Skip to main content

Research Repository

Advanced Search

Browse


E-learning and COVID-19: the Nigerian experience: challenges of teaching technical courses in tertiary institutions. (2021)
Conference Proceeding
UGOCHUKWU-IBE, I.M. and IBEKE, E. [2021]. E-learning and COVID-19: the Nigerian experience: challenges of teaching technical courses in tertiary institutions. To be presented at 4th Recent trends and applications in computer science and information technology international conference 2021 (RTA-CSIT 2021), 21-22 May 2021, (accepted).

This paper examines the challenges of teaching technical courses through e-learning in Nigerian tertiary institutions during the COVID-19 pandemic lockdown. The COVID-19 pandemic has widespread after-effect on education systems all over the world, wi... Read More about E-learning and COVID-19: the Nigerian experience: challenges of teaching technical courses in tertiary institutions..

LTMS: a lightweight trust management system for wireless medical sensor networks. (2021)
Conference Proceeding
HAJAR, M.S., AL-KADRI, M.O. and KALUTARAGE, H. 2020. LTMS: a lightweight trust management system for wireless medical sensor networks. In Wang, G., Ko, R., Bhuiyan, M.Z.A. and Pan, Y. (eds.). Proceedings of 19th Institute of Electrical and Electronics Engineers (IEEE) Trust, security and privacy in computing and communication international conference 2020 (TrustCom 2020), 29 Dec 2020 - 1 Jan 2021, Guangzhou, China. Piscataway: IEEE [online], pages 1783-1790. Available from: https://doi.org/10.1109/TrustCom50675.2020.00245

Wireless Medical Sensor Networks (WMSNs) offer ubiquitous health applications that enhance patients' quality of life and support national health systems. Detecting internal attacks on WMSNs is still challenging since cryptographic measures can not pr... Read More about LTMS: a lightweight trust management system for wireless medical sensor networks..

Resource efficient boosting method for IoT security monitoring. (2021)
Conference Proceeding
ZAKARIYYA, I., AL-KADRI, M.O. and KALUTARAGE, H. 2021. Resource efficient boosting method for IoT security monitoring. In Proceedings of 18th Institute of Electrical and Electronics Engineers (IEEE) Consumer communications and networking conference 2021 (CCNC 2021), 9-12 January 2021, Las Vegas, USA [virtual conference]. Piscataway: IEEE [online], article 9369620. Available from: https://doi.org/10.1109/ccnc49032.2021.9369620

Machine learning (ML) methods are widely proposed for security monitoring of Internet of Things (IoT). However, these methods can be computationally expensive for resource constraint IoT devices. This paper proposes an optimized resource efficient ML... Read More about Resource efficient boosting method for IoT security monitoring..

Use of optimized centroid and weighted centroid algorithms to locate a partial discharge source by using received signal strength. (2021)
Conference Proceeding
KHAN, U.F., JANJUA, G.M.W., AYUB, A., ILYAS, M.A., SHAHZAD, K. and MOHAMED, H. 2020. Use of optimized centroid and weighted centroid algorithms to locate a partial discharge source by using received signal strength. In Proceedings of 23rd Wireless personal multimedia communications symposium 2020 (WPMC2020): bridging wireless and business worlds, 19-26 October 2020, [virtual conference]. Piscataway: IEEE [online], article ID 9309452. Available from: https://doi.org/10.1109/WPMC50192.2020.9309452

Received signal strength (RSS) based localization of a source is a simple but effective technique. In RSS based localization source location is estimated by converting obtained signal into distance. In this paper, centroid and weighted centroid algor... Read More about Use of optimized centroid and weighted centroid algorithms to locate a partial discharge source by using received signal strength..

Indoor characterization of genetically optimized circular rotational square hyperboloid (GOCRSH) concentrator. (2020)
Conference Proceeding
FREIER RAINE, D., MUHAMMAD-SUKKI, F., RAMIREZ-INIGUEZ, R., JAFRY, T., ARDILA-REY, J. A. and GAMIO, C. 2020. Indoor characterization of genetically optimized circular rotational square hyperboloid (GOCRSH) concentrator. In Proceedings of 47th Institute of Electrical and Electronic Engineers (IEEE) Photovoltaic specialists conference 2020 (PVSC 2020), 15 June - 21 August 2020, [virtual conference]. Piscataway: IEEE [online], pages 2600-2604. Available from: https://doi.org/10.1109/pvsc45281.2020.9300920

This paper evaluates the performance of a genetically optimized circular rotational square hyperboloid (GOCRSH) concentrator for low-concentrating photovoltaic (PV) application. The experimental analysis of 4 types of GOCRSH namely the GOCRSH_A GOCRS... Read More about Indoor characterization of genetically optimized circular rotational square hyperboloid (GOCRSH) concentrator..

