Project-based cooperative learning to enhance competence while teaching engineering modules

Article


Gandhi, V., Yang, Z. and Aiash, M. 2017. Project-based cooperative learning to enhance competence while teaching engineering modules. International Journal of Continuing Engineering Education and Life-Long Learning. 27 (3), pp. 198-208. https://doi.org/10.1504/IJCEELL.2017.10003462
TypeArticle
TitleProject-based cooperative learning to enhance competence while teaching engineering modules
AuthorsGandhi, V., Yang, Z. and Aiash, M.
Abstract

This paper focuses on teaching control systems to engineering students not only by way of the traditional lecture deliveries, but also by implementing several student-focused problems based self-directed learning projects as well as presentations from students. Engineering field constantly evolves and thus teaching a module to engineering students should involve current state-of-the-art research trends in the lectures. In addition, the tutor should also motivate students to have the current research developments incorporated within the student’s self-learning projects. The work presented in this paper revolves around three mini-projects, each project on a different aspect of control engineering and to be completed within two weeks each. The aim of these problem based self-directed learning mini-projects is to get acquainted with the practical aspects of the theoretical learning that has been undertaken within the lectures, something that UK Standard for Professional Engineering Competence (UK-SPEC) focuses on. After completion of the mini-project, the students present their work/discuss results etc. as a power-point presentation lasting 15 minutes, and answer queries from peers (compulsory) and tutor, thus promoting life-long learning along with class participation and peer assessment. The student is also given verbal feedback after each of these project presentations, thereby encouraging improvements in the subsequent presentations taking place after two weeks. The purpose of these projects is to keep alight with the practical aspects of the current professional practices in industry, in the area of engineering, while also building a strong foundation through the self-learning model, thereby promoting deep learning via a blended approach. A questionnaire is also presented in the results and discussion section, which suggests that inclusion of a blended approach has improved the student’s reading beyond the course requirements, has encouraged them towards deeper learning, and also improved both their theoretical as well practical aspects in engineering education.

PublisherInderscience
JournalInternational Journal of Continuing Engineering Education and Life-Long Learning
ISSN1560-4624
Publication dates
Online04 Apr 2017
Publication process dates
Deposited08 Mar 2018
Accepted17 Feb 2017
Output statusPublished
Accepted author manuscript
Copyright Statement

This is an Accepted Manuscript of an article published by Inderscience in International Journal of Continuing Engineering Education and Life-Long Learning on 04/04/2017, available online: https://doi.org/10.1504/ijceell.2017.10003462

Digital Object Identifier (DOI)https://doi.org/10.1504/IJCEELL.2017.10003462
LanguageEnglish
Permalink -

https://repository.mdx.ac.uk/item/878v0

Download files


Accepted author manuscript
  • 83
    total views
  • 11
    total downloads
  • 4
    views this month
  • 2
    downloads this month

Export as

Related outputs

Analysis of machine learning methods for speech disfluency classification
Sharma. N., Gandhi, V. and Mahapatra, P. 2024. Analysis of machine learning methods for speech disfluency classification. Yang, X.S., Sherratt, S., Dey, N. and Joshi, A. (ed.) 9th International Congress on Information and Communication Technology. London, UK 19 - 22 Feb 2024 Singapore Springer. pp. 13-22 https://doi.org/10.1007/978-981-97-3556-3_2
Comparative analysis of various machine learning techniques for classification of speech disfluencies
Sharma, N., Kumar, V., Mahapatra, P. and Gandhi, V. 2023. Comparative analysis of various machine learning techniques for classification of speech disfluencies. Speech Communication. 150, pp. 23-31. https://doi.org/10.1016/j.specom.2023.04.003
Classification of EEG signals on standing, walking and running dataset using LSTM-RNN
Murugavalli, K., Ramalakshmi, R., Pallikonda Rajasekaran, M. and Gandhi, V. 2022. Classification of EEG signals on standing, walking and running dataset using LSTM-RNN. Sharma, V., Singh, M. and Sinha, J. (ed.) International Conference on Advances in Computing, Communication Control and Networking (ICAC3N). Greater Noida, India 16 - 17 Dec 2022 IEEE. pp. 1624-1630 https://doi.org/10.1109/ICAC3N56670.2022.10074500
Bridging neuroscience and robotics: spiking neural networks in action
Jones, A., Gandhi, V., Mahiddine, A. and Huyck, C. 2023. Bridging neuroscience and robotics: spiking neural networks in action. Sensors. 23 (21), pp. 1-14. https://doi.org/10.3390/s23218880
Classification of EEG signals on SEED dataset using improved CNN
Ramar, B., Ramalakshmi, R., Gandhi, V. and Pandiselvam, P. 2023. Classification of EEG signals on SEED dataset using improved CNN. 2nd International Conference on Edge Computing and Applications. Namakkal, India 19 - 21 Jul 2023 IEEE. pp. 1095-1102 https://doi.org/10.1109/ICECAA58104.2023.10212279
Leveraging oversampling techniques in machine learning models for multi-class malware detection in smart home applications
