All Stories

  1. Performance Analysis of Blockchain-Enabled Security and Privacy Algorithms in Connected and Autonomous Vehicles: A Comprehensive Review
  2. A Cybersecurity Architecture to Mitigate Shamoon Attacks
  3. Improving Data Glove Accuracy and Usability Using a Neural Network When Measuring Finger Joint Range of Motion
  4. Secure energy aware routing protocol for IEEE 802.15.4 wireless sensor networks
  5. After the pandemic: securing smart cities
  6. Identifying the Use of Anonymising Proxies to Conceal Source IP Addresses
  7. Reliability and Validity of Clinically Accessible Smart Glove Technologies to Measure Joint Range of Motion
  8. Review of Wearable Sensor-Based Health Monitoring Glove Devices for Rheumatoid Arthritis
  9. How to Achieve Compliance with GDPR Article 17 in a Hybrid Cloud Environment
  10. BZKP: Blockchain-based zero-knowledge proof model for enhancing healthcare security in Bahrain IoT smart cities and COVID-19 risk mitigation
  11. A Novel AI-enabled Framework to Diagnose Coronavirus COVID-19 using Smartphone Embedded Sensors: Design Study
  12. Real-World Efficacy of an Infrastructure-Free Geomagnetic Indoor Positioning System
  13. How to Achieve Compliance with GDPR Article 17 in a Hybrid Cloud Environment
  14. Natural images and blood vessel segmentation in retinal images using Echo State Networks
  15. Cyber security and the remote workforce
  16. Mitigating Denial of Service Attacks with Load Balancing
  17. Chatbots for online banking services
  18. Improving compliance with bluetooth device detection
  19. The Application of Sentiment Analysis and Text Analytics to Customer Experience Reviews to Understand What Customers Are Really Saying
  20. Evaluating User Engagement with a Reminiscence App Using Cross-Comparative Analysis of User Event Logs and Qualitative Data
  21. Introduction to Special Issue on Smart Systems Facts, Challenges and Technologies
  22. A Multimodal Smartphone Sensor System for Behaviour Measurement and Health Status Inference
  23. User-trained activity recognition using smartphones and weak supervision
  24. An investigation into smartphone based weakly supervised activity recognition systems
  25. How Usable Are Usability Tests? Examining the Suitability of Standard Usability Testing Methods for the Assessment of Apps for People Living with Dementia
  26. An IoT Framework for Detecting Movement Within Indoor Environments
  27. Music 2025 – The Music Data Dilemma: Issues Facing the Music Industry in Improving Data Management
  28. Economic costs and health-related quality of life associated with individual specific reminiscence: Results from the InspireD Feasibility Study
  29. Forecasting Short-term Wholesale Prices on the Irish Single Electricity Market
  30. Addressing the Problem of Activity Recognition with Experience Sampling and Weak Learning
  31. Using Mobile Technology to Provide Personalized Reminiscence for People Living With Dementia and Their Carers: Appraisal of Outcomes From a Quasi-Experimental Study
  32. ‘There is still so much inside’: The impact of personalised reminiscence, facilitated by a tablet device, on people living with mild to moderate dementia and their family carers
  33. Guest Editorial Special Issue on Sensor Technologies for Connected Cars: Devices, Systems and Modeling
  34. Multilayer Perceptron Neural Network for Detection of Encrypted VPN Network Traffic
  35. Reducing the intrusion of user-trained activity recognition systems
  36. Detecting the Use of Anonymous Proxies
  37. A hybrid Passive & Active Approach to Tracking movement within Indoor Environments
  38. Stream a Framework for Detecting Movement Indoors
  39. Using Mobile Technology to Provide Personalized Reminiscence for People Living With Dementia and Their Carers: Appraisal of Outcomes From a Quasi-Experimental Study (Preprint)
  40. An overview of steganography techniques applied to the protection of biometric data
  41. Automatic Prediction of Health Status Using Smartphone-Derived Behavior Profiles
  42. Detection of spine curvature using wireless sensors
