Skip to main content

Research Repository

Advanced Search

All Outputs (41)

Safety Analysis of a Remote Patient Monitoring System with a Guideline Based Decision Support (2013)
Book Chapter
Al-Qora'n, L., Sharvia, S., Papadopoulos, Y., & Gordon, N. (2013). Safety Analysis of a Remote Patient Monitoring System with a Guideline Based Decision Support. Global Telemedicine and eHealth Updates: Knowledge Resources (527 - 531). International Society for Telemedicine & eHealth

Home Telehealth systems are used to help in the management of chronic conditions by patients themselves. Effective safety analysis tools are needed to ensure reliability and safety of these high risk systems. We hereby explain how Hierarchically-Perf... Read More about Safety Analysis of a Remote Patient Monitoring System with a Guideline Based Decision Support.

IBA: Intelligent bug algorithm – a novel strategy to navigate mobile robots autonomously (2013)
Book Chapter
Zohaib, M., Pasha, S. M., Javaid, N., & Iqbal, J. (2013). IBA: Intelligent bug algorithm – a novel strategy to navigate mobile robots autonomously. In F. K. Shaikh, B. S. Chowdhry, S. Zeadally, D. M. A. Hussain, A. A. Memon, & M. A. Uqaili (Eds.), Communication Technologies, Information Security and Sustainable Development (291-299). Cham: Springer Verlag. https://doi.org/10.1007/978-3-319-10987-9_27

This research proposes an intelligent obstacle avoidance algorithm to navigate an autonomous mobile robot. The presented Intelligent Bug Algorithm (IBA) over performs and reaches the goal in relatively less time as compared to existing Bug algorithms... Read More about IBA: Intelligent bug algorithm – a novel strategy to navigate mobile robots autonomously.

Designing personalised learning resources for disabled students using an ontology-driven community of agents (2012)
Book Chapter
Nganji, J. T., & Brayshaw, M. (2012). Designing personalised learning resources for disabled students using an ontology-driven community of agents. In P. Isaias, & M. Baptista Nunes (Eds.), Information systems research and exploring social artifacts: approaches and methodologies (81-102). IGI Global. https://doi.org/10.4018/978-1-4666-2491-7.ch005

The exploration of social artifacts for the disabled is an important and timely issue. The affordances of new technologies like the Semantic Web allow more intelligent handling of educational learning resources that open up the potential of personali... Read More about Designing personalised learning resources for disabled students using an ontology-driven community of agents.

Integrated application of compositional and behavioural safety analysis (2011)
Book Chapter
Sharvia, S., & Papadopoulos, Y. (2011). Integrated application of compositional and behavioural safety analysis. In W. Zamojski, J. Kacprzyk, J. Mazurkiewicz, J. Sugier, & T. Walkowiak (Eds.), Dependable Computer Systems (179-192). Berlin: Springer. https://doi.org/10.1007/978-3-642-21393-9_14

The design complexity of modern safety critical systems presents various challenges for its safety assessment process. In recent years, Model-Based Safety Analysis (MBSA) has been proposed to achieve more-robust and effective safety assessment techni... Read More about Integrated application of compositional and behavioural safety analysis.

Ethical dilemmas in teaching computer and internet security (2010)
Book Chapter
Tompsett, B. (2010). Ethical dilemmas in teaching computer and internet security. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; Information Security and Digital Forensics (76-81). Springer-Verlag. https://doi.org/10.1007/978-3-642-11530-1_9

This paper could be subtitled "Are we teaching the next generation of computer criminals and internet terrorists"? This issue was raised by the Security Services as part of the collaborative network meeting in the area of IT Forensics and Data Analys... Read More about Ethical dilemmas in teaching computer and internet security.

E-services and the digital divide: The role of tertiary education in improving public engagement and trust in e-delivery of services (2010)
Book Chapter
Gordon, N. A. (2010). E-services and the digital divide: The role of tertiary education in improving public engagement and trust in e-delivery of services. Handbook of Research on E-Services in the Public Sector: E-Government Strategies and Advancements (244-250). Information Science Reference. https://doi.org/10.4018/978-1-61520-789-3.ch019

This chapter considers aspects relating to the role of tertiary (i.e. higher) education in improving the engagement of the public with government provided E-services. Some of the issues considered include those of tackling the digital divide - which... Read More about E-services and the digital divide: The role of tertiary education in improving public engagement and trust in e-delivery of services.