Chowdhury, A., Isalm, M., Kaisar, S., Naha, R., Khoshkholghi, A., Aiash, M. and Khoda, M.E. 2023. Leveraging oversampling techniques in machine learning models for multi-class malware detection in smart home applications. IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications. Exeter, United Kingdom 01 - 03 Nov 2023 IEEE. pp. 2216-2221
Performance and cryptographic evaluation of security protocols in distributed networks using applied pi calculus and Markov Chain
Edris, E., Aiash, M., Khoshkholghi, A., Naha, R., Chowdhury, A. and Loo, J. 2023. Performance and cryptographic evaluation of security protocols in distributed networks using applied pi calculus and Markov Chain. Internet of Things. 24. https://doi.org/10.1016/j.iot.2023.100913
IoT-based emergency vehicle services in intelligent transportation system
Chowdhury, A., Kaisar, S., Khoda, M., Naha, R., Khoshkholghi, A. and Aiash, M. 2023. IoT-based emergency vehicle services in intelligent transportation system. Sensors. 23 (11). https://doi.org/10.3390/s23115324
Exploration of functional connectivity of brain to assess cognitive and physical health parameters using brain-computer interface
Murugavalli, K., Ramalakshmi, R., Pallikonda Rajasekaran, M. and Gandhi, V. 2023. Exploration of functional connectivity of brain to assess cognitive and physical health parameters using brain-computer interface. International Journal of Biomedical Engineering and Technology. 43 (2), pp. 101-130. https://doi.org/10.1504/IJBET.2022.10052922
Neuromorphic building blocks for locomotion pattern generation
Yang, Z. and Gandhi, V. 2022. Neuromorphic building blocks for locomotion pattern generation. 2022 International Conference on Machine Learning, Control, and Robotics (MLCR). Suzhou, China 29 - 31 Oct 2022 IEEE. https://doi.org/10.1109/MLCR57210.2022.00010
Robot Operating System (ROS) controlled anthropomorphic robot hand
Krawczyk, M., Gandhi, V. and Yang, Z. 2022. Robot Operating System (ROS) controlled anthropomorphic robot hand. Journal of Scientific and Industrial Research. 81 (9), pp. 901-910. https://doi.org/10.56042/jsir.v81i09.45313
Exploring new traffic prediction models to build an intelligent transport system for Smart Cities
Mehta, V., Mapp, G. and Gandhi, V. 2022. Exploring new traffic prediction models to build an intelligent transport system for Smart Cities. IEEE/IFIP Network Operations and Management Symposium. Hungary 25 - 29 Apr 2022 pp. 1-6
Formalization and evaluation of EAP-AKA’ protocol for 5G network access security
Edris, E., Aiash, M. and Loo, J. 2022. Formalization and evaluation of EAP-AKA’ protocol for 5G network access security. Array. 16. https://doi.org/10.1016/j.array.2022.100254
An introduction of a modular framework for securing 5G networks and beyond
Edris, E., Aiash, M. and Loo, J. 2022. An introduction of a modular framework for securing 5G networks and beyond. Network. 2 (3), pp. 419-439. https://doi.org/10.3390/network2030026
Modeling and verifying a resource allocation algorithm for secure service migration for commercial cloud systems
Karthick, G., Mapp, G., Kammueller, F. and Aiash, M. 2022. Modeling and verifying a resource allocation algorithm for secure service migration for commercial cloud systems. Computational Intelligence. 38 (3), pp. 811-828. https://doi.org/10.1111/coin.12421
Developing traffic predictions from source to destination using probabilistic modelling
Mehta, V., Gandhi, V. and Mapp, G. 2021. Developing traffic predictions from source to destination using probabilistic modelling. Third UK Mobile, Wearable and Ubiquitous Systems Research Symposium. Online via Zoom 05 - 06 Jul 2021
Formal verification of authentication and service authorization protocols in 5G-enabled device-to-device communications using ProVerif
Edris, E., Aiash, M. and Loo, J. 2021. Formal verification of authentication and service authorization protocols in 5G-enabled device-to-device communications using ProVerif. Electronics. 10 (13). https://doi.org/10.3390/electronics10131608
Security in network services delivery for 5G enabled D2D communications: challenges and solutions
Edris, E., Aiash, M. and Loo, J. 2021. Security in network services delivery for 5G enabled D2D communications: challenges and solutions. in: Montasari, R., Jahankhani, H. and Al-Khateeb, H. (ed.) Challenges in the IoT and Smart Environments: A Practitioners' Guide to Security, Ethics and Criminal Threats Cham Springer. pp. 1-27
DCSS protocol for data caching and sharing security in a 5G network
Edris, E., Aiash, M. and Loo, J. 2021. DCSS protocol for data caching and sharing security in a 5G network. Network. 1 (2), pp. 75-94. https://doi.org/10.3390/network1020006
Formal verification of secondary authentication protocol for 5G secondary authentication
Edris, E., Aiash, M., Loo, J. and Alhakeem, M. 2021. Formal verification of secondary authentication protocol for 5G secondary authentication. International Journal of Security and Networks. 16 (4), pp. 223-234. https://doi.org/10.1504/IJSN.2021.119379
Exploring real time traffic signalling using probabilistic approach in intelligent transport system
Mehta, V., Gandhi, V. and Mapp, G. 2018. Exploring real time traffic signalling using probabilistic approach in intelligent transport system. Mobi-UK 2018. University of Cambridge, Cambridge, UK 12 - 13 Sep 2018
Exploring real time traffic signalling using probabilistic approach in intelligent transport system
