Skip to main content

Research Repository

Advanced Search

Outputs (682)

Ad-hoc routing metrics and applied weighting for QoS support (2008)
Presentation / Conference Contribution
Migas, N., & Buchanan, W. J. (2008). Ad-hoc routing metrics and applied weighting for QoS support. In 22nd IEEE International Parallel & Distributed Processing Symposium (1-8). https://doi.org/10.1109/IPDPS.2008.4536496

In the vast majority of ad-hoc routing protocols, the hop-counting mechanisms for identifying the optimal route are dominant. However, this approach oversimplifies such a complex decision by ignoring the fact that participating devices may have consi... Read More about Ad-hoc routing metrics and applied weighting for QoS support.

Design and Analysis of Multicast Communication in Multidimensional Mesh Networks (2007)
Presentation / Conference Contribution
Al-Dubai, A., Ould-Khaoua, M., & Romdhani, I. (2007, August). Design and Analysis of Multicast Communication in Multidimensional Mesh Networks. Presented at 5th International Symposium on Parallel and Distributed Processing and Applications (ISPA07), Naigara Falls, Canada

This paper addresses the issue of multicast communication in scalable interconnection networks, using path-based scheme. Most existing multicast algorithms either assume a fixed network size, low dimensional networks or only consider the latency at... Read More about Design and Analysis of Multicast Communication in Multidimensional Mesh Networks.

Scenario Analysis using Out-of-line Firewall Evaluation Framework. (2007)
Presentation / Conference Contribution
Saliou, L., Buchanan, W. J., Graves, J., & Munoz, J. (2007). Scenario Analysis using Out-of-line Firewall Evaluation Framework.

Distributed Denial-of-Service (DDoS) attacks against corporate networks and assets are increasing, and their potential risk for future attacks is also a major concern. These attacks typically aim at disabling computer network infrastructure, and, sin... Read More about Scenario Analysis using Out-of-line Firewall Evaluation Framework..

Setting safety standards by designing a low-budget and compatible patient identification system based on passive RFID technology. (2007)
Journal Article
Thuemmler, C., Buchanan, W. J., & Kumar, V. (2007). Setting safety standards by designing a low-budget and compatible patient identification system based on passive RFID technology. International Journal of Healthcare Technology and Management, 8, 571-583. https://doi.org/10.1504/IJHTM.2007.013524

This paper outlines a large-scale audit for the enhancement of quality of care and staff and patient safety using passive RFID (Radio Frequency ID) wrist bands, which link to a patient's database, in order to reduce errors in patient care. It has bee... Read More about Setting safety standards by designing a low-budget and compatible patient identification system based on passive RFID technology..

Bilingual word association networks. (2007)
Book Chapter
Priss, U., & Old, L. J. (2007). Bilingual word association networks. In U. Priss, S. Polovina, & R. Hill (Eds.), Conceptual Structures: Knowledge Architectures for Smart Applications (310-320). Springer-Verlag. https://doi.org/10.1007/978-3-540-73681-3_23

Bilingual word association networks can be beneficial as a tool in foreign language education because they show relationships among cognate words of different languages and correspond to structures in the mental lexicon. This paper discusses possib... Read More about Bilingual word association networks..

NetHost-sensor: Monitoring a target host's application via system calls (2006)
Journal Article
Abimbola, A., Munoz, J., & Buchanan, W. (2006). NetHost-sensor: Monitoring a target host's application via system calls. Information Security Technical Report, 11(4), 166-175. https://doi.org/10.1016/j.istr.2006.10.003

Intrusion detection has emerged as an important approach to network, host and application security. Network security includes analysing network packet payload and other inert network packet profiles for intrusive trends; whereas, host security may em... Read More about NetHost-sensor: Monitoring a target host's application via system calls.

NetHost-Sensor: Investigating the capture of end-to-end encrypted intrusive data (2006)
Journal Article
Abimbola, A., Munoz, J., & Buchanan, W. J. (2006). NetHost-Sensor: Investigating the capture of end-to-end encrypted intrusive data. Computers and Security, 25(6), 445-451. https://doi.org/10.1016/j.cose.2006.04.001

Intrusion Detection Systems (IDSs) are systems that protect against violation of data integrity, confidentiality and availability of resources. In the past 20 years, these systems have evolved with the technology and have become more sophisticated. D... Read More about NetHost-Sensor: Investigating the capture of end-to-end encrypted intrusive data.

On balancing network traffic in path-based multicast communication (2006)
Journal Article
Al-Dubai, A., Ould-Khaoua, M., & Mackenzie, L. (2006). On balancing network traffic in path-based multicast communication. Future Generation Computer Systems, 22(7), 805-811. https://doi.org/10.1016/j.future.2006.02.009

This paper presents a new multicast path-based algorithm, referred to here as the Qualified Groups (QG for short), which can achieve a high degree of parallelism and low communication latency over a wide range of traffic loads in the mesh. The QG al... Read More about On balancing network traffic in path-based multicast communication.

A plane-based broadcast algorithm for multicomputer networks (2005)
Journal Article
Al-Dubai, A., Ould-Khaoua, M., & Mackenzie, L. (2005). A plane-based broadcast algorithm for multicomputer networks. Journal of Systems Architecture, 51(10-11), 617-632. https://doi.org/10.1016/j.sysarc.2005.01.003

Maximising the performance of parallel systems requires matching message-passing algorithms and application characteristics with a suitable underling interconnection network. Broadcast algorithms for wormhole-switched meshes have been widely reported... Read More about A plane-based broadcast algorithm for multicomputer networks.

