Skip to main content

Research Repository

Advanced Search

All Outputs (291)

Psychogeography With Technology (2018)
Presentation / Conference Contribution
Flint, T., Grandison, T., & Barrett, H. (2018, November). Psychogeography With Technology. Poster presented at Engage 2018, Edinburgh, Scotland

No abstract available.

Copy-move forgery detection using combined features and transitive matching (2018)
Journal Article
Lin, C., Lu, W., Huang, X., Liu, K., Sun, W., Lin, H., & Tan, Z. (2019). Copy-move forgery detection using combined features and transitive matching. Multimedia Tools and Applications, 78(21), 30081-30096. https://doi.org/10.1007/s11042-018-6922-4

Recently, the research of Internet of Things (IoT) and Multimedia Big Data (MBD) has been growing tremendously. Both IoT and MBD have a lot of multimedia data, which can be tampered easily. Therefore, the research of multimedia forensics is necessary... Read More about Copy-move forgery detection using combined features and transitive matching.

BayesPiles: Visualisation Support for Bayesian Network Structure Learning (2018)
Journal Article
Vogogias, A., Kennedy, J., Archambault, D., Bach, B., Smith, V. A., & Currant, H. (2018). BayesPiles: Visualisation Support for Bayesian Network Structure Learning. ACM transactions on intelligent systems and technology, 10(1), Article 5. https://doi.org/

We address the problem of exploring, combining and comparing large collections of scored, directed networks for understanding inferred Bayesian networks used in biology. In this feld, heuristic algorithms explore the space of possible network solutio... Read More about BayesPiles: Visualisation Support for Bayesian Network Structure Learning.

Short-long term anomaly detection in wireless sensor networks based on machine learning and multi-parameterized edit distance (2018)
Journal Article
Cauteruccio, F., Fortino, G., Guerrieri, A., Liotta, A., Mocanu, D. C., Perra, C., Terracina, G., & Torres Vega, M. (2019). Short-long term anomaly detection in wireless sensor networks based on machine learning and multi-parameterized edit distance. Info

Heterogeneous wireless sensor networks are a source of large amount of different information representing environmental aspects such as light, temperature, and humidity. A very important research problem related to the analysis of the sensor data is... Read More about Short-long term anomaly detection in wireless sensor networks based on machine learning and multi-parameterized edit distance.

Mitigating Disaster using Secure Threshold-Cloud Architecture (2018)
Presentation / Conference Contribution
Ukwandu, E., Buchanan, W. J., & Russell, G. (2018). Mitigating Disaster using Secure Threshold-Cloud Architecture. Current Trends in Computer Sciences & Applications, 1(2),

There are many risks in moving data into public cloud environments, along with an increasing threat around large-scale data leakage during cloud outages. This work aims to apply secret sharing methods as used in cryptography to create shares of crypt... Read More about Mitigating Disaster using Secure Threshold-Cloud Architecture.

Blockchain Technologies for the Internet of Things: Research Issues and Challenges (2018)
Journal Article
Ferrag, M. A., Derdour, M., Mukherjee, M., Derhab, A., Maglaras, L., & Janicke, H. (2019). Blockchain Technologies for the Internet of Things: Research Issues and Challenges. IEEE Internet of Things, 6(2), 2188-2204. https://doi.org/10.1109/jiot.2018.2882

This paper presents a comprehensive survey of the existing blockchain protocols for the Internet of Things (IoT) networks. We start by describing the blockchains and summarizing the existing surveys that deal with blockchain technologies. Then, we pr... Read More about Blockchain Technologies for the Internet of Things: Research Issues and Challenges.

