Skip to main content

Research Repository

Advanced Search

A new analytical model for multi-hop cognitive radio networks (2012)
Journal Article
Wu, Y., Min, G., & Al-Dubai, A. (2012). A new analytical model for multi-hop cognitive radio networks. IEEE Transactions on Wireless Communications, 11, 1643-1648. https://doi.org/10.1109/TWC.2012.030812.111106

The cognitive radio (CR) is an emerging technique for increasing the utilisation of communication resources by allowing the unlicensed users to employ the under-utilised spectrum. In this paper, a new analytical performance model is developed to eval... Read More about A new analytical model for multi-hop cognitive radio networks.

Novel tracking of rogue network packets using danger theory approach (2012)
Journal Article
Uwagbole, S., Buchanan, W. J., & Fan, L. (2012). Novel tracking of rogue network packets using danger theory approach. Proceedings of the ... international conference on information warfare and security, 277-286

Recently there has been heightened, continuous, and intrusive activity by remotely located rogue hacking groups, such as Anonymous and Lulzsec. These groups often aim to disrupt computer networks and gain access to private confidential data. A typica... Read More about Novel tracking of rogue network packets using danger theory approach.

E-Health: chances and challenges of distributed, service oriented architectures (2012)
Journal Article
Thuemmler, C., Fan, L., Buchanan, W. J., Lo, O., Ekonomou, E., & Khedim, A. S. (2012). E-Health: chances and challenges of distributed, service oriented architectures. Journal of cyber security and mobility, 37,

Societies are undergoing unprecedented demographic and socio-economical changes on a pace that has never been experienced before. Health care models are in transition to remain affordable for governments and individuals. Mobile technology and cloud c... Read More about E-Health: chances and challenges of distributed, service oriented architectures.

A comparison of techniques for name matching (2012)
Journal Article
Peng, T., Li, L., & Kennedy, J. (2012). A comparison of techniques for name matching. GSTF journal on computing, 2,

Information explosion is a problem for everyone nowadays. It is a great challenge to all kinds of businesses to maintain high quality of data in their information applications, such as data integration, text and web mining, information retrieval, sea... Read More about A comparison of techniques for name matching.

VIPER: a visualisation tool for exploring inheritance inconsistencies in genotyped pedigrees (2012)
Journal Article
Paterson, T., Graham, M., Kennedy, J., & Law, A. (2012). VIPER: a visualisation tool for exploring inheritance inconsistencies in genotyped pedigrees. BMC Bioinformatics, 13/8, https://doi.org/10.1186/1471-2105-13-S8-S5

Pedigree genotype datasets are used for analysing genetic inheritance and to map genetic markers and traits. Such datasets consist of hundreds of related animals genotyped for thousands of genetic markers and invariably contain multiple errors in bot... Read More about VIPER: a visualisation tool for exploring inheritance inconsistencies in genotyped pedigrees.

J. Leslie Mitchell/Lewis Grassic Gibbon and exploration (2012)
Journal Article
Lyall, S. (2012). J. Leslie Mitchell/Lewis Grassic Gibbon and exploration. Scottish Literary Review, 4, 131-150

The article presents the literary works of James Leslie Mitchell using the pseudonym Lewis Grassic Gibbon. It discusses Mitchell's adventurous spirit as reflected in the travel exploits of his characters in "The Lost Trumpet," "Hanno" and "The Thirte... Read More about J. Leslie Mitchell/Lewis Grassic Gibbon and exploration.

Islamic financial instruments in corporate firms’ balance sheet: a research note (2012)
Journal Article
Dzolkarnaini, N., & Minhat, M. (2012). Islamic financial instruments in corporate firms’ balance sheet: a research note. International Journal of Excellence in Islamic Banking and Finance, 2,

Purpose: This paper examines the use of Islamic Financial Instruments (IFIs) in the corporate firms’ balance sheet. Methodology/Approach: The overall research approach involves an examination of annual reports of 20 top non-financial firms from 16 c... Read More about Islamic financial instruments in corporate firms’ balance sheet: a research note.

Rich Pictures: A valuable means to explore complex IS issues (2012)
Journal Article
Berg, T., & Pooley, R. (2012). Rich Pictures: A valuable means to explore complex IS issues. Journal of Systemic Practice and Action Research,

This paper discusses the value and interpretive risks when using iconography for system understanding using the rich picture tool. It is suggested that a visual language of pictures offers a way of global communication that far exceeds the limitation... Read More about Rich Pictures: A valuable means to explore complex IS issues.

How Was Your Day? evaluating a conversational companion (2012)
Journal Article
Benyon, D., Gambäck, B., Hansen, P., Mival, O., & Webb, N. (2012). How Was Your Day? evaluating a conversational companion. IEEE Transactions on Affective Computing, 4, 299-311. https://doi.org/10.1109/T-AFFC.2013.15

The “How Was Your Day” (HWYD) Companion is an embodied conversational agent that can discuss work-related issues, entering free-form dialogues that lack any clearly defined tasks and goals. The development of this type of Companion technology require... Read More about How Was Your Day? evaluating a conversational companion.

RePIDS: A multi tier Real-time Payload-based Intrusion Detection System (2012)
Journal Article
Jamdagni, A., Tan, Z., He, X., Nanda, P., & Liu, R. P. (2013). RePIDS: A multi tier Real-time Payload-based Intrusion Detection System. Computer Networks, 57(3), 811-824. https://doi.org/10.1016/j.comnet.2012.10.002

Intrusion Detection System (IDS) deals with huge amount of network traffic and uses large feature set to discriminate normal pattern and intrusive pattern. However, most of existing systems lack the ability to process data for real-time anomaly detec... Read More about RePIDS: A multi tier Real-time Payload-based Intrusion Detection System.

Emotional and aesthetic attachment to digital artefacts (2012)
Journal Article
Turner, P., & Turner, S. (2012). Emotional and aesthetic attachment to digital artefacts. Cognition, Technology and Work, https://doi.org/10.1007/s10111-012-0231-x

We report a pair of repertory grid studies that explore the attachment people have for digital and nondigital artefacts. In the first study we found no clear distinctions between emotional attachment to digital and nondigital artefacts: people are... Read More about Emotional and aesthetic attachment to digital artefacts.

Information literacy in employability training: The experience of Inverclyde Libraries. (2012)
Journal Article
Crawford, J., & Irving, C. (2012). Information literacy in employability training: The experience of Inverclyde Libraries. Journal of Librarianship and Information Science, 44, 79-89. https://doi.org/10.1177/0961000611436096

The study is an evaluation of an employability training programme provided by Inverclyde Libraries in West Central Scotland and the role of information literacy within the training programme. Inverclyde is an area with high unemployment and pockets o... Read More about Information literacy in employability training: The experience of Inverclyde Libraries..

Joseph O'Neil's Netherland and 9/11 Fiction (2012)
Journal Article
Keeble, A. (2012). Joseph O'Neil's Netherland and 9/11 Fiction. European Journal of American Culture, 31(1), 55-71. https://doi.org/10.1386/ejac.31.1.55_1

This article argues that Joseph O’Neil’s Netherland (2008) self-consciously addresses some of the problematic aspects of the emerging canon of ‘9/11 fiction’. Netherland subverts one of the dominant thematic rubrics of the canon, marriage and relatio... Read More about Joseph O'Neil's Netherland and 9/11 Fiction.