Skip to main content

Research Repository

Advanced Search

Outputs (390)

A rule based taxonomy of dirty data. (2011)
Presentation / Conference Contribution
Li, L., Peng, T., & Kennedy, J. (2011). A rule based taxonomy of dirty data. GSTF journal on computing, 1(2), 140-148

There is a growing awareness that high quality of data is a key to today’s business success and that dirty data existing within data sources is one of the causes of poor data quality. To ensure high quality data, enterprises need to have a process, m... Read More about A rule based taxonomy of dirty data..

Experiments in Multicore and Distributed Parallel Processing using JCSP (2011)
Presentation / Conference Contribution
Kerridge, J. (2011, June). Experiments in Multicore and Distributed Parallel Processing using JCSP. Presented at 33rd Communicating Process Architecture (CPA) Conference, University of Limerick, Ireland

It is currently very difficult to purchase any form of computer system be it, notebook, laptop, desktop server or high performance computing system that does not contain a multicore processor. Yet the designers of applications, in general, have very... Read More about Experiments in Multicore and Distributed Parallel Processing using JCSP.

PIR sensor array for hand motion recognition (2011)
Presentation / Conference Contribution
Wojtczuk, P., Armitage, A., Binnie, D., & Chamberlain, T. (2011, August). PIR sensor array for hand motion recognition. Paper presented at SensorDevices 2011

Abstract—In this paper we present our work towards a hand gesture recognition system realised with a passive thermal infrared sensor array. In contrast with the majority of recent research activities into gesture recognition, which focus on the compl... Read More about PIR sensor array for hand motion recognition.

Lightweight Software Product Line Based Privacy Protection Scheme for Pervasive Applications (2011)
Presentation / Conference Contribution
Jaroucheh, Z., Liu, X., Smith, S., & Zhao, H. (2011, July). Lightweight Software Product Line Based Privacy Protection Scheme for Pervasive Applications. Presented at 2011 IEEE 35th Annual Computer Software and Applications Conference Workshops

Protecting user's privacy is one of the main concerns for the deployment of pervasive computing systems in the real world. In pervasive environments, the user context information is naturally distributed among different spatial or logical domains. Ma... Read More about Lightweight Software Product Line Based Privacy Protection Scheme for Pervasive Applications.

An approach to domain-based scalable context management architecture in pervasive environments (2011)
Journal Article
Jaroucheh, Z., Liu, X., & Smith, S. (2012). An approach to domain-based scalable context management architecture in pervasive environments. Personal and Ubiquitous Computing, 16(6), 741-755. https://doi.org/10.1007/s00779-011-0422-0

In pervasive environments, context management systems are expected to administrate large volume of contextual information that is captured from spatial to nonspatial elements. Research in context-aware computing produced a number of middleware system... Read More about An approach to domain-based scalable context management architecture in pervasive environments.

This pervasive day: design and development case study. (2011)
Presentation / Conference Contribution
Helgason, I., Bradley, J., & Egan, C. (2011, March). This pervasive day: design and development case study. Paper presented at i-Docs, A Symposium on Interactive Documentary

This presentation will describe the development process, and the underpinning rationale, behind a multi-format, interactive exhibition and online documentary. This project, to be presented at the Edinburgh International Science Festival and the Scien... Read More about This pervasive day: design and development case study..

Implementing a co-ordinated and strategic approach to Library and Information Science research: the work of the UK Library and Information Science Research Coalition (2010)
Presentation / Conference Contribution
Hall, H., & Brazier, C. (2010, August). Implementing a co-ordinated and strategic approach to Library and Information Science research: the work of the UK Library and Information Science Research Coalition. Presented at World Library and Information Congress: 76th IFLA General Conference and Assembly

In recent years there has been growing recognition amongst the UK library and information profession of a need for a co-ordinated and strategic approach to Library and Information Science (LIS) research. Therefore in March 2009 the British Library (B... Read More about Implementing a co-ordinated and strategic approach to Library and Information Science research: the work of the UK Library and Information Science Research Coalition.

Social networking tools supporting constructive involvement throughout the policy-cycle. (2010)
Presentation / Conference Contribution
Taylor-Smith, E., & Lindner, R. (2010, May). Social networking tools supporting constructive involvement throughout the policy-cycle

This paper describes the context and background of the conference workshop “Social networking tools supporting constructive involvement throughout the policy-cycle”. EParticipation initiatives are increasingly applying social networking tools and sit... Read More about Social networking tools supporting constructive involvement throughout the policy-cycle..

Improving data quality in data warehousing applications (2010)
Presentation / Conference Contribution
Li, L., Peng, T., & Kennedy, J. (2010, June). Improving data quality in data warehousing applications. Presented at Proceedings of the 12th International Conference on Enterprise Information Systems

There is a growing awareness that high quality of data is a key to today’s business success and dirty data that exits within data sources is one of the reasons that cause poor data quality. To ensure high quality, enterprises need to have a process,... Read More about Improving data quality in data warehousing applications.

