Skip to main content

Research Repository

Advanced Search

All Outputs (142)

Digital Proxies – a potential new research area (2015)
Digital Artefact
Ryan, B. (2015). Digital Proxies – a potential new research area. [https://bruceryan.info/2015/03/13/digital-proxies-a-potential-new-research-area/]

What is a digital proxy?

A digital proxy would be someone who undertakes a citizen’s online affairs, principally around digital participatory or elective democracy, because the citizen cannot use the internet for some reason.

Paper was a contri... Read More about Digital Proxies – a potential new research area.

A Lifelong Learning Hyper-heuristic Method for Bin Packing (2015)
Journal Article
Hart, E., Sim, K., & Paechter, B. (2015). A Lifelong Learning Hyper-heuristic Method for Bin Packing. Evolutionary Computation, 23(1), 37-67. https://doi.org/10.1162/EVCO_a_00121

We describe a novel Hyper-heuristic system which continuously learns over time to solve a combinatorial optimisation problem. The system continuously generates new heuristics and samples problems from its environment; representative problems and heur... Read More about A Lifelong Learning Hyper-heuristic Method for Bin Packing.

digiCC workshop outcomes report (2015)
Report
Ryan, B., & Cruickshank, P. (2015). digiCC workshop outcomes report. Edinburgh Napier University: Edinburgh Napier University

A workshop on digital engagement by Community Councils (CCs) was hosted by Edinburgh Napier University on 30 January 2015 to which members from 35 CCs came. Facilitated sessions were held to establish common perceptions of problems and ways to addres... Read More about digiCC workshop outcomes report.

New efficient velocity-aware probabilistic route discovery schemes for high mobility Ad hoc networks (2015)
Journal Article
Bani Khalaf, M., Al-Dubai, A. Y., & Min, G. (2015). New efficient velocity-aware probabilistic route discovery schemes for high mobility Ad hoc networks. Journal of Computer and System Sciences, 81(1), 97-109. https://doi.org/10.1016/j.jcss.2014.06.014

Most existing route discovery schemes in MANETs are based on probabilistic models by which MANETs usually deploy broadcast mechanisms to discover routes between nodes. This is implemented by flooding the network with routing requests (RREQ) packets w... Read More about New efficient velocity-aware probabilistic route discovery schemes for high mobility Ad hoc networks.

Lenovo’s security debacle reveals blurred boundary between adware and malware (2015)
Newspaper / Magazine
Buchanan, W. J. (2015). Lenovo’s security debacle reveals blurred boundary between adware and malware

A widely disliked habit of PC vendors is their bundling of all manner of unwanted software into brand new computers – demo software, games, or part-functional trials. Faced with shrinking margins vendors have treated this as an alternative income str... Read More about Lenovo’s security debacle reveals blurred boundary between adware and malware.

Evaluation of the lasting impacts on employability of co-operative serious game-playing by first year Computing students: An exploratory analysis (2015)
Presentation / Conference Contribution
Bhardwaj, J. (2014, October). Evaluation of the lasting impacts on employability of co-operative serious game-playing by first year Computing students: An exploratory analysis. Presented at IEEE Frontiers in Education

This paper reports a case study of cooperative , small-group, game-based learning by a cohort of undergraduates on a range of computing programmes, during the first trimester of their first year. Game-based learning in the form of a total-enterprise... Read More about Evaluation of the lasting impacts on employability of co-operative serious game-playing by first year Computing students: An exploratory analysis.

Defining User Risk in Social Networking Services (2015)
Journal Article
Haynes, D., & Robinson, L. (2015). Defining User Risk in Social Networking Services. Aslib Journal of Information Management, 67(1), 94-115. https://doi.org/10.1108/AJIM-07-2014-0087

Purpose – The purpose of this paper is to identify the risks faced by users of online social networking services (SNSs) in the UK and to develop a typology of risk that can be used to assess regulatory effectiveness. Design/methodology/approach – An... Read More about Defining User Risk in Social Networking Services.

Designing Blended Spaces for Collaboration. (2015)
Book Chapter
Benyon, D., & Mival, O. (2015). Designing Blended Spaces for Collaboration. In A. Ferscha, S. Resmerita, C. Holzmann, M. Pieper, & C. Stephanidis (Eds.), Human Computer Confluence (18-39). De Gruyter. https://doi.org/10.1515/9783110471137-002

In this paper, we reflect on our experiences of designing, developing, implementing and using a real world, functional multi-touch enabled interactive collaborative environment (ICE). The paper provides some background theory on blended spaces derive... Read More about Designing Blended Spaces for Collaboration..

A Biologically Inspired Vision-Based Approach for Detecting Multiple Moving Objects in Complex Outdoor Scenes (2015)
Journal Article
Tu, Z., Zheng, A., Yang, E., Luo, B., & Hussain, A. (2015). A Biologically Inspired Vision-Based Approach for Detecting Multiple Moving Objects in Complex Outdoor Scenes. Cognitive Computation, 7(5), 539-551. https://doi.org/10.1007/s12559-015-9318-z

In the human brain, independent components of optical flows from the medial superior temporal area are speculated for motion cognition. Inspired by this hypothesis, a novel approach combining independent component analysis (ICA) with principal compon... Read More about A Biologically Inspired Vision-Based Approach for Detecting Multiple Moving Objects in Complex Outdoor Scenes.

