Skip to main content

Research Repository

Advanced Search

VANET aided D2D Discovery: Delay Analysis and Performance (2017)
Journal Article
Chour, H., Nasser, Y., Artail, H., Kachouh, A., & Al-Dubai, A. (2017). VANET aided D2D Discovery: Delay Analysis and Performance. IEEE Transactions on Vehicular Technology, 66(9), 8059-8071. https://doi.org/10.1109/TVT.2017.2690238

The proposed solutions in the literature for integrating Device-to-Device (D2D) communication in cellular networks require added functionalities and consume valuable network resources, mainly in the discovery process. Unlike existing solutions, this... Read More about VANET aided D2D Discovery: Delay Analysis and Performance.

Tasks and visual techniques for the exploration of temporal graph data (2017)
Thesis
Kerracher, N. Tasks and visual techniques for the exploration of temporal graph data. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/Output/977758

This thesis considers the tasks involved in exploratory analysis of temporal graph data, and the visual techniques which are able to support these tasks.

There has been an enormous increase in the amount and availability of graph (network) data,... Read More about Tasks and visual techniques for the exploration of temporal graph data.

Wireless Body Area Network (WBAN): A Survey on Reliability, Fault Tolerance, and Technologies Coexistence (2017)
Journal Article
Salayma, M., Al-Dubai, A., Romdhani, I., & Nasser, Y. (2017). Wireless Body Area Network (WBAN): A Survey on Reliability, Fault Tolerance, and Technologies Coexistence. ACM computing surveys, 50(1), Article 3. https://doi.org/10.1145/3041956

Wireless Body Area Network (WBAN) has been a key element in e-health to monitor bodies. This technology enables new applications under the umbrella of different domains, including the medical field, the entertainment and ambient intelligence areas. T... Read More about Wireless Body Area Network (WBAN): A Survey on Reliability, Fault Tolerance, and Technologies Coexistence.

An implementation of the extended technology acceptance model for understanding students' perceptions of learning management systems: a study within tertiary institutions in Saudia Arabia (2017)
Presentation / Conference Contribution
Rutter, M. J., Alshehri, A., & Smith, S. (2017, March). An implementation of the extended technology acceptance model for understanding students' perceptions of learning management systems: a study within tertiary institutions in Saudia Arabia. Poster presented at 11th annual International Technology, Education and Development Conference

The rapid evolution of e-learning around the world is inspiring many educational and business institutions to adopt it. E-learning is motivated by compelling advantages such as geographical reach, flexibility and cost effectiveness in course delivery... Read More about An implementation of the extended technology acceptance model for understanding students' perceptions of learning management systems: a study within tertiary institutions in Saudia Arabia.

5G innovations for new business opportunities (2017)
Report
Sébastien Bedo, J., Eddine El Ayoubi, S., Filippou, M., Gavras, A., Giustiniano, D., Iovanna, P., Manzalini, A., Queseth, O., Rokkas, T., Surridge, M., & Tjelta, T. (2017). 5G innovations for new business opportunities. Brussels: European Commission / 5G PPP

5G is the next generation mobile network that enables
innovation and supports progressive change across all
vertical industries and across our society1. Through its
Radio Access Network (RAN) design and its orchestrated
end-to-end architecture, i... Read More about 5G innovations for new business opportunities.

An Adaptively Speculative Execution Strategy Based on Real-Time Resource Awareness in a Multi-Job Heterogeneous Environment (2017)
Journal Article
Liu, Q., Cai, W., Liu, Q., Shen, J., Fu, Z., Liu, X., & Linge, N. (2017). An Adaptively Speculative Execution Strategy Based on Real-Time Resource Awareness in a Multi-Job Heterogeneous Environment. KSII transactions on internet and information systems, 11(2), https://doi.org/10.3837/tiis.2017.02.004

MapReduce (MRV1), a popular programming model, proposed by Google, has been well used to process large datasets in Hadoop, an open source cloud platform. Its new version MapReduce 2.0 (MRV2) developed along with the emerging of Yarn has achieved obvi... Read More about An Adaptively Speculative Execution Strategy Based on Real-Time Resource Awareness in a Multi-Job Heterogeneous Environment.

