Skip to main content

Research Repository

Advanced Search

Utilising natural cross-modal mappings for visual control of feature-based sound synthesis (2017)
Presentation / Conference Contribution
Tsiros, A., & Leplâtre, G. (2017, November). Utilising natural cross-modal mappings for visual control of feature-based sound synthesis. Presented at International Conference on Multimodal Interaction 2017

This paper presents the results of an investigation into audio-visual (AV) correspondences conducted as part of the development of Morpheme, a painting interface to control a corpus-based concatenative sound synthesis algorithm. Previous research has... Read More about Utilising natural cross-modal mappings for visual control of feature-based sound synthesis.

Fast Millimeter Wave Assisted Beam-Steering for Passive Indoor Optical Wireless Networks (2017)
Journal Article
Torres Vega, M., Koonen, A. M. J., Liotta, A., & Famaey, J. (2018). Fast Millimeter Wave Assisted Beam-Steering for Passive Indoor Optical Wireless Networks. IEEE Wireless Communications Letters, 7(2), 278-281. https://doi.org/10.1109/lwc.2017.2771771

In light of the extreme radio congestion, the time has come to consider the upper parts of the electromagnetic spectrum. Optical beam-steered wireless communications offer great potential for future indoor short-range connectivity, due to virtually u... Read More about Fast Millimeter Wave Assisted Beam-Steering for Passive Indoor Optical Wireless Networks.

Generalized proportional fair (GPF) scheduler for LTE-A (2017)
Presentation / Conference Contribution
Aramide, S. O., Barakat, B., Wang, Y., Keates, S., & Arshad, K. (2017, September). Generalized proportional fair (GPF) scheduler for LTE-A. Presented at 2017 9th Computer Science and Electronic Engineering (CEEC), Colchester, UK

The growth of wireless traffic and the demand for higher data rates motivated researchers around the world to enhance the Long Term Evolution-Advanced (LTE-A) performance. Recently, a considerable amount of the research had been done to optimise the... Read More about Generalized proportional fair (GPF) scheduler for LTE-A.

A virtual uneven grid-based routing protocol for mobile sink-based WSNs in a smart home system (2017)
Journal Article
Liu, X., & Liu, Q. (2018). A virtual uneven grid-based routing protocol for mobile sink-based WSNs in a smart home system. Personal and Ubiquitous Computing, https://doi.org/10.1007/s00779-017-1093-2

In a non-uniformly distributed network, the dataconcentrating centre equipped with sparse nodes rapidly depletes its battery energy due to the hotspot problem. To solve this problem, a Virtual Uneven Grid-based Routing protocol (VUGR) is proposed in... Read More about A virtual uneven grid-based routing protocol for mobile sink-based WSNs in a smart home system.

An applied pattern-driven corpus to predictive analytics in mitigating SQL injection attack (2017)
Presentation / Conference Contribution
Uwagbole, S. O., Buchanan, W. J., & Fan, L. (2017, September). An applied pattern-driven corpus to predictive analytics in mitigating SQL injection attack. Presented at 2017 Seventh International Conference on Emerging Security Technologies (EST)

Emerging computing relies heavily on secure back-end storage for the massive size of big data originating from the Internet of Things (IoT) smart devices to the Cloud-hosted web applications. Structured Query Language (SQL) Injection Attack (SQLIA) r... Read More about An applied pattern-driven corpus to predictive analytics in mitigating SQL injection attack.

Power Consuming Activity Recognition in Home Environment (2017)
Presentation / Conference Contribution
Liu, X., & Liu, Q. (2017, June). Power Consuming Activity Recognition in Home Environment. Presented at the 3rd International Conference on Cloud Computing and Security (ICCCS 2017)

This work proposed an activity recognition model which focus on the power con-suming activity in home environment, to help residents modify their behavior. We set the IoT system with lower number of sensors. The key data for identifying activity come... Read More about Power Consuming Activity Recognition in Home Environment.

