Skip to main content

Research Repository

Advanced Search

All Outputs (4095)

An RPL based Optimal Sensors placement in Pipeline Monitoring WSNs (2021)
Presentation / Conference Contribution
Wadhaj, I., Thomson, C., & Ghaleb, B. (2021, June). An RPL based Optimal Sensors placement in Pipeline Monitoring WSNs. Presented at International Conference on Emerging Technologies and Intelligent Systems (ICETIS 2021), Online

Compared to an ordinary sensor network, Linear Sensor Networks (LSNs) has many applications in a number of areas such as surveillance and monitoring of international boundaries for illegal crossing, river environment monitoring and roads monitoring e... Read More about An RPL based Optimal Sensors placement in Pipeline Monitoring WSNs.

Wireless Sensor Networks (WSN) in Oil and Gas Industry: Applications, Requirements and Existing Solutions (2021)
Presentation / Conference Contribution
Wadhaj, I., Ghaleb, B., & Thomson, C. (2021, June). Wireless Sensor Networks (WSN) in Oil and Gas Industry: Applications, Requirements and Existing Solutions. Presented at International Conference on Emerging Technologies and Intelligent Systems (ICETIS 2021), Online

Effective measurement and monitoring of certain parameters (temperature, pressure, flow etc.) is crucial for the safety and optimization of processes in the Oil and Gas Industry. Wired sensors have been extensively utilized for this purpose but are c... Read More about Wireless Sensor Networks (WSN) in Oil and Gas Industry: Applications, Requirements and Existing Solutions.

Browsers’ Private Mode: Is It What We Were Promised? (2021)
Journal Article
Hughes, K., Papadopoulos, P., Pitropakis, N., Smales, A., Ahmad, J., & Buchanan, W. J. (2021). Browsers’ Private Mode: Is It What We Were Promised?. Computers, 10(12), Article 165. https://doi.org/10.3390/computers10120165

Web browsers are one of the most used applications on every computational device in our days. Hence, they play a pivotal role in any forensic investigation and help determine if nefarious or suspicious activity has occurred on that device. Our study... Read More about Browsers’ Private Mode: Is It What We Were Promised?.

Mapping the Anthropocene: The Harrisons’ and The Deep Wealth of this Nation, Scotland (2021)
Book Chapter
Panneels, I. (2021). Mapping the Anthropocene: The Harrisons’ and The Deep Wealth of this Nation, Scotland. In C. Travis, & V. Valentino (Eds.), Narratives in the Anthropocene era (321-342). Il Silent Edizioni

Mapping the Anthropocene considers The Deep Wealth of this Nation, Scotland (2018) by eco-art pioneers Helen Mayer and Newton Harrison. Known as the Harrisons, they deploy mapping to explore how a future Scotland could thrive and create surplus of ec... Read More about Mapping the Anthropocene: The Harrisons’ and The Deep Wealth of this Nation, Scotland.

Attributes Guided Feature Learning for Vehicle Re-Identification (2021)
Journal Article
Li, H., Lin, X., Zheng, A., Li, C., Luo, B., He, R., & Hussain, A. (2022). Attributes Guided Feature Learning for Vehicle Re-Identification. IEEE Transactions on Emerging Topics in Computational Intelligence, 6(5), 1211-1221. https://doi.org/10.1109/tetci.2021.3127906

Vehicle Re-ID has recently attracted enthusiastic attention due to its potential applications in smart city and urban surveillance. However, it suffers from large intra-class variation caused by view variations and illumination changes, and inter-cla... Read More about Attributes Guided Feature Learning for Vehicle Re-Identification.

A new color image encryption technique using DNA computing and Chaos-based substitution box (2021)
Journal Article
Ahmad, J., Masood, F., Masood, J., Zhang, L., Shaukat Jamal, S., Boulila, W., Rehman, S. U., & Khan, F. A. (2022). A new color image encryption technique using DNA computing and Chaos-based substitution box. Soft Computing, 26(16), 7461-7477. https://doi.org/10.1007/s00500-021-06459-w

In many cases, images contain sensitive information and patterns that require secure processing to avoid risk. It can be accessed by unauthorized users who can illegally exploit them to threaten the safety of people’s life and property. Protecting th... Read More about A new color image encryption technique using DNA computing and Chaos-based substitution box.

