Carsten Maple

Carsten Maple
The University of Warwick

About

186
Publications
38,363
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,576
Citations
Citations since 2016
12 Research Items
948 Citations
2016201720182019202020212022050100150
2016201720182019202020212022050100150
2016201720182019202020212022050100150
2016201720182019202020212022050100150

Publications

Publications (186)
Article
Full-text available
Mobile app developers are often obliged by regulatory frameworks to provide a privacy policy in natural comprehensible language to describe their apps’ privacy practices. However, prior research has revealed that: (1) not all app developers offer links to their privacy policies; and (2) even if they do offer such access, it is difficult to determin...
Article
Full-text available
The safe and efficient function of critical national infrastructure (CNI) relies on the accurate demand forecast. Cyber-physical system-based demand forecasting systems (CDFS), typically found in CNI (such as energy, water, and transport), are highly vulnerable to being compromised under false data injection attacks (FDIAs). The problem is that the...
Preprint
Full-text available
Recent research has shown that the security of power grids can be seriously threatened by botnet-type cyber attacks that target a large number of high-wattage smart electrical appliances owned by end-users. Accurate detection and localization of such attacks is of critical importance in limiting the damage. To this end, the paper proposes a novel t...
Poster
Full-text available
This study explored the cybersecurity threats posed by the rising integration of high-wattage internet-of-things (IoT)- enabled devices (e.g., WiFi-enabled air conditioners, electric vehicles, etc.) into the operation of the power grid as a cyber physical system (CPS).
Article
Full-text available
Advances in edge computing are powering the development and deployment of Internet of Things (IoT) systems to provide advanced services and resource efficiency. However, large‐scale IoT‐based load‐altering attacks (LAAs) can seriously impact power grid operations, such as destabilising the grid's control loops. Timely detection and identification o...
Article
Full-text available
Recently there has been a surge of interest in adopting deep neural networks (DNNs) for solving the optimal power flow (OPF) problem in power systems. Computing optimal generation dispatch decisions using a trained DNN takes significantly less time when compared to conventional optimization solvers. However, a major drawback of existing work is tha...
Article
Full-text available
Recently there has been a surge of interest in adopting deep neural networks (DNNs) for solving the optimal power flow (OPF) problem in power systems. Computing optimal generation dispatch decisions using a trained DNN takes significantly less time when compared to conventional optimization solvers. However, a major drawback of existing work is tha...
Chapter
Sit-to-stand (STS) difficulties are common among elderly because of the decline of their cognitive capabilities and motor functions. The way to help is to encourage them to practice their own functions and to assist only at the point where they need during STS processes. The provision of such support requires the elderly’s intention of standing up...
Conference Paper
In this paper, we describe how a semiotic ladder, together with a supportive trust agent, can be used to address "soft" trust issues in the context of collaborative Virtual Organisations (VO). The intention is to offer all parties better support for trust (as reputation) management including the reduction of risk and improved reliability of VO e-se...
Conference Paper
The Internet of Things (IoT) introduces a unique dimension to our relationships with smart Things as objects that belong to us and/or fulfil a direct or indirect objective for us. This relationship can be expected to gradually become one of reliance and maybe eventually one of complete trust. This paper argues that although human agents may increas...
Article
Full-text available
As a class of high-performance forward error correction codes, turbo codes, which can approach the channel capacity, could become a candidate of the coding methods in future terrestrial broadcasting (TB) systems. Among all the demands of future TB system, high throughput and low latency are two basic requirements that need to be met. Parallel turbo...
Article
This paper presents a survey of the contemporary assistive chairs and on-chair sensing approaches of capturing sit-to-stand (STS) movement. Sitting in a chair and standing up from a seated position are activities of daily living (ADLs) performed by humans. However, older people often encounter difficulties with these activities. These difficulties...
Article
Full-text available
A low cost frequency-dependent (FD) I/Q imbalance self-compensation scheme is investigated in this paper. The direct conversion transmitters are widely used in wireless systems. However, the unwanted image-frequencies and distortions are inevitably introduced into the direct conversion system. This problem is even severer in wideband systems. There...
Conference Paper
Full-text available
Development of direct laser interference technology (DLIT) is reviewed in this paper. With the merits of being independent on the pretreatment, mask and pattern transfer processes, DLIT is demonstrated a facile and efficient method of producing sub-micro structures on various material surfaces. From a representative perspective, a number of past ac...
