Skip to main content

Research Repository

Advanced Search

All Outputs (31)

Graph based gene/protein prediction and clustering over uncertain medical databases. (2015)
Journal Article
BANO, S. and RAO, K.R. 2015. Graph based gene/protein prediction and clustering over uncertain medical databases. Journal of theoretical and applied information technology [online], 82(3), pages 347-352. Available from: https://www.jatit.org/volumes/Vol82No3/2Vol82No3.pdf

Clustering over protein or gene data is now a popular issue in biomedical databases. In general, large sets of gene tags are clustered using high computation techniques over gene or protein distributed data. Most of the traditional clustering techniq... Read More about Graph based gene/protein prediction and clustering over uncertain medical databases..

Viewing art on a tablet computer: A well-being intervention for people with dementia and their caregivers. (2015)
Journal Article
TYACK, C., CAMIC, P.M., HERON, M.J. and HULBERT, S. 2017. Viewing art on a tablet computer: A well-being intervention for people with dementia and their caregivers. Journal of applied gerontology [online], 36(7), pages 864-894. Available from: https://doi.org/10.1177/0733464815617287

Art-based interventions have been shown to be beneficial for the well-being of people with dementia and their caregivers. This article explored whether such interventions can be delivered via a touchscreen tablet device displaying art images. Method:... Read More about Viewing art on a tablet computer: A well-being intervention for people with dementia and their caregivers..

Fuzzy ethics: or how I learned to stop worrying and love the bot. (2015)
Journal Article
HERON, M.J. and BELFORD, P. 2015. Fuzzy ethics: or how I learned to stop worrying and love the bot. ACM SIGCAS computers and society [online], 45(4), pages 4-6. Available from: https://doi.org/10.1145/2856428.2856429

The recent death of a Volkswagen worker at the hand of a factory robot has resulted in a number of editorials and opinion pieces discussing moral responsibility and robots. In this short response piece we outline some of the wider context of this dis... Read More about Fuzzy ethics: or how I learned to stop worrying and love the bot..

Visualisation techniques to support public interpretation of future climate change and land-use choices: a case study from N-E Scotland. (2015)
Journal Article
WANG, C., MILLER, D., BROWN, I., JIANG, Y. and CASTELLAZZI, M. 2015. Visualisation techniques to support public interpretation of future climate change and land-use choices: a case study from N-E Scotland. International journal of digital earth [online], 9(6), pages 586-605. Available from: https://doi.org/10.1080/17538947.2015.1111949

Mitigating and adapting to climate change includes a requirement to evaluate the role of future land uses in delivering robust integrated responses that are sensitive to local landscape contexts. In practice, this emphasises the need for community en... Read More about Visualisation techniques to support public interpretation of future climate change and land-use choices: a case study from N-E Scotland..

An alternative design for electrostatically accelerated ion beam fusion. (2015)
Journal Article
MACLEOD, C. and GERRARD, C.E. 2015. An alternative design for electrostatically accelerated ion beam fusion. Journal of the British Interplanetary Society [online], 68, pages 336-341. Available from: http://www.jbis.org.uk/paper.php?p=2015.68.336

Inertial Electrostatic Confinement (IEC) is an alternative approach to nuclear fusion which uses electrostatically accelerated ions instead of hot plasmas. The best known device that utilises the principle is the Farnsworth-Hirsch Fusor. It has been... Read More about An alternative design for electrostatically accelerated ion beam fusion..

An energy-efficient full-duplex MAC protocol for distributed wireless networks. (2015)
Journal Article
AL-KADRI, M.O., AIJAZ, A. and NALLANATHAN, A. 2016. An energy-efficient full-duplex MAC protocol for distributed wireless networks. IEEE wireless communications letters [online], 5(1), pages 44-47. Available from: https://doi.org/10.1109/lwc.2015.2492548

In this letter, we present an energy-efficient medium access control (MAC) protocol for distributed full-duplex (FD) wireless network, termed as energy-FDM. The key aspects of the energy-FDM include energy-efficiency, coexistence of distinct types of... Read More about An energy-efficient full-duplex MAC protocol for distributed wireless networks..

Engaging stakeholders during late stage security design with assumption personas. (2015)
Journal Article
FAILY, S. 2015. Engaging stakeholders during late stage security design with assumption personas. Information and computer security [online], 23(4), pages 435-446. Available from: https://doi.org/10.1108/ICS-10-2014-0066

This paper aims to present an approach where assumption personas are used to engage stakeholders in the elicitation and specification of security requirements at a late stage of a system's design. The author has devised an approach for developing ass... Read More about Engaging stakeholders during late stage security design with assumption personas..

