Skip to main content

Research Repository

Advanced Search

All Outputs (57)

Cognitive modelling and control of human error processes in human-computer interaction with safety critical IT systems in telehealth. (2017)
Thesis
ALWAWI, I. 2017. Cognitive modelling and control of human error processes in human-computer interaction with safety critical IT systems in telehealth. Robert Gordon University, PhD thesis.

The field of telehealth has developed rapidly in recent years. It provides medical support particularly to those who are living in remote areas and in emergency cases. Although developments in both technology and practice have been rapid, there are s... Read More about Cognitive modelling and control of human error processes in human-computer interaction with safety critical IT systems in telehealth..

Using extreme characters to teach requirements engineering. (2017)
Conference Proceeding
IACOB, C. and FAILY, S. 2017. Using extreme characters to teach requirements engineering. In Washizaki, H. and Mead, N. (eds.) Proceedings of the 30th IEEE conference on software engineering education and training (CSEET 2017), 7-9 November 2017, Savannah, USA. Los Alamitos: IEEE Computer Society [online], pages 107-111. Available from: https://doi.org/10.1109/CSEET.2017.25

One of the main challenges in teaching Software Engineering as an undergraduate course is making the need for software processes and documentation obvious. Armed with some knowledge of programming, students may feel inclined to skip any development p... Read More about Using extreme characters to teach requirements engineering..

Deep imitation learning for 3D navigation tasks. (2017)
Journal Article
HUSSEIN, A., ELYAN, E., GABER, M.M. and JAYNE, C. 2018. Deep imitation learning for 3D navigation tasks. Neural computing and applications [online], 29(7), pages 389-404. Available from: https://doi.org/10.1007/s00521-017-3241-z

Deep learning techniques have shown success in learning from raw high dimensional data in various applications. While deep reinforcement learning is recently gaining popularity as a method to train intelligent agents, utilizing deep learning in imita... Read More about Deep imitation learning for 3D navigation tasks..

Predicting service levels using neural networks. (2017)
Conference Proceeding
AINSLIE, R., MCCALL, J., SHAKYA, S. and OWUSU, G. 2017. Predicting service levels using neural networks. In Bramer, M. and Petridis, M. (eds.) Artificial intelliegence XXXIV: proceedings of the 37th SGAI International innovative techniques and applications of artifical intelligence conference 2017 (AI 2017), 12-14 December 2017, Cambridge, UK. Lecture notes in computer science, 10630. Cham: Springer [online], pages 411-416. Available from: https://doi.org/10.1007/978-3-319-71078-5_35

In this paper we present a method to predict service levels in utility companies, giving them advanced visibility of expected service outcomes and helping them to ensure adherence to service level agreements made to their clients. Service level adher... Read More about Predicting service levels using neural networks..

Towards computational dialogue types for BIM collaborative design: an initial study. (2017)
Conference Proceeding
TONIOLO, A. and LEON, M. 2017. Towards computational dialogue types for BIM collaborative design: an initial study. In Bistarelli, S., Giacomin, M. and Pazienza, A. (eds.) Proceedings of the 1st Workshop on advances in argumentation in artificial intelligence (AI^3 2017), 16-17 November 2017, Bari, Italy. CEUR workshop proceedings, 2012. Aachen: CEUR-WS [online], session 3: dialogues, real world arguments and applications, pages 79-84. Available from: http://ceur-ws.org/Vol-2012/AI3-2017_paper_8.pdf

Collaborative design is an iterative process of selecting and evaluating solutions under potentially conflicting requirements, a concept central to Building Information Modelling (BIM) implementation. Previous research has shown that design can be be... Read More about Towards computational dialogue types for BIM collaborative design: an initial study..

Accuracy of physical activity recognition from a wrist-worn sensor. (2017)
Presentation / Conference
COOPER, K., SANI, S., CORRIGAN, L., MACDONALD, H., PRENTICE, C., VARETA, R., MASSIE, S. and WIRATUNGA, N. 2017. Accuracy of physical activity recognition from a wrist-worn sensor. Presented at the 2017 Physiotherapy UK conference and trade exhibition: transform lives, maximise independence and empower populations, 10-11 November 2017, Birmingham, UK.

The EU-funded project 'selfBACK' (http://www.selfback.eu) will utilise continuous objective monitoring of physical activity (PA) by a wrist-mounted wearable, combined with self-monitoring of symptoms and case-based reasoning. Together these will prov... Read More about Accuracy of physical activity recognition from a wrist-worn sensor..

Simulation and optimisation of the separation process in offshore oil and gas platforms. (2017)
Thesis
VELESHKI, S. 2017. Simulation and optimisation of the separation process in offshore oil and gas platforms. Robert Gordon University, MRes thesis.

Hydrocarbon separation in offshore oil and gas platforms is the process that transforms extracted crude oil into transportable oil and gas. Temperatures and pressures of the separation system can be adjusted to modify the separation of the hydrocarbo... Read More about Simulation and optimisation of the separation process in offshore oil and gas platforms..

