Skip to main content

Research Repository

Advanced Search

All Outputs (630)

Dynamic Packet Content Construction and Processing for End-to-End Streaming in 6G (2023)
Presentation / Conference Contribution
Clayman, S., Karakış, E., Tüker, M., Ak, E., Canberk, B., & Sayıt, M. (2023, November). Dynamic Packet Content Construction and Processing for End-to-End Streaming in 6G. Presented at 2023 IEEE 28th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), Edinburgh, United Kingdom

In the context of 6G, the use of drones / UAVs and satellite is a high priority. One of the main issues is that there is limited and varying bandwidth in these environments, so the question arises: how do we provide high Quality of Experience (QoE) t... Read More about Dynamic Packet Content Construction and Processing for End-to-End Streaming in 6G.

A distributed user-oriented IoT-based Air Pollution Monitoring (2023)
Presentation / Conference Contribution
Jorge, J., Figueroa, F., Shen, H., Ahmadi, H., & Canberk, B. (2023, November). A distributed user-oriented IoT-based Air Pollution Monitoring. Presented at 2023 IEEE 28th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), Edinburgh, United Kingdom

Environmental health services are paramount for ensuring the Quality of Life (QoL) in cities, with urban design playing a pivotal role. The rapid urbanization of cities globally has exacerbated air pollution, posing severe health risks to residents.... Read More about A distributed user-oriented IoT-based Air Pollution Monitoring.

Opportunistic RL-based WiFi Access for Aerial Sensor Nodes in Smart City Applications (2023)
Presentation / Conference Contribution
Ariman, M., Cakir, L. V., Özdem, M., & Canberk, B. (2023, July). Opportunistic RL-based WiFi Access for Aerial Sensor Nodes in Smart City Applications. Presented at 2023 International Conference on Smart Applications, Communications and Networking (SmartNets), Istanbul, Turkiye

Unmanned air vehicles are becoming widespread, driven by improved wireless technologies. However, the WiFi technology used for communication has a highly crowded and unevenly distributed channel occupancy in its spectrum. To overcome this, WiFi resou... Read More about Opportunistic RL-based WiFi Access for Aerial Sensor Nodes in Smart City Applications.

How to synchronize Digital Twins? A Communication Performance Analysis (2023)
Presentation / Conference Contribution
Cakir, L. V., Al-Shareeda, S., Oktug, S. F., Özdem, M., Broadbent, M., & Canberk, B. (2023, November). How to synchronize Digital Twins? A Communication Performance Analysis. Presented at 2023 IEEE 28th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), Edinburgh, UK

Synchronization is fundamental for mirroring real-world entities in real-time and supporting effective operations of Digital Twins (DTs). Such synchronization is enabled by the communication between the physical and virtual realms, and it is mostly a... Read More about How to synchronize Digital Twins? A Communication Performance Analysis.

Digital Twin-Native AI-Driven Service Architecture for Industrial Networks (2023)
Presentation / Conference Contribution
Duran, K., Broadbent, M., Yurdakul, G., & Canberk, B. (2023, December). Digital Twin-Native AI-Driven Service Architecture for Industrial Networks. Presented at 2023 IEEE Globecom Workshops (GC Wkshps), Kuala Lumpur, Malaysia

The dramatic increase in the connectivity demand results in an excessive amount of Internet of Things (IoT) sensors. To meet the management needs of these large-scale networks, such as accurate monitoring and learning capabilities , Digital Twin (DT)... Read More about Digital Twin-Native AI-Driven Service Architecture for Industrial Networks.

OPSEC VS Leaked Credentials: Password reuse in Large-Scale Data Leaks (2023)
Presentation / Conference Contribution
Uzonyi, D. G., Pitropakis, N., McKeown, S., & Politis, I. (2023, November). OPSEC VS Leaked Credentials: Password reuse in Large-Scale Data Leaks. Presented at 2023 IEEE 28th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), Edinburgh, UK

Security and authentication are ubiquitous problems that impact all modern networked systems. Password-based authentication systems are still prevalent, and information leaked via other channels may be used to attack networked systems. Researchers ha... Read More about OPSEC VS Leaked Credentials: Password reuse in Large-Scale Data Leaks.

Structural performance, and failure mechanism, of hardwood cross laminated timber concrete composite under shear load (2023)
Presentation / Conference Contribution
Khokhar, A., Bell, D., & Dhonju, R. (2023, June). Structural performance, and failure mechanism, of hardwood cross laminated timber concrete composite under shear load. Presented at World Conference on Timber Engineering 2023 (WCTE2023), Oslo, Norway

The performance of Timber Concrete Composite(s) (TCC) is primarily governed by the type of connection used in connecting the constituent members together. This paper investigates the performance of various commonly used connections in a TCC. The main... Read More about Structural performance, and failure mechanism, of hardwood cross laminated timber concrete composite under shear load.

