Skip to main content

Research Repository

Advanced Search

All Outputs (47)

Heuristic Evaluation for Serious Immersive Games and M-instruction (2016)
Journal Article
Brayshaw, M., Gordon, N., & Aljaber, T. (2016). Heuristic Evaluation for Serious Immersive Games and M-instruction. Lecture notes in computer science, 9753, 310-319. https://doi.org/10.1007/978-3-319-39483-1_29

© Springer International Publishing Switzerland 2016. Two fast growing areas for technology-enhanced learning are serious games and mobile instruction (M-instruction or M-Learning). Serious games are ones that are meant to be more than just entertain... Read More about Heuristic Evaluation for Serious Immersive Games and M-instruction.

Investigating heuristic evaluation as a methodology for evaluating pedagogical software: An analysis employing three case studies (2014)
Journal Article
Nganji, J., Brayshaw, M., Gordon, N., Butterfield, A., & Wen, L. (2014). Investigating heuristic evaluation as a methodology for evaluating pedagogical software: An analysis employing three case studies. Lecture notes in computer science, 8523 LNCS(PART 1), 25-35. https://doi.org/10.1007/978-3-319-07482-5_3

This paper looks specifically at how to develop light weight methods of evaluating pedagogically motivated software. Whilst we value traditional usability testing methods this paper will look at how Heuristic Evaluation can be used as both a driving... Read More about Investigating heuristic evaluation as a methodology for evaluating pedagogical software: An analysis employing three case studies.

A safety analysis approach to clinical workflows : application and evaluation (2014)
Journal Article
Gordon, N., Kabir, S., Sharvia, S., Walker, M., & Al-Qora’n, L. (in press). A safety analysis approach to clinical workflows : application and evaluation. International Journal of Advanced Computer Science and Applications, 4(3), 82-91. https://doi.org/10.14569/SpecialIssue.2014.040310

Clinical workflows are safety critical workflows as they have the potential to cause harm or death to patients. Their safety needs to be considered as early as possible in the development process. Effective safety analysis methods are required to ens... Read More about A safety analysis approach to clinical workflows : application and evaluation.

An approach to safety analysis of clinical workflows (2014)
Journal Article
Al-Qora'n, L., Gordon, N., Sharvia, S., Walker, M., & Papadopoulos, Y. (2014). An approach to safety analysis of clinical workflows. Athens Journal of Health, 1(3), 201-216. https://doi.org/10.30958/ajh.1-3-4

A clinical workflow considers the information and processes that are involved in providing a clinical service. They are safety critical since even minor faults have the potential to propagate and consequently cause harm to a patient, or even for a pa... Read More about An approach to safety analysis of clinical workflows.

Quantification of temporal fault trees based on fuzzy set theory (2014)
Journal Article
Kabir, S., Edifor, E., Walker, M., & Gordon, N. (2014). Quantification of temporal fault trees based on fuzzy set theory. Advances in Intelligent Systems and Computing, 286, 255-264. https://doi.org/10.1007/978-3-319-07013-1_24

© Springer International Publishing Switzerland 2014. Fault tree analysis (FTA) has been modified in different ways to make it capable of performing quantitative and qualitative safety analysis with temporal gates, thereby overcoming its limitation i... Read More about Quantification of temporal fault trees based on fuzzy set theory.

Maximising gain for minimal pain: Utilising natural game mechanics (2013)
Journal Article
Gordon, N., Brayshaw, M., & Grey, S. (2013). Maximising gain for minimal pain: Utilising natural game mechanics. Innovation in teaching and learning in information and computer sciences, 12(1), 27-38. https://doi.org/10.11120/ital.2013.00004

This paper considers the application of natural games mechanics within higher education as a vehicle to encourage student engagement and achievement of desired learning outcomes. It concludes with desiderata of features for a learning environment whe... Read More about Maximising gain for minimal pain: Utilising natural game mechanics.