Evolving ANN-based sensors for a context-aware cyber physical system of an offshore gas turbine. (2017)
Journal Article
MAJDANI, F., PETROVSKI, A. and DOOLAN, D. 2017. Evolving ANN-based sensors for a context-aware cyber physical system of an offshore gas turbine. Evolving systems [online], 9(2), pages 119-133. Available from: https://doi.org/10.1007/s12530-017-9206-8

An adaptive multi-tiered framework, that can be utilised for designing a context-aware cyber physical system to carry out smart data acquisition and processing, while minimising the amount of necessary human intervention is proposed and applied. The... Read More about Evolving ANN-based sensors for a context-aware cyber physical system of an offshore gas turbine..

Goal models for acceptance requirements analysis and gamification design. (2017)
Conference Proceeding
PIRAS, L., PAJA, E., GIORGINI, P. and MYLOPOULOS, J. 2017. Goal models for acceptance requirements analysis and gamification design. In Mayr, H.C., Guizzardi, G., Ma, H. and Pastor, O. (eds.) Conceptual modeling: proceedings of 36th Conceptual modeling international conference 2017 (ER 2017), 6-9 November 2017, Valencia, Spain. Lecture notes in computer science, 10650. Cham: Springer [online], pages 223-230. Available from: https://doi.org/10.1007/978-3-319-69904-2_18

The success of software systems highly depends on user engagement. Thus, to deliver engaging systems, software has to be designed carefully taking into account Acceptance Requirements, such as '70% of users will use the system', and the psychological... Read More about Goal models for acceptance requirements analysis and gamification design..

From requirements to operation: components for risk assessment in a pervasive system of systems. (2017)
Conference Proceeding
KI-ARIES, D., DOGAN, H., FAILY, S., WHITTINGTON, P. and WILLIAMS, C. 2017. From requirements to operation: components for risk assessment in a pervasive system of systems. In Proceedings of the 4th Workshop on evolving security and privacy requirements engineering (ESPRE 2017), part of the 25th IEEE international requirements engineering conference workshops (REW 2017), 4-8 September 2017, Lisbon, Portugal. Los Alamitos: IEEE Computer Society [online], pages 83-89. Available from: https://doi.org/10.1109/REW.2017.36

Framing Internet of Things (IoT) applications as a System of Systems (SoS) can help us make sense of complexity associated with interoperability and emergence. However, assessing the risk of SoSs is a challenge due to the independence of component sy... Read More about From requirements to operation: components for risk assessment in a pervasive system of systems..

Design as code: facilitating collaboration between usability and security engineers using CAIRIS. (2017)
Conference Proceeding
FAILY, S. and IACOB, C. 2017. Design as code: facilitating collaboration between usability and security engineers using CAIRIS. In Proceedings of the 4th Workshop on evolving security and privacy requirements engineering (ESPRE 2017), part of the 25th IEEE international requirements engineering conference workshops (REW 2017), 4-8 September 2017, Lisbon, Portugal. Los Alamitos: IEEE Computer Society [online], pages 76-82. Available from: https://doi.org/10.1109/REW.2017.23

Designing usable and secure software is hard without tool-support. Given the importance of requirements, CAIRIS was designed to illustrate the form tool-support for specifying usable and secure systems might take. While CAIRIS supports a broad range... Read More about Design as code: facilitating collaboration between usability and security engineers using CAIRIS..

The effect of person order on egress time: a simulation model of evacuation from a neolithic visitor attraction. (2017)
Journal Article
STEWART, A., ELYAN, E., ISAACS, J., MCEWEN, L. and WILSON, L. 2017. The effect of person order on egress time: a simulation model of evacuation from a neolithic visitor attraction. Human factors [online], 59(8), pages 1222-1232. Available from: https://doi.org/10.1177/0018720817729608

Objective: The aim of this study was to model the egress of visitors from a Neolithic visitor attraction. Background: Tourism attracts increasing numbers of elderly and mobility-impaired visitors to our built-environment heritage sites. Some such sit... Read More about The effect of person order on egress time: a simulation model of evacuation from a neolithic visitor attraction..

Goal-oriented requirements engineering: an extended systematic mapping study. (2017)
Journal Article
HORKOFF, J., AYDEMIR, F.B., CARDOSO, E., LI, T., MATÉ, A., PAJA, E., SALNITRI, M., PIRAS, L., MYLOPOULOS, J. and GIORGINI, P. 2019. Goal-oriented requirements engineering: an extended systematic mapping study. Requirements engineering [online], 24(2), pages 133-160. Available from: https://doi.org/10.1007/s00766-017-0280-z

Over the last two decades, much attention has been paid to the area of goal-oriented requirements engineering (GORE), where goals are used as a useful conceptualization to elicit, model, and analyze requirements, capturing alternatives and conflicts.... Read More about Goal-oriented requirements engineering: an extended systematic mapping study..

