Skip to main content

Research Repository

Advanced Search

Outputs (133)

An e-Health cloud. (2010)
Presentation / Conference Contribution
Buchanan, W. J., Thuemmler, C., Fan, L., Lo, O., & Khedim, A. S. (2010, August). An e-Health cloud. Presented at Cloud Computing for the Public Sector

A significant weakness within cloud-based systems is often their security. This presentation shows how a health care cloud has been created which preserves the rights of the patient to control access to their captured data, and then how this is used... Read More about An e-Health cloud..

Building low CO2 solutions to the vehicle routing problem with time windows using an evolutionary algorithm. (2010)
Presentation / Conference Contribution
Urquhart, N. B., Hart, E., & Scott, C. (2010, July). Building low CO2 solutions to the vehicle routing problem with time windows using an evolutionary algorithm. Presented at International Conference on Evolutionary Computation, Barcelona, Spain

An evolutionary Multi-Objective Algorithm (MOA) is used to investigate the trade-off between CO2 savings, distance and number of vehicles used in a typical vehicle routing problem with Time Windows (VRPTW). A problem set is derived containing three... Read More about Building low CO2 solutions to the vehicle routing problem with time windows using an evolutionary algorithm..

On artificial immune systems and swarm intelligence (2010)
Journal Article
Timmis, J., Andrews, P., & Hart, E. (2010). On artificial immune systems and swarm intelligence. Swarm Intelligence, 4(4), 247-273. https://doi.org/10.1007/s11721-010-0045-5

This position paper explores the nature and role of two bio-inspired paradigms, namely Artificial Immune Systems (AIS) and Swarm Intelligence (SI). We argue that there are many aspects of AIS that have direct parallels with SI and examine the role of... Read More about On artificial immune systems and swarm intelligence.

Studying early childhood: Part 1 - becoming an active learner (2010)
Journal Article
Sambell, K. (2010). Studying early childhood: Part 1 - becoming an active learner. Nursery World, 23,

When making the transition to studying at degree level, students will be challenged to think in new and unaccustomed ways, with different study practices than they have used before. Embarking on any degree involves a step-change in a student's approa... Read More about Studying early childhood: Part 1 - becoming an active learner.

Novel QoS-Aware Gateway Centralized Multi-hop Routing for Wireless Mesh Networks (2010)
Presentation / Conference Contribution
Zhao, L., Al-Dubai, A. Y., & Romdhani, I. (2010, June). Novel QoS-Aware Gateway Centralized Multi-hop Routing for Wireless Mesh Networks. Presented at 2010 10th IEEE International Conference on Computer and Information Technology

Wireless Mesh Networking (WMN) emerges as a new technology to reshape the broadband industry towards a more efficient and cost effective connectivity. The WMN has been the ideal technology for the next generation wireless community networks that offe... Read More about Novel QoS-Aware Gateway Centralized Multi-hop Routing for Wireless Mesh Networks.

EvoFIT: Police Software For Constructing Facial Composites (2010)
Presentation / Conference Contribution
Skelton, F., & Frowd, C. (2010, September). EvoFIT: Police Software For Constructing Facial Composites. Poster presented at Police Learning: A Changing World, University of Central Lancashire

Children's Reading Habits. (2010)
Presentation / Conference Contribution
Gray, A. (2010, September). Children's Reading Habits. Paper presented at Society for the History of Authorship, Reading and Publishing

No abstract available.

Mapping Features to Context Information: Supporting Context Variability for Context-Aware Pervasive Applications (2010)
Presentation / Conference Contribution
Jaroucheh, Z., Liu, X., & Smith, S. (2010, August). Mapping Features to Context Information: Supporting Context Variability for Context-Aware Pervasive Applications. Presented at 2010 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology

Context-aware computing is widely accepted as a promising paradigm to enable seamless computing. Several middlewares and ontology-based models for describing context information have been developed in order to support context-aware applications. Howe... Read More about Mapping Features to Context Information: Supporting Context Variability for Context-Aware Pervasive Applications.

Student perception of on-line lectures with a blended learning environment. (2010)
Presentation / Conference Contribution
Buchanan, W. J., Macfarlane, R., & Ludwiniak, R. (2010, September). Student perception of on-line lectures with a blended learning environment. Presented at The 4th International Conference on Cybercrime Forensics Education & Training

Educational institutions are increasingly moving towards enhancing learning through the use of integrated information technology. Blended, or augmented, learning, aims to support the traditional learning environment – where the instructor blends onli... Read More about Student perception of on-line lectures with a blended learning environment..