A low-complexity wavelet-based visual saliency model to predict fixations. (2020)
Conference Proceeding
NARAYANASWAMY, M., ZHAO, Y., FUNG, W.K. and FOUGH, N. 2020. A low-complexity wavelet-based visual saliency model to predict fixations. In Proceedings of 27th Institute of Electrical and Electronic Engineers (IEEE) International conference on electronics, circuits and systems 2020 (ICECS 2020), 23-25 November 2020, [virtual conference]. Piscataway: IEEE [online], article ID 9294905. Available from: https://doi.org/10.1109/ICECS49266.2020.9294905

A low-complexity wavelet-based visual saliency model to predict the regions of human eye fixations in images using low-level features is proposed. Unlike the existing wavelet-based saliency detection models, the proposed model requires only two chann... Read More about A low-complexity wavelet-based visual saliency model to predict fixations..

Wifi-based human activity recognition using Raspberry Pi. (2020)
Conference Proceeding
FORBES, G., MASSIE, S. and CRAW, S. 2020. Wifi-based human activity recognition using Raspberry Pi. In Alamaniotis, M. and Pan, S. (eds.) Proceedings of Institute of Electrical and Electronics Engineers (IEEE) 32nd Tools with artificial intelligence international conference 2020 (ICTAI 2020), 9-11 Nov 2020, [virtual conference]. Piscataway: IEEE [online], pages 722-730. Available from: https://doi.org/10.1109/ICTAI50040.2020.00115

Ambient, non-intrusive approaches to smart home health monitoring, while limited in capability, are preferred by residents. More intrusive methods of sensing, such as video and wearables, can offer richer data but at the cost of lower resident uptake... Read More about Wifi-based human activity recognition using Raspberry Pi..

Ensemble-based relationship discovery in relational databases. (2020)
Conference Proceeding
OGUNSEMI, A., MCCALL, J., KERN, M., LACROIX, B., CORSAR, D. and OWUSU, G. 2020. Ensemble-based relationship discovery in relational databases. In Bramer, M. and Ellis, R. (eds.) Artificial intelligence XXXVII: proceedings of 40th British Computer Society's Specialist Group on Artificial Intelligence (SGAI) Artificial intelligence international conference 2020 (AI-2020), 15-17 December 2020, [virtual conference]. Lecture notes in artificial intelligence, 12498. Cham: Springer [online], pages 286-300. Available from: https://doi.org/10.1007/978-3-030-63799-6_22

We performed an investigation of how several data relationship discovery algorithms can be combined to improve performance. We investigated eight relationship discovery algorithms like Cosine similarity, Soundex similarity, Name similarity, Value ran... Read More about Ensemble-based relationship discovery in relational databases..

Personalised meta-learning for human activity recognition with few-data. (2020)
Conference Proceeding
WIJEKOON, A. and WIRATUNGA, N. 2020. Personalised meta-learning for human activity recognition with few-data. In Bramer, M. and Ellis, R. (eds.) Artificial intelligence XXXVII: proceedings of 40th British Computer Society's Specialist Group on Artificial Intelligence (SGAI) Artificial intelligence international conference 2020 (AI-2020), 15-17 December 2020, [virtual conference]. Lecture notes in artificial intelligence, 12498. Cham: Springer [online], pages 79-93. Available from: https://doi.org/10.1007/978-3-030-63799-6_6

State-of-the-art methods of Human Activity Recognition (HAR) rely on having access to a considerable amount of labelled data to train deep architectures with many train-able parameters. This becomes prohibitive when tasked with creating models that... Read More about Personalised meta-learning for human activity recognition with few-data..

Computing degree apprenticeships: an opportunity to address gender imbalance in the IT sector? (2020)
Conference Proceeding
SMITH, S., TAYLOR-SMITH, E., FABIAN, K., BARR, M., BERG, T., CUTTING, D., PATERSON, J., YOUNG, T. and ZARB, M. 2020. Computing degree apprenticeships: an opportunity to address gender imbalance in the IT sector? In Proceedings of 2020 Institute of Electrical and Electronics Engineers (IEEE) Frontiers in education conference (FIE 2020), 21-24 October 2020, [virtual conference]. Piscataway: IEEE [online], article ID 9274144. Available from: https://doi.org/10.1109/FIE44824.2020.9274144

This paper explores the potential for new work-based apprenticeship degrees to encourage more women into computing degrees and the IT sector. In the UK, women are currently under-represented on computing courses. Meanwhile the IT industry requires mo... Read More about Computing degree apprenticeships: an opportunity to address gender imbalance in the IT sector?.

