Browsing Articles - Software Research Institute by Issue Date
Now showing items 21-40 of 76
-
Trace model for cyclic behavior in wireless LANS.
(Pakistan Association for the Advancement of Science, 2018-09): For the estimation of cycle time in WLANs different parameters were used to analyze the cyclic behavior like packet loss cycle, successful packet cycle and collision cycle. This paper proposes a model to control all ... -
PTP: path-specified transport protocol for concurrent multipath transmission in named data networks.
(Elsevier, 2018-10)Named Data Networking (NDN) is a promising Future Internet architecture to support content distribution. Its inherent addressless routing paradigm brings valuable characteristics to improve the transmission robustness and ... -
Bidirectional LSTM autoencoder for sequence based anomaly detection in cyber security.
(United Kingdom Simulation Society, 2019)Cyber-security is concerned with protecting information, a vital asset in today’s world. The volume of data that is generated can be usefully analyzed when cyber-security systems are effectively implemented with the aid ... -
Analg front-end design design for biomedical signal acquisition systems.
(Springer, 2019)This manuscript contains a brief overview of the work being carried out by the author under the aegis of Visvesvaraya Young Faculty Research Fellow- ship awarded to him by the Ministry of Electronics and Information ... -
MR-Edge: a MapReduce-based Protocol for IoT Edge Computing with resource constraints.
(IEEE Xplore, 2019)Edge computing is proposed to remedy the Cloud-only processing architecture for Internet of Things (IoT) because of the massive amounts of IoT data. The challenge is how to deploy and execute data processing tasks ... -
Collaboration of drone and Internet of public safety things in smart cities: an overview of Qos and network performance optimization.
(MDPI, 2019-01-27)This paper studies the network performance of collaboration between the Internet of public safety things (IoPST) and drones. Drones play a vital role in delivering timely and essential wireless communication services for ... -
Depth-map generation using pixel matching in stereoscopic pair of images
(arXiv, 2019-02)Modern day multimedia content generation and dissemination is moving towards the presentation of more and more ‘realistic’ scenarios. The switch from 2-dimensional (2D) to 3-dimensional (3D) has been a major driving ... -
Lightweight cipher for H.264 videos in the Internet of Multimedia Things with encryption space ratio diagnostics
(MDPI, 2019-03-11)Within an Internet of Multimedia Things, the risk of disclosing streamed video content, such as that arising from video surveillance, is of heightened concern. This leads to the encryption of that content. To reduce the ... -
Effectiveness of crypto-transcoding for H.264/AVC and HEVC video bit-streams.
(Springer, 2019-03-22)To avoid delays arising from a need to decrypt a video prior to transcoding and then re-encrypt it afterwards, this paper assesses a selective encryption (SE) content protection scheme. The scheme is suited to both recent ... -
An evaluation of a 3D multimodal marker-less motion analysis system.
(ACM, 2019-06)Motion analysis is a technique used by clinicians (among many others) that quantifies human movement by using camera-based systems. Marker-based motion analysis systems have been used across a variety of application ... -
Data driven approach for eye disease classification with machine learning.
(MDPI, 2019-07-11)Medical health systems have been concentrating on artificial intelligence techniques for speedy diagnosis. However, the recording of health data in a standard form still requires attention so that machine learning can ... -
Visual surveillance within the EU general data protection regulation: a technology perspective.
(IEEE, 2019-08-23)From an individual's perspective, technological advancement has merits and demerits. Video captured by surveillance cameras while a person goes about their daily life may improve their personal safety but the images collected ... -
Survey on collaborative smart drones and Internet of Things for improving smartness of smart cities.
(IEEE, 2019-09)Smart cities contain intelligent things which can intelligently automatically and collabora-tively enhance life quality, save people's lives, and act a sustainable resource ecosystem. To achieve these advanced collaborative ... -
Low-cost gaze detection with real-time ocular movements using coordinate-convolutional neural networks
(United Kingdom Simulation Society, 2019-10)Detection of ocular-movements unfolds various possibilities in computer vision but requires large datasets, expensive hardware and computational power. Prior research substantiates the belief that Convolutional Neural ... -
Convergence of machine learning and robotics communication in collaborative assembly: mobility, connectivity and future perpectives.
(Springer, 2019-10-16)Collaborative assemblies of robots are promising the next generation of robot applications by ensuring that safe and reliable robots work collectively toward a common goal. To maintain this collaboration and harmony, ... -
Human gait assessment using a 3D marker-less multimodal motion capture system.
(Springer, 2019-12-05)Gait analysis is the measurement, processing and systematic interpretation of biomechanical parameters that characterize human locomotion. It supports the identification of movement limitations and development of rehabilitation ... -
Low-complexity high-performance deep learning model for real time low cost embedded fire detection system.
(Elsevier, 2020)Correct and timely detection of fires has been an active area of research. Both shallow learning (with manual feature engineering), as well as deep learning (with its promise of automatically extracting meaningful ... -
Preserving chain-of-evidence in surveillance videos for authentication and trust-enabled sharing
(IEEE, 2020)Surveillance video recording is a powerful method of deterring unlawful activities. A robust data protection-by-design solution can be helpful in terms of making a captured video immutable, as such recordings cannot become ... -
Tunable memristor emulator using off-the-shelf components.
(Elsevier, 2020)Emerging memristor technology is as of late drawing broad consideration due to its potential for several applications. But, the non-availability of solid-state memristive devices puts a practical limitation. So, this paper ... -
Shallow and deep learning approaches for network intrusion alert prediction.
(Elsevier, 2020)The ever-increasing frequency and intensity of intrusion attacks on computer networks worldwide has necessitated intense research efforts towards the design of attack detection and prediction mechanisms. While there are a ...