  43. Behavioural Usage Analysis of a Reminiscing App for People Living with Dementia and their Carers
  44. Using SVD and DWT Based Steganography to Enhance the Security of Watermarked Fingerprint Images
  45. Predicting short-term wholesale prices on the Irish single electricity market with artificial neural networks
  46. A method for verifying integrity & authenticating digital media
  47. Cyber–physical systems and context-aware sensing and computing
  48. Streaming Audio Using MPEG–7 Audio Spectrum Envelope to Enable Self-similarity within Polyphonic Audio
  49. Blood vessel segmentation in retinal images using echo state networks
  50. SceneMaker: Creative Technology for Digital StoryTelling
  51. Crowdsourced Data Collection of Physical Activity and Health Status: An App Solution
  52. The performance cost of preserving data/query privacy using searchable symmetric encryption
  53. Aggregating social media data with temporal and environmental context for recommendation in a mobile tour guide system
  54. An experimental evaluation of echo state network for colour image segmentation
  55. Cloud-based machine learning for the detection of anonymous web proxies
  56. Preserving data privacy with Searchable Symmetric Encryption
  57. Using artificial neural networks to predict short-term wholesale prices on the Irish Single Electricity Market
  58. Welcome note
  59. Location and mobility-aware routing for multimedia streaming in disaster telemedicine
  60. Assessing usability testing for people living with dementia
  61. Security Issues with Contactless Bank Cards
  62. Securing the internet through the detection of anonymous proxy usage
  63. CAPTURE - Extending the scope of self-localization in Indoor Positioning Systems
  64. Location and Mobility-Aware Routing for Improving Multimedia Streaming Performance in MANETs
  65. A Novel Cue based Picture Word Shape Character Password Creation Scheme
  66. Pattern Matching Techniques for Replacing Missing Sections of Audio Streamed across Wireless Networks
  67. Designing a Compact Wireless Network based Device-free Passive Localisation System for Indoor Environments
  68. Opportunistic Neighbour Prediction Using an Artificial Neural Network
  69. Security evaluation of the OAuth 2.0 framework
  70. Traffic Classification for the Detection of Anonymous Web Proxy Routing
  71. Mobile device security
  72. Recent Advances in Ambient Intelligence and Context-Aware Computing
  73. Drones and Privacy
  74. Glove-Based Technology in Hand Rehabilitation
  75. A Context-Aware Mobility Indoor Positioning System
  76. Cloud Computing and Security in the Future
  77. The detection of empty resist bottles or air in the resist lines of a photolithography coating tool
  78. To wireless fidelity and beyond — CAPTURE, extending indoor positioning systems
  79. A Lightweight Authentication Protocol for Secure Communications between Resource-Limited Devices and Wireless Sensor Networks
  80. CAPTURE — Cooperatively applied positioning techniques utilizing range extensions
  81. Detection of multi-occupancy using device-free passive localisation
  82. Towards a location and mobility-aware routing protocol for improving multimedia streaming performance in MANETs
  83. Characteristics of a Piezo-Resistive Fabric Stretch Sensor Glove for Home-Monitoring of Rheumatoid Arthritis
  84. An Active Low Cost Mesh Networking Indoor Tracking System
  85. Editorial to the Special Section on Ambient Intelligence and Assistive Technologies for Cognitive Impaired People
  86. Social Networking Analysis
  87. Detecting Anonymising Proxy Usage on the Internet
  88. A self-similarity approach to repairing large dropouts of streamed music
  89. An active low cost mesh networking indoor tracking system
  90. IoTs (Internet of Things) and DfPL (Device-free Passive Localisation) in a disaster management scenario
  91. A novel approach to digital watermarking, exploiting colour spaces
  92. Novel smart sensor glove for arthritis rehabiliation
  93. Novel smart sensor glove for arthritis rehabiliation
