Skip to main content

Research Repository

Advanced Search

All Outputs (40)

IBA: Intelligent bug algorithm – a novel strategy to navigate mobile robots autonomously (2013)
Book Chapter
Zohaib, M., Pasha, S. M., Javaid, N., & Iqbal, J. (2013). IBA: Intelligent bug algorithm – a novel strategy to navigate mobile robots autonomously. In F. K. Shaikh, B. S. Chowdhry, S. Zeadally, D. M. A. Hussain, A. A. Memon, & M. A. Uqaili (Eds.), Communication Technologies, Information Security and Sustainable Development (291-299). Cham: Springer Verlag. https://doi.org/10.1007/978-3-319-10987-9_27

This research proposes an intelligent obstacle avoidance algorithm to navigate an autonomous mobile robot. The presented Intelligent Bug Algorithm (IBA) over performs and reaches the goal in relatively less time as compared to existing Bug algorithms... Read More about IBA: Intelligent bug algorithm – a novel strategy to navigate mobile robots autonomously.

Designing personalised learning resources for disabled students using an ontology-driven community of agents (2012)
Book Chapter
Nganji, J. T., & Brayshaw, M. (2012). Designing personalised learning resources for disabled students using an ontology-driven community of agents. In P. Isaias, & M. Baptista Nunes (Eds.), Information systems research and exploring social artifacts: approaches and methodologies (81-102). IGI Global. https://doi.org/10.4018/978-1-4666-2491-7.ch005

The exploration of social artifacts for the disabled is an important and timely issue. The affordances of new technologies like the Semantic Web allow more intelligent handling of educational learning resources that open up the potential of personali... Read More about Designing personalised learning resources for disabled students using an ontology-driven community of agents.

Integrated application of compositional and behavioural safety analysis (2011)
Book Chapter
Sharvia, S., & Papadopoulos, Y. (2011). Integrated application of compositional and behavioural safety analysis. In W. Zamojski, J. Kacprzyk, J. Mazurkiewicz, J. Sugier, & T. Walkowiak (Eds.), Dependable Computer Systems (179-192). Berlin: Springer. https://doi.org/10.1007/978-3-642-21393-9_14

The design complexity of modern safety critical systems presents various challenges for its safety assessment process. In recent years, Model-Based Safety Analysis (MBSA) has been proposed to achieve more-robust and effective safety assessment techni... Read More about Integrated application of compositional and behavioural safety analysis.

E-services and the digital divide: The role of tertiary education in improving public engagement and trust in e-delivery of services (2010)
Book Chapter
Gordon, N. A. (2010). E-services and the digital divide: The role of tertiary education in improving public engagement and trust in e-delivery of services. Handbook of Research on E-Services in the Public Sector: E-Government Strategies and Advancements (244-250). Information Science Reference. https://doi.org/10.4018/978-1-61520-789-3.ch019

This chapter considers aspects relating to the role of tertiary (i.e. higher) education in improving the engagement of the public with government provided E-services. Some of the issues considered include those of tackling the digital divide - which... Read More about E-services and the digital divide: The role of tertiary education in improving public engagement and trust in e-delivery of services.

Ethical dilemmas in teaching computer and internet security (2010)
Book Chapter
Tompsett, B. (2010). Ethical dilemmas in teaching computer and internet security. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; Information Security and Digital Forensics (76-81). Springer-Verlag. https://doi.org/10.1007/978-3-642-11530-1_9

This paper could be subtitled "Are we teaching the next generation of computer criminals and internet terrorists"? This issue was raised by the Security Services as part of the collaborative network meeting in the area of IT Forensics and Data Analys... Read More about Ethical dilemmas in teaching computer and internet security.

Extending HiP-HOPS with Capabilities of Planning Preventative Maintenance (2010)
Book Chapter
Parker, D., & Papadopoulos, Y. (2010). Extending HiP-HOPS with Capabilities of Planning Preventative Maintenance. In M. Sarrafzadeh, & P. Petratos (Eds.), Strategic Advantage of Computing Information Systems in Enterprise Management (231 - 245). ATINER

An effective preventive maintenance (PM) policy for components of an engineering system slows down the rate at which component fatigue accumulates, thereby minimising the occurrence of component failure. The benefit of PM at system level is improveme... Read More about Extending HiP-HOPS with Capabilities of Planning Preventative Maintenance.

Spiking neurons and synaptic stimuli: Neural response comparison using coincidence-factor (2009)
Book Chapter
Sarangdhar, M., & Kambhampati, C. (2009). Spiking neurons and synaptic stimuli: Neural response comparison using coincidence-factor. In S. Ao, & L. Gelman (Eds.), Lecture Notes in Electrical Engineering; Advances in Electrical Engineering and Computational Science (681-692). Springer Verlag. https://doi.org/10.1007/978-90-481-2311-7_58

In this chapter, neural responses are generated by changing the Inter-Spike-Interval (ISI) of the stimulus. These responses are subsequently compared and a coincidence factor is obtained. Coincidence-factor, a measure of similarity, is expected to ge... Read More about Spiking neurons and synaptic stimuli: Neural response comparison using coincidence-factor.

