Research explorer tool

Date


People

Download Available

Dewey Decimal

901 results

Recognize contextual situation in pervasive environments using process mining techniques

Journal Article
Jaroucheh, Z., Liu, X., & Smith, S. (2011)
Recognize contextual situation in pervasive environments using process mining techniques. Journal of Ambient Intelligence and Humanized Computing, 2(1), 53-69. https://doi.org/10.1007/s12652-010-0038-7
Research in pervasive computing and ambience intelligence aims to enable users to interact with the environment in a context-aware way. To achieve this, a complex set of featu...

A Cognitive IoE (Internet of Everything) Approach to Ambient-Intelligent Smart Space

Thesis
Singh Jamnal, G. A Cognitive IoE (Internet of Everything) Approach to Ambient-Intelligent Smart Space. (Thesis)
Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/Output/2090321
At present, the United Nations figures claim that the current world population would rise from 7.6 billion to 8.5 billion in 2030 and 9.7 billion in 2050. Therefore by the 205...

MRC4: A Modified RC4 Algorithm using Symmetric Random Function Generator for Improved Cryptographic Features

Journal Article
Saha, R., Geetha, G., Kumar, G., Kim, T., & Buchanan, W. J. (2019)
MRC4: A Modified RC4 Algorithm using Symmetric Random Function Generator for Improved Cryptographic Features. IEEE Access, 7, 172045-172054. https://doi.org/10.1109/access.2019.2956160
The Rivest Cipher 4 (RC4) has been one of the most popular stream ciphers for providing symmetric key encryption, and is now proposed as an efficient cipher within light-weigh...

A Quality of Service-Aware Secured Communication Scheme for Internet of Things-Based Networks

Journal Article
Khan, F., Ur Rehman, A., Yahya, A., Jan, M. A., Chuma, J., Tan, Z., & Hussain, K. (2019)
A Quality of Service-Aware Secured Communication Scheme for Internet of Things-Based Networks. Sensors, 19, https://doi.org/10.3390/s19194321
The Internet of Things (IoT) is an emerging technology that aims to enable the interconnection of a large number of smart devices and heterogeneous networks. Ad hoc networks p...

PIR sensor array for hand motion recognition

Presentation / Conference
Wojtczuk, P., Armitage, A., Binnie, D., & Chamberlain, T. (2011, August)
PIR sensor array for hand motion recognition. Paper presented at SensorDevices 2011, Nice, France
Abstract—In this paper we present our work towards a hand gesture recognition system realised with a passive thermal infrared sensor array. In contrast with the majority of re...

Inside the Palimpsest: A Study of Newsroom Information Gathering.

Thesis
Macaulay, C. Gathering. (Thesis)
Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/7241
The methodologies of systems design, rooted in engineering and in cognitivist conceptions of human action, have been stretched to the limit by the complexity of uses to which ...

Investigations into Decrypting Live Secure Traffic in Virtual Environments

Thesis
McLaren, P. W. L. Investigations into Decrypting Live Secure Traffic in Virtual Environments. (Thesis)
Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/Output/2386517
Malicious agents increasingly use encrypted tunnels to communicate with external servers. Communications may contain ransomware keys, stolen banking details, or other confiden...

Converting an existing taxonomic data resource to employ an ontology and LSIDs.

Conference Proceeding
Kennedy, J., Gales, R., & Kukla, R. (2006)
Converting an existing taxonomic data resource to employ an ontology and LSIDs. In L. Belbin, A. Rissoné, & A. Weitzman (Eds.), Proceedings of TDWG (2006), St Louis, MI
Data sharing is fundamental to biodiversity and taxonomic data applications, however previous attempts at developing mechanisms to facilitate sharing within the community have...

Lightweight cryptography methods

Journal Article
Buchanan, W. J., Li, S., & Asif, R. (2018)
Lightweight cryptography methods. Journal of Cyber Security Technology, 1(3-4), 187-201. https://doi.org/10.1080/23742917.2017.1384917
While our conventional cryptography methods, such for AES (encryption), SHA-256 (hashing) and RSA/Elliptic Curve (signing), work well on systems which have reasonable processi...

Protecting mobile agents from external replay attacks

Journal Article
Garrigues, C., Migas, N., Buchanan, W., Robles, S., & Borrell, J. (2009)
Protecting mobile agents from external replay attacks. Journal of Systems and Software, 82(2), 197-206. https://doi.org/10.1016/j.jss.2008.05.018
This paper presents a protocol for the protection of mobile agents against external replay attacks. This kind of attacks are performed by malicious platforms when dispatching ...