Skip to main content

Research Repository

Advanced Search

All Outputs (242)

Near-Data Prediction Based Speculative Optimization in a Distribution Environment (2019)
Presentation / Conference Contribution
Sun, M., Wu, X., Jin, D., Xu, X., Liu, Q., & Liu, X. (2019). Near-Data Prediction Based Speculative Optimization in a Distribution Environment.

Apache Hadoop is an open source software framework that supports data-intensive distributed applications and is distributed under the Apache 2.0 licensing agreement, where consumers will no longer deal with complex configuration of softwar... Read More about Near-Data Prediction Based Speculative Optimization in a Distribution Environment.

Fuzzy-Based Distributed Protocol for Vehicle-to-Vehicle Communication (2019)
Journal Article
Hawbani, A., Torbosh, E., Wang, X., Sincak, P., Zhao, L., & Al-Dubai, A. (2021). Fuzzy-Based Distributed Protocol for Vehicle-to-Vehicle Communication. IEEE Transactions on Fuzzy Systems, 29(3), 612-626. https://doi.org/10.1109/tfuzz.2019.2957254

This paper modeled the multihop data-routing in Vehicular Ad-hoc Networks(VANET) as Multiple Criteria Decision Making (MCDM) in four steps. First, the criteria which have an impact on the performance of the network layer are captured and transformed... Read More about Fuzzy-Based Distributed Protocol for Vehicle-to-Vehicle Communication.

Developing GDPR Compliant User Data Policies for Internet of Things (2019)
Presentation / Conference Contribution
Barati, M., Petri, I., & Rana, O. F. (2019, December). Developing GDPR Compliant User Data Policies for Internet of Things. Presented at UCC '19: IEEE/ACM 12th International Conference on Utility and Cloud Computing, Auckland, New Zealand

With recent adoption of Internet of Things (IoT) technologies and their use in industry, user data privacy concerns remain a major preoccupation of regulation bodies. The European General Data Protection Regulation (GDPR) enables users to control the... Read More about Developing GDPR Compliant User Data Policies for Internet of Things.

A Novel Trust Evaluation Process for Secure Localization using a Decentralized Blockchain in Wireless Sensor Networks (2019)
Journal Article
Kim, T., Goyat, R., Rai, M. K., Kumar, G., Buchanan, W. J., Saha, R., & Thomas, R. (2019). A Novel Trust Evaluation Process for Secure Localization using a Decentralized Blockchain in Wireless Sensor Networks. IEEE Access, 7, 184133-184144. https://doi.org/10.1109/access.2019.2960609

In this research paper, blockchain-based trust management model is proposed to enhance trust relationship among beacon nodes and to eradicate malicious nodes in Wireless Sensor Networks (WSNs). This composite trust evaluation involves behavioral-base... Read More about A Novel Trust Evaluation Process for Secure Localization using a Decentralized Blockchain in Wireless Sensor Networks.

A Secure Occupational Therapy Framework for Monitoring Cancer Patients’ Quality of Life (2019)
Journal Article
Abdur Rahman, M., Rashid, M. M., Le Kernec, J., Philippe, B., Barnes, S. J., Fioranelli, F., Yang, S., Romain, O., Abbasi, Q. H., Loukas, G., & Imran, M. (2019). A Secure Occupational Therapy Framework for Monitoring Cancer Patients’ Quality of Life. Sensors, 19(23), Article 5258. https://doi.org/10.3390/s19235258

Once diagnosed with cancer, a patient goes through a series of diagnosis and tests, which are referred to as “after cancer treatment”. Due to the nature of the treatment and side effects, maintaining quality of life (QoL) in the home environment is a... Read More about A Secure Occupational Therapy Framework for Monitoring Cancer Patients’ Quality of Life.

Evaluating the real-world performance of 5G fixed wireless broadband in rural areas (2019)
Presentation / Conference Contribution
Abozariba, R., Davies, E., Broadbent, M., & Race, N. (2019). Evaluating the real-world performance of 5G fixed wireless broadband in rural areas. In 2019 IEEE 2nd 5G World Forum (5GWF) (465-470). https://doi.org/10.1109/5GWF.2019.8911655

Rural communities are often neglected in the rollout of communication infrastructure, delaying or even preventing the delivery of common digital services that are now ubiquitous in modern society. Addressing this technological gap is of paramount imp... Read More about Evaluating the real-world performance of 5G fixed wireless broadband in rural areas.