  94. Context-aware intelligent recommendation system for tourism
  95. A Survey of Geographical Routing in Wireless Ad-Hoc Networks
  96. Support Vector Machine Classification in a Device-Free Passive Localisation (DfPL) Scenario
  97. Pervasive and Ubiquitous Technology Innovations for Ambient Intelligence Environments
  98. Social Networking and Health
  99. Social Networking in Education
  100. RFID in the production line for work flow improvement
  101. Legal, Ethical & Social Issues in the case of an Intrusive Remote Monitoring Software
  102. A survey of active and passive indoor localisation systems
  103. Indoor Robot Localisation with Active RFID
  104. A new method to determine joint range of movement and stiffness in rheumatoid arthritic patients
  105. Bringing location to IP Addresses withIP Geolocation
  106. The Rise of Gaming on Social Networks
  107. Cloud Computing Technologies
  108. Google+ vs Facebook: The Comparison
  109. Teaching Java Programming using CABLE in a Collaborative Online Environment
  110. Google+ v Facebook: The Comparison
  111. Near Field Communication
  112. Probabilistic indoor human movement modeling to aid first responders
  113. Google+ v Facebook: The Comparison
  114. Guiding robots through wireless location positioning
  115. Innovative Applications of Ambient Intelligence
  116. The Future of Web and Mobile Game Development
  117. A practical network coding and routing scheme based on maximum flow combination
  118. A dynamic threshold approach for skin tone detection in colour images
  119. HABITS: a Bayesian filter approach to indoor tracking and location
  120. MANET Location Prediction Using Machine Learning Algorithms
  121. Man in the Browser Attacks
  122. Using acoustic sensors to discriminate between nasal and mouth breathing
  123. Innovative Applications of Ambient Intelligence
  124. OpenStreetMap
  125. WS-I* compliant web service SOAP message security performance
  126. HTML5 and the Mobile Web
  127. Mobility and delay in greedy geographic routing
  128. Support Vector Machine and Probability Neural Networks in a Device-Free Passive Localization (DFPL) Scenario
  129. Performance Comparison of Enterprise Applications on Mobile Operating Systems
  130. Good Practice for Strong Passwords
  131. A Bayesian Filter Approach to Modelling Human Movement Patterns for First Responders within Indoor Locations
  132. Embed, Track and Authenticate Images Online with SDW-WebCrawler
  133. Implementing the Payment Card Industry (PCI) Data Security Standard (DSS)
  134. An evaluation of indoor location determination technologies
  135. A wireless approach to device-free localisation (DFL) for indoor environments
  136. Cloud Computing Security
  137. Context-aware support for assistive systems and services
  138. Radio Communication Protocols in a History Aware Device-free Passive (DfP) Localisation
  139. The Core Aspects of Search Engine Optimisation Necessary to Move up the Ranking
  140. The Problems of Jurisdiction on the Internet
  141. The Role of Augmented Reality within Ambient Intelligence
  142. The Role of Twitter in the World of Business
  143. Wearable Rehab Technology for Automatic Measurement of Patients with Arthritis
  144. Ubiquitous Developments in Ambient Computing and Intelligence
  145. History Aware Device-free Passive (DfP) Localisation
  146. Managing Step Changes in Information System Support: Lessons from an Industrial Study
  147. Learning indoor movement habits for predictive control
  148. Cheating in Exams with Technology
  149. Integrating geolocation into electronic finance applications for additional security
  150. Finger movement measurements in arthritic patients using wearable sensor enabled gloves
  151. A Watermarking Based Tamper Detection Solution for RFID Tags
  152. A dynamic threshold approach for skin segmentation in color images
  153. Practical Network Coding Scheme Based on Maximum Flow Combination and Coding Node Identification
  154. A hash-based image encryption algorithm
  155. Digital image steganography: Survey and analysis of current methods
