Skip to main content

Research Repository

Advanced Search

All Outputs (76)

Supporting student transitions to placement and work: developing a new self-identity (2016)
Journal Article
Webster, G., Smith, S., & Smith, C. (2016). Supporting student transitions to placement and work: developing a new self-identity. New Directions in the Teaching of Physical Sciences, 11(1),

Moves towards the marketisation of higher education together with concerns over the challenges of graduate employment have led to an increased prioritisation of students undertaking relevant work experience while they study. Recognising a strong stud... Read More about Supporting student transitions to placement and work: developing a new self-identity.

Inspecting the bad society? Bentham’s panopticon revisited. (2016)
Journal Article
Duff, A. (2016). Inspecting the bad society? Bentham’s panopticon revisited. The Asian Conference on Technology, Information & Society, 13-25

In Panopticon; or, The Inspection-House (2008 [1797]), the utilitarian philosopher Jeremy Bentham outlined what he perceived to be a model prison, based on ‘the inspection-principle’ (p. 68). It was centrally about power, the control of miscreants by... Read More about Inspecting the bad society? Bentham’s panopticon revisited..

Mapping the UK information workforce in the library, archives, records, information management, knowledge management and related professions (2016)
Journal Article
Hall, H., & Raeside, R. (2016). Mapping the UK information workforce in the library, archives, records, information management, knowledge management and related professions. Proceedings of the Association for Information Science and Technology, 53(1), 1-4

A workforce mapping project was carried out in the UK between August 2014 and October 2015. It was commissioned by the Chartered Institute of Library and Information Professionals (CILIP) and the Archives and Records Association (ARA) to enhance unde... Read More about Mapping the UK information workforce in the library, archives, records, information management, knowledge management and related professions.

'I hope we can handle it': A study examining student ability beliefs and motivations before transition (2016)
Journal Article
Meharg, D., Craighill, S., Varey, A., & Tizard, J. (2016). 'I hope we can handle it': A study examining student ability beliefs and motivations before transition. Education in the North, 23(2), 128-140

This paper employs the ‘Expectancy-Value Model of Achievement Motivation’ (Wigfield and Eccles, 2000) to identify performance barriers and facilitators for further education students continuing their studies at university. Using this model to unders... Read More about 'I hope we can handle it': A study examining student ability beliefs and motivations before transition.

Predictive no-reference assessment of video quality (2016)
Journal Article
Torres Vega, M., Mocanu, D. C., Stavrou, S., & Liotta, A. (2017). Predictive no-reference assessment of video quality. Signal Processing: Image Communication, 52, 20-32. https://doi.org/10.1016/j.image.2016.12.001

Among the various means to evaluate the quality of video streams, lightweight No-Reference (NR) methods have low computation and may be executed on thin clients. Thus, these methods would be perfect candidates in cases of real-time quality assessment... Read More about Predictive no-reference assessment of video quality.

Customer churn prediction in the telecommunication sector using a rough set approach (2016)
Journal Article
Amin, A., Anwar, S., Adnan, A., Nawaz, M., Alawfi, K., Hussain, A., & Huang, K. (2017). Customer churn prediction in the telecommunication sector using a rough set approach. Neurocomputing, 237, 242-254. https://doi.org/10.1016/j.neucom.2016.12.009

Customer churn is a critical and challenging problem affecting business and industry, in particular, the rapidly growing, highly competitive telecommunication sector. It is of substantial interest to both academic researchers and industrial practitio... Read More about Customer churn prediction in the telecommunication sector using a rough set approach.

Recent Advances in Indoor Localization: A Survey on Theoretical Approaches and Applications (2016)
Journal Article
Yassin, A., Nasser, Y., Awad, M., Al-Dubai, A., Liu, R., Yuen, C., …Aboutanios, E. (2017). Recent Advances in Indoor Localization: A Survey on Theoretical Approaches and Applications. Communications Surveys and Tutorials, IEEE Communications Society, 19

Nowadays, the availability of the location information becomes a key factor in today’s communications systems for allowing location based services. In outdoor scenarios, the Mobile Terminal (MT) position is obtained with high accuracy thanks to the G... Read More about Recent Advances in Indoor Localization: A Survey on Theoretical Approaches and Applications.

Extracting online information from dual and multiple data streams (2016)
Journal Article
Malik, Z. K., Hussain, A., & Wu, Q. M. J. (2018). Extracting online information from dual and multiple data streams. Neural Computing and Applications, 30(1), 87-98. https://doi.org/10.1007/s00521-016-2647-3

In this paper, we consider the challenging problem of finding shared information in multiple data streams simultaneously. The standard statistical method for doing this is the well-known canonical correlation analysis (CCA) approach. We begin by deve... Read More about Extracting online information from dual and multiple data streams.

Tagore's School and Methodology: Classrooms Without Walls (2016)
Journal Article
Kane, T. (2016). Tagore's School and Methodology: Classrooms Without Walls. Gitanjali and Beyond, 1(1), 83. https://doi.org/10.14297/gnb.1.1.83-101

This paper argues that Rabindranath Tagore, a very practical man, developed a distinctive and successful educational methodology over the course of his work in educational systems. The paper seeks to show that Tagore drew inspiration and direction fr... Read More about Tagore's School and Methodology: Classrooms Without Walls.

Ontology Based Business Simulations (2016)
Journal Article
Farrenkopf, T., Guckert, M., Urquhart, N., & Wells, S. (2016). Ontology Based Business Simulations. Journal of Artificial Societies and Social Simulation, 19(4), https://doi.org/10.18564/jasss.3266

Within business games there is a need to provide realistic feedback for decisions made, if such business games are to continue to remain relevant in increasingly complex business environments. We address this problem by using soware agents to simula... Read More about Ontology Based Business Simulations.