Cloud-assisted Adaptive Stream Processing from Discriminative Representations (2019)
Presentation / Conference Contribution
Ndubuaku, M., Anjum, A., & Liotta, A. Cloud-assisted Adaptive Stream Processing from Discriminative Representations. . https://doi.org/10.1109/smc.2019.8914227

As the streaming data generated by Internet of Things (IoT) ubiquitous sensors grow in massive scale, extracting interesting information (anomalies) in real-time becomes more challenging. Traditional systems which retrospectively perform all the proc... Read More about Cloud-assisted Adaptive Stream Processing from Discriminative Representations.

Novel Fuzzy and Game Theory Based Clustering and Decision Making for VANETs (2019)
Journal Article
Alsarhan, A., Kilani, Y., Al-Dubai, A., Zomaya, A. Y., & Hussain, A. (2020). Novel Fuzzy and Game Theory Based Clustering and Decision Making for VANETs. IEEE Transactions on Vehicular Technology, 69(2), 1568-1581. https://doi.org/10.1109/TVT.2019.2956228

Different studies have recently emphasized the importance of deploying clustering schemes in Vehicular ad hoc Network (VANET) to overcome challenging problems related to scalability, frequent topology changes, scarcity of spectrum resources, maintain... Read More about Novel Fuzzy and Game Theory Based Clustering and Decision Making for VANETs.

MRC4: A Modified RC4 Algorithm using Symmetric Random Function Generator for Improved Cryptographic Features (2019)
Journal Article
Saha, R., Geetha, G., Kumar, G., Kim, T.-H., & Buchanan, W. J. (2019). MRC4: A Modified RC4 Algorithm using Symmetric Random Function Generator for Improved Cryptographic Features. IEEE Access, 7, 172045-172054. https://doi.org/10.1109/access.2019.2956160

The Rivest Cipher 4 (RC4) has been one of the most popular stream ciphers for providing symmetric key encryption, and is now proposed as an efficient cipher within light-weight cryptography. As an algorithm it has been considered to be one of the fas... Read More about MRC4: A Modified RC4 Algorithm using Symmetric Random Function Generator for Improved Cryptographic Features.

Networking as an information behaviour during job search: an study of active jobseekers in the Scottish youth labour market (2019)
Journal Article
Mowbray, J., & Hall, H. (2020). Networking as an information behaviour during job search: an study of active jobseekers in the Scottish youth labour market. Journal of Documentation, 76(2), 424-439. https://doi.org/10.1108/JD-05-2019-0086

Purpose - Although social networks are considered influential to employment outcomes, little is known about the behavioural manifestation of networking during job search. To address this, the study presented here examined the role of networking among... Read More about Networking as an information behaviour during job search: an study of active jobseekers in the Scottish youth labour market.

Teaching the process of building an Intrusion Detection System using data from a small-scale SCADA testbed (2019)
Journal Article
Maglaras, L., Cruz, T., Ferrag, M. A., & Janicke, H. (2020). Teaching the process of building an Intrusion Detection System using data from a small-scale SCADA testbed. Internet Technology Letters, 3(1), Article e132. https://doi.org/10.1002/itl2.132

Security of Critical National Infrastructures (CNI) is one of the major concerns to countries both in a European and in a worldwide level. Training on scenarios that involve such systems is important to the effective handling of incidents. Experienti... Read More about Teaching the process of building an Intrusion Detection System using data from a small-scale SCADA testbed.

Machine Learning for Health and Social Care Demographics in Scotland (2019)
Presentation / Conference Contribution
Buchanan, W. J., Smales, A., Lawson, A., & Chute, C. (2019, November). Machine Learning for Health and Social Care Demographics in Scotland. Paper presented at HEALTHINFO 2019, Valencia, Spain

This paper outlines an extensive study of applying machine learning to the analysis of publicly available health and social care data within Scotland, with a focus on learning the most significant variables involved in key health care outcome factors... Read More about Machine Learning for Health and Social Care Demographics in Scotland.

Estimating the Relative Speed of RF Jammers in VANETs (2019)
Journal Article
Kosmanos, D., Argyriou, A., & Maglaras, L. (2019). Estimating the Relative Speed of RF Jammers in VANETs. Security and Communication Networks, 2019, Article 2064348. https://doi.org/10.1155/2019/2064348

Vehicular Ad Hoc Networks (VANETs) aim at enhancing road safety and providing a comfortable driving environment by delivering early warning and infotainment messages to the drivers. Jamming attacks, however, pose a significant threat to their perform... Read More about Estimating the Relative Speed of RF Jammers in VANETs.

