Date


Output Type

Download Available

76 results

Assessing the Relative Importance of an E-learning system Usability Design Characteristics Based on Students' Preferences

Journal Article
Rutter, M. J., Smith, S., & Alshehri, A. (2019)
Assessing the Relative Importance of an E-learning system Usability Design Characteristics Based on Students' Preferences. European Journal of Educational Research, 8(3), 839-855. https://doi.org/10.12973/eu-jer.8.3.839
This study considers the interaction between an e-learning system, the Blackboard system, and the students who use it in Saudi Arabia. While previous work exists, there is lim...

Is the Zero-Wait Policy Always Optimum for Information Freshness (Peak Age) or Throughput?

Journal Article
Barakat, B., Keates, S., Wassell, I., & Arshad, K. (2019)
Is the Zero-Wait Policy Always Optimum for Information Freshness (Peak Age) or Throughput?. IEEE Communications Letters, 23(6), 987-990. https://doi.org/10.1109/LCOMM.2019.2907935
The Zero-Wait (ZW) policy is widely held to achieve maximum information 'freshness', i.e., to achieve minimum Peak Age (PA) and maximum throughput, for real-time Internet-of-T...

Deep Precomputed Radiance Transfer for Deformable Objects

Journal Article
Li, Y., Wiedemann, P., & Mitchell, K. (2019)
Deep Precomputed Radiance Transfer for Deformable Objects. Proceedings of the ACM on Computer Graphics and Interactive Techniques, 2(1), 1-16. https://doi.org/10.1145/3320284
We propose, DeepPRT, a deep convolutional neural network to compactly encapsulate the radiance transfer of a freely deformable object for rasterization in real-time. With pre...

An optimized Speculative Execution Strategy Based on Local Data Prediction in Heterogeneous Hadoop Environment

Journal Article
Jin, D., Liu, Q., Liu, X., & Linge, N. (2019)
An optimized Speculative Execution Strategy Based on Local Data Prediction in Heterogeneous Hadoop Environment. Journal of Computers, 30(3), 130-142. https://doi.org/10.3966/199115992019063003010
Hadoop is a famous parallel computing framework that is applied to process large-scale data, but there exists such a task in hadoop framework, which is called “Straggling task...

Design of Multi-View Based Email Classification for IoT Systems via Semi-Supervised Learning

Journal Article
Li, W., Meng, W., Tan, Z., & Xiang, Y. (2019)
Design of Multi-View Based Email Classification for IoT Systems via Semi-Supervised Learning. Journal of Network and Computer Applications, 128, 56-63. https://doi.org/10.1016/j.jnca.2018.12.002
Suspicious emails are one big threat for Internet of Things (IoT) security, which aim to induce users to click and then redirect them to a phishing webpage. To protect IoT sys...

Copy-move forgery detection using combined features and transitive matching

Journal Article
Lin, C., Lu, W., Huang, X., Liu, K., Sun, W., Lin, H., & Tan, Z. (2019)
Copy-move forgery detection using combined features and transitive matching. Multimedia Tools and Applications, 78(21), 30081-30096. https://doi.org/10.1007/s11042-018-6922-4
Recently, the research of Internet of Things (IoT) and Multimedia Big Data (MBD) has been growing tremendously. Both IoT and MBD have a lot of multimedia data, which can be ta...

Mitigating Disaster using Secure Threshold-Cloud Architecture

Journal Article
Ukwandu, E., Buchanan, W. J., & Russell, G. (2018)
Mitigating Disaster using Secure Threshold-Cloud Architecture. Current Trends in Computer Sciences & Applications, 1(2),
There are many risks in moving data into public cloud environments, along with an increasing threat around large-scale data leakage during cloud outages. This work aims to app...

A caching and spatial K-anonymity driven privacy enhancement scheme in continuous location-based services

Journal Article
Zhang, S., Li, X., Tan, Z., Peng, T., & Wang, G. (2019)
A caching and spatial K-anonymity driven privacy enhancement scheme in continuous location-based services. Future Generation Computer Systems, 94, 40-50. doi:10.1016/j.future.2018.10.053
With the rapid pervasion of location-based services (LBSs), protection of location privacy has become a significant concern. In most continuous LBSs' privacy-preserving soluti...

The Challenges of Investigating Cryptocurrencies and Blockchain Related Crime

Journal Article
Dyson, S., Buchanan, W., & Bell, L. (2018)
The Challenges of Investigating Cryptocurrencies and Blockchain Related Crime. The Journal of the British Blockchain Association, 1(2), 1-6. https://doi.org/10.31585/jbba-1-2-%288%292018
We increasingly live in a world where there is a balance between the rights to privacy and the requirements for consent, and the rights of society to protect itself. Within th...

Use of machine learning techniques to model wind damage to forests

Journal Article
Hart, E., Sim, K., Kamimura, K., Meredieu, C., Guyon, D., & Gardiner, B. (2019)
Use of machine learning techniques to model wind damage to forests. Agricultural and forest meteorology, 265, 16-29. https://doi.org/10.1016/j.agrformet.2018.10.022
This paper tested the ability of machine learning techniques, namely artificial neural networks and random forests, to predict the individual trees within a forest most at r...