Skip to main content

Research Repository

Advanced Search

A Lightweight and Efficient Digital Image Encryption Using Hybrid Chaotic Systems for Wireless Network Applications (2019)
Journal Article
Almalkawi, I. T., Halloush, R., Alsarhan, A., Al-Dubai, A., & Al-karaki, J. N. (2019). A Lightweight and Efficient Digital Image Encryption Using Hybrid Chaotic Systems for Wireless Network Applications. Journal of Information Security and Applications, 49, https://doi.org/10.1016/j.jisa.2019.102384

Due to limited processing capabilities and other constraints of most wireless networks, many existing security algorithms do not consider the network efficiency. This is because most of these security solutions exhibit intolerable overhead and consid... Read More about A Lightweight and Efficient Digital Image Encryption Using Hybrid Chaotic Systems for Wireless Network Applications.

An AI approach to Collecting and Analyzing Human Interactions with Urban Environments (2019)
Journal Article
Ferrara, E., Fragale, L., Fortino, G., Song, W., Perra, C., di Mauro, M., & Liotta, A. (2019). An AI approach to Collecting and Analyzing Human Interactions with Urban Environments. IEEE Access, 7, 141476-141486. https://doi.org/10.1109/access.2019.2943845

Thanks to advances in Internet of Things and crowd-sensing, it is possible to collect vast amounts of urban data, to better understand how citizens interact with cities and, in turn, improve human well-being in urban environments. This is a scientifi... Read More about An AI approach to Collecting and Analyzing Human Interactions with Urban Environments.

Statistical Assessment of IP Multimedia Subsystem in a Softwarized Environment: a Queueing Networks Approach (2019)
Journal Article
Di Mauro, M., & Liotta, A. (2019). Statistical Assessment of IP Multimedia Subsystem in a Softwarized Environment: a Queueing Networks Approach. IEEE Transactions on Network and Service Management, 16(4), 1493-1506. https://doi.org/10.1109/tnsm.2019.2943776

The Next Generation 5G Networks can greatly benefit from the synergy between virtualization paradigms, such as the Network Function Virtualization (NFV), and service provisioning platforms such as the IP Multimedia Subsystem (IMS). The NFV concept is... Read More about Statistical Assessment of IP Multimedia Subsystem in a Softwarized Environment: a Queueing Networks Approach.

Outlier Detection of Time Series with A Novel Hybrid Method in Cloud Computing (2019)
Journal Article
Liu, Q., Wang, Z., Liu, X., & Linge, N. (2019). Outlier Detection of Time Series with A Novel Hybrid Method in Cloud Computing. International Journal of High Performance Computing and Networking, 14(4), 435-443. https://doi.org/10.1504/IJHPCN.2019.102350

In the wake of the development in science and technology, Cloud Computing has obtained more attention in different field. Meanwhile, outlier detection for data mining in Cloud Computing is playing more and more significant role in different research... Read More about Outlier Detection of Time Series with A Novel Hybrid Method in Cloud Computing.

Deriving ChaCha20 Key Streams From Targeted Memory Analysis (2019)
Journal Article
McLaren, P., Buchanan, W. J., Russell, G., & Tan, Z. (2019). Deriving ChaCha20 Key Streams From Targeted Memory Analysis. Journal of Information Security and Applications, 48, Article 102372. https://doi.org/10.1016/j.jisa.2019.102372

There can be performance and vulnerability concerns with block ciphers, thus stream ciphers can used as an alternative. Although many symmetric key stream ciphers are fairly resistant to side-channel attacks, cryptographic artefacts may exist in memo... Read More about Deriving ChaCha20 Key Streams From Targeted Memory Analysis.

FRCA: A Novel Flexible Routing Computing Approach for Wireless Sensor Networks (2019)
Journal Article
Liu, P., Wang, X., Hawbani, A., Busaileh, O., Zhao, L., & Al-Dubai, A. (2020). FRCA: A Novel Flexible Routing Computing Approach for Wireless Sensor Networks. IEEE Transactions on Mobile Computing, 19(11), 2623-2639. https://doi.org/10.1109/tmc.2019.2928805

In wireless sensor networks, routing protocols with immutable network policies lacking the flexibility are generally incapable of maintaining desired performance due to the complicated and changeable environment situations and application requirement... Read More about FRCA: A Novel Flexible Routing Computing Approach for Wireless Sensor Networks.

