Skip to main content

Research Repository

Advanced Search

Load Balancing Objective Function in RPL (Draft 2) (2017)
Report
Qasem, M., Al-Dubai, A., Romdhani, I., Ghaleb, B., Hou, J., & Jadhav, R. A. (2017). Load Balancing Objective Function in RPL (Draft 2). USA: IETF

This document proposes an extended Objective Function(OF) that balances the number of child nodes of the parent nodes to avoid the overloading problem and ensure node lifetime maximization in the IPv6 Routing Protocol for Low-Power and Lossy Ne... Read More about Load Balancing Objective Function in RPL (Draft 2).

For Flux Sake: The Confluence of Socially- and Biologically-Inspired Computing for Engineering Change in Open Systems (2017)
Presentation / Conference Contribution
Pitt, J., & Hart, E. (2017, September). For Flux Sake: The Confluence of Socially- and Biologically-Inspired Computing for Engineering Change in Open Systems. Presented at 2017 IEEE 2nd International Workshops on Foundations and Applications of Self* Systems (FAS*W)

This position paper is concerned with the challenge of engineering multi-scale and long-lasting systems, whose operation is regulated by sets of mutually-agreed, conventional rules. The core of the problem is that there are multiple, inter-dependent... Read More about For Flux Sake: The Confluence of Socially- and Biologically-Inspired Computing for Engineering Change in Open Systems.

A new technique for designing 8 Ă— 8 substitution box for image encryption applications (2017)
Presentation / Conference Contribution
Khan, F. A., Ahmed, J., Khan, J. S., Ahmad, J., Khan, M. A., & Hwang, S. O. (2017, September). A new technique for designing 8 Ă— 8 substitution box for image encryption applications. Presented at 2017 9th Computer Science and Electronic Engineering (CEEC), Colchester

To create confusion in ciphertexts, encryption processes depends upon nonlinear mappings. This nonlinear mapping can be achieved by a process known as substitution. In a secure encryption algorithm, substitution plays a key role during confusion stag... Read More about A new technique for designing 8 Ă— 8 substitution box for image encryption applications.

Adaptive Resource Allocation and Provisioning in Multi-Service Cloud Environments (2017)
Journal Article
Alsarhan, A., Itradat, A., Al-Dubai, A. Y., Zomaya, A. Y., & Min, G. (2018). Adaptive Resource Allocation and Provisioning in Multi-Service Cloud Environments. IEEE Transactions on Parallel and Distributed Systems, 29(1), 31-42. https://doi.org/10.1109/tpds.2017.2748578

In the current cloud business environment, the cloud provider (CP) can provide a means for offering the required quality of service (QoS) for multiple classes of clients. We consider the cloud market where various resources such as CPUs, memory, and... Read More about Adaptive Resource Allocation and Provisioning in Multi-Service Cloud Environments.

Impact of selection methods on the diversity of many-objective Pareto set approximations (2017)
Presentation / Conference Contribution
Martí, L., Segredo, E., Sánchez-Pi, N., & Hart, E. (2017, September). Impact of selection methods on the diversity of many-objective Pareto set approximations. Presented at 21st International Conference on Knowledge-Based and Intelligent Information & Engineering Systems, Marseille, France

Selection methods are a key component of all multi-objective and, consequently, many-objective optimisation evolutionary algorithms. They must perform two main tasks simultaneously. First of all, they must select individuals that are as close as poss... Read More about Impact of selection methods on the diversity of many-objective Pareto set approximations.

Performance Evaluation of RPL Protocol under Mobile Sybil Attacks (2017)
Presentation / Conference Contribution
Medjek, F., Tandjaoui, D., Romdhani, I., & Djedjig, N. (2017, August). Performance Evaluation of RPL Protocol under Mobile Sybil Attacks. Presented at 2017 IEEE Trustcom/BigDataSE/ICESS

In Sybil attacks, a physical adversary takes multiple fabricated or stolen identities to maliciously manipulate the network. These attacks are very harmful for the Internet of Things (IoT) applications. In this paper we implemented and evaluated the... Read More about Performance Evaluation of RPL Protocol under Mobile Sybil Attacks.

