Skip to main content

Research Repository

Advanced Search

All Outputs (17)

Composite repair and remanufacturing. (2022)
Book Chapter
VON FREEDEN, J., DE WIT, J., CABA, S., KROLL, S., ZHAO, H., REN, J., YAN, Y., ARSHED, F., AHMAD, A. and XIROUCHAKIS, P. 2022. Composite repair and remanufacturing. In Colledani, M. and Turri, S. (eds.) Systemic circular economy solutions for fiber reinforced composites. Cham: Springer [online], pages 191-214. Available from: https://doi.org/10.1007/978-3-031-22352-5_10

For the reuse of components and structures made of fiber composite materials, a complete remanufacturing process chain is necessary to prepare the parts for a further life cycle. The first step is to dismantle the parts to be reused. Fiber composite... Read More about Composite repair and remanufacturing..

Framework for detecting APTs based on steps analysis and correlation. (2022)
Book Chapter
EKE, H.N., PETROVSKI, A., AHRIZ, H. and AL-KADRI, M.O. 2022. Framework for detecting APTs based on steps analysis and correlation. In Abbaszadeh, M. and Zemouche, A. (eds.) Security and resilience in cyber-physical systems: detection, estimation and control. Cham: Springer [online], chapter 6, pages 119-147. Available from: https://doi.org/10.1007/978-3-030-97166-3_6

An advanced persistent threatAdvanced persistent threat, (APTAPT), is an attack that uses multiple attack behavior to penetrate a system, achieve specifically targeted and highly valuable goals within a system. This type of attack has presented an in... Read More about Framework for detecting APTs based on steps analysis and correlation..

A comparative study of deep-learning models for COVID-19 diagnosis based on X-ray images. (2022)
Book Chapter
SIDDIQUI, S., HOSSAIN, E., FERDOUS, R., ARIFEEN, M., RAHMAN, W., MASUM, S., HOPGOOD, A., GOOD, A. and GEGOV, A. 2022. A comparative study of deep-learning models for COVID-19 diagnosis based on X-ray images. In Howlett, R.J., Jain, L.C., Littlewood, J.R. and Balas, M.M. (eds.) Smart and sustainable technology for resilient cities and communities. Singapore: Springer [online], pages 163-174. Available from: https://doi.org/10.1007/978-981-16-9101-0_12

Background: The rise of COVID-19 has caused immeasurable loss to public health globally. The world has faced a severe shortage of the gold standard testing kit known as reverse transcription-polymerase chain reaction (RT-PCR). The accuracy of RT-PCR... Read More about A comparative study of deep-learning models for COVID-19 diagnosis based on X-ray images..

Embedding entrepreneurial skills within computing. (2019)
Book Chapter
ZARB, M., BRADY, C. and MCDERMOTT, R. 2019. Embedding entrepreneurial skills within computing. In H.T.M. Bui, H.T.M. Nguyen and D. Cole (eds.) Innovate higher education to enhance graduate employability: rethinking the possibilities. London: Routledge [online], chapter 11. Available from: https://doi.org/10.4324/9780429058899-11

The Scottish government launched a nationwide drive to increase entrepreneurial skills, looking to become a “world-leading entrepreneurial and innovative nation". One of the key ambitions of this is to build an education system with entrepreneurship... Read More about Embedding entrepreneurial skills within computing..

Feature trade-off analysis for reconnaissance detection. (2018)
Book Chapter
KALUTARAGE, H.K. and SHAIKH, S.A. 2018. Feature trade-off analysis for reconnaissance detection. In Heard, N., Adams, N., Rubin-Delanchy, P. and Turcotte, M. (eds.) Data science for cyber security. Security science and technology, 3. London: World Scientific [online], chapter 5, pages 95-126. Available from: https://doi.org/10.1142/9781786345646_005

An effective cyber early warning system (CEWS) should pick up threat activity at an early stage, with an emphasis on establishing hypotheses and predictions as well as generating alerts on (unclassified) situations based on preliminary indications. T... Read More about Feature trade-off analysis for reconnaissance detection..