Simultaneous Bayesian Clustering and Feature Selection Through Student’s ${t}$ Mixtures Model (2017)
Journal Article
Sun, J., Zhou, A., Keates, S., & Liao, S. (2018). Simultaneous Bayesian Clustering and Feature Selection Through Student’s ${t}$ Mixtures Model. IEEE Transactions on Neural Networks and Learning Systems, 29(4), 1187-1199. https://doi.org/10.1109/tnnls.2016.2619061

In this paper, we proposed a generative model for feature selection under the unsupervised learning context. The model assumes that data are independently and identically sampled from a finite mixture of Student?s t distributions, which can reduce th... Read More about Simultaneous Bayesian Clustering and Feature Selection Through Student’s ${t}$ Mixtures Model.

The Greater The Power, The More Dangerous The Abuse: Facing Malicious Insiders in The Cloud (2017)
Presentation / Conference Contribution
Pitropakis, N., Lyvas, C., & Lambrinoudakis, C. (2017, February). The Greater The Power, The More Dangerous The Abuse: Facing Malicious Insiders in The Cloud. Presented at The Eighth International Conference on Cloud Computing, GRIDs, and Virtualization, Athens, Greece

The financial crisis made companies around the world search for cheaper and more efficient solutions to cover their needs in terms of computational power and storage. Their quest came to end with the birth of Cloud Computing infrastructures. However,... Read More about The Greater The Power, The More Dangerous The Abuse: Facing Malicious Insiders in The Cloud.

An Improvement of Tree-Rule Firewall for a Large Network: Supporting Large Rule Size and Low Delay (2017)
Presentation / Conference Contribution
Chomsiri, T., He, X., Nanda, P., & Tan, Z. (2016, August). An Improvement of Tree-Rule Firewall for a Large Network: Supporting Large Rule Size and Low Delay. Presented at 2016 IEEE Trustcom/BigDataSE/ISPA

The firewalls were invented since 1990s [1] and have been developed to operate more secure and faster. From the first era of the firewalls until today, they still regulate packet based on a listed rule. The listed rule is the set of rule sequence whi... Read More about An Improvement of Tree-Rule Firewall for a Large Network: Supporting Large Rule Size and Low Delay.

Securing the Internet of Things (2017)
Book
Romdhani, I. (2017). S. Li, & L. Da Xu (Eds.), Securing the Internet of Things. Elsevier

Key Features

Helps researchers and practitioners understand the security architecture in IoT and the state-of-the-art in IoT security countermeasures
Explores how the threats in IoT are different from traditional ad hoc or infrastructural network... Read More about Securing the Internet of Things.

Applying semantic technologies to multi-agent models in the context of business simulations. (2017)
Thesis
Farrenkopf, T. Applying semantic technologies to multi-agent models in the context of business simulations. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/Output/1033149

Agent-based simulations are an effective simulation technique that can flexibly be applied to real-world business problems. By integrating such simulations into business games, they become a widely accepted educational instrument in the context of bu... Read More about Applying semantic technologies to multi-agent models in the context of business simulations..

BEFTIGRE: Behaviour-driven full-tier green evaluation of mobile cloud applications (2017)
Journal Article
Chinenyeze, S. J., Liu, X., & Al-Dubai, A. (2017). BEFTIGRE: Behaviour-driven full-tier green evaluation of mobile cloud applications. Journal of Software: Evolution and Process, 29(2), e1848. https://doi.org/10.1002/smr.1848

With the resource-constrained nature of mobile devices and the resource-abundant offerings of the cloud, several promising optimisation techniques have been proposed by the green computing research community. Prominent techniques and unique methods h... Read More about BEFTIGRE: Behaviour-driven full-tier green evaluation of mobile cloud applications.

Health 4.0: How Virtualization and Big Data are Revolutionizing Healthcare (2017)
Book
Thuemmler, C., & Bai, C. (Eds.). (2017). Health 4.0: How Virtualization and Big Data are Revolutionizing Healthcare. Springer. https://doi.org/10.1007/978-3-319-47617-9

This book describes how the creation of new digital services—through vertical and horizontal integration of data coming from sensors on top of existing legacy systems—that has already had a major impact on industry is now extending to healthcare. The... Read More about Health 4.0: How Virtualization and Big Data are Revolutionizing Healthcare.

