Seamless Cryptographic Key Generation via Off-the-Shelf Telecommunication Components for End-to-End Data Encryption
Conference Proceeding
Asif, R., & Buchanan, W. J. (2017)
Seamless Cryptographic Key Generation via Off-the-Shelf Telecommunication Components for End-to-End Data Encryption. In International Conference on Internet of Things (iThings-2017)https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2017.140
Quantum key distribution (QKD) systems have already attained much attention for providing end-to-end data encryption to the subscribers. However, it is very important that the...
Commonsense-enhanced Natural Language Generation for Human-Robot Interaction
Conference Proceeding
Gkatzia, D. (in press)
Commonsense-enhanced Natural Language Generation for Human-Robot Interaction
Commonsense is vital for human communication, as it allows us to make inferences without explicitly mentioning the context. Equipping robots with commonsense knowledge would l...
Mobility Aware Duty Cycling Algorithm (MADCAL) in Wireless Sensor Network with Mobile Sink Node
Conference Proceeding
Thomson, C., Wadhaj, I., Tan, Z., & Al-Dubai, A. (2019)
Mobility Aware Duty Cycling Algorithm (MADCAL) in Wireless Sensor Network with Mobile Sink Node. In 2019 IEEE International Conference on Smart Internet of Things (SmartIoT). https://doi.org/10.1109/SmartIoT.2019.00037
In Wireless Sensor Networks (WSNs) the use of Mobile Sink Nodes (MSNs) has been proposed in order to negate the ”hotspot” issue. This where nodes closest to the sink node shal...
Comparing Multi-label Classification with Reinforcement Learning for Summarisation of Time-series Data
Conference Proceeding
Gkatzia, D., Hastie, H., & Lemon, O. (2014)
Comparing Multi-label Classification with Reinforcement Learning for Summarisation of Time-series Data. In Proceedings of the Conference Volume 1: Long Papers. , (1231-1240). https://doi.org/10.3115/v1/p14-1116
We present a novel approach for automatic report generation from time-series data, in the context of student feedback generation. Our proposed methodology treats content selec...
A software tool for evaluating navigation
Conference Proceeding
McCall, R., & Benyon, D. (1997)
A software tool for evaluating navigation. In J. May, J. Siddiqui, & J. Wilkinson (Eds.), HCI’98 Conference Companion, 72-73
Traditional methods of evaluating the usability of software systems largely ignore the problem of navigation within computer based environments. In contrast the 'Navigation of...
Security, privacy and safety evaluation of dynamic and static fleets of drones
Conference Proceeding
Akram, R. N., Markantonakis, K., Mayes, K., Habachi, O., Sauveron, D., Steyven, A., & Chaumette, S. (2017)
Security, privacy and safety evaluation of dynamic and static fleets of drones. In 2017 IEEE/AIAA 36th Digital Avionics Systems Conference (DASC),https://doi.org/10.1109/dasc.2017.8101984
Interconnected everyday objects, either via public or private networks, are gradually becoming reality in modern life -- often referred to as the Internet of Things (IoT) or C...
EniSpace: Evaluating Navigation in Information Space
Conference Proceeding
McCall, R., & Benyon, D. (1998)
EniSpace: Evaluating Navigation in Information Space. In P. De Bra, & J. J. Leggett (Eds.), Proceedings of WebNet World Conference on the WWW and Internet 1999, 1344-1345
Traditional methods of evaluating usability such as heuristic evaluation and cognitive walkthrough do not address all issues relating to navigation. This is despite the fact t...
From the Virtual to the RealWorld: Referring to Objects in Real-World Spatial Scenes
Conference Proceeding
Gkatzia, D., Rieser, V., Bartie, P., & Mackaness, W. (2015)
From the Virtual to the RealWorld: Referring to Objects in Real-World Spatial Scenes. In Proceedings of the 2015 Conference on Empirical Methods in Natural Language Processing, 1936-1942. https://doi.org/10.18653/v1/d15-1224
Predicting the success of referring expressions (RE) is vital for real world applications such as navigation systems. Traditionally, research has focused on studying Referring...
Performance Investigation of RPL Routing in Pipeline Monitoring WSNs
Conference Proceeding
Wadhaj, I., Gharebi, W., Al-Dubai, A., & Thomson, C. (2018)
Performance Investigation of RPL Routing in Pipeline Monitoring WSNs. In 20th {IEEE} International Conference on High Performance Computing and Communications; 16th {IEEE} International Conference on Smart City; 4th {IEEE} International Conference on Data Science and Systems, HPCC/SmartCity/DSS 2018https://doi.org/10.1109/HPCC/SmartCity/DSS.2018.00178
The adoption of WSN and IEEE 802.15.4 standard for the linear WSN networks were assumed. The interconnection of WSNs with the Internet is possible by assigning IPv6 addresses ...
Performance evaluation of RPL metrics in environments with strained transmission ranges.
Conference Proceeding
Thomson, C., Wadhaj, I., Romdhani, I., & Al-Dubai, A. (2017)
Performance evaluation of RPL metrics in environments with strained transmission ranges. In 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA). https://doi.org/10.1109/aiccsa.2016.7945687
An examination of existing studies in the area of Routing Protocol for Low-Power and Lossy Networks (RPL) implementation in wireless sensor networks (WSNs) reveals a consisten...