Skip to main content

Research Repository

Advanced Search

Outputs (3394)

Use and operational safety (2023)
Book Chapter
Reed, N., Charisis, V., & Cowper, S. (2023). Use and operational safety. In D. Ventriglia, & M. Kahl (Eds.), FISITA Intelligent Safety White Paper – The Safety of Electro-Mobility: Expert considerations on the Safety of an Electric Vehicle from concept through end of life (107-111). FISITA

Whether you are an individual buying your first car or replacing an existing vehicle, or if you are a fleet manager making vehicle purchase decisions on behalf of a company, the acquisition of a car is usually a highly significant purchase. Increasi... Read More about Use and operational safety.

A stacking ensemble of deep learning models for IoT intrusion detection (2023)
Journal Article
Lazzarini, R., Tianfield, H., & Charissis, V. (2023). A stacking ensemble of deep learning models for IoT intrusion detection. Knowledge-Based Systems, 279, Article 110941. https://doi.org/10.1016/j.knosys.2023.110941

The number of Internet of Things (IoT) devices has increased considerably in the past few years, which resulted in an exponential growth of cyber attacks on IoT infrastructure. As a consequence, the prompt detection of attacks in IoT environments thr... Read More about A stacking ensemble of deep learning models for IoT intrusion detection.

Generalized Concept and MATLAB Code for Modeling and Analyzing Wideband 90° Stub-Loaded Phase Shifters with Simulation and Experimental Verifications (2023)
Journal Article
M. Alnahwi, F., I. A. Al-Yasir, Y., See, C. H., S. Abdullah, A., & Abd-Alhameed, A. R. A. (2023). Generalized Concept and MATLAB Code for Modeling and Analyzing Wideband 90° Stub-Loaded Phase Shifters with Simulation and Experimental Verifications. Sensors, 23(18), Article 7773. https://doi.org/10.3390/s23187773

In the design of phase shifters, the modeling equations are too complicated and require some approximations to be derived correctly by hand. In response to this problem, this paper presents a generalized concept, algorithm, and MATLAB code that provi... Read More about Generalized Concept and MATLAB Code for Modeling and Analyzing Wideband 90° Stub-Loaded Phase Shifters with Simulation and Experimental Verifications.

Filmmaking practice-as-research: a case study in pursuit of subtext through AI generated dialogue (2023)
Presentation / Conference Contribution
Gray, P. (2023, September). Filmmaking practice-as-research: a case study in pursuit of subtext through AI generated dialogue. Paper presented at MeCCSA 2023, Glasgow

Practice led research in filmmaking and screenwriting that explores the potential for creating meaningful dialogue with subtext, through the use of AI chat bots. The presentation will include a short film alongside a case study paper, exploring the... Read More about Filmmaking practice-as-research: a case study in pursuit of subtext through AI generated dialogue.

Proceedings of the 18th International Audio Mostly Conference (2023)
Presentation / Conference Contribution
(2023, August). Proceedings of the 18th International Audio Mostly Conference. Presented at AM '23: Audio Mostly 2023, Edinburgh

Audio Mostly is an interdisciplinary conference on design and experience of interaction with sound that prides itself on embracing applied theory and reflective practice. Its annual gatherings bring together thinkers and doers from academia and indus... Read More about Proceedings of the 18th International Audio Mostly Conference.

A Comparative Study of Assessment Metrics for Imbalanced Learning (2023)
Presentation / Conference Contribution
Farou, Z., Aharrat, M., & Horváth, T. (2023, September). A Comparative Study of Assessment Metrics for Imbalanced Learning. Presented at European Conference on Advances in Databases and Information Systems (ADBIS 2023), Barcelona, Spain

There are several machine learning algorithms addressing class imbalance problem, requiring standardized metrics for adequete performance evaluation. This paper reviews several metrics for imbalanced learning in binary and multi-class problems. We em... Read More about A Comparative Study of Assessment Metrics for Imbalanced Learning.

