Skip to main content

Research Repository

Advanced Search

All Outputs (1531)

Deep Vision in Analysis and Recognition of Radar Data: Achievements, Advancements, and Challenges (2023)
Journal Article
Liu, Q., Yang, Z., Ji, R., Zhang, Y., Bilal, M., Liu, X., …Xu, X. (2023). Deep Vision in Analysis and Recognition of Radar Data: Achievements, Advancements, and Challenges. IEEE Systems, Man, and Cybernetics Magazine, 9(4), 4-12. https://doi.org/10.1109/msmc.2022.3216943

Radars are widely used to obtain echo information for effective prediction, such as precipitation nowcasting. In this article, recent relevant scientific investigation and practical efforts using deep learning (DL) models for weather radar data analy... Read More about Deep Vision in Analysis and Recognition of Radar Data: Achievements, Advancements, and Challenges.

Practices and educational affordances of sound in the postcolonial Hong Kong protests (2023)
Journal Article
Cheng, L., & McGregor, I. (in press). Practices and educational affordances of sound in the postcolonial Hong Kong protests. Contemporary Music Review, https://doi.org/10.1080/07494467.2023.2241236

Sound has been theorised for its functional role as informative agent in political advocacy and participation in political studies, yet the investigation on the pedagogical potential has been largely absent. This paper examines the pedagogical impact... Read More about Practices and educational affordances of sound in the postcolonial Hong Kong protests.

Social Media by Proxy: how older adults work within their ‘social networks’ to engage with social media (2023)
Journal Article
Webster, G., & Ryan, F. (2023). Social Media by Proxy: how older adults work within their ‘social networks’ to engage with social media. Information Research, 28(1), 50-77

Introduction. Social media use is at an all-time high, and the adoption of online tools by older adults is increasing. This paper reports an exploratory qualitative study investigating the ways in which older adults are supported by social media prox... Read More about Social Media by Proxy: how older adults work within their ‘social networks’ to engage with social media.

Low-Loss and Dual-Band Filter Inspired by Glide Symmetry Principle Over Millimeter-Wave Spectrum for 5G Cellular Networks (2023)
Journal Article
Karamirad, M., Pouyanfar, N., Alibakhshikenari, M., Ghobadi, C., Nourinia, J., See, C. H., & Falcone, F. (2023). Low-Loss and Dual-Band Filter Inspired by Glide Symmetry Principle Over Millimeter-Wave Spectrum for 5G Cellular Networks. iScience, 26(1), Article 105899. https://doi.org/10.1016/j.isci.2022.105899

This paper focuses on designing a dual-band, bandpass filter configuration inspired by glide-symmetric structures in a single plane. Geometry configuration of elliptical slots on both sides of single substrate generally affects electromagnetic fields... Read More about Low-Loss and Dual-Band Filter Inspired by Glide Symmetry Principle Over Millimeter-Wave Spectrum for 5G Cellular Networks.

Automated Algorithm Selection: from Feature-Based to Feature-Free Approaches (2023)
Journal Article
Alissa, M., Sim, K., & Hart, E. (2023). Automated Algorithm Selection: from Feature-Based to Feature-Free Approaches. Journal of Heuristics, 29(1), 1-38. https://doi.org/10.1007/s10732-022-09505-4

We propose a novel technique for algorithm-selection, applicable to optimisation domains in which there is implicit sequential information encapsulated in the data, e.g., in online bin-packing. Specifically we train two types of recurrent neural netw... Read More about Automated Algorithm Selection: from Feature-Based to Feature-Free Approaches.

A framework for live host-based Bitcoin wallet forensics and triage (2022)
Journal Article
Holmes, A., & Buchanan, W. J. (2023). A framework for live host-based Bitcoin wallet forensics and triage. Forensic Science International: Digital Investigation, 44, Article 301486. https://doi.org/10.1016/j.fsidi.2022.301486

Organised crime and cybercriminals use Bitcoin, a popular cryptocurrency, to launder money and move it across borders with impunity. The UK and other countries have legislation to recover the proceeds of crime from criminals. Recent UK case law has r... Read More about A framework for live host-based Bitcoin wallet forensics and triage.

