Skip to main content

Research Repository

Advanced Search

All Outputs (87)

Quantification of temporal fault trees based on fuzzy set theory (2014)
Journal Article
Kabir, S., Edifor, E., Walker, M., & Gordon, N. (2014). Quantification of temporal fault trees based on fuzzy set theory. Advances in Intelligent Systems and Computing, 286, 255-264. https://doi.org/10.1007/978-3-319-07013-1_24

© Springer International Publishing Switzerland 2014. Fault tree analysis (FTA) has been modified in different ways to make it capable of performing quantitative and qualitative safety analysis with temporal gates, thereby overcoming its limitation i... Read More about Quantification of temporal fault trees based on fuzzy set theory.

Maximising gain for minimal pain: Utilising natural game mechanics (2013)
Journal Article
Gordon, N., Brayshaw, M., & Grey, S. (2013). Maximising gain for minimal pain: Utilising natural game mechanics. Innovation in teaching and learning in information and computer sciences, 12(1), 27-38. https://doi.org/10.11120/ital.2013.00004

This paper considers the application of natural games mechanics within higher education as a vehicle to encourage student engagement and achievement of desired learning outcomes. It concludes with desiderata of features for a learning environment whe... Read More about Maximising gain for minimal pain: Utilising natural game mechanics.

Safety Analysis of a Remote Patient Monitoring System with a Guideline Based Decision Support (2013)
Book Chapter
Al-Qora'n, L., Sharvia, S., Papadopoulos, Y., & Gordon, N. (2013). Safety Analysis of a Remote Patient Monitoring System with a Guideline Based Decision Support. In Global Telemedicine and eHealth Updates: Knowledge Resources (527 - 531). International Society for Telemedicine & eHealth

Home Telehealth systems are used to help in the management of chronic conditions by patients themselves. Effective safety analysis tools are needed to ensure reliability and safety of these high risk systems. We hereby explain how Hierarchically-Perf... Read More about Safety Analysis of a Remote Patient Monitoring System with a Guideline Based Decision Support.

Tetrads of lines spanning PG(7,2) (2013)
Journal Article
Shaw, R., Gordon, N., & Havlicek, H. (2013). Tetrads of lines spanning PG(7,2). Bulletin of the Belgian Mathematical Society, Simon Stevin, 20(4), 735-752. https://doi.org/10.36045/bbms/1382448192

Our starting point is a very simple one, namely that of a set L₄ of four mutually skew lines in PG(7,2). Under the natural action of the stabilizer group G(L₄)<GL(8,2) the 255 points of PG(7,2) fall into four orbits ω₁,ω₂,ω₃,ω4, of respective lengths...

Activating cognitive activities among students through the application of WebPA in teaching knowledge on mathematical operations in upper secondary schools of Vietnam (2012)
Journal Article
Nguyen, T., & Gordon, N. (2012). Activating cognitive activities among students through the application of WebPA in teaching knowledge on mathematical operations in upper secondary schools of Vietnam

In Vietnam, the inspection and evaluation in education is usually performed by traditional assessments, including regular testing and periodic examination. The biggest advantage of these assessments are that they are easy to deploy and fairly accurat... Read More about Activating cognitive activities among students through the application of WebPA in teaching knowledge on mathematical operations in upper secondary schools of Vietnam.

Personalized content provision for virtual learning environments via the semantic web (2012)
Journal Article
Wen, L., Brayshaw, M., & Gordon, N. (2012). Personalized content provision for virtual learning environments via the semantic web. Innovation in teaching and learning in information and computer sciences, 11(1), 14-26. https://doi.org/10.11120/ital.2012.11010014

In this paper we discuss how we may personalize e-learning along three distinct axes, namely: teaching and learning pedagogical philosophies, personalized educational processes to taste and the coordination of these processes during execution. In doi... Read More about Personalized content provision for virtual learning environments via the semantic web.

Aspects of the Segre variety S1,1,1(2) (2011)
Journal Article
Shaw, R., Gordon, N., & Havlicek, H. (2012). Aspects of the Segre variety S1,1,1(2). Designs, codes, and cryptography, 62(2), 225-239. https://doi.org/10.1007/s10623-011-9508-y

We consider various aspects of the Segre variety S := S_{1,1,1}(2) in PG(7,2), whose stabilizer group G_S < GL(8, 2) has the structure N {\rtimes} Sym(3), where N := GL(2,2)\times GL(2,2)\times GL(2,2). In particular we prove that S determines a dist... Read More about Aspects of the Segre variety S1,1,1(2).

