Skip to main content

Research Repository

Advanced Search

Privacy-Aware Single-Nucleotide Polymorphisms (SNPs) Using Bilinear Group Accumulators in Batch Mode (2024)
Conference Proceeding
Buchanan, W., Grierson, S., & Uribe, D. (2024). Privacy-Aware Single-Nucleotide Polymorphisms (SNPs) Using Bilinear Group Accumulators in Batch Mode. In Proceedings of the 10th International Conference on Information Systems Security and Privacy (226-233). https://doi.org/10.5220/0012454300003648

Biometric data is often highly sensitive, and a leak of this data can lead to serious privacy breaches. Some of the most sensitive of this type of data relates to the usage of DNA data on individuals. A leak of this type of data without consent could... Read More about Privacy-Aware Single-Nucleotide Polymorphisms (SNPs) Using Bilinear Group Accumulators in Batch Mode.

Improved Double Deep Q Network-Based Task Scheduling Algorithm in Edge Computing for Makespan Optimization (2024)
Journal Article
Zeng, L., Liu, Q., Shen, S., & Liu, X. (2024). Improved Double Deep Q Network-Based Task Scheduling Algorithm in Edge Computing for Makespan Optimization. Tsinghua Science and Technology, 29(3), 806 - 817. https://doi.org/10.26599/TST.2023.9010058

Edge computing nodes undertake more and more tasks as business density grows. How to efficiently allocate large-scale and dynamic workloads to edge computing resources has become a critical challenge. An edge task scheduling approach based on an impr... Read More about Improved Double Deep Q Network-Based Task Scheduling Algorithm in Edge Computing for Makespan Optimization.

Adaptive Mobile Chargers Scheduling Scheme based on AHP-MCDM for WRSN (2024)
Journal Article
Makanda, K., Hawbani, A., Wang, . X., Naji, A., Al-Dubai, A., Zhao, L., & Alsamhi, S. H. (in press). Adaptive Mobile Chargers Scheduling Scheme based on AHP-MCDM for WRSN. IEEE Transactions on Sustainable Computing, https://doi.org/10.1109/TSUSC.2024.3391316

Wireless Sensor Networks (WSNs) are used to sense and monitor physical conditions in various services and applications. However, there are a number of challenges in deploying WSNs, especially those pertaining to energy replenishment. Using the curre... Read More about Adaptive Mobile Chargers Scheduling Scheme based on AHP-MCDM for WRSN.

The Tip of the Iceberg: Exploring the Landscape of Policing in a Digitalized World (2024)
Journal Article
Easton, M., de Paepe, J., Aston, L., & Clayton, E. (2024). The Tip of the Iceberg: Exploring the Landscape of Policing in a Digitalized World. European Journal of Policing Studies, 7(1-2), 3-13. https://doi.org/10.5553/ejps.000018

In the ever-evolving landscape of law enforcement, the advent of the digital age has ushered in transformative shifts in police practices. These shifts have sparked scholarly attention and fuelled an increased volume of research dedicated to unravell... Read More about The Tip of the Iceberg: Exploring the Landscape of Policing in a Digitalized World.

“Free Text Is Essentially the Enemy of What We’re Trying to Achieve”: The Framing of a National Vision for Delivering Digital Police Contact (2024)
Journal Article
Wells, H., Andrews, W., Clayton, E., Bradford, B., Aston, E. V., & O’Neill, M. (2024). “Free Text Is Essentially the Enemy of What We’re Trying to Achieve”: The Framing of a National Vision for Delivering Digital Police Contact. European Journal of Policing Studies, 7(1-2), 14-35. https://doi.org/10.5553/ejps.000017

Police organizations in England and Wales, as in many other contexts, are increasingly shifting crime reporting and other public-facing contact online. In this article, we explore the beliefs, motivations and objectives of those tasked with “deliveri... Read More about “Free Text Is Essentially the Enemy of What We’re Trying to Achieve”: The Framing of a National Vision for Delivering Digital Police Contact.

Enterprise Education and Employability Skills: adapting the DOTS Model to enhance career development – evidence from a Scottish International MBA Programme (2024)
Book Chapter
Harte, P., Fonseca, A. P., Hill, E., & Hosanoo, Z. A. (2024). Enterprise Education and Employability Skills: adapting the DOTS Model to enhance career development – evidence from a Scottish International MBA Programme. In R. J. Crammond, & D. Hyams-Ssekasi (Eds.), Entrepreneurship Education and Internationalisation: Cases, Collaborations, and Contexts (65-85). New York: Routledge. https://doi.org/10.4324/9781003378570-7

This chapter uses theory and application to discuss the importance of enterprise education and employability skills in the MBA curriculum. Edinburgh Napier Business School academics and career development consultants collaborate to develop a theory/p... Read More about Enterprise Education and Employability Skills: adapting the DOTS Model to enhance career development – evidence from a Scottish International MBA Programme.