Tetrads of lines spanning PG(7,2) (2013)
Journal Article
Shaw, R., Gordon, N., & Havlicek, H. (2013). Tetrads of lines spanning PG(7,2). Bulletin of the Belgian Mathematical Society, Simon Stevin, 20(4), 735-752. https://doi.org/10.36045/bbms/1382448192

Our starting point is a very simple one, namely that of a set L₄ of four mutually skew lines in PG(7,2). Under the natural action of the stabilizer group G(L₄)

Activating cognitive activities among students through the application of WebPA in teaching knowledge on mathematical operations in upper secondary schools of Vietnam (2012)
Journal Article
Nguyen, T., & Gordon, N. (2012). Activating cognitive activities among students through the application of WebPA in teaching knowledge on mathematical operations in upper secondary schools of Vietnam

In Vietnam, the inspection and evaluation in education is usually performed by traditional assessments, including regular testing and periodic examination. The biggest advantage of these assessments are that they are easy to deploy and fairly accurat... Read More about Activating cognitive activities among students through the application of WebPA in teaching knowledge on mathematical operations in upper secondary schools of Vietnam.

Personalized content provision for virtual learning environments via the semantic web (2012)
Journal Article
Wen, L., Brayshaw, M., & Gordon, N. (2012). Personalized content provision for virtual learning environments via the semantic web. Innovation in teaching and learning in information and computer sciences, 11(1), 14-26. https://doi.org/10.11120/ital.2012.11010014

In this paper we discuss how we may personalize e-learning along three distinct axes, namely: teaching and learning pedagogical philosophies, personalized educational processes to taste and the coordination of these processes during execution. In doi... Read More about Personalized content provision for virtual learning environments via the semantic web.

Aspects of the Segre variety S1,1,1(2) (2011)
Journal Article
Shaw, R., Gordon, N., & Havlicek, H. (2012). Aspects of the Segre variety S1,1,1(2). Designs, codes, and cryptography, 62(2), 225-239. https://doi.org/10.1007/s10623-011-9508-y

We consider various aspects of the Segre variety S := S_{1,1,1}(2) in PG(7,2), whose stabilizer group G_S < GL(8, 2) has the structure N {\rtimes} Sym(3), where N := GL(2,2)\times GL(2,2)\times GL(2,2). In particular we prove that S determines a dist... Read More about Aspects of the Segre variety S1,1,1(2).

Education for sustainable development in computer science (2010)
Journal Article
Gordon, N. (2010). Education for sustainable development in computer science. Innovation in teaching and learning in information and computer sciences, 9(2), 1-6. https://doi.org/10.11120/ital.2010.09020003

In this paper we will consider some of the aspects related to the teaching of sustainable development within the Higher Education computing curriculum - including students' views on the relevance of this to their education, grounded on the outcome fr... Read More about Education for sustainable development in computer science.

The cubic Segre variety in PG(5,2) (2008)
Journal Article
Shaw, R., & Gordon, N. A. (2009). The cubic Segre variety in PG(5,2). Designs, codes, and cryptography, 51(2), 141-156. https://doi.org/10.1007/s10623-008-9250-2

The Segre variety S 1,2 in PG(5, 2) is a 21-set of points which is shown to have a cubic equation Q(x) = 0. If T(x, y, z) denotes the alternating trilinear form obtained by completely polarizing the cubic polynomial Q, then the associate U # of an r-... Read More about The cubic Segre variety in PG(5,2).

The polynomial degree of the Grassmannian G1,n,2 (2006)
Journal Article
Shaw, R., & Gordon, N. A. (2006). The polynomial degree of the Grassmannian G1,n,2. Designs, codes, and cryptography, 39(2), 289-306. https://doi.org/10.1007/s10623-005-4524-4

For a subset ψ of PG(N, 2) a known result states that ψ has polynomial degree ≤ r, r ≤ N, if and only if ψ intersects every r-flat of PG(N, 2) in an odd number of points. Certain refinements of this result are considered, and are then applied in the... Read More about The polynomial degree of the Grassmannian G1,n,2.

Partial spreads in PG(4,2) and flats in PG(9,2) external to the Grassmannian G1,4,2 (2005)
Journal Article
Shaw, R., Gordon, N. A., & Maks, J. G. (2005). Partial spreads in PG(4,2) and flats in PG(9,2) external to the Grassmannian G1,4,2. Discrete Mathematics, 301(1), 137-146. https://doi.org/10.1016/j.disc.2004.11.023

We consider the following 'even hyperplane construction'of flats in the projective space PG(9, 2) = P(boolean AND(2) V(5, 2)) which are external to the Grassmannian G(1,4,2) of lines of PG(4,2). Let the Grassmann image in G(1,4,2) of a partial spread... Read More about Partial spreads in PG(4,2) and flats in PG(9,2) external to the Grassmannian G1,4,2.

