Skip to main content

Research Repository

Advanced Search

All Outputs (1100)

A data mining approach to ontology learning for automatic content-related question-answering in MOOCs. (2016)
Thesis
SHATNAWI, S.M.I. 2016. A data mining approach to ontology learning for automatic content-related question-answering in MOOCs. Robert Gordon University, PhD thesis.

The advent of Massive Open Online Courses (MOOCs) allows massive volume of registrants to enrol in these MOOCs. This research aims to offer MOOCs registrants with automatic content related feedback to fulfil their cognitive needs. A framework is prop... Read More about A data mining approach to ontology learning for automatic content-related question-answering in MOOCs..

CAWIML: a computer assisted web interviewing mark-up language. (2016)
Thesis
LLORET PEREZ, J.M. 2016. CAWIML: a computer assisted web interviewing mark-up language. Robert Gordon University, MRes thesis.

Computer-Assisted Web Interviewing (CAWI) is the new mode of conducting surveys through web browsers. This on-line solution extends the traditional paper questionnaire with functionality to inform the order of questions, the logic to guide question r... Read More about CAWIML: a computer assisted web interviewing mark-up language..

Development of a flood warning simulation system: a case study of 2007 Tewkesbury flood. (2016)
Journal Article
WANG, C., JIANG, Y., XIE, H., MILLER, D. and BROWN, I. 2016. Development of a flood warning simulation system: a case study of 2007 Tewkesbury flood. In Lang, M., Klijn, F. and Samuels, P. (eds.) E3S web of conferences [online], 7: proceedings of the 3rd European flood risk management conference (FLOODrisk 2016), 17-21 October 2016, Lyon, France, article ID 18021. Available from: https://doi.org/10.1051/e3sconf/20160718021.

Many flood warning systems were developed for 2D environments and limited on specific flood hazard. With the purpose of overcoming these disadvantages, it is necessary to propose new methodologies and techniques for 3D real time flood simulation. In... Read More about Development of a flood warning simulation system: a case study of 2007 Tewkesbury flood..

IT controls in the public cloud: success factors for allocation of roles and responsibilities. (2016)
Journal Article
KHAN, S., NICHO, M. and TAKRURI, H. 2016. IT controls in the public cloud: success factors for allocation of roles and responsibilities. Journal of information technology case and application research [online], 18(3): big data analytics, pages 155-180. Available from: https://doi.org/10.1080/15228053.2016.1237218

The rapid adoption of cloud computing by organizations has resulted in the transformation of the roles and responsibilities of staff in managing the information technology (IT) resources (via IT governance controls) that have migrated to the cloud. H... Read More about IT controls in the public cloud: success factors for allocation of roles and responsibilities..

Students envisioning the future. (2016)
Conference Proceeding
LIND, T., CAJANDER, Å., SANDBLAD, B., DANIELS, M., LÁRUSDÓTTIR, M., MCDERMOTT, R. and CLEAR, T. 2016. Students envisioning the future. In Proceedings of the Institute of Electrical and Electonic Engineers (IEEE) frontiers in education 2016 conference (FIE 2016): the crossroads of engineering and business, 12-15 October 2016, Erie, USA. Piscataway: IEEE [online], article ID 7757701. Available from: https://doi.org/10.1109/FIE.2016.7757701.

How can students be included as critical stakeholders in the systems and services provided by a university? To address the whole student experience, we engaged students and employees at a large Swedish university in a vision seminar process to elicit... Read More about Students envisioning the future..

Aligning quality assurance at the course unit and educational program levels. (2016)
Conference Proceeding
JONSSON, B.T., LAUSDOTTIR, M.K., DANIELS, M., CLEAR, A. and MCDERMOTT, R. 2016. Aligning quality assurance at the course unit and educational program levels. In Proceedings of the Institute of Electrical and Electonic Engineers (IEEE) frontiers in education 2016 conference (FIE 2016): the crossroads of engineering and business, 12-15 October 2016, Erie, USA. Piscataway: IEEE [online], article ID 7757419. Available from: https://doi.org/10.1109/FIE.2016.7757419.

Quality assurance is a subject that has grown dramatically in importance in recent times. In previous work, we have described how the ACM Curricula can be used to support the Quality Assurance process of educational programs, using the Computer Scien... Read More about Aligning quality assurance at the course unit and educational program levels..

A framework for writing learning agreements. (2016)
Conference Proceeding
CLEAR, T., MCDERMOTT, R., PARSJÖ, E., CAJANDER, Å., DANIELS, M. and LAGERQVIST, N. 2016. A framework for writing learning agreements. In Proceedings of the Institute of Electrical and Electonic Engineers (IEEE) frontiers in education 2016 conference (FIE 2016): the crossroads of engineering and business, 12-15 October 2016, Erie, USA. Piscataway: IEEE [online], article ID 7757718. Available from: https://doi.org/10.1109/FIE.2016.7757718.

Active learning is a popular concept for motivating learning. Learning agreements are one strategy towards this goal. They can be used to aid the students to take ownership of their learning and in becoming more active in a course. Learning Agreement... Read More about A framework for writing learning agreements..

