Skip to main content

Research Repository

Advanced Search

All Outputs (4204)

Towards Faster Training Algorithms Exploiting Bandit Sampling From Convex to Strongly Convex Conditions (2022)
Journal Article
Zhou, Y., Huang, K., Cheng, C., Wang, X., Hussain, A., & Liu, X. (2023). Towards Faster Training Algorithms Exploiting Bandit Sampling From Convex to Strongly Convex Conditions. IEEE Transactions on Emerging Topics in Computational Intelligence, 7(2), 565-577. https://doi.org/10.1109/tetci.2022.3171797

The training process for deep learning and pattern recognition normally involves the use of convex and strongly convex optimization algorithms such as AdaBelief and SAdam to handle lots of “uninformative” samples that should be ignored, thus incurrin... Read More about Towards Faster Training Algorithms Exploiting Bandit Sampling From Convex to Strongly Convex Conditions.

RoadSeg-CD: A Network With Connectivity Array and Direction Map for Road Extraction From SAR Images (2022)
Journal Article
Gao, F., Tu, J., Wang, J., Hussain, A., & Zhou, H. (2022). RoadSeg-CD: A Network With Connectivity Array and Direction Map for Road Extraction From SAR Images. IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing, 15, 3992-4003. https://doi.org/10.1109/jstars.2022.3175594

Road extraction from synthetic aperture radar (SAR) images has attracted much attention in the field of remote sensing image processing. General road extraction algorithms, affected by shadows of buildings and trees, are prone to producing fragmented... Read More about RoadSeg-CD: A Network With Connectivity Array and Direction Map for Road Extraction From SAR Images.

A Secure and Lightweight Chaos Based Image Encryption Scheme (2022)
Journal Article
Ali Khan, F., Ahmed, J., Alqahtani, F., Alsuhibany, S. A., Ahmed, F., & Ahmad, J. (2022). A Secure and Lightweight Chaos Based Image Encryption Scheme. Computers, Materials & Continua, 73(1), 279-294. https://doi.org/10.32604/cmc.2022.028789

In this paper, we present an image encryption scheme based on the multi-stage chaos-based image encryption algorithm. The method works on the principle of confusion and diffusion. The proposed scheme containing both confusion and diffusion modules ar... Read More about A Secure and Lightweight Chaos Based Image Encryption Scheme.

A Highly Secured Image Encryption Scheme using Quantum Walk and Chaos (2022)
Journal Article
Kamran, M. I., Khan, M. A., Alsuhibany, S. A., Ghadi, Y. Y., Arshad, Arif, J., & Ahmad, J. (2022). A Highly Secured Image Encryption Scheme using Quantum Walk and Chaos. Computers, Materials & Continua, 73(1), 657-672. https://doi.org/10.32604/cmc.2022.028876

The use of multimedia data sharing has drastically increased in the past few decades due to the revolutionary improvements in communication technologies such as the 4th generation (4G) and 5th generation (5G) etc. Researchers have proposed many image... Read More about A Highly Secured Image Encryption Scheme using Quantum Walk and Chaos.

An exploration of academic identity through the COVID-19 pandemic (2022)
Journal Article
Smith, S., Plum, K., Taylor-Smith, E., & Fabian, K. (2022). An exploration of academic identity through the COVID-19 pandemic. Journal of Further and Higher Education, 46(9), 1290-1303. https://doi.org/10.1080/0309877X.2022.2072194

The COVID-19 global pandemic precipitated migration to online learning and teaching for students and universities. This study explored the change in self-identification in an academic role through the significant disruption caused by the urgent migra... Read More about An exploration of academic identity through the COVID-19 pandemic.

A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions (2022)
Journal Article
Kumar, A., Saha, R., Conti, M., Kumar, G., Buchanan, W. J., & Kim, T. H. (2022). A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions. Journal of Network and Computer Applications, 204, Article 103414. https://doi.org/10.1016/j.jnca.2022.103414

Internet of Thing (IoT) is one of the most influential technologies in the present time. People, processes, and things are connected with the Internet through IoT. With the increasing demands of user applications, the number of connections is also in... Read More about A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions.

E12 - 'Lorna Lloyd's Poetry' Episode 4 (2022)
Digital Artefact
Ryan, B., Hall, H., & McGregor, I. (2022). E12 - 'Lorna Lloyd's Poetry' Episode 4. [Podcast]

This is episode 4 of Lorna Lloyd’s poetry, a bonus episode of Lorna Lloyd’s ‘Diary of the war’. This episode features Lorna’s poetry from the early 1940s.

E06 - 'Diary of the war' episode 6 (2022)
Digital Artefact
Ryan, B., Hall, H., & McGregor, I. (2022). E06 - 'Diary of the war' episode 6. [Podcast]

This is episode 6 of Lorna Lloyd’s ‘Diary of the war’, also including contemporaneous news (courtesy BBC Archive, British Newspaper Archive/FindMyPast/British Library). This episode covers mid-May to early August 1940.

E08 - 'Diary of the war' episode 8 (2022)
Digital Artefact
Ryan, B., Hall, H., & McGregor, I. (2022). E08 - 'Diary of the war' episode 8. [Podcast]

This is episode 8 of Lorna Lloyd’s ‘Diary of the war’, also including contemporaneous news (courtesy BBC Archive, British Newspaper Archive/FindMyPast/British Library). This episode covers late December 1940 to February 1942.