Accelerating neural network architecture search using multi-GPU high-performance computing (2022)
Journal Article
Lupión, M., Cruz, N. C., Sanjuan, J. F., Paechter, B., & Ortigosa, P. M. (2023). Accelerating neural network architecture search using multi-GPU high-performance computing. Journal of Supercomputing, 79, 7609-7625. https://doi.org/10.1007/s11227-022-04960-z

Neural networks stand out from artificial intelligence because they can complete challenging tasks, such as image classification. However, designing a neural network for a particular problem requires experience and tedious trial and error. Automating... Read More about Accelerating neural network architecture search using multi-GPU high-performance computing.

Quantum Dynamic Optimization Algorithm for Neural Architecture Search on Image Classification (2022)
Journal Article
Jin, J., Zhang, Q., He, J., & Yu, H. (2022). Quantum Dynamic Optimization Algorithm for Neural Architecture Search on Image Classification. Electronics, 11(23), Article 3969. https://doi.org/10.3390/electronics11233969

Deep neural networks have proven to be effective in solving computer vision and natural language processing problems. To fully leverage its power, manually designed network templates, i.e., Residual Networks, are introduced to deal with various visio... Read More about Quantum Dynamic Optimization Algorithm for Neural Architecture Search on Image Classification.

Internet of drones security: taxonomies, open issues, and future directions (2022)
Journal Article
Derhab, A., Cheikhrouhou, O., Allouch, A., Koubaa, A., Qureshi, B., Ferrag, M. A., …Khan, F. A. (2023). Internet of drones security: taxonomies, open issues, and future directions. Vehicular Communications, 39, Article 100552. https://doi.org/10.1016/j.vehcom.2022.100552

Unmanned Aerial Vehicles (UAVs), also known as drones, have recently become one of the most important technological breakthroughs. They have opened the horizon for a vast array of applications and paved the way for a diversity of innovative solutions... Read More about Internet of drones security: taxonomies, open issues, and future directions.

An Efficient Optimization of Battery-Drone-Based Transportation Systems for Monitoring Solar Power Plant (2022)
Journal Article
Jemmali, M., Bashir, A. K., Boulila, W., Melhim, L. K. B., Jhaveri, R. H., & Ahmad, J. (2023). An Efficient Optimization of Battery-Drone-Based Transportation Systems for Monitoring Solar Power Plant. IEEE Transactions on Intelligent Transportation Systems, 24(12), 15633 - 15641. https://doi.org/10.1109/tits.2022.3219568

Nowadays, developing environmental solutions to ensure the preservation and sustainability of natural resources is one of the core research topics for providing a better life quality. Using renewable energy sources, such as solar energy, is one of th... Read More about An Efficient Optimization of Battery-Drone-Based Transportation Systems for Monitoring Solar Power Plant.

Circuit Modelling of Broadband Antenna Using Vector Fitting and Foster Form Approaches for IoT Applications (2022)
Journal Article
Ez-zaki, F., Belaid, K. A., Ahmad, S., Belahrach, H., Ghammaz, A., Al-Gburi, A. J. A., & Parachin, N. O. (2022). Circuit Modelling of Broadband Antenna Using Vector Fitting and Foster Form Approaches for IoT Applications. Electronics, 11(22), Article 3724. https://doi.org/10.3390/electronics11223724

Computation of the broadband antenna impedance behavior requires the wideband lumped equivalent circuit. This work aims to provide a comprehensive study of broadband antenna equivalent circuit models over broad frequency ranges for Internet of Things... Read More about Circuit Modelling of Broadband Antenna Using Vector Fitting and Foster Form Approaches for IoT Applications.

Forensic Analysis of Blackhole Attack in Wireless Sensor Networks/Internet of Things (2022)
Journal Article
Hasan, A., Khan, M. A., Shabir, B., Munir, A., Malik, A. W., Anwar, Z., & Ahmad, J. (2022). Forensic Analysis of Blackhole Attack in Wireless Sensor Networks/Internet of Things. Applied Sciences, 12(22), Article 11442. https://doi.org/10.3390/app122211442

The internet of things (IoT) is prone to various types of denial of service (DoS) attacks due to their resource-constrained nature. Extensive research efforts have been dedicated to securing these systems, but various vulnerabilities remain. Notably,... Read More about Forensic Analysis of Blackhole Attack in Wireless Sensor Networks/Internet of Things.