Personalized Micro-Service Recommendation System for Online News (2019)
Presentation / Conference Contribution
Asenova, M., & Chrysoulas, C. (2019, November). Personalized Micro-Service Recommendation System for Online News. Presented at The 6th International Symposium on Emerging Information, Communication and Networks (EICN 2019), Coimbra, Portugal

In the era of artificial intelligence and high technology advance our life is dependent on them in every aspect. The dynamic environment forces us to plan our time with conscious and every minute is valuable. To help individuals and corporations see... Read More about Personalized Micro-Service Recommendation System for Online News.

A Secure and Robust Image Hashing Scheme Using Gaussian Pyramids (2019)
Journal Article
Bashir, I., Ahmed, F., Ahmad, J., Boulila, W., & Alharbi, N. (2019). A Secure and Robust Image Hashing Scheme Using Gaussian Pyramids. Entropy, 21(11), Article 1132. https://doi.org/10.3390/e21111132

Image hash is an alternative to cryptographic hash functions for checking integrity of digital images. Compared to cryptographic hash functions, an image hash or a Perceptual Hash Function (PHF) is resilient to content preserving distortions and sens... Read More about A Secure and Robust Image Hashing Scheme Using Gaussian Pyramids.

UrbanIxD: From Ethnography to Speculative Design Fictions for the Hybrid City (2019)
Presentation / Conference Contribution
Stals, S., Smyth, M., & Mival, O. (2019). UrbanIxD: From Ethnography to Speculative Design Fictions for the Hybrid City. In Proceedings of the Halfway to the Future Symposium 2019. https://doi.org/10.1145/3363384.3363486

This paper presents research in the field of Urban Interaction Design which seeks to understand how people's personal, emotional relationships with urban places could potentially inform the design of new technological devices and services. A Speculat... Read More about UrbanIxD: From Ethnography to Speculative Design Fictions for the Hybrid City.

How Can We Balance Research, Participation and Innovation as HCI Researchers? (2019)
Presentation / Conference Contribution
Lechelt, S., Elsden, C., Helgason, I., Panneels, I., Smyth, M., Speed, C., & Terras, M. (2019, November). How Can We Balance Research, Participation and Innovation as HCI Researchers?. Presented at The Halfway to the Future Symposium 2019, Nottingham, UK

This paper reflects upon the growing expectation for HCI research projects to collaborate closely with partners in industry and civil society. Specifically, we suggest that this type of engagement is often prefigured around the agendas, needs and cap... Read More about How Can We Balance Research, Participation and Innovation as HCI Researchers?.

Intermediated Reality (2019)
Presentation / Conference Contribution
Casas, L. (2019, November). Intermediated Reality. Presented at SA '19: SIGGRAPH Asia 2019, Brisbane, QLD, Australia

This thesis explores technical solutions to address the gap between the virtual and physical worlds towards photo-realistic interactive Augmented Reality (AR). As mobile network bandwidth increases, latencies reduce and graphics processing power beco... Read More about Intermediated Reality.

A Cognitively Inspired System Architecture for the Mengshi Cognitive Vehicle (2019)
Journal Article
Zhang, X., Zhou, M., Liu, H., & Hussain, A. (2020). A Cognitively Inspired System Architecture for the Mengshi Cognitive Vehicle. Cognitive Computation, 12(1), 140-149. https://doi.org/10.1007/s12559-019-09692-6

This paper introduces the functional system architecture of the Mengshi intelligent vehicle, winner of the 2018 World Intelligent Driving Challenge (WIDC). Different from traditional smart vehicles, a cognitive module is introduced in the system arch... Read More about A Cognitively Inspired System Architecture for the Mengshi Cognitive Vehicle.

Recycling a Landmark Dataset for Real-time Facial Capture and Animation with Low Cost HMD Integrated Cameras (2019)
Presentation / Conference Contribution
Dos Santos Brito, C. J., & Mitchell, K. (2019, November). Recycling a Landmark Dataset for Real-time Facial Capture and Animation with Low Cost HMD Integrated Cameras. Presented at VRCAI ’19, Brisbane, QLD, Australia

Preparing datasets for use in the training of real-time face tracking algorithms for HMDs is costly. Manually annotated facial landmarks are accessible for regular photography datasets, but introspectively mounted cameras for VR face tracking have in... Read More about Recycling a Landmark Dataset for Real-time Facial Capture and Animation with Low Cost HMD Integrated Cameras.