Skip to main content

Research Repository

Advanced Search

All Outputs (1485)

Alcohol brief intervention in a university setting: a small-scale experimental study. (2015)
Journal Article
Dombrowski, S. U., McClatchey, K., & Boyce, M. (2017). Alcohol brief intervention in a university setting: a small-scale experimental study. Journal of Health Psychology, 22(7), 886-895. https://doi.org/10.1177/1359105315617331

Alcohol misuse among university students is commonplace. This study aimed to assess whether Alcohol
Brief Intervention would be effective in reducing hazardous alcohol consumption in students compared to an alcohol information leaflet. Participants... Read More about Alcohol brief intervention in a university setting: a small-scale experimental study..

Roll Project Bin Packing Benchmark Problems. (2015)
Data
Hart, E., & Sim, K. (2015). Roll Project Bin Packing Benchmark Problems. [Data]. https://doi.org/10.17869/ENU.2015.9364

This document describes two sets of Benchmark Problem Instances for the One Dimensional Bin Packing Problem. The problem instances are supplied as compressed (zipped) SQLITE database files.

Using the blended spaces framework to design heritage stories with schoolchildren. (2015)
Journal Article
O'Keefe, B., & Benyon, D. (2015). Using the blended spaces framework to design heritage stories with schoolchildren. International Journal of Child-Computer Interaction, 6, 7-16. https://doi.org/10.1016/j.ijcci.2016.02.001

Blended spaces are spaces where a physical space is deliberately integrated in a close-knit way with a digital space. Blended spaces may take the form of a carefully designed meeting room, for example, that integrates collaborative media with the des... Read More about Using the blended spaces framework to design heritage stories with schoolchildren..

Does Size Matter? Evaluating Corporate Environmental Disclosure in the Australian Mining and Metal Industry: A Combined Approach of Quantity and Quality Measurement (2015)
Journal Article
Lee, K. (2017). Does Size Matter? Evaluating Corporate Environmental Disclosure in the Australian Mining and Metal Industry: A Combined Approach of Quantity and Quality Measurement. Business Strategy and the Environment, 26(2), 209-223. https://doi.org/10.1002/bse.1910

There are an increasing number of companies in the mining and metals sector disclosing environmental sustainability information in their annual reports, sustainability reports and corporate internet web pages. However, there is ongoing debate about t... Read More about Does Size Matter? Evaluating Corporate Environmental Disclosure in the Australian Mining and Metal Industry: A Combined Approach of Quantity and Quality Measurement.

Influence of carbon nanotubes localization and transfer on electrical conductivity in PA66/(PS/PPE)/CNTs nanocomposites (2015)
Journal Article
Lee, C. J., Salehiyan, R., Ham, D. S., Cho, S. K., Lee, S.-J., Kim, K. J., Yoo, Y., Hyun, K., Lee, J. H., & Choi, W. J. (2016). Influence of carbon nanotubes localization and transfer on electrical conductivity in PA66/(PS/PPE)/CNTs nanocomposites. Polymer, 84, 198-208. https://doi.org/10.1016/j.polymer.2015.12.055

The localization and transfer of carbon nanotubes (CNTs) in PA66/(PS/PPE)/CNTs nanocomposites were investigated using several methods including TEM/EDS techniques, surface energy and wetting coefficient calculations, electrical conductivity measureme... Read More about Influence of carbon nanotubes localization and transfer on electrical conductivity in PA66/(PS/PPE)/CNTs nanocomposites.

A fictitious domain/distributed Lagrange multiplier based fluid–structure interaction scheme with hierarchical B-Spline grids (2015)
Journal Article
Kadapa, C., Dettmer, W., & Perić, D. (2016). A fictitious domain/distributed Lagrange multiplier based fluid–structure interaction scheme with hierarchical B-Spline grids. Computer Methods in Applied Mechanics and Engineering, 301, 1-27. https://doi.org/10.1016/j.cma.2015.12.023

We present a numerical scheme for fluid–structure interaction based on hierarchical B-Spline grids and fictitious domain/distributed Lagrange multipliers. The incompressible Navier–Stokes equations are solved over a Cartesian grid discretised with B-... Read More about A fictitious domain/distributed Lagrange multiplier based fluid–structure interaction scheme with hierarchical B-Spline grids.

Coupled heat transfer performance of a high temperature cup shaped porous absorber (2015)
Journal Article
Meng, X.-L., Xia, X.-L., Zhang, S.-D., Sellami, N., & Mallick, T. (2016). Coupled heat transfer performance of a high temperature cup shaped porous absorber. Energy Conversion and Management, 110, 327-337. https://doi.org/10.1016/j.enconman.2015.12.034

In this article, a newly designed volumetric solar receiver (VSR) using cup-shaped Al2O3 porous absorber is studied through numerical simulations and experimental verification. The absorber achieves several advantages including lower heat loss and hi... Read More about Coupled heat transfer performance of a high temperature cup shaped porous absorber.

