Skip to main content

Research Repository

Advanced Search

Browse


Use and operational safety (2023)
Book Chapter
Reed, N., Charisis, V., & Cowper, S. (2023). Use and operational safety. In D. Ventriglia, & M. Kahl (Eds.), FISITA Intelligent Safety White Paper – The Safety of Electro-Mobility: Expert considerations on the Safety of an Electric Vehicle from concept through end of life (107-111). FISITA

Whether you are an individual buying your first car or replacing an existing vehicle, or if you are a fleet manager making vehicle purchase decisions on behalf of a company, the acquisition of a car is usually a highly significant purchase. Increasi... Read More about Use and operational safety.

A stacking ensemble of deep learning models for IoT intrusion detection (2023)
Journal Article
Lazzarini, R., Tianfield, H., & Charissis, V. (2023). A stacking ensemble of deep learning models for IoT intrusion detection. Knowledge-Based Systems, 279, Article 110941. https://doi.org/10.1016/j.knosys.2023.110941

The number of Internet of Things (IoT) devices has increased considerably in the past few years, which resulted in an exponential growth of cyber attacks on IoT infrastructure. As a consequence, the prompt detection of attacks in IoT environments thr... Read More about A stacking ensemble of deep learning models for IoT intrusion detection.

Generalized Concept and MATLAB Code for Modeling and Analyzing Wideband 90° Stub-Loaded Phase Shifters with Simulation and Experimental Verifications (2023)
Journal Article
M. Alnahwi, F., I. A. Al-Yasir, Y., See, C. H., S. Abdullah, A., & Abd-Alhameed, A. R. A. (2023). Generalized Concept and MATLAB Code for Modeling and Analyzing Wideband 90° Stub-Loaded Phase Shifters with Simulation and Experimental Verifications. Sensors, 23(18), Article 7773. https://doi.org/10.3390/s23187773

In the design of phase shifters, the modeling equations are too complicated and require some approximations to be derived correctly by hand. In response to this problem, this paper presents a generalized concept, algorithm, and MATLAB code that provi... Read More about Generalized Concept and MATLAB Code for Modeling and Analyzing Wideband 90° Stub-Loaded Phase Shifters with Simulation and Experimental Verifications.

TouchEnc: a Novel Behavioural Encoding Technique to Enable Computer Vision for Continuous Smartphone User Authentication (2023)
Conference Proceeding
Aaby, P., Giuffrida, M. V., Buchanan, W. J., & Tan, Z. (in press). TouchEnc: a Novel Behavioural Encoding Technique to Enable Computer Vision for Continuous Smartphone User Authentication.

We are increasingly required to prove our identity when using smartphones through explicit authentication processes such as passwords or physiological biometrics, e.g., authorising online banking transactions or unlocking smartphones. However, these... Read More about TouchEnc: a Novel Behavioural Encoding Technique to Enable Computer Vision for Continuous Smartphone User Authentication.

Evaluation of frameworks that combine evolution and learning to design robots in complex morphological spaces (2023)
Journal Article
Li, W., Buchanan, E., Le Goff, L. K., Hart, E., Hale, M. F., Wei, B., …Tyrrell, A. M. (in press). Evaluation of frameworks that combine evolution and learning to design robots in complex morphological spaces. IEEE Transactions on Evolutionary Computation,

Jointly optimising both the body and brain of a robot is known to be a challenging task, especially when attempting to evolve designs in simulation that will subsequently be built in the real world. To address this, it is increasingly common to combi... Read More about Evaluation of frameworks that combine evolution and learning to design robots in complex morphological spaces.

A Digital Twin-Assisted Intelligent Partial Offloading Approach for Vehicular Edge Computing (2023)
Journal Article
Zhao, L., Zhao, Z., Zhang, E., Hawbani, A., Al-Dubai, A., Tan, Z., & Hussain, A. (in press). A Digital Twin-Assisted Intelligent Partial Offloading Approach for Vehicular Edge Computing. IEEE Journal on Selected Areas in Communications, https://doi.org/10.1109/jsac.2023.3310062

Vehicle Edge Computing (VEC) is a promising paradigm that exposes Mobile Edge Computing (MEC) to road scenarios. In VEC, task offloading can enable vehicles to offload the computing tasks to nearby Roadside Units (RSUs) that deploy computing capabili... Read More about A Digital Twin-Assisted Intelligent Partial Offloading Approach for Vehicular Edge Computing.

