Skip to main content

Research Repository

Advanced Search

All Outputs (21)

Deep imitation learning for 3D navigation tasks. (2017)
Journal Article
HUSSEIN, A., ELYAN, E., GABER, M.M. and JAYNE, C. 2018. Deep imitation learning for 3D navigation tasks. Neural computing and applications [online], 29(7), pages 389-404. Available from: https://doi.org/10.1007/s00521-017-3241-z

Deep learning techniques have shown success in learning from raw high dimensional data in various applications. While deep reinforcement learning is recently gaining popularity as a method to train intelligent agents, utilizing deep learning in imita... Read More about Deep imitation learning for 3D navigation tasks..

Evolving ANN-based sensors for a context-aware cyber physical system of an offshore gas turbine. (2017)
Journal Article
MAJDANI, F., PETROVSKI, A. and DOOLAN, D. 2017. Evolving ANN-based sensors for a context-aware cyber physical system of an offshore gas turbine. Evolving systems [online], 9(2), pages 119-133. Available from: https://doi.org/10.1007/s12530-017-9206-8

An adaptive multi-tiered framework, that can be utilised for designing a context-aware cyber physical system to carry out smart data acquisition and processing, while minimising the amount of necessary human intervention is proposed and applied. The... Read More about Evolving ANN-based sensors for a context-aware cyber physical system of an offshore gas turbine..

The effect of person order on egress time: a simulation model of evacuation from a neolithic visitor attraction. (2017)
Journal Article
STEWART, A., ELYAN, E., ISAACS, J., MCEWEN, L. and WILSON, L. 2017. The effect of person order on egress time: a simulation model of evacuation from a neolithic visitor attraction. Human factors [online], 59(8), pages 1222-1232. Available from: https://doi.org/10.1177/0018720817729608

Objective: The aim of this study was to model the egress of visitors from a Neolithic visitor attraction. Background: Tourism attracts increasing numbers of elderly and mobility-impaired visitors to our built-environment heritage sites. Some such sit... Read More about The effect of person order on egress time: a simulation model of evacuation from a neolithic visitor attraction..

Goal-oriented requirements engineering: an extended systematic mapping study. (2017)
Journal Article
HORKOFF, J., AYDEMIR, F.B., CARDOSO, E., LI, T., MATÉ, A., PAJA, E., SALNITRI, M., PIRAS, L., MYLOPOULOS, J. and GIORGINI, P. 2019. Goal-oriented requirements engineering: an extended systematic mapping study. Requirements engineering [online], 24(2), pages 133-160. Available from: https://doi.org/10.1007/s00766-017-0280-z

Over the last two decades, much attention has been paid to the area of goal-oriented requirements engineering (GORE), where goals are used as a useful conceptualization to elicit, model, and analyze requirements, capturing alternatives and conflicts.... Read More about Goal-oriented requirements engineering: an extended systematic mapping study..

Persona-centred information security awareness. (2017)
Journal Article
KI-ARIES, D. and FAILY, S. 2017. Persona-centred information security awareness. Computers and security [online] 70, pages 663-674. Available from: https://doi.org/10.1016/j.cose.2017.08.001

Maintaining Information Security and protecting data assets remains a principal concern for businesses. Many data breaches continue to result from accidental, intentional or malicious human factors, leading to financial or reputational loss. One appr... Read More about Persona-centred information security awareness..

Investigation of computational intelligence techniques for intrusion detection in wireless sensor networks. (2017)
Journal Article
MCDERMOTT, C.D. and PETROVSKI, A. 2017. Investigation of computational intelligence techniques for intrusion detection in wireless sensor networks. International journal of computer networks and communications [online], 9(4), pages 45-56. Available from: https://doi.org/10.5121/ijcnc.2017.9404

Wireless Sensor Networks (WSNs) have become a key technology for the IoT and despite obvious benefits, challenges still exist regarding security. As more devices are connected to the internet, new cyber attacks are emerging which join well-known atta... Read More about Investigation of computational intelligence techniques for intrusion detection in wireless sensor networks..

