Skip to main content

Research Repository

Advanced Search

All Outputs (285)

Vivaldi antenna with balun feed for SKA feeding system in UWB (2015)
Presentation / Conference Contribution
Ma, Y., Zhu, F., Abidin, Z., Pang, F., Li, S., Abd-Alhameed, R., …Peng, B. (2015). Vivaldi antenna with balun feed for SKA feeding system in UWB. . https://doi.org/10.1109/URSI-AT-RASC.2015.7303191

This paper represents a low cost printed Vivaldi antenna at 3-10 GHz bandwidth for Radio telescope Feed system. The idea of this design is to minimize the number of telescope receivers for Square Kilometre Array (SKA). A minimized tapered slot antenn... Read More about Vivaldi antenna with balun feed for SKA feeding system in UWB.

Surface wave cloaking using transformation optics (2015)
Presentation / Conference Contribution
La Spada, L., & Hao, Y. (2015). Surface wave cloaking using transformation optics. In 2015 1st URSI Atlantic Radio Science Conference (URSI AT-RASC). https://doi.org/10.1109/ursi-at-rasc.2015.7302892

Recently, there has been an increasing interest in the study of manipulating surface waves from microwave to optical frequencies [1, 2], especially for the design of conformal antennas and devices in communications and radar applications [3]. Some of... Read More about Surface wave cloaking using transformation optics.

Towards an augmented authenticator in the Cloud (2015)
Presentation / Conference Contribution
Pitropakis, N., Yfantopoulos, N., Geneiatakis, D., & Lambrinoudakis, C. (2015). Towards an augmented authenticator in the Cloud. In 2014 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT). https://doi.org/10.1109/isspit

Many times in the past, critical infrastructures like e-health and e-government services have become a target of cyber-attacks resulting to manipulation of sensitive information. Meanwhile, there are several approaches applying security and privacy p... Read More about Towards an augmented authenticator in the Cloud.

Automatically Detecting Fallacies in System Safety Arguments (2015)
Presentation / Conference Contribution
Wells, S., Yuan, T., Manandhar, S., & Kelly, T. (2015, October). Automatically Detecting Fallacies in System Safety Arguments. Paper presented at 15th International Workshop on Computational Models of Natural Argument(CMNA15), Bertinoro, Italy

Safety cases play a significant role in the development of safety-critical systems. The key components in a safety case are safety arguments, that are designated to demonstrate that the system is acceptably safe. Inappropriate reasoning with safety a... Read More about Automatically Detecting Fallacies in System Safety Arguments.

Introducing ALIAS (2015)
Presentation / Conference Contribution
Wells, S., & LaGreca, R. (2015, October). Introducing ALIAS. Paper presented at 15th International Workshop on Computation Models of Natural Argument

ALIAS is a Python library for constructing, manipulating, storing, visualising, and converting argumentation structues. It is available with full source code under a copyleft license and aims to become a Swiss Army Knife for working with arguments in... Read More about Introducing ALIAS.

Inspired counter based broadcasting in dynamic source routing protocol. (2015)
Presentation / Conference Contribution
Yassein, M. B., & Al-Dubai, A. (2015, October). Inspired counter based broadcasting in dynamic source routing protocol. Paper presented at 14th IEEE International Conference on Ubiquitous Computing and Communications (IUCC-2015)

The broadcast storm problem is one of the most challenging issues in Mobile ad Hoc Networks (MANETs). However, it is still a challenging problem despite the great deal of related works and existing solutions. Dynamic Source Routing Protocol (DSR)... Read More about Inspired counter based broadcasting in dynamic source routing protocol..

The future of professionalising informatics: a university education perspective. (2015)
Presentation / Conference Contribution
Smith, S., & Phillips, I. (2015, October). The future of professionalising informatics: a university education perspective. Paper presented at 11th European Computer Science Summit

In March 2015, the Shadbolt Review group was established in the UK to review course accreditation of computer science university courses. The Council of Professors and Heads of Computing is represented on the review group alongside industry, funding... Read More about The future of professionalising informatics: a university education perspective..