E-services and the digital divide: The role of tertiary education in improving public engagement and trust in e-delivery of services (2010)
Book Chapter
Gordon, N. A. (2010). E-services and the digital divide: The role of tertiary education in improving public engagement and trust in e-delivery of services. In Handbook of Research on E-Services in the Public Sector: E-Government Strategies and Advancements (244-250). Information Science Reference. https://doi.org/10.4018/978-1-61520-789-3.ch019

This chapter considers aspects relating to the role of tertiary (i.e. higher) education in improving the engagement of the public with government provided E-services. Some of the issues considered include those of tackling the digital divide - which... Read More about E-services and the digital divide: The role of tertiary education in improving public engagement and trust in e-delivery of services.

Education for sustainable development in computer science (2010)
Journal Article
Gordon, N. (2010). Education for sustainable development in computer science. Innovation in teaching and learning in information and computer sciences, 9(2), 1-6. https://doi.org/10.11120/ital.2010.09020003

In this paper we will consider some of the aspects related to the teaching of sustainable development within the Higher Education computing curriculum - including students' views on the relevance of this to their education, grounded on the outcome fr... Read More about Education for sustainable development in computer science.

Enabling personalised learning through formative and summative assessment (2009)
Book Chapter
Gordon, N. A. (2009). Enabling personalised learning through formative and summative assessment. In Technology-Supported Environments for Personalized Learning: Methods and Case Studies (268-284). Information Science Publishing. https://doi.org/10.4018/978-1-60566-884-0.ch015

This chapter considers some ways in which personalised learning can potentially be delivered by means of appropriate assessment and the use of associated technologies. Recognising that for many students, learning is driven by summative assessment, th... Read More about Enabling personalised learning through formative and summative assessment.

The cubic Segre variety in PG(5,2) (2008)
Journal Article
Shaw, R., & Gordon, N. A. (2009). The cubic Segre variety in PG(5,2). Designs, codes, and cryptography, 51(2), 141-156. https://doi.org/10.1007/s10623-008-9250-2

The Segre variety S 1,2 in PG(5, 2) is a 21-set of points which is shown to have a cubic equation Q(x) = 0. If T(x, y, z) denotes the alternating trilinear form obtained by completely polarizing the cubic polynomial Q, then the associate U # of an r-... Read More about The cubic Segre variety in PG(5,2).

The polynomial degree of the Grassmannian G1,n,2 (2006)
Journal Article
Shaw, R., & Gordon, N. A. (2006). The polynomial degree of the Grassmannian G1,n,2. Designs, codes, and cryptography, 39(2), 289-306. https://doi.org/10.1007/s10623-005-4524-4

For a subset ψ of PG(N, 2) a known result states that ψ has polynomial degree ≤ r, r ≤ N, if and only if ψ intersects every r-flat of PG(N, 2) in an odd number of points. Certain refinements of this result are considered, and are then applied in the... Read More about The polynomial degree of the Grassmannian G1,n,2.

Partial spreads in PG(4,2) and flats in PG(9,2) external to the Grassmannian G1,4,2 (2005)
Journal Article
Shaw, R., Gordon, N. A., & Maks, J. G. (2005). Partial spreads in PG(4,2) and flats in PG(9,2) external to the Grassmannian G1,4,2. Discrete Mathematics, 301(1), 137-146. https://doi.org/10.1016/j.disc.2004.11.023

We consider the following 'even hyperplane construction'of flats in the projective space PG(9, 2) = P(boolean AND(2) V(5, 2)) which are external to the Grassmannian G(1,4,2) of lines of PG(4,2). Let the Grassmann image in G(1,4,2) of a partial spread... Read More about Partial spreads in PG(4,2) and flats in PG(9,2) external to the Grassmannian G1,4,2.

