Skip to main content

Research Repository

Advanced Search

Outputs (20)

In celebration of the K8 telephone kiosk – Britain’s last red, cast-iron phonebox (2020)
Journal Article
Linge, N., Sutton, A., Hurley, A., & Johannessen, N. (2020). In celebration of the K8 telephone kiosk – Britain’s last red, cast-iron phonebox. Industrial Archaeology Review, 42(2), 141-153. https://doi.org/10.1080/03090728.2020.1812026

Whilst every country in the world has introduced phoneboxes onto its streets, the UK stands alone in having adopted the red phonebox as a symbol of its national identity. However, that symbol is of phonebox designs produced by Giles Gilbert Scott... Read More about In celebration of the K8 telephone kiosk – Britain’s last red, cast-iron phonebox.

Low-complexity non-intrusive load monitoring using unsupervised learning and generalized appliance models (2019)
Journal Article
Liu, Q., Kamoto, K., Liu, X., Sun, M., & Linge, N. (2019). Low-complexity non-intrusive load monitoring using unsupervised learning and generalized appliance models. IEEE Transactions on Consumer Electronics, 65(1), 28-37. https://doi.org/10.1109/TCE.2019.2891160

Awareness of electric energy usage has both societal and economic benefits, which include reduced energy bills and stress on non-renewable energy sources. In recent years, there has been a surge in interest in the field of load monitoring, also refer... Read More about Low-complexity non-intrusive load monitoring using unsupervised learning and generalized appliance models.

A speculative approach to spatial-temporal efficiency with multi-objective optimization in a heterogeneous cloud environment (2016)
Journal Article
Liu, Q., Cai, W., Shen, J., Fu, Z., Liu, X., & Linge, N. (2016). A speculative approach to spatial-temporal efficiency with multi-objective optimization in a heterogeneous cloud environment. Security and Communication Networks, 9(17), 4002-4012. https://doi.org/10.1002/sec.1582

A heterogeneous cloud system, for example, a Hadoop 2.6.0 platform, provides distributed but cohesive services with rich features on large‐scale management, reliability, and error tolerance. As big data processing is concerned, newly built cloud clus... Read More about A speculative approach to spatial-temporal efficiency with multi-objective optimization in a heterogeneous cloud environment.

The heritage of 30 years of mobile communications in the UK (2016)
Journal Article
Linge, N., & Sutton, A. (2016). The heritage of 30 years of mobile communications in the UK. Industrial Archaeology Review, 38(1), 2-18. https://doi.org/10.1080/03090728.2016.1156462

The first mobile phone networks were launched in the UK in 1985. In the 30 years that have elapsed since then, the mobile phone has evolved from an expensive device owned by the few to a mass-market smartphone that is now regarded as an essential par... Read More about The heritage of 30 years of mobile communications in the UK.

The cable that wired the world (2016)
Journal Article
Linge, N., & Burns, B. (2016). The cable that wired the world. ˜The œjournal (Institute of Telecommunications Professionals), 10(2), 41-45

A novel neural computing model for fast predicting network traffic (2015)
Journal Article
Liu, Q., Cai, W., Shen, J., Fu, Z., & Linge, N. (2015). A novel neural computing model for fast predicting network traffic. Journal of Computational and Theoretical Nanoscience, 12(12), 6056-6062. https://doi.org/10.1166/jctn.2015.5076

Currently existing web traffic prediction models have the shortages of low accuracy, low stability and slow training speed. Aiming at such problems, this paper proposes a new model to predict the network traffic called MRERPM (MapReduce-based ELM Reg... Read More about A novel neural computing model for fast predicting network traffic.

Discreet verification of user identity in pervasive computing environments using a non-intrusive technique (2014)
Journal Article
Al-Karkhi, A., Al-Yasiri, A., & Linge, N. (2014). Discreet verification of user identity in pervasive computing environments using a non-intrusive technique. Computers and Electrical Engineering, 41, 102-114. https://doi.org/10.1016/j.compeleceng.2014.10.006

This paper presents a new approach for verifying user identity in pervasive environments using a non-intrusive behaviour tracking technique that offers minimum interruption to the user’s activities. The technique, termed Non-intrusive Identity Assert... Read More about Discreet verification of user identity in pervasive computing environments using a non-intrusive technique.

Smart cloud search services: verifiable keyword-based semantic search over encrypted cloud data (2014)
Journal Article
Fu, Z., Shu, J., Sun, X., & Linge, N. (2014). Smart cloud search services: verifiable keyword-based semantic search over encrypted cloud data. IEEE Transactions on Consumer Electronics, 60(4), 762-770. https://doi.org/10.1109/TCE.2014.7027353

With the increasing popularity of the pay-as-you- consume cloud computing paradigm, a large number of cloud services are pushed to consumers. One hand, it brings great convenience to consumers who use intelligent terminals; on the other hand, consume... Read More about Smart cloud search services: verifiable keyword-based semantic search over encrypted cloud data.

Achieving effective cloud search services: multi-keyword ranked search over encrypted cloud data supporting synonym query (2014)
Journal Article
Fu, Z., Sun, X., Linge, N., & Zhou, L. (2014). Achieving effective cloud search services: multi-keyword ranked search over encrypted cloud data supporting synonym query. IEEE Transactions on Consumer Electronics, 60(1), 164-172. https://doi.org/10.1109/TCE.2014.6780939

In recent years, consumer-centric cloud computing paradigm has emerged as the development of smart electronic devices combined with the emerging cloud computing technologies. A variety of cloud services are delivered to the consumers with the premise... Read More about Achieving effective cloud search services: multi-keyword ranked search over encrypted cloud data supporting synonym query.