Article
Full-text available
Inspired by nature, a number of techniques have been developed to fabricate the bionic structures of lotus leaves and moth eyes in order to realize the extraordinary functions of self-cleaning and antireflection. Compared with the existing technologies, we present a straightforward method to fabricate well-defined micro and nano artificial bio-stru...
Article
Cyberstalking (CS) can have major psychosocial impacts on individuals. Victims report a number of serious consequences of victimization such as increased suicidal ideation, fear, anger, depression, and post traumatic stress disorder (PTSD) symptomology. Research is largely limited to quantitative outcome research. This study examines the diversity...
Article
Direct conversion transmitters are widely used in wireless systems for their inherent features of being simple and low cost. In this architecture, the inphase (I branch) and quadrature signal (Q branch) will be unconverted to the RF frequency band by quadrature modulation. However, the drawback of the direct conversion architecture is that it is se...
Article
Full-text available
The scarcity of bandwidth in the radio spectrum has become more vital since the demand for more and more wireless applications has increased. Most of the spectrum bands have been allocated although many studies have shown that these bands are significantly underutilized most of the time. The problem of unavailability of spectrum and inefficiency in...
Article
Erratum to:International Journal of Automation and Computing DOI:10.1007/s11633-013-0695-z The original version of this article unfortunately contained a mistake.The received date and revised date were incorrect.The corrected received date and revised date are given below.
Article
This paper presents a review of recent advances in optimisation techniques. Optimisation is a complex task and it is nearly impossible to identify a single technique which can act as a silver bullet in all contexts where scarcity and limitation of resources and constraints exist. The list of individual optimisation methods, their combinations and h...
Article
Full-text available
We offer a partial articulation of the threats and opportunities posed by the so-called Dark Web (DW). We go on to propose a novel DW attack detection and prediction model. Signalling aspects are considered wherein the DW is seen to comprise a low cost signaling environment. This holds inherent dangers as well as rewards for investigators as well a...
Conference Paper
We offer a partial articulation of the threats and opportunities posed by the so-called Dark Web (DW). We go on to propose a novel DW attack detection and prediction model. Signalling aspects are considered wherein the DW is seen to comprise a low cost signaling environment. This holds inherent dangers as well as rewards for investigators as well a...
Conference Paper
In embedded system designs, most researches are involved in the hardware or software design, separately. These methods are effective and efficient for hardware or software (HW/SW) building, respectively. In an entire embedded system, hardware and software co-exist. In addition, software may consist of system and application parts. Thus these HW/SW...
Article
Full-text available
An assistive robot is a novel service robot, playing an important role in the society. For instance, it can amplify human power not only for the elderly and disabled to recover/rehabilitate their lost/impaired musculoskeletal functions but also for healthy people to perform tasks requiring large forces. Consequently, it is required to consider both...
Conference Paper
Full-text available
Unstructured domestic environments present a substantial challenge to effective robotic operation. Domestic environment requires service robots to deal with unexpected environment changes, novel objects, and user manipulations. We present an approach to enable service robots to actively learn high-level skills in an unstructured environment. This i...
Article
Probabilistic roadmaps are commonly used in robot path planning. Most sampling-based path planners often produce poor-quality roadmaps as they focus on improving the speed of constructing roadmaps without paying much attention to the quality. Poor-quality roadmaps can cause problems such as poor-quality paths, time-consuming path searching and fail...
Conference Paper
Full-text available
Cognitive Radio (CR) has emerged as the promising technology to address spectrum scarcity issues. One of the challenging tasks in CR networks is to agree on a common control channel to advertise the free channel list (FCL) amongst the participating CR nodes for co-operative communication. In this paper, a CR MAC protocol for searching, scanning, an...
Conference Paper
Paper discusses the effect of fullerenol on the morphology features of colon cancer SW480 cells. In the work, the changes of morphology features of SW480 cells, treated with three groups of fullerenol concentrations, were studied using atomic force microscopy (AFM) to evaluate their induction of apoptosis in colon cancer cells on the nanoscale. The...
Conference Paper
This paper presents a method to make magnetic surface patterns by non-destructive laser interference, and periodic magnetic fringes produced on magnetic material surfaces are investigated by magnetic force microscopy (MFM). Various thermal effects are obtained by two beam laser interference with different exposure times and pulse energies. The expe...
Conference Paper
This paper discusses the effect of pulse repetition rates on silicon wafer modification by four-beam laser interference. In the work, four-beam laser interference was used to pattern single crystal silicon wafers for the fabrication of dots, and different laser pulse repetition rates were applied to the process in the air. The results were obtained...
