Skip to main content

Research Repository

Advanced Search

All Outputs (133)

Federated learning: Data privacy and cyber security in edge-based machine learning (2023)
Book Chapter
White, J., & Legg, P. (2023). Federated learning: Data privacy and cyber security in edge-based machine learning. In C. Hewage, Y. Rahulamathavan, & D. Ratnayake (Eds.), Data Protection in a Post-Pandemic Society (DPPPS) – Best Practices, Laws, Regulations, and Recent Solutions. Springer. https://doi.org/10.1007/978-3-031-34006-2

Machine learning is now a key component of many applications for understanding trends and characteristics within the wealth of data that may be processed, whether this be learning about customer preferences and travel preferences, forecasting future... Read More about Federated learning: Data privacy and cyber security in edge-based machine learning.

Applications of machine learning methods to assist the diagnosis of autism spectrum disorder (2023)
Book Chapter
Elbattah, M., Carette, R., Cilia, F., Guérin, J., & Dequen, G. (2023). Applications of machine learning methods to assist the diagnosis of autism spectrum disorder. In Neural Engineering Techniques for Autism Spectrum Disorder, Volume 2: Diagnosis and Clinical Analysis (99-119). Elsevier. https://doi.org/10.1016/B978-0-12-824421-0.00013-8

Autism spectrum disorder (ASD) is a lifelong neuro-developmental disorder that is generally marked by a set of communication and social impairments. The early diagnosis of autism is genuinely beneficial for the welfare of children and parents as well... Read More about Applications of machine learning methods to assist the diagnosis of autism spectrum disorder.

A university’s transformational change agenda (2023)
Book Chapter
Longhurst, J., Gough, G., & Brooks, I. (2023). A university’s transformational change agenda. In W. M. Purcell, & J. Haddock-Fraser (Eds.), Bloomsbury Handbook Of Sustainability In Higher Education: An Agenda For Transformational Change. Bloomsbury Publishing

This chapter presents a chronological review of the University of West of England, Bristol (UWE) and its engagement with the environmental agenda of the late 20th century before reviewing its transformational sustainability agenda over the last twent... Read More about A university’s transformational change agenda.

Conventional non-computing and unconventional musical signal processing (2022)
Book Chapter
Baracskai, Z. (2022). Conventional non-computing and unconventional musical signal processing. In A. Adamatzky (Ed.), Unconventional Computing, Arts, Philosophy (339-365). World Scientific Publishing. https://doi.org/10.1142/9789811257155_0020

As the scepsis maintains its lead in scientific enquiry giving birth to unconventional computing, one must poke at the newborn as well. By manipulating the terms convention and computing, challenges are posed to their meaning in the contemporary cont... Read More about Conventional non-computing and unconventional musical signal processing.

A haploid-diploid evolutionary algorithm optimizing nanoparticle based cancer treatments (2022)
Book Chapter
Tsompanas, M., Bull, L., Adamatzky, A., & Balaz, I. (2022). A haploid-diploid evolutionary algorithm optimizing nanoparticle based cancer treatments. In I. Balaz, & A. Adamatzky (Eds.), Cancer, Complexity, Computation (237-251). Springer. https://doi.org/10.1007/978-3-031-04379-6_10

This paper uses a recent explanation for the fundamental haploid-diploid lifecycle of eukaryotic organisms to present a new evolutionary algorithm that differs from all previous known work using diploid representations. A form of the Baldwin effect h... Read More about A haploid-diploid evolutionary algorithm optimizing nanoparticle based cancer treatments.

Statistical modeling of sensitive period effects using the structured life course modelling approach (SLCMA) (2022)
Book Chapter
Smith, B. J., Smith, A. D., & Dunn, E. C. (2022). Statistical modeling of sensitive period effects using the structured life course modelling approach (SLCMA). In Sensitive Periods of Brain Development and Preventive Interventions (215-234). Springer. https://doi.org/10.1007/7854_2021_280

Sensitive periods are times during development when life experiences can have a greater impact on outcomes than at other periods during the life course. However, a dearth of sophisticated methods for studying time-dependent exposure-outcome relations... Read More about Statistical modeling of sensitive period effects using the structured life course modelling approach (SLCMA).