Teaching Live Coding of Electronic Dance Music: A Case Study (2018)
Journal Article
Cheng, L. (2018). Teaching Live Coding of Electronic Dance Music: A Case Study. Dancecult: Journal of Electronic Dance Music Culture, 10(1), https://doi.org/10.12801/1947-5403.2018.10.01.10

Live coding is a relatively new performance practice that emphasizes the expressive possibilities afforded by computer programming. Live coding has often been associated with contemporary musical styles such as electronic dance music (EDM), which fav... Read More about Teaching Live Coding of Electronic Dance Music: A Case Study.

A caching and spatial K-anonymity driven privacy enhancement scheme in continuous location-based services (2018)
Journal Article
Zhang, S., Li, X., Tan, Z., Peng, T., & Wang, G. (2019). A caching and spatial K-anonymity driven privacy enhancement scheme in continuous location-based services. Future Generation Computer Systems, 94, 40-50. https://doi.org/10.1016/j.future.2018.10.053

With the rapid pervasion of location-based services (LBSs), protection of location privacy has become a significant concern. In most continuous LBSs' privacy-preserving solutions, users need to transmit the location query data to an untrusted locatio... Read More about A caching and spatial K-anonymity driven privacy enhancement scheme in continuous location-based services.

The Nature of Risk and the Privacy Calculus (2018)
Presentation / Conference Contribution
Haynes, D. (2018, November). The Nature of Risk and the Privacy Calculus. Poster presented at Royal Academy of Engineering Annual Research Forum, London

Haynes, D. (2018, November). The Nature of Risk and the Privacy Calculus. Poster presented at Royal Academy of Engineering Annual Research Forum, London.

The Challenges of Investigating Cryptocurrencies and Blockchain Related Crime (2018)
Journal Article
Dyson, S., Buchanan, W., & Bell, L. (2018). The Challenges of Investigating Cryptocurrencies and Blockchain Related Crime. The Journal of the British Blockchain Association, 1(2), 1-6. https://doi.org/10.31585/jbba-1-2-%288%292018

We increasingly live in a world where there is a balance between the rights to privacy and the requirements for consent, and the rights of society to protect itself. Within this world, there is an ever-increasing requirement to protect the identities... Read More about The Challenges of Investigating Cryptocurrencies and Blockchain Related Crime.

Open-source Data Analysis and Machine Learning for Asthma Hospitalisation Rates (2018)
Presentation / Conference Contribution
Rooney, L., Chute, C., Buchanan, W. J., Smales, A., & Hepburn, L. (2018). Open-source Data Analysis and Machine Learning for Asthma Hospitalisation Rates. In Proceedings of ThinkMind - GLOBAL HEALTH 2018, The Seventh International Conference on Global He

Long-term conditions in Scotland account for 80% of all GP consultations; they also account for 60% of all deaths in Scotland. Asthma and Chronic Obstructive Pulmonary Disease (COPD) are common long-term respiratory diseases [1]. Asthma is a heteroge... Read More about Open-source Data Analysis and Machine Learning for Asthma Hospitalisation Rates.

How a view of language underpins approaches to supporting higher education students that facilitate neo-liberalism, and how to resist this (2018)
Journal Article
Richards, K., & Pilcher, N. (2018). How a view of language underpins approaches to supporting higher education students that facilitate neo-liberalism, and how to resist this. Power and Education, 175774381881180. https://doi.org/10.1177/1757743818811801

In this article we argue a particular view of language underpins approaches to supporting students in Higher Education, and that this view facilitates neoliberalism. Universities worldwide have glossaries of terms such as 'describe' or 'discuss', and... Read More about How a view of language underpins approaches to supporting higher education students that facilitate neo-liberalism, and how to resist this.

Use of machine learning techniques to model wind damage to forests (2018)
Journal Article
Hart, E., Sim, K., Kamimura, K., Meredieu, C., Guyon, D., & Gardiner, B. (2019). Use of machine learning techniques to model wind damage to forests. Agricultural and forest meteorology, 265, 16-29. https://doi.org/10.1016/j.agrformet.2018.10.022

This paper tested the ability of machine learning techniques, namely artificial neural networks and random forests, to predict the individual trees within a forest most at risk of damage in storms. Models based on these techniques were developed i... Read More about Use of machine learning techniques to model wind damage to forests.

