Skip to main content

Research Repository

Advanced Search

All Outputs (41)

Video stream analysis in clouds: An object detection and classification framework for high performance video analytics (2016)
Journal Article
Tariq, M., Anjum, A., Abdullah, T., Tariq, M. F., Baltaci, Y., & Antonopoulos, N. (2016). Video stream analysis in clouds: An object detection and classification framework for high performance video analytics. IEEE Transactions on Cloud Computing, https:/

Object detection and classification are the basic tasks in video analytics and become the starting point for other complex applications. Traditional video analytics approaches are manual and time consuming. These are subjective due to the very involv... Read More about Video stream analysis in clouds: An object detection and classification framework for high performance video analytics.

Traffic monitoring using video analytics in clouds (2015)
Conference Proceeding
Abdullah, T., Anjum, A., Tariq, M. F., Baltaci, Y., & Antonopoulos, N. (2015). Traffic monitoring using video analytics in clouds. In 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computinghttps://doi.org/10.1109/UCC.2014.12

Traffic monitoring is a challenging task on crowded roads. Traditional traffic monitoring procedures are manual, expensive, time consuming and involve human operators. They are subjective due to the very involvement of human factor and sometimes prov... Read More about Traffic monitoring using video analytics in clouds.

A critical review of the routing protocols in opportunistic networks. (2014)
Journal Article
Panneerselvam, J., Atojoko, A., Smith, K., Liu, L., & Antonopoulos, N. (2014). A critical review of the routing protocols in opportunistic networks. EAI Endorsed Transactions on Industrial Networks and Intelligent Systems, 1(1), Article e6. https://doi.org/10.4108/inis.1.1.e6

The goal of Opportunistic Networks (OppNets) is to enable message transmission in an infrastructure less environment where a reliable end-to-end connection between the hosts in not possible at all times. The role of OppNets is very crucial in today’s... Read More about A critical review of the routing protocols in opportunistic networks..

A critical comparative evaluation on DHT-based peer-to-peer search algorithms (2014)
Journal Article
Betts, A., Liu, L., Li, Z., & Antonopoulos, N. (2014). A critical comparative evaluation on DHT-based peer-to-peer search algorithms. International Journal of Embedded Systems, 6(2/3), 250-256. https://doi.org/10.1504/ijes.2014.063823

Peer-to-peer networks are becoming increasingly popular as a method of creating highly scalable and robust distributed systems. To address performance issues when scaling traditional unstructured protocols to large network sizes many protocols have b... Read More about A critical comparative evaluation on DHT-based peer-to-peer search algorithms.

Cloud BI: Future of business intelligence in the Cloud (2014)
Journal Article
Al-Aqrabi, H., Liu, L., Hill, R., & Antonopoulos, N. (2015). Cloud BI: Future of business intelligence in the Cloud. Journal of Computer and System Sciences, 81(1), 85-96. https://doi.org/10.1016/j.jcss.2014.06.013

In self-hosted environments it was feared that business intelligence (BI) will eventually face a resource crunch situation due to the never ending expansion of data warehouses and the online analytical processing (OLAP) demands on the underlying netw... Read More about Cloud BI: Future of business intelligence in the Cloud.

Virtual vignettes: the acquisition, analysis, and presentation of social network data (2014)
Journal Article
Howden, C., Liu, L., Li, Z., Li, J., & Antonopoulos, N. (2014). Virtual vignettes: the acquisition, analysis, and presentation of social network data. SCIENCE CHINA Information Sciences, 57(3), 1-20. https://doi.org/10.1007/s11432-014-5069-9

Online social networks (OSNs) are immensely prevalent and have now become a ubiquitous and important part of the modern, developed society. However, online social networks pose significant problems to digital forensic investigators who have no experi... Read More about Virtual vignettes: the acquisition, analysis, and presentation of social network data.

Approaching the Internet of things (IoT): a modelling, analysis and abstraction framework (2013)
Journal Article
Ikram, A., Anjum, A., Hill, R., Antonopoulos, N., Liu, L., & Sotiriadis, S. (2015). Approaching the Internet of things (IoT): a modelling, analysis and abstraction framework. Concurrency and Computation: Practice and Experience, 27(8), 1966-1984. https://doi.org/10.1002/cpe.3131

Summary The evolution of communication protocols, sensory hardware, mobile and pervasive devices, alongside social and cyber‐physical networks, has made the Internet of things (IoT) an interesting concept with inherent complexities as it is realised... Read More about Approaching the Internet of things (IoT): a modelling, analysis and abstraction framework.

Performance evaluation and simulation of peer-to-peer protocols for Massively Multiplayer Online Games (2013)
Journal Article
Liu, L., Jones, A., Antonopoulos, N., Ding, Z., & Zhan, Y. (2015). Performance evaluation and simulation of peer-to-peer protocols for Massively Multiplayer Online Games. Multimedia Tools and Applications, 74(8), 2763-2780. https://doi.org/10.1007/s11042-013-1662-y

Massively Multiplayer Online Games are networked games that allow a large number of people to play together. Classically MMOG worlds are hosted on many powerful servers and players that move around the world are passed from server to server as they p... Read More about Performance evaluation and simulation of peer-to-peer protocols for Massively Multiplayer Online Games.

An Investigation of Security Trends in Personal Wireless Networks (2013)
Journal Article
Liu, L., Stimpson, T., Antonopoulos, N., Ding, Z., & Zhan, Y. (2014). An Investigation of Security Trends in Personal Wireless Networks. Wireless Personal Communications, 75(3), 1669-1687. https://doi.org/10.1007/s11277-013-1386-3

Wireless networks are an integral part of day-to-day life for many people, with businesses and home users relying on them for connectivity and communication. This paper examines the problems relating to the topic of wireless security and the backgrou... Read More about An Investigation of Security Trends in Personal Wireless Networks.

