• Facilitating soft skill excellence in STEM subjects leads to outstanding achievements

      Self, Richard; University of Derby (University of Derby, 2016-07-06)
      This is the presentation given at the start of a workshop at the University of Derby's annual Learning, Teaching and Assessment conference in July 2016.
    • Factored four way conditional restricted boltzmann machines for activity recognition

      Mocanu, Decebal Constantin; Ammar, Haitham Bou; Lowet, Dietwig; Driessens, Kurt; Liotta, Antonio; Weiss, Gerhard; Tuyls, Karl (Elsevier, 2015)
    • Factors influencing digital forensic investigations: Empirical evaluation of 12 years of Dubai police cases

      Al Awadhi, Ibtesam; Read, Janet C.; Marrington, Andrew; Franqueira, Virginia N. L.; University of Central Lancashire; Zayed University; University of Derby (Association of Digital Forensics, Security and Law (ADFSL), 2015)
      In Digital Forensics, person-hours spent on investigation is a key factor which needs to be kept to a minimum whilst also paying close attention to the authenticity of the evidence. The literature describes challenges behind increasing person-hours and identifies several factors which contribute to this phenomenon. This paper reviews these factors and demonstrates that they do not wholly account for increases in investigation time. Using real case records from the Dubai Police, an extensive study explains the contribution of other factors to the increase in person-hours. We conclude this work by emphasizing on several factors affecting the person-hours in contrast to what most of the literature in this area proposes.
    • Faith in vehicles: A set of evaluation criteria for trust management in vehicular ad-hoc network

      Ahmad, Farhan; Hall, Jordan; Adnane, Asma; Franqueira, Virginia N. L.; University of Derby; Capita Group (IEEE, 2017-06)
      Vehicular Ad-hoc Network (VANET) is a key technology in the domain of transportation which serves as a platform for vehicles to communicate with each other and intelligently exchange critical information, such as collision avoidance messages. Given that potentially life critical information could be exchanged in real time among network entities, it is paramount that this information is authentic (from a legitimate source), reliable and accurate. Moreover, mobility of vehicles creates different contexts in VANET resulting in a diversity of requirements for trust management. This work focuses on the effective modelling and management of trust both as a prerequisite to inter-vehicle communication and as a security measure. To this end, we propose a comprehensive set of criteria which work towards the effective modelling and management of trust in VANET to ensure that the unique characteristics of the network (such as high mobility, dispersion of vehicles, and lack of central architecture) are considered. The contribution of this paper is twofold. (1) We propose 16 criteria for effective trust management in VANET, and (2) evaluate various available trust models based on these proposed criteria.
    • A famework for data sharing between healthcare providers using blockchain

      Alzahrani, Ahmed G.; Alenezi, Ahmed; Atlam, Hany F.; Wills, Gary; University of Southampton (SCITEPRESS - Science and Technology Publications, 2020-05)
      The healthcare data are considered as a highly valuable source of information that can improve healthcare systems to be more intelligent and improve the quality of the provided services. However, due to security and privacy issues, sharing data between healthcare organisations is challenging. This has led to data shortage in the healthcare sector which is considered as a significant issue not only in the Kingdom of Saudi Arabia (KSA) but also worldwide. The primary objective of conducting this paper is to investigate the various factors that enable secure sharing and exchange of healthcare information between different healthcare providers in the KSA. It starts by discussing the current literature and frameworks for managing healthcare data information and the challenges that health providers encounter, particularly when it comes to issues such as data security, patient privacy, and healthcare information exchange. These challenges in managing healthcare data have necessitated the nee d for implementing a solution that can allow medical providers to have access to updated healthcare information. Attention in the healthcare sector has been drawn to blockchain technology as a part of the solution, especially after the technology was successfully applied in the financial sector to improve the security of financial transactions, particularly involving digital currencies such as Bitcoin. Therefore, a framework based on the blockchain technology has been proposed to achieve the goals of the present research.
    • Fast and effective embedded systems design: Applying the ARM mbed (2nd Edition)

      Wilmshurst, Tim; Toulson, Rob; University of Derby; University of Westminster (Newnes, 2016-10-26)
      A complete education in embedded system programming and hardware design, applying the innovative ARM mbed and its development ecosystem
    • Fast Millimeter Wave Assisted Beam-Steering for Passive Indoor Optical Wireless Networks

