Skip to main content

Research Repository

Advanced Search

Is the Zero-Wait Policy Always Optimum for Information Freshness (Peak Age) or Throughput? (2019)
Journal Article
Barakat, B., Keates, S., Wassell, I., & Arshad, K. (2019). Is the Zero-Wait Policy Always Optimum for Information Freshness (Peak Age) or Throughput?. IEEE Communications Letters, 23(6), 987-990. https://doi.org/10.1109/LCOMM.2019.2907935

The Zero-Wait (ZW) policy is widely held to achieve maximum information 'freshness', i.e., to achieve minimum Peak Age (PA) and maximum throughput, for real-time Internet-of-Things applications. In this paper, it was shown through a series of experim... Read More about Is the Zero-Wait Policy Always Optimum for Information Freshness (Peak Age) or Throughput?.

An Approach to Evolving Legacy Enterprise System to Microservice-Based Architecture through Feature-Driven Evolution Rules (2018)
Journal Article
Habibullah, S., Liu, X., & Tan, Z. (2018). An Approach to Evolving Legacy Enterprise System to Microservice-Based Architecture through Feature-Driven Evolution Rules. International Journal of Computer Theory and Engineering, 10(5), 164-169. https://doi.org/10.7763/ijcte.2018.v10.1219

Evolving legacy enterprise systems into a lean system architecture has been on the agendas of many enterprises. Recent advance in legacy system evaluation is in favour of microservice technologies, which not only significantly reduce the complexity i... Read More about An Approach to Evolving Legacy Enterprise System to Microservice-Based Architecture through Feature-Driven Evolution Rules.

A new rich vehicle routing problem model and benchmark resource (2018)
Presentation / Conference Contribution
Sim, K., Hart, E., Urquhart, N. B., & Pigden, T. (2015, September). A new rich vehicle routing problem model and benchmark resource. Presented at International Conference on Evolutionary and Deterministic Methods for Design, Optimization and Control with Applications to Industrial and Societal Problems, EUROGEN-2015, University of Strathclyde, Glasgow

We describe a new rich VRP model that captures many real-world constraints, following a recently proposed taxonomy that addresses both scenario and problem physical characteristics. The model is used to generate 4800 new instances of rich VRPs which... Read More about A new rich vehicle routing problem model and benchmark resource.

User Experience in Cross-channel Ecosystems (2017)
Presentation / Conference Contribution
Benyon, D., & Resmini, A. (2017, July). User Experience in Cross-channel Ecosystems. Presented at British HCI

Recent developments in information and communication technologies have left interaction design and human-computer interaction (HCI) with something of a conceptual gap. The distinction between physical and digital spaces is increasingly blurred. Cloud... Read More about User Experience in Cross-channel Ecosystems.

Sticky policies approach within cloud computing (2017)
Journal Article
Spyra, G., Buchanan, W. J., & Ekonomou, E. (2017). Sticky policies approach within cloud computing. Computers and Security, 70, 366-375. https://doi.org/10.1016/j.cose.2017.07.005

This paper discusses a secure document sharing approach, which addresses confidentiality, integrity and authenticity concerns related to cloud-based data sharing. This research is focused on a secure construct that would integrate with other cloud re... Read More about Sticky policies approach within cloud computing.

Permaculture as a foundation for sustainable interaction design and UX (2017)
Presentation / Conference Contribution
Egan, C., Benyon, D., & Thompson, R. (2017, July). Permaculture as a foundation for sustainable interaction design and UX. Presented at British HCI 2017

The main objective of this work is to gain an understanding of the relationships between UX and permaculture. This will deliver insights as to how digital media development can support the need for people to live and work in more ecologically conscio... Read More about Permaculture as a foundation for sustainable interaction design and UX.

