Skip to main content

Research Repository

Advanced Search

Case study methodology (2010)
Presentation / Conference Contribution
Demeke, W. (2010, December). Case study methodology. Paper presented at West London University, School of Hospitality and Tourism

No abstract available.

A Two-Tier System for Web Attack Detection Using Linear Discriminant Method (2010)
Presentation / Conference Contribution
Tan, Z., Jamdagni, A., He, X., Nanda, P., Liu, R. P., Jia, W., & Yeh, W.-C. (2010, December). A Two-Tier System for Web Attack Detection Using Linear Discriminant Method. Presented at 12th International Conference, ICICS 2010, Barcelona, Spain

The reliability and availability of network services are being threatened by the growing number of Denial-of-Service (DoS) attacks. Effective mechanisms for DoS attack detection are demanded. Therefore, we propose a multivariate correlation analysis... Read More about A Two-Tier System for Web Attack Detection Using Linear Discriminant Method.

Simulation and Performance Evaluation of Bandwidth Allocation Algorithms for Ethernet Passive Optical Networks (EPONs) (2010)
Presentation / Conference Contribution
Moradpoor, N., Parr, G., Mcclean, S., Scotney, B., Sivalingam, K., & Madras, I. (2010, December). Simulation and Performance Evaluation of Bandwidth Allocation Algorithms for Ethernet Passive Optical Networks (EPONs). Paper presented at OPNETWORK 2010

Ethernet Passive Optical Network (EPON) has been considered for access networks for quite some time to provide high-speed and high-capacity services. As a novel type of network, EPON presents many challenges so one main aim of this paper is to provid... Read More about Simulation and Performance Evaluation of Bandwidth Allocation Algorithms for Ethernet Passive Optical Networks (EPONs).

Navigating a Speckled World: Interacting with Wireless Sensor Networks (2010)
Book Chapter
Leach, M., & Benyon, D. (2010). Navigating a Speckled World: Interacting with Wireless Sensor Networks. In M. Wachowicz (Ed.), Movement-Aware Applications for Sustainable Mobility (229-242). IGI Global. https://doi.org/10.4018/978-1-61520-769-5.ch014

The Speckled Computing project is a large multisite research project based in Scotland, UK. The aim of the project is to investigate, prototype, and produce tiny (1mm3) computational devices, called Specks, that can be configured into wireless sensor... Read More about Navigating a Speckled World: Interacting with Wireless Sensor Networks.

Using an evolutionary algorithm to discover low CO2 tours within a Travelling Salesman Problem (2010)
Presentation / Conference Contribution
Urquhart, N. B., Scott, C., & Hart, E. (2010, April). Using an evolutionary algorithm to discover low CO2 tours within a Travelling Salesman Problem. Presented at Applications of evolutionary computation : EvoApplications 2010, Istanbul, Turkey

This paper examines the issues surrounding the effects of using vehicle emissions as the fitness criteria when solving routing problems using evolutionary techniques. The case-study examined is that of the Travelling Salesman Problem (TSP) based upon... Read More about Using an evolutionary algorithm to discover low CO2 tours within a Travelling Salesman Problem.

Informing the design of the future urban landscape. (2010)
Presentation / Conference Contribution
Smyth, M., & Helgason, I. (2010, August). Informing the design of the future urban landscape. Presented at DIS '10, Aarhus, Denmark

The urban spaces of the future will be saturated with both visible and hidden media that gather and transmit information. How we as physical beings connect with, interpret and shape this increase of data residing in our environment will be a signific... Read More about Informing the design of the future urban landscape..

Symbiotic cognitive networks: a proposal. (2010)
Presentation / Conference Contribution
Rasheed, T., Hart, E., Falconer, R., & Bown, J. (2010, July). Symbiotic cognitive networks: a proposal. Presented at 9th International Conference Artificial Immune Systems ICARIS 2010

We describe the concept of a cognitive network and propose that ecosystems of co-existing networks which are globally energy efficient while providing the expected quality of service can be realised by exploiting two mechanisms which occur in biologi... Read More about Symbiotic cognitive networks: a proposal..

Concept Neighbourhoods in Lexical Databases (2010)
Presentation / Conference Contribution
Priss, U., & Old, L. J. (2010, March). Concept Neighbourhoods in Lexical Databases. Presented at International Conference on Formal Concept Analysis ICFCA 2010: Formal Concept Analysis, Agadir, Morocco

This paper discusses results from an experimental study of concept
neighbourhoods in WordNet and Roget’s Thesaurus. The general aim of this research is to determine ways in which neighbourhood lattices can be derived in real time from a lexical data... Read More about Concept Neighbourhoods in Lexical Databases.

Concept neighbourhoods in knowledge organisation systems. (2010)
Presentation / Conference Contribution
Priss, U., & Old, L. J. (2010, February). Concept neighbourhoods in knowledge organisation systems. Presented at Eleventh international ISKO conference, Rome, Italy

This paper discusses the application of concept neighbourhoods (in the sense of Formal Concept Analysis) to Knowledge Organisation Systems.
Examples are provided using Roget’s Thesaurus, WordNet and Wikipedia categories

A comparative study of in-band and out-of-band VOIP protocols in layer 3 and layer 2.5 environments (2010)
Thesis
Pallis, G. A comparative study of in-band and out-of-band VOIP protocols in layer 3 and layer 2.5 environments. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/id/eprint/4005

For more than a century the classic circuit-switched telephony in the form of PSTN (Public Service Telephone Network) has dominated the world of phone communications (Varshney et al., 2002). The alternative solution of VoIP (Voice over Internet Proto... Read More about A comparative study of in-band and out-of-band VOIP protocols in layer 3 and layer 2.5 environments.

Analysis of malicious affiliate network activity as a test case for an investigatory framework. (2010)
Presentation / Conference Contribution
Miehling, M. J., Buchanan, W. J., Old, L. J., Batey, A., & Rahman, A. (2010, July). Analysis of malicious affiliate network activity as a test case for an investigatory framework

Currently there is a great deal of literature surrounding methods that can be used to de-tect click-fraud, but there is very little published work on actual cases of click-through fraud. The aim of this paper is to present the details of a real-life... Read More about Analysis of malicious affiliate network activity as a test case for an investigatory framework..

Modelling infection spread using location tracking. (2010)
Journal Article
Mason, A. M., Dingle, N. J., Knottenbelt, W. J., Bell, D., Buchanan, W. J., & Thuemmler, C. (2010). Modelling infection spread using location tracking. International Journal of Healthcare Technology and Management, 11, 442-461. https://doi.org/10.1504/IJHTM.2010.036925

The precision of location tracking technology has improved greatly over the last few decades. We aim to show that by tracking the locations of individuals in a closed environment, it is now possible to record the nature and frequency of interactions... Read More about Modelling infection spread using location tracking..

Improving data quality in data warehousing applications (2010)
Presentation / Conference Contribution
Li, L., Peng, T., & Kennedy, J. (2010, June). Improving data quality in data warehousing applications. Presented at Proceedings of the 12th International Conference on Enterprise Information Systems

There is a growing awareness that high quality of data is a key to today’s business success and dirty data that exits within data sources is one of the reasons that cause poor data quality. To ensure high quality, enterprises need to have a process,... Read More about Improving data quality in data warehousing applications.