Debating technology for dialogical argument: sensemaking, engagement, and analytics. (2017)
Journal Article
LAWRENCE, J., SNAITH, M., KONAT, B., BUDZYNSKA, K. and REED. C. 2017. Debating technology for dialogical argument: sensemaking, engagement, and analytics. ACM transactions on internet technology [online], 17(3), article 24. Available from: https://doi.org/10.1145/3007210

Debating technologies, a newly emerging strand of research into computational technologies to support human debating, offer a powerful way of providing naturalistic, dialogue-based interaction with complex information spaces. The full potential of de... Read More about Debating technology for dialogical argument: sensemaking, engagement, and analytics..

Gravitation-based edge detection in hyperspectral images (2017)
Journal Article
SUN, G., ZHANG, A., REN, J., MA, J., WANG, P., ZHANG, Y. and JIA, X. 2017. Gravitation-based edge detection in hyperspectral images. Remote sensing [online], 9(6), article 592. Available from: https://doi.org/10.3390/rs9060592

Edge detection is one of the key issues in the field of computer vision and remote sensing image analysis. Although many different edge-detection methods have been proposed for gray-scale, color, and multispectral images, they still face difficulties... Read More about Gravitation-based edge detection in hyperspectral images.

A framework for unsupervised change detection in activity recognition. (2017)
Journal Article
BASHIR, S.A., PETROVSKI, A. and DOOLAN, D. 2017. A framework for unsupervised change detection in activity recognition. International journal of pervasive computing and communications [online], 13(2), pages 157-175. Available from: https://doi.org/10.1108/IJPCC-03-2017-0027

Purpose - This purpose of this paper is to develop a change detection technique for activity recognition model. The approach aims to detect changes in the initial accuracy of the model after training and when the model is deployed for recognizing new... Read More about A framework for unsupervised change detection in activity recognition..

Pacman's canon in C#: a quantum interpretation of video game canon. (2017)
Journal Article
HERON, M. 2017. Pacman's canon in C#: a quantum interpretation of video game canon. Computer games journal [online], 6(3), pages 135-151. Available from: https://doi.org/10.1007/s40869-017-0036-5

The topic of what constitutes canon with a video game is an under-explored topic in critical discussion. We rely, as a field, on largely intuitive and insubstantial parameters for the elements that we choose to analyse. This paper outlines the role o... Read More about Pacman's canon in C#: a quantum interpretation of video game canon..

Streaming and 3D mapping of AGRI-data on mobile devices. (2017)
Journal Article
STOJANOVIC, V., FALCONER, R.E., ISAACS, J., BLACKWOOD, D., GILMOUR, D., KIEZEBRINK, D. and WILSON, J. 2017. Streaming and 3D mapping of AGRI-data on mobile devices. Computers and electronics in agriculture [online], 138(1), pages 188-199. Available from: https://doi.org/10.1016/j.compag.2017.03.019

Farm monitoring and operations generate heterogeneous AGRI-data from a variety of different sources that have the potential to be delivered to users 'on the go' and in the field to inform farm decision making. A software framework capable of interfac... Read More about Streaming and 3D mapping of AGRI-data on mobile devices..

Full-duplex small cells for next generation heterogeneous cellular networks: a case study of outage and rate coverage analysis. (2017)
Journal Article
AL-KADRI, M.O., DENG, Y., AIJAZ, A. and NALLANATHAN, A. 2021. Full-duplex small cells for next generation heterogeneous cellular networks: a case study of outage and rate coverage analysis. IEEE access [online], 5, pages 8025-8038. Available from: https://doi.org/10.1109/ACCESS.2017.2684542

Full-duplex (FD) technology is currently under consideration for adoption in a range of legacy communications standards due to its attractive features. On the other hand, cellular networks are becoming increasingly heterogeneous as operators deploy a... Read More about Full-duplex small cells for next generation heterogeneous cellular networks: a case study of outage and rate coverage analysis..

IT governance measurement tools and its application in IT-business alignment. (2017)
Journal Article
NICHO, M. and KHAN, S. 2017. IT governance measurement tools and its application in IT-business alignment. Journal of international technology and information management [online], 26(1), Article 5. Available from: http://scholarworks.lib.csusb.edu/jitim/vol26/iss1/5

The purpose of this exploratory research paper is to evaluate the deployment and assessment methodology of the information technology governance (ITG) measurement tools, with the purpose of gaining deeper insight into the ITG initiation process, the... Read More about IT governance measurement tools and its application in IT-business alignment..

