Skip to main content

Research Repository

Advanced Search

All Outputs (55)

On half-adders based on fusion of signal carriers: Excitation, fluidics, and electricity (2016)
Journal Article
Adamatzky, A. (2016). On half-adders based on fusion of signal carriers: Excitation, fluidics, and electricity. Complex Systems -Champaign-, 25(3),

Likely outcomes of a collision between two objects are annihilation, reflection or fusion. We show how to construct a one-bit adder with pattern that fuse on impact. A fusion gate has two inputs and three outputs. When a signal is generated on a si... Read More about On half-adders based on fusion of signal carriers: Excitation, fluidics, and electricity.

On emulation of flueric devices in excitable chemical medium (2016)
Journal Article
Adamatzky, A. (2016). On emulation of flueric devices in excitable chemical medium. PLoS ONE, 11(12), Article e0168267. https://doi.org/10.1371/journal.pone.0168267

Flueric devices are fluidic devices without moving parts. Fluidic devices use fluid as a medium for information transfer and computation. A Belousov-Zhabotinsky (BZ) medium is a thin-layer spatially extended excitable chemical medium which exhibits t... Read More about On emulation of flueric devices in excitable chemical medium.

Identifying and analyzing the transient and permanent barriers for big data (2016)
Journal Article
Brohi, S. N., Bamiah, M., & Nawaz Brohi, M. N. (2016). Identifying and analyzing the transient and permanent barriers for big data. Journal of Engineering Science and Technology, 11(12), 1793-1807

Auspiciously, big data analytics had made it possible to generate value from immense amounts of raw data. Organizations are able to seek incredible insights which assist them in effective decision making and providing quality of service by establishi... Read More about Identifying and analyzing the transient and permanent barriers for big data.

OntoSoS.CM: A business process architecture driven and semantically enriched change management framework for systems of systems engineering (2016)
Journal Article
Samhan, A., Odeh, M., Sa, J., & Mario, K. (2016). OntoSoS.CM: A business process architecture driven and semantically enriched change management framework for systems of systems engineering

Abstract— The emergence of Systems of Systems (SoS)arrangements, with their high level of complexity, mainly due to the different characteristics of the individual systems and their integration into the respective SoS, has brought about new challenge... Read More about OntoSoS.CM: A business process architecture driven and semantically enriched change management framework for systems of systems engineering.

Privacy-preserving collaborative recommendations based on random perturbations (2016)
Journal Article
Polatidis, N., Georgiadis, C. K., Pimenidis, E., & Mouratidis, H. (2017). Privacy-preserving collaborative recommendations based on random perturbations. Expert Systems with Applications, 71, 18-25. https://doi.org/10.1016/j.eswa.2016.11.018

© 2016 Elsevier Ltd Collaborative recommender systems offer a solution to the information overload problem found in online environments such as e-commerce. The use of collaborative filtering, the most widely used recommendation method, gives rise to... Read More about Privacy-preserving collaborative recommendations based on random perturbations.

Network Resiliency and big data applications (2016)
Journal Article
Sattar, K., Salman, M., Malik, M. H., & Khan, H. (2016). Network Resiliency and big data applications. Communications and Network, 14(11), 222-225

Today we are living in the digital world. There is a vast amount of data everywhere and it is increasing every day. Big data is simply large amount of data. The network is used to transfer data from one place to another. But when we are talking about... Read More about Network Resiliency and big data applications.

Architecture for grid computing (2016)
Journal Article
Hasnain, M., Malik, M. H., Raoof, A., Ullah, S., & Dad Javed, A. (2016). Architecture for grid computing. Communications and Network, 14(11), 84-90

Grid computing is a technology about the sharing of distributed resources and integration system at a large scale. Grid computing is the mainstream technology for the resource sharing and system at the large-scale. Grid computing is specially made fo... Read More about Architecture for grid computing.

