Skip to main content

Research Repository

Advanced Search

Reliability and Energy Efficiency Enhancement for Emergency-Aware Wireless Body Area Networks (WBANs) (2018)
Journal Article
Salayma, M., Al-Dubai, A., Romdhani, I., & Nasser, Y. (2018). Reliability and Energy Efficiency Enhancement for Emergency-Aware Wireless Body Area Networks (WBANs). IEEE Transactions on Green Communications and Networking, 2(3), 804-816. https://doi.org/10.1109/tgcn.2018.2813060

Medium Access Control (MAC) protocols based on Time Division Multiple Access (TDMA) can improve the reliability and efficiency of WBAN. However, traditional static TDMA techniques adopted by IEEE 802.15.4 and IEEE 802.15.6 do not sufficiently conside... Read More about Reliability and Energy Efficiency Enhancement for Emergency-Aware Wireless Body Area Networks (WBANs).

Lightweight cryptography methods (2018)
Journal Article
Buchanan, W. J., Li, S., & Asif, R. (2018). Lightweight cryptography methods. Journal of Cyber Security Technology, 1(3-4), 187-201. https://doi.org/10.1080/23742917.2017.1384917

While our conventional cryptography methods, such for AES (encryption), SHA-256 (hashing) and RSA/Elliptic Curve (signing), work well on systems which have reasonable processing power and memory capabilities, these do not scale well into a world with... Read More about Lightweight cryptography methods.

Performance of Cognitive Radio Sensor Networks Using Hybrid Automatic Repeat ReQuest: Stop-and-Wait (2018)
Journal Article
Khan, F., ur Rehman, A., Usman, M., Tan, Z., & Puthal, D. (2018). Performance of Cognitive Radio Sensor Networks Using Hybrid Automatic Repeat ReQuest: Stop-and-Wait. Mobile Networks and Applications, https://doi.org/10.1007/s11036-018-1020-4

The enormous developments in the field of wireless communication technologies have made the unlicensed spectrum bands crowded, resulting uncontrolled interference to the traditional wireless network applications. On the other hand, licensed spectrum... Read More about Performance of Cognitive Radio Sensor Networks Using Hybrid Automatic Repeat ReQuest: Stop-and-Wait.

On the performance of the hybridisation between migrating birds optimisation variants and differential evolution for large scale continuous problems (2018)
Journal Article
VoĂź, S., Segredo, E., Lalla-Ruiz, E., Hart, E., & Voss, S. (2018). On the performance of the hybridisation between migrating birds optimisation variants and differential evolution for large scale continuous problems. Expert Systems with Applications, 102, 126-142. https://doi.org/10.1016/j.eswa.2018.02.024

Migrating Birds Optimisation (mbo) is a nature-inspired approach which has been shown to be very effective when solving a variety of combinatorial optimisation problems. More recently, an adaptation of the algorithm has been proposed that enables it... Read More about On the performance of the hybridisation between migrating birds optimisation variants and differential evolution for large scale continuous problems.

A New Spectrum Management Scheme for Road Safety in Smart Cities (2018)
Journal Article
Alsarhan, A., Al-Dubai, A. Y., Min, G., Zomaya, A. Y., & Bsoul, M. (2018). A New Spectrum Management Scheme for Road Safety in Smart Cities. IEEE Transactions on Intelligent Transportation Systems, 19(11), 3496-3506. https://doi.org/10.1109/TITS.2017.2784548

Traffic management in roads is one of the major challenges faced in developing efficient intelligent transportation systems. Recently, wireless networks have received significant attention for tackling this challenge. However, wireless technologies f... Read More about A New Spectrum Management Scheme for Road Safety in Smart Cities.

Genetic Sensor Placement in Active Control of a Robotic Arm (2018)
Presentation / Conference Contribution
Soufian, M., & Borairi, M. (2017, June). Genetic Sensor Placement in Active Control of a Robotic Arm. Presented at Developments in eSystems Engineering 2017, Paris, France

This paper emphasizes the characterization of the dynamic motions of a robotic arm in terms of poles and zeros. The importance of the transmission zeros of open-loop systems, the role of these zeros in description of such systems, and the dependence... Read More about Genetic Sensor Placement in Active Control of a Robotic Arm.

