Skip to main content

Research Repository

Advanced Search

Outputs (3343)

Hybrid Servicescapes in Tourism and Hospitality (2023)
Book Chapter
Urquhart, E. (in press). Hybrid Servicescapes in Tourism and Hospitality. In N. Stylos, R. Rahimi, & P. Robinson (Eds.), Contemporary Marketing Management for Tourism and Hospitality. Palgrave Macmillan

Despite being 30 years since the publication of Bitner’s (1992) seminal article, the servicescape concept remains central to the marketing and management of tourism and hospitality environments. While undoubtedly, the fundamental premise remains the... Read More about Hybrid Servicescapes in Tourism and Hospitality.

Federated Learning for IoT Intrusion Detection (2023)
Journal Article
Lazzarini, R., Tianfield, H., & Charissis, V. (2023). Federated Learning for IoT Intrusion Detection. Artificial Intelligence, 4(3), 509-530. https://doi.org/10.3390/ai4030028

The number of Internet of Things (IoT) devices has increased considerably in the past few years, resulting in a large growth of cyber attacks on IoT infrastructure. As part of a defense in depth approach to cybersecurity, intrusion detection systems... Read More about Federated Learning for IoT Intrusion Detection.

Reliable and Scalable Routing Under Hybrid SDVN Architecture: A Graph Learning Based Method (2023)
Journal Article
Li, Z., Zhao, L., Min, G., Al-Dubai, A. Y., Hawbani, A., Zomaya, A. Y., & Luo, C. (2023). Reliable and Scalable Routing Under Hybrid SDVN Architecture: A Graph Learning Based Method. IEEE Transactions on Intelligent Transportation Systems, 24(12), 14022 - 14036. https://doi.org/10.1109/tits.2023.3300082

Greedy routing efficiently achieves routing solutions for vehicular networks due to its simplicity and reliability. However, the existing greedy routing schemes have mainly considered simple routing metrics only, e.g., distance based on the local vie... Read More about Reliable and Scalable Routing Under Hybrid SDVN Architecture: A Graph Learning Based Method.

Start thinking in graphs: using graphs to address critical attack paths in a Microsoft cloud tenant (2023)
Journal Article
Elmiger, M., Lemoudden, M., Pitropakis, N., & Buchanan, W. J. (2024). Start thinking in graphs: using graphs to address critical attack paths in a Microsoft cloud tenant. International Journal of Information Security, 23, 467-485. https://doi.org/10.1007/s10207-023-00751-6

The challenge of securing IT environments has reached a new complexity level as a growing number of organisations adopt cloud solutions. This trend increases the possibility of overseen attack paths in an organisation’s IT infrastructure. This paper... Read More about Start thinking in graphs: using graphs to address critical attack paths in a Microsoft cloud tenant.

A Digital Twin-Assisted Intelligent Partial Offloading Approach for Vehicular Edge Computing (2023)
Journal Article
Zhao, L., Zhao, Z., Zhang, E., Hawbani, A., Al-Dubai, A., Tan, Z., & Hussain, A. (2023). A Digital Twin-Assisted Intelligent Partial Offloading Approach for Vehicular Edge Computing. IEEE Journal on Selected Areas in Communications, 41(11), 3386-3400. https://doi.org/10.1109/jsac.2023.3310062

Vehicle Edge Computing (VEC) is a promising paradigm that exposes Mobile Edge Computing (MEC) to road scenarios. In VEC, task offloading can enable vehicles to offload the computing tasks to nearby Roadside Units (RSUs) that deploy computing capabili... Read More about A Digital Twin-Assisted Intelligent Partial Offloading Approach for Vehicular Edge Computing.

A cloud-based Bi-directional LSTM approach to grid-connected solar PV energy forecasting for multi-energy systems (2023)
Journal Article
Liu, Q., Darteh, O. F., Bilal, M., Huang, X., Attique, M., Liu, X., & Acakpovi, A. (2023). A cloud-based Bi-directional LSTM approach to grid-connected solar PV energy forecasting for multi-energy systems. Sustainable Computing, 40, Article 100892. https://doi.org/10.1016/j.suscom.2023.100892

The drive for smarter, greener, and more livable cities has led to research towards more effective solar energy forecasting techniques and their integration into traditional power systems. However, the availability of real-time data, data storage, an... Read More about A cloud-based Bi-directional LSTM approach to grid-connected solar PV energy forecasting for multi-energy systems.

Improved Double Deep Q Network-Based Task Scheduling Algorithm in Edge Computing for Makespan Optimization (2024)
Journal Article
Zeng, L., Liu, Q., Shen, S., & Liu, X. (2024). Improved Double Deep Q Network-Based Task Scheduling Algorithm in Edge Computing for Makespan Optimization. Tsinghua Science and Technology, 29(3), 806 - 817. https://doi.org/10.26599/TST.2023.9010058

Edge computing nodes undertake more and more tasks as business density grows. How to efficiently allocate large-scale and dynamic workloads to edge computing resources has become a critical challenge. An edge task scheduling approach based on an impr... Read More about Improved Double Deep Q Network-Based Task Scheduling Algorithm in Edge Computing for Makespan Optimization.

Image Forgery Detection using Cryptography and Deep Learning (2024)
Presentation / Conference Contribution
Oke, A., & Babaagba, K. O. (2024). Image Forgery Detection using Cryptography and Deep Learning. In Big Data Technologies and Applications. BDTA 2023 (62-78). https://doi.org/10.1007/978-3-031-52265-9_5

The advancement of technology has undoubtedly exposed everyone to a remarkable array of visual imagery. Nowadays, digital technology is eating away the trust and historical confidence people have in the integrity of imagery. Deep learning is often us... Read More about Image Forgery Detection using Cryptography and Deep Learning.