From Interest to Decision: A Comparative Exploration of Student Attitudes and Pathways to Co-op Programs in the United States and the United Kingdom (2016)
Journal Article
Ramirez, N., Smith, S., Smith, C. F., Berg, T., Strubel, B., Ohland, M., & Main, J. (2016). From Interest to Decision: A Comparative Exploration of Student Attitudes and Pathways to Co-op Programs in the United States and the United Kingdom. International Journal of Engineering Education, 32(5A), 1867-1878

Cooperative education programs (co-op) play a vital role in developing engineering and computing students’ applied technological skills and professional self-confidence. Nevertheless, not all students choose to participate in co-ops. Through empirica... Read More about From Interest to Decision: A Comparative Exploration of Student Attitudes and Pathways to Co-op Programs in the United States and the United Kingdom.

MIMO Techniques for Jamming Threat Suppression in Vehicular Networks (2016)
Journal Article
Kosmanos, D., Prodromou, N., Argyriou, A., Maglaras, L. A., & Janicke, H. (2016). MIMO Techniques for Jamming Threat Suppression in Vehicular Networks. Mobile Information Systems, 2016, Article 8141204. https://doi.org/10.1155/2016/8141204

Vehicular ad hoc networks have emerged as a promising field of research and development, since they will be able to accommodate a variety of applications, ranging from infotainment to traffic management and road safety. A specific security-related co... Read More about MIMO Techniques for Jamming Threat Suppression in Vehicular Networks.

Pixel history linear models for real-time temporal filtering. (2016)
Journal Article
Iglesias-Guitian, J. A., Moon, B., Koniaris, C., Smolikowski, E., & Mitchell, K. (2016). Pixel history linear models for real-time temporal filtering. Computer Graphics Forum, 35(7), 363-372. https://doi.org/10.1111/cgf.13033

We propose a new real-time temporal filtering and antialiasing (AA) method for rasterization graphics pipelines. Our method is based on Pixel History Linear Models (PHLM), a new concept for modeling the history of pixel shading values over time using... Read More about Pixel history linear models for real-time temporal filtering..

An efficient and secure partial image encryption for wireless multimedia sensor networks using discrete wavelet transform, chaotic maps and substitution box (2016)
Journal Article
Khan, M. A., Ahmad, J., Javaid, Q., & Saqib, N. A. (2017). An efficient and secure partial image encryption for wireless multimedia sensor networks using discrete wavelet transform, chaotic maps and substitution box. Journal of Modern Optics, 64(5), 531-5

Wireless Sensor Networks (WSN) is widely deployed in monitoring of some physical activity and/or environmental conditions. Data gathered from WSN is transmitted via network to a central location for further processing. Numerous applications of WSN ca... Read More about An efficient and secure partial image encryption for wireless multimedia sensor networks using discrete wavelet transform, chaotic maps and substitution box.

Comparing Oversampling Techniques to Handle the Class Imbalance Problem: A Customer Churn Prediction Case Study (2016)
Journal Article
Amin, A., Anwar, S., Adnan, A., Nawaz, M., Howard, N., Qadir, J., …Hussain, A. (2016). Comparing Oversampling Techniques to Handle the Class Imbalance Problem: A Customer Churn Prediction Case Study. IEEE Access, 4, 7940-7957. https://doi.org/10.1109/AC

Customer retention is a major issue for various service-based organizations particularly telecom industry, wherein predictive models for observing the behavior of customers are one of the great instruments in customer retention process and inferring... Read More about Comparing Oversampling Techniques to Handle the Class Imbalance Problem: A Customer Churn Prediction Case Study.

Analysis of the dynamics of temporal relationships of neural activities using optical imaging data (2016)
Journal Article
Steyn, J. S., & Andras, P. (2017). Analysis of the dynamics of temporal relationships of neural activities using optical imaging data. Journal of Computational Neuroscience, 42, 107-121. https://doi.org/10.1007/s10827-016-0630-8

The temporal relationship between the activities of neurons in biological neural systems is critically important for the correct delivery of the functionality of these systems. Fine measurement of temporal relationships of neural activities using mic... Read More about Analysis of the dynamics of temporal relationships of neural activities using optical imaging data.

Human behaviour as an aspect of cybersecurity assurance (2016)
Journal Article
Evans, M., Maglaras, L. A., He, Y., & Janicke, H. (2016). Human behaviour as an aspect of cybersecurity assurance. Security and Communication Networks, 9(17), 4667-4679. https://doi.org/10.1002/sec.1657

There continue to be numerous breaches publicised pertaining to cybersecurity despite security practices being applied within industry for many years. This paper is intended to be the first in a number of papers as research into cybersecurity assuran... Read More about Human behaviour as an aspect of cybersecurity assurance.

Impact of Transmission Power Control in multi-hop networks (2016)
Journal Article
Kotian, R., Exarchakos, G., Stavros, S., & Liotta, A. (2017). Impact of Transmission Power Control in multi-hop networks. Future Generation Computer Systems, 75, 94-107. https://doi.org/10.1016/j.future.2016.10.010

Many Transmission Power Control (TPC) algorithms have been proposed in the past, yet the conditions under which they are evaluated do not always reflect typical Internet-of-Things (IoT) scenarios. IoT networks consist of several source nodes transmit... Read More about Impact of Transmission Power Control in multi-hop networks.