Skip to main content

Research Repository

Advanced Search

All Outputs (103)

A smart contract model for agent societies (2018)
Conference Proceeding
Tumminelli, M., & Battle, S. (2018). A smart contract model for agent societies. In UK-RAS Conference: ‘Robots Working For & Among Us’ Proceedings

This paper presents a solution to the exchange of services within an agent society. We explore an open delivery chain scenario in which autonomous drones offer and subcontract delivery services to each other. Such agents are able to self-organize acc... Read More about A smart contract model for agent societies.

Conversation analysis structured dialogue for multi-domain dialogue management (2018)
Presentation / Conference
Duran, N., & Battle, S. (2018, December). Conversation analysis structured dialogue for multi-domain dialogue management. Paper presented at The International Workshop on Dialogue, Explanation and Argumentation in Human-Agent Interaction (DEXAHAI), Southampton

Dialogue state tracking is a vital component of task-oriented dialogue systems. Often, dialogue states are constrained by their target domains entity's, slots and values. Adding new domains and knowledge may require laborious hand-crafting or retrain... Read More about Conversation analysis structured dialogue for multi-domain dialogue management.

Confidentiality and linked data (2018)
Book Chapter
Ritchie, F., & Smith, J. Confidentiality and linked data. In G. Roarson (Ed.), Privacy and Data Confidentiality Methods – a National Statistician’s Quality Review (1-34). Newport: Office for National Statistics

This chapter considers the confidentiality issues around linked data. It notes that the use and availability of secondary (adminstrative or social media) data, allied to powerful processing and machine learning techniques, in theory means that re-ide... Read More about Confidentiality and linked data.

Opportunistic protocol based on social probability and resources efficiency for the intelligent and connected transportation system (2018)
Journal Article
Wang, T., Tang, M. B., Song, H., Cao, Y., & Khan, Z. (2019). Opportunistic protocol based on social probability and resources efficiency for the intelligent and connected transportation system. Computer Networks, 149, 173-186. https://doi.org/10.1016/j.comnet.2018.11.034

© 2018 Elsevier B.V. In recent years, Intelligent and Connected Transportation Systems (ICTS) have become a practical and valuable alternative for wide variety of novel applications in road traffic safety. It can be utilized to guarantee road safety... Read More about Opportunistic protocol based on social probability and resources efficiency for the intelligent and connected transportation system.

Liquid Marble Actuator for Microfluidic Logic Systems (2018)
Journal Article
Draper, T. C., Fullarton, C., Phillips, N., de Lacy Costello, B. P. J., & Adamatzky, A. (2018). Liquid Marble Actuator for Microfluidic Logic Systems. Scientific Reports, 8(1), https://doi.org/10.1038/s41598-018-32540-w

© 2018, The Author(s). A mechanical flip-flop actuator has been developed that allows for the facile re-routing and distribution of liquid marbles (LMs) in digital microfluidic devices. Shaped loosely like a triangle, the actuating switch pivots fro... Read More about Liquid Marble Actuator for Microfluidic Logic Systems.

Time-aware distributed service recommendation with privacy-preservation (2018)
Journal Article
Xu, X., He, Q., Qi, L., Wang, R., Hu, C., & Li, S. (2019). Time-aware distributed service recommendation with privacy-preservation. Information Sciences, 480, 354-364. https://doi.org/10.1016/j.ins.2018.11.030

© 2018 As a promising way to extract insightful information from massive data, service recommendation has gained ever-increasing attentions in both academic and industrial areas. Recently, the Locality-Sensitive Hashing (LSH) technique is introduced... Read More about Time-aware distributed service recommendation with privacy-preservation.

Behavior rhythm: A new model for behavior visualization and its application in system security management (2018)
Journal Article
He, C., Liu, Z., Guan, X., Li, S., & Qin, T. (2018). Behavior rhythm: A new model for behavior visualization and its application in system security management. IEEE Access, 6, 73940-73951. https://doi.org/10.1109/ACCESS.2018.2882812

© 2018 IEEE. The widespread use of social media, cloud computing, and Internet of Things generates massive behavior data recorded by system logs, and how to utilize these data to improve the stability and security of these systems becomes more and mo... Read More about Behavior rhythm: A new model for behavior visualization and its application in system security management.

