Skip to main content

Research Repository

Advanced Search

All Outputs (122)

Evolutionary computing frameworks for optimisation (2017)
Journal Article
Simons, C., & Ramirez, A. (2017). Evolutionary computing frameworks for optimisation

Evolutionary algorithms can find optimal solutions to problems. This article gives an overview of some programming frameworks available to solve optimisation problems.

Lightweight cryptography methods (2017)
Journal Article
Buchanan, W., Li, S., & Asif, R. (2017). Lightweight cryptography methods. Journal of Cyber Security Technology, 1(3-4), 187-201. https://doi.org/10.1080/23742917.2017.1384917

While our conventional cryptography methods, such for AES (encryption), SHA-256 (hashing) and RSA/Elliptic Curve (signing), work well on systems which have reasonable processing power and memory capabilities, these do not scale well into a world with... Read More about Lightweight cryptography methods.

Participatory governance in smart cities: The urbanAPI case study (2017)
Journal Article
Soomro, K., Khan, Z., & Ludlow, D. (2017). Participatory governance in smart cities: The urbanAPI case study. International Journal of Services Technology and Management, 23(5-6), 419-444. https://doi.org/10.1504/IJSTM.2017.10009859

Copyright © 2017 Inderscience Enterprises Ltd. This paper presents some results from an EU FP7 RTD project urbanAPI, in which three ICT applications target different aspects of participatory urban governance. The 3D Scenario Creator allows urban plan... Read More about Participatory governance in smart cities: The urbanAPI case study.

Affect and dialogue in collaborative cross-disciplinary research: Developing interactive public art on Cardiff Bay Barrage (2017)
Journal Article
Entwistle, A., Burrows, I., Carroll, F., Thomas, N., Ware, M., & Loudon, G. (2020). Affect and dialogue in collaborative cross-disciplinary research: Developing interactive public art on Cardiff Bay Barrage. Open Cultural Studies, 1(1), 576-590. https://doi.org/10.1515/culture-2017-0055

Where Cartesian philosophy distinguishes the perceiving and perceptual mind from the body, phenomenology constitutes the experiential/experiencing body as the subject, giving rise to the affective potential of art. An immersive world of digital conne... Read More about Affect and dialogue in collaborative cross-disciplinary research: Developing interactive public art on Cardiff Bay Barrage.

A trust-based method for mitigating cache poisoning in Name Data Networking (2017)
Journal Article
Rezaeifar, Z., Wang, J., & Oh, H. (2018). A trust-based method for mitigating cache poisoning in Name Data Networking. Journal of Network and Computer Applications, 104, 117-132. https://doi.org/10.1016/j.jnca.2017.12.013

Mitigating Cache poisoning in Name Data Networking (NDN) can significantly improve the effect of ubiquitous data caching, which is a prominent feature in NDN. However, since verification signatures cannot be practical in the network routers, finding... Read More about A trust-based method for mitigating cache poisoning in Name Data Networking.

From top-down land use planning intelligence to bottom-up stakeholder engagement for smart cities – A case study: DECUMANUS service products (2017)
Journal Article
Ludlow, D., Khan, Z., Soomro, K., Marconcini, M., José, R. S., Malcorps, P., …Metz, A. (2017). From top-down land use planning intelligence to bottom-up stakeholder engagement for smart cities – A case study: DECUMANUS service products. International Journal of Services Technology and Management, 23(5-6), 465-493. https://doi.org/10.1504/IJSTM.2017.10009861

Copyright © 2017 Inderscience Enterprises Ltd. Intelligence delivered by earth observation (EO) satellites performs a vital role in supporting ICT enabled urban governance, and the creation of decision making tools delivering integrated urban plannin... Read More about From top-down land use planning intelligence to bottom-up stakeholder engagement for smart cities – A case study: DECUMANUS service products.

