Skip to main content

Research Repository

Advanced Search

Outputs (11)

Technical evaluation of an e-health platform. (2012)
Presentation / Conference Contribution
Lo, O., Fan, L., Buchanan, W. J., & Thuemmler, C. (2012, July). Technical evaluation of an e-health platform. Presented at IADIS International Conference e-Health 2012

Methodologies for evaluation of e-Health platforms are still lacking. We propose an e-Health evaluation framework that aims to provide a concise methodology for the evaluation of e-Health platforms under three main categories: usability evaluation, l... Read More about Technical evaluation of an e-health platform..

Many-to-Many embedded multicast addressing and access control method. (2012)
Patent
Romdhani, I. (2012). Many-to-Many embedded multicast addressing and access control method

A new addressing scheme for multicast IP with an extended scope field to include access rights. A new addressing scheme for multicast communications is disclosed. A new extended scope field is used which embeds a plurality of hierarchical scopes and... Read More about Many-to-Many embedded multicast addressing and access control method..

Security issues of a publicly accessible cloud computing infrastructure. (2012)
Presentation / Conference Contribution
Russell, G., & Macfarlane, R. (2012, June). Security issues of a publicly accessible cloud computing infrastructure

Edinburgh Napier University runs a custom cloud computing infrastructure for both student and public use. Such access carries dangers, both reputational and legal, as accidental or deliberate acts by users can be dangerous to other systems. This pape... Read More about Security issues of a publicly accessible cloud computing infrastructure..

Performance modelling and analysis of cognitive mesh networks (2012)
Journal Article
Min, G., Wu, Y., & Al-Dubai, A. (2012). Performance modelling and analysis of cognitive mesh networks. IEEE Transactions on Communications, 60, 1474-1478. https://doi.org/10.1109/TCOMM.2012.041212.110075A

A new analytical model is proposed to investigate the delay and throughput in cognitive mesh networks. The validity of the model is demonstrated via extensive simulation experiments. The model is then used to evaluate the effects of the number of lic... Read More about Performance modelling and analysis of cognitive mesh networks.

A new analytical model for multi-hop cognitive radio networks (2012)
Journal Article
Wu, Y., Min, G., & Al-Dubai, A. (2012). A new analytical model for multi-hop cognitive radio networks. IEEE Transactions on Wireless Communications, 11, 1643-1648. https://doi.org/10.1109/TWC.2012.030812.111106

The cognitive radio (CR) is an emerging technique for increasing the utilisation of communication resources by allowing the unlicensed users to employ the under-utilised spectrum. In this paper, a new analytical performance model is developed to eval... Read More about A new analytical model for multi-hop cognitive radio networks.

A nonlinear correlation measure for Intrusion Detection (2012)
Presentation / Conference Contribution
Ambusaidi, M., Lu, L. F., He, X., Tan, Z., Jamdagni, A., & Nanda, P. (2012, November). A nonlinear correlation measure for Intrusion Detection. Paper presented at The 7th International Conference on Frontier of Computer Science and Technology (FCST-12)

The popularity of using internet contains some risks of network attacks. It has attracted the attention of many researchers to overcome this problem. One of the effective ways that plays an important role to achieve higher security and protect networ... Read More about A nonlinear correlation measure for Intrusion Detection.

Towards OWL 2 Natively Supported Fuzzy Cloud Ontology (2012)
Presentation / Conference Contribution
Fang, D., Liu, X., Romdhani, I., & Zhao, H. (2012, July). Towards OWL 2 Natively Supported Fuzzy Cloud Ontology. Presented at 2012 IEEE 36th Annual Computer Software and Applications Conference Workshops

Cloud Computing introduces a revolutionary paradigm of computing to Service Oriented Architecture (SOA), by provisioning various types of computational resources and applications as on-demand services. While presenting cloud services semantically usi... Read More about Towards OWL 2 Natively Supported Fuzzy Cloud Ontology.

New Velocity-Aware Probabilistic route discovery schemes for Mobile Ad hoc Networks. (2012)
Presentation / Conference Contribution
Bani Khalaf, M., Al-Dubai, A., & Abed, M. (2012, September). New Velocity-Aware Probabilistic route discovery schemes for Mobile Ad hoc Networks

In this paper, we investigate efficient strategies for supporting velocity aware probabilistic route discovery in Mobile Ad hoc Networks (MANETs). MANETs usually use broadcast mechanisms to discover routes between nodes by flooding the network with R... Read More about New Velocity-Aware Probabilistic route discovery schemes for Mobile Ad hoc Networks..

Experimental investigation of link layer adaptation in IEEE 802.11n WLANs (2012)
Presentation / Conference Contribution
Al-Adhami, M., Al-Dubai, A. Y., & Romdhani, I. (2012, April). Experimental investigation of link layer adaptation in IEEE 802.11n WLANs. Presented at Wireless Telecommunications Symposium 2012

Due to its low cost wireless communication methodology and improvements in both its physical (PHY) and MAC (Link) layers, the IEEE 802.11n wireless LAN (WLAN) technology has been adopted widely. However, fairness of current 802.11n rate adaptation (R... Read More about Experimental investigation of link layer adaptation in IEEE 802.11n WLANs.

A new efficient distributed route discovery for wireless mobile ad hoc networks. (2012)
Presentation / Conference Contribution
Bani Khalaf, M., Al-Dubai, A., & Buchanan, W. J. (2012, April). A new efficient distributed route discovery for wireless mobile ad hoc networks. Presented at Wireless Telecommunications Symposium (WTS), 2012

High performance group communication, such as broadcast, requires matching efficient broadcast algorithms to effective route discovery approach. Broadcast communication in MANETs is essential for a wide range of important applications. Nevertheless,... Read More about A new efficient distributed route discovery for wireless mobile ad hoc networks..

Triangle-Area-Based Multivariate Correlation Analysis for Effective Denial-of-Service Attack Detection (2012)
Presentation / Conference Contribution
Tan, Z., Jamdagni, A., He, X., Nanda, P., & Liu, R. P. (2012, June). Triangle-Area-Based Multivariate Correlation Analysis for Effective Denial-of-Service Attack Detection. Presented at 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications

Cloud computing plays an important role in current converged networks. It brings convenience of accessing services and information to users regardless of location and time. However, there are some critical security issues residing in cloud computing,... Read More about Triangle-Area-Based Multivariate Correlation Analysis for Effective Denial-of-Service Attack Detection.