ESBSC: Energy-Aware Service Brokering Strategy in Clouds (2017)
Presentation / Conference Contribution
Ma, F., Liu, X., Yang, Y., Yao, W., Cai, J., & Wang, F. (2017, July). ESBSC: Energy-Aware Service Brokering Strategy in Clouds. Presented at 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)

One of the key features of cloud computing is on demand resource provision. Unfortunately, different cloud service providers often have different standards, which makes the job of choosing the suitable resource to be a very difficult one for the comm... Read More about ESBSC: Energy-Aware Service Brokering Strategy in Clouds.

Maximum Entropy in Nilsson's Probabilistic Logic (2017)
Presentation / Conference Contribution
Kane, T. B. (1989, August). Maximum Entropy in Nilsson's Probabilistic Logic. Presented at International Joint Conference on Artificial Intelligence

Nilsson's Probabilistic Logic is a set theoretic mechanism for reasoning with uncertainty. We propose a new way of looking at the probability constraints enforced by the framework, which allows the expert to include conditional probabilities in the s... Read More about Maximum Entropy in Nilsson's Probabilistic Logic.

Drizzle: Adaptive and fair route maintenance algorithm for Low-power and Lossy Networks in IoT (2017)
Presentation / Conference Contribution
Ghaleb, B., Al-Dubai, A., Romdhani, I., Nasser, Y., & Boukerche, A. (2017, May). Drizzle: Adaptive and fair route maintenance algorithm for Low-power and Lossy Networks in IoT. Presented at 2017 IEEE International Conference on Communications (ICC)

Low-power and Lossy Networks (LLNs) have been a key component in the Internet of Things (IoT) paradigm. Recently, a standardized algorithm, namely Trickle algorithm, is adopted for routing information maintenance in such networks. This algorithm is o... Read More about Drizzle: Adaptive and fair route maintenance algorithm for Low-power and Lossy Networks in IoT.

Simultaneous context inference and mapping using mm-Wave for indoor scenarios (2017)
Presentation / Conference Contribution
Yassin, A., Nasser, Y., Awad, M., & Al-Dubai, A. (2017, May). Simultaneous context inference and mapping using mm-Wave for indoor scenarios. Presented at 2017 IEEE International Conference on Communications (ICC), Paris, France

We introduce in this paper two main approaches, Triangulateration (TL) and Angle-Difference-of-Arrival (ADoA) for indoor localization and mapping using single-anchor and millimeter wave (MMW) propagation characteristics. Then, we perform context infe... Read More about Simultaneous context inference and mapping using mm-Wave for indoor scenarios.

A novel substitution box for encryption based on Lorenz equations (2017)
Presentation / Conference Contribution
Khan, F. A., Ahmed, J., Khan, J. S., Ahmad, J., & Khan, M. A. (2017, July). A novel substitution box for encryption based on Lorenz equations. Presented at 2017 International Conference on Circuits, System and Simulation (ICCSS), London, United Kingdom

Complexity of an encryption algorithm is highly dependent on nonlinear components that drive actual security. Only nonlinear component in all traditional encryption algorithms is mainly Substitution Box (S-Box). In block ciphers, the relationship bet... Read More about A novel substitution box for encryption based on Lorenz equations.

Tailoring methodological bricolage to investigate non-discretionary use of digital technology (2017)
Presentation / Conference Contribution
Sobolewska, E. (2017, July). Tailoring methodological bricolage to investigate non-discretionary use of digital technology. Presented at BHCI 2017: Digital Make Believe, Sunderland, UK

Digital technology appears to be an integral part of everyday life: at homes, workplaces, during leisure time; mediating interactions, demanding attention and engagement. In the age of cloud computing, social media, and ubiquitous mobile devices, it... Read More about Tailoring methodological bricolage to investigate non-discretionary use of digital technology.

Trust-Based Defence Model Against MAC Unfairness Attacks for IoT (2017)
Presentation / Conference Contribution
Djedjig, N., Tandjaoui, D., Romdhani, I., & Medjek, F. (2017, July). Trust-Based Defence Model Against MAC Unfairness Attacks for IoT. Presented at The Thirteenth International Conference on Wireless and Mobile Communications

The vulnerability of IoT networks makes channel access security a serious problem. The IEEE 802.15.4 MAC (Media Access Control) layer faces the risk of attacks from malicious nodes which attempts to get a dominating position and hold unfair advantage... Read More about Trust-Based Defence Model Against MAC Unfairness Attacks for IoT.

