
(Wiley, 2021-07-29)Wireless sensor networks (WSNs) are critically resource-constrained due to wireless sensor nodes' tiny memory, low processing units, power limitations, and narrow communication bandwidth. The data reduction technique is ... -
A review of unstructured data analysis and parsing methods
(IEEE, 2020-03)Computer applications generate an enormous amount of data every day through their logs, system-generated files or other reports. This generated data depicts the state of the running system and contains abundant information ... -
Shallow and deep learning approaches for network intrusion alert prediction.
(Elsevier, 2020)The ever-increasing frequency and intensity of intrusion attacks on computer networks worldwide has necessitated intense research efforts towards the design of attack detection and prediction mechanisms. While there are a ... -
Single system image: a survey
(Elsevier, 2016-04)Single system image is a computing paradigm where a number of distributed computing resources are aggregated and presented via an interface that maintains the illusion of interaction with a single system. This approach ... -
Skin detection and lightweight encryption for privacy protection in real-time surveillance applications
(Elsevier, 2020-02)An individual’s privacy protection is the concerning issue in surveillance videos. Existing research work for individual’s identification on the bases of their skin detection is focused either on different human skin ...