Skip to main content

Research Repository

Advanced Search

All Outputs (38)

Massive tenting at the Ryder Cup (2012)
Journal Article
Hussain, A. (2012). Massive tenting at the Ryder Cup. InTents, 19,

Long before the U.S. and European teams could begin their match play for the 2012 Ryder Cup, the course had to be prepared with temporary environments that could accommodate players and fans. The popular, biennial golf event—held in 2012 at Medinah C... Read More about Massive tenting at the Ryder Cup.

A new analytical model for multi-hop cognitive radio networks (2012)
Journal Article
Wu, Y., Min, G., & Al-Dubai, A. (2012). A new analytical model for multi-hop cognitive radio networks. IEEE Transactions on Wireless Communications, 11, 1643-1648. https://doi.org/10.1109/TWC.2012.030812.111106

The cognitive radio (CR) is an emerging technique for increasing the utilisation of communication resources by allowing the unlicensed users to employ the under-utilised spectrum. In this paper, a new analytical performance model is developed to eval... Read More about A new analytical model for multi-hop cognitive radio networks.

Novel tracking of rogue network packets using danger theory approach (2012)
Journal Article
Uwagbole, S., Buchanan, W. J., & Fan, L. (2012). Novel tracking of rogue network packets using danger theory approach. Proceedings of the ... international conference on information warfare and security, 277-286

Recently there has been heightened, continuous, and intrusive activity by remotely located rogue hacking groups, such as Anonymous and Lulzsec. These groups often aim to disrupt computer networks and gain access to private confidential data. A typica... Read More about Novel tracking of rogue network packets using danger theory approach.

Enlightened trial and error (2012)
Journal Article
Turner, P., Turner, S., & Flint, T. (2012). Enlightened trial and error. Interaction Design and Architecture(s) IxDetA, 13/14, 64-83

Human-computer interaction as a rationalistic, engineering discipline has been taught successfully for more than 25 years. The established narrative is one of designing usable systems for users, some of whom have been described as “naïve”, safely ins... Read More about Enlightened trial and error.

E-Health: chances and challenges of distributed, service oriented architectures (2012)
Journal Article
Thuemmler, C., Fan, L., Buchanan, W. J., Lo, O., Ekonomou, E., & Khedim, A. S. (2012). E-Health: chances and challenges of distributed, service oriented architectures. Journal of cyber security and mobility, 37,

Societies are undergoing unprecedented demographic and socio-economical changes on a pace that has never been experienced before. Health care models are in transition to remain affordable for governments and individuals. Mobile technology and cloud c... Read More about E-Health: chances and challenges of distributed, service oriented architectures.

A comparison of techniques for name matching (2012)
Journal Article
Peng, T., Li, L., & Kennedy, J. (2012). A comparison of techniques for name matching. GSTF journal on computing, 2,

Information explosion is a problem for everyone nowadays. It is a great challenge to all kinds of businesses to maintain high quality of data in their information applications, such as data integration, text and web mining, information retrieval, sea... Read More about A comparison of techniques for name matching.

VIPER: a visualisation tool for exploring inheritance inconsistencies in genotyped pedigrees (2012)
Journal Article
Paterson, T., Graham, M., Kennedy, J., & Law, A. (2012). VIPER: a visualisation tool for exploring inheritance inconsistencies in genotyped pedigrees. BMC Bioinformatics, 13/8, https://doi.org/10.1186/1471-2105-13-S8-S5

Pedigree genotype datasets are used for analysing genetic inheritance and to map genetic markers and traits. Such datasets consist of hundreds of related animals genotyped for thousands of genetic markers and invariably contain multiple errors in bot... Read More about VIPER: a visualisation tool for exploring inheritance inconsistencies in genotyped pedigrees.

Performance modelling and analysis of cognitive mesh networks (2012)
Journal Article
Min, G., Wu, Y., & Al-Dubai, A. (2012). Performance modelling and analysis of cognitive mesh networks. IEEE Transactions on Communications, 60, 1474-1478. https://doi.org/10.1109/TCOMM.2012.041212.110075A

A new analytical model is proposed to investigate the delay and throughput in cognitive mesh networks. The validity of the model is demonstrated via extensive simulation experiments. The model is then used to evaluate the effects of the number of lic... Read More about Performance modelling and analysis of cognitive mesh networks.

The right resources to support LIS research: findings from the RiLIES2 project poll (2012)
Journal Article
Cruickshank, P., Hall, H., & Irving, C. (2012). The right resources to support LIS research: findings from the RiLIES2 project poll. Library and information research, 36(113), 24-31

In 2011 and 2012 the Library and Information Science Research Coalition supported two projects entitled Research in Librarianship Impact Evaluation Study (RiLIES1 and RiLIES2). This paper discusses the results of a survey completed in spring 2012 as... Read More about The right resources to support LIS research: findings from the RiLIES2 project poll.