Complex Pleasures: Designing Optional interactions for Public Spaces (2017)
Thesis
Helgason, I. Complex Pleasures: Designing Optional interactions for Public Spaces. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/Output/1022893

This research aims to contribute to knowledge about the design of interactive systems sited in public spaces. In particular, the study concerns "optional interactions" where systems invite interaction from passers-by. These systems are action-orienta... Read More about Complex Pleasures: Designing Optional interactions for Public Spaces.

Data-to-Text Generation Improves Decision-Making Under Uncertainty (2017)
Journal Article
Gkatzia, D., Lemon, O., & Rieser, V. (2017). Data-to-Text Generation Improves Decision-Making Under Uncertainty. IEEE Computational Intelligence Magazine, 12(3), 10-17. https://doi.org/10.1109/MCI.2017.2708998

Decision-making is often dependent on uncertain data, e.g. data associated with confidence scores or probabilities. This article presents a comparison of different information presentations for uncertain data and, for the first time, measures their e... Read More about Data-to-Text Generation Improves Decision-Making Under Uncertainty.

The importance of the individual encoding in memetic algorithms with diversity control applied to large Sudoku puzzles (2017)
Presentation / Conference Contribution
Segura, C., Segredo, E., & Miranda, G. (2017, June). The importance of the individual encoding in memetic algorithms with diversity control applied to large Sudoku puzzles. Presented at 2017 IEEE Congress on Evolutionary Computation (CEC)

In recent years, several memetic algorithms with explicit mechanisms to delay convergence have shown great promise when solving 9x9 Sudoku puzzles. This paper analyzes and extends state-of-the-art schemes for dealing with Sudoku puzzles of larger dim... Read More about The importance of the individual encoding in memetic algorithms with diversity control applied to large Sudoku puzzles.

The Effectiveness of Two Audiovisual Mappings to Control a Concatenative Synthesiser (2017)
Presentation / Conference Contribution
Tsiros, A., & Leplâtre, G. (2017, July). The Effectiveness of Two Audiovisual Mappings to Control a Concatenative Synthesiser. Presented at Sound and Music Computing 2017

This paper presents the results of an investigation into audio visual (AV) correspondences conducted as part of the development of Morpheme, a painting interface to control a corpus-based concatenative sound synthesiser. Our goal was to measure the e... Read More about The Effectiveness of Two Audiovisual Mappings to Control a Concatenative Synthesiser.

A new enhanced RPL based routing for Internet of Things (2017)
Presentation / Conference Contribution
Ghaleb, B., Al-Dubai, A., Ekonomou, E., & Wadhaj, I. (2017, June). A new enhanced RPL based routing for Internet of Things. Presented at 2017 IEEE International Conference on Communications Workshops (ICC Workshops)

The IPv6 Routing Protocol for Low-power and Lossy Networks (RPL) has been recently standardized for routing in the constrained Internet of Things networks. Unfortunately, the RPL storing mode has been found restricted by storage limitations in the ro... Read More about A new enhanced RPL based routing for Internet of Things.

A hybrid method for feature construction and selection to improve wind-damage prediction in the forestry sector (2017)
Presentation / Conference Contribution
Hart, E., Sim, K., Gardiner, B., & Kamimura, K. (2017, July). A hybrid method for feature construction and selection to improve wind-damage prediction in the forestry sector. Presented at Proceedings of the Genetic and Evolutionary Computation Conference on - GECCO '17

Catastrophic damage to forests resulting from major storms has resulted in serious timber and financial losses within the sector across Europe in the recent past. Developing risk assessment methods is thus one of the keys to finding forest management... Read More about A hybrid method for feature construction and selection to improve wind-damage prediction in the forestry sector.

Hand Gesture Discrimination with Passive Infrared Sensor Arrays (2017)
Thesis
Wojtczuk, P. Hand Gesture Discrimination with Passive Infrared Sensor Arrays. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/Output/979764

Gesture recognition is a natural way of non-verbal communication for humans. However it is technically challenging to capture the relatively undefined movement of body parts in free space and also extract the intended gestures. Many existing technolo... Read More about Hand Gesture Discrimination with Passive Infrared Sensor Arrays.