Skip to main content

Research Repository

Advanced Search

All Outputs (1480)

Exploiting Attention-Consistency Loss For Spatial-Temporal Stream Action Recognition (2022)
Journal Article
Xu, H., Jin, X., Wang, Q., Hussain, A., & Huang, K. (2022). Exploiting Attention-Consistency Loss For Spatial-Temporal Stream Action Recognition. ACM transactions on multimedia computing communications and applications, 18(2S), Article 119. https://doi.or

Currently, many action recognition methods mostly consider the information from spatial streams. We propose a new perspective inspired by the human visual system to combine both spatial and temporal streams to measure their attention consistency. Spe... Read More about Exploiting Attention-Consistency Loss For Spatial-Temporal Stream Action Recognition.

Artificial intelligence-enabled social media analysis for pharmacovigilance of COVID-19 vaccinations in the United Kingdom: Observational Study (2022)
Journal Article
Hussain, Z., Sheikh, Z., Tahir, A., Dashtipour, K., Gogate, M., Sheikh, A., & Hussain, A. (2022). Artificial intelligence-enabled social media analysis for pharmacovigilance of COVID-19 vaccinations in the United Kingdom: Observational Study. JMIR Public

Background: The roll-out of vaccines for SARS-CoV-2 in the United Kingdom, started in December 2020. Uptake has been high, and there has been a subsequent reduction in infections, hospitalisations and deaths in vaccinated individuals. However, vacci... Read More about Artificial intelligence-enabled social media analysis for pharmacovigilance of COVID-19 vaccinations in the United Kingdom: Observational Study.

Towards Faster Training Algorithms Exploiting Bandit Sampling From Convex to Strongly Convex Conditions (2022)
Journal Article
Zhou, Y., Huang, K., Cheng, C., Wang, X., Hussain, A., & Liu, X. (2023). Towards Faster Training Algorithms Exploiting Bandit Sampling From Convex to Strongly Convex Conditions. IEEE Transactions on Emerging Topics in Computational Intelligence, 7(2), 565

The training process for deep learning and pattern recognition normally involves the use of convex and strongly convex optimization algorithms such as AdaBelief and SAdam to handle lots of “uninformative” samples that should be ignored, thus incurrin... Read More about Towards Faster Training Algorithms Exploiting Bandit Sampling From Convex to Strongly Convex Conditions.

RoadSeg-CD: A Network With Connectivity Array and Direction Map for Road Extraction From SAR Images (2022)
Journal Article
Gao, F., Tu, J., Wang, J., Hussain, A., & Zhou, H. (2022). RoadSeg-CD: A Network With Connectivity Array and Direction Map for Road Extraction From SAR Images. IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing, 15, 3992-4003

Road extraction from synthetic aperture radar (SAR) images has attracted much attention in the field of remote sensing image processing. General road extraction algorithms, affected by shadows of buildings and trees, are prone to producing fragmented... Read More about RoadSeg-CD: A Network With Connectivity Array and Direction Map for Road Extraction From SAR Images.

A Highly Secured Image Encryption Scheme using Quantum Walk and Chaos (2022)
Journal Article
Kamran, M. I., Khan, M. A., Alsuhibany, S. A., Ghadi, Y. Y., Arshad, Arif, J., & Ahmad, J. (2022). A Highly Secured Image Encryption Scheme using Quantum Walk and Chaos. Computers, Materials & Continua, 73(1), 657-672. https://doi.org/10.32604/cmc.2022.02

The use of multimedia data sharing has drastically increased in the past few decades due to the revolutionary improvements in communication technologies such as the 4th generation (4G) and 5th generation (5G) etc. Researchers have proposed many image... Read More about A Highly Secured Image Encryption Scheme using Quantum Walk and Chaos.

A Secure and Lightweight Chaos Based Image Encryption Scheme (2022)
Journal Article
Ali Khan, F., Ahmed, J., Alqahtani, F., Alsuhibany, S. A., Ahmed, F., & Ahmad, J. (2022). A Secure and Lightweight Chaos Based Image Encryption Scheme. Computers, Materials & Continua, 73(1), 279-294. https://doi.org/10.32604/cmc.2022.028789

In this paper, we present an image encryption scheme based on the multi-stage chaos-based image encryption algorithm. The method works on the principle of confusion and diffusion. The proposed scheme containing both confusion and diffusion modules ar... Read More about A Secure and Lightweight Chaos Based Image Encryption Scheme.