Mehta, V., Gandhi, V. and Mapp, G. 2018. Exploring real time traffic signalling using probabilistic approach in intelligent transport system. 3rd CommNet2 PhD Autumn School. University of Sheffield, Sheffield, UK 17 - 19 Sep 2018
Design and development of the sEMG-based exoskeleton strength enhancer for the legs
Cenit, M. and Gandhi, V. 2020. Design and development of the sEMG-based exoskeleton strength enhancer for the legs. Journal of Mechatronics, Electrical Power, and Vehicular Technology. 11 (2), pp. 64-74. https://doi.org/10.14203/j.mev.2020.v11.64-74
ZKPVM: a zero-knowledge authentication protocol for VMs' live migration in mobile cloud computing
Edris, E. and Aiash, M. 2018. ZKPVM: a zero-knowledge authentication protocol for VMs' live migration in mobile cloud computing. ICSOFT 2018: 13th International Conference on Software Technologies. Porto, Portugal 26 - 28 Jul 2018 pp. 858-864
Investigating network services abstraction in 5G enabled device-to-device (D2D) communications
Edris, E., Aiash, M. and Loo, J. 2019. Investigating network services abstraction in 5G enabled device-to-device (D2D) communications. 2019 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI). Leicester, United Kingdom 19 - 23 Aug 2019 Institute of Electrical and Electronics Engineers (IEEE). pp. 1660-1665 https://doi.org/10.1109/SmartWorld-UIC-ATC-SCALCOM-IOP-SCI.2019.00296
The case for federated identity management in 5G communications
Edris, E., Aiash, M. and Loo, J. 2020. The case for federated identity management in 5G communications. The Fifth International Conference on Fog and Mobile Edge Computing (FMEC 2020). Paris, France 30 Jun - 03 Jul 2020 Institute of Electrical and Electronics Engineers (IEEE). pp. 120-127 https://doi.org/10.1109/FMEC49853.2020.9144855
Formal verification and analysis of primary authentication based on 5G-AKA protocol
Edris, E., Aiash, M. and Loo, J. 2020. Formal verification and analysis of primary authentication based on 5G-AKA protocol. Third International Symposium on 5G Emerging Technologies (5GET 2020) in conjunction with the Fourth International Conference on Fog and Mobile Edge Computing (FMEC 2020). Paris, France 30 Jun - 03 Jul 2020 Institute of Electrical and Electronics Engineers (IEEE). pp. 256-261 https://doi.org/10.1109/SDS49854.2020.9143899
Network service federated identity (NS-FId) protocol for service authorization in 5G network
Edris, E., Aiash, M. and Loo, J. 2020. Network service federated identity (NS-FId) protocol for service authorization in 5G network. The Fifth International Conference on Fog and Mobile Edge Computing (FMEC 2020). Paris, France 30 Jun - 03 Jul 2020 Institute of Electrical and Electronics Engineers (IEEE). pp. 128-135
A survey of modern exogenous fault detection and diagnosis methods for swarm robotics
Graham Miller, O. and Gandhi, V. 2020. A survey of modern exogenous fault detection and diagnosis methods for swarm robotics. Journal of King Saud University – Engineering Science. 33 (1), pp. 43-53. https://doi.org/10.1016/j.jksues.2019.12.005
What makes a social robot good at interacting with humans?
Onyeulo, E. and Gandhi, V. 2020. What makes a social robot good at interacting with humans? Information. 11 (1), pp. 1-13. https://doi.org/10.3390/info11010043
Developing traffic prediction and congestion algorithms for a C-ITS network
Mehta, V., Gandhi, V. and Mapp, G. 2019. Developing traffic prediction and congestion algorithms for a C-ITS network. Second UK Mobile, Wearable and Ubiquitous Systems Research Symposium. Dept of Computer Science, University of Oxford, UK 01 Jul 2019
Exploring a security protocol for secure service migration in commercial cloud environments
Karthick, G., Mapp, G., Kammueller, F. and Aiash, M. 2017. Exploring a security protocol for secure service migration in commercial cloud environments. ICC’17. Cambridge University, Cambridge 22 Mar 2019 ICC’17, Cambridge, United Kingdom © 2017 ACM.. pp. 1-6 https://doi.org/10.1145/3018896.3056795
Wrist movement detector for ROS based control of the robotic hand
Krawczyk, M., Yang, Z., Gandhi, V., Karamanoglu, M., Franca, F., Priscila, L., Xiaochen, W. and Geng, T. 2018. Wrist movement detector for ROS based control of the robotic hand. Advances in Robotics & Automation. 7 (1). https://doi.org/10.4172/2168-9695.1000182
Development of an EMG-controlled mobile robot
Bisi, S., De Luca, L., Shrestha, B., Yang, Z. and Gandhi, V. 2018. Development of an EMG-controlled mobile robot. Robotics. 7 (3), pp. 1-13. https://doi.org/10.3390/robotics7030036
Investigating the impact of live migration on the network infrastructure in enterprise environments
Sinti, J., Jiffry, F. and Aiash, M. 2014. Investigating the impact of live migration on the network infrastructure in enterprise environments. Advanced Information Networking and Applications Workshops (WAINA), 2014 28th International Conference on. Victoria, Canada 13 - 16 May 2014 Institute of Electrical and Electronics Engineers (IEEE). pp. 154-159 https://doi.org/10.1109/WAINA.2014.34
A progressive approach to design authentication protocols for mobile heterogeneous networks
Kenaza, T., Aiash, M., Loo, J., Lasebae, A. and Whitney, G. 2016. A progressive approach to design authentication protocols for mobile heterogeneous networks. IEEE Trustcom/BigDataSE/I​SPA, 2016. Tianjin, China 23 - 26 Aug 2016 Institute of Electrical and Electronics Engineers (IEEE). pp. 1776-1781 https://doi.org/10.1109/trustcom.2016.0273