Professional communication tools in higher education: a case study in implementing slack in the curriculum. (2020)
Conference Proceeding
MENZIES, R. and ZARB, M. 2020. Professional communication tools in higher education: a case study in implementing slack in the curriculum. In Proceedings of 2020 Institute of Electrical and Electronics Engineers (IEEE) Frontiers in education conference (FIE 2020), 21-24 October 2020, [virtual conference]. Piscataway: IEEE [online], article ID 9273906. Available from: https://doi.org/10.1109/FIE44824.2020.9273906

This Innovative Practice Full Paper presents a study which considers the implications of embedding professional communication tools within the computing curriculum. Computing students are comfortable using various communication tools such as social m... Read More about Professional communication tools in higher education: a case study in implementing slack in the curriculum..

Analysing the learning by developing action model in HE computing. (2020)
Conference Proceeding
LINTILĂ„, T. and ZARB, M. 2020. Analysing the learning by developing action model in HE computing. In Proceedings of 2020 Institute of Electrical and Electronics Engineers (IEEE) Frontiers in education conference (FIE 2020), 21-24 October 2020, [virtual conference]. Piscataway: IEEE [online], article ID 9274282. Available from: https://doi.org/10.1109/FIE44824.2020.9274282

This Research to Practice Working Process presents the first phase of the study, in which background information was sought from the literature and by interviews pedagogical experts from Laurea University of Applied Sciences (Laurea). The background... Read More about Analysing the learning by developing action model in HE computing..

A comparative study on partial discharge emulators. (2020)
Conference Proceeding
MOHAMED, H., KHAN, U., YUSUF, M.A., MOHAMMED, M.M., ALHAJ, M., ALRWEG, M. and ALKHWELDI, M. 2020. A comparative study on partial discharge emulators. In Proceedings of 28th Telecommunications forum 2020 (TELFOR 2020), 24-25 November 2020, Belgrade, Serbia. Piscataway: IEEE [online], article ID 9306600. Available from: https://doi.org/10.1109/TELFOR51502.2020.9306600

Partial Discharge (PD) detection plays a vital role in electrical power stations, it can help protecting the high voltage equipment, it can prevent explosion of these equipment and hence preventing a catastrophic failure. PD detection can be performe... Read More about A comparative study on partial discharge emulators..

Applying acceptance requirements to requirements modeling tools via gamification: a case study on privacy and security. (2020)
Conference Proceeding
PIRAS, L., CALABRESE, F. and GIORGINI, P. 2020. Applying acceptance requirements to requirements modeling tools via gamification: a case study on privacy and security. In Grabis, J. and Bork, D. (eds.) The practice of enterprise modeling: proceedings of 13th International Federation for Information Processing (IFIP) Practice of enterprise modelling working conference 2020 (Poem 2020), 25-27 November 2020, Riga, Latvia. Lecture notes in business information processing, 400. Cham: Springer [online], pages 366-376. Available from: https://doi.org/10.1007/978-3-030-63479-7_25

Requirements elicitation, analysis and modeling are critical activities for software success. However, software systems are increasingly complex, harder to develop due to an ever-growing number of requirements from numerous and heterogeneous stakehol... Read More about Applying acceptance requirements to requirements modeling tools via gamification: a case study on privacy and security..

A homogeneous-heterogeneous ensemble of classifiers. (2020)
Conference Proceeding
LUONG, A.V., VU, T.H., NGUYEN, P.M., VAN PHAM, N., MCCALL, J., LIEW, A.W.-C. and NGUYEN, T.T. 2020. A homogeneous-heterogeneous ensemble of classifiers. In Yang, H., Pasupa, K., Leung, A.C.-S., Kwok, J.T., Chan, J.H. and King, I. (eds.) Neural information processing: proceedings of 27th International conference on neural information processing 2020 (ICONIP 2020), part 5. Communications in computer and information science, 1333. Cham: Springer [online], pages, 251-259. Available from: https://doi.org/10.1007/978-3-030-63823-8_30

In this study, we introduce an ensemble system by combining homogeneous ensemble and heterogeneous ensemble into a single framework. Based on the observation that the projected data is significantly different from the original data as well as each ot... Read More about A homogeneous-heterogeneous ensemble of classifiers..

