Skip to main content

Research Repository

Advanced Search

Cognitive Internet of Everything (CIoE): State of the Art and Approaches (2017)
Book Chapter
Jamnal, G. S., Liu, X., Fan, L., & Ramachandran, M. (2017). Cognitive Internet of Everything (CIoE): State of the Art and Approaches. In R. Mihajlovic, M. Ramachandran, R. Behringer, & P. Kocovic (Eds.), Emerging Trends and Applications of the Internet of Things; Advances in Wireless Technologies and Telecommunication (277-309). IGI Global. https://doi.org/10.4018/978-1-5225-2437-3.ch010

In today's world, we are living in busy metropolitan cities and want our homes to be ambient intelligent enough towards our cognitive requirements for assisted living in smart space environment and an excellent smart home control system should not re... Read More about Cognitive Internet of Everything (CIoE): State of the Art and Approaches.

Modeling and analysis of a deep learning pipeline for cloud based video analytics (2017)
Presentation / Conference Contribution
Yaseen, M. U., Anjum, A., & Antonopoulos, N. (2017, December). Modeling and analysis of a deep learning pipeline for cloud based video analytics. Presented at BDCAT '17: Fourth IEEE/ACM International Conference on Big Data Computing, Applications and Technologies, Austin, Texas, USA

Video analytics systems based on deep learning approaches are becoming the basis of many widespread applications including smart cities to aid people and traffic monitoring. These systems necessitate massive amounts of labeled data and training time... Read More about Modeling and analysis of a deep learning pipeline for cloud based video analytics.

Blockchain and Git repositories for sticky policies protected OOXML. (2017)
Presentation / Conference Contribution
Spyra, G., Buchanan, W. J., & Ekonomou, E. (2017, November). Blockchain and Git repositories for sticky policies protected OOXML. Presented at FTC 2017 - Future Technologies Conference 2017

The paper discuss possible cloud-based
Information Rights Management (IRM) model extension with
enhanced accountability for both a sticky policy and an attached
data. This work compliments research on secure data sharing
with Office Open XML (OOX... Read More about Blockchain and Git repositories for sticky policies protected OOXML..

Fast Millimeter Wave Assisted Beam-Steering for Passive Indoor Optical Wireless Networks (2017)
Journal Article
Torres Vega, M., Koonen, A. M. J., Liotta, A., & Famaey, J. (2018). Fast Millimeter Wave Assisted Beam-Steering for Passive Indoor Optical Wireless Networks. IEEE Wireless Communications Letters, 7(2), 278-281. https://doi.org/10.1109/lwc.2017.2771771

In light of the extreme radio congestion, the time has come to consider the upper parts of the electromagnetic spectrum. Optical beam-steered wireless communications offer great potential for future indoor short-range connectivity, due to virtually u... Read More about Fast Millimeter Wave Assisted Beam-Steering for Passive Indoor Optical Wireless Networks.

Generalized proportional fair (GPF) scheduler for LTE-A (2017)
Presentation / Conference Contribution
Aramide, S. O., Barakat, B., Wang, Y., Keates, S., & Arshad, K. (2017, September). Generalized proportional fair (GPF) scheduler for LTE-A. Presented at 2017 9th Computer Science and Electronic Engineering (CEEC), Colchester, UK

The growth of wireless traffic and the demand for higher data rates motivated researchers around the world to enhance the Long Term Evolution-Advanced (LTE-A) performance. Recently, a considerable amount of the research had been done to optimise the... Read More about Generalized proportional fair (GPF) scheduler for LTE-A.

A virtual uneven grid-based routing protocol for mobile sink-based WSNs in a smart home system (2017)
Journal Article
Liu, X., & Liu, Q. (2018). A virtual uneven grid-based routing protocol for mobile sink-based WSNs in a smart home system. Personal and Ubiquitous Computing, https://doi.org/10.1007/s00779-017-1093-2

In a non-uniformly distributed network, the dataconcentrating centre equipped with sparse nodes rapidly depletes its battery energy due to the hotspot problem. To solve this problem, a Virtual Uneven Grid-based Routing protocol (VUGR) is proposed in... Read More about A virtual uneven grid-based routing protocol for mobile sink-based WSNs in a smart home system.

