Skip to main content

Research Repository

Advanced Search

All Outputs (73)

In search of self-efficacy: development of a new instrument for first year Computer Science students (2017)
Journal Article
Bhardwaj, J. (2017). In search of self-efficacy: development of a new instrument for first year Computer Science students. Computer Science Education, 27(2), 79-99. https://doi.org/10.1080/08993408.2017.1355522

This study explores the changes in Computer Science (CS) students’ self-efficacy between entering study and the end of first year of university. It aims to give course leaders insights into the everyday challenges that affect students’ academic achie... Read More about In search of self-efficacy: development of a new instrument for first year Computer Science students.

Academic literacies: the word is not enough (2017)
Journal Article
Richards, K., & Pilcher, N. (2017). Academic literacies: the word is not enough. Teaching in Higher Education, 1-16. https://doi.org/10.1080/13562517.2017.1360270

For Academic Literacies, the world is textually mediated; written texts and what informs them reveal elements such as subject-discipline practices. Furthermore, multi-modalities, for example, visual representation, inform written text, and multiple m... Read More about Academic literacies: the word is not enough.

Making and Unfinishedness: Designing Toolkits for Negotiation (2017)
Journal Article
Smyth, M., & Helgason, I. (2017). Making and Unfinishedness: Designing Toolkits for Negotiation. Design Journal, 20(sup1), S3966-S3974. https://doi.org/10.1080/14606925.2017.1352899

The diffusion and democratisation of computing technologies and physical prototyping systems has supported the rise of Do-It-Yourself culture. In the context of design innovation, this shift has undoubtedly blurred the lines between the roles of amat... Read More about Making and Unfinishedness: Designing Toolkits for Negotiation.

The industrial control system cyber defence triage process (2017)
Journal Article
Cook, A., Janicke, H., Smith, R., & Maglaras, L. (2017). The industrial control system cyber defence triage process. Computers and Security, 70, 467-481. https://doi.org/10.1016/j.cose.2017.07.009

The threat to Industrial Control Systems (ICS) from cyber attacks is widely acknowledged by governments and literature. Operators of ICS are looking to address these threats in an effective and cost-sensitive manner that does not expose their operati... Read More about The industrial control system cyber defence triage process.

Data-to-Text Generation Improves Decision-Making Under Uncertainty (2017)
Journal Article
Gkatzia, D., Lemon, O., & Rieser, V. (2017). Data-to-Text Generation Improves Decision-Making Under Uncertainty. IEEE Computational Intelligence Magazine, 12(3), 10-17. https://doi.org/10.1109/MCI.2017.2708998

Decision-making is often dependent on uncertain data, e.g. data associated with confidence scores or probabilities. This article presents a comparison of different information presentations for uncertain data and, for the first time, measures their e... Read More about Data-to-Text Generation Improves Decision-Making Under Uncertainty.

Reproducibility of studies on text mining for citation screening in systematic reviews: evaluation and checklist (2017)
Journal Article
Olorisade, B. K., Brereton, P., & Andras, P. (2017). Reproducibility of studies on text mining for citation screening in systematic reviews: evaluation and checklist. Journal of Biomedical Informatics, 73, 1-13. https://doi.org/10.1016/j.jbi.2017.07.010

Context Independent validation of published scientific results through study replication is a pre-condition for accepting the validity of such results. In computation research, full replication is often unrealistic for independent results validation... Read More about Reproducibility of studies on text mining for citation screening in systematic reviews: evaluation and checklist.

Knowledge management ecological approach: a cross-discipline case study (2017)
Journal Article
Cheng, L., & Leong, S. (2017). Knowledge management ecological approach: a cross-discipline case study. Journal of Knowledge Management, 21(4), 839-856. https://doi.org/10.1108/jkm-11-2016-0492

Purpose The growing needs of interdisciplinary research have been hindered by implementation difficulties because of factors such as the availability and distribution of related knowledge. Knowledge management could be a viable solution to address t... Read More about Knowledge management ecological approach: a cross-discipline case study.

Quantum-to-the-Home: Achieving Gbits/s Secure Key Rates via Commercial Off-the-Shelf Telecommunication Equipment (2017)
Journal Article
Asif, R., & Buchanan, W. J. (2017). Quantum-to-the-Home: Achieving Gbits/s Secure Key Rates via Commercial Off-the-Shelf Telecommunication Equipment. Security and Communication Networks, 2017, 1-10. https://doi.org/10.1155/2017/7616847

There is current significant interest in Fiber-to-the-Home (FTTH) networks, i.e. end-to-end optical connectivity. Currently, it may be limited due to the presence of last-mile copper wire connections. However, in near future it is envisaged that FTTH... Read More about Quantum-to-the-Home: Achieving Gbits/s Secure Key Rates via Commercial Off-the-Shelf Telecommunication Equipment.

Sticky policies approach within cloud computing (2017)
Journal Article
Spyra, G., Buchanan, W. J., & Ekonomou, E. (2017). Sticky policies approach within cloud computing. Computers and Security, 70, 366-375. https://doi.org/10.1016/j.cose.2017.07.005

This paper discusses a secure document sharing approach, which addresses confidentiality, integrity and authenticity concerns related to cloud-based data sharing. This research is focused on a secure construct that would integrate with other cloud re... Read More about Sticky policies approach within cloud computing.

Make-Believing Animated Films Featuring Digital Humans: A Qualitative Inquiry Using Online Sources (2017)
Journal Article
Hetherington, R., & McRae, R. (2017). Make-Believing Animated Films Featuring Digital Humans: A Qualitative Inquiry Using Online Sources. Animation, 12(2), 156-173. https://doi.org/10.1177/1746847717710738

A qualitative inquiry of reviews of films featuring digital humanlike characters was performed by sampling user comments from three online reviewer aggregator sites: the Internet Movie Database, Rotten Tomatoes and Metacritic. The movies chosen for a... Read More about Make-Believing Animated Films Featuring Digital Humans: A Qualitative Inquiry Using Online Sources.