Perceived barriers to implementing building information modeling in Iranian Small and Medium-Sized Enterprises (SMEs): a Delphi survey of construction experts (2024)
Journal Article
Sarvari, H., Asaadsamani, P., Olawumi, T. O., Chan, D. W., Rashidi, A., & Beer, M. (in press). Perceived barriers to implementing building information modeling in Iranian Small and Medium-Sized Enterprises (SMEs): a Delphi survey of construction experts. Architectural Engineering and Design Management, https://doi.org/10.1080/17452007.2024.2329687

Building information modeling (BIM) is a disruptive information technology tool in the construction sector. Although this technology had a significant impact on the manufacturing industries, it, like any other technology, encountered several challeng... Read More about Perceived barriers to implementing building information modeling in Iranian Small and Medium-Sized Enterprises (SMEs): a Delphi survey of construction experts.

Wireless Power Transfer Technologies, Applications, and Future Trends: A Review (2024)
Journal Article
Alabsi, A., Hawbani, A., Wang, X., Dubai, A. A., Hu, J., Aziz, S. A., …Alsamhi, S. H. (in press). Wireless Power Transfer Technologies, Applications, and Future Trends: A Review. IEEE Transactions on Sustainable Computing, https://doi.org/10.1109/TSUSC.2024.3380607

Wireless Power Transfer (WPT) is a disruptive technology that allows wireless energy provisioning for energy- limited IoT devices, thus decreasing the over-reliance on batteries and wires. WPT could replace conventional energy provisioning (e.g., ene... Read More about Wireless Power Transfer Technologies, Applications, and Future Trends: A Review.

Learning Descriptors for Novelty-Search Based Instance Generation via Meta-evolution (2024)
Conference Proceeding
Marrero, A., Segredo, E., León, C., & Hart, E. (in press). Learning Descriptors for Novelty-Search Based Instance Generation via Meta-evolution. In Genetic and Evolutionary Computation Conference (GECCO ’24), July 14–18, 2024, Melbourne, VIC, Australia. https://doi.org/10.1145/3638529.3654028

The ability to generate example instances from a domain is important in order to benchmark algorithms and to generate data that covers an instance-space in order to train machine-learning models for algorithm selection. Quality-Diversity (QD) algorit... Read More about Learning Descriptors for Novelty-Search Based Instance Generation via Meta-evolution.

A Hierarchical Approach to Evolving Behaviour-Trees for Swarm Control (2024)
Conference Proceeding
Montague, K., Hart, E., & Paechter, B. (2024). A Hierarchical Approach to Evolving Behaviour-Trees for Swarm Control. In S. Smith, J. Correia, & C. Cintrano (Eds.), Applications of Evolutionary Computation: 27th European Conference, EvoApplications 2024, Held as Part of EvoStar 2024, Aberystwyth, UK, April 3–5, 2024, Proceedings, Part I (178-193). https://doi.org/10.1007/978-3-031-56852-7_12

Behaviour trees (BTs) are commonly used as controllers in robotic swarms due their modular composition and to the fact that they can be easily interpreted by humans. From an algorithmic perspective, an additional advantage is that extra modules can e... Read More about A Hierarchical Approach to Evolving Behaviour-Trees for Swarm Control.

On the Utility of Probing Trajectories for Algorithm-Selection (2024)
Conference Proceeding
Renau, Q., & Hart, E. (2024). On the Utility of Probing Trajectories for Algorithm-Selection. In Applications of Evolutionary Computation. EvoApplications 2024 (98-114). https://doi.org/10.1007/978-3-031-56852-7_7

Machine-learning approaches to algorithm-selection typically take data describing an instance as input. Input data can take the form of features derived from the instance description or fitness landscape , or can be a direct representation of the ins... Read More about On the Utility of Probing Trajectories for Algorithm-Selection.