On Constructing Ensembles for Combinatorial Optimisation (2017)
Journal Article
Hart, E., & Sim, K. (2018). On Constructing Ensembles for Combinatorial Optimisation. Evolutionary Computation, 26(1), 67-87. https://doi.org/10.1162/evco_a_00203

Although the use of ensemble methods in machine-learning is ubiquitous due to their proven ability to outperform their constituent algorithms, ensembles of optimisation algorithms have received relatively little attention. Existing approaches lag beh... Read More about On Constructing Ensembles for Combinatorial Optimisation.

A pilot study: Evaluation of sensor system design for optical fibre humidity sensors subjected to aggressive air sewer environment (2017)
Presentation / Conference Contribution
Alwis, L. S. M., Bustamante, H., Bremer, K., Roth, B., Sun, T., & Grattan, K. T. V. (2016, October). A pilot study: Evaluation of sensor system design for optical fibre humidity sensors subjected to aggressive air sewer environment. Presented at 2016 IEEE SENSORS

Research has identified that humidity plays a fundamental role on the conversion of hydrogen sulphide into sulphuric acid during corrosion of concrete in gravity sewers and that potentially minor reductions in humidity can reduce corrosion rates. The... Read More about A pilot study: Evaluation of sensor system design for optical fibre humidity sensors subjected to aggressive air sewer environment.

A new efficient cross-layer relay node selection model for Wireless Community Mesh Networks (2017)
Journal Article
Zhao, L., Al-Dubai, A., Li, X., Chen, G., & Min, G. (2017). A new efficient cross-layer relay node selection model for Wireless Community Mesh Networks. Computers and Electrical Engineering, 61, 361-372. https://doi.org/10.1016/j.compeleceng.2016.12.031

Current networking technologies are not perfectly equipped to support Quality of Service (QoS), which is vital for real-time multimedia applications in Wireless Community Mesh Networks (WCNs). Therefore, there is a need to devise innovative routing a... Read More about A new efficient cross-layer relay node selection model for Wireless Community Mesh Networks.

Security for Cyber-Physical Systems in Healthcare (2017)
Book Chapter
Saleem, K., Tan, Z., & Buchanan, W. (2017). Security for Cyber-Physical Systems in Healthcare. In Health 4.0: How Virtualization and Big Data are Revolutionizing Healthcare (233-251). Springer. https://doi.org/10.1007/978-3-319-47617-9_12

The great leap forward of cyber-physical systems has made provision for future personalized medicine. However, these systems are prone to cyber attacks. To provide patients with secure and reliable healthcare experience, the security issues of cyber-... Read More about Security for Cyber-Physical Systems in Healthcare.

Towards Trust and Governance in Integrated Health and Social Care Platforms (2017)
Book Chapter
Buchanan, W., Thuemmler, C., Spyra, G., Smales, A., & Prajapati, B. (2017). Towards Trust and Governance in Integrated Health and Social Care Platforms. In Health 4.0: How Virtualization and Big Data are Revolutionizing Healthcare (219-231). (1). Springer. https://doi.org/10.1007/978-3-319-47617-9_11

The way we are sharing health and care data will be changing considerably over the years to come. One of the reasons is an increasing move towards patient-centric approaches where services are built around the citizens, rather than citizens integrate... Read More about Towards Trust and Governance in Integrated Health and Social Care Platforms.

An investigation of environmental influence on the benefits of adaptation mechanisms in evolutionary swarm robotics (2017)
Presentation / Conference Contribution
Steyven, A., Hart, E., & Paechter, B. (2017, July). An investigation of environmental influence on the benefits of adaptation mechanisms in evolutionary swarm robotics. Presented at Genetic and Evolutionary Computation Conference - GECCO '17

A robotic swarm that is required to operate for long periods in a potentially unknown environment can use both evolution and individual learning methods in order to adapt. However, the role played by the environment in influencing the effectiveness o... Read More about An investigation of environmental influence on the benefits of adaptation mechanisms in evolutionary swarm robotics.