E-government cybersecurity modeling in the context of software-defined networks (2022)
Book Chapter
Ujjan, R. M. A., Taj, I., & Brohi, S. N. (2022). E-government cybersecurity modeling in the context of software-defined networks. In Cybersecurity Measures for E-Government Frameworks (1-21). IGI Global. https://doi.org/10.4018/978-1-7998-9624-1.ch001

Currently, information and communication technologies are going in advance, allowing more information to be distributed globally via the internet superhighway. While being interconnected to the virtual world, people are becoming increasingly focused,... Read More about E-government cybersecurity modeling in the context of software-defined networks.

The impact of Blockchain technology on advanced security measures for E-Government (2022)
Book Chapter
Ujjan, R. M. A., Hussain, K., & Brohi, S. N. (2022). The impact of Blockchain technology on advanced security measures for E-Government. In Cyber Security Measures for E-Government Frameworks (157-174). IGI Global. https://doi.org/10.4018/978-1-7998-9624-1.ch010

Implementation of blockchain with e-government has raised several complexities. When an area has satisfied the requirements for e-government implementation, new challenges will appear. As a result of the information technology revolution, governments... Read More about The impact of Blockchain technology on advanced security measures for E-Government.

Multi strategy search with crow search algorithm (2022)
Book Chapter
Durgut, R., & Aydin, M. E. (in press). Multi strategy search with crow search algorithm. In N. Vakhania (Ed.), Optimization Algorithms. IntechOpen. https://doi.org/10.5772/intechopen.102862

Crow Search Algorithm (CSA) is one of the recently proposed swarm intelligence algorithms developed inspiring of the social behaviour of crow flocks. One of the drawbacks of the original CSA is that it tends to randomly select a neighbour on search s... Read More about Multi strategy search with crow search algorithm.

Pandemic management with social media analytics (2021)
Book Chapter
Sabuncu, I., & Aydin, M. E. (2021). Pandemic management with social media analytics. In Data Science Advancements in Pandemic and Outbreak Management (78-107). IGI Global. https://doi.org/10.4018/978-1-7998-6736-4.ch005

Social media analytics appears as one of recently developing disciplines that helps understand public perception, reaction, and emerging developments. Particularly, pandemics are one of overwhelming phenomena that push public concerns and necessitate... Read More about Pandemic management with social media analytics.

Evolving Boolean regulatory networks with variable gene expression times (2021)
Book Chapter
Bull, L. (2021). Evolving Boolean regulatory networks with variable gene expression times. In Handbook of Unconventional Computing (247-259). World Scientific Publishing. https://doi.org/10.1142/9789811235726_0007

The time taken for gene expression varies not least because proteins vary in length considerably. This paper uses an abstract, tuneable Boolean regulatory network model to explore gene expression time variation. In particular, it is shown how non-uni... Read More about Evolving Boolean regulatory networks with variable gene expression times.

Blockchain and artificial intelligence – Managing a secure and sustainable supply chain (2021)
Book Chapter
Pimenidis, E., Patsavellas, J., & Tonkin, M. (2021). Blockchain and artificial intelligence – Managing a secure and sustainable supply chain. In H. Jahankhani, A. Jamal, & S. Lawson (Eds.), Cybersecurity, Privacy and Freedom Protection in the Connected World. (1). Springer. https://doi.org/10.1007/978-3-030-68534-8

Supply chain management is often the most challenging part of any business that manufactures, sells goods, or provides services. Regardless of whether the operations are mostly physical or online, managing supply chains largely relies on being able t... Read More about Blockchain and artificial intelligence – Managing a secure and sustainable supply chain.

Computer aided collaborative learning using cloud computing: Challenges and opportunities (2021)
Book Chapter
Malik, M., Sid Ahmed, A., & Hosseini, A. (2021). Computer aided collaborative learning using cloud computing: Challenges and opportunities. In S. L. Gupta, N. Kishor, N. Mishra, S. Mathur, & U. Gupta (Eds.), Digitalization of Higher Education using Cloud Computing. Taylor & Francis

This chapter discusses and explores computer aided collaborative learning, starting with an introduction to its method and theories. Bloom’s taxonomy and benefits to individuals and organisations are discussed. The study considers the available compu... Read More about Computer aided collaborative learning using cloud computing: Challenges and opportunities.

