Skip to main content

Research Repository

Advanced Search

Outputs (123)

Framework for network IDS evaluation (2009)
Thesis
Lo, O. (2009). Framework for network IDS evaluation. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/3981

There are a multitude of threats now faced in computer networks such as viruses, worms, trojans, attempted user privilege gain, data stealing and denial of service. As a first line of defence, firewalls can be used to prevent threats... Read More about Framework for network IDS evaluation.

Minimization of incompletely specified mixed polarity Reed Muller functions using genetic algorithm. (2009)
Presentation / Conference Contribution
Al-Jassani, B. A., Urquhart, N. B., & Almaini, A. E. A. (2009). Minimization of incompletely specified mixed polarity Reed Muller functions using genetic algorithm. . https://doi.org/10.1109/12.67320

A New and efficient Genetic Algorithm (GA) based approach is presented to minimise the number of terms of Mixed Polarity Reed Muller (MPRM) single and multi output incompletely specified Boolean functions. The algorithm determines the allocation of d... Read More about Minimization of incompletely specified mixed polarity Reed Muller functions using genetic algorithm..

Student experience: LIS research perspective. (2009)
Presentation / Conference Contribution
Hall, H. (2009, November). Student experience: LIS research perspective. Paper presented at SCONUL Autumn Conference 2009

Slides at: http://www.slideshare.net/LISResearch/student-experience-lis-research-perspective

Proposing a service-enabled semantic grid model (2009)
Journal Article
Chrysoulas, C., & Koufopavlou, O. (2009). Proposing a service-enabled semantic grid model. International Journal of Autonomous and Adaptive Communications Systems, 2(4), 349-361. https://doi.org/10.1504/ijaacs.2009.029170

The semantic grid refers to an approach to grid computing in which information, computing resources and services are described in standard ways that can be processed by computer. This makes it easier for resources to be discovered and joined up autom... Read More about Proposing a service-enabled semantic grid model.

The VoIP intrusion detection through a LVQ-based neural network. (2009)
Presentation / Conference Contribution
Zheng, L., & Peng, T. (2009, November). The VoIP intrusion detection through a LVQ-based neural network. Paper presented at The 4th International Conference for Internet Technology and Secured Transactions

Being a fast-growing Internet application, Voice over Internet Protocol shares the network resources with the regular Internet traffic. However it is susceptible to the existing security holes of the Internet. In this paper, a highly effective VoIP i... Read More about The VoIP intrusion detection through a LVQ-based neural network..

Integrating QoS management within a Web Service architecture (2009)
Presentation / Conference Contribution
Chrysoulas, C. (2009). Integrating QoS management within a Web Service architecture. In 2009 International Conference on Ultra Modern Telecommunications & Workshops. https://doi.org/10.1109/icumt.2009.5345617

Web Services are applications that expose functionality to consumers via public interfaces. Web-services support the concept of loosely coupled components, which in turn enables the development of more agile and open systems. However, this flexibilit... Read More about Integrating QoS management within a Web Service architecture.

FH-MAC: A Multi-Channel Hybrid MAC Protocol for Wireless Mesh Networks (2009)
Journal Article
Tandjaoui, D., Doudou, M., & Romdhani, I. (2009). FH-MAC: A Multi-Channel Hybrid MAC Protocol for Wireless Mesh Networks. International Journal of Grid and High Performance Computing, 1(4), 40-56. https://doi.org/10.4018/jghpc.2009070804

In this article, the authors propose a new hybrid MAC protocol named H-MAC for wireless mesh networks. This protocol combines CSMA and TDMA schemes according to the contention level. In addition, it exploits channel diversity and provides a medium ac... Read More about FH-MAC: A Multi-Channel Hybrid MAC Protocol for Wireless Mesh Networks.

Conflicts of jurisdiction: An exploratory study of academic, professional, and epistemological norms in library and information science (2009)
Journal Article
Cronin, B., & Davenport, E. (2009). Conflicts of jurisdiction: An exploratory study of academic, professional, and epistemological norms in library and information science. Libri, 46, 1-15. https://doi.org/10.1515/libr.1996.46.1.1

Library and information science (LIS) faculty, like their peers in other professional schools, are subject to the demands of at times conflicting jurisdictions: research productivity may clash with professional service, theory building with the devel... Read More about Conflicts of jurisdiction: An exploratory study of academic, professional, and epistemological norms in library and information science.

Refactoring data transforms in MaTSE for flexibility. (2009)
Presentation / Conference Contribution
Craig, P., & Kennedy, J. (2009, October). Refactoring data transforms in MaTSE for flexibility

In early prototypes of the Microarray Time-series Explorer (MaTSE) data transforms were tightly coupled with visualisation components. While this allowed us to achieve our initial objective of developing the application to the level where we were ab... Read More about Refactoring data transforms in MaTSE for flexibility..

Re-architecting Visualizations to Java Swing. (2009)
Presentation / Conference Contribution
Graham, M., & Kennedy, J. (2009, October). Re-architecting Visualizations to Java Swing. Paper presented at REVISE: Refactoring Visualization from Experience, VizWeek Workshop