Skip to main content

Research Repository

Advanced Search

Outputs (682)

Creation of an online virtual Cisco router learning environment. (2011)
Presentation / Conference Contribution
Rietsche, R., Russell, G., & Karduck, A. P. (2011, July). Creation of an online virtual Cisco router learning environment. Presented at Computers and Advanced Technology in Education

Online learning environments are an important aspect to many University courses. They allow flexibility in student approaches, and permit students from a range of backgrounds to take part in education. This paper considers an online learning environm... Read More about Creation of an online virtual Cisco router learning environment..

Information sharing framework: next generation e-Health cloud. (2010)
Presentation / Conference Contribution
Buchanan, W. J., Thuemmler, C., Fan, L., Lo, O., & Khedim, A. S. (2010). Information sharing framework: next generation e-Health cloud.

This presentation outlines the novel e-Health Cloud. See: http://www.soc.napier.ac.uk/~bill/e_presentations/healthcloud01/healthcloud01.html

An e-Health cloud. (2010)
Presentation / Conference Contribution
Buchanan, W. J., Thuemmler, C., Fan, L., Lo, O., & Khedim, A. S. (2010). An e-Health cloud.

A significant weakness within cloud-based systems is often their security. This presentation shows how a health care cloud has been created which preserves the rights of the patient to control access to their captured data, and then how this is used... Read More about An e-Health cloud..

Interagency data exchange protocols as computational data protection law. (2010)
Presentation / Conference Contribution
Buchanan, W. J., Fan, L., Lawson, A., Schafer, B., Scott, R., Thuemmler, C., & Uthmani, O. (2010). Interagency data exchange protocols as computational data protection law.

The paper describes a collaborative project between computer scientist, police officers, medical professionals and social workers to develop a communication infrastructure that allows information sharing while observing Data Protection law “by design... Read More about Interagency data exchange protocols as computational data protection law..

Novel information sharing syntax for data sharing between police and community partners, using role-based security. (2010)
Presentation / Conference Contribution
Uthmani, O., Buchanan, W. J., Lawson, A., Thuemmler, C., Fan, L., Scott, R., …Mooney, C. (2010). Novel information sharing syntax for data sharing between police and community partners, using role-based security.

The exchange of information between the police and community partners forms a central aspect of effective community service provision. In the context of policing, a robust and timely communications mechanism is required between police agencies and co... Read More about Novel information sharing syntax for data sharing between police and community partners, using role-based security..

Novel information sharing architecture between the Police and their community partners. (2010)
Presentation / Conference Contribution
Uthmani, O., Buchanan, W. J., & Lawson, A. (2010). Novel information sharing architecture between the Police and their community partners.

The exchange of information between the police and community partners forms a central aspect of effective community service provision. In the context of policing, a robust and timely communications mechanism is required between police agencies and co... Read More about Novel information sharing architecture between the Police and their community partners..

A new adaptive broadcasting approach for mobile ad hoc networks (2010)
Presentation / Conference Contribution
Bani Khalaf, M., Al-Dubai, A., & Buchanan, W. J. (2010). A new adaptive broadcasting approach for mobile ad hoc networks. In Proceedings of 2010 6th Conference on Wireless Advanced (WiAD) (1-6). https://doi.org/10.1109/WIAD.2010.5544944

Mobile ad hoc networks (MANETs) have been gaining tremendous attention owing to the advances in wireless technologies accompanied by many applications and implementations. However, there are still a number of issues in MANETs which require further in... Read More about A new adaptive broadcasting approach for mobile ad hoc networks.

Privacy-preserving data acquisition protocol. (2010)
Presentation / Conference Contribution
Kwecka, Z., Buchanan, W. J., & Spiers, D. A. (2010, July). Privacy-preserving data acquisition protocol

Current investigative data acquisition techniques often breach human and natural rights of the data subject and can jeopardize an investigation. Often the investigators need to reveal to the data controller precise details of their suspect’s identity... Read More about Privacy-preserving data acquisition protocol..

Analysis of malicious affiliate network activity as a test case for an investigatory framework. (2010)
Presentation / Conference Contribution
Miehling, M. J., Buchanan, W. J., Old, L. J., Batey, A., & Rahman, A. (2010, July). Analysis of malicious affiliate network activity as a test case for an investigatory framework

Currently there is a great deal of literature surrounding methods that can be used to de-tect click-fraud, but there is very little published work on actual cases of click-through fraud. The aim of this paper is to present the details of a real-life... Read More about Analysis of malicious affiliate network activity as a test case for an investigatory framework..

The effects of network density of a new counter-based broadcasting scheme in mobile ad hoc networks. (2010)
Presentation / Conference Contribution
Yassein, M. B., Nimer, S. F., & Al-Dubai, A. (2010). The effects of network density of a new counter-based broadcasting scheme in mobile ad hoc networks. In Proceedings of ITA 2010 (1462-1467). https://doi.org/10.1109/CIT.2010.261

Broadcasting is an essential operation in mobile ad hoc networks (MANETs) to transmit the message (data packet) from the sender to all other nodes in the network. Flooding is the simplest mechanism for broadcast operations, where each node retransmit... Read More about The effects of network density of a new counter-based broadcasting scheme in mobile ad hoc networks..

