Skip to main content

Research Repository

Advanced Search

Outputs (496)

Estimation of the power electronic converter lifetime in fully rated converter wind turbine for onshore and offshore wind farms (2014)
Presentation / Conference Contribution
Givaki, K., Jamieson, P., & Parker, M. (2014, April). Estimation of the power electronic converter lifetime in fully rated converter wind turbine for onshore and offshore wind farms. Presented at 7th IET International Conference on Power Electronics, Machines and Drives (PEMD 2014)

A comparison has been made of the converter lifetime for a 3MW fully rated converter horizontal axis wind turbine located onshore and offshore. Simulated torque and speed of the turbine shaft were used to calculate voltage and current time series, th... Read More about Estimation of the power electronic converter lifetime in fully rated converter wind turbine for onshore and offshore wind farms.

Adoption of information and communication technologies in the hotel and associated business in Addis Ababa, Ethiopa (2014)
Presentation / Conference Contribution
Demeke, W. (2014, February). Adoption of information and communication technologies in the hotel and associated business in Addis Ababa, Ethiopa. Presented at The 7th IADIS International Conference, Information Systems, Madrid, Spain

Many international organisations assert that Information and Communication Technologies (ICTs) play an important role as a facilitator and as one of the critical determinants for economic growth and poverty reductions in the developing countries. For... Read More about Adoption of information and communication technologies in the hotel and associated business in Addis Ababa, Ethiopa.

Converging structures? Recent regulatory change in bus-based local public transport in Sweden and England (2014)
Journal Article
Rye, T., & Wretstrand, A. (2014). Converging structures? Recent regulatory change in bus-based local public transport in Sweden and England. Research in Transportation Economics, 48, 24-32. https://doi.org/10.1016/j.retrec.2014.09.028

This paper compares the regulatory structures that have developed in local bus regulation over the past 20 years in local public transport in Sweden and England outside London, and their impacts. The paper will attempt to assess how far there are si... Read More about Converging structures? Recent regulatory change in bus-based local public transport in Sweden and England.

Employing Neural Networks for the Detection of SQL Injection Attack (2014)
Presentation / Conference Contribution
Sheykhkanloo, N. M. (2014, September). Employing Neural Networks for the Detection of SQL Injection Attack. Presented at 7th International Conference on Security of Information and Networks - SIN '14, Glasgow, UK

Structured Query Language Injection (SQLI) attack is a code injection technique in which malicious SQL statements are inserted into the SQL database by simply using web browsers. SQLI attack can cause severe damages on a given SQL database such as lo... Read More about Employing Neural Networks for the Detection of SQL Injection Attack.

Intrusion detection method based on nonlinear correlation measure (2014)
Journal Article
Ambusaidi, M. A., Tan, Z., He, X., Nanda, P., Lu, L. F., & Jamdagni, A. (2014). Intrusion detection method based on nonlinear correlation measure. International Journal of Internet Protocol Technology, 8(2/3), 77. https://doi.org/10.1504/ijipt.2014.066377

Cyber crimes and malicious network activities have posed serious threats to the entire internet and its users. This issue is becoming more critical, as network-based services, are more widespread and closely related to our daily life. Thus, it has ra... Read More about Intrusion detection method based on nonlinear correlation measure.

A Software Engineering Framework for Context-Aware Service-Based Processes in Pervasive Environments (2014)
Book Chapter
Jaroucheh, Z., Liu, X., & Smith, S. (2014). A Software Engineering Framework for Context-Aware Service-Based Processes in Pervasive Environments. In Software Design and Development (71-95). IGI Global. https://doi.org/10.4018/978-1-4666-4301-7.ch005

Context-awareness is considered to be the cornerstone technique for developing pervasive computing applications that are flexible, adaptable, and capable of acting autonomously on behalf of the user. However, context-awareness introduces various soft... Read More about A Software Engineering Framework for Context-Aware Service-Based Processes in Pervasive Environments.

Finding middle ground? Multi-objective Natural Language Generation from time-series data (2014)
Presentation / Conference Contribution
Gkatzia, D., Hastie, H., & Lemon, O. (2014, April). Finding middle ground? Multi-objective Natural Language Generation from time-series data. Presented at Proceedings of the 14th Conference of the European Chapter of the Association for Computational Linguistics, volume 2: Short Papers, Gothenburg, Sweden

A Natural Language Generation (NLG) system is able to generate text from nonlinguistic data, ideally personalising the content to a user’s specific needs. In some cases, however, there are multiple stakeholders with their own individual goals, needs... Read More about Finding middle ground? Multi-objective Natural Language Generation from time-series data.

Comparing Multi-label Classification with Reinforcement Learning for Summarisation of Time-series Data (2014)
Presentation / Conference Contribution
Gkatzia, D., Hastie, H., & Lemon, O. (2014, June). Comparing Multi-label Classification with Reinforcement Learning for Summarisation of Time-series Data. Presented at The 52nd Annual Meeting of the Association for Computational Linguistics, Baltimore

We present a novel approach for automatic report generation from time-series data, in the context of student feedback generation. Our proposed methodology treats content selection as a multi-label (ML) classification problem, which takes as input ti... Read More about Comparing Multi-label Classification with Reinforcement Learning for Summarisation of Time-series Data.

HI-Risk: a socio-technical method for the identification and monitoring of healthcare information security risks in the information society (2014)
Thesis
van Deursen Hazelhoff Roelfze, N. (2014). HI-Risk: a socio-technical method for the identification and monitoring of healthcare information security risks in the information society. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/id/eprint/6921

This thesis describes the development of the HI-risk method to assess socio-technical information security risks. The method is based on the concept that related organisations experience similar risks and could benefit from sharing knowledge in order... Read More about HI-Risk: a socio-technical method for the identification and monitoring of healthcare information security risks in the information society.

Using Code Generation to Build a Platform for Developing and Testing Dialogue Games. (2014)
Presentation / Conference Contribution
Yuan, T., Manandhar, S., & Wells, S. (2014). Using Code Generation to Build a Platform for Developing and Testing Dialogue Games.

Despite increasing research into their use as a vehicle for Human- Computer Dialogue and Inter-Agent Communication, Dialogue Games have not seen good uptake in industry. One of the reasons for this is the lack of methodologies and tooling for the... Read More about Using Code Generation to Build a Platform for Developing and Testing Dialogue Games..