A security framework for node-to-node communications based on the LISP architecture
Kallash, M., Loo, J., Lasebae, A. and Aiash, M. 2018. A security framework for node-to-node communications based on the LISP architecture. International Journal of Electronic Security and Digital Forensics. 10 (3), pp. 276-291. https://doi.org/10.1504/IJESDF.2018.093024
ROS based autonomous control of a humanoid robot
Kalyani, G., Gandhi, V., Yang, Z. and Geng, T. 2016. ROS based autonomous control of a humanoid robot. 25th International Conference on Artificial Neural Networks (ICANN). Barcelona, Spain 06 - 09 Sep 2016 Springer. pp. 550-551 https://doi.org/10.1007/978-3-319-44778-0
Formalization and analysis of a resource allocation security protocol for secure service migration
Karthick, G., Mapp, G., Kammueller, F. and Aiash, M. 2018. Formalization and analysis of a resource allocation security protocol for secure service migration. IEEE/ACM International Conference on Utility and Cloud Computing (UCC2018). Zurich, Switzerland 17 - 20 Dec 2018 IEEE. pp. 207-212 https://doi.org/10.1109/UCC-Companion.2018.00058
Using robot operating system (ROS) and single board computer to control bioloid robot motion
Kalyani, G., Yang, Z., Gandhi, V. and Geng, T. 2017. Using robot operating system (ROS) and single board computer to control bioloid robot motion. 18th Towards Autonomous Robotic Systems (TAROS) Conference. Guildford, Surrey, UK 19 - 21 Jul 2017 Springer. pp. 41-50 https://doi.org/10.1007/978-3-319-64107-2_4
Exploring a security protocol for secure service migration in commercial cloud environments
Karthick, G., Mapp, G., Kammueller, F. and Aiash, M. 2017. Exploring a security protocol for secure service migration in commercial cloud environments. 2nd International Conference on Internet of Things, Data and Cloud Computing (ICC 2017). Churchill College, University of Cambridge, United Kingdom 22 - 23 Mar 2017 Association for Computing Machinery (ACM). https://doi.org/10.1145/3018896.3056795
Exploring a new security framework for cloud storage using capabilities
Mapp, G., Aiash, M., Ondiege, B. and Clarke, M. 2014. Exploring a new security framework for cloud storage using capabilities. 1st International Workshop on Cyber Security and Cloud Computing, a workshop of SOSE. Oxford, United Kingdom 07 - 11 Apr 2014 Institute of Electrical and Electronics Engineers (IEEE). pp. 484-489 https://doi.org/10.1109/SOSE.2014.69
Dynamic traffic management for interactive cloud services: localising traffic based on network throughput and user mobility
Sardis, F., Mapp, G., Loo, J. and Aiash, M. 2014. Dynamic traffic management for interactive cloud services: localising traffic based on network throughput and user mobility. 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing (UCC),. London, UK 08 - 11 Dec 2014 Institute of Electrical and Electronics Engineers (IEEE). pp. 298-306 https://doi.org/10.1109/UCC.2014.39
Neuron-based control mechanisms for a robotic arm and hand
Singh, N., Huyck, C., Gandhi, V. and Jones, A. 2017. Neuron-based control mechanisms for a robotic arm and hand. International Journal of Computer, Electrical, Automation, Control and Information Engineering. 11 (2), pp. 221-229. https://doi.org/10.5281/zenodo.1128871
Machine learning based botnet identification traffic
Azab, A., Alazab, M. and Aiash, M. 2016. Machine learning based botnet identification traffic. 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-2016). Tianjin, China 23 - 26 Aug 2016 Institute of Electrical and Electronics Engineers (IEEE). pp. 1788-1794 https://doi.org/10.1109/TrustCom.2016.0275
Enhancing the SVDD accuracy in Intrusion Detection Systems by removing external voids
Kenaza, T., Bennaceur, K., Labed, A. and Aiash, M. 2016. Enhancing the SVDD accuracy in Intrusion Detection Systems by removing external voids. 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16). Tianjin, China 23 - 25 Aug 2016 Institute of Electrical and Electronics Engineers (IEEE). pp. 1765-1770 https://doi.org/10.1109/TrustCom.2016.0271
Toward an efficient ontology-based event correlation in SIEM
Kenazag, T. and Aiash, M. 2016. Toward an efficient ontology-based event correlation in SIEM. 7th International Conference on Ambient Systems, Networks and Technologies (ANT2016). Madrid, Spain 23 - 26 May 2016 Elsevier. pp. 139-146 https://doi.org/10.1016/j.procs.2016.04.109
Software defined networking for wireless sensor networks: a survey
Hassan, M., Vien, Q. and Aiash, M. 2017. Software defined networking for wireless sensor networks: a survey. Advances in Wireless Communications and Networks. 3 (2), pp. 10-22. https://doi.org/10.11648/j.awcn.20170302.11
Mobile femtocell utilisation in LTE vehicular environment: vehicular penetration loss elimination and performance enhancement
Raheem, R., Lasebae, A., Aiash, M., Loo, J. and Colson, R. 2017. Mobile femtocell utilisation in LTE vehicular environment: vehicular penetration loss elimination and performance enhancement. Vehicular Communications. 9 (12), pp. 31-42. https://doi.org/10.1016/j.vehcom.2017.02.003
Interference Management and System Optimisation for Femtocells Technology in LTE and Future 4G/5G Networks
Raheem, R., Lasebae, A., Aiash, M., Loo, J., Colson, R. and Raheem, A. 2017. Interference Management and System Optimisation for Femtocells Technology in LTE and Future 4G/5G Networks. in: Yurish, S. (ed.) Advances in Networks, Security and Communications: Reviews - Volume 1 International Frequency Sensor Association Publishing.
