Skip to main content

Research Repository

Advanced Search

Visual attention model with a novel learning strategy and its application to target detection from SAR images (2016)
Presentation / Conference Contribution
Gao, F., Xue, X., Wang, J., Sun, J., Hussain, A., & Yang, E. (2016, November). Visual attention model with a novel learning strategy and its application to target detection from SAR images. Presented at BICS 2016: International Conference on Brain Inspired Cognitive Systems, Beijing, China

The selective visual attention mechanism in human visual system helps human to act efficiently when dealing with massive visual information. Over the last two decades, biologically inspired attention model has drawn lots of research attention and man... Read More about Visual attention model with a novel learning strategy and its application to target detection from SAR images.

Predicting insulin resistance in children using a machine-learning-based clinical decision support system (2016)
Presentation / Conference Contribution
Hall, A. J., Hussain, A., & Shaikh, M. G. (2016, November). Predicting insulin resistance in children using a machine-learning-based clinical decision support system. Presented at BICS 2016: International Conference on Brain Inspired Cognitive Systems, Beijing, China

This study proposes a new diagnostic approach based on application of machine learning techniques to anthropometric patient features in order to create a predictive model capable of diagnosing insulin resistance (HOMA-IR).

As part of the study, a... Read More about Predicting insulin resistance in children using a machine-learning-based clinical decision support system.

Modified cat swarm optimization for clustering (2016)
Presentation / Conference Contribution
Razzaq, S., Maqbool, F., & Hussain, A. (2016, November). Modified cat swarm optimization for clustering. Presented at BICS 2016: International Conference on Brain Inspired Cognitive Systems, Beijing, China

Clustering is one of the most challenging optimization problems. Many Swarm Intelligence techniques including Ant Colony optimization (ACO), Particle Swarm Optimization (PSO), and Honey Bee Optimization (HBO) have been used to solve clustering. Cat S... Read More about Modified cat swarm optimization for clustering.

How to Talk to Strangers: generating medical reports for first time users (2016)
Presentation / Conference Contribution
Gkatzia, D., Rieser, V., & Lemon, O. (2016, July). How to Talk to Strangers: generating medical reports for first time users. Presented at FUZZ-IEEE 2016

We propose a novel approach for handling first-time
users in the context of automatic report generation from timeseries
data in the health domain. Handling first-time users is
a common problem for Natural Language Generation (NLG)
and interactive... Read More about How to Talk to Strangers: generating medical reports for first time users.

An Introduction of Non-intrusive Load Monitoring and Its Challenges in System Framework (2016)
Presentation / Conference Contribution
Liu, Q., Lu, M., Liu, X., & Linge, N. (2016, July). An Introduction of Non-intrusive Load Monitoring and Its Challenges in System Framework. Presented at The 2nd International Conference on Cloud Computing and Security, Nanjing, China

With the increasing of energy demand and electricity price, researchers gain more and more interest among the residential load monitoring. In order to feed back the individual appliance’s energy consumption instead of the whole-house energy consumpti... Read More about An Introduction of Non-intrusive Load Monitoring and Its Challenges in System Framework.

A Survey of Speculative Execution Strategy in MapReduce (2016)
Presentation / Conference Contribution
Liu, Q., Jin, D., Liu, X., & Linge, N. (2016, July). A Survey of Speculative Execution Strategy in MapReduce. Presented at the 2nd International Conference on Cloud Computing and Security; Lecture Notes in Computer Science, Nanjing, China

MapReduce is a parallel computing programming model designed to process large-scale data. Therefore, the accuracy and efficiency for computing are needed to be assured and speculative execution is an efficient method for calculation of fault toleranc... Read More about A Survey of Speculative Execution Strategy in MapReduce.

HI-risk: A method to analyse health information risk intelligence (2016)
Presentation / Conference Contribution
Buchanan, W. J., & van Deursen, N. (2016, September). HI-risk: A method to analyse health information risk intelligence. Presented at 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom)

Information security threat intelligence is a prevalent topic amongst researchers, long-established IT-vendors and start-ups. The possibilities of Big Data analytics to security threat and vulnerability scanning offer a significant development in the... Read More about HI-risk: A method to analyse health information risk intelligence.

