Skip to main content

Research Repository

Advanced Search

Addressing the DAO Insider Attack in RPL’s Internet of Things Networks (2018)
Journal Article
Ghaleb, B., Al-Dubai, A., Ekonomou, E., Qasem, M., Romdhani, I., & Mackenzie, L. (2019). Addressing the DAO Insider Attack in RPL’s Internet of Things Networks. IEEE Communications Letters, 23(1), 68-71. https://doi.org/10.1109/LCOMM.2018.2878151

In RPL routing protocol, the DAO (Destination Advertisement Object) control messages are announced by the child nodes to their parents to build downward routes. A malicious insider node can exploit this feature to send fake DAOs to its parents period... Read More about Addressing the DAO Insider Attack in RPL’s Internet of Things Networks.

Interference graphs to monitor and control schedules in low-power WPAN (2018)
Journal Article
van der Lee, T., Liotta, A., & Exarchakos, G. (2019). Interference graphs to monitor and control schedules in low-power WPAN. Future Generation Computer Systems, 93, 111-120. https://doi.org/10.1016/j.future.2018.10.014

Highlights
• This study presents the complete and slotted interference graph model.
• The service uses the complete interference graph to evaluate the network.
• Slotted interference graphs are used to reschedule problematic connections.
• Rea... Read More about Interference graphs to monitor and control schedules in low-power WPAN.

Requirements for 5G based telemetric cardiac monitoring (2018)
Presentation / Conference Contribution
Thuemmler, C., Hindricks, G., Rolffs, C., Buchanan, W., & Bollmann, A. (2018, October). Requirements for 5G based telemetric cardiac monitoring. Presented at 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Limassol, Cyprus

Several white papers have been published on general requirements for 5G in the health vertical. As 5G research and implementation continue more detailed real world information for application research are needed. This paper is focusing on the require... Read More about Requirements for 5G based telemetric cardiac monitoring.

Method for identification of digital content (2018)
Patent
Buchanan, B., Lo, O., Penrose, P., Ramsay, B., & Macfarlane, R. (2018). Method for identification of digital content. World Intellectual Property Organization

Many areas oi investigation require searching through data that may be oi interest. One example oi data that may be involved in an investigation is copyrighted material that may be suspected of having been obtained or reproduced illegally by a third... Read More about Method for identification of digital content.

The Influence of Computer Self-efficacy and Subjective Norms on the Students’ Use of Learning Management Systems at King Abdulaziz University (2018)
Presentation / Conference Contribution
Binyamin, S. S., Rutter, M. J., & Smith, S. (2018, March). The Influence of Computer Self-efficacy and Subjective Norms on the Students’ Use of Learning Management Systems at King Abdulaziz University. Presented at 7th International Conference on Educational and Information Technology 2018, Oxford University, UK

Technology acceptance model (TAM) has been a standout amongst the most well-known models in understanding the users’ acceptance of technologies. This study develops a model to predict the factors that influence the use of learning management systems... Read More about The Influence of Computer Self-efficacy and Subjective Norms on the Students’ Use of Learning Management Systems at King Abdulaziz University.

DNA Sequence Based Medical Image Encryption Scheme (2018)
Presentation / Conference Contribution
Khan, J. S., Ahmad, J., Abbasi, S. F., Ali, A., & Kayhan, S. K. (2018, September). DNA Sequence Based Medical Image Encryption Scheme. Presented at 2018 10th Computer Science and Electronic Engineering (CEEC), Colchester, United Kingdom

Medical consultants and doctors store and update patients confidential information on Internet cloud computing platforms. These days, securing medical images from eavesdroppers is one of the most challenging and significant research areas. Due to var... Read More about DNA Sequence Based Medical Image Encryption Scheme.

Appliance Recognition Based on Continuous Quadratic Programming (2018)
Presentation / Conference Contribution
Liu, X., & Liu, Q. (2018, June). Appliance Recognition Based on Continuous Quadratic Programming. Presented at 4th International Conference on Cloud Computing and Security (ICCCS 2018), Haikou, China

The detailed information of residents' electricity consumption is of great significance to the planning of the use of electrical appliances and the reduction of electrical energy consumption. On the basis of analyzing the characteristics of residents... Read More about Appliance Recognition Based on Continuous Quadratic Programming.