A Digital Twin-Assisted Intelligent Partial Offloading Approach for Vehicular Edge Computing (2023)
Journal Article
Zhao, L., Zhao, Z., Zhang, E., Hawbani, A., Al-Dubai, A., Tan, Z., & Hussain, A. (2023). A Digital Twin-Assisted Intelligent Partial Offloading Approach for Vehicular Edge Computing. IEEE Journal on Selected Areas in Communications, 41(11), 3386-3400. https://doi.org/10.1109/jsac.2023.3310062

Vehicle Edge Computing (VEC) is a promising paradigm that exposes Mobile Edge Computing (MEC) to road scenarios. In VEC, task offloading can enable vehicles to offload the computing tasks to nearby Roadside Units (RSUs) that deploy computing capabili... Read More about A Digital Twin-Assisted Intelligent Partial Offloading Approach for Vehicular Edge Computing.

Representations and Regularity of Vector-Valued Right-Shift Invariant Operators Between Half-Line Bessel Potential Spaces (2023)
Journal Article
Guiver, C., & Opmeer, M. R. (2023). Representations and Regularity of Vector-Valued Right-Shift Invariant Operators Between Half-Line Bessel Potential Spaces. Integral Equations and Operator Theory, 95(3), Article 19. https://doi.org/10.1007/s00020-023-02738-3

Representation and boundedness properties of linear, right-shift invariant operators on half-line Bessel potential spaces (also known as fractional-order Sobolev spaces) as operator-valued multiplication operators in terms of the Laplace transform ar... Read More about Representations and Regularity of Vector-Valued Right-Shift Invariant Operators Between Half-Line Bessel Potential Spaces.

Selective Query Processing: A Risk-Sensitive Selection of Search Configurations (2023)
Journal Article
Mothe, J., & Ullah, M. Z. (2024). Selective Query Processing: A Risk-Sensitive Selection of Search Configurations. ACM transactions on information systems, 42(1), https://doi.org/10.1145/3608474

In information retrieval systems, search parameters are optimized to ensure high effectiveness based on a set of past searches and these optimized parameters are then used as the system configuration for all subsequent queries. A better approach, how... Read More about Selective Query Processing: A Risk-Sensitive Selection of Search Configurations.

Influence policing: Strategic communications, digital nudges, and behaviour change marketing in Scottish and UK preventative policing (2023)
Report
Collier, B., Stewart, J., Horgan, S., Wilson, L., & Thomas, D. (2023). Influence policing: Strategic communications, digital nudges, and behaviour change marketing in Scottish and UK preventative policing. Scottish Institute for Policing Research

Influence policing is an emerging phenomenon: the use of digital targeted ‘nudge’ communications campaigns by police forces and law enforcement agencies to directly achieve strategic policing outcomes. While scholarship, civil society, and journalism... Read More about Influence policing: Strategic communications, digital nudges, and behaviour change marketing in Scottish and UK preventative policing.

How is entrepreneurial marketing shaped by E-commerce technology: a case study of Chinese pure-play e-retailers (2023)
Journal Article
Hong, Y., Sawang, S., & Yang, H.-P. (. (2024). How is entrepreneurial marketing shaped by E-commerce technology: a case study of Chinese pure-play e-retailers. International Journal of Entrepreneurial Behaviour and Research, 30(2/3), 609-631. https://doi.org/10.1108/ijebr-10-2022-0951

Purpose
The focus of this study is on how online-only retailers, known as pure-play e-retailers, leverage e-commerce platforms to identify and pursue market opportunities. Through the perspective of entrepreneurial marketing, this study aims to expl... Read More about How is entrepreneurial marketing shaped by E-commerce technology: a case study of Chinese pure-play e-retailers.

Majority Voting Ransomware Detection System (2023)
Journal Article
Davies, S. R., Macfarlane, R., & Buchanan, W. J. (2023). Majority Voting Ransomware Detection System. Journal of Information Security, 14(4), 264-293. https://doi.org/10.4236/jis.2023.144016

Crypto-ransomware remains a significant threat to governments and companies alike, with high-profile cyber security incidents regularly making headlines. Many different detection systems have been proposed as solutions to the ever-changing dynamic la... Read More about Majority Voting Ransomware Detection System.

Apprentices’ perspectives of the tripartite collaboration at the heart of degree apprenticeships: a longitudinal study (2023)
Journal Article
Taylor-Smith, E., Smith, S., Fabian, K., & Bratton, A. (2023). Apprentices’ perspectives of the tripartite collaboration at the heart of degree apprenticeships: a longitudinal study. Journal of Workplace Learning, 35(8), 779-795. https://doi.org/10.1108/JWL-01-2023-0007

Purpose: The partnership which underpins degree apprenticeships is a tripartite collaboration between apprentices, employers, and universities. This study investigated the lived experiences and reflections of the apprentices at the centre, to inform... Read More about Apprentices’ perspectives of the tripartite collaboration at the heart of degree apprenticeships: a longitudinal study.