Generalized Early Stopping in Evolutionary Direct Policy Search (2024)
Journal Article
Arza, E., Le Goff, L. K., & Hart, E. (in press). Generalized Early Stopping in Evolutionary Direct Policy Search. ACM Transactions on Evolutionary Learning and Optimization, https://doi.org/10.1145/3653024

Lengthy evaluation times are common in many optimization problems such as direct policy search tasks, especially when they involve conducting evaluations in the physical world, e.g. in robotics applications. Often when evaluating solution over a fixe... Read More about Generalized Early Stopping in Evolutionary Direct Policy Search.

Design and Evaluation of Memory Efficient Data Structure Scheme for Energy Drainage Attacks in Wireless Sensor Networks (2024)
Journal Article
Bhatti, D. S., Saleem, S., Ali, Z., Park, T., Suh, B., Kamran, A., …Kim, K. (2024). Design and Evaluation of Memory Efficient Data Structure Scheme for Energy Drainage Attacks in Wireless Sensor Networks. IEEE Access, 12, 41499-41516. https://doi.org/10.1109/access.2024.3377144

Wireless Sensor Networks (WSN) are deployed on a large scale and require protection from malicious energy drainage attacks, particularly those directed at the routing layer. The complexity increases during critical operations like cluster head select... Read More about Design and Evaluation of Memory Efficient Data Structure Scheme for Energy Drainage Attacks in Wireless Sensor Networks.

Cluster-based oversampling with area extraction from representative points for class imbalance learning (2024)
Journal Article
Farou, Z., Wang, Y., & Horváth, T. (2024). Cluster-based oversampling with area extraction from representative points for class imbalance learning. Intelligent Systems with Applications, 22, Article 200357. https://doi.org/10.1016/j.iswa.2024.200357

Class imbalance learning is challenging in various domains where training datasets exhibit disproportionate samples in a specific class. Resampling methods have been used to adjust the class distribution, but they often have limitations for small dis... Read More about Cluster-based oversampling with area extraction from representative points for class imbalance learning.

Synthesising Diverse and Discriminatory Sets of Instances using Novelty Search in Combinatorial Domains (2024)
Journal Article
Marrero, A., Segredo, E., Leon, C., & Hart, E. (in press). Synthesising Diverse and Discriminatory Sets of Instances using Novelty Search in Combinatorial Domains. Evolutionary Computation,

Gathering sufficient instance data to either train algorithm-selection models or understand algorithm footprints within an instance space can be challenging. We propose an approach to generating synthetic instances that are tailored to perform well w... Read More about Synthesising Diverse and Discriminatory Sets of Instances using Novelty Search in Combinatorial Domains.

PHASER: Perceptual Hashing Algorithms Evaluation and Results -an Open Source Forensic Framework (2024)
Journal Article
Mckeown, S., Aaby, P., & Steyven, A. (2024). PHASER: Perceptual Hashing Algorithms Evaluation and Results -an Open Source Forensic Framework. Forensic Science International: Digital Investigation, 48(Supplement), Article 301680

The automated comparison of visual content is a contemporary solution to scale the detection of illegal media and extremist material, both for detection on individual devices and in the cloud. However, the problem is difficult, and perceptual similar... Read More about PHASER: Perceptual Hashing Algorithms Evaluation and Results -an Open Source Forensic Framework.

A spatio-temporal graph convolutional approach to real-time load forecasting in an edge-enabled distributed Internet of Smart Grids energy system (2024)
Journal Article
Liu, Q., Pan, L., Cao, X., Gan, J., Huang, X., & Liu, X. (in press). A spatio-temporal graph convolutional approach to real-time load forecasting in an edge-enabled distributed Internet of Smart Grids energy system. Concurrency and Computation: Practice and Experience, Article e8060. https://doi.org/10.1002/cpe.8060

As the edge nodes of the Internet of Smart Grids (IoSG), smart sockets enable all kinds of power load data to be analyzed at the edge, which create conditions for edge calculation and real-time (RT) load forecasting. In this article, an edge-cloud co... Read More about A spatio-temporal graph convolutional approach to real-time load forecasting in an edge-enabled distributed Internet of Smart Grids energy system.

A Probability Mapping-Based Privacy Preservation Method for Social Networks (2024)
Conference Proceeding
Li, Q., Wang, Y., Wang, F., Tan, Z., & Wang, C. (2024). A Probability Mapping-Based Privacy Preservation Method for Social Networks. . https://doi.org/10.1007/978-981-97-1274-8_19

The mining and analysis of social networks can bring significant economic and social benefits. However, it also poses a risk of privacy leakages. Differential privacy is a de facto standard to prevent such leaks, but it suffers from the high sensitiv... Read More about A Probability Mapping-Based Privacy Preservation Method for Social Networks.