Skip to main content

Research Repository

Advanced Search

All Outputs (7706)

Tri-Band Endfire Antenna Array with Wide Angles of Beam-Scanning Capability for 5G mmWave Mobile Communication (2024)
Presentation / Conference Contribution
Zidour, A., Ayad, M., Alibakhshikenari, M., Basherlou, H. J., Parchin, N. O., & See, C. H. (2023, November). Tri-Band Endfire Antenna Array with Wide Angles of Beam-Scanning Capability for 5G mmWave Mobile Communication. Presented at 2023 IEEE TechDefense, Rome, Italy

In this paper, a novel multiband phased array antenna with endfire radiation pattern is designed at millimeter-wave (mmWave) frequency bands for 5G mobile applications. The proposed antenna element is a compact quasi-Yagi with a modified dipole drive... Read More about Tri-Band Endfire Antenna Array with Wide Angles of Beam-Scanning Capability for 5G mmWave Mobile Communication.

Sub 6 GHz Smartphone Antenna with Dual-Band Monopole Resonators for 5G Communications (2024)
Presentation / Conference Contribution
Jahanbakhsh Basherlou, H., Parchin, N. O., Alibakhshikenari, M., & See, C. H. (2023, November). Sub 6 GHz Smartphone Antenna with Dual-Band Monopole Resonators for 5G Communications. Presented at 2023 IEEE TechDefense, Rome, Italy

This study represents the schematic and fundamental features of a new MIMO antenna with low-profile elements and suitable characteristics for future cellular communications. Two rows of low-profile hook-shaped ring-monopole antennas with discrete-fed... Read More about Sub 6 GHz Smartphone Antenna with Dual-Band Monopole Resonators for 5G Communications.

Data-Driven Intelligence Can Revolutionize Today’s Cybersecurity World: A Position Paper (2024)
Presentation / Conference Contribution
Sarker, I. H., Janicke, H., Maglaras, L., & Camtepe, S. (2023, October). Data-Driven Intelligence Can Revolutionize Today’s Cybersecurity World: A Position Paper. Presented at Third International Conference, ARTIIS 2023, Madrid, Spain

As cyber threats evolve and grow progressively more sophisticated, cyber security is becoming a more significant concern in today’s digital era. Traditional security measures tend to be insufficient to defend against these persistent and dynamic thre... Read More about Data-Driven Intelligence Can Revolutionize Today’s Cybersecurity World: A Position Paper.

Evolving Behavior Allocations in Robot Swarms (2024)
Presentation / Conference Contribution
Hallauer, S., Nitschke, G., & Hart, E. (2023, December). Evolving Behavior Allocations in Robot Swarms. Presented at IEEE Symposium Series on Computational Intelligence (SSCI 2023), Mexico City, Mexico

Behavioral diversity is known to benefit problem-solving in biological social systems such as insect colonies and human societies, as well as in artificial distributed systems including large-scale software and swarm-robotics systems. We investigate... Read More about Evolving Behavior Allocations in Robot Swarms.

OPSEC VS Leaked Credentials: Password reuse in Large-Scale Data Leaks (2023)
Presentation / Conference Contribution
Uzonyi, D. G., Pitropakis, N., McKeown, S., & Politis, I. (2023, November). OPSEC VS Leaked Credentials: Password reuse in Large-Scale Data Leaks. Presented at 2023 IEEE 28th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), Edinburgh, UK

Security and authentication are ubiquitous problems that impact all modern networked systems. Password-based authentication systems are still prevalent, and information leaked via other channels may be used to attack networked systems. Researchers ha... Read More about OPSEC VS Leaked Credentials: Password reuse in Large-Scale Data Leaks.

Structural performance, and failure mechanism, of hardwood cross laminated timber concrete composite under shear load (2023)
Presentation / Conference Contribution
Khokhar, A., Bell, D., & Dhonju, R. (2023, June). Structural performance, and failure mechanism, of hardwood cross laminated timber concrete composite under shear load. Presented at World Conference on Timber Engineering 2023 (WCTE2023), Oslo, Norway

The performance of Timber Concrete Composite(s) (TCC) is primarily governed by the type of connection used in connecting the constituent members together. This paper investigates the performance of various commonly used connections in a TCC. The main... Read More about Structural performance, and failure mechanism, of hardwood cross laminated timber concrete composite under shear load.

5G-IoT Cloud based Demonstration of Real-Time Audio-Visual Speech Enhancement for Multimodal Hearing-aids (2023)
Presentation / Conference Contribution
Gupta, A., Bishnu, A., Gogate, M., Dashtipour, K., Arslan, T., Adeel, A., Hussain, A., Ratnarajah, T., & Sellathurai, M. (2023, August). 5G-IoT Cloud based Demonstration of Real-Time Audio-Visual Speech Enhancement for Multimodal Hearing-aids. Presented at Interspeech 2023, Dublin, Ireland

Over twenty percent of the world's population suffers from some form of hearing loss, making it one of the most significant public health challenges. Current hearing aids commonly amplify noises while failing to improve speech comprehension in crowde... Read More about 5G-IoT Cloud based Demonstration of Real-Time Audio-Visual Speech Enhancement for Multimodal Hearing-aids.