The classification of flats in PG (9, 2) which are external to the grassmannian script G sign1,4,2 (2005)
Journal Article
Shaw, R., Maks, J. G., & Gordon, N. A. (2005). The classification of flats in PG (9, 2) which are external to the grassmannian script G sign1,4,2. Designs, codes, and cryptography, 34(2-3), 203-227. https://doi.org/10.1007/s10623-004-4855-6

Constructions are given of different kinds of flats in the projective space$$PG(9,2)={\mathbb P}(\wedge^{2}V(5,2))$$which are external to the Grassmannian$${\cal G}_{\bf 1,4,2}$$of lines ofPG(4,2). In particular it is shown that there exist precisely... Read More about The classification of flats in PG (9, 2) which are external to the grassmannian script G sign1,4,2.

Aspects of the linear groups GL(n,2) (2005)
Journal Article
Gordon, N. A., Jarvisy, T. M., & Shawy, R. (2005). Aspects of the linear groups GL(n,2). Journal of combinatorial mathematics and combinatorial computing, 53, 13 - 31

We provide tables which summarize various aspects of the Önite linear groups GL(n; 2); n < 7; in their action upon the vector space Vn = V (n; 2) and upon the associated projective space PG(n 1; 2): It is intended that the tabulated results should be... Read More about Aspects of the linear groups GL(n,2).

Experiences of embedding Information Technology into discipline based teaching (2005)
Journal Article
Gordon, N. (2005). Experiences of embedding Information Technology into discipline based teaching. Innovation in teaching and learning in information and computer sciences, 4(1), 1-9. https://doi.org/10.11120/ital.2005.04010002

In this paper we will reflect upon some of the experiences that the author had whilst supporting the embedding of Information Technology (I.T.) into a U.K. mathematics department’s undergraduate teaching. The paper includes some examples of the kinds... Read More about Experiences of embedding Information Technology into discipline based teaching.

The quintic Grassmannian g(1,4,2) in PG(9,2) (2004)
Journal Article
Shaw, R., & Gordon, N. (2004). The quintic Grassmannian g(1,4,2) in PG(9,2). Designs, codes, and cryptography, 32(1-3), 381 - 396. https://doi.org/10.1023/B%3ADESI.0000029236.10701.61

The 155 points of the Grassmannian g(1,4,2) of lines of PG(4,2) = PV(5,2) are those points x is an element of PG(9,2) = P(boolean AND V-2(5,2)) which satisfy a certain quintic equation Q(x) = 0. (The quintic polynomial Q is given explicitly in Shaw a... Read More about The quintic Grassmannian g(1,4,2) in PG(9,2).

Wither mathematics, whither science? (2004)
Journal Article
Gordon, N. (2004). Wither mathematics, whither science?. Teaching mathematics and its applications / the Institute of Mathematics and Its Applications, 23(1), 15-32. https://doi.org/10.1093/teamat/23.1.15

This paper gives an overview of some of the problems facing the higher education mathematics community, and some examples of methods that departments of mathematics and related disciplines can use to try to deal with the problems. This is relevant to... Read More about Wither mathematics, whither science?.

Numerical computation and analysis of the Titchmarsh-Weyl mα(λ)  function for some simple potentials (1999)
Journal Article
Witwit, M. R. M., Gordon, N. A., & Killingbeck, J. (1999). Numerical computation and analysis of the Titchmarsh-Weyl mα(λ)  function for some simple potentials. Journal of Computational and Applied Mathematics, 106(1), 131-143. https://doi.org/10.1016/S0377-0427%2899%2900061-8

This article is concerned with the Titchmarsh-Weyl mα(λ) function for the differential equation d2y/dx2+[-q(x)]y=0. The test potential q(x)=x2, for which the relevant mα(λ) functions are meromorphic, having simple poles at the points =4k+1 and =4k+3,... Read More about Numerical computation and analysis of the Titchmarsh-Weyl mα(λ)  function for some simple potentials.

Point transfer matrices for the Schrödinger equation: The algebraic theory (1999)
Journal Article
Gordon, N. A., & Pearson, D. B. (1999). Point transfer matrices for the Schrödinger equation: The algebraic theory. Proceedings of the Royal Society of Edinburgh: Section A Mathematics, 129(4), 717-732. https://doi.org/10.1017/S030821050001310X

This paper deals with the theory of point interactions for the one-dimensional Schrödinger equation. The familiar example of the δ5-potential V(x) = gδ(x - x 0 ), for which the transfer matrix across the singularity (point transfer matrix) is given b... Read More about Point transfer matrices for the Schrödinger equation: The algebraic theory.