      Vega, Maria Torres; Koonen, A. M. J.; Liotta, Antonio; Famaey, Jeroen (IEEE, 2017)
    • Fault-tolerant peer-to-peer search on small-world networks

      Liu, Lu; Antonopoulos, Nikolaos; Mackin, Stephen (2007-03-12)
    • Feature Selection in the Corrected KDD-dataset

      Zargari, Shahrzad A.; Voorhis, Dave; University of Derby (IEEE Computer Society, 2012)
    • Federated broker system for pervasive context provisioning

      Kiani, Saad Liaquat; Anjum, Ashiq; Knappmeyer, Michael; Bessis, Nik; Antonopoulos, Nikolaos; University of Derby, UK (Elsevier, 2013-04)
      Software systems that provide context-awareness related functions in pervasive computing environments are gaining momentum due to emerging applications, architectures and business models. In most context-aware systems, a central broker performs the functions of context acquisition, processing, reasoning and provisioning to facilitate context-consuming applications, but demonstrations of such prototypical systems are limited to small, focussed domains. In order to develop modern context-aware systems that are capable of accommodating emerging pervasive/ubiquitous computing scenarios, are easily manageable, administratively and geographically scalable, it is desirable to have multiple brokers in the system divided into administrative, network, geographic, contextual or load based domains. Context providers and consumers may be configured to interact only with their nearest, relevant or most convenient broker. This setup demands inter-broker federation so that providers and consumers attached to different brokers can interact seamlessly, but such a federation has not been proposed for context-aware systems. This article analyses the limiting factors in existing context-aware systems, postulates the design and functional requirements that modern context-aware systems need to accommodate, and presents a federated broker based architecture for provisioning of contextual information over large geographical and network spans.
    • A few thoughts on the aesthetics of mathematics in research and teaching.

      Larcombe, Peter J.; University of Derby (Palestine Polytechnic University, 2018)
      Mathematical aesthetic, having a variety of forms, is commonly experienced by mathematicians as a genuine reality and is available at every level of study. This short essay in hopefully moving beyond standardised hermeneutic critique attests to its authenticity through the words of some mathematical proponents, and reminds us that it should be promoted to children and students as a phenomenon that is as accessible as it is incontestable.
    • Fiber to the home: considerations associated with a successful deployment

      Ezeh, G. N.; Diala, Uchenna; Federal University of Technology, Owerri, Nigeria (IJETAE, 2014-06)
      To realize the Nigerian Government’s goal to liver 80% mobile broadband penetration by 2018, and become one of the top twenty economies in the world by the year 2020, Fiber to the Home (FTTH) technology along with other broadband access technologies is an essential driving factor for providing broadband access. Currently most telecom operators are reluctant to deploy FTTH in the access networks as this is very costly. Most operators are also averse to the risk of regulation - unbundling of the local loop - the new fiber infrastructure. Today, majority of broadband connectivity is offered via Satellite, GSM Networks and Microwave Access. FTTH provides enormous bandwidth and long-reach offering triple play services (Data, Voice, and Video). Advancement in the electronic equipment coupled with a fall in the price of Fiber Optic Cables and equipment make FTTH deployment an affordable choice for the telecom operators that result in long term returns. An analysis of the various factors affecting FTTH Deployment in Nigeria, and possible mitigations to limiting factors, is presented here.
    • Finding innovative solutions to engineering problems using CES and TRIZ

      Robertson-Begg, John; University of Derby (2016-04-07)
      This work explores possible solutions to the failure in operation of a pressure sensing device. The device operates inside the tyre of heavy earth moving equipment and is subject to temperature variations and exposure to fluids such as antifreeze. During extended operation it was observed that the device started to read higher values of pressure in time. The sensor and transmitter device are described. Initial investigation of failed sensors appeared to show some corrosion on the pressure sensor and it was assumed this was the reason for the increase in its reading. Cambridge Engineering Selector Edupack was used to select materials with increased resistance to antifreeze and moisture. TRIZ methodology was used to investigate contradictions between operating life and measurement accuracy. Different approaches to measuring pressure were explored using a TRIZ effects database. Possible solutions are offered involving including changing the pressure measurement system. Concluding comments discuss how TRIZ methodology in conjunction with other techniques can help students come up with innovative solutions to engineering and materials problems.
    • A first look at privacy analysis of COVID-19 contact tracing mobile applications