5G-IoT Cloud based Demonstration of Real-Time Audio-Visual Speech Enhancement for Multimodal Hearing-aids (2023)
Presentation / Conference Contribution
Gupta, A., Bishnu, A., Gogate, M., Dashtipour, K., Arslan, T., Adeel, A., Hussain, A., Ratnarajah, T., & Sellathurai, M. (2023, August). 5G-IoT Cloud based Demonstration of Real-Time Audio-Visual Speech Enhancement for Multimodal Hearing-aids. Presented at Interspeech 2023, Dublin, Ireland

Over twenty percent of the world's population suffers from some form of hearing loss, making it one of the most significant public health challenges. Current hearing aids commonly amplify noises while failing to improve speech comprehension in crowde... Read More about 5G-IoT Cloud based Demonstration of Real-Time Audio-Visual Speech Enhancement for Multimodal Hearing-aids.

Application for Real-time Audio-Visual Speech Enhancement (2023)
Presentation / Conference Contribution
Gogate, M., Dashtipour, K., & Hussain, A. (2023, August). Application for Real-time Audio-Visual Speech Enhancement. Presented at Interspeech 2023, Dublin, Ireland

This short paper demonstrates a first of its kind audio-visual (AV) speech enhancement (SE) desktop application that isolates, in real-time, the voice of a target speaker from noisy audio input. The deep neural network model integrated in this applic... Read More about Application for Real-time Audio-Visual Speech Enhancement.

Unveiling NLG Human-Evaluation Reproducibility: Lessons Learned and Key Insights from Participating in the ReproNLP Challenge (2023)
Presentation / Conference Contribution
Watson, L., & Gkatzia, D. (2023, September). Unveiling NLG Human-Evaluation Reproducibility: Lessons Learned and Key Insights from Participating in the ReproNLP Challenge. Presented at 3rd Workshop on Human Evaluation of NLP Systems (HumEval), Varna, Bulgaria

Human evaluation is crucial for NLG systems as it provides a reliable assessment of the quality, effectiveness, and utility of generated language outputs. However, concerns about the reproducibility of such evaluations have emerged, casting doubt on... Read More about Unveiling NLG Human-Evaluation Reproducibility: Lessons Learned and Key Insights from Participating in the ReproNLP Challenge.

SRSS: A New Chaos-Based Single-Round Single S-Box Image Encryption Scheme for Highly Auto-Correlated Data (2023)
Presentation / Conference Contribution
Shahbaz Khan, M., Ahmad, J., Ali, H., Pitropakis, N., Al-Dubai, A., Ghaleb, B., & Buchanan, W. J. (2023, October). SRSS: A New Chaos-Based Single-Round Single S-Box Image Encryption Scheme for Highly Auto-Correlated Data. Presented at 9th International Conference on Engineering and Emerging Technologies (IEEE ICEET 2023), Istanbul, Turkey

With the advent of digital communication, securing digital images during transmission and storage has become a critical concern. The traditional s-box substitution methods often fail to effectively conceal the information within highly auto-correlate... Read More about SRSS: A New Chaos-Based Single-Round Single S-Box Image Encryption Scheme for Highly Auto-Correlated Data.

Digital Twin-Empowered Smart Attack Detection System for 6G Edge of Things Networks (2023)
Presentation / Conference Contribution
Yigit, Y., Chrysoulas, C., Yurdakul, G., Maglaras, L., & Canberk, B. (2023, December). Digital Twin-Empowered Smart Attack Detection System for 6G Edge of Things Networks. Presented at 2023 IEEE Globecom Workshops (GC Wkshps): Workshop on Enabling Security, Trust, and Privacy in 6G Wireless Systems, Kuala Lumpur, Malaysia

As global Internet of Things (IoT) devices connectivity surges, a significant portion gravitates towards the Edge of Things (EoT) network. This shift prompts businesses to deploy infrastructure closer to end-users, enhancing accessibility. However, t... Read More about Digital Twin-Empowered Smart Attack Detection System for 6G Edge of Things Networks.

Simulation-Based Evaluation of Low Carbon Design Strategies for Extreme Climates (2023)
Journal Article
Toyo Diaz, A., & Sajjadian, S. M. (2023). Simulation-Based Evaluation of Low Carbon Design Strategies for Extreme Climates. Intelligent Buildings International, 15(5), 191-204. https://doi.org/10.1080/17508975.2024.2303118

Extreme climate conditions present the greatest challenge in achieving thermal comfort in buildings. To address this issue, researchers have evaluated the effectiveness of various low-carbon strategies in extreme climates, assessing their impact on c... Read More about Simulation-Based Evaluation of Low Carbon Design Strategies for Extreme Climates.