The REAL Corpus: a crowd-sourced corpus of human generated and evaluated spatial references to real-world urban scenes (2016)
Presentation / Conference Contribution
Bartie, P., Mackaness, W., Gkatzia, D., & Rieser, V. (2016, May). The REAL Corpus: a crowd-sourced corpus of human generated and evaluated spatial references to real-world urban scenes. Presented at 10th International Conference on Language Resources and Evaluation (LREC)

We present a newly crowd-sourced data set of natural language references to objects anchored in complex urban scenes (In short: The REAL Corpus – Referring Expressions Anchored Language). The REAL corpus contains a collection of images of real-world... Read More about The REAL Corpus: a crowd-sourced corpus of human generated and evaluated spatial references to real-world urban scenes.

Hybridisation of Evolutionary Algorithms through hyper-heuristics for global continuous optimisation (2016)
Presentation / Conference Contribution
Segredo, E., Lalla-Ruiz, E., Hart, E., Paechter, B., & VoĂź, S. (2016, May). Hybridisation of Evolutionary Algorithms through hyper-heuristics for global continuous optimisation. Presented at Learning and Intelligent OptimizatioN Conference LION 10, Ischia Island (Napoli), Italy

Choosing the correct algorithm to solve a problem still remains an issue 40 years after the Algorithm Selection Problem was first posed. Here we propose a hyper-heuristic which can apply one of two meta-heuristics at the current stage of the search.... Read More about Hybridisation of Evolutionary Algorithms through hyper-heuristics for global continuous optimisation.

Analysing the performance of migrating birds optimisation approaches for large scale continuous problems (2016)
Presentation / Conference Contribution
Lalla-Ruiz, E., Segredo, E., Voss, S., Hart, E., & Paechter, B. (2016, September). Analysing the performance of migrating birds optimisation approaches for large scale continuous problems. Presented at 14th International Conference on Parallel Problem Solving from Nature (PPSN 2016)

We present novel algorithmic schemes for dealing with large scale continuous problems. They are based on the recently proposed population-based meta-heuristics Migrating Birds Optimisation (mbo) and Multi-leader Migrating Birds Optimisation (mmbo), t... Read More about Analysing the performance of migrating birds optimisation approaches for large scale continuous problems.

Understanding Environmental Influence in an Open-Ended Evolutionary Algorithm (2016)
Presentation / Conference Contribution
Steyven, A., Hart, E., & Paechter, B. (2016, October). Understanding Environmental Influence in an Open-Ended Evolutionary Algorithm. Presented at PPSN 2016 14th International Conference on Parallel Problem Solving from Nature

It is well known that in open-ended evolution, the nature of the environment plays in key role in directing evolution. However, in Evolutionary Robotics, it is often unclear exactly how parameterisation of a given environment might influence the emer... Read More about Understanding Environmental Influence in an Open-Ended Evolutionary Algorithm.

Cooja Simulator Manual (2016)
Report
Thomson, C., Romdhani, I., Al-Dubai, A., Qasem, M., Ghaleb, B., & Wadhaj, I. (2016). Cooja Simulator Manual. Edinburgh: Edinburgh Napier University

While Cooja has been proven to be an ideal tool for the simulation of RPL in WSNs, there are challenges involved in its use, particularly in regard to a lack of documentation. The Contiki website provides an image of Instant Contiki which can then be... Read More about Cooja Simulator Manual.

Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm (2016)
Journal Article
Ambusaidi, M. A., He, X., Nanda, P., & Tan, Z. (2016). Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm. IEEE Transactions on Computers, 65(10), 2986-2998. https://doi.org/10.1109/tc.2016.2519914

Redundant and irrelevant features in data have caused a long-term problem in network traffic classification. These features not only slow down the process of classification but also prevent a classifier from making accurate decisions, especially when... Read More about Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm.

DIY networking as a facilitator for interdisciplinary research on the hybrid city. (2015)
Presentation / Conference Contribution
Andriotis, P., Apostol, I., Gaved, M., Smyth, M., & Unteidig, A. (2015, September). DIY networking as a facilitator for interdisciplinary research on the hybrid city. Presented at Hybrid City 2015: Data to the People

DIY networking is a technology with special characteristics compared to the public Internet, which holds a unique potential for empowering citizens to shape their hybrid urban space toward conviviality and collective awareness. It can also play the r... Read More about DIY networking as a facilitator for interdisciplinary research on the hybrid city..

