Date


People

Download Available

623 results

Lightweight Reinforcement Learning for Energy Efficient Communications in Wireless Sensor Networks

Journal Article
Savaglio, C., Pace, P., Aloi, G., Liotta, A., & Fortino, G. (2019)
Lightweight Reinforcement Learning for Energy Efficient Communications in Wireless Sensor Networks. IEEE Access, 7, 29355-29364. https://doi.org/10.1109/access.2019.2902371
High-density communications in wireless sensor networks (WSNs) demand for new approaches to meet stringent energy and spectrum requirements. We turn to reinforcement learning,...

Cognitive impairments, HCI and daily living

Conference Proceeding
Keates, S., Kozloski, J., & Varker, P. (2009)
Cognitive impairments, HCI and daily living. In C. Stephanidis (Ed.), Universal Access in Human-Computer Interaction. Addressing Diversity. 5th International Conference, UAHCI 2009, Proceedings, Part I, 366-374. https://doi.org/10.1007/978-3-642-02707-9_42
As computer systems become increasingly more pervasive in everyday life, it is simultaneously becoming ever more important that the concept of universal access is accepted as ...

Evaluating the VIPER pedigree visualisation: detecting inheritance inconsistencies in genotyped pedigrees.

Conference Proceeding
Paterson, T., Graham, M., Kennedy, J., & Law, A. (2011)
Evaluating the VIPER pedigree visualisation: detecting inheritance inconsistencies in genotyped pedigrees. In 2011 IEEE Symposium on Biological Data Visualization (BioVis), 119-126. https://doi.org/10.1109/BioVis.2011.6094056
VIPER (Visual Pedigree Explorer) is a tool for exploring large complex animal pedigrees and their associated genotype data. The tool combines a novel, space-efficient visualis...

Mobile Multicast Route Optimisation

Conference Proceeding
Romdhani, I., Munoz, J., Bettahar, H., & Bouabdallah, A. (2006)
Mobile Multicast Route Optimisation. In IEEE International Conference on Communications, 2006. ICC '06, 1977-1983. doi:10.1109/icc.2006.255060
The multiparty nature of multicast applications presents new challenges for Mobile IP users. Unfortunately, when a multicast receiver is mobile, it will experience additional ...

Comparative analysis of chaotic and non-chaotic image encryption schemes

Conference Proceeding
Younas, M. B., & Ahmad, J. (2014)
Comparative analysis of chaotic and non-chaotic image encryption schemes. In 2014 International Conference on Emerging Technologies (ICET)https://doi.org/10.1109/icet.2014.7021021
In modern era, multimedia technologies have been developed significantly. Multimedia data such as audio, video and image transfers over the internet is open and insecure. Secu...

Novel Biologically Inspired Approaches to Extracting Online Information from Temporal Data

Journal Article
Malik, Z. K., Hussain, A., & Wu, J. (2014)
Novel Biologically Inspired Approaches to Extracting Online Information from Temporal Data. Cognitive Computation, 6(3), 595-607. https://doi.org/10.1007/s12559-014-9257-0
In this paper, we aim to develop novel learning approaches for extracting invariant features from time series. Specifically, we implement an existing method of solving the gen...

DNA Sequence Based Medical Image Encryption Scheme

Conference Proceeding
Khan, J. S., Ahmad, J., Abbasi, S. F., Ali, A., & Kayhan, S. K. (2018)
DNA Sequence Based Medical Image Encryption Scheme. In 2018 10th Computer Science and Electronic Engineering (CEEC)https://doi.org/10.1109/ceec.2018.8674221
Medical consultants and doctors store and update patients confidential information on Internet cloud computing platforms. These days, securing medical images from eavesdropper...

Analysis of electromagnetic wave propogation using 3D finite-difference time-domain methods with parallel processing.

Thesis
Buchanan, W. J. Analysis of electromagnetic wave propogation using 3D finite-difference time-domain methods with parallel processing. (Thesis)
Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/4022
The 3D Finite-Difference Time-Domain (FDTD) method simulates structures in the time-domain using a direct form of Maxwell’s curl equations. This method has the advantage over ...

Recent Advances in Indoor Localization: A Survey on Theoretical Approaches and Applications

Journal Article
Yassin, A., Nasser, Y., Awad, M., Al-Dubai, A., Liu, R., Yuen, C., …Aboutanios, E. (2017)
Recent Advances in Indoor Localization: A Survey on Theoretical Approaches and Applications. Communications Surveys and Tutorials, IEEE Communications Society, 19(2), 1327-1346. https://doi.org/10.1109/comst.2016.2632427
Nowadays, the availability of the location information becomes a key factor in today’s communications systems for allowing location based services. In outdoor scenarios, the M...

Secure speech communication algorithm via DCT and TD-ERCS chaotic map

Conference Proceeding
Habib, Z., Khan, J. S., Ahmad, J., Khan, M. A., & Khan, F. A. (2017)
Secure speech communication algorithm via DCT and TD-ERCS chaotic map. In 2017 4th International Conference on Electrical and Electronic Engineering (ICEEE)https://doi.org/10.1109/iceee2.2017.7935827
Secure communication has always been a demanding area in civil, commercial and particularly in military set up. Robust and time-tested efficient algorithms are needed to have ...