Skip to main content

Research Repository

Advanced Search

All Outputs (1088)

Learning deep and shallow features for human activity recognition. (2017)
Conference Proceeding
SANI, S., MASSIE, S., WIRATUNGA, N. and COOPER, K. 2017. Learning deep and shallow features for human activity recognition. In Li, G., Ge, Y, Zhang, Z., Jin, Z. and Blumenstein, M. (eds.) Knowledge science, engineering and management: proceedings of the 10th International knowledge science, engineering and management conference (KSEM 2017), 19-20 August 2017, Melbourne, Australia. Lecture notes in computer science, 10412. Cham: Springer [online], pages 469-482. Available from: https://doi.org/10.1007/978-3-319-63558-3_40

selfBACK is an mHealth decision support system used by patients for the self-management of Lower Back Pain. It uses Human Activity Recognition from wearable sensors to monitor user activity in order to measure their adherence to prescribed physical a... Read More about Learning deep and shallow features for human activity recognition..

Effective dependency rule-based aspect extraction for social recommender systems. (2017)
Presentation / Conference
CHEN, Y.Y., WIRATUNGA, N. and LOTHIAN, R. 2017. Effective dependency rule-based aspect extraction for social recommender systems. In Proceedings of the 21st Pacific Asia conference on information systems 2017 (PACIS 2017), 16-20 July 2017, Langkawi, Malaysia. Atlanta: Association for Information Systems [online], article ID 263. Available from: http://aisel.aisnet.org/pacis2017/263

Social recommender systems capitalise on product reviews to generate recommendations that are both guided by experiential knowledge and are explained by user opinions centred on important product aspects. Therefore, having an effective aspect extract... Read More about Effective dependency rule-based aspect extraction for social recommender systems..

Folk risk analysis: factors influencing security analysts' interpretation of risk. (2017)
Presentation / Conference
M'MANGA, A., FAILY, S., MCALANEY, J. and WILLIAMS, C. 2017. Folk risk analysis: factors influencing security analysts' interpretation of risk. Presented at the 3rd Workshop on security information workers (WSIW 2017), part of the 13th Symposium on usable privacy and security (SOUPS 2017), co-located with the 2017 USENIX annual technical conference (USENIX ATC 2017), 12-14 July 2017, Santa Clara, USA. Hosted on the USENIX website [online]. Available from: https://www.usenix.org/conference/soups2017/workshop-program/wsiw2017/mmanga

There are several standard approaches to risk analysis recommended for use in information security, however, the actual application of risk analysis by security analysts follows an opaque mix of standard risk analysis procedures and adaptations based... Read More about Folk risk analysis: factors influencing security analysts' interpretation of risk..

Insourcing a government information system: a case study from Malaysia. (2017)
Thesis
OMAR, A. 2017. Insourcing a government information system: a case study from Malaysia. Robert Gordon University, PhD thesis.

Insourcing, outsourcing and co-sourcing are three approaches to procuring an information system. This research contributes to the body of knowledge on insourcing an information system; exploring and discussing the enabling and inhibiting factors of t... Read More about Insourcing a government information system: a case study from Malaysia..

Usable security. (2017)
Book Chapter
ATZENI, A., FAILY, S. and GALLONI, R. 2018. Usable security. In Khosrow-Pour, M. (ed.) Encyclopedia of information science and technology. 4th edition. Hershey: IGI Global [online], chapter 433, pages 5004-5013. Available from: https://doi.org/10.4018/978-1-5225-2255-3.ch433

Traditionally, security is only considered as strong as its weakest link, and people were considered as the weak links (Schneier, 2003). This thinking triggers a vicious circle. (Adam & Sasse, 1999) stated that users are informed as little as possibl... Read More about Usable security..

Gamification solutions for software acceptance: a comparative study of requirements engineering and organizational behavior techniques. (2017)
Conference Proceeding
PIRAS, L., PAJA, E., GIORGINI, P., MYLOPOULOS, J., CUEL, R. and PONTE, D. 2017. Gamification solutions for software acceptance: a comparative study of requirements engineering and organizational behavior techniques. In Assar, S., Pastor, O. and Mouratidis, H. (eds.) Proceedings of 11th Institute of Electrical and Electronic Engineers (IEEE) Research challenges in information science international conference 2017 (RCIS 2017), 10-12 May 2017, Brighton, UK. Piscataway: IEEE [online], pages 255-265. Available from: https://doi.org/10.1109/RCIS.2017.7956544

Gamificationis a powerful paradigm and a set of best practices used to motivate people carrying out a variety of ICT–mediated tasks. Designing gamification solutions and applying them to a given ICT system is a complex and expensive process (in time,... Read More about Gamification solutions for software acceptance: a comparative study of requirements engineering and organizational behavior techniques..