      Azad, Muhammad Ajmal; Arshad, Junaid; Akmal, Syed Muhammad Ali; Riaz, Farhan; Abdullah, Sidrah; Imran, Muhammad; Ahmad, Farhan; Birmingham CIty University; NED University; NUST UNiversity; et al. (Institute of Electrical and Electronics Engineers (IEEE), 2020-09-17)
      Today’s smartphones are equipped with a large number of powerful value-added sensors and features such as a low power Bluetooth sensor, powerful embedded sensors such as the digital compass, accelerometer, GPS sensors, Wi-Fi capabilities, microphone, humidity sensors, health tracking sensors, and a camera, etc. These value-added sensors have revolutionized the lives of the human being in many ways such, as tracking the health of the patients and movement of doctors, tracking employees movement in large manufacturing units, and monitoring the environment, etc. These embedded sensors could also be used for large-scale personal, group, and community sensing applications especially tracing the spread of certain diseases. Governments and regulators are turning to use these features to trace the people thought to have symptoms of certain diseases or virus e.g. COVID-19. The outbreak of COVID-19 in December 2019, has seen a surge of the mobile applications for tracing, tracking and isolating the persons showing COVID-19 symptoms to limit the spread of disease to the larger community. The use of embedded sensors could disclose private information of the users thus potentially bring threat to the privacy and security of users. In this paper, we analyzed a large set of smartphone applications that have been designed to contain the spread of the COVID-19 virus and bring the people back to normal life. Specifically, we have analyzed what type of permission these smartphone apps require, whether these permissions are necessary for the track and trace, how data from the user devices is transported to the analytic center, and analyzing the security measures these apps have deployed to ensure the privacy and security of users.
    • First observation of an attractive interaction between a proton and a cascade baryon

      Acharya, S.; Adamová, D.; Adhya, S. P.; Adler, A.; Adolfsson, J.; Aggarwal, M. M.; Aglieri Rinella, G.; Agnello, M.; Agrawal, N.; Ahammed, Z.; et al. (American Physical Society (APS), 2019-09-13)
      This Letter presents the first experimental observation of the attractive strong interaction between a proton and a multistrange baryon (hyperon) Ξ−. The result is extracted from two-particle correlations of combined p−Ξ−⊕¯p−¯Ξ+ pairs measured in p−Pb collisions at √sNN=5.02 TeV at the LHC with ALICE. The measured correlation function is compared with the prediction obtained assuming only an attractive Coulomb interaction and a standard deviation in the range [3.6, 5.3] is found. Since the measured p−Ξ−⊕¯p−¯Ξ+ correlation is significantly enhanced with respect to the Coulomb prediction, the presence of an additional, strong, attractive interaction is evident. The data are compatible with recent lattice calculations by the HAL-QCD Collaboration, with a standard deviation in the range [1.8, 3.7]. The lattice potential predicts a shallow repulsive Ξ− interaction within pure neutron matter and this implies stiffer equations of state for neutron-rich matter including hyperons. Implications of the strong interaction for the modeling of neutron stars are discussed.
    • Fog computing-based approximate spatial keyword queries with numeric attributes in IoV

      Li, Yanhong; Zhu, Rongbo; Mao, Shiwen; Anjum, Ashiq; South-Central University for Nationalities, Wuhan, China; Auburn University, USA; University of Derby (Institute of Electrical and Electronics Engineers (IEEE), 2020-01-10)
      Due to the popularity of on-board geographic devices, a large number of spatial-textual objects are generated in Internet of Vehicles (IoV). This development calls for Approximate Spatial Keyword Queries with numeric Attributes in IoV (ASKIV), which takes into account the locations, textual descriptions, and numeric attributes of spatial-textual objects. Considering huge amounts of objects involved in the query processing, this paper comes up with the ideal of utilizing vehicles as fog-computing resource, and proposes the network structure called FCV, and based on which the fog-based Top-k ASKIV query is explored and formulated. In order to effectively support network distance pruning, textual semantic pruning, and numerical attribute pruning simultaneously, a two-level spatial-textual hybrid index STAG-tree is designed. Based on STAG-tree, an efficient Top-k ASKIV query processing algorithm is presented. Simulation results show that, our STAG-based approach is about 1.87x (17.1x, resp.) faster in search time than the compared ILM (DBM, resp.) method, and our approach is scalable.
    • Forensic investigation of cyberstalking cases using Behavioural Evidence Analysis

