Skip to main content

Research Repository

Advanced Search

Blue sky thinking? (2013)
Journal Article
Hamoudi, J., & Cruickshank, P. (2013). Blue sky thinking?. The Journal of the Law Society of Scotland, 18-22

Review of the results of research into the factors that influence legal firms considering whether to adopt cloud-based IT solutions. The article can be read for free here: http://www.journalonline.co.uk/Magazine/58-11/1013300.aspx

Facets of DREaM: a social network analysis exploring network development in the UK LIS research community. (2013)
Journal Article
Cooke, L., & Hall, H. (2013). Facets of DREaM: a social network analysis exploring network development in the UK LIS research community. Journal of Documentation, 69(6), 786-806. https://doi.org/10.1108/JD-09-2012-0124

Purpose: This paper reviews the value of Social Network Analysis (SNA) as a method appropriate to LIS research. SNA is used to investigate the effectiveness of a framework of methods adopted by the DREaM project to develop researcher-practitioner net... Read More about Facets of DREaM: a social network analysis exploring network development in the UK LIS research community..

Approaches to the classification of high entropy file fragments. (2013)
Journal Article
Penrose, P., Macfarlane, R., & Buchanan, W. J. (2013). Approaches to the classification of high entropy file fragments. Digital Investigation, 10(4), 372-384. https://doi.org/10.1016/j.diin.2013.08.004

In this paper we propose novel approaches to the problem of classifying high entropy file fragments. We achieve 97% correct classification for encrypted fragments and 78% for compressed. Although classification of file fragments is central to the sci... Read More about Approaches to the classification of high entropy file fragments..

Evolution pattern verification for services evolution in clouds with model driven architecture. (2013)
Journal Article
Wang, Z., Chalmers, K., & Liu, X. (2013). Evolution pattern verification for services evolution in clouds with model driven architecture. International Journal for e-Learning Security, 3, 340-349. https://doi.org/10.20533/ijels.2046.4568.2013.0042

In this paper we will provide some discovered evolution patterns and its detailed underlying constitution components. Following the featured orientated model driven product line engineering approach for service evolution in clouds, an analysis on... Read More about Evolution pattern verification for services evolution in clouds with model driven architecture..

Rich Pictures: collaborative communication through icons (2013)
Journal Article
Berg, T., & Pooley, R. (2013). Rich Pictures: collaborative communication through icons. Systemic Practice and Action Research, 26, 361-376. https://doi.org/10.1007/s11213-012-9238-8

A visual language of pictures, such as the rich picture used in the Soft System Methodology, offers a way of global communication that far exceeds the limitations of text and speech. Simple graphics can be rapidly communicated, processed and transmit... Read More about Rich Pictures: collaborative communication through icons.

IIDWBA algorithm for integrated hybrid PON with wireless technologies for next generation broadband access networks (2013)
Journal Article
Moradpoor, N., Parr, G., McClean, S., & Scotney, B. (2013). IIDWBA algorithm for integrated hybrid PON with wireless technologies for next generation broadband access networks. Optical Switching and Networking, 10(4), 439-457. https://doi.org/10.1016/j.osn.2013.08.003

Optical and wireless technology integration has been proposed as one of the most promising nominees for the next-generation broadband access networks for quite some time. Integration scheme merges the high-speed and high-capacity of the optical netwo... Read More about IIDWBA algorithm for integrated hybrid PON with wireless technologies for next generation broadband access networks.

Game physics analysis and development – a quality-driven approach using the Entity Component Pattern (2013)
Journal Article
Reilly, C., & Chalmers, K. (2013). Game physics analysis and development – a quality-driven approach using the Entity Component Pattern. The Computer Games Journal, 2, 125-149

The games industry is a broad, multi-discipline industry, which continues to grow in terms of revenue and cultural significance. Despite the accolades of this “recession-proof” industry, video game projects often fail either to deliver on time and on... Read More about Game physics analysis and development – a quality-driven approach using the Entity Component Pattern.