Application for Real-time Audio-Visual Speech Enhancement (2023)
Presentation / Conference Contribution
Gogate, M., Dashtipour, K., & Hussain, A. (2023, August). Application for Real-time Audio-Visual Speech Enhancement. Presented at Interspeech 2023, Dublin, Ireland

This short paper demonstrates a first of its kind audio-visual (AV) speech enhancement (SE) desktop application that isolates, in real-time, the voice of a target speaker from noisy audio input. The deep neural network model integrated in this applic... Read More about Application for Real-time Audio-Visual Speech Enhancement.

Unveiling NLG Human-Evaluation Reproducibility: Lessons Learned and Key Insights from Participating in the ReproNLP Challenge (2023)
Presentation / Conference Contribution
Watson, L., & Gkatzia, D. (2023). Unveiling NLG Human-Evaluation Reproducibility: Lessons Learned and Key Insights from Participating in the ReproNLP Challenge. In Proceedings of the 3rd Workshop on Human Evaluation of NLP Systems (69-74)

Human evaluation is crucial for NLG systems as it provides a reliable assessment of the quality, effectiveness, and utility of generated language outputs. However, concerns about the reproducibility of such evaluations have emerged, casting doubt on... Read More about Unveiling NLG Human-Evaluation Reproducibility: Lessons Learned and Key Insights from Participating in the ReproNLP Challenge.

SRSS: A New Chaos-Based Single-Round Single S-Box Image Encryption Scheme for Highly Auto-Correlated Data (2023)
Presentation / Conference Contribution
Shahbaz Khan, M., Ahmad, J., Ali, H., Pitropakis, N., Al-Dubai, A., Ghaleb, B., & Buchanan, W. J. (2023, October). SRSS: A New Chaos-Based Single-Round Single S-Box Image Encryption Scheme for Highly Auto-Correlated Data. Presented at 9th International Conference on Engineering and Emerging Technologies (IEEE ICEET 2023), Istanbul, Turkey

With the advent of digital communication, securing digital images during transmission and storage has become a critical concern. The traditional s-box substitution methods often fail to effectively conceal the information within highly auto-correlate... Read More about SRSS: A New Chaos-Based Single-Round Single S-Box Image Encryption Scheme for Highly Auto-Correlated Data.

Digital Twin-Empowered Smart Attack Detection System for 6G Edge of Things Networks (2023)
Presentation / Conference Contribution
Yigit, Y., Chrysoulas, C., Yurdakul, G., Maglaras, L., & Canberk, B. (2023, December). Digital Twin-Empowered Smart Attack Detection System for 6G Edge of Things Networks. Presented at 2023 IEEE Globecom Workshops (GC Wkshps): Workshop on Enabling Security, Trust, and Privacy in 6G Wireless Systems, Kuala Lumpur, Malaysia

As global Internet of Things (IoT) devices connectivity surges, a significant portion gravitates towards the Edge of Things (EoT) network. This shift prompts businesses to deploy infrastructure closer to end-users, enhancing accessibility. However, t... Read More about Digital Twin-Empowered Smart Attack Detection System for 6G Edge of Things Networks.

Augmented Reality AI Co-Driver: Impact on Drivers Perceived Experience and Safety (2023)
Presentation / Conference Contribution
Charissis, V. (2023, December). Augmented Reality AI Co-Driver: Impact on Drivers Perceived Experience and Safety. Presented at 30th International Display Workshop, Niigata, Japan

This project investigates the use of an AI codriver that could support the driver's decision-making process. The information is presented through AR HUD and audio. The evaluation by 20 users in a VR driving simulator presented both encouraging outcom... Read More about Augmented Reality AI Co-Driver: Impact on Drivers Perceived Experience and Safety.

Edge NLP for Efficient Machine Translation in Low Connectivity Areas (2023)
Presentation / Conference Contribution
Watt, T., Chrysoulas, C., & Gkatzia, D. (2023, October). Edge NLP for Efficient Machine Translation in Low Connectivity Areas. Presented at IEEE 9th World Forum on Internet of Things: 2nd Workshop on Convergence of Edge Intelligence in IoT (EdgeAI-IoT 2023), Aveiro, Portugal

Machine translation (MT) usually requires connectivity and access to the cloud which is often limited in many parts of the world, including hard to reach rural areas. Edge natural language processing (NLP) aims to solve this problem by processing lan... Read More about Edge NLP for Efficient Machine Translation in Low Connectivity Areas.

