Search
Now showing items 1-6 of 6
Preserving chain-of-evidence in surveillance videos for authentication and trust-enabled sharing
(IEEE, 2020)
Surveillance video recording is a powerful method of deterring unlawful activities. A robust data protection-by-design solution can be helpful in terms of making a captured video immutable, as such recordings cannot become ...
An ensemble machine learning method for microplastics identification with FTIR spectrum
(Elsevier, 2022-06-20)
Microplastics (MPs) (size < 5 mm) marine pollution have been investigated and monitored by many researchers
and found in many coasts around the world. These toxic chemicals make their way into human diet through food ...
MuLViS: multi-level encryption based security system for surveillance videos
(IEEE, 2020-09-18)
Video Surveillance (VS) systems are commonly deployed for real-time abnormal event detection and autonomous video analytics. Video captured by surveillance cameras in real-time often contains identifiable personal information, ...
Blockchain for decentralized multi-drone to combat COVID-19
(Wiley, 2021-03-17)
Currently, drones represent a promising technology for combating Coronavirus disease 2019 (COVID-19) due to the transport of goods, medical supplies to a given target location in the quarantine areas experiencing an epidemic ...
Digital twin: origin to future
(MDPI, 2021-05-24)
Digital Twin (DT) refers to the virtual copy or model of any physical entity (physical twin)
both of which are interconnected via exchange of data in real time. Conceptually, a DT mimics the
state of its physical twin ...
Anomalous distributed traffic: detecting cyber security attacks amongst microservices using graph convolutional networks
(Elsevier, 2022-04-22)
Currently, microservices are trending as the most popular software application design architecture. Software organisations are also being targeted by more cyber-attacks every day and newer security measures are in high ...