Representations and Regularity of Vector-Valued Right-Shift Invariant Operators Between Half-Line Bessel Potential Spaces (2023)
Journal Article
Guiver, C., & Opmeer, M. R. (2023). Representations and Regularity of Vector-Valued Right-Shift Invariant Operators Between Half-Line Bessel Potential Spaces. Integral Equations and Operator Theory, 95(3), Article 19. https://doi.org/10.1007/s00020-023-02738-3

Representation and boundedness properties of linear, right-shift invariant operators on half-line Bessel potential spaces (also known as fractional-order Sobolev spaces) as operator-valued multiplication operators in terms of the Laplace transform ar... Read More about Representations and Regularity of Vector-Valued Right-Shift Invariant Operators Between Half-Line Bessel Potential Spaces.

Influence policing: Strategic communications, digital nudges, and behaviour change marketing in Scottish and UK preventative policing (2023)
Report
Collier, B., Stewart, J., Horgan, S., Wilson, L., & Thomas, D. (2023). Influence policing: Strategic communications, digital nudges, and behaviour change marketing in Scottish and UK preventative policing. Scottish Institute for Policing Research

Influence policing is an emerging phenomenon: the use of digital targeted ‘nudge’ communications campaigns by police forces and law enforcement agencies to directly achieve strategic policing outcomes. While scholarship, civil society, and journalism... Read More about Influence policing: Strategic communications, digital nudges, and behaviour change marketing in Scottish and UK preventative policing.

Selective Query Processing: A Risk-Sensitive Selection of Search Configurations (2023)
Journal Article
Mothe, J., & Ullah, M. Z. (2024). Selective Query Processing: A Risk-Sensitive Selection of Search Configurations. ACM transactions on information systems, 42(1), https://doi.org/10.1145/3608474

In information retrieval systems, search parameters are optimized to ensure high effectiveness based on a set of past searches and these optimized parameters are then used as the system configuration for all subsequent queries. A better approach, how... Read More about Selective Query Processing: A Risk-Sensitive Selection of Search Configurations.

Majority Voting Ransomware Detection System (2023)
Journal Article
Davies, S. R., Macfarlane, R., & Buchanan, W. J. (2023). Majority Voting Ransomware Detection System. Journal of Information Security, 14(4), 264-293. https://doi.org/10.4236/jis.2023.144016

Crypto-ransomware remains a significant threat to governments and companies alike, with high-profile cyber security incidents regularly making headlines. Many different detection systems have been proposed as solutions to the ever-changing dynamic la... Read More about Majority Voting Ransomware Detection System.

Apprentices’ perspectives of the tripartite collaboration at the heart of degree apprenticeships: a longitudinal study (2023)
Journal Article
Taylor-Smith, E., Smith, S., Fabian, K., & Bratton, A. (in press). Apprentices’ perspectives of the tripartite collaboration at the heart of degree apprenticeships: a longitudinal study. Journal of Workplace Learning, https://doi.org/10.1108/JWL-01-2023-0007

Purpose: The partnership which underpins degree apprenticeships is a tripartite collaboration between apprentices, employers, and universities. This study investigated the lived experiences and reflections of the apprentices at the centre, to inform... Read More about Apprentices’ perspectives of the tripartite collaboration at the heart of degree apprenticeships: a longitudinal study.

Reliable and Scalable Routing Under Hybrid SDVN Architecture: A Graph Learning Based Method (2023)
Journal Article
Li, Z., Zhao, L., Min, G., Al-Dubai, A. Y., Hawbani, A., Zomaya, A. Y., & Luo, C. (in press). Reliable and Scalable Routing Under Hybrid SDVN Architecture: A Graph Learning Based Method. IEEE Transactions on Intelligent Transportation Systems, https://doi.org/10.1109/tits.2023.3300082

Greedy routing efficiently achieves routing solutions for vehicular networks due to its simplicity and reliability. However, the existing greedy routing schemes have mainly considered simple routing metrics only, e.g., distance based on the local vie... Read More about Reliable and Scalable Routing Under Hybrid SDVN Architecture: A Graph Learning Based Method.

Stability of Forced Higher-Order Continuous-Time Lur'e Systems: a Behavioural Input-Output Perspective (2023)
Journal Article
Guiver, C., & Logemann, H. (in press). Stability of Forced Higher-Order Continuous-Time Lur'e Systems: a Behavioural Input-Output Perspective. International Journal of Control, https://doi.org/10.1080/00207179.2023.2233023

We consider a class of forced continuous-time Lur'e systems obtained by applying nonlinear feedback to a higher-order linear differential equation which defines an input-output system in the sense of behavioural systems theory. This linear system dir... Read More about Stability of Forced Higher-Order Continuous-Time Lur'e Systems: a Behavioural Input-Output Perspective.