  156. Ambient Interface Design (AID) for the Ergonomically Challenged
  157. An Activity Monitoring Application for Windows Mobile Devices
  158. An Improved Self-embedding Algorithm: Digital Content Protection against Compression Attacks in Digital Watermarking
  159. Analysis of device-free localisation (DFL) techniques for indoor environments
  160. Context-Awareness in Ambient Intelligence
  161. Evaluation of Smoothing Algorithms for a RSSI-Based Device-Free Passive Localisation
  162. A Biologically Inspired Smart Camera for Use in Surveillance Applications
  163. Towards objectifying information hiding
  164. Mobile development environments for electronic finance
  165. Mobile Phone Forensic Analysis
  166. Automating Information Discovery Within the Invisible Web
  167. A secure and improved self-embedding algorithm to combat digital document forgery
  168. A skin tone detection algorithm for an adaptive approach to steganography
  169. A new colour space for skin tone detection
  170. Radio Frequency Identification for Educational Gaming using Mobile Devices
  171. Automated measurements of finger movements in arthritic patients using a wearable data hand glove
  172. Letter to the editor
  173. Optimising mobile phone self-location estimates by introducing beacon characteristics to the algorithm
  174. WebOS – moving the operating system to the Web
  175. Computer hacking
  176. Adaptive mobile applications
  177. Cryptography
  178. Designing for the mobile Web
  179. Digital watermarking and steganography
  180. Honeynets
  181. Hybrid Web applications
  182. Improved Blind Watermarking of 3D Objects Based on Partition
  183. Internet protocols
  184. Introduction
  185. Javascript, XML, E4X and AJAX
  186. Mesh networking
  187. Mobile social software
  188. Podcasting, screencasting, blogging and videoblogging
  189. RFID-Enabled Location Determination Within Indoor Environments
  190. Really Simple Syndication (RSS)
  191. Summary
  192. The invisible Web
  193. The long tail
  194. The problem of spam email
  195. Vertical search engines
  196. VoiceXML
  197. Web 2.0
  198. Web intelligence
  199. Web services
  200. What causes delay in the Internet?
  201. Wireless 802.11 security
  202. Wireless sensor networks
  203. Worldwide interoperability for microwave access (WiMAX)
  204. Understanding the Internet
  205. Ambient Communication Experience (ACE)
  206. Ambient Middleware for Context-Awareness (AMiCA)
  207. An infrastructure for developing self-organising services
  208. Combating digital document forgery using new secure information hiding algorithm
  209. Securing information content using new encryption method and Steganography
  210. A computational intelligence method for traversing dynamically constructed networks of knowledge
  211. Pinpointing users with location estimation techniques and Wi-Fi hotspot technology
  212. Image Analysis for Online Dynamic Steganography Detection
  213. A formal logic approach to firewall packet filtering analysis and generation
  214. Artificial intelligence and networking
  215. Skin tone based Steganography in video files exploiting the YCbCr colour space
  216. Enhancing Steganography in Digital Images
  217. Investigating the Human Computer Interaction Problems with Automated Teller Machine (ATM) Navigation Menus
  218. Biometric Inspired Digital Image Steganography
  219. A multilingual mobile university information portal designed to cater for visiting overseas students
  220. Investigating the human computer interaction problems with automated teller machine navigation menus
  221. Disruption Tolerant Networking
  222. Cognitive Radio
  223. Autonomic Vehicles
  224. Autonomic supervision of stigmergic self-organisation for distributed information retrieval
  225. A primer on radio frequency identification for libraries
  226. Investigating the problems faced by older adults and people with disabilities in online environments
  227. Utilizing Stigmergy in Support of Autonomic Principles
