Skip to main content

Research Repository

Advanced Search

Case study methodology (2010)
Presentation / Conference
Demeke, W. (2010, December). Case study methodology. Paper presented at West London University, School of Hospitality and Tourism

No abstract available.

A Two-Tier System for Web Attack Detection Using Linear Discriminant Method (2010)
Conference Proceeding
Tan, Z., Jamdagni, A., He, X., Nanda, P., Liu, R. P., Jia, W., & Yeh, W. (2010). A Two-Tier System for Web Attack Detection Using Linear Discriminant Method. In Information and Communications Security (459-471). https://doi.org/10.1007/978-3-642-17650-0_32

The reliability and availability of network services are being threatened by the growing number of Denial-of-Service (DoS) attacks. Effective mechanisms for DoS attack detection are demanded. Therefore, we propose a multivariate correlation analysis... Read More about A Two-Tier System for Web Attack Detection Using Linear Discriminant Method.

Simulation and Performance Evaluation of Bandwidth Allocation Algorithms for Ethernet Passive Optical Networks (EPONs) (2010)
Presentation / Conference
Moradpoor, N., Parr, G., Mcclean, S., Scotney, B., Sivalingam, K., & Madras, I. (2010, December). Simulation and Performance Evaluation of Bandwidth Allocation Algorithms for Ethernet Passive Optical Networks (EPONs). Paper presented at OPNETWORK 2010

Ethernet Passive Optical Network (EPON) has been considered for access networks for quite some time to provide high-speed and high-capacity services. As a novel type of network, EPON presents many challenges so one main aim of this paper is to provid... Read More about Simulation and Performance Evaluation of Bandwidth Allocation Algorithms for Ethernet Passive Optical Networks (EPONs).

Navigating a Speckled World: Interacting with Wireless Sensor Networks (2010)
Book Chapter
Leach, M., & Benyon, D. (2010). Navigating a Speckled World: Interacting with Wireless Sensor Networks. In M. Wachowicz (Ed.), Movement-Aware Applications for Sustainable Mobility (229-242). Hershey, PA: IGI Global. https://doi.org/10.4018/978-1-61520-769-5.ch014

The Speckled Computing project is a large multisite research project based in Scotland, UK. The aim of the project is to investigate, prototype, and produce tiny (1mm3) computational devices, called Specks, that can be configured into wireless sensor... Read More about Navigating a Speckled World: Interacting with Wireless Sensor Networks.

Using an evolutionary algorithm to discover low CO2 tours within a Travelling Salesman Problem (2010)
Conference Proceeding
Urquhart, N. B., Scott, C., & Hart, E. (2010). Using an evolutionary algorithm to discover low CO2 tours within a Travelling Salesman Problem. In C. Chio, A. Brabazon, G. A. Di Caro, M. Ebner, M. Farooq, A. Fink, …N. Urquhart (Eds.), Applications of evolutionary computation : EvoApplications 2010: EvoCOMNET, EvoENVIRONMENT, EvoFIN, EvoMUSART, and EvoTRANSLOG, Istanbul, Turkey, April 7-9, 2010, Proceedings, Part II (421-430). https://doi.org/10.1007/978-3-642-12242-2_43

This paper examines the issues surrounding the effects of using vehicle emissions as the fitness criteria when solving routing problems using evolutionary techniques. The case-study examined is that of the Travelling Salesman Problem (TSP) based upon... Read More about Using an evolutionary algorithm to discover low CO2 tours within a Travelling Salesman Problem.

Informing the design of the future urban landscape. (2010)
Conference Proceeding
Smyth, M., & Helgason, I. (2010). Informing the design of the future urban landscape. In Proceedings of the 8th ACM Conference on Designing Interactive Systems (438-440). https://doi.org/10.1145/1858171.1858259

The urban spaces of the future will be saturated with both visible and hidden media that gather and transmit information. How we as physical beings connect with, interpret and shape this increase of data residing in our environment will be a signific... Read More about Informing the design of the future urban landscape..

Symbiotic cognitive networks: a proposal. (2010)
Conference Proceeding
Rasheed, T., Hart, E., Falconer, R., & Bown, J. (2010). Symbiotic cognitive networks: a proposal. In E. Hart, C. McEwan, J. Timmis, & A. Hone (Eds.), Artificial Immune Systems: 9th International Conference, ICARIS 2010 Proceedings (326-328). https://doi.org/10.1007/978-3-642-14547-6_32

We describe the concept of a cognitive network and propose that ecosystems of co-existing networks which are globally energy efficient while providing the expected quality of service can be realised by exploiting two mechanisms which occur in biologi... Read More about Symbiotic cognitive networks: a proposal..