A Survey of Semantic Construction and Application of Satellite Remote Sensing Images and Data (2021)
Journal Article
Lu, H., Liu, Q., Liu, X., & Zhang, Y. (2021). A Survey of Semantic Construction and Application of Satellite Remote Sensing Images and Data. Journal of Organizational and End User Computing, 33(6), Article 6. https://doi.org/10.4018/joeuc.20211101.oa6

With the rapid development of satellite technology, remote sensing data has entered the era of big data, and the intelligent processing of remote sensing image has been paid more and more attention. Through the semantic research of remote sensing dat... Read More about A Survey of Semantic Construction and Application of Satellite Remote Sensing Images and Data.

CAPE: Context-Aware Private Embeddings for Private Language Learning (2021)
Presentation / Conference Contribution
Plant, R., Gkatzia, D., & Giuffrida, V. (2021, November). CAPE: Context-Aware Private Embeddings for Private Language Learning. Presented at EMNLP 2021 Conference, Punta Cana, Dominican Republic [Online]

Neural language models have contributed to state-of-the-art results in a number of downstream applications including sentiment analysis, intent classification and others. However, obtaining text representations or embeddings using these models risks... Read More about CAPE: Context-Aware Private Embeddings for Private Language Learning.

What happens if you treat ordinal ratings as interval data? Human evaluations in {NLP} are even more under-powered than you think (2021)
Presentation / Conference Contribution
Howcroft, D. M., & Rieser, V. (2021, November). What happens if you treat ordinal ratings as interval data? Human evaluations in {NLP} are even more under-powered than you think. Presented at 2021 Conference on Empirical Methods in Natural Language Processing

Previous work has shown that human evaluations in NLP are notoriously under-powered. Here, we argue that there are two common factors which make this problem even worse: NLP studies usually (a) treat ordinal data as interval data and (b) operate unde... Read More about What happens if you treat ordinal ratings as interval data? Human evaluations in {NLP} are even more under-powered than you think.

A security and authentication layer for SCADA/DCS applications (2021)
Journal Article
Homay, A., Chrysoulas, C., El Boudani, B., de Sousa, M., & Wollschlaeger, M. (2021). A security and authentication layer for SCADA/DCS applications. Microprocessors and Microsystems, 87, Article 103479. https://doi.org/10.1016/j.micpro.2020.103479

Mid 2010, a sophisticated malicious computer worm called Stuxnet targeted major ICS systems around the world causing severe damages to Siemens automation products. Stuxnet proved its ability to infect air-gapped-segregated critical computers control... Read More about A security and authentication layer for SCADA/DCS applications.

Disembodied Voice (2021)
Exhibition / Performance
Di Donato, B. Disembodied Voice. [Music Performance]. Performed at Naples (Italy). 27 November 2021 - 27 November 2021

Disembodied Voice, for live electronics and voice, uses of electroacoustic technologies to disembody the voice from its singer.
The singer will articulate and conduct her voice across the audience through the embodiment of sound manipulations.
The... Read More about Disembodied Voice.

A VMD and LSTM based hybrid model of load forecasting for power grid security (2021)
Journal Article
Lv, L., Wu, Z., Zhang, J., Tan, Z., Zhang, L., & Tian, Z. (2022). A VMD and LSTM based hybrid model of load forecasting for power grid security. IEEE Transactions on Industrial Informatics, 18(9), 6474-6482. https://doi.org/10.1109/tii.2021.3130237

As the basis for the static security of the power grid, power load forecasting directly affects the safety of grid operation, the rationality of grid planning, and the economy of supply-demand balance. However, various factors lead to drastic changes... Read More about A VMD and LSTM based hybrid model of load forecasting for power grid security.

Intrusion Detection Framework for the Internet of Things Using a Dense Random Neural Network (2021)
Journal Article
Latif, S., Huma, Z. E., Jamal, S. S., Ahmed, F., Ahmad, J., Zahid, A., Dashtipour, K., Aftab, M. U., Ahmad, M., & Abbasi, Q. H. (2022). Intrusion Detection Framework for the Internet of Things Using a Dense Random Neural Network. IEEE Transactions on Industrial Informatics, 18(9), 6435-6444. https://doi.org/10.1109/tii.2021.3130248

The Internet of Things (IoT) devices, networks, and applications have become an integral part of modern societies. Despite their social, economic, and industrial benefits, these devices and networks are frequently targeted by cybercriminals. Hence, I... Read More about Intrusion Detection Framework for the Internet of Things Using a Dense Random Neural Network.