Mobility management for vehicular user equipment in LTE/mobile femtocell networks
Raheem, R., Lasebae, A., Aiash, M. and Loo, J. 2017. Mobility management for vehicular user equipment in LTE/mobile femtocell networks. International Journal of Information Systems in the Service Sector. 9 (4), pp. 60-87. https://doi.org/10.4018/IJISSS.2017100105
Brain computer interface: a review
Parmar, P., Joshi, A. and Gandhi, V. 2015. Brain computer interface: a review. NUiCONE 2015: 5th Nirma University International Conference on Engineering. Nirma University, Ahmedabad, India 26 - 28 Nov 2015 Institute of Electrical and Electronics Engineers (IEEE). pp. 1-6 https://doi.org/10.1109/NUICONE.2015.7449615
A specification-based IDS for detecting attacks on RPL-based network topology
Le, A., Loo, J., Chai, K. and Aiash, M. 2016. A specification-based IDS for detecting attacks on RPL-based network topology. Information. 7 (2). https://doi.org/10.3390/info7020025
Performance evaluation of mobile users served by fixed and mobile femtocells in LTE networks
Raheem, R., Lasebae, A., Aiash, M. and Loo, J. 2016. Performance evaluation of mobile users served by fixed and mobile femtocells in LTE networks. Journal of Networking Technology. 7 (1), pp. 16-33.
Interference management for co-channel mobile femtocells technology in LTE networks
Raheem, R., Lasebae, A., Aiash, M. and Loo, J. 2016. Interference management for co-channel mobile femtocells technology in LTE networks. 2016 12th International Conference on Intelligent Environments (IE). London, United Kingdom 14 - 16 Sep 2016 IEEE. pp. 80-87 https://doi.org/10.1109/IE.2016.21
A formally verified access control mechanism for information centric networks
Aiash, M. and Loo, J. 2015. A formally verified access control mechanism for information centric networks. The 12th International Conference on Security and Cryptography (SECRYPT 2015). Colmar, Alsace, France 20 - 22 Jul 2015 SCITEPRESS - Science and Technology Publications. pp. 377-383 https://doi.org/10.5220/0005566303770383
Characterising information correlation in a stochastic Izhikevich neuron
Yang, Z., Gandhi, V., Karamanoglu, M. and Graham, B. 2015. Characterising information correlation in a stochastic Izhikevich neuron. International Joint Conference on Neural Networks (IJCNN 2015). Killarney, Republic of Ireland 12 - 17 Jul 2015 Institute of Electrical and Electronics Engineers (IEEE). pp. 1-5
EMG based elbow joint powered exoskeleton for biceps brachii strength augmentation
Krasin, V., Gandhi, V., Yang, Z. and Karamanoglu, M. 2015. EMG based elbow joint powered exoskeleton for biceps brachii strength augmentation. International Joint Conference on Neural Networks (IJCNN 2015). Killarney, Republic of Ireland 12 - 17 Jul 2015 Institute of Electrical and Electronics Engineers (IEEE). pp. 1-6 https://doi.org/10.1109/IJCNN.2015.7280643
Supporting communications in the IOTs using the location/ID split protocol: a security analysis
Lasebae, A., Loo, J., Aiash, M. and Raheem, A. 2013. Supporting communications in the IOTs using the location/ID split protocol: a security analysis. Future Generation Communication Technology (FGCT) 4- date of conference in full: 12-14 Nov. 2013. London, UK 12 - 14 Nov 2013 pp. 1-5
Will ToR achieve its goals in the "future internet"? : an empirical study of using ToR with cloud computing
Carnielli, A. and Aiash, M. 2015. Will ToR achieve its goals in the "future internet"? : an empirical study of using ToR with cloud computing. IEEE 29th International Conference on Advanced Information Networking and Applications Workshops (WAINA-2015). Gwangju, Korea 24 - 27 Mar 2015 Institute of Electrical and Electronics Engineers (IEEE). pp. 135-140
Supporting communication in information centric networks using the location/ID split protocol and time released caching
Aiash, M., Mapp, G. and Kallash, M. 2015. Supporting communication in information centric networks using the location/ID split protocol and time released caching. 2015 International Conference on Cloud Computing (ICCC). Riyadh, Saudi Arabia 26 - 29 Apr 2015 Institute of Electrical and Electronics Engineers. pp. 233-238 https://doi.org/10.1109/CLOUDCOMP.2015.7149657
Virtualization and cyber security: arming future security practitioners
Tharayanil, M., Whitney, G., Aiash, M. and Benzaid, C. 2015. Virtualization and cyber security: arming future security practitioners. IEEE Trustcom/BigDataSE/ISPA: EFINS 2015 The 2nd IEEE International Workshop on the Emerging Future Internet and Network Security. Helsinki, Finland 20 - 22 Aug 2015 Institute of Electrical and Electronics Engineers (IEEE). pp. 1398-1402 https://doi.org/10.1109/trustcom.2015.537
U-sphere: strengthening scalable flat-name routing for decentralized networks
Kos, J., Aiash, M., Loo, J. and Trček, D. 2015. U-sphere: strengthening scalable flat-name routing for decentralized networks. Computer Networks. 89, pp. 14-31. https://doi.org/10.1016/j.comnet.2015.07.006
Evaluating quantum neural network filtered motor imagery brain-computer interface using multiple classification techniques
Gandhi, V., Prasad, G., Coyle, D., Behera, L. and McGinnity, T. 2015. Evaluating quantum neural network filtered motor imagery brain-computer interface using multiple classification techniques. Neurocomputing. 170, pp. 161-167. https://doi.org/10.1016/j.neucom.2014.12.114
