Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Carsten Maple is active.

Publication


Featured researches published by Carsten Maple.


International Journal of Distributed Sensor Networks | 2012

A Survey of Localization in Wireless Sensor Network

Long Cheng; Chengdong Wu; Yunzhou Zhang; Hao Wu; Mengxin Li; Carsten Maple

Localization is one of the key techniques in wireless sensor network. The location estimation methods can be classified into target/source localization and node self-localization. In target localization, we mainly introduce the energy-based method. Then we investigate the node self-localization methods. Since the widespread adoption of the wireless sensor network, the localization methods are different in various applications. And there are several challenges in some special scenarios. In this paper, we present a comprehensive survey of these challenges: localization in non-line-of-sight, node selection criteria for localization in energy-constrained network, scheduling the sensor node to optimize the tradeoff between localization performance and energy consumption, cooperative node localization, and localization algorithm in heterogeneous network. Finally, we introduce the evaluation criteria for localization in wireless sensor network.


decision support systems | 2012

A novel risk assessment and optimisation model for a multi-objective network security countermeasure selection problem

Valentina Viduto; Carsten Maple; Wei Huang; David Lopez-Perez

Budget cuts and the high demand in strengthening the security of computer systems and services constitute a challenge. Poor system knowledge and inappropriate selection of security measures may lead to unexpected financial and data losses. This paper proposes a novel Risk Assessment and Optimisation Model (RAOM) to solve a security countermeasure selection problem, where variables such as financial cost and risk may affect a final decision. A Multi-Objective Tabu Search (MOTS) algorithm has been developed to construct an efficient frontier of non-dominated solutions, which can satisfy organisational security needs in a cost-effective manner.


Iet Communications | 2007

UMTS base station location planning: a mathematical model and heuristic optimisation algorithms

Jun Yang; Mehmet Emin Aydin; Jie Zhang; Carsten Maple

Radio networks of universal mobile telecommunication system (UMTS) need accurate planning and optimisation, and many factors not seen in second generation (2G) networks must be considered. However, planning and optimisation of UMTS radio networks are often carried out with static simulations, for efficiency and to save time. To obtain a good trade-off between accuracy and computational load, link-level performance factors need to be taken into account. The authors propose a mathematical model for UMTS radio network planning taking into consideration fast power control, soft handover and pilot signal power in both uplink and downlink. Optimisation strategies are investigated based on three meta-heuristics: genetic algorithm, simulated annealing (SA) and evolutionary-SA. The base station location problem is modelled as a simplified p-median problem, and parameter tuning of these meta-heuristics are presented. Extensive experimental results are used to compare the performance of different algorithms in terms of statistical measurements.


parallel computing in electrical engineering | 2004

Parallel Genetic Algorithms for Third Generation Mobile Network Planning

Carsten Maple; Liang Guo; Jie Zhang

As Third Generation (3G) mobile networks start to be implemented, there is a need for effective network planning. However, deciding upon the optimum placement for the base stations of the networks is a complex task requiring vast computational resource. This paper discusses the conflicting objectives of base station planning and characterises a multi-objective optimisation problem. We present a genetic encoding of the third generation mobile network planning problem and parallel genetic algorithms to solve it.


Applied Physics Letters | 2013

Effects of polarization on four-beam laser interference lithography

Dapeng Wang; Zuobin Wang; Ziang Zhang; Yong Yue; Dayou Li; Carsten Maple

This paper demonstrates that polarization plays an important role in the formation of interference patterns, pattern contrasts, and periods in four-beam interference lithography. Three different polarization modes are presented to study the effects of polarization on four-beam laser interference based on theoretical analysis, simulations, and experiments. A four-beam laser interference system was set up to modify the silicon surface. It was found that the secondary periodicity or modulation was the result of the misaligned or unequal incident angles only in the case of the TE-TE-TM-TM mode. The resulting patterns have shown a good correspondence with the theoretical analysis and simulations.