Concept Neighbourhoods in Lexical Databases (2010)
Conference Proceeding
Priss, U., & Old, L. J. (2010). Concept Neighbourhoods in Lexical Databases. In L. Kwuida, & B. Sertkaya (Eds.), Formal Concept Analysis (283-295). https://doi.org/10.1007/978-3-642-11928-6_20

This paper discusses results from an experimental study of concept neighbourhoods in WordNet and Roget’s Thesaurus. The general aim of this research is to determine ways in which neighbourhood lattices can be derived in real time from a lexical data... Read More about Concept Neighbourhoods in Lexical Databases.

Concept neighbourhoods in knowledge organisation systems. (2010)
Conference Proceeding
Priss, U., & Old, L. J. (2010). Concept neighbourhoods in knowledge organisation systems. In C. Gnoli, & F. Mazzocchi (Eds.), Paradigms and conceptual systems in knowledge organization

This paper discusses the application of concept neighbourhoods (in the sense of Formal Concept Analysis) to Knowledge Organisation Systems. Examples are provided using Roget’s Thesaurus, WordNet and Wikipedia categories

A comparative study of in-band and out-of-band VOIP protocols in layer 3 and layer 2.5 environments (2010)
Thesis
Pallis, G. (2010). A comparative study of in-band and out-of-band VOIP protocols in layer 3 and layer 2.5 environments. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/4005

For more than a century the classic circuit-switched telephony in the form of PSTN (Public Service Telephone Network) has dominated the world of phone communications (Varshney et al., 2002). The alternative solution of VoIP (Voice over Internet Proto... Read More about A comparative study of in-band and out-of-band VOIP protocols in layer 3 and layer 2.5 environments.

Analysis of malicious affiliate network activity as a test case for an investigatory framework. (2010)
Conference Proceeding
Miehling, M. J., Buchanan, W. J., Old, L. J., Batey, A., & Rahman, A. (2010). Analysis of malicious affiliate network activity as a test case for an investigatory framework. In Proceedings of 9th European Conference on Information Warfare and Security (209)

Currently there is a great deal of literature surrounding methods that can be used to de-tect click-fraud, but there is very little published work on actual cases of click-through fraud. The aim of this paper is to present the details of a real-life... Read More about Analysis of malicious affiliate network activity as a test case for an investigatory framework..

Clonal selection from first principles. (2010)
Conference Proceeding
McEwan, C., & Hart, E. (2010). Clonal selection from first principles. In E. Hart, C. McEwan, J. Timmis, & A. Hone (Eds.), Artificial Immune Systems, Proceedings of 9th International Conference, ICARIS 2010 (18-32). https://doi.org/10.1007/978-3-642-14547-6_3

Clonal selection is the keystone of mainstream immunology and computational systems based on immunological principles. For the latter, clonal selection is often interpreted as an asexual variant of natural selection, and thus, tend to be variation... Read More about Clonal selection from first principles..

Modelling infection spread using location tracking. (2010)
Journal Article
Mason, A. M., Dingle, N. J., Knottenbelt, W. J., Bell, D., Buchanan, W. J., & Thuemmler, C. (2010). Modelling infection spread using location tracking. International Journal of Healthcare Technology and Management, 11, 442-461. https://doi.org/10.1504/IJHTM.2010.036925

The precision of location tracking technology has improved greatly over the last few decades. We aim to show that by tracking the locations of individuals in a closed environment, it is now possible to record the nature and frequency of interactions... Read More about Modelling infection spread using location tracking..

Improving data quality in data warehousing applications (2010)
Conference Proceeding
Li, L., Peng, T., & Kennedy, J. (2010). Improving data quality in data warehousing applications. In J. Filipe, & J. Cordeiro (Eds.), Proceedings of the 12th International Conference on Enterprise Information Systems (379-382). https://doi.org/10.5220/0002903903790382

There is a growing awareness that high quality of data is a key to today’s business success and dirty data that exits within data sources is one of the reasons that cause poor data quality. To ensure high quality, enterprises need to have a process,... Read More about Improving data quality in data warehousing applications.