Skip to main content

Research Repository

Advanced Search

All Outputs (399)

Online learning the consensus of multiple correspondences between sets. (2015)
Journal Article
MORENO-GARCÍA, C.F. and SERRATOSA, F. 2015. Online learning the consensus of multiple correspondences between sets. Knowledge-based systems [online], 90, pages 49-57. Available from: https://doi.org/10.1016/j.knosys.2015.09.034

When several subjects solve the assignment problem of two sets, differences on the correspondences computed by these subjects may occur. These differences appear due to several factors. For example, one of the subjects may give more importance to som... Read More about Online learning the consensus of multiple correspondences between sets..

Musings on misconduct: a practitioner reflection on the ethical investigation of plagiarism within programming modules. (2015)
Journal Article
HERON, M.J. and BELFORD, P. 2015. Musings on misconduct: a practitioner reflection on the ethical investigation of plagiarism within programming modules. ACM SIGCAS computers and society [online], 45(3), pages 438-444. Available from: https://doi.org/10.1145/2874239.2874304

Tools for algorithmically detecting plagiarism have become very popular, but none of these tools offers an effective and reliable way to identify plagiarism within academic software development. As a result, the identification of plagiarism within pr... Read More about Musings on misconduct: a practitioner reflection on the ethical investigation of plagiarism within programming modules..

A fine-grained Random Forests using class decomposition: an application to medical diagnosis. (2015)
Journal Article
ELYAN, E. and GABER, M.M. 2015. A fine-grained Random Forests using class decomposition: an application to medical diagnosis. Neural computing and applications [online], 27(8), pages 2279-2288. Available from: https://doi.org/10.1007/s00521-015-2064-z

Class decomposition describes the process of segmenting each class into a number of homogeneous subclasses. This can be naturally achieved through clustering. Utilising class decomposition can provide a number of benefits to supervised learning, espe... Read More about A fine-grained Random Forests using class decomposition: an application to medical diagnosis..

Case-base maintenance with multi-objective evolutionary algorithms. (2015)
Journal Article
LUPIANI, E., MASSIE, S., CRAW, S., JUAREZ, J.M. and PALMA, J. 2016. Case-base maintenance with multi-objective evolutionary algorithms. Journal of intelligent information systems [online], 46(2), pages 259-284. Available from: https://doi.org/10.1007/s10844-015-0378-z

Case-Base Reasoning is a problem-solving methodology that uses old solved problems, called cases, to solve new problems. The case-base is the knowledge source where the cases are stored, and the amount of stored cases is critical to the problem-solvi... Read More about Case-base maintenance with multi-objective evolutionary algorithms..

A case study of Facebook use: outlining a multi-layer strategy for higher education. (2015)
Journal Article
MENZIES, R., PETRIE, K. and ZARB, M. 2017. A case study of Facebook use: outlining a multi-layer strategy for higher education. Education and information technologies [online], 22(1), pages 39-53. Available from: https://doi.org/10.1007/s10639-015-9436-y

Many students are looking to appropriate social networking sites, amongst them, Facebook, to enhance their learning experience. A growing body of literature reports on the motivation of students and staff to engage with Facebook as a learning platfor... Read More about A case study of Facebook use: outlining a multi-layer strategy for higher education..

Evaluating degrees of isolation between tenants enabled by multitenancy patterns for cloud-hosted version control systems (VCS). (2015)
Journal Article
OCHEI, L.C., PETROVSKI, A. and BASS, J.M. 2015. Evaluating degrees of isolation between tenants enabled by multitenancy patterns for cloud-hosted version control systems (VCS). International journal of intelligent computing research [online], 6(3), pages 601-612. Available from: https://doi.org/10.20533/ijicr.2042.4655.2015.0075

When implementing multitenancy for cloud-hosted applications, one of the main challenges to overcome is how to enable the required degree of isolation between tenants so that the required performance, resource utilization, and access privileges of on... Read More about Evaluating degrees of isolation between tenants enabled by multitenancy patterns for cloud-hosted version control systems (VCS)..

A practitioner reflection on teaching computer ethics with case studies and psychology. (2015)
Journal Article
HERON, M. and BELFORD, P. 2015. A practitioner reflection on teaching computer ethics with case studies and psychology. Brookes ejournal of learning and teaching [online], 7(1). Available from: http://bejlt.brookes.ac.uk/paper/a-practitioner-reflection-on-teaching-computer-ethics-with-case-studies-and-psychology/

Three issues complicate teaching computer ethics in an undergraduate course. The first relates to the often technically intensive knowledge required to fully understand the complexity of real world examples. The second relates to the pedagogic expect... Read More about A practitioner reflection on teaching computer ethics with case studies and psychology..