Influence of topology and payload on CO2 optimised vehicle routing (2010)
Presentation / Conference Contribution
Scott, C., Urquhart, N. B., & Hart, E. (2010). Influence of topology and payload on CO2 optimised vehicle routing. In Applications of Evolutionary Computing (141-150). https://doi.org/10.1007/978-3-642-12242-2_15

This paper investigates the influence of gradient and payload correction factors used within a CO2 emission model on the solutions to shortest path and travelling salesman problems when applied to freight delivery.
Problem instances based on real li... Read More about Influence of topology and payload on CO2 optimised vehicle routing.

Using an evolutionary algorithm to discover low CO2 tours within a Travelling Salesman Problem (2010)
Presentation / Conference Contribution
Urquhart, N. B., Scott, C., & Hart, E. (2010, April). Using an evolutionary algorithm to discover low CO2 tours within a Travelling Salesman Problem. Presented at Applications of evolutionary computation : EvoApplications 2010, Istanbul, Turkey

This paper examines the issues surrounding the effects of using vehicle emissions as the fitness criteria when solving routing problems using evolutionary techniques. The case-study examined is that of the Travelling Salesman Problem (TSP) based upon... Read More about Using an evolutionary algorithm to discover low CO2 tours within a Travelling Salesman Problem.

Recognize contextual situation in pervasive environments using process mining techniques (2010)
Journal Article
Jaroucheh, Z., Liu, X., & Smith, S. (2011). Recognize contextual situation in pervasive environments using process mining techniques. Journal of Ambient Intelligence and Humanized Computing, 2(1), 53-69. https://doi.org/10.1007/s12652-010-0038-7

Research in pervasive computing and ambience intelligence aims to enable users to interact with the environment in a context-aware way. To achieve this, a complex set of features describing different aspects of the environment has to be captured and... Read More about Recognize contextual situation in pervasive environments using process mining techniques.

Mapping Features to Context Information: Supporting Context Variability for Context-Aware Pervasive Applications (2010)
Presentation / Conference Contribution
Jaroucheh, Z., Liu, X., & Smith, S. (2010, August). Mapping Features to Context Information: Supporting Context Variability for Context-Aware Pervasive Applications. Presented at 2010 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology

Context-aware computing is widely accepted as a promising paradigm to enable seamless computing. Several middlewares and ontology-based models for describing context information have been developed in order to support context-aware applications. Howe... Read More about Mapping Features to Context Information: Supporting Context Variability for Context-Aware Pervasive Applications.

An embedded real-time pedestrian detection system using an infrared camera. (2010)
Presentation / Conference Contribution
Walczyk, R., Armitage, A., & Binnie, D. (2010). An embedded real-time pedestrian detection system using an infrared camera. In IET Irish Signals and Systems Conference (ISSC 2009). https://doi.org/10.1049/cp.2009.1716

An FPGA-based implementation of a pedestrian detection system using thermal infrared imaging is presented. The main feature of the processing platform is its ability to detect pedestrians at frame-rate from an infrared video stream. It is designed... Read More about An embedded real-time pedestrian detection system using an infrared camera..

Apto: A MDD-Based Generic Framework for Context-Aware Deeply Adaptive Service-Based Processes (2010)
Presentation / Conference Contribution
Jaroucheh, Z., Liu, X., & Smith, S. (2010, July). Apto: A MDD-Based Generic Framework for Context-Aware Deeply Adaptive Service-Based Processes. Presented at 2010 IEEE International Conference on Web Services

Context-awareness and adaptability are important and desirable properties of service-based processes designed to provide personalized services. Most of the existing approaches focus on the adaptation at the process instance level [1] which involves e... Read More about Apto: A MDD-Based Generic Framework for Context-Aware Deeply Adaptive Service-Based Processes.

Comparative study on connected component labeling algorithms for embedded video processing systems. (2010)
Presentation / Conference Contribution
Walczyk, R., Armitage, A., & Binnie, D. (2010). Comparative study on connected component labeling algorithms for embedded video processing systems. In H. Deligiannidis (Ed.), Proceedings of the IPCV'10

The objective of this paper is to carry out a detailed analysis of the most popular connected components labeling (CCL) algorithms for binary images. This study investigates their usability for processing streaming data and suitability for implementa... Read More about Comparative study on connected component labeling algorithms for embedded video processing systems..

Not what you know, nor who you know, but who you know already: Examining Online Information Sharing Behaviours in a Blogging Environment through the Lens of Social Exchange Theory (2010)
Journal Article
Hall, H., Widen, G., & Paterson, L. (2010). Not what you know, nor who you know, but who you know already: Examining Online Information Sharing Behaviours in a Blogging Environment through the Lens of Social Exchange Theory. Libri, 60(2), 117-128. https://doi.org/10.1515/libr.2010.011

This paper focuses on the extent to which online information sharing practice is socially motivated. A key interest is how knowledge of the existing social connections between actors may predict their information sharing behaviour when they move into... Read More about Not what you know, nor who you know, but who you know already: Examining Online Information Sharing Behaviours in a Blogging Environment through the Lens of Social Exchange Theory.