Date


People

Download Available

Dewey Decimal

1412 results

Real-Time Data Analytics in Support of Network Resource Management Protocols

Conference Proceeding
Moradpoor‫, N., Parr, G., Mcclean, S., Scotney, B., & Owusu, G. (2009)
Real-Time Data Analytics in Support of Network Resource Management Protocols. In Proceedings of 10th PGNET
Communications Networks Resource Management (RM) functions such as dynamic and static resource usage monitoring, real time resource reservation as well as advance resource res...

Secure speech communication algorithm via DCT and TD-ERCS chaotic map

Conference Proceeding
Habib, Z., Khan, J. S., Ahmad, J., Khan, M. A., & Khan, F. A. (2017)
Secure speech communication algorithm via DCT and TD-ERCS chaotic map. In 2017 4th International Conference on Electrical and Electronic Engineering (ICEEE)https://doi.org/10.1109/iceee2.2017.7935827
Secure communication has always been a demanding area in civil, commercial and particularly in military set up. Robust and time-tested efficient algorithms are needed to have ...

Towards the wireless ward: evaluating a trial of networked PDAs in the National Health Service.

Book Chapter
Turner, P., Milne, G., Turner, S., Kubitscheck, M., & Penman, I. (2004)
Towards the wireless ward: evaluating a trial of networked PDAs in the National Health Service. In Mobile and Ubiquitous Information AccessSpringer-Verlag. https://doi.org/10.1007/978-3-540-24641-1_15
In this paper, we describe a pilot study of the clinical use of a wireless network of personal digital assistants (PDAs). We describe how we are dealing with the concerns of t...

How the love of one teenager brought Tweetdeck to its knees.

Other
Buchanan, W. J. (2014)
How the love of one teenager brought Tweetdeck to its knees
TweetDeck, a Twitter app with millions of users, is back online after a rather surprising security scare. For several hours, the service was taken down all because a 19-year-o...

A Learning-based Neural Network Model for the Detection and Classification of SQL Injection Attacks

Journal Article
Sheykhkanloo, N. M. (2017)
A Learning-based Neural Network Model for the Detection and Classification of SQL Injection Attacks. International Journal of Cyber Warfare and Terrorism, 7(2), 16-41. https://doi.org/10.4018/ijcwt.2017040102
Structured Query Language injection (SQLi) attack is a code injection technique where hackers inject SQL commands into a database via a vulnerable web application. Injected SQ...

A critical analysis of e-government evaluation models at national and local municipal levels

Journal Article
Zahran, D. I., Al-Nuaim, H. A., Rutter, M. J., & Benyon, D. (2015)
A critical analysis of e-government evaluation models at national and local municipal levels. Electronic Journal of e-Government, 13, 28-42
The importance of e-government models lies in their offering a basis to measure and guide e-government. There is still no agreement on how to assess a government online. Most ...

Achieving Consensus within SSM.

Journal Article
Berg, T., Pooley, R., & Queenan, J. (2011)
Achieving Consensus within SSM. International journal of humanities and social science, 1, 231-239
SSM is a socio-technical system methodology offering tools for analysing complex situations. This modelling approach identifies differing worldviews of the system by encouragi...

Dependency-based semantic parsing for concept-level text analysis

Conference Proceeding
Poria, S., Agarwal, B., Gelbukh, A., Hussain, A., & Howard, N. (2014)
Dependency-based semantic parsing for concept-level text analysis. In Computational Linguistics and Intelligent Text Processing: 15th International Conference, CICLing 2014, Kathmandu, Nepal, April 6-12, 2014, Proceedings, Part I. , (113-127). https://doi.org/10.1007/978-3-642-54906-9_10
Concept-level text analysis is superior to word-level analysis as it preserves the semantics associated with multi-word expressions. It offers a better understanding of text a...

Nonlinear speech processing: Overview and applications

Journal Article
Faúndez-Zanuy, M., McLaughlin, S., Esposito, A., Hussain, A., Schoentgen, J., Kubin, G., …Maragos, P. (2002)
Nonlinear speech processing: Overview and applications. Control and Intelligent Systems, 30, 1-10
This article presents an overview of various nonlinear processing techniques applied to speech signals. Evidence relating to the existence of nonlinearities in speech is prese...

Cross-Layer Multipath Multichannel MAC protocol for MANETs

Conference Proceeding
Mirza, N., Taylor, H., Abdelshafy, M., King, P., Romdhani, I., & Alghamdi, A. (2018)
Cross-Layer Multipath Multichannel MAC protocol for MANETs. In Proceedings of the International Symposium on Networks, Computers and Communications (ISNCC)https://doi.org/10.1109/ISNCC.2018.8530886
Utilising multiple disjoint paths in multiple channels can improve network performance by enabling a node to reroute data along discovered paths seamlessly when link failure i...