Power and perception in the scandal in academia. (2015)
Journal Article
HERON, M.J. and BELFORD, P. 2015. Power and perception in the scandal in academia. ACM SIGCAS computers and society [online], 45(2), pages 11-19. Available from: https://doi.org/10.1145/2809957.2809961

The Scandal in Academia is a large-scale fictional ethical case study of around 17,000 words and fourteen separate revelations. They are delivered as newspaper extracts from a newspaper reporting on an ongoing crisis at a Scottish educational institu... Read More about Power and perception in the scandal in academia..

Detecting stealthy attacks: efficient monitoring of suspicious activities on computer networks. (2015)
Journal Article
KALUTARAGE, H.K., SHAIKH, S.A., WICKRAMASINGHE, I.P., ZHOU, Q. and JAMES, A.E. 2015. Detecting stealthy attacks: efficient monitoring of suspicious activities on computer networks. Computers and electrical engineering [online], 47, pages 327-344. Available from: https://doi.org/10.1016/j.compeleceng.2015.07.007

Stealthy attackers move patiently through computer networks – taking days, weeks or months to accomplish their objectives in order to avoid detection. As networks scale up in size and speed, monitoring for such attack attempts is increasingly a chall... Read More about Detecting stealthy attacks: efficient monitoring of suspicious activities on computer networks..

Partial context similarity of gene/proteins in leukemia using context rank based hierarchical clustering algorithm. (2015)
Journal Article
BANO, S. and RAO, K.R. 2015. Partial context similarity of gene/proteins in leukemia using context rank based hierarchical clustering algorithm. International journal of electrical and computer engineering [online], 5(3), pages 483-490. Available from: http://doi.org/10.11591/ijece.v5i3.pp483-490

In this paper we propose a method that aims to reduce processing overheads by avoiding the need to choose between natural language processing tools such as part-of-speech taggers and parsers. Moreover, we suggest a structure for the immediate creatio... Read More about Partial context similarity of gene/proteins in leukemia using context rank based hierarchical clustering algorithm..

Cross-layer topology design for network coding based wireless multicasting. (2015)
Journal Article
VIEN, Q.-T., TU, W., NGUYEN, H.X. and TRESTIAN, R. 2015. Cross-layer topology design for network coding based wireless multicasting. Computer networks [online], 88, pages 27-39. Available from: https://doi.org/10.1016/j.comnet.2015.06.005

This paper considers wireless multicast networks where network coding (NC) is applied to improve network throughput. A novel joint topology and cross-layer design is proposed to maximise the network throughput subject to various quality-of-service co... Read More about Cross-layer topology design for network coding based wireless multicasting..

Automatic detection of microaneurysms in colour fundus images for diabetic retinopathy screening. (2015)
Journal Article
RAHIM, S.S., JAYNE, C., PALADE, V. and SHUTTLEWORTH, J. 2016. Automatic detection of microaneurysms in colour fundus images for diabetic retinopathy screening. Neural computing and applications [online], 27(5), pages 1149-1164. Available from: https://doi.org/10.1007/s00521-015-1929-5.

Regular eye screening is essential for the early detection and treatment of the diabetic retinopathy. This paper presents a novel automatic screening system for diabetic retinopathy that focuses on the detection of the earliest visible signs of retin... Read More about Automatic detection of microaneurysms in colour fundus images for diabetic retinopathy screening..

Performance comparison of generational and steady-state asynchronous multi-objective evolutionary algorithms for computationally-intensive problems. (2015)
Journal Article
ZAVOIANU, A.-C., LUGHOFER, E., KOPPELSTÄTTER, W., WEIDENHOLZER, G., AMRHEIN, W. and KLEMENT, E.P. 2015. Performance comparison of generational and steady-state asynchronous multi-objective evolutionary algorithms for computationally-intensive problems. Knowledge-based systems [online], 87, pages 47-60. Available from: https://doi.org/10.1016/j.knosys.2015.05.029

In the last two decades, multi-objective evolutionary algorithms (MOEAs) have become ever more used in scientific and industrial decision support and decision making contexts the require an a posteriori articulation of preference. The present work is... Read More about Performance comparison of generational and steady-state asynchronous multi-objective evolutionary algorithms for computationally-intensive problems..