Shared Usability - a support mechanism to product and service system design for older adults (2015)
Presentation / Conference Contribution
Shore, L., White, P., & Dempsey, H. (2015). Shared Usability - a support mechanism to product and service system design for older adults. In Proceedings of the Human Factors and Ergonomics Society Europe Chapter 2015 Annual Conference

Globally the Older Adult population is increasing; people are living longer, often with physical or functional limitations whilst remaining in their own home. This indicates a requirement of responsibility by Associated Stakeholders to support ageing... Read More about Shared Usability - a support mechanism to product and service system design for older adults.

Battery Aware Beacon Enabled IEEE802.15.4: An Adaptive and Cross-Layer Approach (2015)
Presentation / Conference Contribution
Salayma, M., Al-Dubai, A., Romdhani, I., & Yassein, M. B. (2015, September). Battery Aware Beacon Enabled IEEE802.15.4: An Adaptive and Cross-Layer Approach. Presented at Proceedings of the 2015 Federated Conference on Computer Science and Information Sys

In Wireless Sensor Networks (WSNs), energy conservation is one of the main concerns challenging the cutting-edge standards and protocols. Most existing studies focus on the design of WSN energy efficient algorithms and standards. The standard IEEE 80... Read More about Battery Aware Beacon Enabled IEEE802.15.4: An Adaptive and Cross-Layer Approach.

Design of a Virtual Reality Framework for Maintainability and Assemblability Test of Complex Systems (2015)
Presentation / Conference Contribution
Marzano, A., Friel, I., Erkoyuncu, J. A., & Court, S. (2015, September). Design of a Virtual Reality Framework for Maintainability and Assemblability Test of Complex Systems. Presented at CIRPe 2015 - Understanding the life cycle implications of manufactu

This paper presents a unique environment whose features are able to satisfy requirements for both virtual maintenance and virtual manufacturing through the conception of original virtual reality (VR) architecture. Virtual Reality for the Maintainabil... Read More about Design of a Virtual Reality Framework for Maintainability and Assemblability Test of Complex Systems.

Youth e-mental health in Scotland (2015)
Presentation / Conference Contribution
Pennington, D. (2015, October). Youth e-mental health in Scotland. Paper presented at BCS Health Informatics Scotland Conference, Edinburgh

One in ten UK youth have mental health issues (Watson & Douglas, 2012), and girls may be at higher risk than boys (Levin, Currie, & Muldoon, 2009). Predictors of mental health issues and emotional distress have been identified in area youth, such as... Read More about Youth e-mental health in Scotland.

Sticky-Policy enabled authenticated OOXML for Health Care (2015)
Presentation / Conference Contribution
Spyra, G., Buchanan, W. J., & Ekonomou, E. (2015). Sticky-Policy enabled authenticated OOXML for Health Care. In Proceedings of BCS Health Informatics Scotland 2015 Conference. https://doi.org/10.14236/ewic/HIS2015.3

This paper proposes a secure medical document sharing construction, which addresses confidentiality and authenticity concerns related to cloud-based data protection issues. The paper extends the popular Office Open XML (OOXML) document format with eX... Read More about Sticky-Policy enabled authenticated OOXML for Health Care.

Feasibility of NeuCube spiking neural network architecture for EMG pattern recognition (2015)
Presentation / Conference Contribution
Peng, L., Hou, Z., Kasabov, N., Bian, G., Vladareanu, L., & Yu, H. (2015). Feasibility of NeuCube spiking neural network architecture for EMG pattern recognition. In 2015 International Conference on Advanced Mechatronic Systems (ICAMechS). https://doi.or

Multichannel electromyography (EMG) signals have been used as human-machine interface (HMI) for the control of pattern-recognition based prosthetic system in recent years. This paper is a feasibility analysis of using recently proposed NeuCube spikin... Read More about Feasibility of NeuCube spiking neural network architecture for EMG pattern recognition.