Requirements Engineering for Digital Health (2015)
Book
Fricker, S. A., Thuemmler, C., & Gavras, A. (2015). Requirements Engineering for Digital Health. Springer. https://doi.org/10.1007/978-3-319-09798-5

Healthcare and well-being have captured the attention of established software companies, start-ups, and investors. Software is starting to play a central role for addressing the problems of the aging society and the escalating cost of healthcare serv... Read More about Requirements Engineering for Digital Health.

Ethical Issues in Digital Health. (2015)
Book Chapter
Lim Jumelle, A. K., & Ispas, I. (2015). Ethical Issues in Digital Health. In Requirements Engineering for Digital Health (75-93). Springer. https://doi.org/10.1007/978-3-319-09798-5_4

With advancement in technology and breakthrough in Internet connectivity, digital health technologies have penetrated all aspects of our lives. Hospital information systems (HIS), electronic health records (EHR), ePrescriptions, eReferrals, personal... Read More about Ethical Issues in Digital Health..

Beats: Tapping Gestures for Smart Watches (2015)
Presentation / Conference Contribution
Oakley, I., Lee, D., Islam, M. R., & Esteves, A. (2015, April). Beats: Tapping Gestures for Smart Watches. Presented at Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems - CHI '15, Seoul, Republic of Korea

Interacting with smartwatches poses new challenges. Although capable of displaying complex content, their extremely small screens poorly match many of the touchscreen interaction techniques dominant on larger mobile devices. Addressing this problem,... Read More about Beats: Tapping Gestures for Smart Watches.

A Dynamic Power Tuning for the Constrained Application Protocol of Internet of Things (2015)
Presentation / Conference Contribution
Qasem, M., Al-Dubai, A., Romdhani, I., & Yassien, M. B. (2015, October). A Dynamic Power Tuning for the Constrained Application Protocol of Internet of Things. Presented at 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing

Constrained application protocol (CoAP) has been designed for M2M and IoT applications. The resource directory (RD) in CoAP requires periodical updates by other nodes. However, a regular update process causes extra signaling overhead and drains the n... Read More about A Dynamic Power Tuning for the Constrained Application Protocol of Internet of Things.

A Decentralized Batch-Based Group Key Management Protocol for Mobile Internet of Things (DBGK) (2015)
Presentation / Conference Contribution
Abdmeziem, M. R., Tandjaoui, D., & Romdhani, I. (2015, October). A Decentralized Batch-Based Group Key Management Protocol for Mobile Internet of Things (DBGK). Presented at 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing

It is anticipated that constrained devices in the Internet of Things (IoT) will often operate in groups to achieve collective monitoring or management tasks. For sensitive and mission-critical sensing tasks, securing multicast applications is therefo... Read More about A Decentralized Batch-Based Group Key Management Protocol for Mobile Internet of Things (DBGK).

Inter-rater reliability in determining the types of vegetation on railway trackbeds (2015)
Presentation / Conference Contribution
Nyberg, R. G., Yella, S., Gupta, N. K., & Dougherty, M. (2015, November). Inter-rater reliability in determining the types of vegetation on railway trackbeds. Presented at International Conference on Web Information Systems Engineering, Springer International Publishing

Vegetation growing on railway trackbeds and embankments can present several potential problems. Consequently, such vegetation is controlled through various maintenance procedures. In order to investigate the extent of maintenance needed, one of the f... Read More about Inter-rater reliability in determining the types of vegetation on railway trackbeds.

Reliability of manual assessments in determining the types of vegetation on railway tracks (2015)
Presentation / Conference Contribution
Nyberg, R. G., Yella, S., Gupta, N. K., & Dougherty, M. (2015, November). Reliability of manual assessments in determining the types of vegetation on railway tracks. Presented at Web Information Systems Engineering – WISE 2015, Miami, FL, USA

Current day vegetation assessments within railway maintenance are (to a large extent) carried out manually. This study has investigated the reliability of such manual assessments by taking three non-domain experts into account. Thirty-five track imag... Read More about Reliability of manual assessments in determining the types of vegetation on railway tracks.