Skip to main content

Research Repository

Advanced Search

Outputs (747)

Stimulus reconstruction from a Hodgkin-Huxley neural response: A numerical solution (2010)
Presentation / Conference Contribution
Sarangdhar, M., & Kambhampati, C. (2010, June). Stimulus reconstruction from a Hodgkin-Huxley neural response: A numerical solution. Presented at World Congress on Engineering 2010

Neural responses are the fundamental expressions of any neural activity. Information carried by a neural response is determined by the nature of a neural activity. In majority of cases the underlying stimulus that triggers it remains largely... Read More about Stimulus reconstruction from a Hodgkin-Huxley neural response: A numerical solution.

Local hybrid level-set method for MRA image segmentation (2010)
Presentation / Conference Contribution
Hong, Q., Li, Q., & Tian, J. (2010, June). Local hybrid level-set method for MRA image segmentation. Presented at 10th IEEE International Conference on Computer and Information Technology, CIT-2010, 7th IEEE International Conference on Embedded Software and Systems, ICESS-2010, ScalCom-2010

In this paper, a local hybrid level-set method for medical image segmentation is presented. In proposed method, a locally fitted binary energy function is introduced into the hybrid level-set framework proposed by Zhang et al.. Compared with the glob... Read More about Local hybrid level-set method for MRA image segmentation.

Capture and reuse of composable failure patterns (2010)
Journal Article
Wolforth, I., Walker, M., Papadopoulos, Y., & Grunske, L. (2010). Capture and reuse of composable failure patterns. International Journal of Critical Computer-Based Systems, 1(1/2/3), 128-147. https://doi.org/10.1504/IJCCBS.2010.031710

Emerging safety analysis techniques use composition of failure models or fault simulation in formal models of a system to determine relationships between the causes and effects of failure. Most recent work has focused on developing system modelling a... Read More about Capture and reuse of composable failure patterns.

XML document design via GN-DTD (2010)
Journal Article
Zainol, Z., & Wang, B. (2010). XML document design via GN-DTD. European Journal of Scientific Research, 44(2), 314-336

Designing a well-structured XML document is important for the sake of readability and maintainability. More importantly, this will avoid data redundancies and update anomalies when maintaining a large quantity of XML based documents. In this paper, w... Read More about XML document design via GN-DTD.

Dynamic effect of perfect preventive maintenance on system reliability and cost using HiP-HOPS (2010)
Presentation / Conference Contribution
Nggada, S. H., Parker, D. J., & Papadopoulos, Y. I. Dynamic effect of perfect preventive maintenance on system reliability and cost using HiP-HOPS

The occurrence of failure in a safety critical engineering system can be reduced through the use of preventive maintenance (PM). Each time a component of the system is maintained its effective age is reduced; the extent of this age reduction depends... Read More about Dynamic effect of perfect preventive maintenance on system reliability and cost using HiP-HOPS.

E-services and the digital divide: The role of tertiary education in improving public engagement and trust in e-delivery of services (2010)
Book Chapter
Gordon, N. A. (2010). E-services and the digital divide: The role of tertiary education in improving public engagement and trust in e-delivery of services. In Handbook of Research on E-Services in the Public Sector: E-Government Strategies and Advancements (244-250). Information Science Reference. https://doi.org/10.4018/978-1-61520-789-3.ch019

This chapter considers aspects relating to the role of tertiary (i.e. higher) education in improving the engagement of the public with government provided E-services. Some of the issues considered include those of tackling the digital divide - which... Read More about E-services and the digital divide: The role of tertiary education in improving public engagement and trust in e-delivery of services.

Ethical dilemmas in teaching computer and internet security (2010)
Book Chapter
Tompsett, B. (2010). Ethical dilemmas in teaching computer and internet security. In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; Information Security and Digital Forensics (76-81). Springer-Verlag. https://doi.org/10.1007/978-3-642-11530-1_9

This paper could be subtitled "Are we teaching the next generation of computer criminals and internet terrorists"? This issue was raised by the Security Services as part of the collaborative network meeting in the area of IT Forensics and Data Analys... Read More about Ethical dilemmas in teaching computer and internet security.

Data mining applied to cardiovascular data (2010)
Journal Article
Bohacik, J., & Davis, D. (2010). Data mining applied to cardiovascular data. Journal of information technologies, 3(2), 14 - 21

Medical decision support is one area of increasing research interest. Ongoing collaborations between cardiovascular clinicians and computer scientists are looking at the application of data mining techniques to the area of individual patient diagnosi... Read More about Data mining applied to cardiovascular data.

Is green IT an antidote to e-waste problems? (2010)
Journal Article
Nganji, J., & Brayshaw, M. (2010). Is green IT an antidote to e-waste problems?. Innovation in teaching and learning in information and computer sciences, 9(2), 1-9. https://doi.org/10.11120/ital.2010.09020006

Man’s negative impact on the environment due to various activities has raised serious concerns with numerous campaigns rising to protect the environment. Computer waste also contributes to damaging not only the environment, but has serious consequenc... Read More about Is green IT an antidote to e-waste problems?.