Head-mounted displays as opera glasses: using mixed-reality to deliver an egalitarian user experience during live events (2017)
Presentation / Conference Contribution
Bishop, C., Esteves, A., & McGregor, I. (2017, November). Head-mounted displays as opera glasses: using mixed-reality to deliver an egalitarian user experience during live events. Presented at Proceedings of the 19th ACM International Conference on Multimodal Interaction - ICMI 2017

This paper explores the use of head-mounted displays (HMDs) as a way to deliver a front row experience to any audience member during a live event. To do so, it presents a two-part user study that compares participants reported sense of presence acros... Read More about Head-mounted displays as opera glasses: using mixed-reality to deliver an egalitarian user experience during live events.

An applied pattern-driven corpus to predictive analytics in mitigating SQL injection attack (2017)
Presentation / Conference Contribution
Uwagbole, S. O., Buchanan, W. J., & Fan, L. (2017, September). An applied pattern-driven corpus to predictive analytics in mitigating SQL injection attack. Presented at 2017 Seventh International Conference on Emerging Security Technologies (EST)

Emerging computing relies heavily on secure back-end storage for the massive size of big data originating from the Internet of Things (IoT) smart devices to the Cloud-hosted web applications. Structured Query Language (SQL) Injection Attack (SQLIA) r... Read More about An applied pattern-driven corpus to predictive analytics in mitigating SQL injection attack.

Power Consuming Activity Recognition in Home Environment (2017)
Presentation / Conference Contribution
Liu, X., & Liu, Q. (2017, June). Power Consuming Activity Recognition in Home Environment. Presented at the 3rd International Conference on Cloud Computing and Security (ICCCS 2017)

This work proposed an activity recognition model which focus on the power con-suming activity in home environment, to help residents modify their behavior. We set the IoT system with lower number of sensors. The key data for identifying activity come... Read More about Power Consuming Activity Recognition in Home Environment.

An Energy-Efficiency Routing Scheme Based on Clusters with a Mobile Sink for WSNs (2017)
Presentation / Conference Contribution
Liu, X., & Liu, Q. (2017, June). An Energy-Efficiency Routing Scheme Based on Clusters with a Mobile Sink for WSNs. Presented at 3rd International Conference on Cloud Computing and Security (ICCCS 2017)

With the development of microelectronic devices and the radio, the application of WSN is more popular and can be applied in the various areas, which has attracted scholars. However, the requirements of performance for WSNs are becoming great in terms... Read More about An Energy-Efficiency Routing Scheme Based on Clusters with a Mobile Sink for WSNs.

Load Balancing Objective Function in RPL (Draft 2) (2017)
Report
Qasem, M., Al-Dubai, A., Romdhani, I., Ghaleb, B., Hou, J., & Jadhav, R. A. (2017). Load Balancing Objective Function in RPL (Draft 2). USA: IETF

This document proposes an extended Objective Function(OF) that balances the number of child nodes of the parent nodes to avoid the overloading problem and ensure node lifetime maximization in the IPv6 Routing Protocol for Low-Power and Lossy Ne... Read More about Load Balancing Objective Function in RPL (Draft 2).

For Flux Sake: The Confluence of Socially- and Biologically-Inspired Computing for Engineering Change in Open Systems (2017)
Presentation / Conference Contribution
Pitt, J., & Hart, E. (2017, September). For Flux Sake: The Confluence of Socially- and Biologically-Inspired Computing for Engineering Change in Open Systems. Presented at 2017 IEEE 2nd International Workshops on Foundations and Applications of Self* Systems (FAS*W)

This position paper is concerned with the challenge of engineering multi-scale and long-lasting systems, whose operation is regulated by sets of mutually-agreed, conventional rules. The core of the problem is that there are multiple, inter-dependent... Read More about For Flux Sake: The Confluence of Socially- and Biologically-Inspired Computing for Engineering Change in Open Systems.

A new technique for designing 8 × 8 substitution box for image encryption applications (2017)
Presentation / Conference Contribution
Khan, F. A., Ahmed, J., Khan, J. S., Ahmad, J., Khan, M. A., & Hwang, S. O. (2017, September). A new technique for designing 8 × 8 substitution box for image encryption applications. Presented at 2017 9th Computer Science and Electronic Engineering (CEEC), Colchester

To create confusion in ciphertexts, encryption processes depends upon nonlinear mappings. This nonlinear mapping can be achieved by a process known as substitution. In a secure encryption algorithm, substitution plays a key role during confusion stag... Read More about A new technique for designing 8 × 8 substitution box for image encryption applications.