Responsible Design & Evaluation of a Conversational Agent for a National Careers Service (2023)
Conference Proceeding
Wilson, M., Cruickshank, P., Gkatzia, D., & Robertson, P. (in press). Responsible Design & Evaluation of a Conversational Agent for a National Careers Service.

This PhD project applies a research-through-design approach to the development of a conversational agent for a national career service for young people. This includes addressing practical, interactional and ethical aspects of the system. For each asp... Read More about Responsible Design & Evaluation of a Conversational Agent for a National Careers Service.

Towards Improving Accessibility of Web Auditing with Google Lighthouse (2023)
Conference Proceeding
McGill, T., Bamgboye, O., Liu, X., & Kalutharage, C. S. (2023). Towards Improving Accessibility of Web Auditing with Google Lighthouse. In H. Shahriar, Y. Teranishi, A. Cuzzocrea, M. Sharmin, D. Towey, A. Jahangir Alam Majumder, …S. Iqbal Ahamed (Eds.), 2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC) (1594-1599). https://doi.org/10.1109/COMPSAC57700.2023.00246

Google Lighthouse is a tool made by Google for auditing web pages performance, accessibility, SEO, and best practices with the intention of improving the quality of the websites. This allows software developers to understand areas of improvement with... Read More about Towards Improving Accessibility of Web Auditing with Google Lighthouse.

#Chavcheck: Does TikTok facilitate the pornification of social class struggles? (2023)
Presentation / Conference
Logan-McFarlane, A. (2023, July). #Chavcheck: Does TikTok facilitate the pornification of social class struggles?. Paper presented at Netnocon 2023, University of Salford, Manchester, UK

In 2020, the ‘chav’ trope resurfaced globally on TikTok. The trend featured individuals performing ““chav checks”, heavy makeup tutorials, and showing off the UK’s “chavviest places” with the sound check “Hey yo, chav check” employed to mock “puffa j... Read More about #Chavcheck: Does TikTok facilitate the pornification of social class struggles?.

An Auditable Framework for Evidence Sharing and Management using Smart Lockers and Distributed Technologies: Law Enforcement Use Case (2023)
Conference Proceeding
Onyeashie, B., Leimich, P., McKeown, S., & Russell, G. (in press). An Auditable Framework for Evidence Sharing and Management using Smart Lockers and Distributed Technologies: Law Enforcement Use Case.

This paper presents a decentralised framework for sharing and managing evidence that uses smart lockers, blockchain technology, and the InterPlanetary File System (IPFS). The system incorporates Hyperledger Fabric blockchain for immutability and tamp... Read More about An Auditable Framework for Evidence Sharing and Management using Smart Lockers and Distributed Technologies: Law Enforcement Use Case.

A Bibliometric Analysis and Systematic Review of a Blockchain-Based Chain of Custody for Digital Evidence (2023)
Conference Proceeding
Onyeashie, B. I., Leimich, P., McKeown, S., & Russell, G. (in press). A Bibliometric Analysis and Systematic Review of a Blockchain-Based Chain of Custody for Digital Evidence.

The effective management of digital evidence is critical to modern forensic investigations. However, traditional evidence management approaches are often prone to security and integrity issues. In recent years, the use of blockchain technology has em... Read More about A Bibliometric Analysis and Systematic Review of a Blockchain-Based Chain of Custody for Digital Evidence.

Image Forgery Detection using Cryptography and Deep Learning (2023)
Conference Proceeding
Oke, A., & Babaagba, K. (in press). Image Forgery Detection using Cryptography and Deep Learning.

The advancement of technology has undoubtedly exposed everyone to a remarkable array of visual imagery. Nowadays, digital technology is eating away the trust and historical confidence people have in the integrity of imagery. Deep learning is often us... Read More about Image Forgery Detection using Cryptography and Deep Learning.

A cloud-based Bi-directional LSTM approach to grid-connected solar PV energy forecasting for multi-energy systems (2023)
Journal Article
Liu, Q., Darteh, O. F., Bilal, M., Huang, X., Attique, M., Liu, X., & Acakpovi, A. (2023). A cloud-based Bi-directional LSTM approach to grid-connected solar PV energy forecasting for multi-energy systems. Sustainable Computing, 40, Article 100892. https://doi.org/10.1016/j.suscom.2023.100892

The drive for smarter, greener, and more livable cities has led to research towards more effective solar energy forecasting techniques and their integration into traditional power systems. However, the availability of real-time data, data storage, an... Read More about A cloud-based Bi-directional LSTM approach to grid-connected solar PV energy forecasting for multi-energy systems.