Toward an ensemble of object detectors. (2020)
Conference Proceeding
DANG, T., NGUYEN, T.T. and MCCALL, J. 2020. Toward an ensemble of object detectors. In Yang, H., Pasupa, K., Leung, A.C.-S., Kwok, J.T., Chan, J.H. and King, I. (eds.) Neural information processing: proceedings of 27th International conference on neural information processing 2020 (ICONIP 2020), part 5. Communications in computer and information science, 1333. Cham: Springer [online], pages, 458-467. Available from: https://doi.org/10.1007/978-3-030-63823-8_53

The field of object detection has witnessed great strides in recent years. With the wave of deep neural networks (DNN), many breakthroughs have achieved for the problems of object detection which previously were thought to be difficult. However, ther... Read More about Toward an ensemble of object detectors..

Detecting malicious signal manipulation in smart grids using intelligent analysis of contextual data. (2020)
Conference Proceeding
MAJDANI, F., BATIK, L., PETROVSKI, A. and PETROVSKI, S. 2020. Detecting malicious signal manipulation in smart grids using intelligent analysis of contextual data. In Proceedings of the 13th Security of information and networks international conference 2020 (SIN 2020), 4-7 November 2020, Merkez, Turkey. New York: ACM [online], article number 4, pages 1-8. Available from: https://doi.org/10.1145/3433174.3433613

This paper looks at potential vulnerabilities of the Smart Grid energy infrastructure to data injection cyber-attacks and the means of addressing these vulnerabilities through intelligent data analysis. Efforts are being made by multiple groups to pr... Read More about Detecting malicious signal manipulation in smart grids using intelligent analysis of contextual data..

Detection of false command and response injection attacks for cyber physical systems security and resilience. (2020)
Conference Proceeding
EKE, H., PETROVSKI, A. and AHRIZ, H. 2020. Detection of false command and response injection attacks for cyber physical systems security and resilience. In Proceedings of the 13th Security of information and networks international conference 2020 (SIN 2020), 4-7 November 2020, Merkez, Turkey. New York: ACM [online], article number 10, pages 1-8. Available from: https://doi.org/10.1145/3433174.3433615

The operational cyber-physical system (CPS) state, safety and resource availability is impacted by the safety and security measures in place. This paper focused on i) command injection (CI) attack that alters the system behaviour through injection of... Read More about Detection of false command and response injection attacks for cyber physical systems security and resilience..

Potential for Nile red dye-based analysis of microplastics from oceanic samples. (2020)
Conference Proceeding
MICHELARAKI, M., JOSEPH, O., KARNIK, S., DEVALLA, S., MADANAN, K. and PRABHU, R. 2020. Potential for Nile red dye-based analysis of microplastics from oceanic samples. In Proceedings of the 2020 Global OCEANS: Singapore - U.S. Gulf Coast conference (Global OCEANS 2020: Singapore - U.S. Gulf Coast), 5-14 October 2020, [virtual conference]. Piscataway: IEEE [online], article ID 9389207. Available from: https://doi.org/10.1109/IEEECONF38699.2020.9389207

The Global production of plastics has exceeded over 300 million metric tons. Billions of tons of plastic waste that is generated gets accumulated as plastic debris in soil, sediments, oceans and surface water with no obvious strategy to tackle them.... Read More about Potential for Nile red dye-based analysis of microplastics from oceanic samples..

Improving the design approach to developing through-metal communications for use in subsea pipeline robots. (2020)
Conference Proceeding
HEIDARIAN, M., BURGESS, S.J. and PRABHU, R. 2020. Improving the design approach to developing through-metal communications for use in subsea pipeline robots. In Proceedings of the 2020 Global OCEANS: Singapore - U.S. Gulf Coast conference (Global OCEANS 2020: Singapore - U.S. Gulf Coast), 5-14 October 2020, [virtual conference]. Piscataway: IEEE [online], article ID 9389281. Available from: https://doi.org/10.1109/IEEECONF38699.2020.9389281

Vital inspection and repair operations on subsea pipelines usually involve pipe-bore robots, which must be controlled and monitored from outside the pipe. In many situations cables cannot be connected to the in-pipe robot and duplex wireless communic... Read More about Improving the design approach to developing through-metal communications for use in subsea pipeline robots..