Skip to main content

Research Repository

Advanced Search

Outputs (239)

CityFlow: Supporting Spatial-Temporal Edge Computing for Urban Machine Learning Applications (2019)
Presentation / Conference Contribution
Kawano, M., Yonezawa, T., Tanimura, T., Giang, N. K., Broadbent, M., Lea, R., & Nakazawa, J. (2018, November). CityFlow: Supporting Spatial-Temporal Edge Computing for Urban Machine Learning Applications. Presented at EAI International Conference on IoT in Urban Space, Guimarães, Portugal

A growing trend in smart cities is the use of machine learning techniques to gather city data, formulate learning tasks and models, and use these to develop solutions to city problems. However, although these processes are sufficient for theoretical... Read More about CityFlow: Supporting Spatial-Temporal Edge Computing for Urban Machine Learning Applications.

Mobility Aware Duty Cycling Algorithm (MADCAL) in Wireless Sensor Network with Mobile Sink Node (2019)
Presentation / Conference Contribution
Thomson, C., Wadhaj, I., Tan, Z., & Al-Dubai, A. (2019, August). Mobility Aware Duty Cycling Algorithm (MADCAL) in Wireless Sensor Network with Mobile Sink Node. Presented at 2019 IEEE International Conference on Smart Internet of Things, Tianjin, China

In Wireless Sensor Networks (WSNs) the use of Mobile Sink Nodes (MSNs) has been proposed in order to negate the ”hotspot” issue. This where nodes closest to the sink node shall run out of energy fastest, affecting network lifetime. However, in using... Read More about Mobility Aware Duty Cycling Algorithm (MADCAL) in Wireless Sensor Network with Mobile Sink Node.

WaterLeakage: A Stealthy Malware for Data Exfiltration on Industrial Control Systems Using Visual Channels (2019)
Presentation / Conference Contribution
Robles-Durazno, A., Moradpoor, N., McWhinnie, J., & Russell, G. (2019, July). WaterLeakage: A Stealthy Malware for Data Exfiltration on Industrial Control Systems Using Visual Channels. Presented at 15th IEEE International Conference on Control & Automation (ICCA), Edinburgh, Scotland

Industrial Control Systems (ICS) have faced a growing number of threats over the past few years. Reliance on isolated controls networks or air-gapped computers is no longer a feasible solution when it comes to protecting ICS. It is because the new ar... Read More about WaterLeakage: A Stealthy Malware for Data Exfiltration on Industrial Control Systems Using Visual Channels.

A novel statistical analysis and autoencoder driven intelligent intrusion detection approach (2019)
Journal Article
Ieracitano, C., Adeel, A., Morabito, F. C., & Hussain, A. (2020). A novel statistical analysis and autoencoder driven intelligent intrusion detection approach. Neurocomputing, 387, 51-62. https://doi.org/10.1016/j.neucom.2019.11.016

In the current digital era, one of the most critical and challenging issues is ensuring cybersecurity in information technology (IT) infrastructures. With significant improvements in technology, hackers have been developing ever more complex and dang... Read More about A novel statistical analysis and autoencoder driven intelligent intrusion detection approach.

A Novel Real-Time, Lightweight Chaotic-Encryption Scheme for Next-Generation Audio-Visual Hearing Aids (2019)
Journal Article
Adeel, A., Ahmad, J., Larijani, H., & Hussain, A. (2020). A Novel Real-Time, Lightweight Chaotic-Encryption Scheme for Next-Generation Audio-Visual Hearing Aids. Cognitive Computation, 12, 589-601. https://doi.org/10.1007/s12559-019-09653-z

Next-generation audio-visual (AV) hearing aids stand as a major enabler to realize more intelligible audio. However, high data rate, low latency, low computational complexity, and privacy are some of the major bottlenecks to the successful deployment... Read More about A Novel Real-Time, Lightweight Chaotic-Encryption Scheme for Next-Generation Audio-Visual Hearing Aids.

Mobility Aware Duty Cycling Algorithm (MADCAL) A Dynamic Communication Threshold for Mobile Sink in Wireless Sensor Network (2019)
Journal Article
Thomson, C., Wadhaj, I., Tan, Z., & Al-Dubai, A. (2019). Mobility Aware Duty Cycling Algorithm (MADCAL) A Dynamic Communication Threshold for Mobile Sink in Wireless Sensor Network. Sensors, 19(22), Article 4930. https://doi.org/10.3390/s19224930

The hotspot issue in wireless sensor networks, with nodes nearest the sink node losing energy fastest and degrading network lifetime, is a well referenced problem. Mobile sink nodes have been proposed as a solution to this. This does not completely r... Read More about Mobility Aware Duty Cycling Algorithm (MADCAL) A Dynamic Communication Threshold for Mobile Sink in Wireless Sensor Network.

Unsupervised Anomaly Thresholding from Reconstruction Errors (2019)
Presentation / Conference Contribution
Ndubuaku, M. U., Anjum, A., & Liotta, A. (2019, October). Unsupervised Anomaly Thresholding from Reconstruction Errors. Presented at IDCS: International Conference on Internet and Distributed Computing Systems, Naples, Italy

Internet of Things (IoT) sensors generate massive streaming data which needs to be processed in real-time for many applications. Anomaly detection is one popular way to process such data and discover nuggets of information. Various machine learning t... Read More about Unsupervised Anomaly Thresholding from Reconstruction Errors.

Development of a design tool to optimise acceptance of exoskeletons by older adults (2019)
Thesis
Shore, L. Development of a design tool to optimise acceptance of exoskeletons by older adults. (Thesis). University of Limerick, Ireland. http://researchrepository.napier.ac.uk/Output/2757643

Older adults may have some prior use and knowledge of technology, but may also express or experience the digital divide, whereby the pace of emerging technology can present challenges to older adults and their ability to ‘keep up’. This can be a fact... Read More about Development of a design tool to optimise acceptance of exoskeletons by older adults.

The Importance of Authenticity in Cyber Security Training and Education (2019)
Presentation / Conference Contribution
Macfarlane, R., & Mata de Acuna, J. (2019, November). The Importance of Authenticity in Cyber Security Training and Education. Presented at JISC Security Conference, Newcastle, England

The knowledge gap between academy and industry is a challenging issue that educators face every day. In the field of cyber security, it is important that students understand the need of adapting and acquiring new skills that allow them to put their t... Read More about The Importance of Authenticity in Cyber Security Training and Education.