Skip to main content

Research Repository

Advanced Search

A Dual-spine Approach to Load Error Repair in a HEMS Sensor Network (2018)
Journal Article
Liu, X., Liu, Q., & Sun, M. (2018). A Dual-spine Approach to Load Error Repair in a HEMS Sensor Network. Computers, Materials & Continua, 57(2), 179-194. https://doi.org/10.32604/cmc.2018.04025

In a home energy management system (HEMS), appliances are becoming diversified and intelligent, so that certain simple maintenance work can be completed by appliances themselves. During the measurement, collection and transmission of electricity load... Read More about A Dual-spine Approach to Load Error Repair in a HEMS Sensor Network.

NgramPOS: A Bigram-based Linguistic and Statistical Feature Process Model for Unstructured Text Classification (2018)
Journal Article
Yazdania, S., Tan, Z., Kakavand, M., & Lau, S. (2022). NgramPOS: A Bigram-based Linguistic and Statistical Feature Process Model for Unstructured Text Classification. Wireless Networks, 28(3), 1251-1261. https://doi.org/10.1007/s11276-018-01909-0

Research in financial domain has shown that sentiment aspects of stock news have a profound impact on volume trades, volatility, stock prices and firm earnings. With the ever growing social inetworking and online marketing sites, the reviews obtained... Read More about NgramPOS: A Bigram-based Linguistic and Statistical Feature Process Model for Unstructured Text Classification.

A supervised energy monitoring-based machine learning approach for anomaly detection in a clean water supply system (2018)
Presentation / Conference Contribution
Robles-Durazno, A., Moradpoor, N., McWhinnie, J., & Russell, G. (2018, June). A supervised energy monitoring-based machine learning approach for anomaly detection in a clean water supply system. Presented at Cyber Security 2018: 2018 International Conference on Cyber Security and Protection of Digital Services, Glasgow, United Kingdom

Industrial Control Systems are part of our daily life in industries such as transportation, water, gas, oil, smart cities, and telecommunications. Technological development over time have improved their components including operating system platforms... Read More about A supervised energy monitoring-based machine learning approach for anomaly detection in a clean water supply system.

Sub-file Hashing Strategies for Fast Contraband Detection (2018)
Presentation / Conference Contribution
McKeown, S., Russell, G., & Leimich, P. (2018, June). Sub-file Hashing Strategies for Fast Contraband Detection. Presented at IEEE International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2018), Glasgow, Scotland

Traditional digital forensics processes do not scale well with the huge quantities of data present in a modern investigation, resulting in large investigative backlogs for many law enforcement agencies. Data reduction techniques are required for fast... Read More about Sub-file Hashing Strategies for Fast Contraband Detection.

Reducing the Impact of Network Bottlenecks on Remote Contraband Detection (2018)
Presentation / Conference Contribution
McKeown, S., Russell, G., & Leimich, P. (2018, June). Reducing the Impact of Network Bottlenecks on Remote Contraband Detection. Presented at IEEE International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2018), Glasgow, UK

Cloud based storage is increasing in popularity, with
large volumes of data being stored remotely. Digital forensics
investigators examining such systems remotely are limited by
bandwidth constraints when accessing this kind of data using
traditi... Read More about Reducing the Impact of Network Bottlenecks on Remote Contraband Detection.

Trusting Intelligent Machines: Deepening Trust Within Socio-Technical Systems (2018)
Journal Article
Andras, P., Esterle, L., Guckert, M., Anh Han, T., Lewis, P. R., Milanovic, K., Payne, T., Perret, C., Pitt, J., Powers, S. T., Urquhart, N., & Wells, S. (2018). Trusting Intelligent Machines: Deepening Trust Within Socio-Technical Systems. IEEE technology & society magazine, 37(4), 76-83. https://doi.org/10.1109/MTS.2018.2876107

Intelligent machines have reached capabilities that go beyond a level that a human being can fully comprehend without sufficiently detailed understanding of the underlying mechanisms. The choice of moves in the game Go (generated by Deep Mind?s Alpha... Read More about Trusting Intelligent Machines: Deepening Trust Within Socio-Technical Systems.

