Skip to main content

Research Repository

Advanced Search

3D lattice model for post-yield and fracture behaviour of timber. (2008)
Journal Article
Reichert, T., & Ridley-Ellis, D. (2008). 3D lattice model for post-yield and fracture behaviour of timber. Timber Engineering,

The paper describes the development of a bespoke Finite Element program to model timber with a three dimensional lattice of single spring elements. These springs mimic meso-scale timber behaviour, namely the crushing and separation of fibre bunches b... Read More about 3D lattice model for post-yield and fracture behaviour of timber..

The impact of routing schemes on group communication throughput in scalable networks. (2008)
Presentation / Conference Contribution
Al-Dubai, A. (2008, April). The impact of routing schemes on group communication throughput in scalable networks. Presented at IEEE International Symposium on Parallel and Distributed Processing, 2008. IPDPS 2008

Multicast communication has been a major avenue for many studies in interconnection networks. However, such a communication pattern has been studied under either limited operating conditions or within the context of deterministic routing algorithms.... Read More about The impact of routing schemes on group communication throughput in scalable networks..

A configuration approach for selecting a data warehouse architecture (2008)
Thesis
Weir, R. A configuration approach for selecting a data warehouse architecture. (Thesis). Napier University. http://researchrepository.napier.ac.uk/id/eprint/2445

Living in the Information Age, organisations must be able to exploit their data alongside the traditional economic resources of man, machine and money. Accordingly, organisations implement data warehouses to organise and consolidate their data, which... Read More about A configuration approach for selecting a data warehouse architecture.

Generative aspect-oriented component adaptation (2008)
Thesis
Feng, Y. Generative aspect-oriented component adaptation. (Thesis). Napier University. http://researchrepository.napier.ac.uk/id/eprint/2431

Due to the availability of components and the diversity of target applications, mismatches between pre-qualified existing components and the particular reuse context in applications are often inevitable and have been a major hurdle of component reusa... Read More about Generative aspect-oriented component adaptation.

A new data, document and geospatial repository: knowledge base and project support for a major international railway project. (2008)
Presentation / Conference Contribution
Wigan, M., Kukla, R., Benjamins, M., & Grashoff, P. (2008, April). A new data, document and geospatial repository: knowledge base and project support for a major international railway project. Poster presented at Third International Conference on Open Repositories

The simplicity of the basic design has proved to be robust to the changing and varied needs of different ?clients?, but the complexity of the intellectual property issues engendered by the mix of commercial, open source and hand rolled software has p... Read More about A new data, document and geospatial repository: knowledge base and project support for a major international railway project..

Testing and Sampling Parallel Systems (2007)
Presentation / Conference Contribution
Kerridge, J. (2007, July). Testing and Sampling Parallel Systems. Presented at 30th Communicating Process Architectures Conference, CPA 2007, University of Surrey, Guildford, Surrey, UK

The testing of systems using tools such as JUnit is well known to the sequential programming community. It is perhaps less well known to the parallel computing community because it relies on systems terminating so that system outputs can be compared... Read More about Testing and Sampling Parallel Systems.

A software framework for the microscopic modelling of pedestrian movement (2007)
Thesis
Kukla, R. A software framework for the microscopic modelling of pedestrian movement. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/id/eprint/3927

A town planner, faced with the task of designing attractive walking spaces, needs a tool that will allow different designs to be compared in terms of their attractiveness as well as their effectiveness. PEDFLOW is an attempt to create such a tool. It... Read More about A software framework for the microscopic modelling of pedestrian movement.

Progzoo: a gentle introduction to programming. (2007)
Presentation / Conference Contribution
Smith, S., & Cumming, A. (2007, April). Progzoo: a gentle introduction to programming. Presented at 7th One-Day Conference on the Teaching of Programming

A fully integrated web-based learning resource has been introduced to support the teaching and learning of Java programming. Students are introduced to features of the language through a series of short questions with supporting hints and tips. This... Read More about Progzoo: a gentle introduction to programming..