A novel adaptive routing and switching scheme for software-defined vehicular Networks (2019)
Presentation / Conference Contribution
Zhoa, L., Zhao, W., Gong, C., Al-Dubai, A., & Min, G. (2019, May). A novel adaptive routing and switching scheme for software-defined vehicular Networks. Presented at IEEE International Conference on Communications, Shanghai, China

Software-Defined Vehicular Networks (SDVNs) technology has been attracting significant attention as it can make Vehicular Ad Hoc Network (VANET) more efficient and intelligent. SDVN provides a flexible architecture which can decouple the network mana... Read More about A novel adaptive routing and switching scheme for software-defined vehicular Networks.

A temporal-information-based adaptive routing algorithm for software defined vehicular networks (2019)
Presentation / Conference Contribution
Zhao, L., Li, Z., Li, J., Al-Dubai, A., Min, G., & Zomaya, A. Y. (2019, May). A temporal-information-based adaptive routing algorithm for software defined vehicular networks. Presented at IEEE International Conference on Communications (ICC): Ad Hoc and Sensor Networks Symposium, Shanghai, China

In Software Defined Vehicular Networks (SDVNs), most existing studies of routing consider the vehicular network as a static graph and compute the flow table based on static information. However, a static graph could only contain partial network data.... Read More about A temporal-information-based adaptive routing algorithm for software defined vehicular networks.

Increasing Trust in Meta-Heuristics by Using MAP-Elites (2019)
Presentation / Conference Contribution
Urquhart, N., Guckert, M., & Powers, S. (2019, July). Increasing Trust in Meta-Heuristics by Using MAP-Elites. Presented at Genetic and Evolutionary Computation COnference, Prague, Czech Republic

Intelligent AI systems using approaches containing emergent elements often encounter acceptance problems. Results do not get sufficiently explained and the procedure itself can not be fully retraced because the flow of control is dependent on stochas... Read More about Increasing Trust in Meta-Heuristics by Using MAP-Elites.

Evolving robust policies for community energy system management (2019)
Presentation / Conference Contribution
Cardoso, R., Hart, E., & Pitt, J. (2019, July). Evolving robust policies for community energy system management. Presented at GECCO '19, Prague, Czech Republic

Community energy systems (CESs) are shared energy systems in which multiple communities generate and consume energy from renewable resources. At regular time intervals, each participating community decides whether to self-supply, store, trade, or sel... Read More about Evolving robust policies for community energy system management.

Algorithm selection using deep learning without feature extraction (2019)
Presentation / Conference Contribution
Alissa, M., Sim, K., & Hart, E. (2019, July). Algorithm selection using deep learning without feature extraction. Presented at Genetic and Evolutionary Computing Conference (GECCO) 2019, Prague, Czech Republic

We propose a novel technique for algorithm-selection which adopts a deep-learning approach, specifically a Recurrent-Neural Network with Long-Short-Term-Memory (RNN-LSTM). In contrast to the majority of work in algorithm-selection, the approach does... Read More about Algorithm selection using deep learning without feature extraction.

An Illumination Algorithm Approach to Solving the Micro-Depot Routing Problem (2019)
Presentation / Conference Contribution
Urquhart, N., Hoehl, S., & Hart, E. (2019, July). An Illumination Algorithm Approach to Solving the Micro-Depot Routing Problem. Presented at Genetic and Evolutionary Computation Conference (GECCO '19), Prague, Czech Republic

An increasing emphasis on reducing pollution and congestion in city centres combined with an increase in online shopping is changing the ways in which logistics companies address vehicle routing problems (VRP). We introduce the {\em micro-depot}-VRP,... Read More about An Illumination Algorithm Approach to Solving the Micro-Depot Routing Problem.

How autonomous control can improve the performance of logistics networks - a simulation experiment (2019)
Thesis
Preinl, T. How autonomous control can improve the performance of logistics networks - a simulation experiment. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/Output/2089989

In this thesis the application of autonomous control concepts to logistics networks is studied by means of a simulation model. This simulation model is based on an actual outbound bulk product supply network of a commodity company.
Logistics planni... Read More about How autonomous control can improve the performance of logistics networks - a simulation experiment.