Introducing a hybrid infrastructure and information-centric approach for secure cloud computing
Aiash, M., Colson, R. and Kallash, M. 2015. Introducing a hybrid infrastructure and information-centric approach for secure cloud computing. IEEE 29th International Conference on Advanced Information Networking and Applications Workshops (WAINA-2015). Gwangju, Korea 24 - 27 Mar 2015 Institute of Electrical and Electronics Engineers (IEEE). pp. 154-159 https://doi.org/10.1109/WAINA.2015.80
A formal analysis of authentication protocols for mobile devices in next generation networks
Aiash, M. 2015. A formal analysis of authentication protocols for mobile devices in next generation networks. Concurrency and Computation: Practice and Experience. 27 (12), pp. 2938-2953. https://doi.org/10.1002/cpe.3260
An integrated authentication and authorization approach for the network of information architecture
Aiash, M. and Loo, J. 2015. An integrated authentication and authorization approach for the network of information architecture. Journal of Network and Computer Applications. 50, pp. 73-79. https://doi.org/10.1016/j.jnca.2014.06.004
Challenges and solutions for secure information centric networks: a case study of the NetInf architecture
Loo, J. and Aiash, M. 2015. Challenges and solutions for secure information centric networks: a case study of the NetInf architecture. Journal of Network and Computer Applications. 50, pp. 64-72. https://doi.org/10.1016/j.jnca.2014.06.003
A secure framework for communications in heterogeneous networks
Aiash, M., Mapp, G., Lasebae, A. and Loo, J. 2014. A secure framework for communications in heterogeneous networks. WAINA 2014 28th International Conference on Advanced Information Networking and Applications Workshops. Victoria, BC 13 - 16 May 2014 pp. 841-846
Secure live virtual machines migration: issues and solutions
Aiash, M., Mapp, G. and Gemikonakli, O. 2014. Secure live virtual machines migration: issues and solutions. IEEE AINA 2014. Victoria, BC, Canada 13 - 16 May 2014
Brain-computer interfacing for assistive robotics: electroencephalograms, recurrent quantum neural networks and user-centric graphical user interfaces
Gandhi, V. 2014. Brain-computer interfacing for assistive robotics: electroencephalograms, recurrent quantum neural networks and user-centric graphical user interfaces. Elsevier.
EEG-based mobile robot control through an adaptive brain–robot interface
Gandhi, V., Prasad, G., Coyle, D., Behera, L. and McGinnity, T. 2014. EEG-based mobile robot control through an adaptive brain–robot interface. IEEE Transactions on Systems Man and Cybernetics: Systems. 44 (9), pp. 1278-1285. https://doi.org/10.1109/TSMC.2014.2313317
Introducing a novel authentication protocol for secure services in heterogeneous environments using Casper/FDR
Aiash, M. and Loo, J. 2014. Introducing a novel authentication protocol for secure services in heterogeneous environments using Casper/FDR. International Journal of Communication Systems. 27 (12), pp. 3600-3618. https://doi.org/10.1002/dac.2561
Image classification based on textural features using Artificial Neural Network (ANN)
Shah, S. and Gandhi, V. 2004. Image classification based on textural features using Artificial Neural Network (ANN). Journal of The Institution of Engineers (India): Series A. 84, pp. 72-77.
Image classification based on textural features using unsupervised neural network
Gandhi, V. 2006. Image classification based on textural features using unsupervised neural network. 1st International Indian Geographical Congress. Hyderabad, India 05 - 07 Oct 2006
A recurrent quantum neural network model enhances the EEG signal for an improved brain-computer interface
Gandhi, V., Arora, V., Behera, L., Prasad, G., Coyle, D. and McGinnity, T. 2011. A recurrent quantum neural network model enhances the EEG signal for an improved brain-computer interface. in: IET Seminar on Assisted Living 2011 London Institution of Engineering and Technology. pp. 42-47
Quantum neural network based surface EMG signal filtering for control of robotic hand
Gandhi, V. and McGinnity, M. 2013. Quantum neural network based surface EMG signal filtering for control of robotic hand. IJCNN 2013: The International Joint Conference on Neural Networks. Dallas, TX, USA 04 - 09 Aug 2013
Concern level assessment: building domain knowledge into a visual system to support network-security situation awareness
Kodagoda, N., Attfield, S., Choudhury, S., Rooney, C., Mapp, G., Nguyen, P., Slabbert, L., Wong, B., Aiash, M., Zheng, Y., Xu, K. and Lasebae, A. 2014. Concern level assessment: building domain knowledge into a visual system to support network-security situation awareness. Information Visualization. 13 (4), pp. 346-360. https://doi.org/10.1177/1473871613490291
Integrating mobility, quality-of-service and security in future mobile networks
Aiash, M., Mapp, G., Lasebae, A., Phan, R. and Loo, J. 2013. Integrating mobility, quality-of-service and security in future mobile networks. in: Ao, S. and Gelman, L. (ed.) Electrical Engineering and Intelligent Systems New York Springer.
