Skip to main content

Research Repository

Advanced Search

Comparative analysis of chaotic and non-chaotic image encryption schemes (2014)
Presentation / Conference Contribution
Younas, M. B., & Ahmad, J. (2014, December). Comparative analysis of chaotic and non-chaotic image encryption schemes. Presented at 2014 International Conference on Emerging Technologies (ICET), Islamabad, Pakistan

In modern era, multimedia technologies have been developed significantly. Multimedia data such as audio, video and image transfers over the internet is open and insecure. Security is required for storage and transmission of digital images to avoid fr... Read More about Comparative analysis of chaotic and non-chaotic image encryption schemes.

Dependency-based semantic parsing for concept-level text analysis (2014)
Presentation / Conference Contribution
Poria, S., Agarwal, B., Gelbukh, A., Hussain, A., & Howard, N. (2014, April). Dependency-based semantic parsing for concept-level text analysis. Presented at 15th International Conference, CICLing 2014, Kathmandu, Nepal

Concept-level text analysis is superior to word-level analysis as it preserves the semantics associated with multi-word expressions. It offers a better understanding of text and helps to significantly increase the accuracy of many text mining tasks.... Read More about Dependency-based semantic parsing for concept-level text analysis.

Classification of Fish Ectoparasite Genus Gyrodactylus SEM Images Using ASM and Complex Network Model (2014)
Presentation / Conference Contribution
Ali, R., Jiang, B., Man, M., Hussain, A., & Luo, B. (2014, November). Classification of Fish Ectoparasite Genus Gyrodactylus SEM Images Using ASM and Complex Network Model. Presented at 21st International Conference on Neural Information Processing, ICONIP 2014, Kuching, Malaysia

Active Shape Models and Complex Network method are applied to the attachment hooks of several species of Gyrodactylus, including the notifiable pathogen G. salaris, to classify each species to their true species type. ASM is used as a feature extract... Read More about Classification of Fish Ectoparasite Genus Gyrodactylus SEM Images Using ASM and Complex Network Model.

The role of simulation in designing for universal access. (2014)
Presentation / Conference Contribution
Keates, S., & Looms, P. O. (2014, June). The role of simulation in designing for universal access. Presented at 8th International Conference, UAHCI 2014, Heraklion, Crete, Greece

It is known that the adoption of user-centred design processes can lead to more universally accessible products and services. However, the most frequently cited approach to user-centred design, i.e. participatory design, can be both problematic and e... Read More about The role of simulation in designing for universal access..

Adoption of information and communication technologies in the hotel and associated business in Addis Ababa, Ethiopa (2014)
Presentation / Conference Contribution
Demeke, W. (2014, February). Adoption of information and communication technologies in the hotel and associated business in Addis Ababa, Ethiopa. Presented at The 7th IADIS International Conference, Information Systems, Madrid, Spain

Many international organisations assert that Information and Communication Technologies (ICTs) play an important role as a facilitator and as one of the critical determinants for economic growth and poverty reductions in the developing countries. For... Read More about Adoption of information and communication technologies in the hotel and associated business in Addis Ababa, Ethiopa.

Employing Neural Networks for the Detection of SQL Injection Attack (2014)
Presentation / Conference Contribution
Sheykhkanloo, N. M. (2014, September). Employing Neural Networks for the Detection of SQL Injection Attack. Presented at 7th International Conference on Security of Information and Networks - SIN '14, Glasgow, UK

Structured Query Language Injection (SQLI) attack is a code injection technique in which malicious SQL statements are inserted into the SQL database by simply using web browsers. SQLI attack can cause severe damages on a given SQL database such as lo... Read More about Employing Neural Networks for the Detection of SQL Injection Attack.

