Date


People

Download Available

Library Of Congress

Dewey Decimal

1200 results

Deep Vision in Analysis and Recognition of Radar Data: Achievements, Advancements, and Challenges

Journal Article
Liu, Q., Yang, Z., Ji, R., Zhang, Y., Bilal, M., Liu, X., …Xu, X. (2023)
Deep Vision in Analysis and Recognition of Radar Data: Achievements, Advancements, and Challenges. IEEE Systems, Man, and Cybernetics Magazine, 9(4), 4-12. https://doi.org/10.1109/msmc.2022.3216943
Radars are widely used to obtain echo information for effective prediction, such as precipitation nowcasting. In this article, recent relevant scientific investigation and pra...

Explainable AI and Deep Autoencoders Based Security Framework for IoT Network Attack Certainty (Extended Abstract)

Conference Proceeding
Sampath Kalutharage, C., Liu, X., & Chrysoulas, C. (2022)
Explainable AI and Deep Autoencoders Based Security Framework for IoT Network Attack Certainty (Extended Abstract). In Attacks and Defenses for the Internet-of-Things: 5th International Workshop, ADIoT 2022 (41-50). https://doi.org/10.1007/978-3-031-21311-3_8
Over the past few decades, Machine Learning (ML)-based intrusion detection systems (IDS) have become increasingly popular and continue to show remarkable performance in detect...

A framework for live host-based Bitcoin wallet forensics and triage

Journal Article
Holmes, A., & Buchanan, W. J. (2023)
A framework for live host-based Bitcoin wallet forensics and triage. Forensic Science International: Digital Investigation, 44, Article 301486. https://doi.org/10.1016/j.fsidi.2022.301486
Organised crime and cybercriminals use Bitcoin, a popular cryptocurrency, to launder money and move it across borders with impunity. The UK and other countries have legislatio...

A forensic analysis of streaming platforms on Android OS

Journal Article
García Murias, J., Levick, D., & Mckeown, S. (2023)
A forensic analysis of streaming platforms on Android OS. Forensic Science International: Digital Investigation, 44, Article 301485. https://doi.org/10.1016/j.fsidi.2022.301485
This work builds on existing research in streamed video reconstruction on the Android OS, which previously demonstrated that caching occurs in most cases for the Chrome and Fi...

Four-Element/Eight-Port MIMO Antenna System with Diversity and Desirable Radiation for Sub 6 GHz Modern 5G Smartphones

Journal Article
Ojaroudi Parchin, N., S.I. Amar, A., Darwish, M., H. Moussa, K., See, C. H., Abd-Alhameed, R., … Mohamed, H. G. (in press)
Four-Element/Eight-Port MIMO Antenna System with Diversity and Desirable Radiation for Sub 6 GHz Modern 5G Smartphones. IEEE Access, https://doi.org/10.1109/ACCESS.2022.3227199
In this manuscript, a multiple-input multiple-output (MIMO) antenna array system with identical compact antenna elements providing wide radiation and diversity function is int...

Accelerating neural network architecture search using multi-GPU high-performance computing

Journal Article
Lupión, M., Cruz, N. C., Sanjuan, J. F., Paechter, B., & Ortigosa, P. M. (2023)
Accelerating neural network architecture search using multi-GPU high-performance computing. Journal of Supercomputing, 79, 7609-7625. https://doi.org/10.1007/s11227-022-04960-z
Neural networks stand out from artificial intelligence because they can complete challenging tasks, such as image classification. However, designing a neural network for a par...

Automated Algorithm Selection: from Feature-Based to Feature-Free Approaches

Journal Article
Alissa, M., Sim, K., & Hart, E. (in press)
Automated Algorithm Selection: from Feature-Based to Feature-Free Approaches. Journal of Heuristics, https://doi.org/10.1007/s10732-022-09505-4
We propose a novel technique for algorithm-selection, applicable to optimisation domains in which there is implicit sequential information encapsulated in the data, e.g., in o...

Comparison of Entropy Calculation Methods for Ransomware Encrypted File Identification

Journal Article
Davies, S., Macfarlane, R., & Buchanan, W. (2022)
Comparison of Entropy Calculation Methods for Ransomware Encrypted File Identification. Entropy, 24(10), Article 1503. https://doi.org/10.3390/e24101503
Ransomware is a malicious class of software that utilises encryption to implement an attack on system availability. The target’s data remains encrypted and is held captive by ...

Detection of Signals in MC–CDMA Using a Novel Iterative Block Decision Feedback Equalizer

Journal Article
Bagadi, K., Ravikumar, C., Sathish, K., Alibakhshikenari, M., Virdee, B. S., Kouhalvandi, L., …Limiti, E. (2022)
Detection of Signals in MC–CDMA Using a Novel Iterative Block Decision Feedback Equalizer. IEEE Access, 10, 105674-105684. https://doi.org/10.1109/ACCESS.2022.3211392
This paper presents a technique to mitigate multiple access interference (MAI) in multicarrier code division multiple access (MC-CDMA) wireless communications systems. Althoug...

An Empirical Evaluation of a Novel Domain-Specific Language -- Modelling Vehicle Routing Problems with Athos

Journal Article
Hoffmann, B., Urquhart, N., Chalmers, K., & Guckert, M. (2022)
An Empirical Evaluation of a Novel Domain-Specific Language -- Modelling Vehicle Routing Problems with Athos. Empirical Software Engineering, 27, Article 180. https://doi.org/10.1007/s10664-022-10210-w
Domain-specific languages (DSLs) are a popular approach among software engineers who demand for a tailored development interface. A DSL-based approach allows to encapsulate th...