Indicator modelling and interactive visualisation for urban sustainability assessment. (2018)
Book Chapter
FALCONER, R.E., ISAACS, J.P., GILMOUR, D. and BLACKWOOD, D.J. Indicator modelling and interactive visualisation for urban sustainability assessment. In Information Resources Management Association (ed.) E-planning and collaboration: concepts, methodologies, tools and applications. Hershey: IGI Global [online], volume 1, pages 486-508. Available from: https://doi.org/10.4018/978-1-5225-5646-6.ch023

This chapter presents a novel framework for the integration of the principles of sustainable development within the urban design processes. The framework recognises that decision making for sustainable urban planning is a challenging process: requiri... Read More about Indicator modelling and interactive visualisation for urban sustainability assessment..

Usable security. (2017)
Book Chapter
ATZENI, A., FAILY, S. and GALLONI, R. 2018. Usable security. In Khosrow-Pour, M. (ed.) Encyclopedia of information science and technology. 4th edition. Hershey: IGI Global [online], chapter 433, pages 5004-5013. Available from: https://doi.org/10.4018/978-1-5225-2255-3.ch433

Traditionally, security is only considered as strong as its weakest link, and people were considered as the weak links (Schneier, 2003). This thinking triggers a vicious circle. (Adam & Sasse, 1999) stated that users are informed as little as possibl... Read More about Usable security..

Ethics in computer science. (2016)
Book Chapter
HERON, M.J. 2016. Ethics in computer science. In Laplante, P.A. (ed.) Encyclopedia of computer science and technology. Second edition. Boca Raton: CRC Press [online], Available at: https://www.crcpress.com/Encyclopedia-of-Computer-Science-and-Technology-Second-Edition-Print/Laplante/p/book/9781482208191

Ethics within the field of computer science represents a rich and vibrant topic with almost universal applicability both within and without the profession. In this chapter, the author discusses some of features that combine to give the topic unique n... Read More about Ethics in computer science..

Twitter response to televised political debates in Election 2015. (2015)
Book Chapter
PEDERSEN, S., BAXTER, G., BURNETT, S., MACLEOD, I., GOKER, A., HERON, M., ISAACS, J., ELYAN, E. and KALICIAK, L. 2015. Twitter response to televised political debates in Election 2015. In Jackson, D. and Thorsen, E. (eds.) UK election analysis 2015: media, voters and the campaign: early reflections from leading UK academics. Poole: Bournemouth University, centre for the study of journalism, culture and community [online], page 73. Available from: http://www.electionanalysis.uk/uk-election-analysis-2015/section-6-social-media/twitter-response-to-televised-political-debates-in-election-2015/

The advent of social media such as Twitter has revolutionised our conversations about live television events. In the days before the Internet, conversation about television programmes was limited to those sitting on the sofa with you and people you m... Read More about Twitter response to televised political debates in Election 2015..

A scalable expressive ensemble learning using random prism: a MapReduce approach. (2015)
Book Chapter
STAHL, F., MAY, D., MILLS, H., BRAMER, M. and GABER, M.M. 2015. A scalable expressive ensemble learning using random prism: a MapReduce approach. In Hameurlain, A., Küng, J., Wagner, R., Sakr, S., Wang, L. and Zomaya, A. (eds.) Transactions on large-scale data- and knowledge-centred systems XX: special issue on advanced techniques for big data management. Lecture notes in computer science, 9070. Berlin: Springer [online], pages 90-107. Available from: https://doi.org/10.1007/978-3-662-46703-9_4

The induction of classification rules from previously unseen examples is one of the most important data mining tasks in science as well as commercial applications. In order to reduce the influence of noise in the data, ensemble learners are often app... Read More about A scalable expressive ensemble learning using random prism: a MapReduce approach..

Developing secure, unified, multi-device, and multi-domain platforms: a case study from the webinos project. (2014)
Book Chapter
ATZENI, A., LYLE, J. and FAILY, S. 2014. Developing secure, unified, multi-device, and multi-domain platforms: a case study from the webinos project. In Ruiz-Martinez, A., Marin-Lopez, R. and Pereniguez-Garcia, F. (eds.) Architectures and protocols for secure information technology infrastructures. Hershey: IGI Global [online], chapter 12, pages 310-333. Available from: https://doi.org/10.4018/978-1-4666-4514-1.ch012

The need for integrated cross-platform systems is growing. Such systems can enrich the user experience, but also lead to greater security and privacy concerns than the sum of their existing components. To provide practical insights and suggest viable... Read More about Developing secure, unified, multi-device, and multi-domain platforms: a case study from the webinos project..