Metric Evaluation of Embedded Java-Based Proxies on Handheld Devices in Cluster-Based Ad Hoc Routing (2005)
Presentation / Conference Contribution
Migas, N., & Buchanan, W. J. (2005, April). Metric Evaluation of Embedded Java-Based Proxies on Handheld Devices in Cluster-Based Ad Hoc Routing. Presented at 12th IEEE International Conference and Workshops on the Engineering of Computer-Based Systems (ECBS'05), Greenbelt, MD, USA

Ad-hoc wireless networks, which use ad-hoc routing methods may prove a good solution in certain applications, especially where networks have to be constructed where there is no possibly of creating a network backbone, and in emergency situations. The... Read More about Metric Evaluation of Embedded Java-Based Proxies on Handheld Devices in Cluster-Based Ad Hoc Routing.

Enhanced Methods of Coursework Provision in Computer Networks. (2005)
Presentation / Conference Contribution
Buchanan, W. J., & Saliou, L. (2005). Enhanced Methods of Coursework Provision in Computer Networks. In ITRE 2004. 2nd International Conference Information Technology: Research and Education (111-115). https://doi.org/10.1109/ITRE.2004.1393657

Many computing-related programmes and modules have many problems caused with large class sizes, large-scale plagiarism, module franchising, and an increasing requirement from students for increased amounts of hands-on, practical work. This paper pres... Read More about Enhanced Methods of Coursework Provision in Computer Networks..

Towards scalable collective communication for multicomputer interconnection networks (2004)
Journal Article
Al-Dubai, A., Ould-Khaoua, M., El-Zayyat, K., Ababneh, I., & Al-Dobai, S. (2004). Towards scalable collective communication for multicomputer interconnection networks. Information Sciences, 163(4), 293-306. https://doi.org/10.1016/j.ins.2003.06.014

A considerable number of broadcast algorithms have been proposed for the mesh over the past decade. Nonetheless, most of these algorithms do not exhibit good scalability properties as the network size increases. As a consequence, most existing broadc... Read More about Towards scalable collective communication for multicomputer interconnection networks.

MedOptNet: Meta-Learning Framework for Few-shot Medical Image Classification (2023)
Journal Article
Lu, L., Cui, X., Tan, Z., & Wu, Y. (online). MedOptNet: Meta-Learning Framework for Few-shot Medical Image Classification. IEEE/ACM Transactions on Computational Biology and Bioinformatics, https://doi.org/10.1109/TCBB.2023.3284846

In the medical research domain, limited data and high annotation costs have made efficient classification under few-shot conditions a popular research area. This paper proposes a meta-learning framework, termed MedOptNet, for few-shot medical image c... Read More about MedOptNet: Meta-Learning Framework for Few-shot Medical Image Classification.

A Simulation Study of Scalable Broadcast in High-Performance Regular Networks (2004)
Journal Article
Al-Dubai, A. Y., Ould-Khaoua, M., & Obaidat, M. S. (2004). A Simulation Study of Scalable Broadcast in High-Performance Regular Networks. SIMULATION, 80(4-5), 207-220. https://doi.org/10.1177/0037549704044325

Broadcast is an important communication operation required by many real-world applications encountered in parallel, cluster, and grid computing environments. Broadcasting on regular networks has been widely investigated in the past. However, most of... Read More about A Simulation Study of Scalable Broadcast in High-Performance Regular Networks.

Analysis of an agent-based metric-driven method for ad-hoc, on-demand routing (2005)
Journal Article
Buchanan, W. J., Migas, N., Sinclair, G., & McArtney, K. (2006). Analysis of an agent-based metric-driven method for ad-hoc, on-demand routing. Ad hoc networks, 4(2), 147-167. https://doi.org/10.1016/j.adhoc.2004.04.009

Ad-hoc networks could bring many benefits over traditional, fixed networks. Unfortunately, they have many difficulties, including the selection of the optimal route, the availability of routes as mobile nodes move around the physical space, and probl... Read More about Analysis of an agent-based metric-driven method for ad-hoc, on-demand routing.

Hamming Distributions of Popular Perceptual Hashing Techniques (2023)
Journal Article
McKeown, S., & Buchanan, W. J. (2023). Hamming Distributions of Popular Perceptual Hashing Techniques. Forensic Science International: Digital Investigation, 44(Supplement), Article 301509. https://doi.org/10.1016/j.fsidi.2023.301509

Content-based file matching has been widely deployed for decades, largely for the detection of sources of copyright infringement, extremist materials, and abusive sexual media. Perceptual hashes, such as Microsoft's PhotoDNA, are one automated mechan... Read More about Hamming Distributions of Popular Perceptual Hashing Techniques.

Correlation between academic and skills-based tests in computer networks (2005)
Journal Article
Buchanan, W. (2006). Correlation between academic and skills-based tests in computer networks. British Journal of Educational Technology, 37(1), 69-78. https://doi.org/10.1111/j.1467-8535.2005.00476.x

Computing-related programmes and modules have many problems, especially related to large class sizes, large-scale plagiarism, module franchising, and an increased requirement from students for increased amounts of hands-on, practical work. This paper... Read More about Correlation between academic and skills-based tests in computer networks.