A Closer Look at Adaptation Mechanisms in Simulated Environment-Driven Evolutionary Swarm Robotics (2017)
Thesis
Steyven, A. S. W. A Closer Look at Adaptation Mechanisms in Simulated Environment-Driven Evolutionary Swarm Robotics. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/Output/1253630

This thesis investigates several aspects of environment-driven adaptation in simulated evolutionary swarm robotics. It is centred around a specific algorithm for distributed embodied evolution called mEDEA.
Firstly, mEDEA is extended with an explici... Read More about A Closer Look at Adaptation Mechanisms in Simulated Environment-Driven Evolutionary Swarm Robotics.

Hiding in Plain Sight: A Longitudinal Study of Combosquatting Abuse (2017)
Presentation / Conference Contribution
Kintis, P., Miramirkhani, N., Lever, C., Chen, Y., Romero-GĂłmez, R., Pitropakis, N., Nikiforakis, N., & Antonakakis, M. (2017, October). Hiding in Plain Sight: A Longitudinal Study of Combosquatting Abuse. Presented at 2017 ACM SIGSAC Conference on Computer and Communications Security, Dallas, Texas, USA

Domain squatting is a common adversarial practice where attackers register domain names that are purposefully similar to popular domains. In this work, we study a specific type of domain squatting called "combosquatting," in which attackers register... Read More about Hiding in Plain Sight: A Longitudinal Study of Combosquatting Abuse.

Load Balancing Objective Function in RPL (Draft 2) (2017)
Report
Qasem, M., Al-Dubai, A., Romdhani, I., Ghaleb, B., Hou, J., & Jadhav, R. A. (2017). Load Balancing Objective Function in RPL (Draft 2). USA: IETF

This document proposes an extended Objective Function(OF) that balances the number of child nodes of the parent nodes to avoid the overloading problem and ensure node lifetime maximization in the IPv6 Routing Protocol for Low-Power and Lossy Ne... Read More about Load Balancing Objective Function in RPL (Draft 2).

WaveTrace Demo at the Dutch Design Week (2017)
Exhibition / Performance
Verweij, D., Abreu Esteves, A., Khan, V., & Bakker, S. WaveTrace Demo at the Dutch Design Week. Exhibited at Eindhoven, The Netherlands. 21 October 2017 - 29 October 2017

Every design has its own story, a story about ideas, exploring, decisions and adaptations. During Mind the Story, the lecture program that accompanies Mind the Step, the focus is on people involved in the design process. As user, client, organization... Read More about WaveTrace Demo at the Dutch Design Week.

SmoothMoves: smooth pursuits head movements for augmented reality. (2017)
Presentation / Conference Contribution
Abreu Esteves, A., Verweij, D., Suraiya, L., Islam, R., Lee, Y., & Oakley, I. (2017, October). SmoothMoves: smooth pursuits head movements for augmented reality. Presented at 30th Annual ACM Symposium on User Interface Software & Technology

SmoothMoves is an interaction technique for augmented reality (AR) based on smooth pursuits head movements. It works by computing correlations between the movements of on-screen targets and the user’s head while tracking those targets. The paper pres... Read More about SmoothMoves: smooth pursuits head movements for augmented reality..

Performance Evaluation of a Fragmented Secret Share System (2017)
Presentation / Conference Contribution
Ukwandu, E., Buchanan, W. J., & Russell, G. (2017, June). Performance Evaluation of a Fragmented Secret Share System. Presented at 2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)

There are many risks in moving data into public storage environments, along with an increasing threat around large-scale data leakage. Secret sharing scheme has been proposed as a keyless and resilient mechanism to mitigate this, but scaling through... Read More about Performance Evaluation of a Fragmented Secret Share System.

CymaSense: a novel audio-visual therapeutic tool for people on the autism spectrum. (2017)
Presentation / Conference Contribution
McGowan, J., Leplâtre, G., & McGregor, I. (2017, October). CymaSense: a novel audio-visual therapeutic tool for people on the autism spectrum. Presented at Proceedings of the 19th International ACM SIGACCESS Conference on Computers and Accessibility - ASSETS '17

Music Therapy has been shown to be an effective intervention for clients with Autism Spectrum Condition (ASC), a lifelong neurodevelopmental condition that can affect people in a number of ways. This paper presents a study evaluating the use of a mul... Read More about CymaSense: a novel audio-visual therapeutic tool for people on the autism spectrum..