Evaluating the implications of attack and security patterns with premortems. (2014)
Book Chapter
FAILY, S., PARKIN, S. and LYLE, J. 2014. Evaluating the implications of attack and security patterns with premortems. In Blackwell, C. and Zhu, H. (eds.) Cyberpatterns: unifying design patterns with security and attack patterns. Cham: Springer [online], chapter 16, pages 199-209. Available from: https://doi.org/10.1007/978-3-319-04447-7_16

Security patterns are a useful way of describing, packaging and applying security knowledge which might otherwise be unavailable. However, because patterns represent partial knowledge of a problem and solution space, there is little certainty that ad... Read More about Evaluating the implications of attack and security patterns with premortems..

The asset replacement problem state of the art. (2013)
Book Chapter
ANSARIPOOR, A.H., OLIVEIRA, F.S. and LIRET, A. 2013. The asset replacement problem state of the art. In Owusu, G., O'Brien, P., McCall, J. and Doherty, N.F. (eds.) Transforming field and service operations: methodologies for successful technology-driven business transformation. Berlin: Springer [online], chapter 14, pages 213-233. Available from: https://doi.org/10.1007/978-3-642-44970-3_14

This book chapter outlines the different modelling approaches for realising sustainable operations of asset replacement and studying the impact of the economic life, the repair-cost limit and comprehensive cost minimisation models. In particular it a... Read More about The asset replacement problem state of the art..

Intercultural competence in global collaboration courses in computer engineering. (2012)
Book Chapter
BERNALD, H., CAJANDER, A., DANIELS, M., KULTUR, C., LOFSTROM, A., MCDERMOTT, R. and RUSSELL-DAG, L. 2012. Intercultural competence in global collaboration courses in computer engineering. In Schmorrow, D.D. and Nicholson, D.M. (eds.) Advances in design for cross-cultural activies: Part I. Boca Raton: CRC Press [online], chapter 35, pages 351-361. Available from: https://doi.org/10.1201/b12316-42

With the rapid and ever expanding globalization of the workforce, international collaborations are becoming part of everyday life for people of many professions. Intercultural competence has therefore become one of the central professional competenci... Read More about Intercultural competence in global collaboration courses in computer engineering..

Privacy through security: policy and practice in a small-medium enterprise. (2008)
Book Chapter
ALLISON, I. and STRANGWICK, C., 2008. Privacy through security: policy and practice in a small-medium enterprise. In Subramanian, R. (ed.) Computer security, privacy, and politics: current issues, challenges, and solutions. Hershey, PA: IGI Global [online], chapter 8, pages 157-179. Available from: https://doi.org/10.4018/978-1-59904-804-8.ch008

The chapter discusses how one small business planned for, and implemented, the security of its data in a new enterprise-wide system. The companys data was perceived as sensitive, and any breach of privacy as commercially critical. From this perspecti... Read More about Privacy through security: policy and practice in a small-medium enterprise..

Concept induction via fuzzy C-means clustering in a high dimensional semantic space. (2007)
Book Chapter
SONG, D., CAO, G., BRUZA, P.D. and LAU, R.Y.K. 2007. Concept induction via fuzzy C-means clustering in a high dimensional semantic space. In Valente de Oliveira, J. and Pedrycz, W. (eds.) Advances in fuzzy clustering and its applications. Chichester: Wiley [online], chapter 19, pages 393-403. Available from: https://www.wiley.com/en-gb/Advances+in+Fuzzy+Clustering+and+its+Applications-p-9780470061183

Lexical semantic space models have recently been investigated to automatically derive the meaning (semantics) of information based on natural language usage. In a semantic space, a term can be considered as a concept represented geometrically as a ve... Read More about Concept induction via fuzzy C-means clustering in a high dimensional semantic space..

Commonsense aboutness for information retrieval. (2000)
Book Chapter
BRUZA, P.D., SONG, D., WONG, K.-F. and CHENG, C.-H. 2000. Commonsense aboutness for information retrieval. In Mohammadian, M. (ed.) Advances in intelligent systems: theory and applications. Amsterdam: IOS Press, pages 288-295.

Information retrieval (IR) is driven by a process which decides whether a document is about a query. Recent attempts have been made to formalize properties of aboutness, but no consensus has been reached. The properties being proposed are largely bei... Read More about Commonsense aboutness for information retrieval..