An exploration of academic identity through the COVID-19 pandemic (2022)
Journal Article
Smith, S., Plum, K., Taylor-Smith, E., & Fabian, K. (2022). An exploration of academic identity through the COVID-19 pandemic. Journal of Further and Higher Education, 46(9), 1290-1303. https://doi.org/10.1080/0309877X.2022.2072194

The COVID-19 global pandemic precipitated migration to online learning and teaching for students and universities. This study explored the change in self-identification in an academic role through the significant disruption caused by the urgent migra... Read More about An exploration of academic identity through the COVID-19 pandemic.

A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions (2022)
Journal Article
Kumar, A., Saha, R., Conti, M., Kumar, G., Buchanan, W. J., & Kim, T. H. (2022). A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions. Journal of Network and Computer Applications, 204, Article 103414. https://doi.or

Internet of Thing (IoT) is one of the most influential technologies in the present time. People, processes, and things are connected with the Internet through IoT. With the increasing demands of user applications, the number of connections is also in... Read More about A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions.

A New Intrusion Detection System for the Internet of Things via Deep Convolutional Neural Network and Feature Engineering (2022)
Journal Article
Ullah, S., Ahmad, J., Khan, M. A., Alkhammash, E. H., Hadjouni, M., Ghadi, Y. Y., …Pitropakis, N. (2022). A New Intrusion Detection System for the Internet of Things via Deep Convolutional Neural Network and Feature Engineering. Sensors, 22(10), Article

The Internet of Things (IoT) is a widely used technology in automated network systems across the world. The impact of the IoT on different industries has occurred in recent years. Many IoT nodes collect, store, and process personal data, which is an... Read More about A New Intrusion Detection System for the Internet of Things via Deep Convolutional Neural Network and Feature Engineering.

The public library as public sphere: a longitudinal analysis (2022)
Journal Article
Appleton, L., & Hall, H. (2023). The public library as public sphere: a longitudinal analysis. Journal of Documentation, 79(1), 112-126. https://doi.org/10.1108/JD-02-2022-0031

Purpose The research was undertaken to explore the role of the UK public library as a public sphere and the ways in which this role relates to the epistemic, community and political functions of public libraries. Design/methodology/approach A lo... Read More about The public library as public sphere: a longitudinal analysis.

A Novel Time-Slotted LoRa MAC Protocol for Scalable IoT Networks (2022)
Journal Article
Alahmadi, H., Bouabdallah, F., & Al-Dubai, A. (2022). A Novel Time-Slotted LoRa MAC Protocol for Scalable IoT Networks. Future Generation Computer Systems, 134, 287-302. https://doi.org/10.1016/j.future.2022.04.003

Long Range (LoRa) networks provide long range, cost-effective and energy-efficient communications by utilising the free unlicensed ISM band, which makes them appealing for Internet of Things (IoT) applications. However, in high density networks, reli... Read More about A Novel Time-Slotted LoRa MAC Protocol for Scalable IoT Networks.

Has the collective experience of the pandemic reset our relationship with the future? (2022)
Journal Article
Smyth, M. (2022). Has the collective experience of the pandemic reset our relationship with the future?. DOC - Design and Society, 1(1),

The fusion of architecture and cultures that comprised the cityscape of Blade Runner (1982) was a key part in how the narrative humanised the vision of the future, it provided a backdrop in which characters displaying human emotions played out a stor... Read More about Has the collective experience of the pandemic reset our relationship with the future?.

Opportunities and risks in the use of AI in career development practice (2022)
Journal Article
Wilson, M., Robertson, P., Cruickshank, P., & Gkatzia, D. (2022). Opportunities and risks in the use of AI in career development practice. Journal of the National Institute for Career Education and Counselling, 48(1), 48-57. https://doi.org/10.20856/jnice

The Covid-19 pandemic required many aspects of life to move online. This accelerated a broader trend for increasing use of ICT and AI, with implications for both the world of work and career development. This article explores the potential benefits a... Read More about Opportunities and risks in the use of AI in career development practice.

Deep Learning Models for Arrhythmia Detection in IoT Healthcare Applications (2022)
Journal Article
Hammad, M., Abd El-Latif, A. A., Hussain, A., Abd El-Samie, F. E., Gupta, B. B., Ugail, H., & Sedik, A. (2022). Deep Learning Models for Arrhythmia Detection in IoT Healthcare Applications. Computers and Electrical Engineering, 100, Article 108011. https:

In this paper, novel convolutional neural network (CNN) and convolutional long short-term (ConvLSTM) deep learning models (DLMs) are presented for automatic detection of arrhythmia for IoT applications. The input ECG signals are represented in 2D for... Read More about Deep Learning Models for Arrhythmia Detection in IoT Healthcare Applications.