A methodology for the security evaluation within third-party Android Marketplaces (2017)
Journal Article
Buchanan, W. J., Chiale, S., & Macfarlane, R. (2017). A methodology for the security evaluation within third-party Android Marketplaces. Digital Investigation, 23, 88-98. https://doi.org/10.1016/j.diin.2017.10.002

This paper aims to evaluate possible threats with unofficial Android marketplaces, and geo localize the malware distribution over three main regions: China, Europe; and Russia. It provides a comprehensive review of existing academic literature about... Read More about A methodology for the security evaluation within third-party Android Marketplaces.

A framework for data security in cloud using collaborative intrusion detection scheme (2017)
Presentation / Conference Contribution
Nagar, U., Nanda, P., He, X., & Tan, Z. (. (2017, October). A framework for data security in cloud using collaborative intrusion detection scheme. Presented at Proceedings of the 10th International Conference on Security of Information and Networks - SIN '17, Jaipur, India

Cloud computing offers an on demand, elastic, global network access to a shared pool of resources that can be configured on user demand. It offers a unique pay-as-you go feature which is based on measured usage and can be compared to other utility se... Read More about A framework for data security in cloud using collaborative intrusion detection scheme.

For Flux Sake: The Confluence of Socially- and Biologically-Inspired Computing for Engineering Change in Open Systems (2017)
Presentation / Conference Contribution
Pitt, J., & Hart, E. (2017, September). For Flux Sake: The Confluence of Socially- and Biologically-Inspired Computing for Engineering Change in Open Systems. Presented at 2017 IEEE 2nd International Workshops on Foundations and Applications of Self* Systems (FAS*W)

This position paper is concerned with the challenge of engineering multi-scale and long-lasting systems, whose operation is regulated by sets of mutually-agreed, conventional rules. The core of the problem is that there are multiple, inter-dependent... Read More about For Flux Sake: The Confluence of Socially- and Biologically-Inspired Computing for Engineering Change in Open Systems.

Analysis of the adoption of security headers in HTTP (2017)
Journal Article
Buchanan, W. J., Helme, S., & Woodward, A. (2018). Analysis of the adoption of security headers in HTTP. IET Information Security, 12(2), 118-126. https://doi.org/10.1049/iet-ifs.2016.0621

With the increase in the number of threats within Web-based systems, a more integrated approach is required to ensure the enforcement of security policies from the server to the client. These policies aim to stop man-in-the-middle attacks, code injec... Read More about Analysis of the adoption of security headers in HTTP.

Dual-band planar inverted F-L antenna structure for bluetooth and ZigBee applications (2017)
Book Chapter
See, C. H., Oguntala, G. A., Shuaieb, W., Noras, J. M., & Excell, P. S. (2018). Dual-band planar inverted F-L antenna structure for bluetooth and ZigBee applications. In I. Elfergani, A. Hussaini, J. Rodriguez, & R. Abd-Alhameed (Eds.), Antenna Fundamentals for Legacy Mobile Applications and Beyond (39-52). Springer. https://doi.org/10.1007/978-3-319-63967-3_2

This chapter will present and analyse a compact and dual frequency inverted L-F antennas for the operating frequency bands to meet the requirement for IEEE 802.11a/b/g, Bluetooth and ZigBee standards; the optimal design providing a compromise between... Read More about Dual-band planar inverted F-L antenna structure for bluetooth and ZigBee applications.

A new technique for designing 8 Ă— 8 substitution box for image encryption applications (2017)
Presentation / Conference Contribution
Khan, F. A., Ahmed, J., Khan, J. S., Ahmad, J., Khan, M. A., & Hwang, S. O. (2017, September). A new technique for designing 8 Ă— 8 substitution box for image encryption applications. Presented at 2017 9th Computer Science and Electronic Engineering (CEEC), Colchester

To create confusion in ciphertexts, encryption processes depends upon nonlinear mappings. This nonlinear mapping can be achieved by a process known as substitution. In a secure encryption algorithm, substitution plays a key role during confusion stag... Read More about A new technique for designing 8 Ă— 8 substitution box for image encryption applications.