Computers & Operations Research | 2011

A novel hybrid tabu search approach to container loading

Jiamin Liu; Yong Yue; Zongran Dong; Carsten Maple; Malcolm Keech

The container loading problem, which is significant for a number of industrial sectors, aims to obtain a high space utilisation in the container while satisfying practical constraints. This paper presents a novel hybrid tabu search approach to the container loading problem. A loading heuristic is devised to incorporate heuristic strategies with a handling method for remaining spaces to generate optimal loading arrangements of boxes with stability considered. The tabu search technique, which covers the encoding, evaluation criteria and configuration of neighbourhood and candidate solutions, is used to improve the performance of the loading heuristic. Experimental results with benchmark data show that the hybrid approach provides a better space utilisation than the published approaches under the condition of all loaded boxes with one hundred percent support from below. Moreover, it is shown that the hybrid tabu search can solve problems with the constraints of weight limit and weight distribution with real world data.


complex, intelligent and software intensive systems | 2010

Defining Minimum Requirements of Inter-collaborated Nodes by Measuring the Weight of Node Interactions

Stelios Sotiriadis; Nik Bessis; Ye Huang; Paul Sant; Carsten Maple

In this paper we are focusing on the minimum requirements to be addressed in order to demonstrate a inter-node communication within a Virtual Organisation (VO) using the method of Self-led Critical Friends (SCF). The method is able to decide paths that a node can choose in order to locate neighbouring nodes by aiming at realizing the overhead of each communication. The weight of each path will be measured by the analysis of prerequisites in order to achieve the interaction between nodes. We define requirements as the least fundamentals that a node needs to achieve in order to determine its accessibility factor. The information gathered from an interaction is then stored in a snapshot, a profile that is made available during the discovery stage.


availability, reliability and security | 2010

Affects of Queuing Mechanisms on RTP Traffic: Comparative Analysis of Jitter, End-to-End Delay and Packet Loss

Gregory Epiphaniou; Carsten Maple; Paul Sant; Matthew Reeve

The idea of converging voice and data into a best-effort service network, such as the Internet, has rapidly developed the need to effectively define the mechanisms for achieving preferential handling of traffic. This sense of QoS assurance has increased due to the enormous growth of users accessing networks, different types of traffic competing for available bandwidth and multiple services running on the core network, defined by different protocols and vendors. VoIP traffic behaviour has become a crucial element of the intrinsic QoS mainly affected by jitter, latency and packet loss rates. This paper focuses on three different mechanisms, DropTail (FIFO), RED and DiffServ, and their effects on real-time voice traffic. Measurements of jitter, end-to-end delay and packet loss, based on simulation scenarios using the NS-2 network simulator are also presented and analyzed.


international conference on digital information management | 2010

Towards decentralized grid agent models for continuous resource discovery of interoperable grid Virtual Organisations

Stelios Sotiriadis; Nik Bessis; Ye Huang; Paul Sant; Carsten Maple

Grid technology enables resource sharing among a massive number of dynamic and geographically distributed resources. The significance of such environments is based on the aptitude of grid members to look across multiple grids for resource discovery and allocation. Parallel to grid, agents are autonomous problem solvers capable of self-directed actions in flexible environments. As grid systems require self-sufficiency, agents may be the means by which to achieve a robust autonomy infrastructure. In this direction we propose a resource discovery method of interoperable grid agents which travel within Virtual Organizations (VOs) and by capturing resource information regarding their action domain; they update the internal data of each grid member. Moreover we propose that resource discovery is a systematic and continually updating process that occurs within a VO and allows information exchange to happen. This exchange takes place between various community members at a pre-defined interval, aiming to distribute internal knowledge about the domain.


availability, reliability and security | 2006

The usability and practicality of biometric authentication in the workplace

Carsten Maple; Peter Norrington

This paper discusses usability and practicality issues for authentication systems based on biometrics. The effectiveness of a system incorporating an authentication method depends not only on theoretical and technological issues, but also on user interaction with and practical implementation of the system by an organisation. It is becoming increasingly common that IT and physical security are converging, especially in the workplace. This has significant ramifications for the workforce and operational matters. In this paper we pay particular attention to the potential issues that arise when companies introduce biometrics for IT or physical security and provide recommendations that help ensure a usable and practical implementation of the technology.

Collaboration


Dive into the Carsten Maple's collaboration.

Top Co-Authors

Avatar

Yong Yue

Xi'an Jiaotong-Liverpool University

View shared research outputs
Top Co-Authors

Avatar

Dayou Li

University of Bedfordshire

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Marc Conrad

University of Bedfordshire

View shared research outputs
Top Co-Authors

Avatar

Paul Sant

University of Bedfordshire

View shared research outputs
Top Co-Authors

Avatar

Tim French

University of Bedfordshire

View shared research outputs
Top Co-Authors

Avatar

Zuobin Wang

Changchun University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Wei Huang

University of Bedfordshire

View shared research outputs
Top Co-Authors

Avatar

Sijing Zhang

University of Bedfordshire

View shared research outputs
Researchain Logo
Decentralizing Knowledge