FRCA: A Novel Flexible Routing Computing Approach for Wireless Sensor Networks
Journal Article
Liu, P., Wang, X., Hawbani, A., Busaileh, O., Zhao, L., & Al-Dubai, A. (2020)
FRCA: A Novel Flexible Routing Computing Approach for Wireless Sensor Networks. IEEE Transactions on Mobile Computing, 19(11), 2623-2639. https://doi.org/10.1109/tmc.2019.2928805
In wireless sensor networks, routing protocols with immutable network policies lacking the flexibility are generally incapable of maintaining desired performance due to the co...
A Transcriptomic Appreciation of Childhood Meningococcal and Polymicrobial Sepsis from a Pro-Inflammatory and Trajectorial Perspective, a Role for Vascular Endothelial Growth Factor A and B Modulation?
Journal Article
Rashid, A., Brusletto, B. S., Al-Obeidat, F., Toufiq, M., Benakatti, G., Brierley, J., …Hussain, A. (2023)
A Transcriptomic Appreciation of Childhood Meningococcal and Polymicrobial Sepsis from a Pro-Inflammatory and Trajectorial Perspective, a Role for Vascular Endothelial Growth Factor A and B Modulation?. Shock, 60(4), 503-516. https://doi.org/10.1097/shk.0000000000002192
This study investigated the temporal dynamics of childhood sepsis by analyzing gene expression changes associated with proinflammatory processes. Five datasets, including four...
The increasing challenge for digital forensics
Journal Article
Buchanan, W. J. (2015)
The increasing challenge for digital forensics. The Texas Investigator, 10-12
Over the past decade or so we have seen a massive increase in the usage of digital devices for evidence gathering in law enforcement, and the methods that we have used are typ...
The future internet: a world of secret shares
Journal Article
Buchanan, W. J., Lanc, D., Ukwandu, E., Fan, L., Russell, G., & Lo, O. (2015)
The future internet: a world of secret shares. Future Internet, 7(4), 445-464. https://doi.org/10.3390/fi7040445
The PKI infrastructure is crumbling, especially due to the lack of a strong understanding of how encryption actually works, and in threats around its implementation. This pape...
A Secure Random Number Generator with Immunity and Propagation Characteristics for Cryptography Functions
Journal Article
Saha, R., Geetha, G., Kumar, G., Buchanan, W. J., & Kim, T. (2021)
A Secure Random Number Generator with Immunity and Propagation Characteristics for Cryptography Functions. Applied Sciences, 11(17), Article 8073. https://doi.org/10.3390/app11178073
Cryptographic algorithms and functions should possess some of the important functional requirements such as: non-linearity, resiliency, propagation and immunity. Several previ...
Resilience of Video Streaming Services to Network Impairments
Journal Article
Torres Vega, M., Perra, C., & Liotta, A. (2018)
Resilience of Video Streaming Services to Network Impairments. IEEE Transactions on Broadcasting, 64(2), 220-234. https://doi.org/10.1109/tbc.2017.2781125
When dealing with networks, performance management through conventional quality of service (QoS)-based methods becomes difficult and is often ineffective. In fact, quality eme...
A scaleable and trusted e-Health eco-system: safi.re
Presentation / Conference
Buchanan, W. J., Burns, N., Lo, O., Lewis, R., Uthmani, O., & Fan, L. (2013, April)
A scaleable and trusted e-Health eco-system: safi.re. Paper presented at Cyber Security and Privacy EU Forum 2013, European Commission, Brussels
At present most health and social care systems do not have extendable trust and governance. This presentation outlines the safi.re architecture which uses three main component...
Cloud4Health.
Presentation / Conference
Buchanan, W. J., Fan, L., Ekonomou, E., & Lo, O. (2012, May)
Cloud4Health. Paper presented at Symposium on the Future of e-Health, Edinburgh Napier University, Edinburgh
The cloud4health platform focuses on creating a next generation infrastructure which aims to integrate assisted living with primary and secondary health care, in order to redu...
Microelectronic systems: design, modelling and test.
Book
Buchanan, W. J. (1996)
Microelectronic systems: design, modelling and test. Arnold
This text provides a comprehensive overview of the design, modellng and testing of microelectronic systems. It begins with a brief introduction to the history and development ...
Battery Aware Beacon Enabled IEEE802.15.4: An Adaptive and Cross-Layer Approach
Conference Proceeding
Salayma, M., Al-Dubai, A., Romdhani, I., & Yassein, M. B. (2015)
Battery Aware Beacon Enabled IEEE802.15.4: An Adaptive and Cross-Layer Approach. In M. Ganzha, L. Maciaszek, & M. Paprzycki (Eds.), Proceedings of the 2015 Federated Conference on Computer Science and Information Systems, (1267-1272). https://doi.org/10.15439/2015F118
In Wireless Sensor Networks (WSNs), energy conservation is one of the main concerns challenging the cutting-edge standards and protocols. Most existing studies focus on the de...