Back
24 November

IJCS Paper Publication: [The adoption of socio- and bio-inspired algorithms for trust models in wireless sensor networks: A survey] from CoDe Lab

The security of a wireless sensor network is greatly increased with increasing levels of trustworthiness of nodes on the network. There are a number of trust models proposed that use various trust evaluation methods. The paper categorises trust evaluation methods …

26 April

Research Internship Opportunities @ CoDe Lab

Connected Devices (CoDe) Lab is inviting qualified applicants for summer internship opportunities in the lab. The major areas available this summer is wireless sensor network design and security, and biomedical signal processing. Details of the available project with accompanying requisite …

05 February

The Human Errors that Defeated Enigma

Recently, when researchers at the University of Rochester (USA) finally succeeded in developing a totally secure encryption device based on quantum rules, they presented it as the “Quantum Enigma” in honour of the rotor cipher machines used to encode Nazi …

05 February

What is Affective Computing?

Affective computing is the study and development of systems and devices that can recognize, interpret, process, and simulate human affects. It is an interdisciplinary field spanning computer science, psychology, and cognitive science. While the origins of the field may be …