Date


People

Download Available

Dewey Decimal

901 results

MVICS: a repository and search tool towards holistic semantic-based precise component selection.

Journal Article
Liu, X., & Li, C. (2013)
MVICS: a repository and search tool towards holistic semantic-based precise component selection. International journal of computers & technology, 5, 144-157
Driven by the continuous expansions of software applications and the increases in component varieties and sizes, the so-called component mismatch problem has become a more sev...

Jabber-based cross-domain efficient and privacy-ensuring context management framework.

Journal Article
Jaroucheh, Z., Liu, X., & Smith, S. (2013)
Jabber-based cross-domain efficient and privacy-ensuring context management framework. International Journal of Advanced Computer Science and Applications, 4, 84
In pervasive environments, context-aware applications require a global knowledge of the context information distributed in different spatial domains in order to establish cont...

Distributed and compressed MIKEY mode to secure end-to-end communications in the Internet of things.

Conference Proceeding
Abdmeziem, R., Tandjaoui, D., & Romdhani, I. (2016)
Distributed and compressed MIKEY mode to secure end-to-end communications in the Internet of things
Multimedia Internet KEYing protocol (MIKEY) aims at establishing secure credentials between two communicating entities. However, existing MIKEY modes fail to meet the requirem...

An agent based Bayesian forecasting model for enhanced network security.

Conference Proceeding
Pikoulas, J., Buchanan, W. J., Mannion, M., & Triantafyllopoulos, K. (2001)
An agent based Bayesian forecasting model for enhanced network security. In Proceedings. Eighth Annual IEEE International Conference and Workshop On the Engineering of Computer-Based Systems-ECBS 2001. , (247-254). https://doi.org/10.1109/ECBS.2001.922429
Security has become a major issue in many organisations, but most systems still rely on operating systems, and a user ID and password system to provide user authentication and...

Revisiting the Central and Peripheral Immune System

Conference Proceeding
McEwan, C., Hart, E., & Paechter, B. (2006)
Revisiting the Central and Peripheral Immune System. In Artificial Immune Systems. ICARIS 2007, 240-251. doi:10.1007/978-3-540-73922-7_21
The idiotypic network has a long and chequered history in both theoretical immunology and Artificial Immune Systems. In terms of the latter, the drive for engineering applicat...

Recognize contextual situation in pervasive environments using process mining techniques

Journal Article
Jaroucheh, Z., Liu, X., & Smith, S. (2011)
Recognize contextual situation in pervasive environments using process mining techniques. Journal of Ambient Intelligence and Humanized Computing, 2(1), 53-69. https://doi.org/10.1007/s12652-010-0038-7
Research in pervasive computing and ambience intelligence aims to enable users to interact with the environment in a context-aware way. To achieve this, a complex set of featu...

A Cognitive IoE (Internet of Everything) Approach to Ambient-Intelligent Smart Space

Thesis
Singh Jamnal, G. A Cognitive IoE (Internet of Everything) Approach to Ambient-Intelligent Smart Space. (Thesis)
Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/Output/2090321
At present, the United Nations figures claim that the current world population would rise from 7.6 billion to 8.5 billion in 2030 and 9.7 billion in 2050. Therefore by the 205...

MRC4: A Modified RC4 Algorithm using Symmetric Random Function Generator for Improved Cryptographic Features

Journal Article
Saha, R., Geetha, G., Kumar, G., Kim, T., & Buchanan, W. J. (2019)
MRC4: A Modified RC4 Algorithm using Symmetric Random Function Generator for Improved Cryptographic Features. IEEE Access, 7, 172045-172054. https://doi.org/10.1109/access.2019.2956160
The Rivest Cipher 4 (RC4) has been one of the most popular stream ciphers for providing symmetric key encryption, and is now proposed as an efficient cipher within light-weigh...

A Quality of Service-Aware Secured Communication Scheme for Internet of Things-Based Networks

Journal Article
Khan, F., Ur Rehman, A., Yahya, A., Jan, M. A., Chuma, J., Tan, Z., & Hussain, K. (2019)
A Quality of Service-Aware Secured Communication Scheme for Internet of Things-Based Networks. Sensors, 19, https://doi.org/10.3390/s19194321
The Internet of Things (IoT) is an emerging technology that aims to enable the interconnection of a large number of smart devices and heterogeneous networks. Ad hoc networks p...

PIR sensor array for hand motion recognition

Presentation / Conference
Wojtczuk, P., Armitage, A., Binnie, D., & Chamberlain, T. (2011, August)
PIR sensor array for hand motion recognition. Paper presented at SensorDevices 2011, Nice, France
Abstract—In this paper we present our work towards a hand gesture recognition system realised with a passive thermal infrared sensor array. In contrast with the majority of re...