Reliable multipath multi-channel route migration over multi link-failure in wireless ad hoc networks
Mirza, N. S., King, P. J. B., Romdhani, I., Abdelshafy, M. A., & Alghamdi, A. A. (2017)
Reliable multipath multi-channel route migration over multi link-failure in wireless ad hoc networks. In Wireless and Mobile Computing, Networking and Communications (WiMob)https://doi.org/10.1109/wimob.2017.8115854
The route recovery algorithm is a crucial part of an ad hoc routing protocol. Designing an efficient and fast route recovery mechanism scheme without incurring extra overheads...
Adaptive energy management mechanisms for cluster based routing wireless sensor networks.
Eshaftri, M. Adaptive energy management mechanisms for cluster based routing wireless sensor networks. (Thesis)
Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/Output/1032654
Wireless Sensor Network (WSN) technology has been one of the major avenues of Internet of Things (IoT) due to their potential role in digitising smart physical environments. W...
Everyday listening to auditory displays: lessons from acoustic ecology.
Droumeva, M., & McGregor, I. (2012)
Everyday listening to auditory displays: lessons from acoustic ecology. In Proceedings of The 18th International Conference on Auditory Display (ICAD2012)
In order to design auditory displays that function well within the cultural, informational and acoustic ecology of everyday situations designers as well as researchers in psyc...
Soundscapes and repertory grids: comparing listeners’ and a designer’s experiences.
McGregor, I., & Turner, P. (2012)
Soundscapes and repertory grids: comparing listeners’ and a designer’s experiences. In P. Turner, S. Turner, & I. McGregor (Eds.), ECCE 2012 (131-137). https://doi.org/10.1145/2448136.2448164
This paper reports on establishing whether listeners have the same listening experience as the person who designed the sound. Surprisingly, there is little or no evidence as t...
The VoIP intrusion detection through a LVQ-based neural network.
Presentation / Conference
Zheng, L., & Peng, T. (2009, November)
The VoIP intrusion detection through a LVQ-based neural network. Paper presented at The 4th International Conference for Internet Technology and Secured Transactions, London, UK
Being a fast-growing Internet application, Voice over Internet Protocol shares the network resources with the regular Internet traffic. However it is susceptible to the existi...
Representation in the (Artificial) Immune System
McEwan, C., & Hart, E. (2009)
Representation in the (Artificial) Immune System. Journal of Mathematical Modelling and Algorithms, 8, 125-149. https://doi.org/10.1007/s10852-009-9104-6
Much of contemporary research in Artificial Immune Systems (AIS) has partitioned into either algorithmic machine learning and optimisation, or, modelling biologically plausibl...
Lattice-based modelling of thesauri.
Priss, U. & Old, L. J. (2007)
Lattice-based modelling of thesauri
This paper revisits ideas about the use of lattices as underlying conceptual structures in information retrieval and machine translation as suggested by researchers in the 195...
On balancing network traffic in path-based multicast communication
Al-Dubai, A., Ould-Khaoua, M., & Mackenzie, L. (2006)
On balancing network traffic in path-based multicast communication. Future Generation Computer Systems, 22(7), 805-811. doi:10.1016/j.future.2006.02.009
This paper presents a new multicast path-based algorithm, referred to here as the Qualified Groups (QG for short), which can achieve a high
degree of parallelism and low commu...
Workplace soundscape mapping: a trial of Macaulay and Crerar’s method
McGregor, I., Crerar, A., Benyon, D., & LePlâtre, G. (2006)
Workplace soundscape mapping: a trial of Macaulay and Crerar’s method. In Proceedings of the 12th International Conference on Auditory Display (ICAD2006)
This paper describes a trial of Macaulay and Crerar’s method of mapping a workplace soundscape to assess its fitness as a basis for an extended soundscape mapping method. Twel...
Abstraction: a key notation for reverse engineering in a system re-engineering approach.
Yang, H., Liu, X. & Zedan, H. (1999)
Abstraction: a key notation for reverse engineering in a system re-engineering approach. Journal of Software: Evolution and Process. 12, 197-228. doi:10.1002/1096-908X(200007/08)12:43.0.CO;2-X. ISSN 2047-7481
This paper advocates that extracting formal specification semantically consistent to the original legacy system will facilitate further redesign and forward engineering greatl...