Selective dropout for deep neural networks. (2016)
Conference Proceeding
BARROW, E., EASTWOOD, M. and JAYNE, C. 2016. Selective dropout for deep neural networks. In Hirose, A., Ozawa, S., Doya, K., Ikeda, K., Lee, M. and Liu, D. (eds.) Neural information processing: Proceedings of the 23rd International conference on neural information processing (ICONIP 2016), 16-21 October 2016, Kyoto, Japan. Lecture notes in computer science, 9949. Cham: Springer [online], pages 519-528. Available from: https://doi.org/10.1007/978-3-319-46675-0_57

Dropout has been proven to be an effective method for reducing overfitting in deep artificial neural networks. We present 3 new alternative methods for performing dropout on a deep neural network which improves the effectiveness of the dropout method... Read More about Selective dropout for deep neural networks..

Wireless information and energy transfer in nonregenerative OFDM AF relay systems. (2016)
Journal Article
HUANG, G. and TU, W. 2017. Wireless information and energy transfer in nonregenerative OFDM AF relay systems. Wireless personal communications [online], 94(4), pages 3131-3146. Available from: https://10.1007/s11277-016-3768-9

Energy harvesting (EH) is a promising strategy to prolong the operation of energy-constrained wireless systems. Simultaneous wireless information and energy transfer (SWIET) is a potential EH technique which has recently drawn significant attention.... Read More about Wireless information and energy transfer in nonregenerative OFDM AF relay systems..

The application of 3D visualisation and HD surveying to help stimulate economic growth in historic urban areas. (2016)
Conference Proceeding
LAING, R., TAIT, E., ISAACS, J., LEON, M. and REID, P. 2016. The application of 3D visualisation and HD surveying to help stimulate economic growth in historic urban areas. In Proceedings of the 2016 RICS construction, building and real estate research conference (COBRA 2016), 20-22 September 2016, Toronto, Canada. London: RICS.

This paper concerns the application of cutting edge digital recording techniques within the context of heritage-led urban regeneration. The work is innovative in that it supports the belief of decision makers and local stakeholders that there is pote... Read More about The application of 3D visualisation and HD surveying to help stimulate economic growth in historic urban areas..

Obtaining the consensus of multiple correspondences between graphs through online learning. (2016)
Journal Article
MORENO-GARCÍA, C.F. and SERRATOSA, F. 2017. Obtaining the consensus of multiple correspondences between graphs through online learning. Pattern recognition letters [online], 87, pages 79-86. Available from: https://doi.org/10.1016/j.patrec.2016.09.003

In structural pattern recognition, it is usual to compare a pair of objects through the generation of a correspondence between the elements of each of their local parts. To do so, one of the most natural ways to represent these objects is through att... Read More about Obtaining the consensus of multiple correspondences between graphs through online learning..

Semi-automatic pose estimation of a fleet of robots with embedded stereoscopic cameras. (2016)
Conference Proceeding
CORTÉS, X., SERRATOSA, F. and MORENO-GARCIA, C.-F. 2016. Semi-automatic pose estimation of a fleet of robots with embedded stereoscopic cameras. In Proceedings of 21st Institute of Electrical Electronic Engineers (IEEE) Emerging technologies and factory automation international conference 2016 (ETFA 2016), 6-9 September 2016, Berlin, Germany. Piscataway: IEEE [online], article ID 7733640. Available from: https://doi.org/10.1109/ETFA.2016.7733640

Given a fleet of robots, automatic estimation of the relative poses between them could be inaccurate in specific environments. We propose a framework composed by the fleet of robots with embedded stereoscopic cameras providing 2D and 3D images of the... Read More about Semi-automatic pose estimation of a fleet of robots with embedded stereoscopic cameras..

RK-EDA: a novel random key based estimation of distribution algorithm. (2016)
Conference Proceeding
AYODELE, M., MCCALL, J. and REGNIER-COUDERT, O. 2016. RK-EDA: a novel random key based estimation of distribution algorithm. In Handl, J., Hart, E., Lewis, P.R., López-Ibáñez, M., Ochoa, G. and Paechter, B. (eds.) Parallel problem solving from natuture: proceedings of the 14th International parallel problem solving from nature conference (PPSN XIV), 17-21 September 2016, Edinburgh, UK. Lecture notes in computer science, 9921. Cham: Springer [online], pages 849-858. Available from: https://doi.org/10.1007/978-3-319-45823-6_79

The challenges of solving problems naturally represented as permutations by Estimation of Distribution Algorithms (EDAs) have been a recent focus of interest in the evolutionary computation community. One of the most common alternative representation... Read More about RK-EDA: a novel random key based estimation of distribution algorithm..