UAV’s applications, architecture, security issues and attack scenarios: A survey (2020)
Book Chapter
Khan, N. A., Brohi, S., & Jhanjhi, N. (2020). UAV’s applications, architecture, security issues and attack scenarios: A survey. In S. Peng, L. H. Son, G. Suseendran, & D. Balaganesh (Eds.), Book cover Book cover Intelligent Computing and Innovation on Data Science (753-760). Online and in print.: Springer. https://doi.org/10.1007/978-981-15-3284-9_81

Unmanned aerial vehicles (UAVs)/drones have become very popular in recent years as they are widely used in several domains. They are widely used in both military and civilian applications such as aerial photography, entertainment, search and rescue m... Read More about UAV’s applications, architecture, security issues and attack scenarios: A survey.

Emerging use of UAV’s: secure communication protocol issues and challenges (2020)
Book Chapter
Khan, N. A., Jhanjhi, N. Z., Brohi, S. N., & Nayyar, A. (2020). Emerging use of UAV’s: secure communication protocol issues and challenges. In Drones in Smart-Cities: Security and Performance (37-55). Elsevier. https://doi.org/10.1016/B978-0-12-819972-5.00003-3

In recent years, unmanned aerial vehicles (UAVs)/drones have gained popularity in many areas due to their widely used applications. They are used extensively in military and civil applications such as search and rescue, reconnaissance, monitoring of... Read More about Emerging use of UAV’s: secure communication protocol issues and challenges.

A data tracking and monitoring mechanism (2020)
Book Chapter
Lika, R. A., Ramasamy, D. A. V., Murugiah, D. A., & Brohi, S. N. (2020). A data tracking and monitoring mechanism. In S. Peng, L. H. Son, G. Suseendran, & D. Balaganesh (Eds.), Lecture Notes in Networks and Systems book series (LNNS,volume 118) (773-781). Springer. https://doi.org/10.1007/978-981-15-3284-9_89

There is a rising trend among companies to collect data including personally identifiable information (PII) from service users. An individual’s privacy can be violated when his/her PII is accumulated, utilized or divulged. Users of the technology are... Read More about A data tracking and monitoring mechanism.

Interspecies Urban Planning, Reimaging City Infrastructures with Slime Mould (2019)
Book Chapter
Dillon, T. (2019). Interspecies Urban Planning, Reimaging City Infrastructures with Slime Mould. . River Publishers

The slime mould Physarum polycephalum optimises its shape in a geometrically constrained space. We explore this property in order to reconsider how we could develop more inclusive, interspecies approaches to urban planning and infrastructure. Working... Read More about Interspecies Urban Planning, Reimaging City Infrastructures with Slime Mould.

Pedagogical Approach to Effective Cybersecurity Teaching (2019)
Book Chapter
Arabo, A., & Serpell, M. (in press). Pedagogical Approach to Effective Cybersecurity Teaching. In Z. Pan, A. D. Cheok, & W. Mueller (Eds.), Transactions on Edutainment XV (129-140). Springer. https://doi.org/10.1007/978-3-662-59351-6_11

© 2019, Springer-Verlag GmbH Germany, part of Springer Nature. Initial research ruled out many factors that were thought may correlate to student academic performance. Finally, a strong correlation was found between their academic performance and the... Read More about Pedagogical Approach to Effective Cybersecurity Teaching.

Confidentiality and linked data (2018)
Book Chapter
Ritchie, F., & Smith, J. Confidentiality and linked data. In G. Roarson (Ed.), Privacy and Data Confidentiality Methods – a National Statistician’s Quality Review (1-34). Newport: Office for National Statistics

This chapter considers the confidentiality issues around linked data. It notes that the use and availability of secondary (adminstrative or social media) data, allied to powerful processing and machine learning techniques, in theory means that re-ide... Read More about Confidentiality and linked data.