Online learning the consensus of multiple correspondences between sets. (2015)
Journal Article
MORENO-GARCÍA, C.F. and SERRATOSA, F. 2015. Online learning the consensus of multiple correspondences between sets. Knowledge-based systems [online], 90, pages 49-57. Available from: https://doi.org/10.1016/j.knosys.2015.09.034

When several subjects solve the assignment problem of two sets, differences on the correspondences computed by these subjects may occur. These differences appear due to several factors. For example, one of the subjects may give more importance to som... Read More about Online learning the consensus of multiple correspondences between sets..

Musings on misconduct: a practitioner reflection on the ethical investigation of plagiarism within programming modules. (2015)
Journal Article
HERON, M.J. and BELFORD, P. 2015. Musings on misconduct: a practitioner reflection on the ethical investigation of plagiarism within programming modules. ACM SIGCAS computers and society [online], 45(3), pages 438-444. Available from: https://doi.org/10.1145/2874239.2874304

Tools for algorithmically detecting plagiarism have become very popular, but none of these tools offers an effective and reliable way to identify plagiarism within academic software development. As a result, the identification of plagiarism within pr... Read More about Musings on misconduct: a practitioner reflection on the ethical investigation of plagiarism within programming modules..

A fine-grained Random Forests using class decomposition: an application to medical diagnosis. (2015)
Journal Article
ELYAN, E. and GABER, M.M. 2015. A fine-grained Random Forests using class decomposition: an application to medical diagnosis. Neural computing and applications [online], 27(8), pages 2279-2288. Available from: https://doi.org/10.1007/s00521-015-2064-z

Class decomposition describes the process of segmenting each class into a number of homogeneous subclasses. This can be naturally achieved through clustering. Utilising class decomposition can provide a number of benefits to supervised learning, espe... Read More about A fine-grained Random Forests using class decomposition: an application to medical diagnosis..

Case-base maintenance with multi-objective evolutionary algorithms. (2015)
Journal Article
LUPIANI, E., MASSIE, S., CRAW, S., JUAREZ, J.M. and PALMA, J. 2016. Case-base maintenance with multi-objective evolutionary algorithms. Journal of intelligent information systems [online], 46(2), pages 259-284. Available from: https://doi.org/10.1007/s10844-015-0378-z

Case-Base Reasoning is a problem-solving methodology that uses old solved problems, called cases, to solve new problems. The case-base is the knowledge source where the cases are stored, and the amount of stored cases is critical to the problem-solvi... Read More about Case-base maintenance with multi-objective evolutionary algorithms..

A case study of Facebook use: outlining a multi-layer strategy for higher education. (2015)
Journal Article
MENZIES, R., PETRIE, K. and ZARB, M. 2017. A case study of Facebook use: outlining a multi-layer strategy for higher education. Education and information technologies [online], 22(1), pages 39-53. Available from: https://doi.org/10.1007/s10639-015-9436-y

Many students are looking to appropriate social networking sites, amongst them, Facebook, to enhance their learning experience. A growing body of literature reports on the motivation of students and staff to engage with Facebook as a learning platfor... Read More about A case study of Facebook use: outlining a multi-layer strategy for higher education..

Evaluating degrees of isolation between tenants enabled by multitenancy patterns for cloud-hosted version control systems (VCS). (2015)
Journal Article
OCHEI, L.C., PETROVSKI, A. and BASS, J.M. 2015. Evaluating degrees of isolation between tenants enabled by multitenancy patterns for cloud-hosted version control systems (VCS). International journal of intelligent computing research [online], 6(3), pages 601-612. Available from: https://doi.org/10.20533/ijicr.2042.4655.2015.0075

When implementing multitenancy for cloud-hosted applications, one of the main challenges to overcome is how to enable the required degree of isolation between tenants so that the required performance, resource utilization, and access privileges of on... Read More about Evaluating degrees of isolation between tenants enabled by multitenancy patterns for cloud-hosted version control systems (VCS)..

A practitioner reflection on teaching computer ethics with case studies and psychology. (2015)
Journal Article
HERON, M. and BELFORD, P. 2015. A practitioner reflection on teaching computer ethics with case studies and psychology. Brookes ejournal of learning and teaching [online], 7(1). Available from: http://bejlt.brookes.ac.uk/paper/a-practitioner-reflection-on-teaching-computer-ethics-with-case-studies-and-psychology/

Three issues complicate teaching computer ethics in an undergraduate course. The first relates to the often technically intensive knowledge required to fully understand the complexity of real world examples. The second relates to the pedagogic expect... Read More about A practitioner reflection on teaching computer ethics with case studies and psychology..