SMK-means: An Improved Mini Batch K-means Algorithm Based on Mapreduce with Big Data (2018)
Journal Article
Xiao, B., Wang, Z., Liu, Q., & Liu, X. (2018). SMK-means: An Improved Mini Batch K-means Algorithm Based on Mapreduce with Big Data. Computers, Materials & Continua, 56(3), 365-379. https://doi.org/10.3970/cmc.2018.01830

In recent years, the rapid development of big data technology has also been favored by more and more scholars. Massive data storage and calculation problems have also been solved. At the same time, outlier detection problems in mass data have also co... Read More about SMK-means: An Improved Mini Batch K-means Algorithm Based on Mapreduce with Big Data.

Short-long term anomaly detection in wireless sensor networks based on machine learning and multi-parameterized edit distance (2018)
Journal Article
Cauteruccio, F., Fortino, G., Guerrieri, A., Liotta, A., Mocanu, D. C., Perra, C., Terracina, G., & Torres Vega, M. (2019). Short-long term anomaly detection in wireless sensor networks based on machine learning and multi-parameterized edit distance. Information Fusion, 52, 13-30. https://doi.org/10.1016/j.inffus.2018.11.010

Heterogeneous wireless sensor networks are a source of large amount of different information representing environmental aspects such as light, temperature, and humidity. A very important research problem related to the analysis of the sensor data is... Read More about Short-long term anomaly detection in wireless sensor networks based on machine learning and multi-parameterized edit distance.

Impact of cyberattacks on stock performance: a comparative study (2018)
Journal Article
Tweneboah-Kodua, S., Atsu, F., & Buchanan, W. (2018). Impact of cyberattacks on stock performance: a comparative study. Information and Computer Security, 26(5), 637-652. https://doi.org/10.1108/ics-05-2018-0060

The study uses cyberattacks announcements on 96 firms that are listed on S&P 500 over the period January 03, 2013 and December 29, 2017.
The empirical analysis was performed in two ways: cross-section and industry level. We employ statistical tests... Read More about Impact of cyberattacks on stock performance: a comparative study.

Cross-Layer Multipath Multichannel MAC protocol for MANETs (2018)
Presentation / Conference Contribution
Mirza, N., Taylor, H., Abdelshafy, M., King, P., Romdhani, I., & Alghamdi, A. (2018, June). Cross-Layer Multipath Multichannel MAC protocol for MANETs. Presented at The International Symposium on Networks, Computers and Communications (ISNCC), Rome, Italy

Utilising multiple disjoint paths in multiple channels can improve network performance by enabling a node to reroute data along discovered paths seamlessly when link failure is detected. However, depending on a stale route to recover from a broken li... Read More about Cross-Layer Multipath Multichannel MAC protocol for MANETs.

MOSAIC: Simultaneous Localization and Environment Mapping using mmWave without a-priori Knowledge (2018)
Journal Article
Yassin, A., Nasser, Y., Al-Dubai, A., & Awad, M. (2018). MOSAIC: Simultaneous Localization and Environment Mapping using mmWave without a-priori Knowledge. IEEE Access, 6, 68932-68947. https://doi.org/10.1109/access.2018.2879436

Simultaneous Localization and environment mapping (SLAM) is the core to robotic mapping and navigation as it constructs simultaneously the unknown environment and localizes the agent within. However, in millimeter wave (mmWave) research, SLAM is stil... Read More about MOSAIC: Simultaneous Localization and Environment Mapping using mmWave without a-priori Knowledge.

A pattern-driven corpus to predictive analytics in mitigating SQL injection attack (2018)
Thesis
Uwagbole, S. A pattern-driven corpus to predictive analytics in mitigating SQL injection attack. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/Output/1538260

The back-end database provides accessible and structured storage for each web application’s big data internet web traffic exchanges stemming from cloud-hosted web applications to the Internet of Things (IoT) smart devices in emerging computing. Struc... Read More about A pattern-driven corpus to predictive analytics in mitigating SQL injection attack.

