Architecture, Computing & Engineering


TitleArchitecture, Computing & Engineering
ACE
TypeSchool
UniversityUEL
DeanDr Seyed Ghorashi
Research AdministratorMrs Nazmin Uddin
Research Degrees LeaderDr Andrew Arewa
Dr Ameer Al-Nemrat
Examination OfficerMrs Nazmin Uddin

Latest research outputs

Sort by Date Title
"L'élément fluid": Magnetism, Radioactivity and Hélène Dufau's Transformism
Brauer, F. 2014. "L'élément fluid": Magnetism, Radioactivity and Hélène Dufau's Transformism. Fluid, The Society for Literature, Science and the Arts 28th Annual Conference. University of Dallas, Texas, USA 09 - 12 Oct 2014

Conference paper

5-pole High-Temperature Superconductor Bandpass Filter at 12 GHz using High Power TM010 mode of Microstrip Circular Patch
Yeo, Kenneth S.K. and Lancaster, Michael J. 2000. 5-pole High-Temperature Superconductor Bandpass Filter at 12 GHz using High Power TM010 mode of Microstrip Circular Patch.

Conference paper

5G innovation opportunities-- A discussion paper
Rhodes, Dan, Barker, David, Happy, David, Humphreys, David, Lund, David, Hamid, Falaki, Varrall, Geoff, Macdonald, Graham, Lota, J., Barrett, Mark, Beach, Mark, Fitch, Michael, Green, Mike, Dohler, Mischa, Juwad, Mohaned, Jenkins, Paul, Ni, Qiang, Tafazoli, Rahim, Sivalingam, Raj, Baban, Shaswar, Fletcher, Simon, Methley, Steve, Revell, Stuart, O'Farrell, Timothy, Webb, William and Ding, Zhiguo 2016. 5G innovation opportunities-- A discussion paper. Future Technologies Network, techUK.

Discussion paper

5G Uniform linear arrays with beamforming and spatial multiplexing at 28 GHz, 37 GHz, 64 GHz and 71 GHz for outdoor urban communication: A two-level approach
Lota, J., Sun, Shu, Rappaport, Theodore S. and Demosthenous, Andreas 2017. 5G Uniform linear arrays with beamforming and spatial multiplexing at 28 GHz, 37 GHz, 64 GHz and 71 GHz for outdoor urban communication: A two-level approach. IEEE Transactions on Vehicular Technology. 66 (11), pp. 9972-9985. https://doi.org/10.1109/TVT.2017.2741260

Article

6.3 Local and overtopping scour
Jayaratne, R. 2022. 6.3 Local and overtopping scour. in: Shibayama, T. and Esteban, M. (ed.) Coastal Disaster Surveys and Assessment for Risk Mitigation CRC Press. pp. 166-174

Book chapter

8 pole high temperature superconductor microstrip dual band bandpass filter design
Yeo, K. and Lancaster, Michael J. 2011. 8 pole high temperature superconductor microstrip dual band bandpass filter design. in: Proceedings of 2011 IEEE MTT-S International Microwave Symposium IEEE. pp. 1-4

Book chapter

A best-effort integration framework for imperfect information spaces
Jaradat, A., Abu Halimeh, A., Deraman, A. and Safieddine, F. 2018. A best-effort integration framework for imperfect information spaces. International Journal of Intelligent Information and Database Systems. 11 (4), pp. 296 - 314. https://doi.org/10.1504/IJIIDS.2018.096592

Article

A brief review of instrument de-convolution of seismic data
Chanerley, A. and Alexander, Nick 2006. A brief review of instrument de-convolution of seismic data. Proceedings of Advances in Computing and Technology. (AC&T) The School of Computing and Technology 1st Annual Conference University of East London pp. 95-101

Conference paper

A case study of electronic signature applied in pre-employment screening industry
Kang, Miao and Mouratidis, Haralambos 2011. A case study of electronic signature applied in pre-employment screening industry. Advances in Computing and Technology. University of East London, London Jan 2011 London University of East London, School of Architecture Computing and Engineering.