Upper limb motion intent recognition using tactile sensing (2017)
Conference Proceeding
Stefanou, T., Turton, A., Lenz, A., & Dogramadzi, S. (2017). Upper limb motion intent recognition using tactile sensing. In 2017 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS) (6601-6608). https://doi.org/10.1109/IROS.2017.8206573

Focusing on upper limb rehabilitation of weak stroke patients, this pilot study explores how motion intent can be detected using force sensitive resistors (FSR). This is part of a bigger project which will see the actuation and control of an intent-d... Read More about Upper limb motion intent recognition using tactile sensing.

OntoSoS.QM.Gov: A quality governance framework for systems of systems (2017)
Presentation / Conference
Qaddoumi, E., Odeh, M., Khan, Z., Kossmann, M., Traish, I., & Tbakhi, A. (2017, December). OntoSoS.QM.Gov: A quality governance framework for systems of systems. Paper presented at Complex systems design and management conference, Paris, France

Many organisations develop Systems of systems (SoS) to accomplish their business objectives. SoS deliver new capabilities by enabling cooperation between existing constituent monolithic systems. However, domain and process heterogeneities and varying... Read More about OntoSoS.QM.Gov: A quality governance framework for systems of systems.

Data provenance tracking as the basis for a biomedical virtual research environment (2017)
Journal Article
McClatchey, R. (2018). Data provenance tracking as the basis for a biomedical virtual research environment. Proceedings of Science, 293,

In complex data analyses it is increasingly important to capture information about the usage of data sets in addition to their preservation over time to ensure reproducibility of results, to verify the work of others and to ensure appropriate conditi... Read More about Data provenance tracking as the basis for a biomedical virtual research environment.

VeidBlock: Verifiable identity using blockchain and ledger in a software defined network (2017)
Presentation / Conference
Abbasi, A. G., & Khan, Z. (2017, December). VeidBlock: Verifiable identity using blockchain and ledger in a software defined network. Paper presented at Smart City Clouds: Technologies, Systems and Applications (SCCTSA) co-located with 10th IEEE/ACM Utility and Cloud Computing (UCC), Austin, Texas

Blockchain and verifiable identities have a lot of potential in future distributed software applications e.g. smart cities. In this paper, we proposed a novel technique, namely VeidBlock, to generate verifiable identities by following a reliable auth... Read More about VeidBlock: Verifiable identity using blockchain and ledger in a software defined network.

Negation of ransomware via gamification and enforcement of standards (2017)
Conference Proceeding
Dion, Y. L., Joshua, A. A., & Brohi, S. N. (2017). Negation of ransomware via gamification and enforcement of standards. In CSAI 2017: Proceedings of the 2017 International Conference on Computer Science and Artificial Intelligence (203-208). https://doi.org/10.1145/3168390.3168399

With the continued advancement of the internet and relevant programs, the number of exploitable loopholes in security systems increases. One such exploit that is plaguing the software scene is ransomware, a type of malware that weaves its way through... Read More about Negation of ransomware via gamification and enforcement of standards.

An integrated real-time simulated ethical hacking toolkit with interactive gamification capabilities and cyber security educational platform (2017)
Conference Proceeding
Mathoosoothenen, V. N., Sundaram, J. S., Palanichamy, R. A., & Brohi, S. N. (2017). An integrated real-time simulated ethical hacking toolkit with interactive gamification capabilities and cyber security educational platform. . https://doi.org/10.1145/3168390.3168397

There has been an alarming rise in the number of cyber crimes occurring lately and stealthier methodologies used by attackers, which has directly contributed to the rise of online victims. With the development of advanced persistent threats, current... Read More about An integrated real-time simulated ethical hacking toolkit with interactive gamification capabilities and cyber security educational platform.

A conceptual security approach with awareness strategy and implementation policy to eliminate ransomware (2017)
Conference Proceeding
Han, J. W., Hoe, O. J., Wing, J. S., & Brohi, S. (2017). A conceptual security approach with awareness strategy and implementation policy to eliminate ransomware. In CSAI 2017: Proceedings of the 2017 International Conference on Computer Science and Artificial Intelligence (222-226). https://doi.org/10.1145/3168390.3168398

Undeterred by numerous efforts deployed by antivirus software that shields users from various security threats, ransomware is constantly evolving as technology advances. The impact includes hackers hindering the user’s accessibility to their data, an... Read More about A conceptual security approach with awareness strategy and implementation policy to eliminate ransomware.