Achieving green IT using VDI in cyber physical society. (2013)
Journal Article
Liu, L., DaSilva, D., Antonopoulos, N., Ding, Z., & Zhan, Y. (2013). Achieving green IT using VDI in cyber physical society. Journal of Internet Technology, 14(3), 413-424

With rapid advances in Internet technologies and increasing popularity of cyber social networks, the physical world and cyber world are gradually merging to form a new cyber-socio-physical society known as the Cyber Physical Society (CPS). In contras... Read More about Achieving green IT using VDI in cyber physical society..

Federated broker system for pervasive context provisioning (2012)
Journal Article
Kiani, S. L., Anjum, A., Knappmeyer, M., Bessis, N., & Antonopoulos, N. (2013). Federated broker system for pervasive context provisioning. Journal of Systems and Software, 86(4), 1107-1123. https://doi.org/10.1016/j.jss.2012.11.050

Software systems that provide context-awareness related functions in pervasive computing environments are gaining momentum due to emerging applications, architectures and business models. In most context-aware systems, a central broker performs the f... Read More about Federated broker system for pervasive context provisioning.

Energy Performance Assessment of Virtualization Technologies Using Small Environmental Monitoring Sensors (2012)
Journal Article
Liu, L., Masfary, O., & Antonopoulos, N. (2012). Energy Performance Assessment of Virtualization Technologies Using Small Environmental Monitoring Sensors. Sensors, 12(5), 6610-6628. https://doi.org/10.3390/s120506610

The increasing trends of electrical consumption within data centres are a growing concern for business owners as they are quickly becoming a large fraction of the total cost of ownership. Ultra small sensors could be deployed within a data centre to... Read More about Energy Performance Assessment of Virtualization Technologies Using Small Environmental Monitoring Sensors.

Context-aware service utilisation in the clouds and energy conservation (2012)
Journal Article
Kiani, S. L., Anjum, A., Antonopoulos, N., & Knappmeyer, M. (2014). Context-aware service utilisation in the clouds and energy conservation. Journal of Ambient Intelligence and Humanized Computing, 5(1), 111-131. https://doi.org/10.1007/s12652-012-0131-1

Ubiquitous computing environments are characterised by smart, interconnected artefacts embedded in our physical world that provide useful services to human inhabitants unobtrusively. Mobile devices are becoming the primary tools for human interaction... Read More about Context-aware service utilisation in the clouds and energy conservation.

Dot-base62x: building a compact and user-friendly text representation scheme of ipv6 addresses for cloud computing (2012)
Journal Article
Liu, Z., Liu, L., Hardy, J., Anjum, A., Hill, R., & Antonopoulos, N. (2012). Dot-base62x: building a compact and user-friendly text representation scheme of ipv6 addresses for cloud computing. Journal of cloud computing: advances, systems and applications, 1(1), 3. https://doi.org/10.1186/2192-113X-1-3

Cloud computing has dramatically reshaped the whole IT industry in recent years. With the transition from IPv4 to IPv6, services running in Cloud computing will face problems associated with IPv6 addressing: the notation is too long (39 bytes), there... Read More about Dot-base62x: building a compact and user-friendly text representation scheme of ipv6 addresses for cloud computing.

Adaptive service discovery on service-oriented and spontaneous sensor systems (2012)
Journal Article
Liu, L., Xu, J., Antonopoulos, N., Li, J., & Wu, K. (2012). Adaptive service discovery on service-oriented and spontaneous sensor systems. Adhoc and Sensor Wireless Networks, 14(1-2), 107-132

Natural and man-made disasters can significantly impact both people and environments. Enhanced effect can be achieved through dynamic networking of people, systems and procedures and seamless integration of them to fulfil mission objectives with serv... Read More about Adaptive service discovery on service-oriented and spontaneous sensor systems.

Distributed service integration for disaster monitoring sensor systems (2011)
Journal Article
Liu, L., Antonopoulos, N., Xu, J., Webster, D., & Wu, K. (2011). Distributed service integration for disaster monitoring sensor systems. IET Communications, 5(12), 1777-1784. https://doi.org/10.1049/iet-com.2010.0630

Sensor networks have the potential to revolutionise the capture, processing and communication of critical data for use of disaster rescue and relief. In order to provide a dependable rescue capability through dynamically integrating newly developed a... Read More about Distributed service integration for disaster monitoring sensor systems.

Efficient resource discovery in self-organized unstructured peer-to-peer networks (2008)
Journal Article
Liu, L., Antonopoulos, N., Mackin, S., Xu, J., & Russell, D. (2009). Efficient resource discovery in self-organized unstructured peer-to-peer networks. Concurrency and Computation: Practice and Experience, 21(2), 159-183. https://doi.org/10.1002/cpe.1329

In unstructured peer‐to‐peer (P2P) networks, two autonomous peer nodes can be connected if users in those nodes are interested in each other's data. Owing to the similarity between P2P networks and social networks, where peer nodes can be regarded as... Read More about Efficient resource discovery in self-organized unstructured peer-to-peer networks.

Managing peer-to-peer networks with human tactics in social interactions (2007)
Journal Article
Liu, L., Antonopoulos, N., & Mackin, S. (2008). Managing peer-to-peer networks with human tactics in social interactions. Journal of Supercomputing, 44(3), 217-236. https://doi.org/10.1007/s11227-007-0156-y

Small-world phenomena have been observed in existing peer-to-peer (P2P) networks which has proved useful in the design of P2P file-sharing systems. Most studies of constructing small world behaviours on P2P are based on the concept of clustering peer... Read More about Managing peer-to-peer networks with human tactics in social interactions.