Conference paper

A CASE tool to support automated modelling and analysis of security requirements
Pavlidis, M., Islam, S. and Mouratidis, H. 2012. A CASE tool to support automated modelling and analysis of security requirements. in: Nurcan, S. (ed.) IS Olympics: Information Systems in a Diverse World Springer. pp. 95-109

Book chapter

A Code of Conduct for Computer Forensic Investigators
Gay, James Ronald 2012. A Code of Conduct for Computer Forensic Investigators. Prof Doc Thesis University of East London School of Architecture Computing and Engineering https://doi.org/10.15123/PUB.1787

Prof Doc Thesis

A comparative analysis of process safety management (PSM) systems in the process industry
Nwankwo, C., Theophilus, S. C. and Arewa, A. 2020. A comparative analysis of process safety management (PSM) systems in the process industry. Journal of Loss Prevention in the Process Industries. 66 (Art. 104171). https://doi.org/10.1016/j.jlp.2020.104171

Article

A Comparative Study of Time and Frequency Domain Approaches to Deep Learning based Speech Enhancement
Abdallah Abdelhafiz Nossier, S., Wall, J., Moniri, M., Glackin, C. and Cannings, N. 2020. A Comparative Study of Time and Frequency Domain Approaches to Deep Learning based Speech Enhancement. 2020 International Joint Conference on Neural Networks (IJCNN). Glasgow, UK 19 - 24 Jul 2020 IEEE. https://doi.org/10.1109/IJCNN48605.2020.9206928

Conference paper

A Comparison of Cloud Computing Platforms
Nwobodo, Ikechukwu 2015. A Comparison of Cloud Computing Platforms. International Symposium on Circuits and Systems (ISCAS). Lisbon, Portugal 24 - 27 May 2015 Atlantis Press.

Conference paper

A comparison of fixed final time optimal control computational methods with a view to closed loop implementation using artificial neural networks
Matieni, Xavier and Dodds, Stephen J. 2009. A comparison of fixed final time optimal control computational methods with a view to closed loop implementation using artificial neural networks. Proceedings of Advances in Computing and Technology. (AC&T) The School of Computing and Technology 4th Annual Conference University of East London pp. 151-159

Conference paper

A comparison of sound localisation techniques using cross-correlation and spiking neural networks for mobile robotics
Wall, J., McGinnity, Thomas M. and Maguire, Liam P. 2011. A comparison of sound localisation techniques using cross-correlation and spiking neural networks for mobile robotics. Neural Networks (IJCNN), The 2011 International Joint Conference on. San Jose, CA 31 Jul - 05 Aug 2011 IEEE. pp. 1981-1987

Conference paper

A Comparison of Two Hidden Markov Approaches to Task Identification in the Home Environment
Naeem, U. and Bigham, John 2007. A Comparison of Two Hidden Markov Approaches to Task Identification in the Home Environment. Proceedings of the 2nd International Conference on Pervasive Computing and Applications, Birmingham, UK, 2007, pp. 383-388

Conference paper

A comparison of two robust control techniques for throttle valve control subject to nonlinear friction
Dodds, Stephen J. 2011. A comparison of two robust control techniques for throttle valve control subject to nonlinear friction. Advances in Computing and Technology. University of East London, London Jan 2011 London University of East London, School of Architecture Computing and Engineering.

Conference paper

A Comprehensive Digital Forensic Investigation Model and Guidelines for Establishing Admissible Digital Evidence
Ademu, Inikpi Onechojo 2013. A Comprehensive Digital Forensic Investigation Model and Guidelines for Establishing Admissible Digital Evidence. MPhil Thesis University of East London Architecture Computing and Engineering https://doi.org/10.15123/PUB.4982

MPhil Thesis

A Comprehensive Reasoning Framework for Hardware Refresh in Data Centers
Bashroush, R. 2018. A Comprehensive Reasoning Framework for Hardware Refresh in Data Centers. IEEE Transactions on Sustainable Computing. 3 (4), pp. 209-220. https://doi.org/10.1109/TSUSC.2018.2795465

