Skip to main content

Research Repository

Advanced Search

Browse


A Dual-spine Approach to Load Error Repair in a HEMS Sensor Network (2018)
Journal Article
Liu, X., Liu, Q., & Sun, M. (2018). A Dual-spine Approach to Load Error Repair in a HEMS Sensor Network. Computers, Materials & Continua, 57(2), 179-194. https://doi.org/10.32604/cmc.2018.04025

In a home energy management system (HEMS), appliances are becoming diversified and intelligent, so that certain simple maintenance work can be completed by appliances themselves. During the measurement, collection and transmission of electricity load... Read More about A Dual-spine Approach to Load Error Repair in a HEMS Sensor Network.

A Look at the Effects of Handheld and Projected Augmented-reality on a Collaborative Task (2018)
Conference Proceeding
Mackamul, E. B., & Esteves, A. (2018). A Look at the Effects of Handheld and Projected Augmented-reality on a Collaborative Task. In SUI '18 Symposium on Spatial User Interaction. https://doi.org/10.1145/3267782.3267793

This paper presents a comparative study between two popular AR systems during a collocated collaborative task. The goal of the study is to start a body of knowledge that describes the effects of different AR approaches in users' experience and perfor... Read More about A Look at the Effects of Handheld and Projected Augmented-reality on a Collaborative Task.

Get Your Project Funded: Using Biometric Data to Understand What Makes People Trust and Support Crowdfunding Campaigns (2018)
Conference Proceeding
Mcneill, M., Lawson, A., Raeside, R., & Peisl, T. (2018). Get Your Project Funded: Using Biometric Data to Understand What Makes People Trust and Support Crowdfunding Campaigns. In Proceedings of the 32nd International BCS Human Computer Interaction Conference (HCI 2018). https://doi.org/10.14236/ewic/HCI2018.127

Creating a good crowdfunding campaign is difficult. By understanding why people contribute to crowdfunding campaigns we can make campaigns better and raise more money. Crowdfunding websites allow entrepreneurs to make a pitch, which is watched by pot... Read More about Get Your Project Funded: Using Biometric Data to Understand What Makes People Trust and Support Crowdfunding Campaigns.

A Cooperative Learning Approach for the Quadratic Knapsack Problem (2018)
Conference Proceeding
Lalla-Ruiz, E., Segredo, E., & Voß, S. (2018). A Cooperative Learning Approach for the Quadratic Knapsack Problem. In Learning and Intelligent Optimization Conference (LION12) (31-35). https://doi.org/10.1007/978-3-030-05348-2_3

The Quadratic Knapsack Problem (QKP) is a well-known optimization problem aimed to maximize a quadratic objective function subject to linear capacity constraints. It has several applications in different fields such as telecommunications, graph theor... Read More about A Cooperative Learning Approach for the Quadratic Knapsack Problem.

NgramPOS: A Bigram-based Linguistic and Statistical Feature Process Model for Unstructured Text Classification (2018)
Journal Article
Yazdania, S., Tan, Z., Kakavand, M., & Lau, S. (2022). NgramPOS: A Bigram-based Linguistic and Statistical Feature Process Model for Unstructured Text Classification. Wireless Networks, 28, 1251-1261. https://doi.org/10.1007/s11276-018-01909-0

Research in financial domain has shown that sentiment aspects of stock news have a profound impact on volume trades, volatility, stock prices and firm earnings. With the ever growing social inetworking and online marketing sites, the reviews obtained... Read More about NgramPOS: A Bigram-based Linguistic and Statistical Feature Process Model for Unstructured Text Classification.

Reducing the Impact of Network Bottlenecks on Remote Contraband Detection (2018)
Conference Proceeding
McKeown, S., Russell, G., & Leimich, P. (2018). Reducing the Impact of Network Bottlenecks on Remote Contraband Detection. In 2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security). https://doi.org/10.1109/CyberSecPODS.2018.8560671

Cloud based storage is increasing in popularity, with large volumes of data being stored remotely. Digital forensics investigators examining such systems remotely are limited by bandwidth constraints when accessing this kind of data using traditi... Read More about Reducing the Impact of Network Bottlenecks on Remote Contraband Detection.