Thou Shalt Not Squander Life – Comparing Five Approaches to Argument Strength (2023)
Journal Article
Zenker, F., Dębowska-Kozłowska, K., Godden, D., Selinger, M., & Wells, S. (2023). Thou Shalt Not Squander Life – Comparing Five Approaches to Argument Strength. Studies in Logic, Grammar and Rhetoric, 68(1), 133-167. https://doi.org/10.2478/slgr-2023-0007

Different approaches analyze the strength of a natural language argument in different ways. This paper contrasts the dialectical, structural, probabilistic (or Bayesian), computational, and empirical approaches by exemplarily applying them to a singl... Read More about Thou Shalt Not Squander Life – Comparing Five Approaches to Argument Strength.

The stuff we swim in: Regulation alone will not lead to justifiable trust in AI (2023)
Journal Article
Powers, S. T., Linnyk, O., Guckert, M., Hannig, J., Pitt, J., Urquhart, N., Ekart, A., Gumpfer, N., Han, A., Lewis, P. R., Marsh, S., & Weber, T. (2023). The stuff we swim in: Regulation alone will not lead to justifiable trust in AI. IEEE technology & society magazine, 42(4), 95-106. https://doi.org/10.1109/MTS.2023.3341463

Information technology is used ubiquitously and has become an integral part of everyday life. With the ever increasing pervasiveness and persuasiveness of Artificial Intelligence (AI), the function of socio-technical systems changes and must be consi... Read More about The stuff we swim in: Regulation alone will not lead to justifiable trust in AI.

Edge NLP for Efficient Machine Translation in Low Connectivity Areas (2023)
Presentation / Conference Contribution
Watt, T., Chrysoulas, C., & Gkatzia, D. (2023, October). Edge NLP for Efficient Machine Translation in Low Connectivity Areas. Presented at IEEE 9th World Forum on Internet of Things: 2nd Workshop on Convergence of Edge Intelligence in IoT (EdgeAI-IoT 2023), Aveiro, Portugal

Machine translation (MT) usually requires connectivity and access to the cloud which is often limited in many parts of the world, including hard to reach rural areas. Edge natural language processing (NLP) aims to solve this problem by processing lan... Read More about Edge NLP for Efficient Machine Translation in Low Connectivity Areas.

Scalable Multi-domain Trust Infrastructures for Segmented Networks (2023)
Presentation / Conference Contribution
Grierson, S., Ghaleb, B., Buchanan, W. J., Thomson, C., Maglaras, L., & Eckl, C. (2023, November). Scalable Multi-domain Trust Infrastructures for Segmented Networks. Presented at 2023 IEEE 28th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), Edinburgh, UK

Within a trust infrastructure, a private key is often used to digitally sign a transaction, which can be verified with an associated public key. Using PKI (Public Key Infrastructure), a trusted entity can produce a digital signature, verifying the au... Read More about Scalable Multi-domain Trust Infrastructures for Segmented Networks.

Students’ gendered experiences of male-dominated Computing and Engineering courses (2023)
Presentation / Conference Contribution
Taylor-Smith, E., Smith, S., & Fabian, K. (2023, December). Students’ gendered experiences of male-dominated Computing and Engineering courses. Presented at 2023 SRHE International Research Conference, Birmingham, UK

How does it feel to be in a gender minority on a STEM programme? Does it have an impact on individual students? Via an online survey (n=255), undergraduate students on Computing and Engineering programmes were asked whether they felt that gender had... Read More about Students’ gendered experiences of male-dominated Computing and Engineering courses.

Investing in degree apprenticeships: Analysing experiences through Conservation of Resources Theory (2023)
Presentation / Conference Contribution
Taylor-Smith, E., Smith, S., & Bratton, A. (2023, December). Investing in degree apprenticeships: Analysing experiences through Conservation of Resources Theory. Presented at 2023 SRHE International Research Conference, Birmingham, UK

Degree apprentices have reported finding work-life-study balance challenging. This study uses the Theory of Conservation of Resources (COR) to investigate the resources invested and gained by apprentices in the achievement of their goal of a degree w... Read More about Investing in degree apprenticeships: Analysing experiences through Conservation of Resources Theory.

Reliability Analysis of Fault Tolerant Memory Systems (2023)
Presentation / Conference Contribution
Yigit, Y., Maglaras, L., Amine Ferrag, M., Moradpoor, N., & Lambropoulos, G. (2023, November). Reliability Analysis of Fault Tolerant Memory Systems. Presented at The 8th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM 2023), Piraeus, Greece

This paper delves into a comprehensive analysis of fault-tolerant memory systems, focusing on recovery techniques modelled using Markov chains to address transient errors. The study revolves around the application of scrubbing methods in conjunction... Read More about Reliability Analysis of Fault Tolerant Memory Systems.