Ethical and professional complications in the construction of multi-developer hobbyist games. (2016)
Journal Article
HERON, M.J. 2016. Ethical and professional complications in the construction of multi-developer hobbyist games. Computer games journal [online], 5(3), pages 115-129. Available from: https://doi.org/10.1007/s40869-016-0025-0

The modern availability of powerful video game development frameworks has resulted in something of an indie renaissance. Within this blossoming of small scale development are numerous hobbyist developers who build games for their own inherent satisfa... Read More about Ethical and professional complications in the construction of multi-developer hobbyist games..

Designing a context-aware cyber physical system for smart conditional monitoring of platform equipment. (2016)
Conference Proceeding
MAJDANI, F., PETROVSKI, A. and DOOLAN, D. 2016. Designing a context-aware cyber physical system for smart conditional monitoring of platform equipment. In Jayne, C. and Iliadis, L. (eds.) Engineering applications of neural networks: proceedings of the 17th International engineering applications of neural networks conference (EANN 2016), 2-5 September 2016, Aberdeen, UK. Communications in computer and information science, 629. Cham: Springer [online], pages 198-210. Available from: https://doi.org/10.1007/978-3-319-44188-7_15

An adaptive multi-tiered framework, which can be utilised for designing a context-aware cyber physical system is proposed and applied within the context of assuring offshore asset integrity. Adaptability is achieved through the combined use of machin... Read More about Designing a context-aware cyber physical system for smart conditional monitoring of platform equipment..

Intelligent measurement in unmanned aerial cyber physical systems for traffic surveillance. (2016)
Conference Proceeding
PETROVSKI, A., RATTADILOK, P. and PETROVSKII, S. 2016. Intelligent measurement in unmanned aerial cyber physical systems for traffic surveillance. In Jayne, C. and Iliadis, L. (eds.) Engineering applications of neural networks: proceedings of the 17th International engineering applications of neural networks conference (EANN 2016), 2-5 September 2016, Aberdeen, UK. Communications in computer and information science, 629. Cham: Springer [online], pages 161-175. Available from: https://doi.org/10.1007/978-3-319-44188-7_12 161-175. Available from: https://doi.org/10.1007/978-3-319-44188-7_12

An adaptive framework for building intelligent measurement systems has been proposed in the paper and tested on simulated traffic surveillance data. The use of the framework enables making intelligent decisions related to the presence of anomalies in... Read More about Intelligent measurement in unmanned aerial cyber physical systems for traffic surveillance..

Deep active learning for autonomous navigation. (2016)
Conference Proceeding
HUSSEIN, A., GABER, M.M. and ELYAN, E. 2016. Deep active learning for autonomous navigation. In Jayne, C. and Iliadis, L. (eds.) Engineering applications of neural networks: proceedings of the 17th International engineering applications of neural networks conference (EANN 2016), 2-5 September 2016, Aberdeen, UK. Communications in computer and information science, 629. Cham: Springer [online], pages 3-17. Available from: https://doi.org/10.1007/978-3-319-44188-7_1

Imitation learning refers to an agent's ability to mimic a desired behavior by learning from observations. A major challenge facing learning from demonstrations is to represent the demonstrations in a manner that is adequate for learning and efficien... Read More about Deep active learning for autonomous navigation..

An outlier ranking tree selection approach to extreme pruning of random forests. (2016)
Conference Proceeding
FAWAGREH, K., GABER, M.M. and ELYAN, E. 2016. An outlier ranking tree selection approach to extreme pruning of random forests. In Jayne, C. and Iliadis, L. (eds.) Engineering applications of neural networks: proceedings of the 17th International engineering applications of neural networks conference (EANN 2016), 2-5 September 2016, Aberdeen, UK. Communications in computer and information science, 629. Cham: Springer [online], pages 267-282. Available from: https://doi.org/10.1007/978-3-319-44188-7_20

Random Forest (RF) is an ensemble classification technique that was developed by Breiman over a decade ago. Compared with other ensemble techniques, it has proved its accuracy and superiority. Many researchers, however, believe that there is still ro... Read More about An outlier ranking tree selection approach to extreme pruning of random forests..

A genetic algorithm approach to optimising random forests applied to class engineered data. (2016)
Journal Article
ELYAN, E. and GABER, M.M. 2017. A genetic algorithm approach to optimising random forests applied to class engineered data. Information sciences [online], 384, pages 220-234. Available from: https://doi.org/10.1016/j.ins.2016.08.007

In numerous applications and especially in the life science domain, examples are labelled at a higher level of granularity. For example, binary classification is dominant in many of these datasets, with the positive class denoting the existence of a... Read More about A genetic algorithm approach to optimising random forests applied to class engineered data..

Persona-driven information security awareness. (2016)
Conference Proceeding
KI-ARIES, D., FAILY, S. and BECKERS, K. 2016. Persona-driven information security awareness. In Proceedings of the 30th International BCS human computer interaction conference (HCI 2016): fusion, 11-15 July 2016, Poole, UK. Swindon: BCS [online], article number 97. Available from: https://doi.org/10.14236/ewic/HCI2016.97

Because human factors are a root cause of security breaches in many organisations, security awareness activities are often used to address problematic behaviours and improve security culture. Previous work has found that personas are useful for ident... Read More about Persona-driven information security awareness..