A role allocation model for IT controls in a cloud environment. (2015)
Journal Article
KHAN, S., NICHO, M. and COOPER, G. 2015. A role allocation model for IT controls in a cloud environment. Review of business information systems [online], 19(1), pages 5-14. Available from: https://doi.org/10.19030/rbis.v19i1.9253

The rapid adoption of cloud computing by organizations, along with the need to comply with relevant IT governance (ITG) controls, has increased the complexity of governance in the cloud. This transition from a classical data center to a virtualized d... Read More about A role allocation model for IT controls in a cloud environment..

Correspondence consensus of two sets of correspondences through optimisation functions. (2015)
Journal Article
MORENO-GARCÍA, C.F. and SERRATOSA, F. 2017. Correspondence consensus of two sets of correspondences through optimisation functions. Pattern analysis and applications [online], 20(1), pages 201-213. Available from: https://doi.org/10.1007/s10044-015-0486-y

We present a consensus method which, given the two correspondences between sets of elements generated by separate entities, enounces a final correspondence consensus considering the existence of outliers. Our method is based on an optimisation techni... Read More about Correspondence consensus of two sets of correspondences through optimisation functions..

Context rank based hierarchical clustering algorithm on medical databases (CRBHCA). (2015)
Journal Article
BANO, S. and RAO, K.R. 2015. Context rank based hierarchical clustering algorithm on medical databases (CRBHCA). Journal of theoretical and applied information technology [online], 75(2), pages 199-211. Available from: https://www.jatit.org/volumes/Vol75No2/10Vol75No2.pdf

In this paper we propose a method that aims to reduce processing overheads by avoiding the need to choose between natural language processing tools such as part-of-speech taggers and parsers. Moreover, we suggest a structure for the immediate creatio... Read More about Context rank based hierarchical clustering algorithm on medical databases (CRBHCA)..

Early fusion and query modification in their dual late fusion forms. (2015)
Journal Article
KALICIAK, L., MYRHAUG, H., GOKER, A. and SONG, D. 2015. Early fusion and query modification in their dual late fusion forms. Journal of advances in information fusion [online], 10(2), pages 183-198. Available from: http://isif.org/journal/10/2/1557-6418

In this paper, we prove that specific widely used models in Content-based Image Retrieval for information fusion are interchangeable. In addition, we show that even advanced, non-standard fusion strategies can be represented in dual forms. These mode... Read More about Early fusion and query modification in their dual late fusion forms..

An analysis of age, technology usage, and cognitive characteristics within information retrieval tasks. (2015)
Journal Article
CRABB, M. and HANSON, V.L. 2016. An analysis of age, technology usage, and cognitive characteristics within information retrieval tasks. ACM transactions on accessible computing (TACCESS) [online], 8(3): papers from the proceedings of the 16th International Association of Computing Machinery Special Interest Group on Accessibility (ACM SIGACCESS) conference on computers and accessibility (ASSETS 2014), 20-22 October 2014, Rochester, USA, article number 10. Available from: https://doi.org/10.1145/2856046

This work presents two studies that aim to discover whether age can be used as a suitable metric for distinguishing performance between individuals or if other factors can provide greater insight. Information retrieval tasks are used to test the perf... Read More about An analysis of age, technology usage, and cognitive characteristics within information retrieval tasks..

Breaking the communication barrier: guidelines to aid communication within pair programming. (2015)
Journal Article
ZARB, M. and HUGHES, J. 2015. Breaking the communication barrier: guidelines to aid communication within pair programming. Computer science education [online], 25(2), pages 120-151. Available from: https://doi.org/10.1080/08993408.2015.1033125

Pair programming is a software development technique with many cited benefits in learning and teaching. However, it is reported that novice programmers find several barriers to pairing up, typically due to the added communication that is required of... Read More about Breaking the communication barrier: guidelines to aid communication within pair programming..

On the relationship between variational level set-based and SOM-based active contours. (2015)
Journal Article
ABDELSAMEA, M.M., GNECCO, G., GABER, M.M. and ELYAN, E. 2015. On the relationship between variational level set-based and SOM-based active contours. Computational intelligence and neuroscience [online], 2015, article ID 109029. Available from:https://doi.org/10.1155/2015/109029

Most Active Contour Models (ACMs) deal with the image segmentation problem as a functional optimization problem, as they work on dividing an image into several regions by optimizing a suitable functional. Among ACMs, variational level set methods hav... Read More about On the relationship between variational level set-based and SOM-based active contours..