  228. Utilizing Stigmergy in Support of Autonomic Principles
  229. ADDRESSING THE PROBLEMS OF DETECTING FACES WITH NEURAL NETWORKS
  230. TeleMorph: A Fuzzy Logic Approach to Network-Aware Transmoding in Mobile Intelligent Multimedia Presentation Systems
  231. Taking the information to the public through Library 2.0
  232. Wireless Handheld Devices Become Trusted Network Devices
  233. Geographical Mashups
  234. An RFID-enabled middleware architecture for urban gaming
  235. Challenges and research directions in autonomic communications
  236. Autonomic Supervision of Stigmergic Self-Organisation for Distributed Information Retrieval
  237. Bandwidth determined transmoding through fuzzy logic in mobile intelligent multimedia presentation systems
  238. An evaluation of image based steganography methods using visual inspection and automated detection techniques
  239. Introducing a light-weight autonomic network middleware based on stigmergic mechanisms
  240. Demonstrating the Wired Equivalent Privacy (WEP) Weaknesses Inherent in Wi-Fi Networks
  241. An evaluation of image based steganography methods
  242. Expressing emotion in electronic mail
  243. Involving the user Through Library 2.0
  244. Eliminating the Volume of Spam E-Mails Using a Hashcash-Based Solution
  245. Delivering Audio and Video with Rich Site Summary Enclosures
  246. Investigating text input methods for mobile phones
  247. A location-based mobile tourist guide
  248. Knowledge Networks
  249. Discovering Resources in Computational GRID Environments
  250. Resource discovery and management in computational GRID environments
  251. Scheduled RSS feeds for streaming multimedia to the desktop using RSS enclosures
  252. Intelligent information retrieval
  253. Examining the effects of caching, compression and popup filtering on internet surfing
  254. Neural network face detection
  255. Monitoring hacker activity with a Honeynet
  256. Transcoding media for bandwidth constrained mobile devices
  257. Understanding and reducing web delays
  258. Online Gaming
  259. An Investigation into the Use of the Least Significant Bit Substitution Technique in Digital Watermarking
  260. Introducing Song Form Intelligence into Streaming Audio
  261. Investigating Text Input Methods for Mobile Phones
  262. E-Democracy
  263. An Investigation into Factors Associated with Web Page Download Delay
  264. Exposing the Wired Equivalent Privacy Protocol Weaknesses in Wireless Networks
  265. Addressing Spam E-Mail Using Hashcast
  266. The Deployment of Protocol Stack Components Using Web Services
  267. Dynamic Reconfiguration of IP Domain Middleware Stacks to Support Multicast Multimedia Distribution in a Heterogeneous Environment
  268. The Use of Neural Networks in Real-time Face Detection
  269. Evaluation of pixel-based steganography and stegodetection methods
  270. Cyberart
  271. Civil Liberties and Computer Monitoring
  272. Web Intelligence in Information Retrieval
  273. Tips for Achieving High Positioning in the Results Pages of the Major Search Engines
  274. Understanding and Reducing Web Delays
  275. WikiWikiWeb as a Tool for Collaboration
  276. PMXML: An XML Vocabulary Intended for the Exchange of Task Planning and Tracking Information
  277. Mobile MultiModal presentation
  278. Design of a Tourist Driven Bandwidth Determined MultiModal Mobile Presentation System
  279. Introducing IP Domain Flexible Middleware Stacks for Multicast Multimedia Distribution in Heterogeneous Environments
  280. TELEMORPH: BANDWIDTH-DETERMINED MOBILE MULTIMODAL PRESENTATION
  281. The effects of badly behaved routers on Internet congestion
  282. A Web-based collaboration teaching environment
  283. A decision support system for telecommunications
  284. A framework for the transmission of streaming media to mobile devices
  285. A paradigm shift in the distribution of multimedia
  286. Helpmate: A multimedia Web teaching framework
  287. Multiple multicast groups for multimedia on the Internet
  288. Optimal multimedia transport on the Internet
  289. Dynamicmultimedia protocol stacks
