Skip to main content

Research Repository

Advanced Search

Using eye-tracking to evaluate label alignment in online forms (2008)
Presentation / Conference Contribution
Das, S., McEwan, T., & Douglas, D. (2008, October). Using eye-tracking to evaluate label alignment in online forms

We analyse the usability of different label positions in online forms, using an eye-tracking system, with a small sample of UK university-educated users. The results unexpectedly contradict Wroblewski, and recommend right-aligned labels, at least in... Read More about Using eye-tracking to evaluate label alignment in online forms.

Data Mining Medical Information: Should Artificial Neural Networks Be Used to Analyse Trauma Audit Data? (2008)
Book Chapter
Chesney, T., Penny, K., Oakley, P., Davies, S., Chesney, D., Maffulli, N., & Templeton, J. (2008). Data Mining Medical Information: Should Artificial Neural Networks Be Used to Analyse Trauma Audit Data?. In J. Wang (Ed.), Data Warehousing and Mining (2915-2927). IGI Global. https://doi.org/10.4018/978-1-59904-951-9.ch186

Trauma audit is intended to develop effective care for injured patients through process and outcome analysis, and dissemination of results. The system records injury details such as the patient’s sex and age, the mechanism of the injury, various meas... Read More about Data Mining Medical Information: Should Artificial Neural Networks Be Used to Analyse Trauma Audit Data?.

Social network analysis as a tool to evaluate the effectiveness of EC funded networks of excellence: the case of DEMO-net (2008)
Presentation / Conference Contribution
Buckner, K., & Cruickshank, P. (2008, January). Social network analysis as a tool to evaluate the effectiveness of EC funded networks of excellence: the case of DEMO-net

The European Commission, through its framework programme aims to stimulate the development of sustained collaborative research networks across Europe. Social network analysis (SNA) has previously been used to evaluate collaboration between projects a... Read More about Social network analysis as a tool to evaluate the effectiveness of EC funded networks of excellence: the case of DEMO-net.

Optimization of MPRM functions using tabular techniques and genetic algorithms. (2008)
Journal Article
Al-Jassani, B. A., Urquhart, N. B., & Almaini, A. E. A. (2008). Optimization of MPRM functions using tabular techniques and genetic algorithms. The Mediterranean journal of electronics and communications, 4, 115-125

This paper presents new techniques and algorithms to compute and optimize Mixed Polarity Reed Muller logic functions (MPRM) using Tabular techniques and Genetic Algorithms (GA). The first algorithm is used for bidirectional conversion between Fixed P... Read More about Optimization of MPRM functions using tabular techniques and genetic algorithms..

Towards QoS aware collective communications: from theory to practice: design & analysis of highly parallel multicast & broadcast algorithms. (2008)
Book
Al-Dubai, A. (2008). Towards QoS aware collective communications: from theory to practice: design & analysis of highly parallel multicast & broadcast algorithms. German Publishing House, VDM Verlag

Inter-processor communication in interconnectionnetworks can create bottlenecks for scalable parallelimplementations of computationally intensiveapplications. Multicast and broadcast are generallythe most fundamental communication operationsrequired... Read More about Towards QoS aware collective communications: from theory to practice: design & analysis of highly parallel multicast & broadcast algorithms..

A Sustainable Service-Oriented B2C Framework for Small Businesses (2008)
Presentation / Conference Contribution
Liu, X., & Ye, H. (2008, December). A Sustainable Service-Oriented B2C Framework for Small Businesses. Presented at 2008 IEEE International Symposium on Service-Oriented System Engineering, Jhongli, Taiwan

Electronic commerce is fast expanding all over the world. Currently most B2C (business to customer) electronic commerce focuses on retailing and other online services, such as online banking. Compared with large-scale enterprises and organizations, s... Read More about A Sustainable Service-Oriented B2C Framework for Small Businesses.

High performance computing and parallel multiphysics (2008)
Presentation / Conference Contribution
Soufian, M., & Chakkera, V. (2008, December). High performance computing and parallel multiphysics. Presented at International Conference on Multiphysics 2008

High performance computing and parallel multiphysics

Towards an account of intuitiveness (2008)
Journal Article
Turner, P. (2008). Towards an account of intuitiveness. Behaviour and Information Technology, 27(6), 475-482. https://doi.org/10.1080/01449290701292330

Intuitive systems are usable systems. Design guidelines advocate intuitiveness and vendors claim it - but what does it mean for a user interface, interactive system, or device to be intuitive? A review of the use of the term 'intuitive' indicates tha... Read More about Towards an account of intuitiveness.

Dynamic optimisation of an industrial web process (2008)
Journal Article
Soufian, M. (2008). Dynamic optimisation of an industrial web process. International Journal of Multiphysics, 2(3), 291-312. https://doi.org/10.1260/175095408786927471

An industrial web process has been studied and it is shown that the underlying physics of such processes governs by the Navier-Stokes partial differential equations with moving boundary conditions, which in turn have to be determined by the solution... Read More about Dynamic optimisation of an industrial web process.

Evaluation of digital identity using Windows CardSpace (2008)
Thesis
Fernandez Sepulveda, A. Evaluation of digital identity using Windows CardSpace. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/id/eprint/4032

The Internet was initially created for academic purposes, and due to its success, it has been extended to commercial environments such as e-commerce, banking, and email. As a result, Internet crime has also increased. This can take many forms, such a... Read More about Evaluation of digital identity using Windows CardSpace.