NotPetya: Cyber attack prevention through awareness via Gamification (2018)
Conference Proceeding
Lika, R. A., Murugiah, D., Brohi, S., & Ramasamy, D. A. (2018). NotPetya: Cyber attack prevention through awareness via Gamification. In 2018 International Conference on Smart Computing and Electronic Enterprise, ICSCEE 2018. https://doi.org/10.1109/ICSCEE.2018.8538431

NotPetya, when released in 2017, was believed to be ransomware. NotPetya injects malicious codes in the computer and then attempts to gain administrator access. Following that, it infects other computers in the network. NotPetya uses the EternalBlue... Read More about NotPetya: Cyber attack prevention through awareness via Gamification.

Frequent itemset mining in big data with effective single scan algorithms (2018)
Journal Article
Djenouri, Y., Djenouri, D., Chun-Wei Lin, J., & Belhadi, A. (2018). Frequent itemset mining in big data with effective single scan algorithms. IEEE Access, 6, 68013-68026. https://doi.org/10.1109/ACCESS.2018.2880275

© 2013 IEEE. This paper considers frequent itemsets mining in transactional databases. It introduces a new accurate single scan approach for frequent itemset mining (SSFIM), a heuristic as an alternative approach (EA-SSFIM), as well as a parallel imp... Read More about Frequent itemset mining in big data with effective single scan algorithms.

Belousov-Zhabotinsky reaction in liquid marbles (2018)
Journal Article
Fullarton, C., Draper, T., Phillips, N., de Lacy Costello, B., & Adamatzky, A. (2019). Belousov-Zhabotinsky reaction in liquid marbles. Journal of Physics: Materials, 2(1), https://doi.org/10.1088/2515-7639/aaed4c

In Belousov–Zhabotinsky (BZ) type reactions, chemical oxidation waves can be exploited to produce reaction-diffusion processors. This paper reports on a new method of encapsulating BZ solution in a powder coating of either polyethylene (PE) or polyte... Read More about Belousov-Zhabotinsky reaction in liquid marbles.

An Efficient Rule-Based Distributed Reasoning Framework for Resource-bounded Systems (2018)
Journal Article
Rakib, A., & Uddin, I. (2019). An Efficient Rule-Based Distributed Reasoning Framework for Resource-bounded Systems. Mobile Networks and Applications, 24(1), 82-99. https://doi.org/10.1007/s11036-018-1140-x

© 2018, The Author(s). Over the last few years, context-aware computing has received a growing amount of attention among the researchers in the IoT and ubiquitous computing community. In principle, context-aware computing transforms a physical enviro... Read More about An Efficient Rule-Based Distributed Reasoning Framework for Resource-bounded Systems.

Internet of things forensics: Recent advances, taxonomy, requirements, and open challenges (2018)
Journal Article
Yaqoob, I., Hashem, I. A. T., Ahmed, A., Kazmi, S. A., & Hong, C. S. (2019). Internet of things forensics: Recent advances, taxonomy, requirements, and open challenges. Future Generation Computer Systems, 92, 265-275. https://doi.org/10.1016/j.future.2018.09.058

The explosive growth of smart objects and their dependency on wireless technologies for communication increases the vulnerability of Internet of Things (IoT) to cyberattacks. Cyberattacks faced by IoT present daunting challenges to digital forensic e... Read More about Internet of things forensics: Recent advances, taxonomy, requirements, and open challenges.