Load Balancing Objective Function in RPL draft-qasem-roll-rpl-load-balancing-01 (2018)
Report
Qasem, M., Al-Dubai, A., Romdhani, I., & Ghaleb, B. (2018). Load Balancing Objective Function in RPL draft-qasem-roll-rpl-load-balancing-01. USA: IETF

This document proposes an extended Objective Function(OF) that balances the number of children nodes of the parent nodes to avoid the overloading problem and ensure node lifetime maximization in the IPv6 Routing Protocol for Low-Power and Lossy Net... Read More about Load Balancing Objective Function in RPL draft-qasem-roll-rpl-load-balancing-01.

The institutional approach for modeling the evolution of human societies (2018)
Journal Article
Powers, S. T. (2018). The institutional approach for modeling the evolution of human societies. Artificial Life, 24(1), 10-28. https://doi.org/10.1162/ARTL_a_00251

Artificial Life is concerned with understanding the dynamics of human societies. A defining feature of any society is its institutions. However, defining exactly what an institution is has proven difficult, with authors often talking past each other.... Read More about The institutional approach for modeling the evolution of human societies.

Security Risk Assessment of Critical Infrastructure Systems: A Comparative Study (2018)
Journal Article
Tweneboah-Koduah, S., & Buchanan, W. J. (2018). Security Risk Assessment of Critical Infrastructure Systems: A Comparative Study. Computer Journal, 61(9), 1389-1406. https://doi.org/10.1093/comjnl/bxy002

Recent cyberattacks on critical infrastructure systems coupled with the technology-induced complexity of the system of systems have necessitated a review of existing methods of assessing critical systems security risk exposure. The question is; do ex... Read More about Security Risk Assessment of Critical Infrastructure Systems: A Comparative Study.

A Trust-based Intrusion Detection System for Mobile RPL Based Networks (2018)
Presentation / Conference Contribution
Medjek, F., Tandjaoui, D., Romdhani, I., & Djedjig, N. (2017, June). A Trust-based Intrusion Detection System for Mobile RPL Based Networks. Presented at 10th IEEE International Conference on Internet of Things (iThings-2017)

Successful deployment of Low power and Lossy Networks (LLNs) requires self-organising, self-configuring, security, and mobility support. However, these characteristics can be exploited to perform security attacks against the Routing Protocol for Low-... Read More about A Trust-based Intrusion Detection System for Mobile RPL Based Networks.

A new Zigbee-based device for measuring visual reaction time in sport activities (2018)
Presentation / Conference Contribution
Ali, B. B., Dugas, É., Naceur, A., & Romdhani, I. (2017, May). A new Zigbee-based device for measuring visual reaction time in sport activities. Presented at 2017 International Conference on Engineering & MIS (ICEMIS)

There is a growing demand for smart tools and devices that measure visual reaction time during sports and physical activities in outdoor environments. However, one of the major problems is the need to maintain an on-time 1 pulse per second (pps) refe... Read More about A new Zigbee-based device for measuring visual reaction time in sport activities.

Self-Learning Power Control in Wireless Sensor Networks (2018)
Journal Article
Chincoli, M., & Liotta, A. (2018). Self-Learning Power Control in Wireless Sensor Networks. Sensors, 18(2), Article 375. https://doi.org/10.3390/s18020375

Current trends in interconnecting myriad smart objects to monetize on Internet of Things applications have led to high-density communications in wireless sensor networks. This aggravates the already over-congested unlicensed radio bands, calling for... Read More about Self-Learning Power Control in Wireless Sensor Networks.

Computational Mechanics and the Finite Element Method (2018)
Book Chapter
Okereke, M., & Keates, S. (2018). Computational Mechanics and the Finite Element Method. In S.-B. Choi, H. Duan, Y. Fu, C. Guardiola, & J.-Q. Sun (Eds.), Finite Element Applications: A Practical Guide to the FEM Process (3-25). Springer. https://doi.org/10.1007/978-3-319-67125-3_1

This textbook demonstrates the application of the finite element philosophy to the solution of real-world problems and is aimed at graduate level students, but is also suitable for advanced undergraduate students. An essential part of an engineer?s t... Read More about Computational Mechanics and the Finite Element Method.