Ba6−3x Nd8+2x Ti18O54 Tungsten Bronze: A New High-Temperature n-Type Oxide Thermoelectric (2015)
Journal Article
Azough, F., Freer, R., Yeandel, S. R., Baran, J. D., Molinari, M., Parker, S. C., Guilmeau, E., Kepaptsoglou, D., Ramasse, Q., Knox, A., & others. (2016). Ba6−3x Nd8+2x Ti18O54 Tungsten Bronze: A New High-Temperature n-Type Oxide Thermoelectric. Journal of Electronic Materials, 45, 1894-1899. https://doi.org/10.1007/s11664-015-4275-6

Semiconducting Ba6−3x Nd8+2x Ti18O54 ceramics (with x = 0.00 to 0.85) were synthesized by the mixed oxide route followed by annealing in a reducing atmosphere; their high-temperature thermoelectric properties have been investigated. In conjunction wi... Read More about Ba6−3x Nd8+2x Ti18O54 Tungsten Bronze: A New High-Temperature n-Type Oxide Thermoelectric.

Explaining and Mitigating Elections-Related Violence and Human Rights Violations in Kenya (2015)
Book Chapter
Ruteere, M., & Wairuri, K. (2015). Explaining and Mitigating Elections-Related Violence and Human Rights Violations in Kenya. In K. Njogu, & P. Wafula Wekesa (Eds.), Kenya's 2013 General Election: Stakes, Practices and Outcomes (112-123). Twaweza Communications. https://doi.org/10.2307/j.ctvh8r0bc.12

Much of the literature on human rights and elections-related violence in Kenya focuses on the patterns and nature of the human rights violations and assessment of the relevant norms that these acts transgress. Explanations of why the violations occur... Read More about Explaining and Mitigating Elections-Related Violence and Human Rights Violations in Kenya.

The Implications of the Growth of Port Throughput on the Port Capacity: the Case of Malaysian Major Container Seaports (2015)
Journal Article
Jeevan, J., Ghaderi, H., Bandara, Y., Saharuddin, A., & Othman, M. (2015). The Implications of the Growth of Port Throughput on the Port Capacity: the Case of Malaysian Major Container Seaports. International Journal of e-Navigation and Maritime Economy, 3, 84-98. https://doi.org/10.1016/j.enavi.2015.12.008

Malaysia, situated between East and West, is an interface in world maritime trade, playing a crucial role in the business of moving container boxes in South-eastern parts of Asia. The prominent container terminals in Malaysia such as Port Klang and P... Read More about The Implications of the Growth of Port Throughput on the Port Capacity: the Case of Malaysian Major Container Seaports.

On Postcolonial Photography (2015)
Newspaper / Magazine
Supartono, A. (2015). On Postcolonial Photography

The series of works presented in this issue are both historical investigations and contemporary showcases of photo studio practices in South and Southeast Asia incorporating archival, material from the (colonial) past with the present day social and... Read More about On Postcolonial Photography.

The exploitation of dynamic entrepreneurial capabilities by South African security firms (2015)
Journal Article
Ojiako, U., Marshall, A., Maguire, S., & Chipulu, M. (2016). The exploitation of dynamic entrepreneurial capabilities by South African security firms. Competition and Change, 20(2), 89-105. https://doi.org/10.1177/1024529415623918

This multi-case study examines how three security firms in South Africa, at different stages in their evolutionary lifecycle, exploit entrepreneurial behavioural capabilities to innovate with technology-mediated services. The Dynamic Entrepreneurial... Read More about The exploitation of dynamic entrepreneurial capabilities by South African security firms.

Freshwater and coastal migration patterns in the silver-stage eel Anguilla anguilla (2015)
Journal Article
Barry, J., Newton, M., Dodd, J. A., Lucas, M. C., Boylan, P., & Adams, C. E. (2016). Freshwater and coastal migration patterns in the silver-stage eel Anguilla anguilla. Journal of Fish Biology, 88(2), 676-689. https://doi.org/10.1111/jfb.12865

The unimpeded downstream movement patterns and migration success of small female and male Anguilla anguilla through a catchment in north‐west Europe were studied using an acoustic hydrophone array along the River Finn and into the Foyle Estuary in Ir... Read More about Freshwater and coastal migration patterns in the silver-stage eel Anguilla anguilla.