Article

A Comprehensive Review of Mobile User Interfaces in mHealth applications for elderly and the related ageing barriers
Ramdowar, H., Khedo, K, K. and Chooramun, N. 2023. A Comprehensive Review of Mobile User Interfaces in mHealth applications for elderly and the related ageing barriers . Universal Access in the Information Society. In Press. https://doi.org/10.1007/s10209-023-01011-z

Article

A comprehensive review on the use of hemp in concrete
Barbhuiya, S. and Bhusan Das, B. 2022. A comprehensive review on the use of hemp in concrete. Construction and Building Materials. 341 (Art. 127857). https://doi.org/10.1016/j.conbuildmat.2022.127857

Article

A comprehensive review towards sustainable approaches on the processing and treatment of construction and demolition waste
Trivedi, S. S., Snehal, K., Das, B. B. and Barbhuiya, S. 2023. A comprehensive review towards sustainable approaches on the processing and treatment of construction and demolition waste. Construction and Building Materials. 393 (Art. 132125). https://doi.org/10.1016/j.conbuildmat.2023.132125

Article

A Conceptual Model for Climatic-responsive Vernacular Architectural Forms
Kamalifard, S. and Assadi Langroudi, A. 2018. A Conceptual Model for Climatic-responsive Vernacular Architectural Forms. in: Elsharkaway, H., Zahiri, S. and Clough, J. (ed.) International Conference for Sustainable Design of the Built Environment (SDBE 2018): Proceedings International Conference for Sustainable Design of the Built Environment (SDBE 2018). pp. 575-588

Book chapter

A conceptual model for loess in England: Principles and applications
Assadi Langroudi, A. 2019. A conceptual model for loess in England: Principles and applications. Proceedings of the Geologists' Association. 130 (2), pp. 115-125. https://doi.org/10.1016/j.pgeola.2018.12.003

Article

A Constraint-based approach for modeling secure multiagent systems
Giorgini, Paolo and Mouratidis, Haralambos 2004. A Constraint-based approach for modeling secure multiagent systems. Milani, A. ed

Conference paper

A Conversational AI Approach to Detecting Deception and Tackling Insurance Fraud
Wall, J. 2021. A Conversational AI Approach to Detecting Deception and Tackling Insurance Fraud. Tenth International Conference on Intelligent Computing and Information Systems (ICICIS). Cairo, Egypt 05 - 07 Dec 2021 IEEE. https://doi.org/10.1109/ICICIS52592.2021.9694118

Conference keynote

A Cost Effective and Light Weight Unipolar Electroadhesion Pad Technology for Adhesion Mechanism of Wall Climbing Robot
Yehya, Muhammd Irshad, Hussain, Salman, Wasim, Ahmad, Jahanza, Mirza and Abdalla, H. 2016. A Cost Effective and Light Weight Unipolar Electroadhesion Pad Technology for Adhesion Mechanism of Wall Climbing Robot. International Journal of Robotics and Mechatronics. 2 (1), pp. 1-10.

Article

A Cost Effective Cloud Datacenter Capacity Planning Method Based on Modality Cost Analysis
Bashroush, R. and Nouriddine, Moustafa 2013. A Cost Effective Cloud Datacenter Capacity Planning Method Based on Modality Cost Analysis. International Journal of Communication Networks and Distributed Systems. 11 (3), pp. 250-261.

Article

A CPL to Java compiler for dynamic service personalization in JAIN-SIP server
Falcarin, P. 2004. A CPL to Java compiler for dynamic service personalization in JAIN-SIP server. IEC Annual Review of Communications.

Article

A Cross-Shore Beach Profile Evolution Model
Jayaratne, R., Rahman, MD Rezaur and Shibayama, Tomoya 2015. A Cross-Shore Beach Profile Evolution Model. Coastal Engineering Journal. 56 (04), p. 1450020.