A framework for exploring intelligent artificial personhood. (2018)
Book Chapter
Kane, T. (2018). A framework for exploring intelligent artificial personhood. In V. C. MĂĽller (Ed.), Philosophy and theory of artificial intelligence 2017 (255-258). Springer

The paper presents a framework for examining the human use of, and the activities of, artificial persons. This paper applies Hobbesian methodology to ascribe artificial personhood to business organisations, professional persons and algorithmic artifi... Read More about A framework for exploring intelligent artificial personhood..

2-Dimensional Outline Shape Representation for Generative Design with Evolutionary Algorithms (2018)
Presentation / Conference Contribution
Lapok, P., Lawson, A., & Paechter, B. (2018, September). 2-Dimensional Outline Shape Representation for Generative Design with Evolutionary Algorithms. Presented at EngOpt 2018 International Conference on Engineering Optimization, Lisboa, Portugal

In this paper, we investigate the ability of genetic representation methods to describe two-dimensional outline shapes, in order to use them in a generative design system. A specific area of mechanical design focuses on planar mechanisms. These are a... Read More about 2-Dimensional Outline Shape Representation for Generative Design with Evolutionary Algorithms.

Cloud-based video analytics using convolutional neural networks (2018)
Journal Article
Yaseen, M. U., Anjum, A., Farid, M., & Antonopoulos, N. (2019). Cloud-based video analytics using convolutional neural networks. Software: Practice and Experience, 49(4), 565-583. https://doi.org/10.1002/spe.2636

Object classification is a vital part of any video analytics system, which could aid in complex applications such as object monitoring and management. Traditional video analytics systems work on shallow networks and are unable to harness the power of... Read More about Cloud-based video analytics using convolutional neural networks.

A Self-organizing LSTM-Based Approach to PM2.5 Forecast (2018)
Presentation / Conference Contribution
Liu, X., Liu, Q., Zou, Y., & Wang, G. (2018, June). A Self-organizing LSTM-Based Approach to PM2.5 Forecast. Presented at 4th International Conference on Cloud Computing and Security (ICCCS 2018), Haikou, China

Nanjing has been listed as the one of the worst performers across China with respect to the high level of haze-fog, which impacts people's health greatly. For the severe condition of haze-fog, PM2.5 is the main cause element of haze-fog pollution in... Read More about A Self-organizing LSTM-Based Approach to PM2.5 Forecast.

CAMA-UAN: A Context-Aware MAC Scheme to the Underwater Acoustic Sensor Networks for the Improved CACA-UAN (2018)
Presentation / Conference Contribution
Liu, X., & Liu, Q. (2018, April). CAMA-UAN: A Context-Aware MAC Scheme to the Underwater Acoustic Sensor Networks for the Improved CACA-UAN. Presented at 2018 3rd International Conference on Computer and Communication Systems (ICCCS), Nagoya, Japan

Acoustic Communication is one of the most common and popular techniques used for Underwater Sensor Networks. The design of its communication protocol becomes a challenge due to its features of high delay and low bandwidth. Relevant research work has... Read More about CAMA-UAN: A Context-Aware MAC Scheme to the Underwater Acoustic Sensor Networks for the Improved CACA-UAN.

Home appliances classification based on multi-feature using ELM (2018)
Journal Article
Wu, Z., Liu, Q., Chen, F., Chen, F., Liu, X., & Linge, N. (2018). Home appliances classification based on multi-feature using ELM. International Journal of Sensor Networks, 28(1), 34. https://doi.org/10.1504/ijsnet.2018.094710

With the development of science and technology, the application in artificial intelligence has been more and more popular, as well as smart home has become a hot topic. And pattern recognition adapting to smart home attracts more attention, while the... Read More about Home appliances classification based on multi-feature using ELM.

Privacy Parameter Variation using RAPPOR on a Malware Dataset (2018)
Presentation / Conference Contribution
Aaby, P., Mata De Acuña, J. J., Macfarlane, R., & Buchanan, W. J. (2018, August). Privacy Parameter Variation using RAPPOR on a Malware Dataset. Presented at 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), New York, NY, USA

Stricter data protection regulations and the poor application of privacy protection techniques have resulted in a requirement for data-driven companies to adopt new methods of analysing sensitive user data. The RAPPOR (Randomized Aggregatable Privacy... Read More about Privacy Parameter Variation using RAPPOR on a Malware Dataset.