#Chavcheck: Does TikTok facilitate the pornification of social class struggles? (2023)
Presentation / Conference Contribution
Logan-McFarlane, A. (2023, July). #Chavcheck: Does TikTok facilitate the pornification of social class struggles?. Paper presented at Netnocon 2023, University of Salford, Manchester, UK

In 2020, the ‘chav’ trope resurfaced globally on TikTok. The trend featured individuals performing ““chav checks”, heavy makeup tutorials, and showing off the UK’s “chavviest places” with the sound check “Hey yo, chav check” employed to mock “puffa j... Read More about #Chavcheck: Does TikTok facilitate the pornification of social class struggles?.

Changing Public Opinion on Fashion and Age: Unpacking Narrative Strategy in Instagram Message Posts of 50+ Fashion Influencers (2023)
Presentation / Conference Contribution
Logan-McFarlane, A., & Samsioe, E. (2023, June). Changing Public Opinion on Fashion and Age: Unpacking Narrative Strategy in Instagram Message Posts of 50+ Fashion Influencers. Paper presented at Consumer Culture Theory (CCT), Lund University, Sweden

Our study aims to investigate how narrative strategy can be employed to change public opinion on age in the Western beauty and fashion market. Our unique contribution lies in the interpretation of Instagram message post content to reveal how composit... Read More about Changing Public Opinion on Fashion and Age: Unpacking Narrative Strategy in Instagram Message Posts of 50+ Fashion Influencers.

Influence policing: Strategic communications, digital nudges, and behaviour change marketing in Scottish and UK preventative policing (2023)
Report
Collier, B., Stewart, J., Horgan, S., Wilson, L., & Thomas, D. (2023). Influence policing: Strategic communications, digital nudges, and behaviour change marketing in Scottish and UK preventative policing. Scottish Institute for Policing Research

Influence policing is an emerging phenomenon: the use of digital targeted ‘nudge’ communications campaigns by police forces and law enforcement agencies to directly achieve strategic policing outcomes. While scholarship, civil society, and journalism... Read More about Influence policing: Strategic communications, digital nudges, and behaviour change marketing in Scottish and UK preventative policing.

Responsible Design & Evaluation of a Conversational Agent for a National Careers Service (2023)
Presentation / Conference Contribution
Wilson, M., Cruickshank, P., Gkatzia, D., & Robertson, P. (2023, September). Responsible Design & Evaluation of a Conversational Agent for a National Careers Service. Presented at Symposium on Future Directions in Information Access (FDIA) 2023, Vienna, Austria

This PhD project applies a research-through-design approach to the development of a conversational agent for a national career service for young people. This includes addressing practical, interactional and ethical aspects of the system. For each asp... Read More about Responsible Design & Evaluation of a Conversational Agent for a National Careers Service.

A stacking ensemble of deep learning models for IoT intrusion detection (2023)
Journal Article
Lazzarini, R., Tianfield, H., & Charissis, V. (2023). A stacking ensemble of deep learning models for IoT intrusion detection. Knowledge-Based Systems, 279, Article 110941. https://doi.org/10.1016/j.knosys.2023.110941

The number of Internet of Things (IoT) devices has increased considerably in the past few years, which resulted in an exponential growth of cyber attacks on IoT infrastructure. As a consequence, the prompt detection of attacks in IoT environments thr... Read More about A stacking ensemble of deep learning models for IoT intrusion detection.

Use and operational safety (2023)
Book Chapter
Reed, N., Charisis, V., & Cowper, S. (2023). Use and operational safety. In D. Ventriglia, & M. Kahl (Eds.), FISITA Intelligent Safety White Paper – The Safety of Electro-Mobility: Expert considerations on the Safety of an Electric Vehicle from concept through end of life (107-111). FISITA

Whether you are an individual buying your first car or replacing an existing vehicle, or if you are a fleet manager making vehicle purchase decisions on behalf of a company, the acquisition of a car is usually a highly significant purchase. Increasi... Read More about Use and operational safety.

The Opaque Nature of Intelligence and the Pursuit of Explainable AI (2023)
Presentation / Conference Contribution
Thomson, S. L., van Stein, N., van den Berg, D., & van Leeuwen, C. (2023, November). The Opaque Nature of Intelligence and the Pursuit of Explainable AI. Presented at NCTA 2023: 15th International Conference on Neural Computation Theory and Applications, Rome, Italy

When artificial intelligence is used for making decisions, people are more likely to accept those decisions if they can be made intelligible to the public. This understanding has led to the emerging field of explainable artificial intelligence. We re... Read More about The Opaque Nature of Intelligence and the Pursuit of Explainable AI.

Improving the quality of police facial composite images (2009)
Exhibition / Performance
Skelton, F., Frowd, C., & Speers, K. Improving the quality of police facial composite images. [Poster]. Exhibited at SET for Britain, House of Commons. 9 September 2009 - 9 September 2009. (Unpublished)

The Role of Context in the Construction of Police Facial Composites (2009)
Presentation / Conference Contribution
Skelton, F., Frowd, C., & Speers, K. (2009, September). The Role of Context in the Construction of Police Facial Composites. Poster presented at British Psychological Society Cognitive Section conference, University of Hertfordshire

EvoFIT: Police Software For Constructing Facial Composites (2010)
Presentation / Conference Contribution
Skelton, F., & Frowd, C. (2010, September). EvoFIT: Police Software For Constructing Facial Composites. Poster presented at Police Learning: A Changing World, University of Central Lancashire

Lost in Space: Optimising search space in EvoFIT (2012)
Presentation / Conference Contribution
Skelton, F., Frowd, C., & Greenwood, L. (2012, August). Lost in Space: Optimising search space in EvoFIT. Paper presented at British Psychological Society Cognitive Section annual conference, University of Glasgow