Conference Paper
This paper presents a survey of the current approaches of sit-to-stand assistive chairs. Sitting in a chair and standing up from a seated position are common activities performed by humans on a daily basis. However, older people often encounter difficulties with these activities. The difficulties may cause substantial decreasing of the elderly mobi...
Conference Paper
The application of wireless sensor networks (WSNs) has been greatly improved by the advance of micro-electromechanical systems (MEMS) and radio frequency (RF) technology. Compared with the traditional networks, WSNs are data-centric, self-configuring and self healing. In this paper, a novel probabilistic fuzzy logic based localisation algorithm is...
Conference Paper
Signal-to-noise ratio (SNR) estimation plays an important role to adaptive modulation in Evolved Multimedia Broadcast Multicast Services (eMBMS). Based on the knowledge that the received signal space consists of signal subspace and noise subspace, we propose a subspace-based SNR estimation solution to cope with the time-varying channel with frequen...
Article
Multiuser scheduling is an important aspect in the performance optimization of a wireless network since it allows multiple users to access a shared channel efficiently by exploiting multiuser diversity. To perform efficient scheduling, channel state information (CSI) for users is required, and is obtained via their respective feedback channels. In...
Conference Paper
Full-text available
This paper presents the study of silicon wafer modification by two-beam laser interference. In the work, two-beam laser interference was used to pattern single crystal silicon wafers for the fabrication of gratings, and different laser fluences and pulses were applied to the process in the air. The results were obtained from single laser pulse expo...
Article
Full-text available
This paper demonstrates that polarization plays an important role in the formation of interference patterns, pattern contrasts, and periods in four-beam interference lithography. Three different polarization modes are presented to study the effects of polarization on four-beam laser interference based on theoretical analysis, simulations, and exper...
Conference Paper
Due to striving and opportunistic nature of cognitive radio (CR) technology, nodes are always haunting to seize the opportunity to transmit. Finding a wireless channel for secure communication, in CR mobile ad-hoc networks, is one of the challenging tasks. In this paper, a novel secure authentication mechanism for communication in CR mobile ad-hoc...
Conference Paper
Cognitive Radio (CR) has emerged as an intelligent technology to address the spectrum scarcity issues. CR aims to use the unoccupied spectrum band when it is not used by the licensed user. An extensive research has been carried out since the inception of this technology in 1999 where different challenges like spectrum sensing, cooperation amongst C...
Conference Paper
In disaster scenarios, dynamic sensors are often used for localisation in wireless sensor networks (WSNs). However, most of the existing localisation algorithms are designed for the static nodes in WSNs. This paper presents a survey of localisation algorithms in mobile wireless sensor networks (MWSNs): robotics localisation algorithms, Monte Carlo...
Article
Sharing sensitive information including passwords of online accounts can be found in some themes, but with reason and generally on a small scale. However, we have conducted a study on the Gulf Cooperation Council (GCC) countries, which has shown that there is a significant level of sensitive information-sharing among employees in the region. This i...
Conference Paper
Full-text available
In this paper, we take the strategy of direct laser interference technology to modify the silicon surface under air and sulphur hexafluoride (SF 6) gas ambiance conditions. With the investigation of optical properties, the silicon spike structures (known as black silicon) which were fabricated in the SF 6 ambiance showed the excellent ability of re...
Article
Full-text available
The most important aspect of cognitive radio (CR) networks is to search, scan, and access the control channel to advertise the free channel list (FCL) amongst the participating CR nodes. Subsequent communication could not take place until there is an access to a well-known and agreed upon control channel to dialogue the initial configuration. In th...
Chapter
Devising access control systems to support needs and capabilities of users, as well as the security requirements of organisations, is a key challenge faced in many of today's business environments. If users are to behave securely, they must not be overburdened with unworkable authentication policies and methods. Yet the prevailing alphanumeric pass...
Chapter
This paper focuses on defining the minimum requirements to support the inter-cooperation between various scales, dynamically evolved Virtual Organizations (VOs). This proposed method is able to assign a weighted value to each pair-wise path that each member (node) can select in order to locate neighbouring nodes according to their preferences. The...
Article
Full-text available
Localization is one of the key techniques in wireless sensor network. The location estimation methods can be classified into target/source localization and node self-localization. In target localization, we mainly introduce the energy-based method. Then we investigate the node self-localization methods. Since the widespread adoption of the wireless...
Article
Full-text available
This paper introduces novel hybrid pilot-aided channel estimation with decision feedback equalizer(DFE) for OFDM systems and its corresponding hardware co-simulation platform. This pilot-aided channel estimation algorithm consists of two parts: coarse estimation and fine estimation. In the coarse estimation, the combined classical channel estimatio...