      Al Mutawa, Noora; Bryce, Joanne; Marrington, Andrew; Franqueira, Virginia N. L.; University of Central Lancashire; University of Derby; Zayed University (Elsevier, 2016-03-29)
      Behavioural Evidence Analysis (BEA) is, in theory, useful in developing an understanding of the offender, the victim, the crime scene, and the dynamics of the crime. It can add meaning to the evidence obtained through digital forensic techniques and assist investigators with reconstruction of a crime. There is, however, little empirical research examining the application of BEA to actual criminal cases, particularly cyberstalking cases. This study addresses this gap by examining the utility of BEA for such cases in terms of understanding the behavioural and motivational dimensions of offending, and the way in which digital evidence can be interpreted. It reports on the forensic analysis of 20 cyberstalking cases investigated by Dubai Police in the last five years. Results showed that BEA helps to focus an investigation, enables better understanding and interpretation of victim and offender behaviour, and assists in inferring traits of the offender from available digital evidence. These benefits can help investigators to build a stronger case, reduce time wasted to mistakes, and to exclude suspects wrongly accused in cyberstalking cases.
    • Forensically-sound analysis of security risks of using local password managers

      Gray, Joshua; Franqueira, Virginia N. L.; Yu, Yijun; University of Derby; The Open University (IEEE Computer Society, 2016-09-12)
      Password managers address the usability challenge of authentication, i.e., to manage the effort in creating, memorising, and entering complex passwords for an end-user. Offering features such as creating strong passwords, managing increasing number of complex passwords, and auto-filling of passwords for variable contexts, their security is as critical as the assets being protected by the passwords. Previous security risk analyses have focused primarily on cloud- and browser-based password managers, whilst the security risks of local password managers were left under-explored. Taking a systematic forensic analysis approach, this paper reports on a case study of three popular local password managers: KeePass (v2.28), Password Safe (v3.35.1) and RoboForm (v7.9.12). It revealed risks that either the master password or the content of the password database could be found unencrypted in Temp folders, Page files or Recycle bin, even after applications had been closed. As a consequence, an attacker or a malware with access to the computer on which the password managers were running may be able to steal sensitive information, even though these password managers are meant to keep the databases encrypted and protected at all times. These findings point to directions to mitigate the identified risks.
    • Forward-central two-particle correlations in p–Pb collisions at √sNN = 5.02 TeV

      Alexandre, Didier; Barnby, Lee; Bhasin, Anju; Bombara, Marek; Evans, David; Graham, Katie; Jones, Peter; Jusko, Anton; Krivda, Marian; Lee, Graham; et al. (2016-02-10)
    • A framework for orchestrating secure and dynamic access of IoT services in multi-cloud environments

      Liu, Lu; Zhu, Shao Ying; Kazim, Muhammad; University of Derby (IEEE, 2018-10-16)
      IoT devices have complex requirements but their limitations in terms of storage, network, computing, data analytics, scalability and big data management require it to be used it with a technology like cloud computing. IoT backend with cloud computing can present new ways to offer services that are massively scalable, can be dynamically configured, and delivered on demand with largescale infrastructure resources. However, a single cloud infrastructure might be unable to deal with the increasing demand of cloud services in which hundreds of users might be accessing cloud resources, leading to a big data problem and the need for efficient frameworks to handle a large number of user requests for IoT services. These challenges require new functional elements and provisioning schemes. To this end, we propose the usage of multi-clouds with IoT which can optimize the user requirements by allowing them to choose best IoT services from many services hosted in various cloud platforms and provide them with more infrastructure and platform resources to meet their requirements. This paper presents a novel framework for dynamic and secure IoT services access across multi-clouds using cloud on-demand model. To facilitate multi-cloud collaboration, novel protocols are designed and implemented on cloud platforms. The various stages involved in the framework for allowing users access to IoT services in multi-clouds are service matchmaking (i.e. to choose the best service matching user requirements), authentication (i.e. a lightweight mechanism to authenticate users at runtime before granting them service access), and SLA management (including SLA negotiation, enforcement and monitoring). SLA management offers benefits like negotiating required service parameters, enforcing mechanisms to ensure that service execution in the external cloud is according to the agreed SLAs and monitoring to verify that the cloud provider complies with those SLAs. The detailed system design to establish secure multi-cloud collaboration has been presented. Moreover, the designed protocols are empirically implemented on two different clouds including OpenStack and Amazon AWS. Experiments indicate that proposed system is scalable, authentication protocols result only in a limited overhead compared to standard authentication protocols, and any SLA violation by a cloud provider could be recorded and reported back to the user.