  290. Social Networking
  291. Hackers, Hacking, and Eavesdropping
  292. Hacking and Eavesdropping
  293. Security Issues in Cloud Computing
  294. Recent Developments in Simplified Sign-On
  295. Autonomous Querying for Knowledge Networks
  296. Autonomic Computing
  297. Cryptography
  298. Cyber Terrorism Attacks
  299. Dynamically Adaptable Web Services Based on the Simple Object Access Protocol
  300. Electronic Surveillance and Civil Rights
  301. Multimedia for Mobile Devices
  302. Security Issues with Wi-Fi Networks
  303. The Semantic Web
  304. Web Services
  305. A location based wireless tourist guide
  306. Addressing WiFi Security Concerns
  307. Fighting the Problem of Unsolicited E-Mail Using a Hashcash Proof-of-Work Approach
  308. Prevalent Factors Involved in Delays Associated with Page Downloads
  309. Scheduled RSS feeds for streaming multimedia to the desktop using RSS enclosures
  310. Towards Pervasive Supervision for Autonomic Systems
  311. Automated broadcast media monitoring using the google API
  312. A middleware architecture for streaming media over IP networks to mobile devices
  313. Cyber Terrorism Attacks
  314. Hacking and Eavesdropping
  315. HTML5
  316. Hackers, Hacking, and Eavesdropping
  317. Social Networking
  318. Multimedia for Mobile Devices
  319. Multimedia for Mobile Devices
  320. Web Services
  321. Autonomic Computing
  322. Security Issues with Wi-Fi Networks
  323. The Semantic Web
  324. Addressing WiFi Security Concerns
  325. Multimedia for Mobile Devices
  326. Cryptography
  327. Mobile App Stores
  328. Cloud Computing Security
  329. Software Piracy
  330. Cloud Computing
  331. The Internet of Things
  332. Social Networking in Education
  333. Location-Based Social Networks
  334. Really Simple Syndication (RSS)
  335. OpenStreetMap
  336. The World of Podcasting, Screencasting, Blogging, and Videoblogging
  337. SPIT
  338. Glove-Based Technology in Hand Rehabilitation
  339. Social Networking
  340. Recent Developments in Simplified Sign-On
  341. Electronic Surveillance and Civil Rights
  342. The Role of Twitter in the World of Business
  343. The Role of Augmented Reality within Ambient Intelligence
  344. The Problems of Jurisdiction on the Internet
  345. The Core Aspects of Search Engine Optimisation Necessary to Move up the Ranking
  346. Internet Censorship in China
  347. Context Awareness in Mobile Devices
  348. The Rise of the Tablet
  349. Mobile Phone Forensic Analysis
  350. Context-Awareness in Ambient Intelligence
  351. Ambient Interface Design (AID) for the Ergonomically Challenged
  352. An Activity Monitoring Application for Windows Mobile Devices
  353. Proactive Context-Aware Middleware
  354. RFID-Enabled Location Determination within Indoor Environments
  355. Exposing the Wired Equivalent Privacy Protocol Weaknesses in Wireless Networks
  356. Cheating in Exams with Technology
  357. Knowledge-Based Reasoning Through Stigmergic Linking
  358. Developing Team Work in IT Education to Foster Student Engagement
  359. Common Problems Faced When Developing Applications for Mobile Devices
  360. A Literacy and Numeracy E-Learning Mobile Application for Pre-Schoolers
  361. A Literacy and Numeracy E-Learning Mobile Application for Pre-Schoolers
  362. Dynamically Adaptable Web Services Based on the Simple Object Access Protocol
  363. Fighting the Problem of Unsolicited E-Mail Using a Hashcash Proof-of-Work Approach
  364. Prevalent Factors Involved in Delays Associated with Page Downloads
  365. Exposing the Wired Equivalent Privacy Protocol Weaknesses in Wireless Networks
  366. The Challenges of Data Cleansing with Data Warehouses
  367. Ambient Communication Experience (ACE), Information Interaction in Design Space
  368. A Camera-Based System for Determining Hand Range of Movement Measurements in Rheumatoid Arthritis
  369. Using Leap Motion and Gamification to Facilitate and Encourage Rehabilitation for Hand Injuries:
  370. Introducing song form intelligence into streaming audio
  371. Web intelligence in information retrieval