Ensemble: embodied experiences in a sound and jewellery installation (2007)
Presentation / Conference Contribution
Kettley, S., Smyth, M., Arvind, D. K., Greig, F., McGregor, I., & Paechter, B. (2007, December). Ensemble: embodied experiences in a sound and jewellery installation. Presented at Create 07

ensemble - an interactive collection of networked jewellery with gesturally determined, real time sonic output

A product line based aspect-oriented generative unit testing approach to building quality components (2007)
Presentation / Conference Contribution
Feng, Y., Liu, X., & Kerridge, J. (2007, July). A product line based aspect-oriented generative unit testing approach to building quality components. Presented at 31st Annual International Computer Software and Applications Conference (COMPSAC 2007), Beijing, China

The quality of component-based systems highly
depends on how effectively testing is carried out. To
achieve the maximal testing effectiveness, this paper
presents a product line based aspect oriented approach to
unit testing. The aspect product l... Read More about A product line based aspect-oriented generative unit testing approach to building quality components.

Adaptive PN code acquisition in multi-path spread spectrum communications using FPGA. (2007)
Presentation / Conference Contribution
Wei, B., Sharif, M., Binnie, D., & Almaini, A. E. A. (2007, July). Adaptive PN code acquisition in multi-path spread spectrum communications using FPGA. Presented at IEEE 13th International Symposium on Signals, Circuits and Systems, ISSCS 2007

Performance of two pseudonoise (PN) code detectors was tested. Cell averaging (CA) and order Statistics (OS) constant false alarm rates (CFAR) were analysed against mean acquisition time (MAT) and against the probability of detection (Pd). Both detec... Read More about Adaptive PN code acquisition in multi-path spread spectrum communications using FPGA..

Carbon-friendly travel plan construction using an evolutionary algorithm (2007)
Presentation / Conference Contribution
Urquhart, N. B., & Urquhart, N. B. (2007, July). Carbon-friendly travel plan construction using an evolutionary algorithm. Presented at Proceedings of the 9th annual conference on Genetic and evolutionary computation - GECCO '07

This paper discusses the use of an evolutionary algorithm to design workplace travel plans, to promote car sharing and reduce carbon emissions from single-occupancy motor vehicles.

How affinity influences tolerance in an idiotypic network. (2007)
Journal Article
Hart, E., Bersini, H., & Santos, F. (2007). How affinity influences tolerance in an idiotypic network. Journal of Theoretical Biology, 249, 422-436. https://doi.org/10.1016/j.jtbi.2007.07.019

The mutability of bacteriophages offers a particular advantage in the treatment of bacterial infections not afforded by other antimicrobial therapies. When phage-resistant bacteria emerge, mutation may generate phage capable of exploiting and thus li... Read More about How affinity influences tolerance in an idiotypic network..

A digital photographic method for 3D reconstruction of standing tree shape. (2007)
Journal Article
Hapca, A. I., Mothe, F., & Leban, J.-M. (2007). A digital photographic method for 3D reconstruction of standing tree shape. Annals of Forest Science, 64(6), 631-637. https://doi.org/10.1051/forest%3A2007041

A digital photographic method is presented which is able to reconstruct the profile of the stem on standing trees up to a height of 12 m and to provide a fine level of detail. The method uses two digital photographs taken at 90° to each other and doe... Read More about A digital photographic method for 3D reconstruction of standing tree shape..

Progressive skinning for video game character animations. (2006)
Presentation / Conference Contribution
Pilgrim, S. J., Aguado, A., Mitchell, K., & Steed, A. (2006, December). Progressive skinning for video game character animations. Presented at ACM SIGGRAPH 2006 Sketches on - SIGGRAPH '06

Mobile Multicast Route Optimisation (2006)
Presentation / Conference Contribution
Romdhani, I., Munoz, J., Bettahar, H., & Bouabdallah, A. (2006, June). Mobile Multicast Route Optimisation. Presented at 2006 IEEE International Conference on Communications

The multiparty nature of multicast applications presents new challenges for Mobile IP users. Unfortunately, when a multicast receiver is mobile, it will experience additional delay in receiving multicast packets due to handover delay, join latency, a... Read More about Mobile Multicast Route Optimisation.

NetHost-Sensor: Investigating the capture of end-to-end encrypted intrusive data (2006)
Journal Article
Abimbola, A., Munoz, J., & Buchanan, W. J. (2006). NetHost-Sensor: Investigating the capture of end-to-end encrypted intrusive data. Computers and Security, 25(6), 445-451. https://doi.org/10.1016/j.cose.2006.04.001

Intrusion Detection Systems (IDSs) are systems that protect against violation of data integrity, confidentiality and availability of resources. In the past 20 years, these systems have evolved with the technology and have become more sophisticated. D... Read More about NetHost-Sensor: Investigating the capture of end-to-end encrypted intrusive data.