James Irvine
YOU?
Author Swipe
View article: Applying the Concept of Function Limits in Daily Life: From Velocity to Economic Contexts
Applying the Concept of Function Limits in Daily Life: From Velocity to Economic Contexts Open
The concept of limits in functions is a fundamental aspect of calculus with various practical applications in everyday life. This study investigates the application of limits in the fields of physics, economics, and biology. In physics, th…
View article: Organisational Contexts of Energy Cybersecurity
Organisational Contexts of Energy Cybersecurity Open
The energy system is going through huge transformation to integrate distributed renewable generation and to achieve the goals of net-zero carbon emissions. This involves a significant adjustment to how the system is controlled and managed,…
View article: Survey of IoT for Developing Countries: Performance Analysis of LoRaWAN and Cellular NB-IoT Networks
Survey of IoT for Developing Countries: Performance Analysis of LoRaWAN and Cellular NB-IoT Networks Open
Recently, Internet of Things (IoT) deployments have shown their potential for aiding the realisation of the Sustainable Development Goals (SDGs). Concerns regarding how the IoT can specifically drive SDGs 6, 11 and 9 in developing countrie…
View article: Proof-of-PUF Enabled Blockchain: Concurrent Data and Device Security for Internet-of-Energy
Proof-of-PUF Enabled Blockchain: Concurrent Data and Device Security for Internet-of-Energy Open
A detailed review on the technological aspects of Blockchain and Physical Unclonable Functions (PUFs) is presented in this article. It stipulates an emerging concept of Blockchain that integrates hardware security primitives via PUFs to so…
View article: Using Smartphones to Enable Low-Cost Secure Consumer IoT Devices
Using Smartphones to Enable Low-Cost Secure Consumer IoT Devices Open
This paper proposes a solution for low-cost consumer IoT devices to employ end-to-end security without requiring additional hardware. Manufacturers of consumer IoT devices often sacrifice security in favour of features, user-friendliness, …
View article: Intelligent Internet of Things (IoT) Node Demonstrator for Device Monitoring and Control in the Oil and Gas Sector
Intelligent Internet of Things (IoT) Node Demonstrator for Device Monitoring and Control in the Oil and Gas Sector Open
Internet of Things (IoT) is the new industrial slogan for connecting intelligent and unintelligent devices to the web. The problem of security of data transfer, interoperability of different proposed methodologies, the ubiquity of Wi-Fi an…
View article: Intelligent Internet of Things (IoT) Node Demonstrator for Device\n Monitoring and Control in the Oil and Gas Sector
Intelligent Internet of Things (IoT) Node Demonstrator for Device\n Monitoring and Control in the Oil and Gas Sector Open
Internet of Things (IoT) is the new industrial slogan for connecting\nintelligent and unintelligent devices to the web. The problem of security of\ndata transfer, interoperability of different proposed methodologies, the\nubiquity of Wi-Fi…
View article: Atlantic salmon mortality at sea: Developing an evidence-based "Likely Suspects" Framework
Atlantic salmon mortality at sea: Developing an evidence-based "Likely Suspects" Framework Open
Based on a workshop organised by the Atlantic Salmon Trust, held in Edinburgh Tuesday, 6th November – Thursday, 8th November 2017.
View article: Status Overview for Pacific Salmon Populations in the Eastern North Pacific Ocean
Status Overview for Pacific Salmon Populations in the Eastern North Pacific Ocean Open
Pacific Salmon in the eastern North Pacific (Fig. 1), dominated by Chum, Pink, and Sockeye Salmon, are at relatively high levels in terms of numbers and biomass, although there is evidence of recent declines (Fig. 2, Ruggerone and Irvine 2…
View article: Impact of realistic communications for fast-acting demand side management
Impact of realistic communications for fast-acting demand side management Open
The rising penetration of intermittent energy resources is increasing the need for more diverse electrical energy resources that are able to support ancillary services. Demand side management (DSM) has a significant potential to fulfil thi…
View article: International spectrum management regime: is gridlock blocking flexible spectrum property rights?
International spectrum management regime: is gridlock blocking flexible spectrum property rights? Open
Purpose This paper aims to examine the influence of the international spectrum management regime on the introduction of flexibility in the national allocation of radiocommunication services. This is achieved through focusing on the main el…
View article: Comparison Of Power Consumption Of Wifi Inbuilt Internet Of Things Device With Bluetooth Low Energy
Comparison Of Power Consumption Of Wifi Inbuilt Internet Of Things Device With Bluetooth Low Energy Open
The Internet of things (IoT) is currently a highly researched topic, especially within the context of the smart home. These are small sensors that are capable of gathering data and transmitting it to a server. The majority of smart home pr…
View article: Strategies for Protecting Intellectual Property when Using CUDA Applications on Graphics Processing Units
Strategies for Protecting Intellectual Property when Using CUDA Applications on Graphics Processing Units Open
Recent advances in the massively parallel computational abilities of graphical processing units (GPUs) have increased their use for general purpose computation, as companies look to take advantage of big data processing techniques. This ha…
View article: Automating Identification of Potentially Problematic Privacy Policies
Automating Identification of Potentially Problematic Privacy Policies Open
Almost every website, mobile application or cloud service requires users to agree to a privacy policy, or similar terms of service, detailing how the developer or service provider will handle user data, and the purposes for which it will b…
View article: Automating Identification of Potentially Problematic Privacy Policies
Automating Identification of Potentially Problematic Privacy Policies Open
Almost every website, mobile application or cloud service requires users to agree to a privacy policy, or similar terms of service, detailing how the developer or service provider will handle user data, and the purposes for which it will b…
View article: Practical Attacks on Security and Privacy Through a Low-Cost Android Device
Practical Attacks on Security and Privacy Through a Low-Cost Android Device Open
As adoption of smartphones and tablets increases, and budget device offerings become increasingly affordable, the vision of bringing universal connectivity to the developing world is becoming more and more viable.Nonetheless, it is importa…