Article

A CRS Oedometer Cell for Unsaturated and Non-Isothermal Tests
Bagheri, M., Mousavi-Nezhad, M. and Rezania, M. 2020. A CRS Oedometer Cell for Unsaturated and Non-Isothermal Tests. Geotechnical Testing Journal. 43 (1), pp. 20-37. https://doi.org/10.1520/GTJ20180204

Article

A CSI-based Human Activity Recognition using Canny Edge Detector
Shahverdi, H., Moshiri, P. F., Nabati, M., Asvadi, R. and Ghorashi, S. 2024. A CSI-based Human Activity Recognition using Canny Edge Detector. in: Ahad, M., Inoue, S., Lopez, G. and Hossain, T. (ed.) Human Activity and Behavior Analysis: Advances in Computer Vision and Sensors: Volume 2 CRC Press: Taylor & Francis Group. pp. 67-82

Book chapter

A CSI-Based Human Activity Recognition Using Deep Learning
Fard Moshiri, P., Shahbazian, R., Nabati, M. and Ghorashi, S. A. 2021. A CSI-Based Human Activity Recognition Using Deep Learning. Sensors. https://doi.org/10.3390/s21217225

Article

A Data-Driven Threat Modelling Language for Ensuring Cyber Security Assurance
Alwaheidi, M. 2024. A Data-Driven Threat Modelling Language for Ensuring Cyber Security Assurance. PhD Thesis University of East London School of Architecture, Computing and Engineering https://doi.org/10.15123/uel.8xx0x

PhD Thesis

A Decision Framework Model for Migration into Cloud: Business, Application, Security and Privacy Perspectives
Islam, S., Weippl, Edgar R. and Krombholz, Katharina 2014. A Decision Framework Model for Migration into Cloud: Business, Application, Security and Privacy Perspectives. in: Proceedings of the 16th International Conference on Information Integration and Web-based Applications & Services New York, NY, USA Association for Computing Machinery (ACM). pp. 185-189

Book chapter

A Deep Learning Based Suggested Model to Detect Necrotising Enterocolitis in Abdominal Radiography Images
Van Druten, J., Sharif, S., Chan, S. S., Chong, C. and Abdalla, H. 2019. A Deep Learning Based Suggested Model to Detect Necrotising Enterocolitis in Abdominal Radiography Images. IEEE International Conference on Computing, Electronics & Communications Engineering 2019 (IEEE iCCECE '19) . London Metropolitan University, London, UK 22 - 23 Aug 2019 IEEE. https://doi.org/10.1109/iCCECE46942.2019.8941615

Conference paper

A Deep Learning Speech Enhancement Architecture Optimised for Speech Recognition and Hearing Aids
Nossier, S. A., Wall, J., Moniri, M., Glackin, C. and Cannings, N. 2023. A Deep Learning Speech Enhancement Architecture Optimised for Speech Recognition and Hearing Aids. The 35th IEEE International Conference on Tools with Artificial Intelligence (ICTAI). Atlanta, Georgia (USA) 06 - 08 Nov 2023 IEEE Computer Society. https://doi.org/10.1109/ICTAI59109.2023.00088

Conference paper

A Design Recording Framework to Facilitate Knowledge Sharing in Collaborative Software Engineering
Kyaw, Phyo, Boldyreff, Cornelia and Rank, Stephen 2003. A Design Recording Framework to Facilitate Knowledge Sharing in Collaborative Software Engineering. 2nd IASTED International Conference on Information and Knowledge Sharing. Scottsdale, Arizona, USA 17 - 19 Nov 2003 ACTA Press. pp. 70-88

Conference paper

A Dynamic Access Control Model Using Authorising Workflow and Task-Role-Based Access Control
Uddin, M., Islam, S. and Al-Nemrat, A. 2019. A Dynamic Access Control Model Using Authorising Workflow and Task-Role-Based Access Control. IEEE Access. 7 (Art. 166676). https://doi.org/10.1109/ACCESS.2019.2947377

Article

  • 267931
    total views
  • 299964
    total downloads
  • 4603
    views this month
  • 2791
    downloads this month

