Skip to main content

Research Repository

Advanced Search

Outputs (291)

Eidolon360 – A VR Experience (2018)
Conference Proceeding
Hood, B., & Flint, T. (2018). Eidolon360 – A VR Experience. In Proceedings of xCoAx 2018

Eidolon360 is a virtual reality artwork and experience that is interacted with through VR headsets. The viewer, reclining on a bed within the exhibition space, experiences a 360 film, shot within a medical simulation centre, that mimics clinical hosp... Read More about Eidolon360 – A VR Experience.

A Cooperative Learning Approach for the Quadratic Knapsack Problem (2018)
Conference Proceeding
Lalla-Ruiz, E., Segredo, E., & Voß, S. (2018). A Cooperative Learning Approach for the Quadratic Knapsack Problem. In Learning and Intelligent Optimization Conference (LION12) (31-35). https://doi.org/10.1007/978-3-030-05348-2_3

The Quadratic Knapsack Problem (QKP) is a well-known optimization problem aimed to maximize a quadratic objective function subject to linear capacity constraints. It has several applications in different fields such as telecommunications, graph theor... Read More about A Cooperative Learning Approach for the Quadratic Knapsack Problem.

Implementation and Detection of Novel Attacks to the PLC Memory on a Clean Water Supply System (2018)
Conference Proceeding
Robles-Durazno, A., Moradpoor, N., McWhinnie, J., Russell, G., & Maneru-Marin, I. (2019). Implementation and Detection of Novel Attacks to the PLC Memory on a Clean Water Supply System. In CITT 2018 (91-103). https://doi.org/10.1007/978-3-030-05532-5_7

Critical infrastructures such as nuclear plants or water supply systems are mainly managed through electronic control systems. Such systems comprise of a number of elements, such as programmable logic controllers (PLC), networking devices, and actua... Read More about Implementation and Detection of Novel Attacks to the PLC Memory on a Clean Water Supply System.

Design of Multi-View Based Email Classification for IoT Systems via Semi-Supervised Learning (2018)
Journal Article
Li, W., Meng, W., Tan, Z., & Xiang, Y. (2019). Design of Multi-View Based Email Classification for IoT Systems via Semi-Supervised Learning. Journal of Network and Computer Applications, 128, 56-63. https://doi.org/10.1016/j.jnca.2018.12.002

Suspicious emails are one big threat for Internet of Things (IoT) security, which aim to induce users to click and then redirect them to a phishing webpage. To protect IoT systems, email classification is an essential mechanism to classify spam and l... Read More about Design of Multi-View Based Email Classification for IoT Systems via Semi-Supervised Learning.

Feature-preserving detailed 3D face reconstruction from a single image (2018)
Conference Proceeding
Li, Y., Ma, L., Fan, H., & Mitchell, K. (2018). Feature-preserving detailed 3D face reconstruction from a single image. In CVMP '18 Proceedings of the 15th ACM SIGGRAPH European Conference on Visual Media Production. https://doi.org/10.1145/3278471.3278473

Dense 3D face reconstruction plays a fundamental role in visual media production involving digital actors. We improve upon high fidelity reconstruction from a single 2D photo with a reconstruction framework that is robust to large variations in expre... Read More about Feature-preserving detailed 3D face reconstruction from a single image.

NgramPOS: A Bigram-based Linguistic and Statistical Feature Process Model for Unstructured Text Classification (2018)
Journal Article
Yazdania, S., Tan, Z., Kakavand, M., & Lau, S. (2022). NgramPOS: A Bigram-based Linguistic and Statistical Feature Process Model for Unstructured Text Classification. Wireless Networks, 28, 1251-1261. https://doi.org/10.1007/s11276-018-01909-0

Research in financial domain has shown that sentiment aspects of stock news have a profound impact on volume trades, volatility, stock prices and firm earnings. With the ever growing social inetworking and online marketing sites, the reviews obtained... Read More about NgramPOS: A Bigram-based Linguistic and Statistical Feature Process Model for Unstructured Text Classification.

Occupancy detection in non-residential buildings – A survey and novel privacy preserved occupancy monitoring solution (2018)
Journal Article
Ahmad, J., Larijani, H., Emmanuel, R., Mannion, M., & Javed, A. (2018). Occupancy detection in non-residential buildings – A survey and novel privacy preserved occupancy monitoring solution. Applied Computing and Informatics, https://doi.org/10.1016/j.aci.2018.12.001

Buildings use approximately 40% of global energy and are responsible for almost a third of the worldwide greenhouse gas emissions. They also utilise about 60% of the world’s electricity. In the last decade, stringent building regulations have led to... Read More about Occupancy detection in non-residential buildings – A survey and novel privacy preserved occupancy monitoring solution.

The impact of work placement on graduate employment in computing: outcomes from a UK-based study (2018)
Journal Article
Smith, S., Taylor-Smith, E., Smith, C., & Webster, G. (2018). The impact of work placement on graduate employment in computing: outcomes from a UK-based study. International Journal of Work-Integrated Learning, 19(4), 359-369

This study followed recent computing graduates into the workplace and explored their undergraduate experiences of work placements and subsequent impact on graduate employment. Whilst studying at one of 14 Scottish universities, participants (n=99) ha... Read More about The impact of work placement on graduate employment in computing: outcomes from a UK-based study.

Reducing the Impact of Network Bottlenecks on Remote Contraband Detection (2018)
Conference Proceeding
McKeown, S., Russell, G., & Leimich, P. (2018). Reducing the Impact of Network Bottlenecks on Remote Contraband Detection. In 2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security). https://doi.org/10.1109/CyberSecPODS.2018.8560671

Cloud based storage is increasing in popularity, with large volumes of data being stored remotely. Digital forensics investigators examining such systems remotely are limited by bandwidth constraints when accessing this kind of data using traditi... Read More about Reducing the Impact of Network Bottlenecks on Remote Contraband Detection.

Sub-file Hashing Strategies for Fast Contraband Detection (2018)
Conference Proceeding
McKeown, S., Russell, G., & Leimich, P. (2018). Sub-file Hashing Strategies for Fast Contraband Detection. In 2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security). https://doi.org/10.1109/CyberSecPODS.2018.8560680

Traditional digital forensics processes do not scale well with the huge quantities of data present in a modern investigation, resulting in large investigative backlogs for many law enforcement agencies. Data reduction techniques are required for fast... Read More about Sub-file Hashing Strategies for Fast Contraband Detection.