Skip to main content

Research Repository

Advanced Search

Outputs (105)

Mapping on surfaces: Supporting collaborative work using interactive tabletop (2014)
Presentation / Conference Contribution
Sinmai, K., & Andras, P. (2014). Mapping on surfaces: Supporting collaborative work using interactive tabletop. In CYTED-RITOS International Workshop on Groupware (319-334). https://doi.org/10.1007/978-3-319-10166-8_29

We investigate the usability of our mindmap application using a tabletop integrated with four Android tablets in the context of support for collaborative work. This paper presents two empirical studies that compares the conventional paper-and-pen app... Read More about Mapping on surfaces: Supporting collaborative work using interactive tabletop.

Individual Risk in Online Social Networking Services (2014)
Presentation / Conference Contribution
Haynes, D. (2014, December). Individual Risk in Online Social Networking Services. Paper presented at Symposium at School of Maths, Computer Science and Engineering, City, University of London

When an individual signs up to an online social networking service such as Facebook, Twitter, or LinkedIn, he or she is entering into a contract with the provider. In exchange for a range of services that are free at the point of usage the provider c... Read More about Individual Risk in Online Social Networking Services.

Investigating people: a qualitative analysis of the search behaviours of open-source intelligence analysts (2014)
Presentation / Conference Contribution
McKeown, S., Maxwell, D., Azzopardi, L., & Glisson, W. B. (2014). Investigating people: a qualitative analysis of the search behaviours of open-source intelligence analysts. In IIiX '14: Proceedings of the 5th Information Interaction in Context Symposium

The Internet and the World Wide Web have become integral parts of the lives of many modern individuals, enabling almost instantaneous communication, sharing and broadcasting of thoughts, feelings and opinions. Much of this information is publicly fac... Read More about Investigating people: a qualitative analysis of the search behaviours of open-source intelligence analysts.

Comparative analysis of chaotic and non-chaotic image encryption schemes (2014)
Presentation / Conference Contribution
Younas, M. B., & Ahmad, J. (2014). Comparative analysis of chaotic and non-chaotic image encryption schemes. In 2014 International Conference on Emerging Technologies (ICET). https://doi.org/10.1109/icet.2014.7021021

In modern era, multimedia technologies have been developed significantly. Multimedia data such as audio, video and image transfers over the internet is open and insecure. Security is required for storage and transmission of digital images to avoid fr... Read More about Comparative analysis of chaotic and non-chaotic image encryption schemes.

Dependency-based semantic parsing for concept-level text analysis (2014)
Presentation / Conference Contribution
Poria, S., Agarwal, B., Gelbukh, A., Hussain, A., & Howard, N. (2014). Dependency-based semantic parsing for concept-level text analysis. In Computational Linguistics and Intelligent Text Processing: 15th International Conference, CICLing 2014, Kathmandu

Concept-level text analysis is superior to word-level analysis as it preserves the semantics associated with multi-word expressions. It offers a better understanding of text and helps to significantly increase the accuracy of many text mining tasks.... Read More about Dependency-based semantic parsing for concept-level text analysis.

Classification of Fish Ectoparasite Genus Gyrodactylus SEM Images Using ASM and Complex Network Model (2014)
Presentation / Conference Contribution
Ali, R., Jiang, B., Man, M., Hussain, A., & Luo, B. (2014). Classification of Fish Ectoparasite Genus Gyrodactylus SEM Images Using ASM and Complex Network Model. In Neural Information Processing: 21st International Conference, ICONIP 2014, Kuching, Mala

Active Shape Models and Complex Network method are applied to the attachment hooks of several species of Gyrodactylus, including the notifiable pathogen G. salaris, to classify each species to their true species type. ASM is used as a feature extract... Read More about Classification of Fish Ectoparasite Genus Gyrodactylus SEM Images Using ASM and Complex Network Model.

Adoption of information and communication technologies in the hotel and associated business in Addis Ababa, Ethiopa (2014)
Presentation / Conference Contribution
Demeke, W. (2014, February). Adoption of information and communication technologies in the hotel and associated business in Addis Ababa, Ethiopa. Presented at The 7th IADIS International Conference, Information Systems, Madrid, Spain

Many international organisations assert that Information and Communication Technologies (ICTs) play an important role as a facilitator and as one of the critical determinants for economic growth and poverty reductions in the developing countries. For... Read More about Adoption of information and communication technologies in the hotel and associated business in Addis Ababa, Ethiopa.

Employing Neural Networks for the Detection of SQL Injection Attack (2014)
Presentation / Conference Contribution
Sheykhkanloo, N. M. (2014, September). Employing Neural Networks for the Detection of SQL Injection Attack. Presented at 7th International Conference on Security of Information and Networks - SIN '14, Glasgow, UK

Structured Query Language Injection (SQLI) attack is a code injection technique in which malicious SQL statements are inserted into the SQL database by simply using web browsers. SQLI attack can cause severe damages on a given SQL database such as lo... Read More about Employing Neural Networks for the Detection of SQL Injection Attack.

Finding middle ground? Multi-objective Natural Language Generation from time-series data (2014)
Presentation / Conference Contribution
Gkatzia, D., Hastie, H., & Lemon, O. (2014). Finding middle ground? Multi-objective Natural Language Generation from time-series data. In Proceedings of the 14th Conference of the European Chapter of the Association for Computational Linguistics, volume

A Natural Language Generation (NLG) system is able to generate text from nonlinguistic data, ideally personalising the content to a user’s specific needs. In some cases, however, there are multiple stakeholders with their own individual goals, needs... Read More about Finding middle ground? Multi-objective Natural Language Generation from time-series data.

Comparing Multi-label Classification with Reinforcement Learning for Summarisation of Time-series Data (2014)
Presentation / Conference Contribution
Gkatzia, D., Hastie, H., & Lemon, O. (2014). Comparing Multi-label Classification with Reinforcement Learning for Summarisation of Time-series Data. In Proceedings of the Conference Volume 1: Long Papers (1231-1240). https://doi.org/10.3115/v1/p14-1116

We present a novel approach for automatic report generation from time-series data, in the context of student feedback generation. Our proposed methodology treats content selection as a multi-label (ML) classification problem, which takes as input ti... Read More about Comparing Multi-label Classification with Reinforcement Learning for Summarisation of Time-series Data.