A novel security protocol for resolving addresses in the location/ID split architecture
Aiash, M. 2013. A novel security protocol for resolving addresses in the location/ID split architecture. The 7th International Conference on Network and System Security (NSS 2013). Spain 03 - 04 Jun 2013
Securing address registration in location/ID split protocol using ID-based cryptography
Aiash, M., Al-Nemrat, A. and Preston, D. 2013. Securing address registration in location/ID split protocol using ID-based cryptography. Tsaoussidis, V., Kassler, A., Koucheryavy, Y. and Mellouk, A. (ed.) In proceeding of: The 11th International Conference on Wired/Wireless Internet Communications WWIC 2013. Russia 05 - 07 Jun 2013 Springer. https://doi.org/10.1007/978-3-642-38401-1_10
An integrated approach to QoS and security in future mobile networks using the Y-Comm framework
Aiash, M. 2012. An integrated approach to QoS and security in future mobile networks using the Y-Comm framework. PhD thesis Middlesex University School of Engineering and Information Sciences
From fixed to mobile femtocells in LTE systems: issues and challenges
Raheem, R., Lasebae, A., Aiash, M. and Loo, J. 2013. From fixed to mobile femtocells in LTE systems: issues and challenges. 2013 Second International Conference on Future Generation Communication Technology (FGCT). London, United Kingdom 12 - 14 Nov 2013 Institute of Electrical and Electronics Engineers (IEEE). pp. 207-212 https://doi.org/10.1109/FGCT.2013.6767218
Intelligent adaptive user interfaces for BCI based robotic control
Gandhi, V., Prasad, G., McGinnity, M., Coyle, D. and Behera, L. 2013. Intelligent adaptive user interfaces for BCI based robotic control. BCI meeting. USA Graz University of Technology Publishing House. https://doi.org/10.3217/978-3-85125-260-6-130
Quantum neural network-based EEG filtering for a brain-computer interface
Gandhi, V., Prasad, G., Coyle, D., Behera, L. and McGinnity, T. 2013. Quantum neural network-based EEG filtering for a brain-computer interface. IEEE Transactions on Neural Networks and Learning Systems. https://doi.org/10.1109/TNNLS.2013.2274436
On the investigation of cloud-based mobile media environments with service-populating and QoS-aware mechanisms
Sardis, F., Mapp, G., Loo, J., Aiash, M. and Vinel, A. 2013. On the investigation of cloud-based mobile media environments with service-populating and QoS-aware mechanisms. IEEE Transactions on Multimedia. 15 (4), pp. 769-777. https://doi.org/10.1109/TMM.2013.2240286
Exploiting location and contextual information to develop a comprehensive framework for proactive handover in heterogeneous environments
Mapp, G., Katsriku, F., Aiash, M., Chinnam, N., Lopes, R., Moreira, E., Vanni, R., Augusto, M., Middlesex University and University of Sao Paulo 2012. Exploiting location and contextual information to develop a comprehensive framework for proactive handover in heterogeneous environments. Journal of Computer Networks and Communications. https://doi.org/10.1155/2012/748163
A formally verified device authentication protocol using Casper/FDR
Aiash, M., Mapp, G., Phan, R., Lasebae, A. and Loo, J. 2012. A formally verified device authentication protocol using Casper/FDR. Min, G., Wu, Y., Liu, L., Jin, X., Jarvis, S. and Al-Dubai, A. (ed.) 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-2012). Liverpool, UK 25 - 27 Jun 2012 IEEE. pp. 1293-1298 https://doi.org/10.1109/TrustCom.2012.27
A survey of potential architectures for communication in heterogeneous networks
Aiash, M., Mapp, G., Lasebae, A., Loo, J., Sardis, F., Phan, R., Augusto, M., Moreira, E. and Vanni, R. 2012. A survey of potential architectures for communication in heterogeneous networks. IEEE Wireless Telecommunications Symposium (WTS 2012). London 18 - 20 Apr 2012 IEEE. pp. 1-6 https://doi.org/10.1109/WTS.2012.6266121
Security and QoS integration for protecting service providers in hterogeneous environments
Aiash, M., Mapp, G. and Lasebae, A. 2011. Security and QoS integration for protecting service providers in hterogeneous environments. International Journal of Computer Science. 38 (4), pp. 384-393.
EEG filtering with quantum neural networks for a Brain-Computer Interface (BCI)
Gandhi, V., Prasad, G., Coyle, D., Behera, L. and McGinnity, T. 2012. EEG filtering with quantum neural networks for a Brain-Computer Interface (BCI). Young researchers futures meeting: Neural engineering. University of Warwick 19 - 21 Sep 2012 pp. 21
6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach
Le, A., Loo, J., Lasebae, A., Aiash, M. and Luo, Y. 2012. 6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach. International Journal of Communication Systems. 25 (9), pp. 1189-1212. https://doi.org/10.1002/dac.2356
M-Sieve: a visualisation tool for supporting network security analysts
Choudhury, S., Kodagoda, N., Nguyen, P., Rooney, C., Attfield, S., Xu, K., Zheng, Y., Wong, B., Chen, R., Mapp, G., Slabbert, L., Aiash, M. and Lasebae, A. 2012. M-Sieve: a visualisation tool for supporting network security analysts. VisWeek 2012. Seattle, WA, USA 14 - 19 Oct 2012
A formally verified AKA protocol for vertical handover inheterogeneous environments using Casper/FDR
Aiash, M., Mapp, G., Lasebae, A., Phan, R. and Loo, J. 2012. A formally verified AKA protocol for vertical handover inheterogeneous environments using Casper/FDR. EURASIP Journal on Wireless Communications and Networking. 2012 (57). https://doi.org/10.1186/1687-1499-2012-57
Exploring the concept of scope to provide better security for internet services.
