On the performance of the hybridisation between migrating birds optimisation variants and differential evolution for large scale continuous problems
Voß, S., Segredo, E., Lalla-Ruiz, E., Hart, E., & Voss, S. (2018)
On the performance of the hybridisation between migrating birds optimisation variants and differential evolution for large scale continuous problems. Expert Systems with Applications, 102, 126-142. https://doi.org/10.1016/j.eswa.2018.02.024
Migrating Birds Optimisation (mbo) is a nature-inspired approach which has been shown to be very effective when solving a variety of combinatorial optimisation problems. More ...
Numerical encoding to tame SQL injection attacks
Uwagbole, S., Buchanan, W. J., & Fan, L. (2016)
Numerical encoding to tame SQL injection attacks. In 2016 IEEE/IFIP Network Operations and Management Symposium (NOMS),https://doi.org/10.1109/NOMS.2016.7502997
Recent years have seen an astronomical rise in SQL Injection Attacks (SQLIAs) used to compromise the confidentiality, authentication and integrity of organisations’ databases....
Forensics study of IMO call and chat app.
Sudozai, M., Saleem, S., Buchanan, W. J., Habib, N., & Zia, H. (2018)
Forensics study of IMO call and chat app. Digital Investigation, https://doi.org/10.1016/j.diin.2018.04.006
Smart phones often leave behind a wealth of information that can be used as an evidence during an investigation. There are thus many smart phone applications that employ encry...
Adaptation of a disability severity scale for product assessment
Clarkson, P. J., Dong, H., & Keates, S. (2003)
Adaptation of a disability severity scale for product assessment. In A. Folkeson, K. Gralen, M. Norell, & U. Sellgren (Eds.), DS 31: Proceedings of ICED 03, the 14th International Conference on Engineering Design, Stockholm: Industrial design engineering - applications and context, 659-660
An inclusively-designed product should accommodate the widest possible range of user capabilities. Consequently, it is important for designers to know about the full range of ...
A plug-in disk-Interface-process for the WSQL data access controller.
Kerridge, J., & Kukla, R. (1995)
A plug-in disk-Interface-process for the WSQL data access controller. In B. C. O'Neill (Ed.), Proceeding WoTUG '96 Proceedings of the 19th world occam and transputer user group technical meeting on Parallel processing developments, 75-88
As part of the development of a disk based storage subsystem for a database machine, a disk interface process has been designed, exploiting parallel processing features of the...
Dynamic probabilistic routing discovery and broadcast schemes for high mobility Ad-hoc networks
Bani Khalaf, M. Dynamic probabilistic routing discovery and broadcast schemes for high mobility Ad-hoc networks. (Thesis)
Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/6151
Mobile Ad-hoc Networks (MANETs) have lately come to be widely used in everyday applications. Their usability and capability have attracted the interest of both commercial orga...
Password Pattern and Vulnerability Analysis for Web and Mobile Applications
Li, S., Romdhani, I., & Buchanan, W. (2016)
Password Pattern and Vulnerability Analysis for Web and Mobile Applications. ZTE Communications, 14, 32-36. https://doi.org/10.3969/j.issn.1673-5188.2016.S0.006
Text⁃based passwords are heavily used to defense for many web and mobile applications. In this paper, we investigated the patterns and vulnerabilities for both web and mobile ...
Spatial anomaly detection in sensor networks using neighborhood information
Bosman, H. H., Iacca, G., Tejada, A., Wörtche, H. J., & Liotta, A. (2017)
Spatial anomaly detection in sensor networks using neighborhood information. Information Fusion, 33, 41-56. https://doi.org/10.1016/j.inffus.2016.04.007
The field of wireless sensor networks (WSNs), embedded systems with sensing and networking capability, has now matured after a decade-long research effort and technological ad...
Understanding the range of user capabilities
Clarkson, P., Keates, S., Dong, H., & Langdon, P. (2002)
Understanding the range of user capabilities. In Computer-Based Design: Engineering Design Conference 2002
No abstract available.
A Review of Predictive Quality of Experience Management in Video Streaming Services
Torres Vega, M., Perra, C., De Turck, F., & Liotta, A. (2018)
A Review of Predictive Quality of Experience Management in Video Streaming Services. IEEE Transactions on Broadcasting, 64(2), 432-445. https://doi.org/10.1109/tbc.2018.2822869
Satisfying the requirements of devices and users of online video streaming services is a challenging task. It requires not only managing the network quality of service but als...