The classification of flats in PG (9, 2) which are external to the grassmannian script G sign1,4,2 (2005)
Journal Article
Shaw, R., Maks, J. G., & Gordon, N. A. (2005). The classification of flats in PG (9, 2) which are external to the grassmannian script G sign1,4,2. Designs, codes, and cryptography, 34(2-3), 203-227. https://doi.org/10.1007/s10623-004-4855-6

Constructions are given of different kinds of flats in the projective space$$PG(9,2)={\mathbb P}(\wedge^{2}V(5,2))$$which are external to the Grassmannian$${\cal G}_{\bf 1,4,2}$$of lines ofPG(4,2). In particular it is shown that there exist precisely... Read More about The classification of flats in PG (9, 2) which are external to the grassmannian script G sign1,4,2.

Experiences of embedding Information Technology into discipline based teaching (2005)
Journal Article
Gordon, N. (2005). Experiences of embedding Information Technology into discipline based teaching. Innovation in teaching and learning in information and computer sciences, 4(1), 1-9. https://doi.org/10.11120/ital.2005.04010002

In this paper we will reflect upon some of the experiences that the author had whilst supporting the embedding of Information Technology (I.T.) into a U.K. mathematics department’s undergraduate teaching. The paper includes some examples of the kinds... Read More about Experiences of embedding Information Technology into discipline based teaching.

Aspects of the linear groups GL(n,2) (2005)
Journal Article
Gordon, N. A., Jarvisy, T. M., & Shawy, R. (2005). Aspects of the linear groups GL(n,2). Journal of combinatorial mathematics and combinatorial computing, 53, 13 - 31

We provide tables which summarize various aspects of the Önite linear groups GL(n; 2); n < 7; in their action upon the vector space Vn = V (n; 2) and upon the associated projective space PG(n 1; 2): It is intended that the tabulated results should be... Read More about Aspects of the linear groups GL(n,2).

The quintic Grassmannian g(1,4,2) in PG(9,2) (2004)
Journal Article
Shaw, R., & Gordon, N. (2004). The quintic Grassmannian g(1,4,2) in PG(9,2). Designs, codes, and cryptography, 32(1-3), 381 - 396. https://doi.org/10.1023/B%3ADESI.0000029236.10701.61

The 155 points of the Grassmannian g(1,4,2) of lines of PG(4,2) = PV(5,2) are those points x is an element of PG(9,2) = P(boolean AND V-2(5,2)) which satisfy a certain quintic equation Q(x) = 0. (The quintic polynomial Q is given explicitly in Shaw a... Read More about The quintic Grassmannian g(1,4,2) in PG(9,2).

Wither mathematics, whither science? (2004)
Journal Article
Gordon, N. (2004). Wither mathematics, whither science?. Teaching mathematics and its applications / the Institute of Mathematics and Its Applications, 23(1), 15-32. https://doi.org/10.1093/teamat/23.1.15

This paper gives an overview of some of the problems facing the higher education mathematics community, and some examples of methods that departments of mathematics and related disciplines can use to try to deal with the problems. This is relevant to... Read More about Wither mathematics, whither science?.

Numerical computation and analysis of the Titchmarsh-Weyl mα(λ)  function for some simple potentials (1999)
Journal Article
Witwit, M. R. M., Gordon, N. A., & Killingbeck, J. (1999). Numerical computation and analysis of the Titchmarsh-Weyl mα(λ)  function for some simple potentials. Journal of Computational and Applied Mathematics, 106(1), 131-143. https://doi.org/10.1016/S0377-0427%2899%2900061-8

This article is concerned with the Titchmarsh-Weyl mα(λ) function for the differential equation d2y/dx2+[-q(x)]y=0. The test potential q(x)=x2, for which the relevant mα(λ) functions are meromorphic, having simple poles at the points =4k+1 and =4k+3,... Read More about Numerical computation and analysis of the Titchmarsh-Weyl mα(λ)  function for some simple potentials.