Article
Localization is one of the key techniques in wireless sensor network. The location estimation methods can be classified into target/source localization and node self-localization. In target localization, we mainly introduce the energy-based method. Then we investigate the node self-localization methods. Since the widespread adoption of the wireless...
Conference Paper
Symbolic grounding is a bridge between high-level planning and actual robot sensing, and actuation. Uncertainties raised by the unstructured environment make a bottleneck for integrating traditional artificial intelligence with service robotics. This paper presents a fuzzy logic based approach to formalise the grounding problems into a fuzzy optimi...
Conference Paper
Container loading is a combinatorial optimization problem in three-dimensional packing which is an area of cutting and packing. It belongs to a NP-hard problem. To solve this problem, a hybrid approach is proposed in this paper. The approach integrated a loading heuristic into an ant colony optimization algorithm. The loading sequence is generated...
Article
The growth in the use of interconnected devices in the UK is well-documented. Society has embraced new technology allowing access to information, systems, and people; children are being described as digital natives and social networking, internet telephony, and accessing digital entertainment are a major part of their lives. However, whilst the ubi...
Article
To improve space utilization, the method for handling spaces plays an important role in the container loading problem. This paper deals with loading a set of cuboid items into a single container to maximize the utilization of the space. Six space partitions are presented and a set of rules for merging spaces is proposed. Through experimentation, us...
Article
Voice over IP (VoIP) is the technology used to transport real-time voice over a packet-switched network. This study analyses the effects of encrypted VoIP streams on perceived Quality of Experience (QoE) from a user's perspective. An in-depth analysis on how the transparent nature of encryption can influence the way users perceive the quality of a...
Conference Paper
Full-text available
Periodic and quasi-periodic structures on silicon surface have numerous significant applications in photoelectronics and surface engineering. A number of technologies have been developed to fabricate these structures in various research areas. In this work, we take the strategy of direct nanosecond laser interference patterning technology. Well-def...
Conference Paper
Symbolic grounding in unstructured environments remains an important challenge in robotics [7]. Homecare robots are often required to be instructed by their human users intuitively, which means the robots are expected to take highlevel commands and execute corresponding tasks in a domestic environment. High-level commands are represented with symbo...
Conference Paper
The project is focused on development and prototyping of remotely-controlled, semi-autonomous robotic solutions in domestic environments to support elderly people. In particular, the SRS project is demonstrating an innovative, practical and efficient system called “SRS robot” for personalised home care and assisted living.
Conference Paper
This project focuses on staff exchanging between the partners, especially between the partners of EU and China, on the researching and developing newmaskless laser nanoscale manufacturing technologies for low cost and high efficiency manufacturing of nano structured surfaces and components including periodic structures (nano gratings, anticounterfe...
Conference Paper
European Commission provides a number of instruments to support and facilitate research activities in Europe. Since their launch in 1984, Framework Program has been providing significant support in funding multi-disciplinary research and cooperative activities in Europe and beyond. Nowadays, it still remains to be an important source of funding to...
Conference Paper
This will provide you with a brief advice on how to write up a high-quality EU grant proposal, specifically in a part of management structure and procedures. It will give a good insight in regard to key points to be addressed. A consortium management structure is to be tailored to a specific project. It also depends on a project scale, its duration...
Conference Paper
Security countermeasures help ensure information security: confidentiality, integrity and availability(CIA), by mitigating possible risks associated with the security event. Due to the fact, that it is often difficult to measure such an impact quantitatively, it is also difficult to deploy appropriate security countermeasures. In this paper, we dem...
Conference Paper
Recently, the robot technology research is changing from manufacturing industry to non-manufacturing industry, especially the service industry related to the human life. Assistive robot is a kind of novel service robot. It can not only help the elder and disabled people to rehabilitate their impaired musculoskeletal functions, but also help healthy...
Article
goal of this work is to advance a new methodology to measure a severity cost for each host using the Common Vulnerability Scoring System (CVSS) based on base, temporal and environmental metrics by combining related sub-scores to produce a unique severity cost by modeling the problem"s parameters in to a mathematical framework. We build our own CVSS...
Article
Budget cuts and the high demand in strengthening the security of computer systems and services constitute a challenge. Poor system knowledge and inappropriate selection of security measures may lead to unexpected financial and data losses. This paper proposes a novel Risk Assessment and Optimisation Model (RAOM) to solve a security countermeasure s...