Cyber Threat Intelligence-Based Malicious URL Detection Model Using Ensemble Learning (2022)
Journal Article
Ghaleb, F. A., Alsaedi, M., Saeed, F., Ahmad, J., & Alasli, M. (2022). Cyber Threat Intelligence-Based Malicious URL Detection Model Using Ensemble Learning. Sensors, 22(9), Article 3373. https://doi.org/10.3390/s22093373

Web applications have become ubiquitous for many business sectors due to their platform independence and low operation cost. Billions of users are visiting these applications to accomplish their daily tasks. However, many of these applications are ei... Read More about Cyber Threat Intelligence-Based Malicious URL Detection Model Using Ensemble Learning.

Identifying factors influencing study skills engagement and participation for online learners in higher education during Covid-19 (2022)
Journal Article
Fabian, K., Smith, S., Taylor-Smith, E., & Meharg, D. (2022). Identifying factors influencing study skills engagement and participation for online learners in higher education during Covid-19. British Journal of Educational Technology, 53(6), 1915-1936. h

The Covid-19 pandemic disrupted education across the world as campuses closed to restrict the spread of the virus. UK universities swiftly migrated to online delivery. The experiences of students and staff during this transition can inform our return... Read More about Identifying factors influencing study skills engagement and participation for online learners in higher education during Covid-19.

A novel temporal attentive-pooling based convolutional recurrent architecture for acoustic signal enhancement (2022)
Journal Article
Hussain, T., Wang, W., Gogate, M., Dashtipour, K., Tsao, Y., Lu, X., Ahsan, A., & Hussain, A. (2022). A novel temporal attentive-pooling based convolutional recurrent architecture for acoustic signal enhancement. IEEE Transactions on Artificial Intelligen

Removing background noise from acoustic observations to obtain clean signals is an important research topic regarding numerous real acoustic applications. Owing to their strong model capacity in function mapping, deep neural network-based algorithms... Read More about A novel temporal attentive-pooling based convolutional recurrent architecture for acoustic signal enhancement.

Synchronization of Monostatic Radar Using a Time-Delayed Chaos-Based FM Waveform (2022)
Journal Article
Abd, M. H., Al-Suhail, G. A., Tahir, F. R., Ali Ali, A. M., Abbood, H. A., Dashtipour, K., …Ahmad, J. (2022). Synchronization of Monostatic Radar Using a Time-Delayed Chaos-Based FM Waveform. Remote Sensing, 14(9), Article 1984. https://doi.org/10.3390/

There is no doubt that chaotic systems are still attractive issues in various radar applications and communication systems. In this paper, we present a new 0.3 GHz mono-static microwave chaotic radar. It includes a chaotic system based on a time-dela... Read More about Synchronization of Monostatic Radar Using a Time-Delayed Chaos-Based FM Waveform.

Optimal Pitch Angle Controller for DFIG-Based Wind Turbine System Using Computational Optimization Techniques (2022)
Journal Article
Khurshid, A., Mughal, M. A., Othman, A., Al-Hadhrami, T., Kumar, H., Khurshid, I., …Ahmad, J. (2022). Optimal Pitch Angle Controller for DFIG-Based Wind Turbine System Using Computational Optimization Techniques. Electronics, 11(8), Article 1290. https:

With the advent of high-speed and parallel computing, the applicability of computational optimization in engineering problems has increased, with greater validation than conventional methods. Pitch angle is an effective variable in extracting maximum... Read More about Optimal Pitch Angle Controller for DFIG-Based Wind Turbine System Using Computational Optimization Techniques.

A New Multistage Encryption Scheme Using Linear Feedback Register and Chaos-Based Quantum Map (2022)
Journal Article
Alharbi, A. R., Ahmad, J., Arshad, Shaukat, S., Masood, F., Ghadi, Y. Y., …Buchanan, W. J. (2022). A New Multistage Encryption Scheme Using Linear Feedback Register and Chaos-Based Quantum Map. Complexity, 2022, Article 7047282. https://doi.org/10.1155/

With the increasing volume of data transmission through insecure communication channels, big data security has become one of the important concerns in the cybersecurity domain. To address these concerns and keep data safe, a robust privacy-preserving... Read More about A New Multistage Encryption Scheme Using Linear Feedback Register and Chaos-Based Quantum Map.