Skip to main content

Research Repository

Advanced Search

Outputs (92)

Pulling your weight?: New CS entrants' reflections on their experience of collaborative work at high school (2019)
Presentation / Conference Contribution
Bhardwaj, J. (2019, September). Pulling your weight?: New CS entrants' reflections on their experience of collaborative work at high school. Presented at 1st UK & Ireland Computing Education Research Conference, Canterbury, United Kingdom

University CS courses encourage collaborative work to improve engagement, despite the popular perception that CS attracts students who prefer working alone. The aim of this study is to explore new entrants' reflections on their experience of group wo... Read More about Pulling your weight?: New CS entrants' reflections on their experience of collaborative work at high school.

Facilitating computing students' transition to higher education (2019)
Presentation / Conference Contribution
Fabian, K., Taylor-Smith, E., Meharg, D., & Varey, A. (2019, September). Facilitating computing students' transition to higher education. Presented at 1st UK & Ireland Computing Education Research Conference (UKICER), Canterbury, United Kingdom

Students who progress to higher education from further education colleges are faced with academic, social, and logistical challenges during their transition. In general, they find university life more challenging compared to students who have been at... Read More about Facilitating computing students' transition to higher education.

The Nature of Risk in the Privacy Calculus: a risk ontology (2019)
Presentation / Conference Contribution
Haynes, D. (2019, August). The Nature of Risk in the Privacy Calculus: a risk ontology. Paper presented at Centre for Social Informatics Research Seminar, Edinburgh Napier University

This project sets out to address the following research questions: • Is there a reliable typology for personal risk that can be used to analyse the privacy calculus that users engage in? • What is the nature of the interactions and risks that users e... Read More about The Nature of Risk in the Privacy Calculus: a risk ontology.

On Lightweight Method for Intrusions Detection in the Internet of Things (2019)
Presentation / Conference Contribution
Shakhov, V., Jan, S. U., Ahmed, S., & Koo, I. (2019). On Lightweight Method for Intrusions Detection in the Internet of Things. In 2019 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom). https://doi.org/10.1109/blacks

Integration of the internet into the entities of the different domains of human society is emerging as a new paradigm called the Internet of Things. At the same time, the ubiquitous and wide-range systems make them prone to attacks. Security experts... Read More about On Lightweight Method for Intrusions Detection in the Internet of Things.

Saliency Tubes: Visual Explanations for Spatio-Temporal Convolutions (2019)
Presentation / Conference Contribution
Stergiou, A., Kapidis, G., Kalliatakis, G., Chrysoulas, C., Veltkamp, R., & Poppe, R. (2019). Saliency Tubes: Visual Explanations for Spatio-Temporal Convolutions. . https://doi.org/10.1109/icip.2019.8803153

Deep learning approaches have been established as the main methodology for video classification and recognition. Recently, 3-dimensional convolutions have been used to achieve state-of-the-art performance in many challenging video datasets. Because o... Read More about Saliency Tubes: Visual Explanations for Spatio-Temporal Convolutions.

Light Field Synthesis Using Inexpensive Surveillance Camera Systems (2019)
Presentation / Conference Contribution
Dumbgen, F., Schroers, C., & Mitchell, K. (2019). Light Field Synthesis Using Inexpensive Surveillance Camera Systems. . https://doi.org/10.1109/icip.2019.8804269

We present a light field synthesis technique that achieves accurate reconstruction given a low-cost, wide-baseline camera rig. Our system integrates optical flow with methods for rectification, disparity estimation, and feature extraction, which we t... Read More about Light Field Synthesis Using Inexpensive Surveillance Camera Systems.

An integrated precision farming application based on 5G, UAV and deep learning technologies (2019)
Presentation / Conference Contribution
Razaak, M., Kerdegari, H., Davies, E., Abozariba, R., Broadbent, M., Mason, K., …Remagnino, P. (2019). An integrated precision farming application based on 5G, UAV and deep learning technologies. In Computer Analysis of Images and Patterns (109-119). h

Wireless communication technology has made tremendous progress over the last two decades providing extensive coverage, high data-rate and low-latency. The current major upgrade, the fifth generation (5G) wireless technology promises substantial impro... Read More about An integrated precision farming application based on 5G, UAV and deep learning technologies.

Evolving planar mechanisms for the conceptual stage of mechanical design (2019)
Presentation / Conference Contribution
Lapok, P., Lawson, A., & Paechter, B. (2019). Evolving planar mechanisms for the conceptual stage of mechanical design. In GECCO '19: Proceedings of the Genetic and Evolutionary Computation Conference Companion (383-384). https://doi.org/10.1145/3319619.

This study presents a method to evolve planar mechanism prototypes using an evolutionary computing approach. Ultimately, the idea is to provide drafts for designers at the conceptual design stage of mechanism design which meet their design brief. The... Read More about Evolving planar mechanisms for the conceptual stage of mechanical design.

Next Generation Lightweight Cryptography for Smart IoT Devices: Implementation, Challenges and Applications (2019)
Presentation / Conference Contribution
Gunathilake, N. A., Buchanan, W. J., & Asif, R. (2019). Next Generation Lightweight Cryptography for Smart IoT Devices: Implementation, Challenges and Applications. . https://doi.org/10.1109/WF-IoT.2019.8767250

High/ultra-high speed data connections are currently being developed, and by the year 2020, it is expected that the 5th generation networking (5GN) should be much smarter. It would provide great quality of service (QoS) due to low latency, less imple... Read More about Next Generation Lightweight Cryptography for Smart IoT Devices: Implementation, Challenges and Applications.

Authentication Layer for IEC 61113-3 Applications (2019)
Presentation / Conference Contribution
Homay, A., Chrysoulas, C., & de Sousa, M. (2019). Authentication Layer for IEC 61113-3 Applications. . https://doi.org/10.1109/ntms.2019.8763839

Mid 2010, the Stuxnet ICS attack targeted the Siemens automation products, and after this attack the ICS security was thrust into spotlight, automation products suppliers started to re-examine their business approach to cyber security. The OPC Founda... Read More about Authentication Layer for IEC 61113-3 Applications.