Research grounded support of student learning in Higher Education: The importance of dialogue and subject embedded, contextualised language and content. (2018)
Thesis
Richards, K. Research grounded support of student learning in Higher Education: The importance of dialogue and subject embedded, contextualised language and content. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/Output/1532248

This aim of this thesis is to demonstrate how the research that has been conducted by the author, as illustrated through the publications presented, adds to the domain of academic support – specifically the theory and practice of academic support wit... Read More about Research grounded support of student learning in Higher Education: The importance of dialogue and subject embedded, contextualised language and content..

Load balancing and context aware enhancements for RPL routed Internet of Things. (2018)
Thesis
Qasem, M. Load balancing and context aware enhancements for RPL routed Internet of Things. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/Output/1532122

Internet of Things (IoT) has been paving the way for a plethora of potential applications, which becomes more spatial and demanding. The goal of this work is to optimise the performance within the IPv6 Routing Protocol for Low-Power and Lossy Network... Read More about Load balancing and context aware enhancements for RPL routed Internet of Things..

Reliable and energy efficient scheduling protocols for wireless body area networks (WBAN) (2018)
Thesis
Salayma, M. Reliable and energy efficient scheduling protocols for wireless body area networks (WBAN). (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/Output/1532410

Wireless Body Area Network (WBAN) facilitates efficient and cost-effective e-health care and well-being applications. The WBAN has unique challenges and features compared to other Wireless Sensor Networks (WSN). In addition to battery power consumpti... Read More about Reliable and energy efficient scheduling protocols for wireless body area networks (WBAN).

Engineering Sustainable and Adaptive Systems in Dynamic and Unpredictable Environments (2018)
Presentation / Conference Contribution
Cardoso, R. P., Rossetti, R. J. F., Hart, E., Kurka, D. B., & Pitt, J. (2018, November). Engineering Sustainable and Adaptive Systems in Dynamic and Unpredictable Environments. Presented at 8th International Symposium, ISoLA 2018, Limassol, Cyprus

Electronic institutions are socially-inspired multi-agent systems, typically operating under a set of policies, which are required to determine system operation and to deal with violations and other non-compliant behaviour. They are often faced with... Read More about Engineering Sustainable and Adaptive Systems in Dynamic and Unpredictable Environments.

An Approach to Evolving Legacy Enterprise System to Microservice-Based Architecture through Feature-Driven Evolution Rules (2018)
Journal Article
Habibullah, S., Liu, X., & Tan, Z. (2018). An Approach to Evolving Legacy Enterprise System to Microservice-Based Architecture through Feature-Driven Evolution Rules. International Journal of Computer Theory and Engineering, 10(5), 164-169. https://doi.org/10.7763/ijcte.2018.v10.1219

Evolving legacy enterprise systems into a lean system architecture has been on the agendas of many enterprises. Recent advance in legacy system evaluation is in favour of microservice technologies, which not only significantly reduce the complexity i... Read More about An Approach to Evolving Legacy Enterprise System to Microservice-Based Architecture through Feature-Driven Evolution Rules.

Fingerprinting JPEGs With Optimised Huffman Tables (2018)
Journal Article
McKeown, S., Russell, G., & Leimich, P. (2018). Fingerprinting JPEGs With Optimised Huffman Tables. Journal of Digital Forensics, Security and Law, 13(2), Article 7. https://doi.org/10.15394/jdfsl.2018.1451

A common task in digital forensics investigations is to identify known contraband images. This is typically achieved by calculating a cryptographic digest, using hashing algorithms such as SHA256, for each image on a given medium, and comparing indiv... Read More about Fingerprinting JPEGs With Optimised Huffman Tables.

A Chain Topology for Efficient Monitoring of Food Grain Storage using Smart Sensors (2018)
Presentation / Conference Contribution
Kumar Mishra, A., Kumar Tripathy, A., Obaidat, M. S., Tan, Z., Prasad, M., Sadoun, B., & Puthal, D. (2018, July). A Chain Topology for Efficient Monitoring of Food Grain Storage using Smart Sensors. Presented at The 15th International Joint Conference on e-Business, Porto, Portugal

Due to lack of an efficient monitoring system to periodically record environmental parameters for food grain storage, a huge loss of food grains in storage is reported every year in many developing countries, especially south-Asian countries. Althoug... Read More about A Chain Topology for Efficient Monitoring of Food Grain Storage using Smart Sensors.