A Privacy preserving method using privacy enhancing techniques for location based services (2012)
Journal Article
Buchanan, W. J., Kwecka, Z., & Ekonomou, E. (2012). A Privacy preserving method using privacy enhancing techniques for location based services. Mobile Networks and Applications, https://doi.org/10.1007/s11036-012-0362-6

Two of the major changes within computing, at the present time, are the move towards service-oriented architectures and the increasing usage of mobile devices to access these services. Along with this, as these devices are often moving, extra context... Read More about A Privacy preserving method using privacy enhancing techniques for location based services.

Iterative image warping (2012)
Journal Article
Bowles, H., Mitchell, K., Sumner, R., Moore, J., & Gross, M. (2012). Iterative image warping. Computer Graphics Forum, 31, 237-246. https://doi.org/10.1111/j.1467-8659.2012.03002.x

Animated image sequences often exhibit a large amount of inter-frame coherence which standard rendering algorithms and pipelines are ill-equipped to exploit, limiting their efficiency. To address this inefficiency we transfer rendering results across... Read More about Iterative image warping.

Rich Pictures: A valuable means to explore complex IS issues (2012)
Journal Article
Berg, T., & Pooley, R. (2012). Rich Pictures: A valuable means to explore complex IS issues. Journal of Systemic Practice and Action Research,

This paper discusses the value and interpretive risks when using iconography for system understanding using the rich picture tool. It is suggested that a visual language of pictures offers a way of global communication that far exceeds the limitation... Read More about Rich Pictures: A valuable means to explore complex IS issues.

How Was Your Day? evaluating a conversational companion (2012)
Journal Article
Benyon, D., Gambäck, B., Hansen, P., Mival, O., & Webb, N. (2012). How Was Your Day? evaluating a conversational companion. IEEE Transactions on Affective Computing, 4, 299-311. https://doi.org/10.1109/T-AFFC.2013.15

The “How Was Your Day” (HWYD) Companion is an embodied conversational agent that can discuss work-related issues, entering free-form dialogues that lack any clearly defined tasks and goals. The development of this type of Companion technology require... Read More about How Was Your Day? evaluating a conversational companion.

Type 2 diabetes: A side effect of the adaptation of neurons and fat cells to support increased cognitive performance (2012)
Journal Article
Andras, P., & Andras, A. (2013). Type 2 diabetes: A side effect of the adaptation of neurons and fat cells to support increased cognitive performance. https://doi.org/10.1016/j.mehy.2012.11.023

Type 2 diabetes is a serious disease that is affecting an increasing part of the population in most countries. A new hypothesis is presented in this paper about the underlying causes and mechanisms that lead to the development of this disease. It is... Read More about Type 2 diabetes: A side effect of the adaptation of neurons and fat cells to support increased cognitive performance.

Improving access to Library and Information Science research: maximizing its relevance and impact to practitioners (2012)
Journal Article
Hall, H., Irving, C., & Cruickshank, P. (2012). Improving access to Library and Information Science research: maximizing its relevance and impact to practitioners. Business Information Review, 29(4), 224-230. https://doi.org/10.1177/0266382112470413

Between 2009 and 2012 there was considerable investment in three UK projects related to library and information science (LIS) research: (1) the Library and Information Science Research Coalition; (2) the AHRC-funded Developing Research Excellence and... Read More about Improving access to Library and Information Science research: maximizing its relevance and impact to practitioners.

A Bayesian interpretation of the particle swarm optimization and its kernel extension (2012)
Journal Article
Andras, P. (2012). A Bayesian interpretation of the particle swarm optimization and its kernel extension. PLOS ONE, 7(11), Article e48710. https://doi.org/10.1371/journal.pone.0048710

Particle swarm optimization is a popular method for solving difficult optimization problems. There have been attempts to formulate the method in formal probabilistic or stochastic terms (e.g. bare bones particle swarm) with the aim to achieve more ge... Read More about A Bayesian interpretation of the particle swarm optimization and its kernel extension.

RePIDS: A multi tier Real-time Payload-based Intrusion Detection System (2012)
Journal Article
Jamdagni, A., Tan, Z., He, X., Nanda, P., & Liu, R. P. (2013). RePIDS: A multi tier Real-time Payload-based Intrusion Detection System. Computer Networks, 57(3), 811-824. https://doi.org/10.1016/j.comnet.2012.10.002

Intrusion Detection System (IDS) deals with huge amount of network traffic and uses large feature set to discriminate normal pattern and intrusive pattern. However, most of existing systems lack the ability to process data for real-time anomaly detec... Read More about RePIDS: A multi tier Real-time Payload-based Intrusion Detection System.