Facebook from socializing to advertising. (2015)
Journal Article
Azer, J. (2015). Facebook from socializing to advertising. African journal of business management, 9(24), 796-813. https://doi.org/10.5897/ajbm2015.7866

This research aims to investigate if Facebook has a significant effect as a tool of advertising in Egypt and to present to marketers practical trends to use in order to close this gap of the missing formula. Quantitative approach based on an online s... Read More about Facebook from socializing to advertising..

E-Trickle: Enhanced Trickle Algorithm for Low-Power and Lossy Networks (2015)
Presentation / Conference Contribution
Ghaleb, B., Al-Dubai, A., & Ekonomou, E. (2015, October). E-Trickle: Enhanced Trickle Algorithm for Low-Power and Lossy Networks. Presented at IEEE 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications

Routing Protocol for Low Power and Lossy networks (RPL) is the de-facto standard for routing in resource-constrained low-power and lossy networks (LLNs) which represent the building block for the ever-growing Internet of Things (IoT). RPL along with... Read More about E-Trickle: Enhanced Trickle Algorithm for Low-Power and Lossy Networks.

Level Crossing Rate of Ratio of Product of Two k-u Random Variables and Nakagami-m Random Variable (2015)
Presentation / Conference Contribution
Krstie, D., Romdhani, I., Yassein, M. M. B., Minić, S., Petković, G., & Milacic, P. (2015, October). Level Crossing Rate of Ratio of Product of Two k-u Random Variables and Nakagami-m Random Variable. Presented at 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing

In this paper, ratio of product of two k-μ random variables and Nakagami-m random variable is analyzed. Statistical characteristics of ratio of product of two k-μ random variables and Nakagami-m random variable can be applied in performance analysis... Read More about Level Crossing Rate of Ratio of Product of Two k-u Random Variables and Nakagami-m Random Variable.

Performance evaluation of RPL objective functions (2015)
Presentation / Conference Contribution
Qasem, M., Altwassi, H., Yassein, M. B., & Al-Dubai, A. (2015, October). Performance evaluation of RPL objective functions. Presented at International Workshop on Internet of Things and Smart Spaces (IoT-Smart-2015): Applications, Challenges and Future Trends in conjunction with the 14th IEEE International Conference on Ubiquitous Computing and Communications (IUCC 2015), Liverpool, UK

IPv6 Routing Protocol for Low-Power and Lossy
Networks (RPL) is a standard for Wireless Sensors Networks. RPL uses two different ‘objective functions’ (OFs), namely Minimum Rank with Hysteresis Objective Function (MRHOF); and Objective Function Zero... Read More about Performance evaluation of RPL objective functions.

Performance Evaluation of the RPL Protocol in Fixed and Mobile Sink Low-Power and Lossy-Networks (2015)
Presentation / Conference Contribution
Wadhaj, I., Kristof, I., Romdhani, I., & Al-Dubai, A. (2015, October). Performance Evaluation of the RPL Protocol in Fixed and Mobile Sink Low-Power and Lossy-Networks. Presented at 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing

Low-Power and Lossy-Network (LLN) are usually composed of static nodes, but the increase demand for mobility in mobile robotic and dynamic environment raises the question how a routing protocol for low-power and lossy-networks such as (RPL) would per... Read More about Performance Evaluation of the RPL Protocol in Fixed and Mobile Sink Low-Power and Lossy-Networks.

A Dynamic Power Tuning for the Constrained Application Protocol of Internet of Things (2015)
Presentation / Conference Contribution
Qasem, M., Al-Dubai, A., Romdhani, I., & Yassien, M. B. (2015, October). A Dynamic Power Tuning for the Constrained Application Protocol of Internet of Things. Presented at 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing

Constrained application protocol (CoAP) has been designed for M2M and IoT applications. The resource directory (RD) in CoAP requires periodical updates by other nodes. However, a regular update process causes extra signaling overhead and drains the n... Read More about A Dynamic Power Tuning for the Constrained Application Protocol of Internet of Things.

A Decentralized Batch-Based Group Key Management Protocol for Mobile Internet of Things (DBGK) (2015)
Presentation / Conference Contribution
Abdmeziem, M. R., Tandjaoui, D., & Romdhani, I. (2015, October). A Decentralized Batch-Based Group Key Management Protocol for Mobile Internet of Things (DBGK). Presented at 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing

It is anticipated that constrained devices in the Internet of Things (IoT) will often operate in groups to achieve collective monitoring or management tasks. For sensitive and mission-critical sensing tasks, securing multicast applications is therefo... Read More about A Decentralized Batch-Based Group Key Management Protocol for Mobile Internet of Things (DBGK).