Cross layer neighbourhood load routing for wireless mesh networks. (2010)
Presentation / Conference Contribution
Zhao, L., Al-Dubai, A., & Min, G. (2010). Cross layer neighbourhood load routing for wireless mesh networks. In Proceedings of IEEE IPDPS 2010 (1-7). https://doi.org/10.1109/IPDPSW.2010.5470790

Wireless Mesh Network (WMN) has been considered as a key emerging technology to construct next generation wireless communication networks. It combines the advantages of both mobile ad-hoc network (MANET) and traditional fixed network, attracting sign... Read More about Cross layer neighbourhood load routing for wireless mesh networks..

Novel QoS-Aware Gateway Centralized Multi-hop Routing for Wireless Mesh Networks (2010)
Presentation / Conference Contribution
Zhao, L., Al-Dubai, A. Y., & Romdhani, I. (2010, June). Novel QoS-Aware Gateway Centralized Multi-hop Routing for Wireless Mesh Networks. Presented at 2010 10th IEEE International Conference on Computer and Information Technology

Wireless Mesh Networking (WMN) emerges as a new technology to reshape the broadband industry towards a more efficient and cost effective connectivity. The WMN has been the ideal technology for the next generation wireless community networks that offe... Read More about Novel QoS-Aware Gateway Centralized Multi-hop Routing for Wireless Mesh Networks.

Application and analysis of private matching schemes based on commutative cryptosystems. (2009)
Presentation / Conference Contribution
Kwecka, Z., Buchanan, W. J., & Spiers, D. A. (2009). Application and analysis of private matching schemes based on commutative cryptosystems.

Privacy issues are becoming a key focus with software systems. Surveys show that the invasion of privacy is among the things peo-ple fear the most from the coming years. These fears seem to be justified, in the light of recent events involving the UK... Read More about Application and analysis of private matching schemes based on commutative cryptosystems..

Revisiting the potentialities of a mechanical thesaurus. (2009)
Presentation / Conference Contribution
Priss, U., & Old, L. J. (2009). Revisiting the potentialities of a mechanical thesaurus. In R. Ferre (Ed.), Proceedings of the 7th International Conference on Formal Concept Analysis, ICFCA (284-298). https://doi.org/10.1007/978-3-642-01815-2_21

This paper revisits the lattice-based thesaurus models which Margaret Masterman used for machine translation in the 1950’s and 60’s. Masterman’s notions are mapped onto modern, Formal Concept Analysis (FCA) terminology and three of her thesaurus algo... Read More about Revisiting the potentialities of a mechanical thesaurus..

Security and Routing Scoped IP Multicast Addresses (2009)
Presentation / Conference Contribution
Romdhani, I., Al-Dubai, A., & Kellil, M. (2009). Security and Routing Scoped IP Multicast Addresses. In International Conference on Parallel Processing Workshops, 2009. ICPPW '09 (228-235). https://doi.org/10.1109/icppw.2009.81

IP multicast is an efficient and scalable network layer delivering method for multimedia content to a large number of receivers across the Internet. It saves the network bandwidth and optimizes the processing overhead of the source. However, current... Read More about Security and Routing Scoped IP Multicast Addresses.

A performance model for integrated wireless mesh networks and WLANs with heterogeneous stations. (2009)
Presentation / Conference Contribution
Wu, Y., Min, G., Li, K., & Al-Dubai, A. (2009, November). A performance model for integrated wireless mesh networks and WLANs with heterogeneous stations. Presented at IEEE Global Telecommunications Conference, IEEE GLOBECOM 2009, Honolulu, Hawaii

The increasing demand for the coverage of high-speed wireless local area networks (WLANs) is driving the installation of a very large number of access points. Wireless mesh networks (WMNs) have emerged as a promising technology in next generation net... Read More about A performance model for integrated wireless mesh networks and WLANs with heterogeneous stations..

The impact of routing schemes on group communication throughput in scalable networks. (2008)
Presentation / Conference Contribution
Al-Dubai, A. (2008). The impact of routing schemes on group communication throughput in scalable networks. In Proceedings of the 2008 IEEE international parallel & distributed processing symposium (1-8). https://doi.org/10.1109/IPDPS.2008.4536490

Multicast communication has been a major avenue for many studies in interconnection networks. However, such a communication pattern has been studied under either limited operating conditions or within the context of deterministic routing algorithms.... Read More about The impact of routing schemes on group communication throughput in scalable networks..

MAMBO: Membership-Aware Multicast with Bushiness Optimisation. (2008)
Presentation / Conference Contribution
Fan, L., Taylor, H., & Trinder, P. (2008). MAMBO: Membership-Aware Multicast with Bushiness Optimisation.

Efficient application-level multicast (ALM) is an important research area supporting applications such as P2P file sharing, multi-player online games, and multimedia streaming. Although some applications only require a best-effort service, others hav... Read More about MAMBO: Membership-Aware Multicast with Bushiness Optimisation..