Skip to main content

Research Repository

Advanced Search

Outputs (701)

Normalisation of gait data in children (2002)
Journal Article
Stansfield, B., Hillman, S., Hazlewood, M., Lawson, A., Mann, A., Loudon, I., & Robb, J. (2003). Normalisation of gait data in children. Gait and Posture, 17(1), 81-87. https://doi.org/10.1016/s0966-6362%2802%2900062-0

The comparative effect of semi-dimensional (SD) and non-dimensional (ND) normalisation on the results of a longitudinal study of gait in 5–12-year old children was investigated. The use of both height and leg length in the normalisation was examined.... Read More about Normalisation of gait data in children.

Towards reusable and reconfigurable models for the WWW (2002)
Presentation / Conference Contribution
Brown, E., & Buchanan, W. (2002, August). Towards reusable and reconfigurable models for the WWW. Presented at 26th Annual International Computer Software and Applications, Oxford, UK

Reuse and component design have extensively been applied to software engineering, but reuse and formal design methods in WWW-based system is still in its infancy. Most WWW developers currently design WWW content for the most efficient delivery and do... Read More about Towards reusable and reconfigurable models for the WWW.

On the design of scalable pipelined broadcasting for mesh networks (2002)
Presentation / Conference Contribution
Al-Dubai, A., & Ould-Khaoua, M. (2002, June). On the design of scalable pipelined broadcasting for mesh networks. Presented at 16th Annual International Symposium on High Performance Computing Systems and Applications, 2002. Proceedings

Minimising the communication latency and achieving considerable scalability are of paramount importance when designing high performance broadcast algorithms. Many algorithms for wormhole-switched meshes have been widely reported in the literature. Ho... Read More about On the design of scalable pipelined broadcasting for mesh networks.

An intelligent agent security intrusion system (2002)
Presentation / Conference Contribution
Pikoulas, J., Buchanan, W., Mannion, M., & Triantafyllopoulos, K. (2002, April). An intelligent agent security intrusion system. Presented at Ninth Annual IEEE International Conference and Workshop on the Engineering of Computer-Based Systems, Lund, Sweden

Network security has now become one of the most important aspects in computer systems and the Internet. Apart from strong encryption, there is no definite method of truly securing network, thus they must be protected at different levels of the OSI mo... Read More about An intelligent agent security intrusion system.

Coded path routing: a new approach to broadcasting in 3-D meshes, Technical Report (2002)
Presentation / Conference Contribution
Al-Dubai, A., & Ould-Khaoua, M. (2001, April). Coded path routing: a new approach to broadcasting in 3-D meshes, Technical Report. Presented at 20th IEEE International Performance, Computing, and Communications Conference, Phoenix, AZ, USA

Broadcast is an important collective communication operation required by many real-world parallel applications. This paper proposes the Coded Path Routing (or CPR for short) as a new approach for designing efficient broadcast algorithms for wormhole-... Read More about Coded path routing: a new approach to broadcasting in 3-D meshes, Technical Report.

An efficient adaptive broadcast algorithm for the mesh network (2001)
Presentation / Conference Contribution
Al-Dubai, A., & Ould-Khaoua, M. (2001, June). An efficient adaptive broadcast algorithm for the mesh network

Most existing broadcast algorithms proposed for the mesh do not scale well with the network size. Furthermore, they have been mainly based on deterministic routing, which cannot exploit the alternative paths provided by mesh topology to reduce commun... Read More about An efficient adaptive broadcast algorithm for the mesh network.

Towards optimal broadcasting in wormhole-routed meshes (2001)
Presentation / Conference Contribution
Al-Dubai, A., Ould-Khaoua, M., & Mackenzie, L. (2001, June). Towards optimal broadcasting in wormhole-routed meshes. Presented at PDPTA '2001

Most existing broadcast algorithms proposed for the mesh do not scale well with the network size. Furthermore, they have been mainly based on deterministic routing, which cannot exploit the alternative paths provided by mesh topology to reduce commun... Read More about Towards optimal broadcasting in wormhole-routed meshes.

