Skip to main content

Research Repository

Advanced Search

All Outputs (18)

In celebration of the K8 telephone kiosk – Britain’s last red, cast-iron phonebox (2020)
Journal Article
Linge, N., Sutton, A., Hurley, A., & Johannessen, N. (2020). In celebration of the K8 telephone kiosk – Britain’s last red, cast-iron phonebox. Industrial Archaeology Review, 42(2), 141-153. https://doi.org/10.1080/03090728.2020.1812026

Whilst every country in the world has introduced phoneboxes onto its streets, the UK stands alone in having adopted the red phonebox as a symbol of its national identity. However, that symbol is of phonebox designs produced by Giles Gilbert Scott... Read More about In celebration of the K8 telephone kiosk – Britain’s last red, cast-iron phonebox.

Low-complexity non-intrusive load monitoring using unsupervised learning and generalized appliance models (2019)
Journal Article
Liu, Q., Kamoto, K., Liu, X., Sun, M., & Linge, N. (2019). Low-complexity non-intrusive load monitoring using unsupervised learning and generalized appliance models. IEEE Transactions on Consumer Electronics, 65(1), 28-37. https://doi.org/10.1109/TCE.2019.2891160

Awareness of electric energy usage has both societal and economic benefits, which include reduced energy bills and stress on non-renewable energy sources. In recent years, there has been a surge in interest in the field of load monitoring, also refer... Read More about Low-complexity non-intrusive load monitoring using unsupervised learning and generalized appliance models.

A speculative approach to spatial-temporal efficiency with multi-objective optimization in a heterogeneous cloud environment (2016)
Journal Article
Liu, Q., Cai, W., Shen, J., Fu, Z., Liu, X., & Linge, N. (2016). A speculative approach to spatial-temporal efficiency with multi-objective optimization in a heterogeneous cloud environment. Security and Communication Networks, 9(17), 4002-4012. https://doi.org/10.1002/sec.1582

A heterogeneous cloud system, for example, a Hadoop 2.6.0 platform, provides distributed but cohesive services with rich features on large‐scale management, reliability, and error tolerance. As big data processing is concerned, newly built cloud clus... Read More about A speculative approach to spatial-temporal efficiency with multi-objective optimization in a heterogeneous cloud environment.

The heritage of 30 years of mobile communications in the UK (2016)
Journal Article
Linge, N., & Sutton, A. (2016). The heritage of 30 years of mobile communications in the UK. Industrial Archaeology Review, 38(1), 2-18. https://doi.org/10.1080/03090728.2016.1156462

The first mobile phone networks were launched in the UK in 1985. In the 30 years that have elapsed since then, the mobile phone has evolved from an expensive device owned by the few to a mass-market smartphone that is now regarded as an essential par... Read More about The heritage of 30 years of mobile communications in the UK.

The cable that wired the world (2016)
Journal Article
Linge, N., & Burns, B. (2016). The cable that wired the world. ˜The œjournal (Institute of Telecommunications Professionals), 10(2), 41-45

A novel neural computing model for fast predicting network traffic (2015)
Journal Article
Liu, Q., Cai, W., Shen, J., Fu, Z., & Linge, N. (2015). A novel neural computing model for fast predicting network traffic. Journal of Computational and Theoretical Nanoscience, 12(12), 6056-6062. https://doi.org/10.1166/jctn.2015.5076

Currently existing web traffic prediction models have the shortages of low accuracy, low stability and slow training speed. Aiming at such problems, this paper proposes a new model to predict the network traffic called MRERPM (MapReduce-based ELM Reg... Read More about A novel neural computing model for fast predicting network traffic.

Discreet verification of user identity in pervasive computing environments using a non-intrusive technique (2014)
Journal Article
Al-Karkhi, A., Al-Yasiri, A., & Linge, N. (2014). Discreet verification of user identity in pervasive computing environments using a non-intrusive technique. Computers and Electrical Engineering, 41, 102-114. https://doi.org/10.1016/j.compeleceng.2014.10.006

This paper presents a new approach for verifying user identity in pervasive environments using a non-intrusive behaviour tracking technique that offers minimum interruption to the user’s activities. The technique, termed Non-intrusive Identity Assert... Read More about Discreet verification of user identity in pervasive computing environments using a non-intrusive technique.

Smart cloud search services: verifiable keyword-based semantic search over encrypted cloud data (2014)
Journal Article
Fu, Z., Shu, J., Sun, X., & Linge, N. (2014). Smart cloud search services: verifiable keyword-based semantic search over encrypted cloud data. IEEE Transactions on Consumer Electronics, 60(4), 762-770. https://doi.org/10.1109/TCE.2014.7027353

With the increasing popularity of the pay-as-you- consume cloud computing paradigm, a large number of cloud services are pushed to consumers. One hand, it brings great convenience to consumers who use intelligent terminals; on the other hand, consume... Read More about Smart cloud search services: verifiable keyword-based semantic search over encrypted cloud data.