Sub-file Hashing Strategies for Fast Contraband Detection (2018)
Conference Proceeding
McKeown, S., Russell, G., & Leimich, P. (2018). Sub-file Hashing Strategies for Fast Contraband Detection. In 2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security). https://doi.org/10.1109/CyberSecPODS.2018.8560680

Traditional digital forensics processes do not scale well with the huge quantities of data present in a modern investigation, resulting in large investigative backlogs for many law enforcement agencies. Data reduction techniques are required for fast... Read More about Sub-file Hashing Strategies for Fast Contraband Detection.

A supervised energy monitoring-based machine learning approach for anomaly detection in a clean water supply system (2018)
Conference Proceeding
Robles-Durazno, A., Moradpoor, N., McWhinnie, J., & Russell, G. (2018). A supervised energy monitoring-based machine learning approach for anomaly detection in a clean water supply system. In Proceedings of the IEEE International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2018). https://doi.org/10.1109/CyberSecPODS.2018.8560683

Industrial Control Systems are part of our daily life in industries such as transportation, water, gas, oil, smart cities, and telecommunications. Technological development over time have improved their components including operating system platforms... Read More about A supervised energy monitoring-based machine learning approach for anomaly detection in a clean water supply system.

Trusting Intelligent Machines: Deepening Trust Within Socio-Technical Systems (2018)
Journal Article
Andras, P., Esterle, L., Guckert, M., Anh Han, T., Lewis, P. R., Milanovic, K., …Wells, S. (2018). Trusting Intelligent Machines: Deepening Trust Within Socio-Technical Systems. IEEE technology & society magazine, 37(4), 76-83. https://doi.org/10.1109/MTS.2018.2876107

Intelligent machines have reached capabilities that go beyond a level that a human being can fully comprehend without sufficiently detailed understanding of the underlying mechanisms. The choice of moves in the game Go (generated by Deep Mind?s Alpha... Read More about Trusting Intelligent Machines: Deepening Trust Within Socio-Technical Systems.

SMK-means: An Improved Mini Batch K-means Algorithm Based on Mapreduce with Big Data (2018)
Journal Article
Xiao, B., Wang, Z., Liu, Q., & Liu, X. (2018). SMK-means: An Improved Mini Batch K-means Algorithm Based on Mapreduce with Big Data. Computers, Materials & Continua, 56(3), 365-379. https://doi.org/10.3970/cmc.2018.01830

In recent years, the rapid development of big data technology has also been favored by more and more scholars. Massive data storage and calculation problems have also been solved. At the same time, outlier detection problems in mass data have also co... Read More about SMK-means: An Improved Mini Batch K-means Algorithm Based on Mapreduce with Big Data.

Short-long term anomaly detection in wireless sensor networks based on machine learning and multi-parameterized edit distance (2018)
Journal Article
Cauteruccio, F., Fortino, G., Guerrieri, A., Liotta, A., Mocanu, D. C., Perra, C., …Torres Vega, M. (2019). Short-long term anomaly detection in wireless sensor networks based on machine learning and multi-parameterized edit distance. Information Fusion, 52, 13-30. https://doi.org/10.1016/j.inffus.2018.11.010

Heterogeneous wireless sensor networks are a source of large amount of different information representing environmental aspects such as light, temperature, and humidity. A very important research problem related to the analysis of the sensor data is... Read More about Short-long term anomaly detection in wireless sensor networks based on machine learning and multi-parameterized edit distance.

Impact of cyberattacks on stock performance: a comparative study (2018)
Journal Article
Tweneboah-Kodua, S., Atsu, F., & Buchanan, W. (2018). Impact of cyberattacks on stock performance: a comparative study. Information and Computer Security, 26(5), 637-652. https://doi.org/10.1108/ics-05-2018-0060

The study uses cyberattacks announcements on 96 firms that are listed on S&P 500 over the period January 03, 2013 and December 29, 2017. The empirical analysis was performed in two ways: cross-section and industry level. We employ statistical tests... Read More about Impact of cyberattacks on stock performance: a comparative study.

