Skip to main content

Research Repository

Advanced Search

Outputs (129)

Ontology Based Business Simulations (2016)
Journal Article
Farrenkopf, T., Guckert, M., Urquhart, N., & Wells, S. (2016). Ontology Based Business Simulations. Journal of Artificial Societies and Social Simulation, 19(4), https://doi.org/10.18564/jasss.3266

Within business games there is a need to provide realistic feedback for decisions made, if such business games are to continue to remain relevant in increasingly complex business environments. We address this problem by using soware agents to simula... Read More about Ontology Based Business Simulations.

From Interest to Decision: A Comparative Exploration of Student Attitudes and Pathways to Co-op Programs in the United States and the United Kingdom (2016)
Journal Article
Ramirez, N., Smith, S., Smith, C. F., Berg, T., Strubel, B., Ohland, M., & Main, J. (2016). From Interest to Decision: A Comparative Exploration of Student Attitudes and Pathways to Co-op Programs in the United States and the United Kingdom. International Journal of Engineering Education, 32(5A), 1867-1878

Cooperative education programs (co-op) play a vital role in developing engineering and computing students’ applied technological skills and professional self-confidence. Nevertheless, not all students choose to participate in co-ops. Through empirica... Read More about From Interest to Decision: A Comparative Exploration of Student Attitudes and Pathways to Co-op Programs in the United States and the United Kingdom.

MIMO Techniques for Jamming Threat Suppression in Vehicular Networks (2016)
Journal Article
Kosmanos, D., Prodromou, N., Argyriou, A., Maglaras, L. A., & Janicke, H. (2016). MIMO Techniques for Jamming Threat Suppression in Vehicular Networks. Mobile Information Systems, 2016, Article 8141204. https://doi.org/10.1155/2016/8141204

Vehicular ad hoc networks have emerged as a promising field of research and development, since they will be able to accommodate a variety of applications, ranging from infotainment to traffic management and road safety. A specific security-related co... Read More about MIMO Techniques for Jamming Threat Suppression in Vehicular Networks.

Pixel history linear models for real-time temporal filtering. (2016)
Journal Article
Iglesias-Guitian, J. A., Moon, B., Koniaris, C., Smolikowski, E., & Mitchell, K. (2016). Pixel history linear models for real-time temporal filtering. Computer Graphics Forum, 35(7), 363-372. https://doi.org/10.1111/cgf.13033

We propose a new real-time temporal filtering and antialiasing (AA) method for rasterization graphics pipelines. Our method is based on Pixel History Linear Models (PHLM), a new concept for modeling the history of pixel shading values over time using... Read More about Pixel history linear models for real-time temporal filtering..

An efficient and secure partial image encryption for wireless multimedia sensor networks using discrete wavelet transform, chaotic maps and substitution box (2016)
Journal Article
Khan, M. A., Ahmad, J., Javaid, Q., & Saqib, N. A. (2017). An efficient and secure partial image encryption for wireless multimedia sensor networks using discrete wavelet transform, chaotic maps and substitution box. Journal of Modern Optics, 64(5), 531-540. https://doi.org/10.1080/09500340.2016.1246680

Wireless Sensor Networks (WSN) is widely deployed in monitoring of some physical activity and/or environmental conditions. Data gathered from WSN is transmitted via network to a central location for further processing. Numerous applications of WSN ca... Read More about An efficient and secure partial image encryption for wireless multimedia sensor networks using discrete wavelet transform, chaotic maps and substitution box.

Comparing Oversampling Techniques to Handle the Class Imbalance Problem: A Customer Churn Prediction Case Study (2016)
Journal Article
Amin, A., Anwar, S., Adnan, A., Nawaz, M., Howard, N., Qadir, J., Hawalah, A., & Hussain, A. (2016). Comparing Oversampling Techniques to Handle the Class Imbalance Problem: A Customer Churn Prediction Case Study. IEEE Access, 4, 7940-7957. https://doi.org/10.1109/ACCESS.2016.2619719

Customer retention is a major issue for various service-based organizations particularly telecom industry, wherein predictive models for observing the behavior of customers are one of the great instruments in customer retention process and inferring... Read More about Comparing Oversampling Techniques to Handle the Class Imbalance Problem: A Customer Churn Prediction Case Study.

Analysis of the dynamics of temporal relationships of neural activities using optical imaging data (2016)
Journal Article
Steyn, J. S., & Andras, P. (2017). Analysis of the dynamics of temporal relationships of neural activities using optical imaging data. Journal of Computational Neuroscience, 42, 107-121. https://doi.org/10.1007/s10827-016-0630-8

The temporal relationship between the activities of neurons in biological neural systems is critically important for the correct delivery of the functionality of these systems. Fine measurement of temporal relationships of neural activities using mic... Read More about Analysis of the dynamics of temporal relationships of neural activities using optical imaging data.

To uncover the secrets of exoplanets, try listening to them (2016)
Digital Artefact
Quinton, M., Benyon, D., & McGregor, I. (2016). To uncover the secrets of exoplanets, try listening to them. [Website]

From rainfall patterns to share price performance, the usual way to analyse any data that shows something changing over a period of time is to put it into a graphic. Making data visual usually makes it much easier to understand the trends – but not a... Read More about To uncover the secrets of exoplanets, try listening to them.

Human behaviour as an aspect of cybersecurity assurance (2016)
Journal Article
Evans, M., Maglaras, L. A., He, Y., & Janicke, H. (2016). Human behaviour as an aspect of cybersecurity assurance. Security and Communication Networks, 9(17), 4667-4679. https://doi.org/10.1002/sec.1657

There continue to be numerous breaches publicised pertaining to cybersecurity despite security practices being applied within industry for many years. This paper is intended to be the first in a number of papers as research into cybersecurity assuran... Read More about Human behaviour as an aspect of cybersecurity assurance.