Imitation learning: a survey of learning methods. (2017)
Journal Article
HUSSEIN, A., GABER, M.M., ELYAN, E. and JAYNE, C. 2017. Imitation learning: a survey of learning methods. ACM computing surveys [online], 50(2), article 21. Available from: https://doi.org/10.1145/3054912

Imitation learning techniques aim to mimic human behavior in a given task. An agent (a learning machine) is trained to perform a task from demonstrations by learning a mapping between observations and actions. The idea of teaching by imitation has be... Read More about Imitation learning: a survey of learning methods..

Multi-source video multicast in internet-connected wireless mesh networks. (2017)
Journal Article
TU, W., SREENAN, C.J., JHA, S. and ZHANG, Q. 2017. Multi-source video multicast in internet-connected wireless mesh networks. IEEE transactions on mobile computing [online], 16(12), pages 3431-3444. Available from: https://doi.org/10.1109/TMC.2017.2691706

Wireless mesh networks (WMNs) connect to the Internet via access gateways. This paper studies multi-source video multicast in Internet-connected WMNs. The focus is on the design of a shareable integrated multicast that allows the multicasts of video... Read More about Multi-source video multicast in internet-connected wireless mesh networks..

Challenges of open data quality: more than just license, format, and customer support. (2017)
Journal Article
CORSAR, D. and EDWARDS, P. 2017. Challenges of open data quality: more than just license, format, an customer support. Journal of data and information quality [online], 9(1), pages 1-4. Available from: https://doi.org/10.1145/3139489

Public sector organisations worldwide are implementing Open Data initiatives, which, it is hoped, will stimulate economic growth, increase transparency and accountability, and improve engagement between data consumers (typically citizens) and data ho... Read More about Challenges of open data quality: more than just license, format, and customer support..

A low-complexity and efficient encoder rate control solution for distributed residual video coding. (2017)
Journal Article
HU, C., HU, B., TU, W. and XIONG, Y. 2018. A low-complexity and efficient encoder rate control solution for distributed residual video coding. Multimedia tools and applications [online], 77(5), pages 5713-5735. Available from: https://doi.org/10.1007/s11042-017-4484-5

Existing encoder rate control (ERC) solutions have two technical limitations that prevent them from being widely used in real-world applications. One is that encoder side information (ESI) is required to be generated which increases the complexity at... Read More about A low-complexity and efficient encoder rate control solution for distributed residual video coding..

Towards a threat assessment framework for apps collusion. (2017)
Journal Article
KALUTARAGE, H.K., NGUYEN, H.N. and SHAIKH, S.A. 2017. Towards a threat assessment framework for apps collusion. Telecommunication systems [online], 66(3), pages 417-430. Available from: https://doi.org/10.1007/s11235-017-0296-1

App collusion refers to two or more apps working together to achieve a malicious goal that they otherwise would not be able to achieve individually. The permissions based security model of Android does not address this threat as it is rather limited... Read More about Towards a threat assessment framework for apps collusion..

Linking open data and the crowd for real-time passenger information. (2017)
Journal Article
CORSAR, D., EDWARDS, P., NELSON, J., BAILLIE, C., PAPANGELIS, K. and VELAGA, N. 2017. Linking open data and the crowd for real-time passenger information. Journal of web semantics [online], 43, pages 18-24. Available from: https://doi.org/10.1016/j.websem.2017.02.002

The availability of real-time passenger information (RTPI) is a key factor in making public transport both accessible and attractive to users. Unfortunately, rural areas often lack the infrastructure necessary to provide such information, and the cos... Read More about Linking open data and the crowd for real-time passenger information..

Lexicon generation for emotion detection from text. (2017)
Journal Article
BANDHAKAVI, A., WIRATUNGA, N., MASSIE, S. and PADMANABHAN, D. 2017. Lexicon generation for emotion detection from text. IEEE intelligent systems [online], 32(1), pages 102-108. Available from: https://doi.org/10.1109/MIS.2017.22

General-purpose emotion lexicons (GPELs) that associate words with emotion categories remain a valuable resource for emotion detection. However, the static and formal nature of their vocabularies make them an inadequate resource for detecting emotion... Read More about Lexicon generation for emotion detection from text..