Scalable Multi-domain Trust Infrastructures for Segmented Networks (2023)
Presentation / Conference Contribution
Grierson, S., Ghaleb, B., Buchanan, W. J., Thomson, C., Maglaras, L., & Eckl, C. (2023, November). Scalable Multi-domain Trust Infrastructures for Segmented Networks. Presented at 2023 IEEE 28th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), Edinburgh, UK

Within a trust infrastructure, a private key is often used to digitally sign a transaction, which can be verified with an associated public key. Using PKI (Public Key Infrastructure), a trusted entity can produce a digital signature, verifying the au... Read More about Scalable Multi-domain Trust Infrastructures for Segmented Networks.

Students’ gendered experiences of male-dominated Computing and Engineering courses (2023)
Presentation / Conference Contribution
Taylor-Smith, E., Smith, S., & Fabian, K. (2023, December). Students’ gendered experiences of male-dominated Computing and Engineering courses. Presented at 2023 SRHE International Research Conference, Birmingham, UK

How does it feel to be in a gender minority on a STEM programme? Does it have an impact on individual students? Via an online survey (n=255), undergraduate students on Computing and Engineering programmes were asked whether they felt that gender had... Read More about Students’ gendered experiences of male-dominated Computing and Engineering courses.

Investing in degree apprenticeships: Analysing experiences through Conservation of Resources Theory (2023)
Presentation / Conference Contribution
Taylor-Smith, E., Smith, S., & Bratton, A. (2023, December). Investing in degree apprenticeships: Analysing experiences through Conservation of Resources Theory. Presented at 2023 SRHE International Research Conference, Birmingham, UK

Degree apprentices have reported finding work-life-study balance challenging. This study uses the Theory of Conservation of Resources (COR) to investigate the resources invested and gained by apprentices in the achievement of their goal of a degree w... Read More about Investing in degree apprenticeships: Analysing experiences through Conservation of Resources Theory.

Reliability Analysis of Fault Tolerant Memory Systems (2023)
Presentation / Conference Contribution
Yigit, Y., Maglaras, L., Amine Ferrag, M., Moradpoor, N., & Lambropoulos, G. (2023, November). Reliability Analysis of Fault Tolerant Memory Systems. Presented at The 8th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM 2023), Piraeus, Greece

This paper delves into a comprehensive analysis of fault-tolerant memory systems, focusing on recovery techniques modelled using Markov chains to address transient errors. The study revolves around the application of scrubbing methods in conjunction... Read More about Reliability Analysis of Fault Tolerant Memory Systems.

Enhancing Mac OS Malware Detection through Machine Learning and Mach-O File Analysis (2023)
Presentation / Conference Contribution
Thaeler, A., Yigit, Y., Maglaras, L. A., Buchanan, B., Moradpoor, N., & Russell, G. (2023, November). Enhancing Mac OS Malware Detection through Machine Learning and Mach-O File Analysis. Presented at IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMDAD) 2023, Edinburgh, UK

Malware research has predominantly focused on Windows and Android Operating Systems (OS), leaving Mac OS malware relatively unexplored. This paper addresses the growing threat of Mac OS malware by leveraging Machine Learning (ML) techniques. We propo... Read More about Enhancing Mac OS Malware Detection through Machine Learning and Mach-O File Analysis.

Self-attention is What You Need to Fool a Speaker Recognition System (2023)
Presentation / Conference Contribution
Wang, F., Song, R., Tan, Z., Li, Q., Wang, C., & Yang, Y. (2023, November). Self-attention is What You Need to Fool a Speaker Recognition System. Presented at The 22nd IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-2023), Exeter, UK

Speaker Recognition Systems (SRSs) are becoming increasingly popular in various aspects of life due to advances in technology. However, these systems are vulnerable to cyber threats, particularly adversarial attacks. Traditional adversarial attack me... Read More about Self-attention is What You Need to Fool a Speaker Recognition System.

Challenges and Considerations in Data Recovery from Solid State Media: A Comparative Analysis with Traditional Devices (2023)
Presentation / Conference Contribution
Spalding, A., Tan, Z., & Babaagba, K. O. (2023, November). Challenges and Considerations in Data Recovery from Solid State Media: A Comparative Analysis with Traditional Devices. Presented at The International Symposium on Intelligent and Trustworthy Computing, Communications, and Networking (ITCCN-2023), Exeter, UK

Data recovery for forensic analysis of both hard drives and solid state media presents its own unique set of challenges. Hard drives face mechanical failures and data fragmentation , but their sequential storage and higher success rates make recovery... Read More about Challenges and Considerations in Data Recovery from Solid State Media: A Comparative Analysis with Traditional Devices.