Intertwining and NCA Maps Based New Image Encryption Scheme (2018)
Presentation / Conference Contribution
Khan, F. A., Ahmed, J., Ahmad, J., Khan, J. S., & Stankovic, V. (2018, August). Intertwining and NCA Maps Based New Image Encryption Scheme. Presented at 2018 International Conference on Computing, Electronics & Communications Engineering (iCCECE), Southend, United Kingdom

In this digital era, the Internet is a main source of communication. Due to exponential advancement in Internet technologies, transmission of multimedia data is very common now. However, transmitting sensitive information over the Internet is always... Read More about Intertwining and NCA Maps Based New Image Encryption Scheme.

Selection methods and diversity preservation in many-objective evolutionary algorithms (2018)
Journal Article
Martí, L., Segredo, E., Sánchez-Pi, N., & Hart, E. (2018). Selection methods and diversity preservation in many-objective evolutionary algorithms. Data Technologies and Applications, https://doi.org/10.1108/dta-01-2018-0009

Purpose – One of the main components of multi-objective, and therefore, many-objective evolutionary algorithms is the selection mechanism. It is responsible for performing two main tasks simultaneously. First, it has to promote convergence by selecti... Read More about Selection methods and diversity preservation in many-objective evolutionary algorithms.

On the Synthesis of Perturbative Heuristics for Multiple Combinatorial Optimisation Domains (2018)
Presentation / Conference Contribution
Stone, C., Hart, E., & Paechter, B. (2018, September). On the Synthesis of Perturbative Heuristics for Multiple Combinatorial Optimisation Domains. Presented at Fifteenth International Conference on Parallel Problem Solving from Nature (PPSN XV), Coimbra, Portugal

Hyper-heuristic frameworks, although intended to be cross-domain at the highest level, rely on a set of domain-specific low-level heuristics at lower levels. For some domains, there is a lack of available heuristics, while for novel problems, no heur... Read More about On the Synthesis of Perturbative Heuristics for Multiple Combinatorial Optimisation Domains.

Optimisation and Illumination of a Real-world Workforce Scheduling and Routing Application via Map-Elites (2018)
Presentation / Conference Contribution
Urquhart, N., & Hart, E. (2018, September). Optimisation and Illumination of a Real-world Workforce Scheduling and Routing Application via Map-Elites. Presented at Parallel Problem Solving from Nature (PPSN) 2018, Coimbra, Portugal

Workforce Scheduling and Routing Problems (WSRP) are very common in many practical domains, and usually have a number of objectives. Illumination algorithms such as Map-Elites (ME) have recently gained traction in application to design problems, in p... Read More about Optimisation and Illumination of a Real-world Workforce Scheduling and Routing Application via Map-Elites.

Virtualizing the real: a virtual reality contemporary sculpture park for children (2018)
Journal Article
Flint, T., Hall, L., Stewart, F., & Hagan, D. (2018). Virtualizing the real: a virtual reality contemporary sculpture park for children. Digital Creativity, 29(2/3), 191-207. https://doi.org/10.1080/14626268.2018.1511601

This paper discusses a virtual reality experience for a contemporary sculpture park, Jupiter Artland, developed in Minecraft targeting 9-11-year-old children. Issues of fidelity, realism and authenticity are considered, examining the use of Minecraft... Read More about Virtualizing the real: a virtual reality contemporary sculpture park for children.

A Novel Adaptive and Efficient Routing Update Scheme for Low-Power Lossy Networks in IoT (2018)
Journal Article
Ghaleb, B., Al-Dubai, A., Ekonomou, E., Romdhani, I., Nasser, Y., & Boukerche, A. (2018). A Novel Adaptive and Efficient Routing Update Scheme for Low-Power Lossy Networks in IoT. IEEE Internet of Things Journal, 5(6), 12. https://doi.org/10.1109/JIOT.2018.2862364

In this paper, we introduce Drizzle, a new algorithm for maintaining routing information in the Low-power and Lossy Networks (LLNs). The aim is to address the limitations of the currently standardized routing maintenance (i.e. Trickle algorithm) in s... Read More about A Novel Adaptive and Efficient Routing Update Scheme for Low-Power Lossy Networks in IoT.