Adaptive Resource Allocation and Provisioning in Multi-Service Cloud Environments (2017)
Journal Article
Alsarhan, A., Itradat, A., Al-Dubai, A. Y., Zomaya, A. Y., & Min, G. (2018). Adaptive Resource Allocation and Provisioning in Multi-Service Cloud Environments. IEEE Transactions on Parallel and Distributed Systems, 29(1), 31-42. https://doi.org/10.1109/tpds.2017.2748578

In the current cloud business environment, the cloud provider (CP) can provide a means for offering the required quality of service (QoS) for multiple classes of clients. We consider the cloud market where various resources such as CPUs, memory, and... Read More about Adaptive Resource Allocation and Provisioning in Multi-Service Cloud Environments.

Impact of selection methods on the diversity of many-objective Pareto set approximations (2017)
Presentation / Conference Contribution
Martí, L., Segredo, E., Sánchez-Pi, N., & Hart, E. (2017, September). Impact of selection methods on the diversity of many-objective Pareto set approximations. Presented at 21st International Conference on Knowledge-Based and Intelligent Information & Engineering Systems, Marseille, France

Selection methods are a key component of all multi-objective and, consequently, many-objective optimisation evolutionary algorithms. They must perform two main tasks simultaneously. First of all, they must select individuals that are as close as poss... Read More about Impact of selection methods on the diversity of many-objective Pareto set approximations.

ESBSC: Energy-Aware Service Brokering Strategy in Clouds (2017)
Presentation / Conference Contribution
Ma, F., Liu, X., Yang, Y., Yao, W., Cai, J., & Wang, F. (2017, July). ESBSC: Energy-Aware Service Brokering Strategy in Clouds. Presented at 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)

One of the key features of cloud computing is on demand resource provision. Unfortunately, different cloud service providers often have different standards, which makes the job of choosing the suitable resource to be a very difficult one for the comm... Read More about ESBSC: Energy-Aware Service Brokering Strategy in Clouds.

Performance Evaluation of RPL Protocol under Mobile Sybil Attacks (2017)
Presentation / Conference Contribution
Medjek, F., Tandjaoui, D., Romdhani, I., & Djedjig, N. (2017, August). Performance Evaluation of RPL Protocol under Mobile Sybil Attacks. Presented at 2017 IEEE Trustcom/BigDataSE/ICESS

In Sybil attacks, a physical adversary takes multiple fabricated or stolen identities to maliciously manipulate the network. These attacks are very harmful for the Internet of Things (IoT) applications. In this paper we implemented and evaluated the... Read More about Performance Evaluation of RPL Protocol under Mobile Sybil Attacks.

Maximum Entropy in Nilsson's Probabilistic Logic (2017)
Presentation / Conference Contribution
Kane, T. B. (1989, August). Maximum Entropy in Nilsson's Probabilistic Logic. Presented at International Joint Conference on Artificial Intelligence

Nilsson's Probabilistic Logic is a set theoretic mechanism for reasoning with uncertainty. We propose a new way of looking at the probability constraints enforced by the framework, which allows the expert to include conditional probabilities in the s... Read More about Maximum Entropy in Nilsson's Probabilistic Logic.

A novel substitution box for encryption based on Lorenz equations (2017)
Presentation / Conference Contribution
Khan, F. A., Ahmed, J., Khan, J. S., Ahmad, J., & Khan, M. A. (2017, July). A novel substitution box for encryption based on Lorenz equations. Presented at 2017 International Conference on Circuits, System and Simulation (ICCSS), London, United Kingdom

Complexity of an encryption algorithm is highly dependent on nonlinear components that drive actual security. Only nonlinear component in all traditional encryption algorithms is mainly Substitution Box (S-Box). In block ciphers, the relationship bet... Read More about A novel substitution box for encryption based on Lorenz equations.

Simultaneous context inference and mapping using mm-Wave for indoor scenarios (2017)
Presentation / Conference Contribution
Yassin, A., Nasser, Y., Awad, M., & Al-Dubai, A. (2017, May). Simultaneous context inference and mapping using mm-Wave for indoor scenarios. Presented at 2017 IEEE International Conference on Communications (ICC), Paris, France

We introduce in this paper two main approaches, Triangulateration (TL) and Angle-Difference-of-Arrival (ADoA) for indoor localization and mapping using single-anchor and millimeter wave (MMW) propagation characteristics. Then, we perform context infe... Read More about Simultaneous context inference and mapping using mm-Wave for indoor scenarios.