Re-framing "the AMN": a case study eliciting and modelling a system of systems using the Afghan Mission Network. (2017)
Conference Proceeding
KI-ARIES, D., FAILY, S., DOGAN, H. and WILLIAMS, C. 2017. Re-framing "the AMN": a case study eliciting and modelling a system of systems using the Afghan Mission Network. In Assar, S., Pastor, O. and Mouratidis, H. (eds.) Proceedings of the 11th IEEE international conference on research challenges in information science (RCIS 2017), 10-12 May 2017, Brighton, UK. Piscataway: IEEE [online], pages 103-108. Available from: https://doi.org/10.1109/RCIS.2017.7956524

The term System of Systems (SoS) is often used to classify an arrangement of independent and interdependent systems delivering unique capabilities. There appear to be many examples of SoSs, but the term has become a source of confusion. While many ap... Read More about Re-framing "the AMN": a case study eliciting and modelling a system of systems using the Afghan Mission Network..

System design considerations for risk perception. (2017)
Conference Proceeding
M'MANGA, A., FAILY, S., MCALANEY, J. and WILLIAMS, C. 2017. System design considerations for risk perception. In Assar, S., Pastor, O. and Mouratidis, H. (eds.) Proceedings of the 11th IEEE international conference on research challeneges in information science (RCIS 2017), 10-12 May 2017, Brighton, UK. Piscataway: IEEE [online], pages 322-327. Available from: https://doi.org/10.1109/RCIS.2017.7956554

The perception of risk is a driver for security analysts' decision making. However, security analysts may have conflicting views of a risk based on personal, system and environmental factors. This difference in perception and opinion, may impact effe... Read More about System design considerations for risk perception..

A convolutional Siamese network for developing similarity knowledge in the SelfBACK dataset. (2017)
Conference Proceeding
MARTIN, K., WIRATUNGA, N., SANI, S., MASSIE, S. and CLOS, J. 2017. A convolutional Siamese network for developing similarity knowledge in the SelfBACK dataset. In Sanchez-Ruiz, A.A. and Kofod-Petersen, A. (eds.) Workshop proceedings of the 25th International conference on case-based reasoning (ICCBR 2017), 26-29 June 2017, Trondheim, Norway. CEUR workshop proceedings, 2028. Aachen: CEUR-WS [online], session 2: case-based reasoning and deep learning workshop (CBRDL-2017), pages 85-94. Available from: https://ceur-ws.org/Vol-2028/paper8.pdf

The Siamese Neural Network (SNN) is a neural network architecture capable of learning similarity knowledge between cases in a case base by receiving pairs of cases and analysing the differences between their features to map them to a multi-dimensiona... Read More about A convolutional Siamese network for developing similarity knowledge in the SelfBACK dataset..

Learning deep features for kNN-based human activity recognition. (2017)
Conference Proceeding
SANI, S., WIRATUNGA, N. and MASSIE, S. 2017. Learning deep features for kNN-based human activity recognition. In Sanchez-Ruiz, A.A. and Kofod-Petersen, A. (eds.) Workshop proceedings of the 25th International conference on case-based reasoning (ICCBR 2017), 26-29 June 2017, Trondheim, Norway. CEUR workshop proceedings, 2028. Aachen: CEUR-WS [online], session 2: case-based reasoning and deep learning workshop (CBRDL-2017), pages 95-103. Available from: http://ceur-ws.org/Vol-2028/paper9.pdf

A CBR approach to Human Activity Recognition (HAR) uses the kNN algorithm to classify sensor data into different activity classes. Different feature representation approaches have been proposed for sensor data for the purpose of HAR. These include sh... Read More about Learning deep features for kNN-based human activity recognition..

kNN sampling for personalised human recognition. (2017)
Conference Proceeding
SANI, S., WIRATUNGA, N., MASSIE, S. and COOPER, K. 2017. kNN sampling for personalised human recognition. In Aha, D.W. and Lieber, J. (eds.) Case-based reasoning research and development: proceedings of the 25th International case-based reasoning conference (ICCBR 2017), 26-28 June 2017, Trondheim, Norway. Lecture notes in computer science, 10339. Cham: Springer [online], pages 330-344. Available from: https://doi.org/10.1007/978-3-319-61030-6_23

The need to adhere to recommended physical activity guidelines for a variety of chronic disorders calls for high precision Human Activity Recognition (HAR) systems. In the SelfBACK system, HAR is used to monitor activity types and intensities to enab... Read More about kNN sampling for personalised human recognition..

Debating technology for dialogical argument: sensemaking, engagement, and analytics. (2017)
Journal Article
LAWRENCE, J., SNAITH, M., KONAT, B., BUDZYNSKA, K. and REED. C. 2017. Debating technology for dialogical argument: sensemaking, engagement, and analytics. ACM transactions on internet technology [online], 17(3), article 24. Available from: https://doi.org/10.1145/3007210

Debating technologies, a newly emerging strand of research into computational technologies to support human debating, offer a powerful way of providing naturalistic, dialogue-based interaction with complex information spaces. The full potential of de... Read More about Debating technology for dialogical argument: sensemaking, engagement, and analytics..

Gravitation-based edge detection in hyperspectral images (2017)
Journal Article
SUN, G., ZHANG, A., REN, J., MA, J., WANG, P., ZHANG, Y. and JIA, X. 2017. Gravitation-based edge detection in hyperspectral images. Remote sensing [online], 9(6), article 592. Available from: https://doi.org/10.3390/rs9060592

Edge detection is one of the key issues in the field of computer vision and remote sensing image analysis. Although many different edge-detection methods have been proposed for gray-scale, color, and multispectral images, they still face difficulties... Read More about Gravitation-based edge detection in hyperspectral images.

