Skip to main content

Research Repository

Advanced Search

Outputs (73)

What are the minimal sample size requirements for Mokken scaling? An empirical example with the Warwick-Edinburgh Mental Well-being Scale (2018)
Journal Article
Watson, R., Egberink, I. J., Kirke, L., Tendeiro, J. N., & Doyle, F. (in press). What are the minimal sample size requirements for Mokken scaling? An empirical example with the Warwick-Edinburgh Mental Well-being Scale. Health Psychology and Behavioral Medicine, 6(1), 203-213. https://doi.org/10.1080/21642850.2018.1505520

Purpose
Sample size in Mokken scales is mostly studied on simulated data, reflected in the lack of consideration of sample size in most Mokken scaling studies. Recently, Straat et al. (2014) provided minimum sample size requirements for Mokken scale... Read More about What are the minimal sample size requirements for Mokken scaling? An empirical example with the Warwick-Edinburgh Mental Well-being Scale.

Thin Implicit Utah Teapot: Design for Additive Manufacturing (2018)
Presentation / Conference Contribution
Qi, Q., & Li, Q. (2018, July). Thin Implicit Utah Teapot: Design for Additive Manufacturing. Presented at The 18th IEEE International Conference on Computer and Information Technology

© 2018 IEEE. Converting a surface-based geometric object into a thin solid is an essential requirement for additive manufacturing. Although offset surface and thickening techniques have been widely used for this task, it is in general difficult to mo... Read More about Thin Implicit Utah Teapot: Design for Additive Manufacturing.

Explicit Modelling and Treatment of Repair in Prediction of Dependability (2018)
Journal Article
Aizpurua, J. I., Papadopoulos, Y., & Merle, G. (2020). Explicit Modelling and Treatment of Repair in Prediction of Dependability. IEEE Transactions on Dependable and Secure Computing, 17(6), 1147-1162. https://doi.org/10.1109/TDSC.2018.2857810

In engineering practice, multiple repair actions are considered carefully by designers, and their success or failure defines further control actions and the evolution of the system state. Such treatment is not fully supported by the current state-of-... Read More about Explicit Modelling and Treatment of Repair in Prediction of Dependability.

Classification of bird species from video using appearance and motion features (2018)
Journal Article
Atanbori, J., Duan, W., Shaw, E., Appiah, K., & Dickinson, P. (2018). Classification of bird species from video using appearance and motion features. Ecological informatics, 48, 12-23. https://doi.org/10.1016/j.ecoinf.2018.07.005

The monitoring of bird populations can provide important information on the state of sensitive ecosystems; however, the manual collection of reliable population data is labour-intensive, time-consuming, and potentially error prone. Automated monitori... Read More about Classification of bird species from video using appearance and motion features.

A hybrid active contour segmentation method for myocardial D-SPECT images (2018)
Journal Article
Huang, C., Shan, X., Lan, Y., Liu, L., Cai, H., Che, W., Hao, Y., Cheng, Y., & Peng, Y. (2018). A hybrid active contour segmentation method for myocardial D-SPECT images. IEEE Access, 6, 39334-39343. https://doi.org/10.1109/ACCESS.2018.2855060

Ischaemic heart disease has become one of the leading causes of mortality worldwide. Dynamic single-photon emission computed tomography (D-SPECT) is an advanced routine diagnostic tool commonly used to validate myocardial function in patients sufferi... Read More about A hybrid active contour segmentation method for myocardial D-SPECT images.

Positive and unlabeled learning for user behavior analysis based on mobile internet traffic data (2018)
Journal Article
Yu, K., Liu, Y., Qing, L., Wang, B., & Cheng, Y. (2018). Positive and unlabeled learning for user behavior analysis based on mobile internet traffic data. IEEE Access, 6, 37568-37580. https://doi.org/10.1109/ACCESS.2018.2852008

With the rapid development of wireless communication and mobile Internet, mobile phone becomes ubiquitous and functions as a versatile and smart system, on which people frequently interact with various mobile applications (Apps). Understanding human... Read More about Positive and unlabeled learning for user behavior analysis based on mobile internet traffic data.

Advanced sliding mode control techniques for Inverted Pendulum: Modelling and simulation (2018)
Journal Article
Irfan, S., Mehmood, A., Razzaq, M. T., & Iqbal, J. (2018). Advanced sliding mode control techniques for Inverted Pendulum: Modelling and simulation. Engineering Science and Technology : an International Journal, 21(4), 753-759. https://doi.org/10.1016/j.jestch.2018.06.010

Numerous practical applications like robot balancing, segway and hover board riding and operation of a rocket propeller are inherently based on Inverted Pendulum (IP). The control of an IP is a sophisticated problem due to various real world phenomen... Read More about Advanced sliding mode control techniques for Inverted Pendulum: Modelling and simulation.

P-CSREC: A New Approach for Personalized Cloud Service Recommendation (2018)
Journal Article
Zhang, C., Li, Z., Li, T., Han, Y., Wei, C., Cheng, Y., & Peng, Y. (2018). P-CSREC: A New Approach for Personalized Cloud Service Recommendation. IEEE Access, 6, 35946-35956. https://doi.org/10.1109/ACCESS.2018.2847631

It is becoming a challenging issue for users to choose a satisfied service to fit their need due to the rapid growing number of cloud services and the vast amount of service type varieties. This paper proposes an effective cloud service recommendatio... Read More about P-CSREC: A New Approach for Personalized Cloud Service Recommendation.

Taxi model of unmanned aerial vehicle: Formulation and simulation (2018)
Presentation / Conference Contribution
Wasim, M., Ullah, M., & Iqbal, J. (2018, April). Taxi model of unmanned aerial vehicle: Formulation and simulation. Presented at 1st International Conference on Power, Energy and Smart Grid (ICPESG), Mirpur Azad Kashmir, Pakistan

Unmanned Aerial Vehicles cannot work efficiently without a control system. Before any form of control is applied to it, modeling of the system is necessary. This work focuses on the development of a Taxi model of UAV. The reformulated model has been... Read More about Taxi model of unmanned aerial vehicle: Formulation and simulation.

Lightweight and privacy-preserving two-factor authentication scheme for IoT devices (2018)
Journal Article
Gope, P., & Sikdar, B. (2019). Lightweight and privacy-preserving two-factor authentication scheme for IoT devices. IEEE internet of things journal, 6(1), 580 - 589. https://doi.org/10.1109/JIOT.2018.2846299

Device authentication is an essential security feature for Internet of Things (IoT). Many IoT devices are deployed in the open and public places, which makes them vulnerable to physical and cloning attacks. Therefore, any authentication protocol desi... Read More about Lightweight and privacy-preserving two-factor authentication scheme for IoT devices.