Cross-Layer Multipath Multichannel MAC protocol for MANETs (2018)
Conference Proceeding
Mirza, N., Taylor, H., Abdelshafy, M., King, P., Romdhani, I., & Alghamdi, A. (2018). Cross-Layer Multipath Multichannel MAC protocol for MANETs. In Proceedings of the International Symposium on Networks, Computers and Communications (ISNCC). https://doi.org/10.1109/ISNCC.2018.8530886

Utilising multiple disjoint paths in multiple channels can improve network performance by enabling a node to reroute data along discovered paths seamlessly when link failure is detected. However, depending on a stale route to recover from a broken li... Read More about Cross-Layer Multipath Multichannel MAC protocol for MANETs.

MOSAIC: Simultaneous Localization and Environment Mapping using mmWave without a-priori Knowledge (2018)
Journal Article
Yassin, A., Nasser, Y., Al-Dubai, A., & Awad, M. (2018). MOSAIC: Simultaneous Localization and Environment Mapping using mmWave without a-priori Knowledge. IEEE Access, 6, 68932-68947. https://doi.org/10.1109/access.2018.2879436

Simultaneous Localization and environment mapping (SLAM) is the core to robotic mapping and navigation as it constructs simultaneously the unknown environment and localizes the agent within. However, in millimeter wave (mmWave) research, SLAM is stil... Read More about MOSAIC: Simultaneous Localization and Environment Mapping using mmWave without a-priori Knowledge.

A pattern-driven corpus to predictive analytics in mitigating SQL injection attack (2018)
Thesis
Uwagbole, S. A pattern-driven corpus to predictive analytics in mitigating SQL injection attack. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/Output/1538260

The back-end database provides accessible and structured storage for each web application’s big data internet web traffic exchanges stemming from cloud-hosted web applications to the Internet of Things (IoT) smart devices in emerging computing. Struc... Read More about A pattern-driven corpus to predictive analytics in mitigating SQL injection attack.

Reliable and energy efficient scheduling protocols for wireless body area networks (WBAN) (2018)
Thesis
Salayma, M. Reliable and energy efficient scheduling protocols for wireless body area networks (WBAN). (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/Output/1532410

Wireless Body Area Network (WBAN) facilitates efficient and cost-effective e-health care and well-being applications. The WBAN has unique challenges and features compared to other Wireless Sensor Networks (WSN). In addition to battery power consumpti... Read More about Reliable and energy efficient scheduling protocols for wireless body area networks (WBAN).

Research grounded support of student learning in Higher Education: The importance of dialogue and subject embedded, contextualised language and content. (2018)
Thesis
Richards, K. Research grounded support of student learning in Higher Education: The importance of dialogue and subject embedded, contextualised language and content. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/Output/1532248

This aim of this thesis is to demonstrate how the research that has been conducted by the author, as illustrated through the publications presented, adds to the domain of academic support – specifically the theory and practice of academic support wit... Read More about Research grounded support of student learning in Higher Education: The importance of dialogue and subject embedded, contextualised language and content..

Load balancing and context aware enhancements for RPL routed Internet of Things. (2018)
Thesis
Qasem, M. Load balancing and context aware enhancements for RPL routed Internet of Things. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/Output/1532122

Internet of Things (IoT) has been paving the way for a plethora of potential applications, which becomes more spatial and demanding. The goal of this work is to optimise the performance within the IPv6 Routing Protocol for Low-Power and Lossy Network... Read More about Load balancing and context aware enhancements for RPL routed Internet of Things..

Engineering Sustainable and Adaptive Systems in Dynamic and Unpredictable Environments (2018)
Conference Proceeding
Cardoso, R. P., Rossetti, R. J. F., Hart, E., Kurka, D. B., & Pitt, J. (2018). Engineering Sustainable and Adaptive Systems in Dynamic and Unpredictable Environments. In T. Margaria, & B. Steffen (Eds.), Leveraging Applications of Formal Methods, Verification and Validation. Distributed Systems (221-240). https://doi.org/10.1007/978-3-030-03424-5_15

Electronic institutions are socially-inspired multi-agent systems, typically operating under a set of policies, which are required to determine system operation and to deal with violations and other non-compliant behaviour. They are often faced with... Read More about Engineering Sustainable and Adaptive Systems in Dynamic and Unpredictable Environments.