An IoT-oriented data placement method with privacy preservation in cloud environment (2018)
Journal Article
Xu, X., Fu, S., Qi, L., Zhang, X., Liu, Q., He, Q., & Li, S. (2018). An IoT-oriented data placement method with privacy preservation in cloud environment. Journal of Network and Computer Applications, 124, 148-157. https://doi.org/10.1016/j.jnca.2018.09.006

© 2018 Elsevier Ltd IoT (Internet of Things) devices generate huge amount of data which require rich resources for data storage and processing. Cloud computing is one of the most popular paradigms to accommodate such IoT data. However, the privacy co... Read More about An IoT-oriented data placement method with privacy preservation in cloud environment.

An approach for web service selection and dynamic composition based on linked open data (2018)
Book Chapter
Vesyropoulos, N., Georgiadis, C., & Pimenidis, E. (2018). An approach for web service selection and dynamic composition based on linked open data. In N. T. Nguyen, & R. Kowalczyk (Eds.), Transactions on Computational Collective Intelligence XXX (54-70). Springer. https://doi.org/10.1007/978-3-319-99810-7_3

The wide adoption of the Service Oriented Architecture (SOA) paradigm has provided a means for heterogeneous systems to seamlessly interact and exchange data. Thus, enterprises and end-users have widely utilized Web Services (WS), either as stand-alo... Read More about An approach for web service selection and dynamic composition based on linked open data.

E-assessment of computer programming (2018)
Presentation / Conference
Gwynllyw, R., & Smith, J. (2018, September). E-assessment of computer programming. Paper presented at 12th International Symposium on Advances in Technology Education Nurturing Professionals for Smart Cities: Way Forward for Technology Education, Hong Kong

This paper demonstrates how we have used Dewis, an algorithmic open source e-assessment system, to automatically assess programming skills, in particular, in the C programming language. Teaching and assessing programming skills is challenging; prior... Read More about E-assessment of computer programming.

Interaction and engagement with an anxiety management app: Analysis using large-Scale behavioral data (2018)
Journal Article
Matthews, P., Topham, P., & Caleb-Solly, P. (2018). Interaction and engagement with an anxiety management app: Analysis using large-Scale behavioral data. JMIR Mental Health, 5(4), Article e58. https://doi.org/10.2196/mental.9235

© Paul Matthews, Phil Topham, Praminda Caleb-Solly. Background: SAM (Self-help for Anxiety Management) is a mobile phone app that provides self-help for anxiety management. Launched in 2013, the app has achieved over one million downloads on the iOS... Read More about Interaction and engagement with an anxiety management app: Analysis using large-Scale behavioral data.

Elvelangs - Melbu Norway (2018)
Exhibition / Performance
Helps, A., Meckin, D., Williams, K., Fairweather-Hole, J., & Evans, R. Elvelangs - Melbu Norway. [Interactive installation with wax, water, oil barrels and fibre optic lighting and sound.]. Exhibited at Norway. 14 September 2018. (Unpublished)

On Hadseløya, a Norwegian island inside the Arctic circle, a series of oil drums stand on the bank of a stream, filled with water that had been winding its way downstream into Hadselfjord. Each contains a wax sculpture. With viewing goggles provided,... Read More about Elvelangs - Melbu Norway.

Return to temperament (In digital systems) (2018)
Presentation / Conference
Renney, N., Gaster, B., & Mitchell, T. (2018, September). Return to temperament (In digital systems). Paper presented at Audio Mostly, Wrexham, Wales

Considering the generation of musical tunings, it is reasonable to expect that the many constructs contained in Functional programming languages may provide useful tools for exploring both conventional and new tunings. In this paper we present a numb... Read More about Return to temperament (In digital systems).

A mixed methods approach to qualitative enquiry, focused on primary age group music workshops in a Special Educational Needs School (2018)
Presentation / Conference
Meckin, D. (2018, September). A mixed methods approach to qualitative enquiry, focused on primary age group music workshops in a Special Educational Needs School

Increasing access to musical instruments at the earliest stages of education gives learners, especially those with complex needs, a chance to produce music and express themselves sonically. Understanding the contextual aspects of where and how studen... Read More about A mixed methods approach to qualitative enquiry, focused on primary age group music workshops in a Special Educational Needs School.