Interdisciplinary Reflections on Games and Human Values (2015)
Presentation / Conference Contribution
Darzentas, D. P., & Urquhart, L. (2015). Interdisciplinary Reflections on Games and Human Values. In CHI PLAY '15: Proceedings of the 2015 Annual Symposium on Computer-Human Interaction in Play (805-810). https://doi.org/10.1145/2793107.2810259

We explore the interaction between digital games and human values. HCI as a field is increasingly focused on the importance of engaging with broader discussions around human values. Games are an ideal medium for reflecting on social, ethical and poli... Read More about Interdisciplinary Reflections on Games and Human Values.

Women in ICT: exploring professional Identity on an executive masters program (2015)
Presentation / Conference Contribution
Smith, S., Smith, C. F., & Varey, A. (2015, October). Women in ICT: exploring professional Identity on an executive masters program. Paper presented at 6th Annual Conference on Computer Science Education: Innovation and Technology (CSEIT 2015), Singapore

Despite years of purposeful activity there is still a shortfall in the numbers of women enrolling onto computing courses in the UK and elsewhere, while many who join the profession then leave. This ‘leaky-pipeline’ phenomenon is a concern for employe... Read More about Women in ICT: exploring professional Identity on an executive masters program.

Energy for Craft Distillers. (2015)
Presentation / Conference Contribution
Currie, J. (2015, October). Energy for Craft Distillers. Presented at UK Craft Distillers Conference

Multiply and conquer: A replication framework for building fault tolerant industrial applications (2015)
Presentation / Conference Contribution
de Sousa, M., Chrysoulas, C., & Homay, A. E. (2015). Multiply and conquer: A replication framework for building fault tolerant industrial applications. . https://doi.org/10.1109/indin.2015.7281930

TIEC 61499 defines an execution model for distributed industrial control applications, i.e. a single application distributed among several devices. In such an environment partial failures are likely to occur. In order to avoid probable system malfunc... Read More about Multiply and conquer: A replication framework for building fault tolerant industrial applications.

Comparing attribute classifiers for interactive language grounding (2015)
Presentation / Conference Contribution
Yu, Y., Eshghi, A., & Lemon, O. (2015). Comparing attribute classifiers for interactive language grounding. In Proceedings of the Fourth Workshop on Vision and Language (60-69)

We address the problem of interactively learning perceptually grounded word meanings in a multimodal dialogue system. We design a semantic and visual processing system to support this and illustrate how they can be integrated. We then focus on compar... Read More about Comparing attribute classifiers for interactive language grounding.

An interactive tool for semi-automated leaf annotation (2015)
Presentation / Conference Contribution
Minervini, M., Giuffrida, M. V., & Tsaftaris, S. (2015). An interactive tool for semi-automated leaf annotation. In Proceedings of the Computer Vision Problems in Plant Phenotyping Workshop 2015 (6.1-6.13). https://doi.org/10.5244/c.29.cvppp.6

High throughput plant phenotyping is emerging as a necessary step towards meeting agricultural demands of the future. Central to its success is the development of robust computer vision algorithms that analyze images and extract phenotyping informati... Read More about An interactive tool for semi-automated leaf annotation.

Design and analysis of a simple UHF passive RFID tag for liquid level monitoring applications (2015)
Presentation / Conference Contribution
Atojoko, A., Abd-Alhameed, R., Rajamani, H., McEwan, N., See, C., & Excell, P. (2015). Design and analysis of a simple UHF passive RFID tag for liquid level monitoring applications. . https://doi.org/10.1109/itecha.2015.7317453

Radio Frequency Identification (RFID) systems has gained increasing popularity with multiple deployments to existing wireless sensors in a view to achieve energy and overall operational efficiency at a much lower cost. This paper presents the design... Read More about Design and analysis of a simple UHF passive RFID tag for liquid level monitoring applications.