Power and perception in the scandal in academia. (2015)
Journal Article
HERON, M.J. and BELFORD, P. 2015. Power and perception in the scandal in academia. ACM SIGCAS computers and society [online], 45(2), pages 11-19. Available from: https://doi.org/10.1145/2809957.2809961

The Scandal in Academia is a large-scale fictional ethical case study of around 17,000 words and fourteen separate revelations. They are delivered as newspaper extracts from a newspaper reporting on an ongoing crisis at a Scottish educational institu... Read More about Power and perception in the scandal in academia..

Detecting stealthy attacks: efficient monitoring of suspicious activities on computer networks. (2015)
Journal Article
KALUTARAGE, H.K., SHAIKH, S.A., WICKRAMASINGHE, I.P., ZHOU, Q. and JAMES, A.E. 2015. Detecting stealthy attacks: efficient monitoring of suspicious activities on computer networks. Computers and electrical engineering [online], 47, pages 327-344. Available from: https://doi.org/10.1016/j.compeleceng.2015.07.007

Stealthy attackers move patiently through computer networks – taking days, weeks or months to accomplish their objectives in order to avoid detection. As networks scale up in size and speed, monitoring for such attack attempts is increasingly a chall... Read More about Detecting stealthy attacks: efficient monitoring of suspicious activities on computer networks..

Partial context similarity of gene/proteins in leukemia using context rank based hierarchical clustering algorithm. (2015)
Journal Article
BANO, S. and RAO, K.R. 2015. Partial context similarity of gene/proteins in leukemia using context rank based hierarchical clustering algorithm. International journal of electrical and computer engineering [online], 5(3), pages 483-490. Available from: http://doi.org/10.11591/ijece.v5i3.pp483-490

In this paper we propose a method that aims to reduce processing overheads by avoiding the need to choose between natural language processing tools such as part-of-speech taggers and parsers. Moreover, we suggest a structure for the immediate creatio... Read More about Partial context similarity of gene/proteins in leukemia using context rank based hierarchical clustering algorithm..

Cross-layer topology design for network coding based wireless multicasting. (2015)
Journal Article
VIEN, Q.-T., TU, W., NGUYEN, H.X. and TRESTIAN, R. 2015. Cross-layer topology design for network coding based wireless multicasting. Computer networks [online], 88, pages 27-39. Available from: https://doi.org/10.1016/j.comnet.2015.06.005

This paper considers wireless multicast networks where network coding (NC) is applied to improve network throughput. A novel joint topology and cross-layer design is proposed to maximise the network throughput subject to various quality-of-service co... Read More about Cross-layer topology design for network coding based wireless multicasting..

Automatic detection of microaneurysms in colour fundus images for diabetic retinopathy screening. (2015)
Journal Article
RAHIM, S.S., JAYNE, C., PALADE, V. and SHUTTLEWORTH, J. 2016. Automatic detection of microaneurysms in colour fundus images for diabetic retinopathy screening. Neural computing and applications [online], 27(5), pages 1149-1164. Available from: https://doi.org/10.1007/s00521-015-1929-5.

Regular eye screening is essential for the early detection and treatment of the diabetic retinopathy. This paper presents a novel automatic screening system for diabetic retinopathy that focuses on the detection of the earliest visible signs of retin... Read More about Automatic detection of microaneurysms in colour fundus images for diabetic retinopathy screening..

Performance comparison of generational and steady-state asynchronous multi-objective evolutionary algorithms for computationally-intensive problems. (2015)
Journal Article
ZAVOIANU, A.-C., LUGHOFER, E., KOPPELSTÄTTER, W., WEIDENHOLZER, G., AMRHEIN, W. and KLEMENT, E.P. 2015. Performance comparison of generational and steady-state asynchronous multi-objective evolutionary algorithms for computationally-intensive problems. Knowledge-based systems [online], 87, pages 47-60. Available from: https://doi.org/10.1016/j.knosys.2015.05.029

In the last two decades, multi-objective evolutionary algorithms (MOEAs) have become ever more used in scientific and industrial decision support and decision making contexts the require an a posteriori articulation of preference. The present work is... Read More about Performance comparison of generational and steady-state asynchronous multi-objective evolutionary algorithms for computationally-intensive problems..