Visual analytics for non-expert users in cyber situation awareness (2016)
Journal Article
Legg, P. (2016). Visual analytics for non-expert users in cyber situation awareness. https://doi.org/10.22619/IJCSA

Situation awareness is often described as the perception and comprehension of the current situation, and the projection of future status. Whilst this may be well understood in an organisational cybersecurity context, there is a strong case to be made... Read More about Visual analytics for non-expert users in cyber situation awareness.

Data literacy conceptions, community capabilities (2016)
Journal Article
Matthews, P. (2016). Data literacy conceptions, community capabilities. Journal of Community Informatics, 12(3),

To delineate and describe the data literacy concept, a core set of data competencies are identified, and a further four varieties – each with a different focus of attention – are described. These are named research (an academic focus), classroom (a s... Read More about Data literacy conceptions, community capabilities.

Congestion control in wireless sensor network (2016)
Journal Article
Malik, M. H., Raza, S., Akram, K., Rehman, A., Khan, J., & Rafi, M. A. (2016). Congestion control in wireless sensor network. Communications and Network, 14(10),

Wireless sensor network also known as (WSN) is a broad research area with a lot of issues and challenges. With the passage of time, a lot of issues have been resolved, but there are still many awaiting. In WSN, there are different nodes connected to... Read More about Congestion control in wireless sensor network.

Performance analysis of IEEE 802.11a and IEEE 802.11g under Bursty traffic (2016)
Journal Article
Hussain Malik, M., Raza, S., Ilias Talukder, A. B. M., & Rafi, M. A. (2016). Performance analysis of IEEE 802.11a and IEEE 802.11g under Bursty traffic. Communications and Network, 14(10),

Technology from the end of last millennium, has been shifting with an unprecedented velocity scaling human anxiety down; communication technology, perhaps demonstrated the highest. Within the frontier of such profundities, reclines a key concern; Qua... Read More about Performance analysis of IEEE 802.11a and IEEE 802.11g under Bursty traffic.

Efficient on-demand multi-node charging techniques for wireless sensor networks (2016)
Journal Article
Khelladi, L., Djenouri, D., Rossi, M., & Badache, N. (2017). Efficient on-demand multi-node charging techniques for wireless sensor networks. Computer Communications, 101, 44-56. https://doi.org/10.1016/j.comcom.2016.10.005

This paper deals with wireless charging in sensor networks and explores efficient policies to perform simultaneous multi-node power transfer through a mobile charger (MC).The proposed solution, called On-demand Multi-node Charging (OMC), features an... Read More about Efficient on-demand multi-node charging techniques for wireless sensor networks.

MAC protocols with wake-up radio for wireless sensor networks: A review (2016)
Journal Article
Djiroun, F. Z., & Djenouri, D. (2017). MAC protocols with wake-up radio for wireless sensor networks: A review. Communications Surveys and Tutorials, IEEE Communications Society, 19(1), 587-618. https://doi.org/10.1109/COMST.2016.2612644

The use of a low-power wake-up radio in wireless sensor networks is considered in this paper, where relevant medium access control solutions are studied. A variety of asynchronous wake-up MAC protocols have been proposed in the literature, which take... Read More about MAC protocols with wake-up radio for wireless sensor networks: A review.

Adaptation of hybrid FSO/RF communication system using puncturing technique (2016)
Journal Article
Khan, M. N., Jamil, M., & Malik, M. H. (2016). Adaptation of hybrid FSO/RF communication system using puncturing technique. Radioengineering, 25(4), 644-651. https://doi.org/10.13164/re.2016.0644

Spectrum of radio frequency (RF) communications is limited and expensive to install new applications. Free space optical (FSO) communication is a viable technology which offers enormous bandwidth, license free installation, inexpensive deployment and... Read More about Adaptation of hybrid FSO/RF communication system using puncturing technique.