Ontology Based Business Simulations (2016)
Journal Article
Farrenkopf, T., Guckert, M., Urquhart, N., & Wells, S. (2016). Ontology Based Business Simulations. Journal of Artificial Societies and Social Simulation, 19(4), https://doi.org/10.18564/jasss.3266

Within business games there is a need to provide realistic feedback for decisions made, if such business games are to continue to remain relevant in increasingly complex business environments. We address this problem by using soware agents to simula... Read More about Ontology Based Business Simulations.

Pixel history linear models for real-time temporal filtering. (2016)
Journal Article
Iglesias-Guitian, J. A., Moon, B., Koniaris, C., Smolikowski, E., & Mitchell, K. (2016). Pixel history linear models for real-time temporal filtering. Computer Graphics Forum, 35(7), 363-372. https://doi.org/10.1111/cgf.13033

We propose a new real-time temporal filtering and antialiasing (AA) method for rasterization graphics pipelines. Our method is based on Pixel History Linear Models (PHLM), a new concept for modeling the history of pixel shading values over time using... Read More about Pixel history linear models for real-time temporal filtering..

An efficient and secure partial image encryption for wireless multimedia sensor networks using discrete wavelet transform, chaotic maps and substitution box (2016)
Journal Article
Khan, M. A., Ahmad, J., Javaid, Q., & Saqib, N. A. (2017). An efficient and secure partial image encryption for wireless multimedia sensor networks using discrete wavelet transform, chaotic maps and substitution box. Journal of Modern Optics, 64(5), 531-540. https://doi.org/10.1080/09500340.2016.1246680

Wireless Sensor Networks (WSN) is widely deployed in monitoring of some physical activity and/or environmental conditions. Data gathered from WSN is transmitted via network to a central location for further processing. Numerous applications of WSN ca... Read More about An efficient and secure partial image encryption for wireless multimedia sensor networks using discrete wavelet transform, chaotic maps and substitution box.

A Coordination-Based Brokerage Architecture for Multi-cloud Resource Markets (2016)
Presentation / Conference Contribution
Aldawood, S., Fowley, F., Pahl, C., Taibi, D., & Liu, X. (2016, August). A Coordination-Based Brokerage Architecture for Multi-cloud Resource Markets. Presented at 2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW), Vienna, Austria

With an increasing number of service providers in the cloud market, the competition between these is also increasing. Each provider attempts to attract customers by providing a high quality service with lowest possible cost and at the same time tryin... Read More about A Coordination-Based Brokerage Architecture for Multi-cloud Resource Markets.

Distributed Reservoir Computing with Sparse Readouts [Research Frontier] (2016)
Journal Article
Scardapane, S., Panella, M., Comminiello, D., Hussain, A., & Uncini, A. (2016). Distributed Reservoir Computing with Sparse Readouts [Research Frontier]. IEEE Computational Intelligence Magazine, 11(4), 59-70. https://doi.org/10.1109/MCI.2016.2601759

In a network of agents, a widespread problem is the need to estimate a common underlying function starting from locally distributed measurements. Real-world scenarios may not allow the presence of centralized fusion centers, requiring the development... Read More about Distributed Reservoir Computing with Sparse Readouts [Research Frontier].

Measuring perceived clutter in concept diagrams (2016)
Presentation / Conference Contribution
Hou, T., Chapman, P., & Oliver, I. (2016, September). Measuring perceived clutter in concept diagrams. Presented at 2016 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)

Clutter in a diagram can be broadly defined as how visually complex the diagram is. It may be that different users perceive clutter in different ways, however. Moreover, it has been shown that, for certain types of diagrams and tasks, an increase in... Read More about Measuring perceived clutter in concept diagrams.

Mobilouds: An Energy Efficient MCC Collaborative Framework With Extended Mobile Participation for Next Generation Networks (2016)
Journal Article
Panneerselvam, J., Hardy, J., Liu, L., Yuan, B., & Antonopoulos, N. (2016). Mobilouds: An Energy Efficient MCC Collaborative Framework With Extended Mobile Participation for Next Generation Networks. IEEE Access, 4, 9129-9144. https://doi.org/10.1109/access.2016.2602321

Given the emergence of mobile cloud computing (MCC), its associated energy implications are witnessed at larger scale. With offloading computationally intensive tasks to the cloud datacentres being the basic concept behind MCC, most of the mobile ter... Read More about Mobilouds: An Energy Efficient MCC Collaborative Framework With Extended Mobile Participation for Next Generation Networks.

