Date


People

Output Type

Download Available

Library Of Congress

Dewey Decimal

573 results

Deep Vision in Analysis and Recognition of Radar Data: Achievements, Advancements, and Challenges

Journal Article
Liu, Q., Yang, Z., Ji, R., Zhang, Y., Bilal, M., Liu, X., …Xu, X. (2023)
Deep Vision in Analysis and Recognition of Radar Data: Achievements, Advancements, and Challenges. IEEE Systems, Man, and Cybernetics Magazine, 9(4), 4-12. https://doi.org/10.1109/msmc.2022.3216943
Radars are widely used to obtain echo information for effective prediction, such as precipitation nowcasting. In this article, recent relevant scientific investigation and pra...

A framework for live host-based Bitcoin wallet forensics and triage

Journal Article
Holmes, A., & Buchanan, W. J. (2023)
A framework for live host-based Bitcoin wallet forensics and triage. Forensic Science International: Digital Investigation, 44, Article 301486. https://doi.org/10.1016/j.fsidi.2022.301486
Organised crime and cybercriminals use Bitcoin, a popular cryptocurrency, to launder money and move it across borders with impunity. The UK and other countries have legislatio...

A forensic analysis of streaming platforms on Android OS

Journal Article
García Murias, J., Levick, D., & Mckeown, S. (2023)
A forensic analysis of streaming platforms on Android OS. Forensic Science International: Digital Investigation, 44, Article 301485. https://doi.org/10.1016/j.fsidi.2022.301485
This work builds on existing research in streamed video reconstruction on the Android OS, which previously demonstrated that caching occurs in most cases for the Chrome and Fi...

Four-Element/Eight-Port MIMO Antenna System with Diversity and Desirable Radiation for Sub 6 GHz Modern 5G Smartphones

Journal Article
Ojaroudi Parchin, N., S.I. Amar, A., Darwish, M., H. Moussa, K., See, C. H., Abd-Alhameed, R., … Mohamed, H. G. (in press)
Four-Element/Eight-Port MIMO Antenna System with Diversity and Desirable Radiation for Sub 6 GHz Modern 5G Smartphones. IEEE Access, https://doi.org/10.1109/ACCESS.2022.3227199
In this manuscript, a multiple-input multiple-output (MIMO) antenna array system with identical compact antenna elements providing wide radiation and diversity function is int...

Accelerating neural network architecture search using multi-GPU high-performance computing

Journal Article
Lupión, M., Cruz, N. C., Sanjuan, J. F., Paechter, B., & Ortigosa, P. M. (2023)
Accelerating neural network architecture search using multi-GPU high-performance computing. Journal of Supercomputing, 79, 7609-7625. https://doi.org/10.1007/s11227-022-04960-z
Neural networks stand out from artificial intelligence because they can complete challenging tasks, such as image classification. However, designing a neural network for a par...

Automated Algorithm Selection: from Feature-Based to Feature-Free Approaches

Journal Article
Alissa, M., Sim, K., & Hart, E. (in press)
Automated Algorithm Selection: from Feature-Based to Feature-Free Approaches. Journal of Heuristics, https://doi.org/10.1007/s10732-022-09505-4
We propose a novel technique for algorithm-selection, applicable to optimisation domains in which there is implicit sequential information encapsulated in the data, e.g., in o...

Comparison of Entropy Calculation Methods for Ransomware Encrypted File Identification

Journal Article
Davies, S., Macfarlane, R., & Buchanan, W. (2022)
Comparison of Entropy Calculation Methods for Ransomware Encrypted File Identification. Entropy, 24(10), Article 1503. https://doi.org/10.3390/e24101503
Ransomware is a malicious class of software that utilises encryption to implement an attack on system availability. The target’s data remains encrypted and is held captive by ...

Detection of Signals in MC–CDMA Using a Novel Iterative Block Decision Feedback Equalizer

Journal Article
Bagadi, K., Ravikumar, C., Sathish, K., Alibakhshikenari, M., Virdee, B. S., Kouhalvandi, L., …Limiti, E. (2022)
Detection of Signals in MC–CDMA Using a Novel Iterative Block Decision Feedback Equalizer. IEEE Access, 10, 105674-105684. https://doi.org/10.1109/ACCESS.2022.3211392
This paper presents a technique to mitigate multiple access interference (MAI) in multicarrier code division multiple access (MC-CDMA) wireless communications systems. Althoug...

Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform

Journal Article
Ali, H., Ahmad, J., Jaroucheh, Z., Papadopoulos, P., Pitropakis, N., Lo, O., …Buchanan, W. J. (2022)
Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform. Entropy, 24(10), Article 1379. https://doi.org/10.3390/e24101379
Historically, threat information sharing has relied on manual modelling and centralised network systems, which can be inefficient, insecure, and prone to errors. Alternatively...

An Empirical Evaluation of a Novel Domain-Specific Language -- Modelling Vehicle Routing Problems with Athos

Journal Article
Hoffmann, B., Urquhart, N., Chalmers, K., & Guckert, M. (2022)
An Empirical Evaluation of a Novel Domain-Specific Language -- Modelling Vehicle Routing Problems with Athos. Empirical Software Engineering, 27, Article 180. https://doi.org/10.1007/s10664-022-10210-w
Domain-specific languages (DSLs) are a popular approach among software engineers who demand for a tailored development interface. A DSL-based approach allows to encapsulate th...