Impact of cyberattacks on stock performance: a comparative study (2018)
Journal Article
Tweneboah-Kodua, S., Atsu, F., & Buchanan, W. (2018). Impact of cyberattacks on stock performance: a comparative study. Information and Computer Security, 26(5), 637-652. https://doi.org/10.1108/ics-05-2018-0060

The study uses cyberattacks announcements on 96 firms that are listed on S&P 500 over the period January 03, 2013 and December 29, 2017. The empirical analysis was performed in two ways: cross-section and industry level. We employ statistical tests... Read More about Impact of cyberattacks on stock performance: a comparative study.

Cross-Layer Multipath Multichannel MAC protocol for MANETs (2018)
Presentation / Conference Contribution
Mirza, N., Taylor, H., Abdelshafy, M., King, P., Romdhani, I., & Alghamdi, A. (2018). Cross-Layer Multipath Multichannel MAC protocol for MANETs. In Proceedings of the International Symposium on Networks, Computers and Communications (ISNCC). https://doi

Utilising multiple disjoint paths in multiple channels can improve network performance by enabling a node to reroute data along discovered paths seamlessly when link failure is detected. However, depending on a stale route to recover from a broken li... Read More about Cross-Layer Multipath Multichannel MAC protocol for MANETs.

MOSAIC: Simultaneous Localization and Environment Mapping using mmWave without a-priori Knowledge (2018)
Journal Article
Yassin, A., Nasser, Y., Al-Dubai, A., & Awad, M. (2018). MOSAIC: Simultaneous Localization and Environment Mapping using mmWave without a-priori Knowledge. IEEE Access, 6, 68932-68947. https://doi.org/10.1109/access.2018.2879436

Simultaneous Localization and environment mapping (SLAM) is the core to robotic mapping and navigation as it constructs simultaneously the unknown environment and localizes the agent within. However, in millimeter wave (mmWave) research, SLAM is stil... Read More about MOSAIC: Simultaneous Localization and Environment Mapping using mmWave without a-priori Knowledge.

Using P4 to enable scalable intents in software defined networks (2018)
Presentation / Conference Contribution
Lewis, B., Fawcett, L., Broadbent, M., & Race, N. (2018). Using P4 to enable scalable intents in software defined networks. In 2018 IEEE 26th International Conference on Network Protocols (ICNP) (442-443). https://doi.org/10.1109/ICNP.2018.00064

When designing Software Defined Networks (SDNs), there is a risk that the additional abstractions available can result in reduced scalability and performance. One such abstraction, intents, are a way in which network administrators can express polici... Read More about Using P4 to enable scalable intents in software defined networks.

Real-time rendering with compressed animated light fields (2018)
Patent
Mitchell, K., Koniaris, C., Kosek, M., & Sinclair, D. (2018). Real-time rendering with compressed animated light fields. US20180322691

Systems, methods, and articles of manufacture for real-time rendering using compressed animated light fields are disclosed. One embodiment provides a pipeline, from offline rendering of an animated scene from sparse optimized viewpoints to real-time... Read More about Real-time rendering with compressed animated light fields.

An Intelligent Real-Time Occupancy Monitoring System Using Single Overhead Camera (2018)
Presentation / Conference Contribution
Ahmad, J., Larijani, H., Emmanuel, R., Mannion, M., & Javed, A. (2018, September). An Intelligent Real-Time Occupancy Monitoring System Using Single Overhead Camera. Presented at SAI Intelligent Systems Conference, London

Real-time occupancy monitoring information is an important component in building energy management and security. Advances in technology enables us to develop vision-based systems. These systems have gained popularity among different scientific resear... Read More about An Intelligent Real-Time Occupancy Monitoring System Using Single Overhead Camera.