Liquid marble interaction gate for collision-based computing (2017)
Journal Article
Draper, T., Fullarton, C., Phillips, N., de Lacy Costello, B., & Adamatzky, A. (2017). Liquid marble interaction gate for collision-based computing. Materials Today, 20(10), 561-568. https://doi.org/10.1016/j.mattod.2017.09.004

© 2017 Elsevier Ltd Liquid marbles are microliter droplets of liquid, encapsulated by self-organized hydrophobic particles at the liquid/air interface. They offer an efficient approach for manipulating liquid droplets and compartmentalizing reactions... Read More about Liquid marble interaction gate for collision-based computing.

Chair’s welcome: SCCTSA workshop (2017)
Conference Proceeding
Khan, Z. (2017). Chair’s welcome: SCCTSA workshop. In UCC '17 Companion: Companion Proceedings of the 10th International Conference on Utility and Cloud Computing. , (163–164). https://doi.org/10.1145/3147234.3148605

Welcome note for the 4th International workshop - Smart City Clouds: Technologies Systems and Applications co-located with 10 IEEE/ACM Utility and Cloud Computing Conference, Austin, Texas, USA, 5-8 December 2017.

PROTECT: Container process isolation using system call interception (2017)
Conference Proceeding
Win, T. Y., Tso, F. P., Mair, Q., & Tianfield, H. (in press). PROTECT: Container process isolation using system call interception. In 2017 14th International Symposium on Pervasive Systems, Algorithms and Networks \& 2017 11th International Conference on Frontier of Computer Science and Technology \& 2017 Third International Symposium of Creative Computing (ISPAN-FCST-ISCC). , (191-196). https://doi.org/10.1109/ISPAN-FCST-ISCC.2017.24

Virtualization is the underpinning technology enabling cloud computing service provisioning, and container-based virtualization provides an efficient sharing of the underlying host kernel libraries amongst multiple guests. While there has been resear... Read More about PROTECT: Container process isolation using system call interception.

Bee swarm optimization for solving the MAXSAT problem using prior knowledge (2017)
Journal Article
Djenouri, Y., Habbas, Z., Djenouri, D., & Fournier-Viger, P. (2019). Bee swarm optimization for solving the MAXSAT problem using prior knowledge. Soft Computing, 23(9), 3095-3112. https://doi.org/10.1007/s00500-017-2956-1

This paper explores rule decomposition for solving the MAXSAT problem. Four approaches are proposed to steer a bee swarm optimization metaheuristic. Two decomposition methods are proposed: direct and indirect. The first one applies the Kmeans algorit... Read More about Bee swarm optimization for solving the MAXSAT problem using prior knowledge.

E-voting vs. e-trust: A test bed for e-democracy in a world in crisis? (2017)
Journal Article
Shat, F., & Pimenidis, E. (2017). E-voting vs. e-trust: A test bed for e-democracy in a world in crisis?. International Journal of Electronic Governance, 9(3/4), 229-245. https://doi.org/10.1504/IJEG.2017.10006254

The world is currently experiencing a number of real challenges in the face of persistent economic crisis, local conflicts and huge waves of refugees. All of the above are affecting secure access to, completion of peoples’voting rights and participat... Read More about E-voting vs. e-trust: A test bed for e-democracy in a world in crisis?.

Smart Cross-Border e-Gov Systems: An application to refugee mobility (2017)
Journal Article
Sideridis, A., Protopappas, L., Tsiafoulis, S., & Pimenidis, E. (2017). Smart Cross-Border e-Gov Systems: An application to refugee mobility. International Journal of Electronic Governance, 9(3/4), 246-266. https://doi.org/10.1504/IJEG.2017.10006256

Smart Cross-Border e-Government Systems for citizens and business have been recently proposed to further improve everyday lives, expand business fron-tiers, and facilitate the movement of citizens by reducing the constraints imposed by existing borde... Read More about Smart Cross-Border e-Gov Systems: An application to refugee mobility.