Decentralized dynamic understanding of hidden relations in complex networks (2018)
Journal Article
Mocanu, D. C., Exarchakos, G., & Liotta, A. (2018). Decentralized dynamic understanding of hidden relations in complex networks. Scientific Reports, 8(1), https://doi.org/10.1038/s41598-018-19356-4

Almost all the natural or human made systems can be understood and controlled using complex networks. This is a difficult problem due to the very large number of elements in such networks, on the order of billions and higher, which makes it impossibl... Read More about Decentralized dynamic understanding of hidden relations in complex networks.

Leveraging multiple datasets for deep leaf counting (2018)
Presentation / Conference Contribution
Dobrescu, A., Giuffrida, M. V., & Tsaftaris, S. A. (2017, October). Leveraging multiple datasets for deep leaf counting. Presented at 2017 IEEE International Conference on Computer Vision Workshops (ICCVW), Venice, Italy

The number of leaves a plant has is one of the key traits (phenotypes) describing its development and growth. Here, we propose an automated, deep learning based approach for counting leaves in model rosette plants. While state-of-the-art results on l... Read More about Leveraging multiple datasets for deep leaf counting.

Distance Measurement Methods for Improved Insider Threat Detection (2018)
Journal Article
Lo, O., Buchanan, W. J., Griffiths, P., & Macfarlane, R. (2018). Distance Measurement Methods for Improved Insider Threat Detection. Security and Communication Networks, 2018, 1-18. https://doi.org/10.1155/2018/5906368

Insider threats are a considerable problem within cyber security and it is often difficult to detect these threats using signature detection. Increasing machine learning can provide a solution, but these methods often fail to take into account change... Read More about Distance Measurement Methods for Improved Insider Threat Detection.

Leaf-based Routing Mechanism for Low-Power and Lossy Networks (2018)
Patent
Ghaleb, B., & Al-Dubai, A. (2018). Leaf-based Routing Mechanism for Low-Power and Lossy Networks. 1800668.4. Intellectual Property Office, UK

Unlike existing solutions, our invention provides a “Leaf-Based” mechanism for establishing the Downward routes in Low-Power and Lossy Networks (LLNs) that seeks to provide a novel, scalable and efficient routing solution for LLNs, which are the back... Read More about Leaf-based Routing Mechanism for Low-Power and Lossy Networks.

Employing machine learning techniques for detection and classification of phishing emails (2018)
Presentation / Conference Contribution
Moradpoor, N., Clavie, B., & Buchanan, B. (2017, July). Employing machine learning techniques for detection and classification of phishing emails. Presented at 2017 Computing Conference, London, UK

A phishing email is a legitimate-looking email which is designed to fool the recipient into believing that it is a genuine email, and either reveals sensitive information or downloads malicious software through clicking on malicious links contained i... Read More about Employing machine learning techniques for detection and classification of phishing emails.

Mining malware command and control traces (2018)
Presentation / Conference Contribution
McLaren, P., Russell, G., & Buchanan, B. (2017, July). Mining malware command and control traces. Presented at 2017 Computing Conference

Detecting botnets and advanced persistent threats is a major challenge for network administrators. An important component of such malware is the command and control channel, which enables the malware to respond to controller commands. The detection o... Read More about Mining malware command and control traces.

Towards a Security Enabled and SOA-based QoS (for the Smart Grid) Architecture (2018)
Journal Article
Chrysoulas, C., & Pitropakis, N. (2018). Towards a Security Enabled and SOA-based QoS (for the Smart Grid) Architecture. EAI Endorsed Transactions on Industrial Networks and Intelligent Systems, 4(12), 153551. https://doi.org/10.4108/eai.10-1-2018.153551

QoS and Security features are playing an important role in modern network architecures. Dynamic selection of services and by extension of service providers are vital in today’s liberalized market of energy. On the other hand it is equally important f... Read More about Towards a Security Enabled and SOA-based QoS (for the Smart Grid) Architecture.