Intrusion detection method based on nonlinear correlation measure (2014)
Journal Article
Ambusaidi, M. A., Tan, Z., He, X., Nanda, P., Lu, L. F., & Jamdagni, A. (2014). Intrusion detection method based on nonlinear correlation measure. International Journal of Internet Protocol Technology, 8(2/3), 77. https://doi.org/10.1504/ijipt.2014.066377

Cyber crimes and malicious network activities have posed serious threats to the entire internet and its users. This issue is becoming more critical, as network-based services, are more widespread and closely related to our daily life. Thus, it has ra... Read More about Intrusion detection method based on nonlinear correlation measure.

A Software Engineering Framework for Context-Aware Service-Based Processes in Pervasive Environments (2014)
Book Chapter
Jaroucheh, Z., Liu, X., & Smith, S. (2014). A Software Engineering Framework for Context-Aware Service-Based Processes in Pervasive Environments. In Software Design and Development (71-95). IGI Global. https://doi.org/10.4018/978-1-4666-4301-7.ch005

Context-awareness is considered to be the cornerstone technique for developing pervasive computing applications that are flexible, adaptable, and capable of acting autonomously on behalf of the user. However, context-awareness introduces various soft... Read More about A Software Engineering Framework for Context-Aware Service-Based Processes in Pervasive Environments.

Finding middle ground? Multi-objective Natural Language Generation from time-series data (2014)
Presentation / Conference Contribution
Gkatzia, D., Hastie, H., & Lemon, O. (2014, April). Finding middle ground? Multi-objective Natural Language Generation from time-series data. Presented at Proceedings of the 14th Conference of the European Chapter of the Association for Computational Linguistics, volume 2: Short Papers, Gothenburg, Sweden

A Natural Language Generation (NLG) system is able to generate text from nonlinguistic data, ideally personalising the content to a user’s specific needs. In some cases, however, there are multiple stakeholders with their own individual goals, needs... Read More about Finding middle ground? Multi-objective Natural Language Generation from time-series data.

Comparing Multi-label Classification with Reinforcement Learning for Summarisation of Time-series Data (2014)
Presentation / Conference Contribution
Gkatzia, D., Hastie, H., & Lemon, O. (2014, June). Comparing Multi-label Classification with Reinforcement Learning for Summarisation of Time-series Data. Presented at The 52nd Annual Meeting of the Association for Computational Linguistics, Baltimore

We present a novel approach for automatic report generation from time-series data, in the context of student feedback generation. Our proposed methodology treats content selection as a multi-label (ML)
classification problem, which takes as input ti... Read More about Comparing Multi-label Classification with Reinforcement Learning for Summarisation of Time-series Data.

Using Code Generation to Build a Platform for Developing and Testing Dialogue Games. (2014)
Presentation / Conference Contribution
Yuan, T., Manandhar, S., & Wells, S. (2014, December). Using Code Generation to Build a Platform for Developing and Testing Dialogue Games. Presented at Computational Models of Natural Argument (CMNA14),

Despite increasing research into their use as a vehicle for Human-
Computer Dialogue and Inter-Agent Communication, Dialogue Games have not
seen good uptake in industry. One of the reasons for this is the lack of methodologies
and tooling for the... Read More about Using Code Generation to Build a Platform for Developing and Testing Dialogue Games..

Supporting argumentation schemes in argumentative dialogue games. (2014)
Journal Article
Wells, S. (2014). Supporting argumentation schemes in argumentative dialogue games. Studies in Logic, Grammar and Rhetoric, 36, 171-191. https://doi.org/10.2478/slgr-2014-0009

This paper reports preliminary work into the exploitation of argu- mentation schemes within dialogue games. We identify a property of dialogue games that we call “scheme awareness” that captures the relationship between dialogue game systems and argu... Read More about Supporting argumentation schemes in argumentative dialogue games..

Argument Mining: Was Ist Das? (2014)
Presentation / Conference Contribution
Wells, S. (2014, December). Argument Mining: Was Ist Das?. Presented at Computational Models of Natural Argument (CMNA14),

Argument Mining has become an increasingly popular term over the last
few years but it is unclear to what exactly the term refers. It definitely refers to an
area of endeavour within argumentation theory and within computational argumentation
and... Read More about Argument Mining: Was Ist Das?.

