Skip to main content

Research Repository

Advanced Search

Outputs (166)

Water quality reliability based design of water distribution networks (2012)
Presentation / Conference Contribution
Gupta, R., Hussain, A., & Bhave, P. R. (2012, May). Water quality reliability based design of water distribution networks. Presented at World Environmental And Water Resources Congress 2012, Albuquerque, New Mexico, United States

The performance of a water distribution network is affected by several factors, pipe failure being a major one of them. Several methodologies have been suggested for optimal design of water distribution networks (WDNs) to meet reliability criteria re... Read More about Water quality reliability based design of water distribution networks.

Editorial: TLAD 2012 (2012)
Presentation / Conference Contribution
Leimich, P., & Byrne, B. (2012, July). Editorial: TLAD 2012. Presented at 10th International Workshop on Teaching, Learning and Assessment of Databases

No abstract available.

Supporting young people's political participation through distributed discussion - lessons obtained from an EU pilot. (2012)
Presentation / Conference Contribution
Kimpeler, S., Lindner, R., Taylor-Smith, E., & Pruulmann-Vengerfeldt, P. (2012, July). Supporting young people's political participation through distributed discussion - lessons obtained from an EU pilot. Paper presented at IPSA XXII World Congress of Political Science

Several studies recently identified risks and advantages to young people in using the Internet and explicitly recognise the importance of young people’s informed involvement in tackling these issues. This paper presents the approach, implementation a... Read More about Supporting young people's political participation through distributed discussion - lessons obtained from an EU pilot..

Triangle-Area-Based Multivariate Correlation Analysis for Effective Denial-of-Service Attack Detection (2012)
Presentation / Conference Contribution
Tan, Z., Jamdagni, A., He, X., Nanda, P., & Liu, R. P. (2012, June). Triangle-Area-Based Multivariate Correlation Analysis for Effective Denial-of-Service Attack Detection. Presented at 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications

Cloud computing plays an important role in current converged networks. It brings convenience of accessing services and information to users regardless of location and time. However, there are some critical security issues residing in cloud computing,... Read More about Triangle-Area-Based Multivariate Correlation Analysis for Effective Denial-of-Service Attack Detection.

Using network analysis metrics to discover functionally important methods in large-scale software systems (2012)
Presentation / Conference Contribution
Pakhira, A., & Andras, P. (2012, June). Using network analysis metrics to discover functionally important methods in large-scale software systems. Presented at 2012 3rd International Workshop on Emerging Trends in Software Metrics (WETSoM), Zurich, Switzerland

In large-scale software systems that integrate many components originating from different vendors, the understanding of the functional importance of the components is critical for the dependability of the system. However, in general, gaining such und... Read More about Using network analysis metrics to discover functionally important methods in large-scale software systems.

Towards simulation of patient data for evaluation of E-health platform and services. (2012)
Presentation / Conference Contribution
Lo, O., Fan, L., Buchanan, W. J., Thuemmler, C., & Lawson, A. (2012, June). Towards simulation of patient data for evaluation of E-health platform and services. Paper presented at 13th Annual Post Graduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting

This paper presents the design and implementation of the Patient Simulator, a software application used for the simulation of patient data. The simulator aims to evaluate e- Health platforms and services in regards to efficiency, reliability, securit... Read More about Towards simulation of patient data for evaluation of E-health platform and services..

Adaptive Proactive Inhibitory Control for Embedded Real-Time Applications (2012)
Journal Article
Yang, S., McGinnity, T. M., & Wong-Lin, K. (2012). Adaptive Proactive Inhibitory Control for Embedded Real-Time Applications. Frontiers in Neuroengineering, 5, https://doi.org/10.3389/fneng.2012.00010

Psychologists have studied the inhibitory control of voluntary movement for many years. In particular, the countermanding of an impending action has been extensively studied. In this work, we propose a neural mechanism for adaptive inhibitory control... Read More about Adaptive Proactive Inhibitory Control for Embedded Real-Time Applications.

Information sharing around child protection. (2012)
Presentation / Conference Contribution
Buchanan, W. J., Uthmani, O., Lewis, R., Steyven, A., Fan, L., Thuemmler, C., Ekonomou, E., Lo, O., & Lawson, A. (2012, June). Information sharing around child protection. Paper presented at Information Sharing in the Public Sector

Background This presentation focuses on creating a scaleable, robust and secure information architecture for social and health care. At its core is the sa.FIRE (Secure Analysis and FIltering Risk Engine) architecture, which uses SPoC (Single Point of... Read More about Information sharing around child protection..

Introducing Cloud-based virtualised environments and their use in supporting learning and teaching. (2012)
Presentation / Conference Contribution
Buchanan, W. J. (2012, June). Introducing Cloud-based virtualised environments and their use in supporting learning and teaching. Paper presented at Enhancing, extending and empowering student learning within online environments

There is a major challenge faced in running distance and blended learning modules, especially in giving students an equivalent learning environment than to face-to-face students. To overcome this problem, a number of modules have been run within 2011... Read More about Introducing Cloud-based virtualised environments and their use in supporting learning and teaching..