A New Intrusion Detection System for the Internet of Things via Deep Convolutional Neural Network and Feature Engineering (2022)
Journal Article
Ullah, S., Ahmad, J., Khan, M. A., Alkhammash, E. H., Hadjouni, M., Ghadi, Y. Y., Saeed, F., & Pitropakis, N. (2022). A New Intrusion Detection System for the Internet of Things via Deep Convolutional Neural Network and Feature Engineering. Sensors, 22(10), Article 3607. https://doi.org/10.3390/s22103607

The Internet of Things (IoT) is a widely used technology in automated network systems across the world. The impact of the IoT on different industries has occurred in recent years. Many IoT nodes collect, store, and process personal data, which is an... Read More about A New Intrusion Detection System for the Internet of Things via Deep Convolutional Neural Network and Feature Engineering.

E02 - 'Diary of the war' episode 2 (2022)
Digital Artefact
Ryan, B., Hall, H., & McGregor, I. (2022). E02 - 'Diary of the war' episode 2. [Podcast]

This is episode 2 of Lorna Lloyd’s ‘Diary of the war’, also including contemporaneous news (courtesy BBC Archive, British Newspaper Archive/FindMyPast/British Library). This episode covers mid- to late September 1939.

E01 - 'Diary of the war' episode 1 (2022)
Digital Artefact
Ryan, B., Hall, H., & McGregor, I. (2022). E01 - 'Diary of the war' episode 1. [Podcast]

This is episode 1 of Lorna Lloyd’s ‘Diary of the war’, also including contemporaneous news (courtesy BBC Archive, British Newspaper Archive/FindMyPast/British Library). This episode covers early September 1939.

E05 - 'Diary of the war' episode 5 (2022)
Digital Artefact
Ryan, B., Hall, H., & McGregor, I. (2022). E05 - 'Diary of the war' episode 5. [Podcast]

This is episode 5 of Lorna Lloyd’s ‘Diary of the war’, also including contemporaneous news (courtesy BBC Archive, British Newspaper Archive/FindMyPast/British Library). This episode covers April and early May 1940.

E04 - 'Diary of the war' episode 4 (2022)
Digital Artefact
Ryan, B., Hall, H., & McGregor, I. (2022). E04 - 'Diary of the war' episode 4. [Podcast]

This is episode 4 of Lorna Lloyd’s ‘Diary of the war’, also including contemporaneous news (courtesy BBC Archive, British Newspaper Archive/FindMyPast/British Library). This episode covers December 1939 to March 1940.

E07 - 'Diary of the war' episode 7 (2022)
Digital Artefact
Ryan, B., Hall, H., & McGregor, I. (2022). E07 - 'Diary of the war' episode 7. [Podcast]

This is episode 7 of Lorna Lloyd’s ‘Diary of the war’, also including contemporaneous news (courtesy BBC Archive, British Newspaper Archive/FindMyPast/British Library). This episode covers mid-August to mid-December 1940.

E10 - 'Lorna Lloyd's Poetry' Episode 2 (2022)
Digital Artefact
Ryan, B., Hall, H., & McGregor, I. (2022). E10 - 'Lorna Lloyd's Poetry' Episode 2. [Podcast]

This is episode 2 of Lorna Lloyd’s poetry, a bonus episode of Lorna Lloyd’s ‘Diary of the war’. This episode features Lorna’s poetry from the early 1930s.

E03 - 'Diary of the war' episode 3 (2022)
Digital Artefact
Ryan, B., Hall, H., & McGregor, I. (2022). E03 - 'Diary of the war' episode 3. [Podcast]

This is episode 3 of Lorna Lloyd’s ‘Diary of the war’, also including contemporaneous news (courtesy BBC Archive, British Newspaper Archive/FindMyPast/British Library). This episode covers October to November 1939.

E09 - 'Lorna Lloyd's Poetry' Episode 1 (2022)
Digital Artefact
Ryan, B., Hall, H., & McGregor, I. (2022). E09 - 'Lorna Lloyd's Poetry' Episode 1. [Podcast]

This is episode 1 of Lorna Lloyd’s poetry, a bonus episode of Lorna Lloyd’s ‘Diary of the war’. This episode features Lorna’s poetry from 1928 to 1930.

E11 - 'Lorna Lloyd's Poetry' Episode 3 (2022)
Digital Artefact
Ryan, B., Hall, H., & McGregor, I. (2022). E11 - 'Lorna Lloyd's Poetry' Episode 3. [Podcast]

This is episode 3 of Lorna Lloyd’s poetry, a bonus episode of Lorna Lloyd’s ‘Diary of the war’. This episode features Lorna’s poetry from the mid- to late 1930s.

The public library as public sphere: a longitudinal analysis (2022)
Journal Article
Appleton, L., & Hall, H. (2023). The public library as public sphere: a longitudinal analysis. Journal of Documentation, 79(1), 112-126. https://doi.org/10.1108/JD-02-2022-0031

Purpose The research was undertaken to explore the role of the UK public library as a public sphere and the ways in which this role relates to the epistemic, community and political functions of public libraries. Design/methodology/approach A lo... Read More about The public library as public sphere: a longitudinal analysis.