Reviving legacy enterprise systems with microservice-based architecture within cloud environments (2019)
Presentation / Conference Contribution
Habibullah, S., Liu, X., Tan, Z., Zhang, Y., & Liu, Q. (2019, June). Reviving legacy enterprise systems with microservice-based architecture within cloud environments. Presented at 5th International Conference on Software Engineering (SOFT 2019), Copenhagen, Denmark

Evolution has always been a challenge for enterprise computing systems. The microservice based architecture is a new design model which is rapidly becoming one of the most effective means to re-architect legacy enterprise systems and to reengineer th... Read More about Reviving legacy enterprise systems with microservice-based architecture within cloud environments.

Embedded document security using sticky policies and identity based encryption (2019)
Thesis
Spyra, G. K. Embedded document security using sticky policies and identity based encryption. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/Output/2090564

Data sharing domains have expanded over several, both trusted and insecure environments. At the same time, the data security boundaries have shrunk from internal network perimeters down to a single identity and a piece of information. Since new EU GD... Read More about Embedded document security using sticky policies and identity based encryption.

A Cognitive IoE (Internet of Everything) Approach to Ambient-Intelligent Smart Space (2019)
Thesis
Singh Jamnal, G. A Cognitive IoE (Internet of Everything) Approach to Ambient-Intelligent Smart Space. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/Output/2090321

At present, the United Nations figures claim that the current world population would rise from 7.6 billion to 8.5 billion in 2030 and 9.7 billion in 2050. Therefore by the 2050, 65 percent of world’s population would be living in urban mega-cities an... Read More about A Cognitive IoE (Internet of Everything) Approach to Ambient-Intelligent Smart Space.

Efficient Routing Primitives for Low-power and Lossy Networks in Internet of Things (2019)
Thesis
Ghaleb, B. Efficient Routing Primitives for Low-power and Lossy Networks in Internet of Things. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/Output/2070542

At the heart of the Internet of Things (IoTs) are the Low-power and Lossy networks (LLNs), a collection of interconnected battery-operated and resource-constrained tiny devices that enable the realization of a wide range of applications in multiple d... Read More about Efficient Routing Primitives for Low-power and Lossy Networks in Internet of Things.

Constructing and Evaluating Visualisation Task Classifications: Process and Considerations (2019)
Presentation / Conference Contribution
Kerracher, N., & Kennedy, J. (2017, June). Constructing and Evaluating Visualisation Task Classifications: Process and Considerations. Presented at EuroVis 2017 Eurographics / IEEE VGTC Conference on Visualization 2017, Barcelona, Spain

Categorising tasks is a common pursuit in the visualisation research community, with a wide variety of taxonomies, typologies, design spaces, and frameworks having been developed over the last three decades. While these classifications are universall... Read More about Constructing and Evaluating Visualisation Task Classifications: Process and Considerations.

Identity and belonging for graduate apprenticeships in computing: the experience of first cohort degree apprentices in Scotland (2019)
Presentation / Conference Contribution
Taylor-Smith, E., Smith, S., & Smith, C. (2019, July). Identity and belonging for graduate apprenticeships in computing: the experience of first cohort degree apprentices in Scotland. Presented at Innovation and Technology in Computer Science Education (ITiCSE), Aberdeen

In September 2017, our university’s first graduate apprentices began degrees in Software Development, Cybersecurity, and Information Technology Management for Business. This study explores how apprentices experience their association with the univers... Read More about Identity and belonging for graduate apprenticeships in computing: the experience of first cohort degree apprentices in Scotland.

Simulating Dynamic Vehicle Routing Problems with Athos (2019)
Presentation / Conference Contribution
Hoffman, B., Guckert, M., Chalmers, K., & Urquhart, N. (2019, June). Simulating Dynamic Vehicle Routing Problems with Athos. Presented at ECMS2019: 33rd INTERNATIONAL ECMS CONFERENCE ON MODELLING AND SIMULATION, Napoli, Italy

Complex routing problems, such as vehicle routing problems with additional constraints, are both hard to solve and hard to express in a form that is accessible to the human expert and at the same time processible by a computer system that is supposed... Read More about Simulating Dynamic Vehicle Routing Problems with Athos.