An embedded real-time pedestrian detection system using an infrared camera. (2010)
Presentation / Conference Contribution
Walczyk, R., Armitage, A., & Binnie, D. (2009, June). An embedded real-time pedestrian detection system using an infrared camera. Presented at IET Irish Systems & Signals Conference, Dublin

An FPGA-based implementation of a pedestrian detection system using thermal infrared imaging is presented. The main feature of the processing platform is its ability to detect pedestrians at frame-rate from an infrared video stream. It is designed... Read More about An embedded real-time pedestrian detection system using an infrared camera..

Interagency data exchange protocols as computational data protection law. (2010)
Presentation / Conference Contribution
Buchanan, W. J., Fan, L., Lawson, A., Schafer, B., Scott, R., Thuemmler, C., & Uthmani, O. (2010, December). Interagency data exchange protocols as computational data protection law. Presented at JURIX 2010

The paper describes a collaborative project between computer scientist, police officers, medical professionals and social workers to develop a communication infrastructure that allows information sharing while observing Data Protection law “by design... Read More about Interagency data exchange protocols as computational data protection law..

Novel information sharing syntax for data sharing between police and community partners, using role-based security. (2010)
Presentation / Conference Contribution
Uthmani, O., Buchanan, W. J., Lawson, A., Thuemmler, C., Fan, L., Scott, R., Lavery, A., & Mooney, C. (2010, July). Novel information sharing syntax for data sharing between police and community partners, using role-based security. Presented at 9th European Conference on Information Warfare and Security, University of Macedonia, Thessaloniki, Greece

The exchange of information between the police and community partners forms a central aspect of effective community service provision. In the context of policing, a robust and timely communications mechanism is required between police agencies and co... Read More about Novel information sharing syntax for data sharing between police and community partners, using role-based security..

Apto: A MDD-Based Generic Framework for Context-Aware Deeply Adaptive Service-Based Processes (2010)
Presentation / Conference Contribution
Jaroucheh, Z., Liu, X., & Smith, S. (2010, July). Apto: A MDD-Based Generic Framework for Context-Aware Deeply Adaptive Service-Based Processes. Presented at 2010 IEEE International Conference on Web Services

Context-awareness and adaptability are important and desirable properties of service-based processes designed to provide personalized services. Most of the existing approaches focus on the adaptation at the process instance level [1] which involves e... Read More about Apto: A MDD-Based Generic Framework for Context-Aware Deeply Adaptive Service-Based Processes.

Diversity training in organisations: an introduction (2010)
Journal Article
McGuire, D., & Bagher, M. (2010). Diversity training in organisations: an introduction. Journal of European industrial training, 34(6), 493-505. https://doi.org/10.1108/03090591011061185

Purpose – The purpose of this paper is to review the literature on diversity training and examine the effect of power, privilege and politics on diversity in organisations.Design/methodology/approach – This is a conceptual paper examining the argume... Read More about Diversity training in organisations: an introduction.

Split Second Motion Blur (2010)
Presentation / Conference Contribution
Ritchie, M., Modern, G., & Mitchell, K. (2010, July). Split Second Motion Blur. Presented at GRAPHInternational Conference on Computer Graphics and Interactive Techniques

Motion blur is key to delivering a sense of speed in interactive video game rendering. Further, simulating accurate camera optical exposure properties and reduction of temporal aliasing brings us closer to high quality real-time rendering productions... Read More about Split Second Motion Blur.

Comparative study on connected component labeling algorithms for embedded video processing systems. (2010)
Presentation / Conference Contribution
Walczyk, R., Armitage, A., & Binnie, D. (2010, July). Comparative study on connected component labeling algorithms for embedded video processing systems. Presented at The 2010 International Conference on Image Processing, Computer Vision, and Pattern Recognition

The objective of this paper is to carry out a detailed analysis of the most popular connected components labeling (CCL) algorithms for binary images. This study investigates their usability for processing streaming data and suitability for implementa... Read More about Comparative study on connected component labeling algorithms for embedded video processing systems..