The geographies of community history digital archives in rural Scotland (2015)
Journal Article
Beel, D., Wallace, C., Webster, G., & Nguyen, H. (2015). The geographies of community history digital archives in rural Scotland. Scottish Geographical Journal, 131(3-4), 201-211. https://doi.org/10.1080/14702541.2014.980839

The CURIOS (Cultural Repositories and Information Systems) project has been working with community heritage groups to co-produce sustainable solutions for the production of heritage archives in digital form. This process has produced an opportunity f... Read More about The geographies of community history digital archives in rural Scotland.

If Obama is talking about securing the net, it should be on everyone else’s lips too. (2015)
Newspaper / Magazine
Buchanan, W. J. (2015). If Obama is talking about securing the net, it should be on everyone else’s lips too

We have spent years promoting the need for change in our approach to internet infrastructure, forcing politicians to recognise it as a serious issue. So it’s great to see Barack Obama tackling the issue in his State of the Union address. You may agre... Read More about If Obama is talking about securing the net, it should be on everyone else’s lips too..

Concept-Level Sentiment Analysis with Dependency-Based Semantic Parsing: A Novel Approach (2015)
Journal Article
Agarwal, B., Poria, S., Mittal, N., Gelbukh, A., & Hussain, A. (2015). Concept-Level Sentiment Analysis with Dependency-Based Semantic Parsing: A Novel Approach. Cognitive Computation, 7(4), 487-499. https://doi.org/10.1007/s12559-014-9316-6

Sentiment analysis from unstructured natural language text has recently received considerable attention from the research community. In the frame of biologically inspired machine learning approaches, finding good feature sets is particularly challeng... Read More about Concept-Level Sentiment Analysis with Dependency-Based Semantic Parsing: A Novel Approach.

POWKist: visualising cultural heritage linked datasets. (2015)
Presentation / Conference Contribution
Kay, A., Webster, G., Beel, D. E., & Nguyen, H. H. (2015). POWKist: visualising cultural heritage linked datasets.

A collaboration between dot.rural at the University of Aberdeen and the iSchool at Northumbria University, POWkist is a pilot-study exploring potential usages of currently available linked datasets within the cultural heritage domain.
Many privately... Read More about POWKist: visualising cultural heritage linked datasets..

The ATB Framework: quantifying and classifying epistemic strategies in tangible problem-solving tasks. (2015)
Presentation / Conference Contribution
Esteves, A., Bakker, S., Antle, A., May, A., Warren, J., & Oakley, I. (2015, January). The ATB Framework: quantifying and classifying epistemic strategies in tangible problem-solving tasks. Presented at 9th International Conference on Tangible, Embedded and Embodied Interaction

In task performance, pragmatic actions refer to behaviors that make direct progress, while epistemic actions involve altering the world so that cognitive processes are faster, more reliable or less taxing. Epistemic actions are frequently presented a... Read More about The ATB Framework: quantifying and classifying epistemic strategies in tangible problem-solving tasks..

Convergence Analysis of a New Self Organizing Map Based Optimization (SOMO) Algorithm (2015)
Journal Article
Khan, A., Xue, L. Z., Wei, W., Qu, Y. P., Hussain, A., & Vencio, R. Z. N. (2015). Convergence Analysis of a New Self Organizing Map Based Optimization (SOMO) Algorithm. Cognitive Computation, 7(4), 477-486. https://doi.org/10.1007/s12559-014-9315-7

The self-organizing map (SOM) approach has been used to perform cognitive and biologically inspired computing in a growing range of cross-disciplinary fields. Recently, the SOM based neural network framework was adapted to solve continuous derivative... Read More about Convergence Analysis of a New Self Organizing Map Based Optimization (SOMO) Algorithm.

If you seek to ‘switch off’ encryption, you may as well switch off the whole internet. (2015)
Newspaper / Magazine
Buchanan, W. J. (2015). If you seek to ‘switch off’ encryption, you may as well switch off the whole internet

Prime Minister David Cameron has stated that the UK government will look at “switching off” some forms of encryption in order to make society safer from terror attacks. This might make a grand statement but it is impossible to implement and extremely... Read More about If you seek to ‘switch off’ encryption, you may as well switch off the whole internet..

Delivering care in a future internet. (2015)
Presentation / Conference Contribution
Thuemmler, C., & Jell, T. (2014, March). Delivering care in a future internet. Presented at I-ESA 2014 workshop on Enterprise Interoperability

In most European countries direct healthcare costs stand for around 10% of the GDP. Health spending is rising faster than GDP and it is estimated to reach to 16% of GDP 2020 in OECD countries. There is clear evidence that more and more health care wi... Read More about Delivering care in a future internet..