People

Abba, Abdulrazaq

Abbas, Ali

Abbdalla, Khalid

Abou-Grad, Hisham

Adnan, Adnan

Ahad, Md Atiqur Rahman

Ahmed, Mahmud

Ahmed, Tauseef

Al-Nemrat, Ameer

Alexis, Solomon

Alkhateeb, Mugdad

Amirhosseini, Mohammad

Annan, Joseph

Apeagyei, Alex

Arewa, Andrew

Arunachalam, Subramaniam

Assadi Langroudi, Arya Assadi

Auwal, Bilyaminu

Ayoub, Ashraf

Bagheri, Meghdad

Baig, Hasan

Barbhuiya, Salim

Bashroush, Rabih

Baty, Stephen

Belen Saglam, Rahime

Berardinelli, Nabeela

Bloch, Isaie

Bombo, Paul

Callaghan, Carl

Catina, Alexander

Catmur, Sarah

Chandler, Alan

Chooramun, Nitish

Christou, Philip

Ciupala, Anca

Clark, Jonathan

Cobo Displas, Isaac

Cockram, John

Coombs, Daniel

D'Andrea, Alice

Da Palma Romao, Claudia

De Souza, Pauline

Do Rosario Benros, Deborah

Doherty, Gary

Donyavi, Sohrab

Edoh Jnr, Aloysius

Eze, Elias

Falugi, Paola

Francis, Amanda

Fretton, Anthony

Gallagher, Pol

Garvey, Robert

Georgescu, Maria

Georgeson, Michael

Ghazanfar, Mustansar Ali

Ghorashi, Seyed

Ginsburgh, Susan

Greenleaf, Paul

Groothuizen, Christian

Gutierrez Rivas, Armor

Hadrys, Christoph

Haider, Umaima

Hakimazari, Hamid

Hammad, Rawad

Harding, Alexis

Harris, Charlotte

Hart, Alicia

Hashemi, Arman

Healy, Cornelius

Hedges, Russell

Hossain, Shahera

Hurst, Mike

Imran, Yasir

Ioakim, Andrew

Ismail, Umar

Jafari, Fahimeh

Jamshidi, Mohsen

Jayaratne, Ravindra

Jones, Luke

Jungfer, Carsten

Kans, Aaron

Karami, Amin

Karandinou, Anastasia

Karthaus, Roland

Khatoon, Shaheen

Kogawa, Toshiya

Kozminihs, Dmitrijs

Kure, Halima

Latham, Richard

Lee, Ka Lok

Li, Yang

Lifschitz, Sharone

Lota, Jaswinder

Maelzer, Lee

Mahmood, Azhar

Mahmood, Shahid

Malik, Gaurav

Martinez-Aleman, Carmen

Mcguire, Emma

Meibodi, Amir

Memou, Antigoni

Minton, Anna

Mohammad, Rasha

Mollasalehi, Sajedeh

Moniri, Mansour

Morad, Samir

Mungroo, Pat

Naghibi, Elnaz

Nakagawa, Miho

Nepal, Jaya

Nita, Lucian

Ogbebor, William

Palmieri, Palmieri

Parekh, Dhara

Parisi, Luana

Patel, Kiran

Pawlik, Maciej

Penny, Clare

Pezeron, Valerie

Phillips, Catherine

Pinsky, Michael

Pollak, Maria

Pyecroft, Robert

Qazi, Nadeem

Qureshi, Jawed

Rabbani, Mohammad

Ramly, Athirah Binti

Raney, Karen

Roelofsma, Michele

Rogina, Rosa

Safieddine, Fadi

Saleem, Komal

Schultze-Westrum, Stephanie

Senatore, Alfonso

Serrano, Teresa

Sharif, Saeed

Shaw, Debra

Siddiqui, Arish

Sieczak, Anna

Stevenson, Kim

Sutharssan, Thamo

Tajima, Keita

Tann, David

Tansen, Kazi

Tu, Wenlin

Walsh, John

Whang, Seoung Wook

Winter, Keith

Wirz, Fulvio

Wiseman, Adam

Wright, Andrew

Zandi, Shahrokh

Zealey, Samuel

Zorto, Abin