Will quantum computers be the end of public key encryption? (2016)
Journal Article
Buchanan, W., & Woodward, A. (2016). Will quantum computers be the end of public key encryption?. Journal of Cyber Security Technology, 1(1), 1-22. https://doi.org/10.1080/23742917.2016.1226650

The emergence of practical quantum computers poses a significant threat to the most popular public key cryptographic schemes in current use. While we know that the well-understood algorithms for factoring large composites and solving the discrete log... Read More about Will quantum computers be the end of public key encryption?.

Power analysis attacks on the AES-128 S-box using differential power analysis (DPA) and correlation power analysis (CPA) (2016)
Journal Article
Lo, O., Buchanan, W. J., & Carson, D. (2016). Power analysis attacks on the AES-128 S-box using differential power analysis (DPA) and correlation power analysis (CPA). Journal of Cyber Security Technology, 1(2), 88-107. https://doi.org/10.1080/23742917.2016.1231523

This article demonstrates two fundamental techniques of power analysis, differential power analysis (DPA) and correlation power analysis (CPA), against a modern piece of hardware which is widely available to the public: the Arduino Uno microcontrolle... Read More about Power analysis attacks on the AES-128 S-box using differential power analysis (DPA) and correlation power analysis (CPA).

Trickle-Plus: Elastic Trickle algorithm for Low-power networks and Internet of Things (2016)
Presentation / Conference Contribution
Ghaleb, B., Al-Dubai, A., Ekonomou, E., Paechter, B., & Qasem, M. (2016, April). Trickle-Plus: Elastic Trickle algorithm for Low-power networks and Internet of Things. Presented at 2016 IEEE Wireless Communications and Networking Conference

Constrained Low-power and Lossy networks (LLNs) represent the building block for the ever-growing Internet of Things (IoT) that deploy the Routing Protocol for Low Power and Lossy networks (RPL) as a key routing standard. RPL, along with other routin... Read More about Trickle-Plus: Elastic Trickle algorithm for Low-power networks and Internet of Things.

MLCut: exploring multi-level cuts in dendrograms for biological data (2016)
Presentation / Conference Contribution
Vogogias, A., Kennedy, J., Archambault, D., Anne Smith, V., & Currant, H. (2016, September). MLCut: exploring multi-level cuts in dendrograms for biological data. Presented at Computer Graphics & Visual Computing (CGVC) 2016

Choosing a single similarity threshold for cutting dendrograms is not sufficient for performing hierarchical clustering analysis of heterogeneous data sets. In addition, alternative automated or semi-automated methods that cut dendrograms in multiple... Read More about MLCut: exploring multi-level cuts in dendrograms for biological data.

TraceMatch: a computer vision technique for user input by tracing of animated controls (2016)
Presentation / Conference Contribution
Clarke, C., Bellino, A., Esteves, A., Velloso, E., & Gellersen, H. (2016, September). TraceMatch: a computer vision technique for user input by tracing of animated controls. Presented at Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing - UbiComp '16

Recent works have explored the concept of movement correlation interfaces, in which moving objects can be selected by matching the movement of the input device to that of the desired object. Previous techniques relied on a single modality (e.g. gaze... Read More about TraceMatch: a computer vision technique for user input by tracing of animated controls.

An evaluation of a sketching interface for interaction with concatenative sound synthesis. (2016)
Presentation / Conference Contribution
Tsiros, A., & LePlâtre, G. (2016, September). An evaluation of a sketching interface for interaction with concatenative sound synthesis. Paper presented at 42nd International Computer Music Conference

This paper presents the evaluation of morpheme a sketching interface for the control of sound synthesis. We explain the task that was designed in order to assess the effectiveness of the interface, detect usability issues and gather participants’ res... Read More about An evaluation of a sketching interface for interaction with concatenative sound synthesis..