An agent based Bayesian forecasting model for enhanced network security. (2001)
Presentation / Conference Contribution
Pikoulas, J., Buchanan, W. J., Mannion, M., & Triantafyllopoulos, K. (2001, April). An agent based Bayesian forecasting model for enhanced network security. Presented at ECBS 2001

Security has become a major issue in many organisations, but most systems still rely on operating systems, and a user ID and password system to provide user authentication and validation. They also tend to be centralized in their approach which makes... Read More about An agent based Bayesian forecasting model for enhanced network security..

Sagittal joint kinematics, moments, and powers are predominantly characterized by speed of progression, not age, in normal children. (2001)
Journal Article
Stansfield, B., Hillman, S., Hazlewood, M., Lawson, A., Mann, A. M., Loudon, I. R., & Robb, J. E. (2001). Sagittal joint kinematics, moments, and powers are predominantly characterized by speed of progression, not age, in normal children. Journal of Pediatric Orthopaedics, 21, 403-411

Twenty-six healthy 7-year-old children were enrolled in a 5-year longitudinal study to examine the importance of age and speed in the characterization of sagittal joint angles, moments, and powers. In 740 gait trials, children walking at self-selecte... Read More about Sagittal joint kinematics, moments, and powers are predominantly characterized by speed of progression, not age, in normal children..

Enhancing network management using mobile agents. (2000)
Presentation / Conference Contribution
Buchanan, W. J., Naylor, M., & Scott, A. (2000, April). Enhancing network management using mobile agents

Agent mobility addresses some limitations faced by classic client/server architecture, namely, in minimising bandwidth consumption, in supporting adaptive network load balancing and in solving problems caused by intermittent or unreliable network con... Read More about Enhancing network management using mobile agents..

Software agents and computer network security. (2000)
Presentation / Conference Contribution
Pikoulas, J., Mannion, M., & Buchanan, W. J. (2000, April). Software agents and computer network security

Preventing unauthorised access to corporate information systems is essential for many organisations. To address this problem we built a security enhancement software system using software agents, in which a core software agent resides on a server and... Read More about Software agents and computer network security..

Truly distributed control systems using fieldbus technology. (2000)
Presentation / Conference Contribution
Scott, A., & Buchanan, W. J. (2000, April). Truly distributed control systems using fieldbus technology

This paper outlines the three main field bus type standards: FOUNDATION Fieldbus; WorldFIP; and the CAN bus, each of which have great advantages over traditional instrumentation networking technology. The paper shows, using their specification, how t... Read More about Truly distributed control systems using fieldbus technology..

Advanced PC architecture. (2000)
Book
Buchanan, W. J., & Wilson, A. (2000). Advanced PC architecture. Addison Wesley

The first book ever to give a complete picture of the workings of a PC! A comprehensive guide to the component systems of the PC, this book provides a foundation to the understanding of previous, current and future PC systems, and how the specificati... Read More about Advanced PC architecture..

Computer busses. (2000)
Book
Buchanan, W. J. (2000). Computer busses. Butterworth-Heinemann

Distributed systems and networks. (2000)
Book
Buchanan, W. J. (2000). Distributed systems and networks. McGraw-Hill

This book provides the student with comprehensive coverage of both networks and system architecture. It aims to introduce the most widely used networking protocols and distributed systems, covering recent developments in distributed processing and th... Read More about Distributed systems and networks..

Speed improvements for the RSA encryption method (2000)
Thesis
Wang, H.-C. Speed improvements for the RSA encryption method. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/id/eprint/4065

This thesis presents methods that can be used to improve the operation of the RSA encryption method. It shows the principles of encryption, and then expands this to give the operation of public-key methods, which includes the number value theorems ap... Read More about Speed improvements for the RSA encryption method.

Investigation, analysis and determination of inclusions in high‐tolerance board design (2000)
Journal Article
Scott, A., & Buchanan, W. J. (2000). Investigation, analysis and determination of inclusions in high‐tolerance board design. Circuit World, 26(2), 7-9. https://doi.org/10.1108/03056120010310873

This paper outlines the inclusions in laminates that can cause the false rejection in printed circuit board (PCB) manufacture. Laminate inclusions are now becoming prevalent because of the higher resolution required for the inspection of reduced trac... Read More about Investigation, analysis and determination of inclusions in high‐tolerance board design.