Towards an adaptive SOA-based QoS & Demand-Response Provisioning Architecture for the Smart Grid (2017)
Journal Article
Chrysoulas, C., & Fasli, M. (2017). Towards an adaptive SOA-based QoS & Demand-Response Provisioning Architecture for the Smart Grid. Journal of Communications Software and Systems, 13(2), 77. https://doi.org/10.24138/jcomss.v13i2.375

Dynamic selection of services and by extension of service providers are vital in today’s liberalized market of energy. On the other hand it is equally important for Service Providers to spot the one QoS Module that offers the best QoS level in a give... Read More about Towards an adaptive SOA-based QoS & Demand-Response Provisioning Architecture for the Smart Grid.

Cryptography across industry sectors (2017)
Journal Article
Buchanan, W. J., Woodward, A., & Helme, S. (2017). Cryptography across industry sectors. Journal of Cyber Security Technology, 1(3-4), 145-162. https://doi.org/10.1080/23742917.2017.1327221

Security adoption varies across industry sectors, where some companies such as Google, Apple and Microsoft are strong advocates of the adoption of HTTPS, while other companies, especially for news sites, have weak adoption. This paper provides a samp... Read More about Cryptography across industry sectors.

Belonging: Blurring the Boundaries (2017)
Journal Article
Meharg, D., Craighill, S., Varey, A., & Cairncross, S. (2017). Belonging: Blurring the Boundaries. Scottish Educational Review, 49(1), 89-103

This paper applies Whitchurch’s (2008) concept of the ‘third space’ to the emergent territory occupied by further education college students as they ‘cross the boundary’ to continue their studies at the university. Findings reveal that these transiti... Read More about Belonging: Blurring the Boundaries.

Contra Bentham: ethical information policy in the PanopticEon (2017)
Journal Article
Duff, A. S., & Bentham, C. (2017). Contra Bentham: ethical information policy in the PanopticEon. Journal of Information Ethics, 26(1), 93-111

The article addresses the problem of surveillance within the framework of ethical information policy. Jeremy Bentham’s plan for a panoptic penitentiary is subjected to forensic analysis, using primary as well as published sources. The panopticon, it... Read More about Contra Bentham: ethical information policy in the PanopticEon.

Noise Reduction on G-Buffers for Monte Carlo Filtering: Noise Reduction on G-Buffers for Monte Carlo Filtering (2017)
Journal Article
Moon, B., Iglesias-Guitian, J. A., McDonagh, S., & Mitchell, K. (2017). Noise Reduction on G-Buffers for Monte Carlo Filtering: Noise Reduction on G-Buffers for Monte Carlo Filtering. Computer Graphics Forum, 36(8), 600-612. https://doi.org/10.1111/cgf.13

We propose a novel pre-filtering method that reduces the noise introduced by depth-of-field and motion blur effects in geometric buffers (G-buffers) such as texture, normal and depth images. Our pre-filtering uses world positions and their variances... Read More about Noise Reduction on G-Buffers for Monte Carlo Filtering: Noise Reduction on G-Buffers for Monte Carlo Filtering.

Real-Time Multi-View Facial Capture with Synthetic Training (2017)
Journal Article
Klaudiny, M., McDonagh, S., Bradley, D., Beeler, T., & Mitchell, K. (2017). Real-Time Multi-View Facial Capture with Synthetic Training. Computer Graphics Forum, 36(2), 325-336. https://doi.org/10.1111/cgf.13129

We present a real-time multi-view facial capture system facilitated by synthetic training imagery. Our method is able to achieve high-quality markerless facial performance capture in real-time from multi-view helmet camera data, employing an actor sp... Read More about Real-Time Multi-View Facial Capture with Synthetic Training.

Sensor Fault Classification Based on Support Vector Machine and Statistical Time-Domain Features (2017)
Journal Article
Jan, S. U., Lee, Y., Shin, J., & Koo, I. (2017). Sensor Fault Classification Based on Support Vector Machine and Statistical Time-Domain Features. IEEE Access, 5, 8682-8690. https://doi.org/10.1109/access.2017.2705644

This paper deals with the problem of fault detection and diagnosis in sensors considering erratic, drift, hard-over, spike, and stuck faults. The data set containing samples of the above mentioned fault signals was acquired as follows: normal data si... Read More about Sensor Fault Classification Based on Support Vector Machine and Statistical Time-Domain Features.

Visualising the future: surfacing student perspectives on post-graduation prospects using rich pictures (2017)
Journal Article
Berg, T., Bowen, T., Smith, C., & Smith, S. (2017). Visualising the future: surfacing student perspectives on post-graduation prospects using rich pictures. Higher Education Research and Development, 36(7), 1339-1354. https://doi.org/10.1080/07294360.2017

The gradual commodification of higher education in the context of an increased focus on graduate employability attributes together with evolving labour markets is creating challenges for universities and students alike. For universities, there has be... Read More about Visualising the future: surfacing student perspectives on post-graduation prospects using rich pictures.

A Review of Sentiment Analysis Research in Chinese Language (2017)
Journal Article
Peng, H., Cambria, E., & Hussain, A. (2017). A Review of Sentiment Analysis Research in Chinese Language. Cognitive Computation, 9(4), 423-435. https://doi.org/10.1007/s12559-017-9470-8

Research on sentiment analysis in English language has undergone major developments in recent years. Chinese sentiment analysis research, however, has not evolved significantly despite the exponential growth of Chinese e-business and e-markets. This... Read More about A Review of Sentiment Analysis Research in Chinese Language.