Space, place and memory prosthetics. (2008)
Book Chapter
Turner, P. (2008). Space, place and memory prosthetics. In P. Turner, S. Turner, & E. Davenport (Eds.), Exploration of Space, Technology and Spatiality: Interdisciplinary Perspectives (183-195). Idea Press. https://doi.org/10.4018/978-1-60566-020-2.ch014

Recent years have witnessed a number of initiatives to develop technology (“memory prosthetics”) to enhance and extend human memory. Typical of these is “Memories for Life,” which is one of the Grand Challenges in Computing identified by the British... Read More about Space, place and memory prosthetics..

Being-with: A study of familiarity (2008)
Journal Article
Turner, P. (2008). Being-with: A study of familiarity. Interacting with Computers, 20(4-5), 447-454. https://doi.org/10.1016/j.intcom.2008.04.002

How people learn to use an interactive device has always been an important field of research in human-computer interaction (HCI). The theoretical bases of which have ranged from the traditional cognitive perspectives through situated learning to coll... Read More about Being-with: A study of familiarity.

Distributed healthcare framework using patient-centric role-based security modelling and workflow (2008)
Thesis
Symes, M. Distributed healthcare framework using patient-centric role-based security modelling and workflow. (Dissertation). Edinburgh Napier University. http://researchrepository.napier.ac.uk/id/eprint/4008

Healthcare professionals are spending less time with patients and more time on administrative duties (Royal College of Nursing, 2008). This is due to a high bureaucratic demand (Brindley, 2007) on the caring process, patient population and longevity... Read More about Distributed healthcare framework using patient-centric role-based security modelling and workflow.

A critique of the implementation of crime and intelligence computing in three British Police forces 1976-1986 (2008)
Thesis
Naylor, A. S. R. A critique of the implementation of crime and intelligence computing in three British Police forces 1976-1986. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/id/eprint/2648

The study will examine the introduction of the computerisation of crime and intelligence recording in three police forces in the United Kingdom in the decade 1976-1986. The thesis will critique the roles and actions of the main players in this deca... Read More about A critique of the implementation of crime and intelligence computing in three British Police forces 1976-1986.

A critique of JCSP networking (2008)
Presentation / Conference Contribution
Chalmers, K., Kerridge, J., & Romdhani, I. (2008, September). A critique of JCSP networking. Presented at 31st Communicating Process Architectures 2008, York, UK

We present a critical investigation of the current implementation of JCSP Networking, examining in detail the structure and behavior of the current architecture. Information is presented detailing the current architecture and how it operates, and wea... Read More about A critique of JCSP networking.

Efficient bidirectional conversion between RM and DFRM expansions (2008)
Journal Article
Xu, H., Yang, M., & Almaini, A. E. A. (2008). Efficient bidirectional conversion between RM and DFRM expansions. The Mediterranean journal of electronics and communications, 4, 84-89

A number of different representations of the Boolean function are used in order to find a good circuit representation in terms of area, speed and power performance. In this paper, an effective decomposition method is proposed for the bidirectional tr... Read More about Efficient bidirectional conversion between RM and DFRM expansions.

Multiform Views of Multiple Trees (2008)
Presentation / Conference Contribution
Graham, M., & Kennedy, J. (2008, July). Multiform Views of Multiple Trees. Presented at 2008 12th International Conference Information Visualisation, London, UK

We describe a case study of TaxVis, a multiple view system for examining relationships between sets of multiple classification trees. The system displays multiform views of the dataset, which in turn can either be a singular view of the larger forest... Read More about Multiform Views of Multiple Trees.

You are where you have been. (2008)
Presentation / Conference Contribution
Clarke, R. A., & Wigan, M. (2008, July). You are where you have been. Presented at Seminar on 'Location Privacy'

Location is a critical aspect of both privacy and surveillance. A detailed record of locations allows all sorts of other information to be linked together, adding to information about the subject and his or her associates in the same way that a uniq... Read More about You are where you have been..

3D lattice model for post-yield and fracture behaviour of timber. (2008)
Journal Article
Reichert, T., & Ridley-Ellis, D. (2008). 3D lattice model for post-yield and fracture behaviour of timber. Timber Engineering,

The paper describes the development of a bespoke Finite Element program to model timber with a three dimensional lattice of single spring elements. These springs mimic meso-scale timber behaviour, namely the crushing and separation of fibre bunches b... Read More about 3D lattice model for post-yield and fracture behaviour of timber..

Visualisation to Aid Biodiversity Studies through Accurate Taxonomic Reconciliation. (2008)
Presentation / Conference Contribution
Graham, M., Craig, P., & Kennedy, J. (2008, July). Visualisation to Aid Biodiversity Studies through Accurate Taxonomic Reconciliation. Presented at BNCOD 2008

All aspects of organismal biology rely on the accurate identification
of specimens described and observed. This is particularly important for
ecological surveys of biodiversity, where organisms must be identified and
labelled, both for the purpose... Read More about Visualisation to Aid Biodiversity Studies through Accurate Taxonomic Reconciliation..