Blockchain-Based Authentication and Registration Mechanism for SIP-Based VoIP Systems (2021)
Presentation / Conference Contribution
Abubakar, M., Jaroucheh, Z., Al Dubai, A., & Buchanan, W. (2021, October). Blockchain-Based Authentication and Registration Mechanism for SIP-Based VoIP Systems. Presented at 2021 5th Cyber Security in Networking Conference (CSNet), Abu Dhabi, United Arab Emirates

The Session Initiation Protocol (SIP) is the principal signalling protocol in Voice over IP (VoIP) systems, responsible for initialising, terminating, and maintaining sessions amongst call parties. However, the problem with the SIP protocol is that i... Read More about Blockchain-Based Authentication and Registration Mechanism for SIP-Based VoIP Systems.

When will Immersive Virtual Reality have its day? Challenges to IVR adoption in the home as exposed in studies with teenagers, parents and experts (2021)
Journal Article
Hall, L., Paracha, S., Mitsche, N., Flint, T., Stewart, F., MacFarlane, K., & Hagan-Green, G. (2022). When will Immersive Virtual Reality have its day? Challenges to IVR adoption in the home as exposed in studies with teenagers, parents and experts. Presence: Teleoperators and Virtual Environments, 28, 169-201. https://doi.org/10.1162/pres_a_00347

In response to the pandemic, many countries have had multiple lockdowns punctuated by partial freedoms limiting physically being together. In 2020-21, during the COVID-19 pandemic parents were stressed and exhausted by the challenges of work, home sc... Read More about When will Immersive Virtual Reality have its day? Challenges to IVR adoption in the home as exposed in studies with teenagers, parents and experts.

Scotland’s History of Animation: An Exploratory Account of the Key Figures and Influential Events (2021)
Journal Article
Mortimer, J., Pilcher, N., & Richards, K. (2021). Scotland’s History of Animation: An Exploratory Account of the Key Figures and Influential Events. Animation, 16(3), 190-206. https://doi.org/10.1177/17468477211052598

Scotland’s history of animation is a forgotten past accomplishment in the animation/VFX sector, with key influential animation professionals having had an impact both at home and abroad. Yet, to date, this history has not been meaningfully documented... Read More about Scotland’s History of Animation: An Exploratory Account of the Key Figures and Influential Events.

Disembodied Voice (2021)
Exhibition / Performance
Di Donato, B. Disembodied Voice. [Live performance]. Performed at Matera Intermedia Festival 2021, Matera, Italy. 21 November 2021 - 5 December 2021

Disembodied Voice, for live electronics and voice, uses of electroacoustic technologies to disembody the voice from its singer.
The singer will articulate and conduct her voice across the audience through the embodiment of sound manipulations.
The... Read More about Disembodied Voice.

A Novel Fingerprinting Technique for Data Storing and Sharing through Clouds (2021)
Journal Article
Fatima, M., Nisar, M. W., Rashid, J., Kim, J., Kamran, M., & Hussain, A. (2021). A Novel Fingerprinting Technique for Data Storing and Sharing through Clouds. Sensors, 21(22), Article 7647. https://doi.org/10.3390/s21227647

With the emerging growth of digital data in information systems, technology faces the challenge of knowledge prevention, ownership rights protection, security, and privacy measurement of valuable and sensitive data. On-demand availability of various... Read More about A Novel Fingerprinting Technique for Data Storing and Sharing through Clouds.

Architecture-aware Precision Tuning with Multiple Number Representation Systems (2021)
Presentation / Conference Contribution
Cattaneo, D., Chiari, M., Fossati, N., Cherubin, S., & Agosta, G. (2021, December). Architecture-aware Precision Tuning with Multiple Number Representation Systems. Presented at 2021 58th ACM/IEEE Design Automation Conference (DAC), San Francisco, CA, USA

Precision tuning trades accuracy for speed and energy savings, usually by reducing the data width, or by switching from floating point to fixed point representations. However, comparing the precision across different representations is a difficult ta... Read More about Architecture-aware Precision Tuning with Multiple Number Representation Systems.