Aiash, M., Mapp, G., Lasebae, A., Phan, R., Middlesex University and Loughborough University 2011. Exploring the concept of scope to provide better security for internet services. First Global Conference on Communication, Science and Engineering (CCSIE 2011). Middlesex University 25 - 27 Jul 2011
Enhancing naming and location services to support multi-homed devices in heterogeneous environments
Aiash, M., Mapp, G., Lasebae, A., Phan, R., Augusto, M., Vanni, R., Moreira, E., Middlesex University, Loughborough University and University of Sao Paulo 2011. Enhancing naming and location services to support multi-homed devices in heterogeneous environments. First Conference on Communication, Science and Information Enginneering (CCSIE 2011). Middlesex University 25 - 27 Jul 2011
A QoS framework for heterogeneous networking
Aiash, M., Mapp, G., Lasebae, A., Augusto, M., Vanni, R. and Moreira, E. 2011. A QoS framework for heterogeneous networking. ICWN'11: The 2011 International Conference of Wireless Networks (held as part of WCE 2011). London, UK 06 - 08 Jul 2011
Exploring multi-homing issues in heterogeneous networks
Mapp, G., Aiash, M., Guardia, H., Crowcroft, J., Institute of Electrical and Electronics Engineers, Middlesex University, Federal University of Sao Paulo and University of Cambridge 2011. Exploring multi-homing issues in heterogeneous networks. IEEE. pp. 690-695 https://doi.org/10.1109/WAINA.2011.140
A novel EEG signal enhancement approach using a recurrent quantum neural network for a Brain Computer Interface
Gandhi, V., Prasad, G., Coyle, D., Behera, L. and McGinnity, M. 2011. A novel EEG signal enhancement approach using a recurrent quantum neural network for a Brain Computer Interface. Technically Assisted Rehabilitation. Berlin, Germany 17 - 18 Mar 2011
An intelligent Adaptive User Interface (iAUI) for enhancing the communication in a Brain-Computer Interface (BCI)
Gandhi, V., Prasad, G., Coyle, D., Behera, L. and McGinnity, M. 2011. An intelligent Adaptive User Interface (iAUI) for enhancing the communication in a Brain-Computer Interface (BCI). UKIERI workshop on the Fusion of Brain-Computer Interface and Assistive Robotics. University of Ulster 07 - 08 Jul 2011
EEG denoising with a recurrent quantum neural network for a brain-computer interface
Gandhi, V., Arora, V., Behera, L., Prasad, G., Coyle, D. and McGinnity, T. 2011. EEG denoising with a recurrent quantum neural network for a brain-computer interface. 2011 International Joint Conference on Neural Networks (IJCNN). San Jose, CA, USA 31 Jul - 05 Aug 2011 IEEE. pp. 1583-1590 https://doi.org/10.1109/IJCNN.2011.6033413
Providing security in 4G systems: unveiling the challenges
Aiash, M., Mapp, G., Lasebae, A., Phan, R., Middlesex University and Loughborough University 2010. Providing security in 4G systems: unveiling the challenges. Atmaca, T., Palicot, J., Amor, N., Tsiatsos, T., Marot, M. and Dini, O. (ed.) IEEE. pp. 439-444 https://doi.org/10.1109/AICT.2010.24
Security models for heterogeneous networking
Mapp, G., Aiash, M., Lasebae, A. and Phan, R. 2010. Security models for heterogeneous networking. Katsikas, S. (ed.) 4th International Conference on Security and Cryptography. Athens, Greece 26 - 28 Jul 2010 IEEE. pp. 1-4
Interfacing a dynamic interface paradigm for multiple target selection using a two class brain-computer interface
Gandhi, V., Coyle, D., Prasad, G., Bharti, C., Behera, L. and McGinnity, M. 2009. Interfacing a dynamic interface paradigm for multiple target selection using a two class brain-computer interface. Indo-US Workshop on System of Systems Engineering. IIT Kanpur, India 26 - 28 Oct 2009 https://doi.org/10.1049/cp.2009.1690
A novel paradigm for multiple target selection using a two class brain computer interface
Gandhi, V., Prasad, G., Coyle, D., Behera, L. and McGinnity, M. 2009. A novel paradigm for multiple target selection using a two class brain computer interface. Irish Signal & Systems Conference. Dublin, Ireland 10 - 11 Jun 2009 Dublin IET. https://doi.org/10.1049/cp.2009.1690
Exploring efficient imperative handover mechanisms for heterogeneous wireless networks
Mapp, G., Shaikh, F., Aiash, M., Vanni, R., Augusto, M. and Moreira, E. 2009. Exploring efficient imperative handover mechanisms for heterogeneous wireless networks. Duresi, A., Barolli, L., Enokido, T., Uehara, M., Shakshuki, E. and Takizawa, M. (ed.) 12th International Conference on Network-Based Information Systems. Indianapolis, Indiana 19 - 21 Aug 2009 IEEE. pp. 286-291 https://doi.org/10.1109/NBiS.2009.95