Multi-Chaos-Based Lightweight Image Encryption-Compression for Secure Occupancy Monitoring (2022)
Journal Article
Ghadi, Y. Y., Alsuhibany, S. A., Ahmad, J., Kumar, H., Boulila, W., Alsaedi, M., …Bhatti, S. A. (2022). Multi-Chaos-Based Lightweight Image Encryption-Compression for Secure Occupancy Monitoring. Journal of Healthcare Engineering, 2022, Article 7745132. https://doi.org/10.1155/2022/7745132

With the advancement of camera and wireless technologies, surveillance camera-based occupancy has received ample attention from the research community. However, camera-based occupancy monitoring and wireless channels, especially Wi-Fi hotspot, pose s... Read More about Multi-Chaos-Based Lightweight Image Encryption-Compression for Secure Occupancy Monitoring.

A Proposal of a New Chaotic Map for Application in the Image Encryption Domain (2022)
Journal Article
Abu-Amara, F., & Ahmad, J. (2023). A Proposal of a New Chaotic Map for Application in the Image Encryption Domain. Journal of Information and Knowledge Management, 22(2), Article 2250088. https://doi.org/10.1142/s0219649222500885

Several chaos-based image encryption schemes have been proposed in the last decade. Each encryption scheme has pros and cons regarding its speed, complexity, and security. This paper proposes a new chaotic map called Power-Chaotic Map (PCM). Characte... Read More about A Proposal of a New Chaotic Map for Application in the Image Encryption Domain.

A robust deep learning approach for tomato plant leaf disease localization and classification (2022)
Journal Article
Nawaz, M., Nazir, T., Javed, A., Masood, M., Rashid, J., Kim, J., & Hussain, A. (2022). A robust deep learning approach for tomato plant leaf disease localization and classification. Scientific Reports, 12(1), Article 18568. https://doi.org/10.1038/s41598-022-21498-5

Tomato plants' disease detection and classification at the earliest stage can save the farmers from expensive crop sprays and can assist in increasing the food quantity. Although, extensive work has been presented by the researcher for the tomato pla... Read More about A robust deep learning approach for tomato plant leaf disease localization and classification.

TAFFO: The compiler-based precision tuner (2022)
Journal Article
Cattaneo, D., Chiari, M., Agosta, G., & Cherubin, S. (2022). TAFFO: The compiler-based precision tuner. SoftwareX, 20, Article 101238. https://doi.org/10.1016/j.softx.2022.101238

We present taffo, a framework that automatically performs precision tuning to exploit the performance/accuracy trade-off. In order to avoid expensive dynamic analyses, taffo leverages programmer annotations which encapsulate domain knowledge about th... Read More about TAFFO: The compiler-based precision tuner.

A Multi-robot Distributed Collaborative Region Coverage Search Algorithm Based on Glasius Bio-inspired Neural Network (2022)
Journal Article
Chen, B., Zhang, H., Zhang, F., Liu, Y., Tan, C., Yu, H., & Wang, Y. (2023). A Multi-robot Distributed Collaborative Region Coverage Search Algorithm Based on Glasius Bio-inspired Neural Network. IEEE Transactions on Cognitive and Developmental Systems, 15(3), 1449-1462. https://doi.org/10.1109/tcds.2022.3218718

There are many constraints for a multi-robot system to perform a region coverage search task in an unknown environment. To address this, we propose a novel multi-robot distributed collaborative region coverage search algorithm based on Glasius bio-in... Read More about A Multi-robot Distributed Collaborative Region Coverage Search Algorithm Based on Glasius Bio-inspired Neural Network.

A Trimodel SAR Semisupervised Recognition Method Based on Attention-Augmented Convolutional Networks (2022)
Journal Article
Yan, S., Zhang, Y., Gao, F., Sun, J., Hussain, A., & Zhou, H. (2022). A Trimodel SAR Semisupervised Recognition Method Based on Attention-Augmented Convolutional Networks. IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing, 15, 9566-9583. https://doi.org/10.1109/jstars.2022.3218360

Semisupervised learning in synthetic aperture radars (SARs) is one of the research hotspots in the field of radar image automatic target recognition. It can efficiently deal with challenging environments where there are insufficient labeled samples a... Read More about A Trimodel SAR Semisupervised Recognition Method Based on Attention-Augmented Convolutional Networks.