Enabling personalised learning through formative and summative assessment (2009)
Book Chapter
Gordon, N. A. (2009). Enabling personalised learning through formative and summative assessment. Technology-Supported Environments for Personalized Learning: Methods and Case Studies (268-284). Information Science Publishing. https://doi.org/10.4018/978-1-60566-884-0.ch015

This chapter considers some ways in which personalised learning can potentially be delivered by means of appropriate assessment and the use of associated technologies. Recognising that for many students, learning is driven by summative assessment, th... Read More about Enabling personalised learning through formative and summative assessment.

Experiencias de enseñanza a estudiantes de informática con discapacidad en Universidades del Reino Unido (2008)
Book Chapter
Tompsett, B. (2008). Experiencias de enseñanza a estudiantes de informática con discapacidad en Universidades del Reino Unido. Tecnologias de la Informacion Y Las Comunicaciones en la Autonomia Personal, Dependencia y Accesibilidad (371 - 398). Fundacion Alfredo Brana Cursos Superiores de Verano en Galicia

El cambio en el entorno legal, social y educativo en el Reino Unido ha resultado en un incremento del número de estudiantes con discapacidad que entran en la enseñanza universitaria. Algunas materias han ido experimentando esta expansión en el número... Read More about Experiencias de enseñanza a estudiantes de informática con discapacidad en Universidades del Reino Unido.

Estimation of end curvatures from planar point data (2007)
Book Chapter
Ma, X., & Cripps, R. J. (2007). Estimation of end curvatures from planar point data. In R. Martin, M. Sabin, & J. Winkler (Eds.), . Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-540-73843-5_19

Given a string of discrete planar points, the estimation of principal curvature vectors using circle fitting and Richardson’s extrapolation principle has been considered by several authors. However, these methods can not be directly applied to end po... Read More about Estimation of end curvatures from planar point data.

Personal internet security (2007)
Book Chapter
(2007). Personal internet security. Personal internet security: 5th report of session 2006-07: Vol. 2 Evidence (438 - 439). HMSO

Evidence for House of Lords Select Committee on Science and Technology investigation into Personal Internet Security

Radiotherapy training tools for yesterday’s future (2007)
Book Chapter
(2007). Radiotherapy training tools for yesterday’s future. Imaging and Oncology (30 - 35). Deeson Group

Radiotherapy techniques have evolved rapidly in recent years. However, the uptake and clinical implementation of novel techniques, such as intensity modulated radiotherapy (IMRT), was slower than was initially anticipated. One of the reasons often gi... Read More about Radiotherapy training tools for yesterday’s future.

Fuzzy geometric object modelling (2007)
Book Chapter
Li, Q., & Guo, S. (2007). Fuzzy geometric object modelling. Advances in Soft Computing; Fuzzy Information and Engineering (551-563). Berlin, Heidelberg: Spinger. https://doi.org/10.1007/978-3-540-71441-5_60

Fuzzy geometric object modelling has been one of the fundamental tasks in computer graphics. In this paper, we investigated and developed techniques for modelling fuzzy objects based on fuzzy set theory. With the proposed techniques any conventional... Read More about Fuzzy geometric object modelling.

A phantom based approach to fluoroscopic navigation for orthopaedic surgery (2004)
Book Chapter
Phillips, R., Mohsen, A., Viant, W., Malek, S., Li, Q., Shah, N., …Sherman, K. (2004). A phantom based approach to fluoroscopic navigation for orthopaedic surgery. In Medical Image Computing and Computer-Assisted Intervention – MICCAI 2004; Lecture Notes in Computer Science (621-628). Springer Verlag. https://doi.org/10.1007/978-3-540-30136-3_76

The use of the C-arm fluoroscope for surgical navigation in various Computer Assisted Orthopaedic Surgery Systems (CAOS) has been an important success of research into CAOS technology. To use the fluoroscope for quantitative surgical navigation invol... Read More about A phantom based approach to fluoroscopic navigation for orthopaedic surgery.

Create and experience compelling scenarios in VR : a hardware and software system architecture
Book Chapter
Springer, J., Cruz-Neira, C., Neumann, C., & Reiners, D. Create and experience compelling scenarios in VR : a hardware and software system architecture.

Today virtual reality (VR) is an established technology in many disciplines. It is used in engineering for design review and development as well as process planning. It is increasingly used in the context of visualizing large and complex data from ma... Read More about Create and experience compelling scenarios in VR : a hardware and software system architecture.