Mixing tone mapping operators on the GPU by differential zone mapping based on psychophysical experiments (2016)
Journal Article
Banterle, F., Artusi, A., Sikudova, E., Ledda, P., Bashford-Rogers, T., Chalmers, A., & Bloj, M. (2016). Mixing tone mapping operators on the GPU by differential zone mapping based on psychophysical experiments. Signal Processing: Image Communication, 48, 50-62. https://doi.org/10.1016/j.image.2016.09.004

© 2016 In this paper, we present a new technique for displaying High Dynamic Range (HDR) images on Low Dynamic Range (LDR) displays in an efficient way on the GPU. The described process has three stages. First, the input image is segmented into lumin... Read More about Mixing tone mapping operators on the GPU by differential zone mapping based on psychophysical experiments.

Design and analysis of second order passive filters for grid connected inverter with series and parallel damping resistors (2016)
Journal Article
Jamil, M., Waqas, A., Nawaz, A., Ali, M., & Mailk, M. H. (2016). Design and analysis of second order passive filters for grid connected inverter with series and parallel damping resistors. Indian Journal of Science and Technology, 9(21), 1-5. https://doi.org/10.17485/ijst/2016/v9i21/94818

Background/Objectives: Grid connected inverters are widely used to integrate renewable sources into the grid. The suitable power quality is required which can be either achieved using active or passive filters. This paper focuses on second order pass... Read More about Design and analysis of second order passive filters for grid connected inverter with series and parallel damping resistors.

Analysis of security issues in wireless charging of electric vehicles on the move (2016)
Journal Article
Rezaeifar, Z., & Oh, H. (2016). Analysis of security issues in wireless charging of electric vehicles on the move. Journal of the Korea Institute of Information Security & Cryptology, 26(4), 941-951. https://doi.org/10.13089/JKIISC.2016.26.4.941

Limitation of fossil energy from one side and the efficiency of the electrical engine from another side motivate the industrials to encourage people for utilizing electric vehicles (EVs). To decrease the cost of EVs, the size of battery should be red... Read More about Analysis of security issues in wireless charging of electric vehicles on the move.

A new privacy aware payment scheme for wireless charging of electric vehicles (2016)
Journal Article
Rezaeifar, Z., Hussain, R., Kim, S., & Oh, H. (2017). A new privacy aware payment scheme for wireless charging of electric vehicles. Wireless Personal Communications, 92(3), 1011-1028. https://doi.org/10.1007/s11277-016-3589-x

Electric vehicles (EVs) can be considered as a revolution in the combustion industry with significant improvement in fuel utilization and decrease in pollution compared to combustion engines. However, by decreasing the size of the battery to reduce t... Read More about A new privacy aware payment scheme for wireless charging of electric vehicles.

Context-dependent combination of sensor information in Dempster–Shafer theory for BDI (2016)
Journal Article
Calderwood, S., McAreavey, K., Liu, W., & Hong, J. (2017). Context-dependent combination of sensor information in Dempster–Shafer theory for BDI. Knowledge and Information Systems, 51(1), 259-285. https://doi.org/10.1007/s10115-016-0978-0

© 2016, The Author(s). There has been much interest in the belief–desire–intention (BDI) agent-based model for developing scalable intelligent systems, e.g. using the AgentSpeak framework. However, reasoning from sensor information in these large-sca... Read More about Context-dependent combination of sensor information in Dempster–Shafer theory for BDI.

Formal modelling of TCP congestion control mechanisms ECN/RED and SAP-LAW in the presence of UDP traffic (2016)
Journal Article
Malik, M. H., Jamil, M., Khan, M. N., & Malik, M. H. (2016). Formal modelling of TCP congestion control mechanisms ECN/RED and SAP-LAW in the presence of UDP traffic. EURASIP Journal on Wireless Communications and Networking, 2016(1), https://doi.org/10.1186/s13638-016-0646-9

Congestion avoidance mechanisms are used to prevent the saturation of the gateway which represents a bottleneck of the system. Recently, a new method for the congestion avoidance has been proposed: the smart access point with limited advertised windo... Read More about Formal modelling of TCP congestion control mechanisms ECN/RED and SAP-LAW in the presence of UDP traffic.