Skip to main content

Research Repository

Advanced Search

Low-Loss and Dual-Band Filter Inspired by Glide Symmetry Principle Over Millimeter-Wave Spectrum for 5G Cellular Networks (2023)
Journal Article
Karamirad, M., Pouyanfar, N., Alibakhshikenari, M., Ghobadi, C., Nourinia, J., See, C. H., & Falcone, F. (2023). Low-Loss and Dual-Band Filter Inspired by Glide Symmetry Principle Over Millimeter-Wave Spectrum for 5G Cellular Networks. iScience, 26(1), Article 105899. https://doi.org/10.1016/j.isci.2022.105899

This paper focuses on designing a dual-band, bandpass filter configuration inspired by glide-symmetric structures in a single plane. Geometry configuration of elliptical slots on both sides of single substrate generally affects electromagnetic fields... Read More about Low-Loss and Dual-Band Filter Inspired by Glide Symmetry Principle Over Millimeter-Wave Spectrum for 5G Cellular Networks.

Automated Algorithm Selection: from Feature-Based to Feature-Free Approaches (2023)
Journal Article
Alissa, M., Sim, K., & Hart, E. (2023). Automated Algorithm Selection: from Feature-Based to Feature-Free Approaches. Journal of Heuristics, 29(1), 1-38. https://doi.org/10.1007/s10732-022-09505-4

We propose a novel technique for algorithm-selection, applicable to optimisation domains in which there is implicit sequential information encapsulated in the data, e.g., in online bin-packing. Specifically we train two types of recurrent neural netw... Read More about Automated Algorithm Selection: from Feature-Based to Feature-Free Approaches.

Developing a Digital ForensicsTerminology Using Natural Language Processing (2022)
Conference Proceeding
Le Gall, M., Cole, C., Haynes, D., & Nic Daeid, N. (2022). Developing a Digital ForensicsTerminology Using Natural Language Processing. In M. Lykke, T. Svarre, D. Haynes, M. Skov, M. Thellesfsen, & D. Martinez-Avila (Eds.), Knowledge Organization across Disciplines, Domains, Services and Technologies: Proceedings of the Seventeenth International ISKO Conference (173-186)

Selected poems: Lorna Lloyd (2022)
Book
Ryan, B., & Hall, H. (Eds.). (2022). Selected poems: Lorna Lloyd. Edinburgh: Edinburgh Napier University

This volume comprises 37 poems by Lorna Lloyd (1914-1942) arranged by date of composition: 1928-1930 (11); early 1930s (11); mid to late 1930s (10); early 1940s (5). It was produced as an output of the AHRC Creative Informatics 'Platform to platform'... Read More about Selected poems: Lorna Lloyd.

Knowledge Organization across Disciplines, Domains, Services and Technologies: Proceedings of the Seventeenth International ISKO Conference 6–8 July 2022 Aalborg, Denmark (2022)
Conference Proceeding
(2022). Knowledge Organization across Disciplines, Domains, Services and Technologies: Proceedings of the Seventeenth International ISKO Conference 6–8 July 2022 Aalborg, Denmark. In M. Lykke, T. Svarre, D. Haynes, M. Skov, M. Thellefsen, & D. Martínez-Ávila (Eds.), . https://doi.org/10.5771/9783956509568

This book explores the latest advances in how knowledge organisation can both draw upon and inform diverse disciplines and technological developments. It explores how best to combine theory and practice, with its contents considering practical soluti... Read More about Knowledge Organization across Disciplines, Domains, Services and Technologies: Proceedings of the Seventeenth International ISKO Conference 6–8 July 2022 Aalborg, Denmark.

Big Data Analytics and Intelligent Systems for Cyber Threat Intelligence (2022)
Book
Maleh, Y., Alazab, M., Tawalbeh, L., & Romdhani, I. (Eds.). (2022). Big Data Analytics and Intelligent Systems for Cyber Threat Intelligence. Gistrup, Denmark: River Publishers

In recent years, a considerable amount of effort has been devoted to cyber-threat protection of computer systems which is one of the most critical cybersecurity tasks for single users and businesses since even a single attack can result in compromise... Read More about Big Data Analytics and Intelligent Systems for Cyber Threat Intelligence.

Post Quantum Cryptography Analysis of TLS Tunneling on a Constrained Device (2022)
Conference Proceeding
Barton, J., Pitropakis, N., Buchanan, W., Sayeed, S., & Abramson, W. (2022). Post Quantum Cryptography Analysis of TLS Tunneling on a Constrained Device. In Proceedings of the 8th International Conference on Information Systems Security and Privacy - ICISSP (551-561). https://doi.org/10.5220/0010903000003120

Advances in quantum computing make Shor’s algorithm for factorising numbers ever more tractable. This threatens the security of any cryptographic system which often relies on the difficulty of factorisation. It also threatens methods based on discret... Read More about Post Quantum Cryptography Analysis of TLS Tunneling on a Constrained Device.

Nature Inspired Optimisation for Delivery Problems: From Theory to the Real World (2022)
Book
Urquhart, N. (2022). Nature Inspired Optimisation for Delivery Problems: From Theory to the Real World. Cham: Springer. https://doi.org/10.1007/978-3-030-98108-2

This book explains classic routing and transportation problems and solutions, before offering insights based on successful real-world solutions. The chapters in Part I introduce and explain the traveling salesperson problem (TSP), vehicle routing pro... Read More about Nature Inspired Optimisation for Delivery Problems: From Theory to the Real World.

Deep Pre-trained Contrastive Self-Supervised Learning: A Cyberbullying Detection Approach with Augmented Datasets (2022)
Conference Proceeding
Alharigy, L. M., Al-Nuaim, H. A., & Moradpoor, N. (2022). Deep Pre-trained Contrastive Self-Supervised Learning: A Cyberbullying Detection Approach with Augmented Datasets. In 2022 14th International Conference on Computational Intelligence and Communication Networks (CICN). https://doi.org/10.1109/CICN56167.2022.10008274

Cyberbullying is a widespread problem that has only increased in recent years due to the massive dependence on social media. Although, there are many approaches for detecting cyberbullying they still need to be improved upon for more accurate detecti... Read More about Deep Pre-trained Contrastive Self-Supervised Learning: A Cyberbullying Detection Approach with Augmented Datasets.

High Resolution Remote Sensing Water Image Segmentation Based on Dual Branch Network (2022)
Conference Proceeding
Zhang, Z., Li, Y., Liu, Q., & Liu, X. (2022). High Resolution Remote Sensing Water Image Segmentation Based on Dual Branch Network. In 2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech). https://doi.org/10.1109/dasc/picom/cbdcom/cy55231.2022.9927756

A basic stage of hydrological research is to automatically extract water body information from high-resolution remote sensing images. Various methods based on deep learning convolutional neural networks have been proposed in recent studies to achieve... Read More about High Resolution Remote Sensing Water Image Segmentation Based on Dual Branch Network.

Browse