Reliable and Scalable Routing Under Hybrid SDVN Architecture: A Graph Learning Based Method (2023)
Journal Article
Li, Z., Zhao, L., Min, G., Al-Dubai, A. Y., Hawbani, A., Zomaya, A. Y., & Luo, C. (2023). Reliable and Scalable Routing Under Hybrid SDVN Architecture: A Graph Learning Based Method. IEEE Transactions on Intelligent Transportation Systems, 24(12), 14022 - 14036. https://doi.org/10.1109/tits.2023.3300082

Greedy routing efficiently achieves routing solutions for vehicular networks due to its simplicity and reliability. However, the existing greedy routing schemes have mainly considered simple routing metrics only, e.g., distance based on the local vie... Read More about Reliable and Scalable Routing Under Hybrid SDVN Architecture: A Graph Learning Based Method.

Stability of Forced Higher-Order Continuous-Time Lur'e Systems: a Behavioural Input-Output Perspective (2023)
Journal Article
Guiver, C., & Logemann, H. (2024). Stability of Forced Higher-Order Continuous-Time Lur'e Systems: a Behavioural Input-Output Perspective. International Journal of Control, 97(8), 1788-1809. https://doi.org/10.1080/00207179.2023.2233023

We consider a class of forced continuous-time Lur'e systems obtained by applying nonlinear feedback to a higher-order linear differential equation which defines an input-output system in the sense of behavioural systems theory. This linear system dir... Read More about Stability of Forced Higher-Order Continuous-Time Lur'e Systems: a Behavioural Input-Output Perspective.

Towards Improving Accessibility of Web Auditing with Google Lighthouse (2023)
Presentation / Conference Contribution
McGill, T., Bamgboye, O., Liu, X., & Kalutharage, C. S. (2023, June). Towards Improving Accessibility of Web Auditing with Google Lighthouse. Presented at The 47th IEEE Annual Conference on Computers, Software, and Applications (COMPSAC), Turin, Italy

Google Lighthouse is a tool made by Google for auditing web pages performance, accessibility, SEO, and best practices with the intention of improving the quality of the websites. This allows software developers to understand areas of improvement with... Read More about Towards Improving Accessibility of Web Auditing with Google Lighthouse.

#Chavcheck: Does TikTok facilitate the pornification of social class struggles? (2023)
Presentation / Conference Contribution
Logan-McFarlane, A. (2023, July). #Chavcheck: Does TikTok facilitate the pornification of social class struggles?. Paper presented at Netnocon 2023, University of Salford, Manchester, UK

In 2020, the ‘chav’ trope resurfaced globally on TikTok. The trend featured individuals performing ““chav checks”, heavy makeup tutorials, and showing off the UK’s “chavviest places” with the sound check “Hey yo, chav check” employed to mock “puffa j... Read More about #Chavcheck: Does TikTok facilitate the pornification of social class struggles?.

A cloud-based Bi-directional LSTM approach to grid-connected solar PV energy forecasting for multi-energy systems (2023)
Journal Article
Liu, Q., Darteh, O. F., Bilal, M., Huang, X., Attique, M., Liu, X., & Acakpovi, A. (2023). A cloud-based Bi-directional LSTM approach to grid-connected solar PV energy forecasting for multi-energy systems. Sustainable Computing, 40, Article 100892. https://doi.org/10.1016/j.suscom.2023.100892

The drive for smarter, greener, and more livable cities has led to research towards more effective solar energy forecasting techniques and their integration into traditional power systems. However, the availability of real-time data, data storage, an... Read More about A cloud-based Bi-directional LSTM approach to grid-connected solar PV energy forecasting for multi-energy systems.

Federated Learning for IoT Intrusion Detection (2023)
Journal Article
Lazzarini, R., Tianfield, H., & Charissis, V. (2023). Federated Learning for IoT Intrusion Detection. Artificial Intelligence, 4(3), 509-530. https://doi.org/10.3390/ai4030028

The number of Internet of Things (IoT) devices has increased considerably in the past few years, resulting in a large growth of cyber attacks on IoT infrastructure. As part of a defense in depth approach to cybersecurity, intrusion detection systems... Read More about Federated Learning for IoT Intrusion Detection.