Corporate disclosure quality in Malaysia (2013)
Journal Article
Abdullah, M., & Minhat, M. (2013). Corporate disclosure quality in Malaysia. International Journal of Education and Research, 1,

The objective of this study is to examine the quality of corporate disclosure in the annual reports of Malaysian public listed companies. It reviewed the reports published by the Malaysian Institute of Accountants from 2006-2012 on the common findi... Read More about Corporate disclosure quality in Malaysia.

Improving cloud network security using the Tree-Rule firewall (2013)
Journal Article
He, X., Chomsiri, T., Nanda, P., & Tan, Z. (2014). Improving cloud network security using the Tree-Rule firewall. Future Generation Computer Systems, 30, 116-126. https://doi.org/10.1016/j.future.2013.06.024

This study proposes a new model of firewall called the ‘Tree-Rule Firewall’, which offers various benefits and is applicable for large networks such as ‘cloud’ networks. The recently available firewalls (i.e., Listed-Rule firewalls) have their limita... Read More about Improving cloud network security using the Tree-Rule firewall.

Jabber-based cross-domain efficient and privacy-ensuring context management framework. (2013)
Journal Article
Jaroucheh, Z., Liu, X., & Smith, S. (2013). Jabber-based cross-domain efficient and privacy-ensuring context management framework. International Journal of Advanced Computer Science and Applications, 4, 84

In pervasive environments, context-aware applications require a global knowledge of the context information distributed in different spatial domains in order to establish context-based interactions. Therefore, the design of distributed storage, retri... Read More about Jabber-based cross-domain efficient and privacy-ensuring context management framework..

Rich Pictures: A valuable means to explore complex IS issues (2012)
Journal Article
Berg, T., & Pooley, R. (2012). Rich Pictures: A valuable means to explore complex IS issues. Journal of Systemic Practice and Action Research,

This paper discusses the value and interpretive risks when using iconography for system understanding using the rich picture tool. It is suggested that a visual language of pictures offers a way of global communication that far exceeds the limitation... Read More about Rich Pictures: A valuable means to explore complex IS issues.

Islamic financial instruments in corporate firms’ balance sheet: a research note (2012)
Journal Article
Dzolkarnaini, N., & Minhat, M. (2012). Islamic financial instruments in corporate firms’ balance sheet: a research note. International Journal of Excellence in Islamic Banking and Finance, 2,

Purpose: This paper examines the use of Islamic Financial Instruments (IFIs) in the corporate firms’ balance sheet. Methodology/Approach: The overall research approach involves an examination of annual reports of 20 top non-financial firms from 16 c... Read More about Islamic financial instruments in corporate firms’ balance sheet: a research note.

J. Leslie Mitchell/Lewis Grassic Gibbon and exploration (2012)
Journal Article
Lyall, S. (2012). J. Leslie Mitchell/Lewis Grassic Gibbon and exploration. Scottish Literary Review, 4, 131-150

The article presents the literary works of James Leslie Mitchell using the pseudonym Lewis Grassic Gibbon. It discusses Mitchell's adventurous spirit as reflected in the travel exploits of his characters in "The Lost Trumpet," "Hanno" and "The Thirte... Read More about J. Leslie Mitchell/Lewis Grassic Gibbon and exploration.

VIPER: a visualisation tool for exploring inheritance inconsistencies in genotyped pedigrees (2012)
Journal Article
Paterson, T., Graham, M., Kennedy, J., & Law, A. (2012). VIPER: a visualisation tool for exploring inheritance inconsistencies in genotyped pedigrees. BMC Bioinformatics, 13/8, https://doi.org/10.1186/1471-2105-13-S8-S5

Pedigree genotype datasets are used for analysing genetic inheritance and to map genetic markers and traits. Such datasets consist of hundreds of related animals genotyped for thousands of genetic markers and invariably contain multiple errors in bot... Read More about VIPER: a visualisation tool for exploring inheritance inconsistencies in genotyped pedigrees.

A comparison of techniques for name matching (2012)
Journal Article
Peng, T., Li, L., & Kennedy, J. (2012). A comparison of techniques for name matching. GSTF journal on computing, 2,

Information explosion is a problem for everyone nowadays. It is a great challenge to all kinds of businesses to maintain high quality of data in their information applications, such as data integration, text and web mining, information retrieval, sea... Read More about A comparison of techniques for name matching.