Achieving effective cloud search services: multi-keyword ranked search over encrypted cloud data supporting synonym query (2014)
Journal Article
Fu, Z., Sun, X., Linge, N., & Zhou, L. (2014). Achieving effective cloud search services: multi-keyword ranked search over encrypted cloud data supporting synonym query. IEEE Transactions on Consumer Electronics, 60(1), 164-172. https://doi.org/10.1109/TCE.2014.6780939

In recent years, consumer-centric cloud computing paradigm has emerged as the development of smart electronic devices combined with the emerging cloud computing technologies. A variety of cloud services are delivered to the consumers with the premise... Read More about Achieving effective cloud search services: multi-keyword ranked search over encrypted cloud data supporting synonym query.

The archaeology of communications' digital age (2013)
Journal Article
Linge, N. (2013). The archaeology of communications' digital age. Industrial Archaeology Review, 35(1), 45-64. https://doi.org/10.1179/0309072813Z.00000000016

This paper reviews the history of the digital age of communications that began with the invention of the stored program computer in 1948 and is today realised by the World Wide Web, super fast broadband and the smart phone. Taking a predominantly UK... Read More about The archaeology of communications' digital age.

An approach to context representation discovery and sharing in mobile ad-hoc networks (2013)
Journal Article
Liu, Q., Linge, N., & Hope, M. (2013). An approach to context representation discovery and sharing in mobile ad-hoc networks. Information (Online), 16(2B), 1447-1456

The representation, discovery and exchange of context information in a mobile ad-hoc environment is challenging due to the dynamic nature of node movement and interaction. In this paper we present a new approach to context exchange that organizes the... Read More about An approach to context representation discovery and sharing in mobile ad-hoc networks.

DEHEMS: Creating a digital environment for large-scale energy management at homes (2013)
Journal Article
Liu, Q., Cooper, G., Linge, N., Takruri, H., & Sowden, R. (2013). DEHEMS: Creating a digital environment for large-scale energy management at homes. IEEE Transactions on Consumer Electronics, 59(1), 62-69

Located at the consumer-end of the Smart Grid, domestic energy monitoring and management systems aim to provide direct energy feedback whilst (or shortly after) consumption occurs, so as to persuade users to achieve energy saving and efficiency. Howe... Read More about DEHEMS: Creating a digital environment for large-scale energy management at homes.

An context-aware management and control mechanism in a mobile ad-hoc environment (2012)
Journal Article
Liu, Q., Linge, N., Wang, J., Ji, S., & Ma, T. (2012). An context-aware management and control mechanism in a mobile ad-hoc environment. International journal of grid and distributed computing (Print. 2008), 5(4), 21-32

Complete integration and interaction of network objects can be achieved in a mobile adhoc environment. Yet, the dynamic nature of free movement and interaction among these objects also brings challenges on information representation, processing and c... Read More about An context-aware management and control mechanism in a mobile ad-hoc environment.

Implementation of automatic gas monitoring in a domestic energy management system (2012)
Journal Article
Liu, Q., Linge, N., & Lynch, V. (2012). Implementation of automatic gas monitoring in a domestic energy management system. IEEE Transactions on Consumer Electronics, 58(3), 781-786. https://doi.org/10.1109/TCE.2012.6311318

A domestic energy management system provides effective positive behaviour change by offering end users direct and ambient feedback based on their monitored energy consumption and experiences. DEHEMS, as a wide scale domestic energy monitoring and man... Read More about Implementation of automatic gas monitoring in a domestic energy management system.

Active router approach to defeating denial-of-service attacks in networks (2007)
Journal Article
El-Moussa, F., Linge, N., & Hope, M. (2007). Active router approach to defeating denial-of-service attacks in networks. IET Communications, 1(1), 55-63. https://doi.org/10.1049/iet-com%3A20050441

Denial-of-service attacks represent a major threat to modern organisations who are increasingly dependent on the integrity of their computer networks. A new approach to combating such threats introduces active routers into the network architecture. T... Read More about Active router approach to defeating denial-of-service attacks in networks.

Problem-based learning as an effective tool for teaching computer network design (2006)
Journal Article
Linge, N., & Parsons, D. (2006). Problem-based learning as an effective tool for teaching computer network design. IEEE Transactions on Education, 49(1), 5-10. https://doi.org/10.1109/TE.2005.852600

This paper addresses the challenge of developing techniques for the effective teaching of computer network design. It reports on the experience of using the technique of problem-based learning as a key pedagogical method for teaching practical networ... Read More about Problem-based learning as an effective tool for teaching computer network design.

Mobile network evolution within the UK
Journal Article
Sutton, A., & Linge, N. Mobile network evolution within the UK. ˜The œjournal (Institute of Telecommunications Professionals), 9(2), 10-16

In the first few seconds of 1985, Michael Harrison telephoned his Father, Sir Ernest Harrison, using a Panasonic VM1 handset. This call to the Chairman of Vodafone was in effect the first one to be made on the UK’s newly launched mobile phone netwo... Read More about Mobile network evolution within the UK.