Estimation of distribution algorithms for the multi-mode resource constrained project scheduling problem. (2017)
Conference Proceeding
AYODELE, M., MCCALL, J. and REGNIER-COUDERT, O. 2017. Estimation of distribution algorithms for the multi-mode resource constrained project scheduling problem. In Proceedings of the 2017 IEEE congress on evolutionary computation (CEC 2017), 5-8 June 2017, San Sebastian, Spain. New York: IEEE [online], article number 7969491, pages 1579-1586. Available from: https://doi.org/10.1109/CEC.2017.7969491

Multi-Mode Resource Constrained Project Problem (MRCPSP) is a multi-component problem which combines two interacting sub-problems; activity scheduling and mode assignment. Multi-component problems have been of research interest to the evolutionary co... Read More about Estimation of distribution algorithms for the multi-mode resource constrained project scheduling problem..

A random key based estimation of distribution algorithm for the permutation flowshop scheduling problem. (2017)
Conference Proceeding
AYODELE, M., MCCALL, J., REGNIER-COUDERT, O. and BOWIE, L. 2017. A random key based estimation of distribution algorithm for the permutation flowshop scheduling problem. In Proceedings of the 2017 IEEE congress on evolutionary computation (CEC 2017), 5-8 June 2017, San Sebastian, Spain. New York: IEEE [online], article number 7969591, pages 2364-2371. Available from: https://doi.org/10.1109/CEC.2017.7969591

Random Key (RK) is an alternative representation for permutation problems that enables application of techniques generally used for continuous optimisation. Although the benefit of RKs to permutation optimisation has been shown, its use within Estima... Read More about A random key based estimation of distribution algorithm for the permutation flowshop scheduling problem..

A framework for unsupervised change detection in activity recognition. (2017)
Journal Article
BASHIR, S.A., PETROVSKI, A. and DOOLAN, D. 2017. A framework for unsupervised change detection in activity recognition. International journal of pervasive computing and communications [online], 13(2), pages 157-175. Available from: https://doi.org/10.1108/IJPCC-03-2017-0027

Purpose - This purpose of this paper is to develop a change detection technique for activity recognition model. The approach aims to detect changes in the initial accuracy of the model after training and when the model is deployed for recognizing new... Read More about A framework for unsupervised change detection in activity recognition..

Architecting the deployment of cloud-hosted services for guaranteeing multitenancy isolation. (2017)
Thesis
OCHEI, L.C. 2017. Architecting the deployment of cloud-hosted services for guaranteeing multitenancy isolation. Robert Gordon University, PhD thesis.

In recent years, software tools used for Global Software Development (GSD) processes (e.g., continuous integration, version control and bug tracking) are increasingly being deployed in the cloud to serve multiple users. Multitenancy is an important a... Read More about Architecting the deployment of cloud-hosted services for guaranteeing multitenancy isolation..

Neural induction of a lexicon for fast and interpretable stance classification. (2017)
Conference Proceeding
CLOS, J. and WIRATUNGA, N. 2017. Neural induction of a lexicon for fast and interpretable stance classification. In Gracia, J., Bond, F., McCrae, J.P., Buitelaar, P., Chiarcos, C. and Hellmann, S. (eds.) Language, data and knowledge: proceedings of the 1st International conference on language, data and knowledge (LDK 2017), 19-20 June 2017, Galway, Ireland. Lecture notes in computer science, 10318. Cham: Springer [online], pages 181-193. Available from: https://doi.org/10.1007/978-3-319-59888-8_16

Large-scale social media classification faces the following two challenges: algorithms can be hard to adapt to Web-scale data, and the predictions that they provide are difficult for humans to understand. Those two challenges are solved at the cost o... Read More about Neural induction of a lexicon for fast and interpretable stance classification..

Pacman's canon in C#: a quantum interpretation of video game canon. (2017)
Journal Article
HERON, M. 2017. Pacman's canon in C#: a quantum interpretation of video game canon. Computer games journal [online], 6(3), pages 135-151. Available from: https://doi.org/10.1007/s40869-017-0036-5

The topic of what constitutes canon with a video game is an under-explored topic in critical discussion. We rely, as a field, on largely intuitive and insubstantial parameters for the elements that we choose to analyse. This paper outlines the role o... Read More about Pacman's canon in C#: a quantum interpretation of video game canon..

Stokes coordinates. (2017)
Conference Proceeding
SAVOYE, Y. 2017. Stokes coordinates. In Spencer, S.N. (ed.) Proceedings of the 33rd Spring conference on computer graphics (SCCG'17), 15-17 May 2017, Mikulov, Czech Republic. New York: ACM [online], article number 5. Available from: https://doi.org/10.1145/3154353.3154354

Cage-based structures are reduced subspace deformers enabling non-isometric stretching deformations induced by clothing or muscle bulging. In this paper, we reformulate the cage-based rigging as an incompressible Stokes problem in the vorticity space... Read More about Stokes coordinates..