Determining content for unknown users: lessons from the MinkApp case study. (2014)
Presentation / Conference Contribution
Webster, G., Sripada, S. G., Mellish, C., Melero, Y., Arts, K., Lambin, X., & Wal, R. V. D. (2014, April). Determining content for unknown users: lessons from the MinkApp case study. Presented at Third International Conference on Natural Language Generation

If an NLG system needs to be put in place as soon as possible it is not always possible to know in advance who the us-ers of a system are or what kind of in-formation will interest them. This paper describes the development of a system and contextual... Read More about Determining content for unknown users: lessons from the MinkApp case study..

Technology for supporting care staff in residential homes. (2014)
Journal Article
Webster, G., & Hanson, V. L. (2014). Technology for supporting care staff in residential homes. ACM transactions on accessible computing, 5, 8. https://doi.org/10.1145/2543577

Care staff, those who attend to the day-to-day needs of people in residential facilities, represent an important segment of the health-care provision of those entrusted to their care. The potential use of technology by care staff has not been a focus... Read More about Technology for supporting care staff in residential homes..

It's not interaction, it's make believe. (2014)
Presentation / Conference Contribution
Turner, P., Turner, S., & Carruthers, L. (2014, September). It's not interaction, it's make believe

A principal, but largely unexplored, use of our cognition when using interacting technology involves pretending. To pretend is to believe that which is not the case, for example, when we use the desktop on our personal computer we are pretending, tha... Read More about It's not interaction, it's make believe..

Evaluating the Perceived Similarity Between Audio-Visual Features Using Corpus-Based Concatenative Synthesis. (2014)
Presentation / Conference Contribution
Tsiros, A. (2014, June). Evaluating the Perceived Similarity Between Audio-Visual Features Using Corpus-Based Concatenative Synthesis. Presented at International Conference on New Interfaces for Musical Expression

This paper presents the findings of two exploratory studies. In these studies participants performed a series of image-sound association and detection tasks. The aim of the studies was to investigate the perceived similarity and the effectiveness of... Read More about Evaluating the Perceived Similarity Between Audio-Visual Features Using Corpus-Based Concatenative Synthesis..

Walking & talking: probing the urban lived experience. (2014)
Presentation / Conference Contribution
Stals, S., Smyth, M., & Ijsselsteijn, W. (2014, October). Walking & talking: probing the urban lived experience. Presented at NordiCHI'14 8th Nordic Conference on Human-Computer Interaction: Fun, Fast, Foundational

With ubiquitous mobile computing devices spreading throughout the urban environment of everyday life, there is a growing need to better understand person-place relationships and how technology can play a role in this urban experience. To this end, we... Read More about Walking & talking: probing the urban lived experience..

Cloud-based identity and identity meta-data: secure and control own data in globalization era. (2014)
Journal Article
Spyra, G., Buchanan, W. J., Cruickshank, P., & Ekonomou, E. (2014). Cloud-based identity and identity meta-data: secure and control own data in globalization era. International Journal of Reliable and Quality E-Healthcare, 3, https://doi.org/10.4018/ijrqeh.2014010105

This paper proposes a new identity, and its underlying meta-data, model. The approach enables secure spanning of identity meta-data across many boundaries such as health-care, financial and educational institutions, including all others that store an... Read More about Cloud-based identity and identity meta-data: secure and control own data in globalization era..

From employability attributes to professional identity: students transitioning to the workplace. (2014)
Presentation / Conference Contribution
Smith, S., Sobolewska, E., & Smith, I. (2014, October). From employability attributes to professional identity: students transitioning to the workplace

In order to realize the employment ambitions of graduates we can work with students to facilitate the construction of their identity as members of a global engineering profession. Of particular interest is whether (and, if so, how) students reconstru... Read More about From employability attributes to professional identity: students transitioning to the workplace..