Managing information security risk using integrated governance risk and compliance. (2017)
Conference Proceeding
NICHO, M., KHAN, S. and RAHMAN, M.S.M.K. 2017. Managing information security risk using integrated governance risk and compliance. In Proceedings of the 2017 International conference on computer and applications (ICCA 2017), 6-7 September 2017, Dubai, UAE. New York: IEEE [online], article number pages 8079741, 56-66. Available from: https://doi.org/10.1109/COMAPP.2017.8079741

This paper aims to demonstrate the building blocks of an IT Governance Risk and Compliance (IT GRC) model as well the phased stages of the optimal integration of IT GRC frameworks, standards and model through a longitudinal study. A qualitative longi... Read More about Managing information security risk using integrated governance risk and compliance..

Taxonomic corpus-based concept summary generation for document annotation. (2017)
Conference Proceeding
NKISI-ORJI, I., WIRATUNGA, N., HUI, K.-Y., HEAVEN, R. and MASSIE, S. 2017. Taxonomic corpus-based concept summary generation for document annotation. In Kampus, J., Tsakonas, G., Manolopoulos, Y., Iliadis, L. and Karydis, I. (eds.) Proceedings of the 21st International conference on theory and practice of digital libraries (TPDL 2017): research and advanced technology for digital libraries, 18-21 September 2017, Thessaloniki, Greece. Lecture notes in computer science, 10450. Cham: Springer [online], pages 49-60. Available from: https://doi.org/10.1007/978-3-319-67008-9_5

Semantic annotation is an enabling technology which links documents to concepts that unambiguously describe their content. Annotation improves access to document contents for both humans and software agents. However, the annotation process is a chall... Read More about Taxonomic corpus-based concept summary generation for document annotation..

Lexicon induction for interpretable text classification. (2017)
Conference Proceeding
CLOS, J. and WIRATUNGA, N. 2017. Lexicon induction for interpretable text classification. In Kampus, J., Tsakonas, G., Manolopoulos, Y., Iliadis, L. and Karydis, I. (eds.) Proceedings of the 21st International conference on theory and practice of digital libraries (TPDL 2017): research and advanced technology for digital libraries, 18-21 September 2017, Thessaloniki, Greece. Lecture notes in computer science, 10450. Cham: Springer [online], pages 498-510. Available from: https://doi.org/10.1007/978-3-319-67008-9_39

The automated classification of text documents is an active research challenge in document-oriented information systems, helping users browse massive amounts of data, detecting likely authors of unsigned work, or analyzing large corpora along predefi... Read More about Lexicon induction for interpretable text classification..

Persona-centred information security awareness. (2017)
Journal Article
KI-ARIES, D. and FAILY, S. 2017. Persona-centred information security awareness. Computers and security [online] 70, pages 663-674. Available from: https://doi.org/10.1016/j.cose.2017.08.001

Maintaining Information Security and protecting data assets remains a principal concern for businesses. Many data breaches continue to result from accidental, intentional or malicious human factors, leading to financial or reputational loss. One appr... Read More about Persona-centred information security awareness..

Quick response code secure: a cryptographically secure anti-phishing tool for QR code attacks. (2017)
Conference Proceeding
MAVROEIDIS, V. and NICHO, M. 2017. Quick response code secure: a cryptographically secure anti-phishing tool for QR code attacks. In Rak, J., Bay, J., Kotenko, I., Popyack, L., Skormin, V. and Szczypiorski, K. (eds.) Computer network security: Proceedings of the 7th International Mathematical methods, models and architectures for computer network security conference (MMM-ACNS 2017), 28-30 August 2017, Warsaw, Poland. Lecture notes in computer science, 10466. Cham: Springer [online], pages 313-324. Available from: https://doi.org/10.1007/978-3-319-65127-9_25

The two-dimensional quick response (QR) codes can be misleading due to the difficulty in differentiating a genuine QR code from a malicious one. Since, the vulnerability is practically part of their design, scanning a malicious QR code can direct the... Read More about Quick response code secure: a cryptographically secure anti-phishing tool for QR code attacks..

Heuristics-based detection to improve text/graphics segmentation in complex engineering drawings. (2017)
Conference Proceeding
MORENO-GARCÍA, C.F., ELYAN, E. and JAYNE, C. 2017. Heuristics-based detection to improve text/graphics segmentation in complex engineering drawings. In Boracchi, G., Iliadis, L., Jayne, C. and Likas, A. (eds.) Engineering applications of neural networks: proceedings of the 18th International engineering applications of neural networks (EANN 2017), 25-27 August 2017, Athens, Greece. Communications in computer and information science, 744. Cham: Springer [online], pages 87-98. Available from: https://doi.org/10.1007/978-3-319-65172-9_8

The demand for digitisation of complex engineering drawings becomes increasingly important for the industry given the pressure to improve the efficiency and time effectiveness of operational processes. There have been numerous attempts to solve this... Read More about Heuristics-based detection to improve text/graphics segmentation in complex engineering drawings..