Extending HiP-HOPS with Capabilities of Planning Preventative Maintenance (2010)
Book Chapter
Parker, D., & Papadopoulos, Y. (2010). Extending HiP-HOPS with Capabilities of Planning Preventative Maintenance. In M. Sarrafzadeh, & P. Petratos (Eds.), Strategic Advantage of Computing Information Systems in Enterprise Management (231 - 245). ATINER

An effective preventive maintenance (PM) policy for components of an engineering system slows down the rate at which component fatigue accumulates, thereby minimising the occurrence of component failure. The benefit of PM at system level is improveme... Read More about Extending HiP-HOPS with Capabilities of Planning Preventative Maintenance.

Spiking neurons and synaptic stimuli: Neural response comparison using coincidence-factor (2009)
Book Chapter
Sarangdhar, M., & Kambhampati, C. (2009). Spiking neurons and synaptic stimuli: Neural response comparison using coincidence-factor. In S. Ao, & L. Gelman (Eds.), Lecture Notes in Electrical Engineering; Advances in Electrical Engineering and Computational Science (681-692). Springer Verlag. https://doi.org/10.1007/978-90-481-2311-7_58

In this chapter, neural responses are generated by changing the Inter-Spike-Interval (ISI) of the stimulus. These responses are subsequently compared and a coincidence factor is obtained. Coincidence-factor, a measure of similarity, is expected to ge... Read More about Spiking neurons and synaptic stimuli: Neural response comparison using coincidence-factor.

Generating and verifying risk prediction models using data mining (2009)
Book Chapter
Davis, D. N., & Nguyen, T. T. (2009). Generating and verifying risk prediction models using data mining. In P. Berka, J. Rauch, & D. Abdelkader Zighed (Eds.), Data mining and medical knowledge management: cases and applications (181-205). Hershey, Pa.: IGI Global. https://doi.org/10.4018/978-1-60566-218-3.ch009

Risk prediction models are of great interest to clinicians. They offer an explicit and repeatable means to aide the selection, from a general medical population, those patients that require a referral to medical consultants and specialists. In many m... Read More about Generating and verifying risk prediction models using data mining.

Enabling personalised learning through formative and summative assessment (2009)
Book Chapter
Gordon, N. A. (2009). Enabling personalised learning through formative and summative assessment. Technology-Supported Environments for Personalized Learning: Methods and Case Studies (268-284). Information Science Publishing. https://doi.org/10.4018/978-1-60566-884-0.ch015

This chapter considers some ways in which personalised learning can potentially be delivered by means of appropriate assessment and the use of associated technologies. Recognising that for many students, learning is driven by summative assessment, th... Read More about Enabling personalised learning through formative and summative assessment.

Experiencias de enseñanza a estudiantes de informática con discapacidad en Universidades del Reino Unido (2008)
Book Chapter
Tompsett, B. (2008). Experiencias de enseñanza a estudiantes de informática con discapacidad en Universidades del Reino Unido. Tecnologias de la Informacion Y Las Comunicaciones en la Autonomia Personal, Dependencia y Accesibilidad (371 - 398). Fundacion Alfredo Brana Cursos Superiores de Verano en Galicia

El cambio en el entorno legal, social y educativo en el Reino Unido ha resultado en un incremento del número de estudiantes con discapacidad que entran en la enseñanza universitaria. Algunas materias han ido experimentando esta expansión en el número... Read More about Experiencias de enseñanza a estudiantes de informática con discapacidad en Universidades del Reino Unido.

Estimation of end curvatures from planar point data (2007)
Book Chapter
Ma, X., & Cripps, R. J. (2007). Estimation of end curvatures from planar point data. In R. Martin, M. Sabin, & J. Winkler (Eds.), . Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-540-73843-5_19

Given a string of discrete planar points, the estimation of principal curvature vectors using circle fitting and Richardson’s extrapolation principle has been considered by several authors. However, these methods can not be directly applied to end po... Read More about Estimation of end curvatures from planar point data.

Personal internet security (2007)
Book Chapter
(2007). Personal internet security. Personal internet security: 5th report of session 2006-07: Vol. 2 Evidence (438 - 439). HMSO

Evidence for House of Lords Select Committee on Science and Technology investigation into Personal Internet Security

Fuzzy geometric object modelling (2007)
Book Chapter
Li, Q., & Guo, S. (2007). Fuzzy geometric object modelling. Advances in Soft Computing; Fuzzy Information and Engineering (551-563). Berlin, Heidelberg: Spinger. https://doi.org/10.1007/978-3-540-71441-5_60

Fuzzy geometric object modelling has been one of the fundamental tasks in computer graphics. In this paper, we investigated and developed techniques for modelling fuzzy objects based on fuzzy set theory. With the proposed techniques any conventional... Read More about Fuzzy geometric object modelling.

Radiotherapy training tools for yesterday’s future (2007)
Book Chapter
(2007). Radiotherapy training tools for yesterday’s future. Imaging and Oncology (30 - 35). Deeson Group

Radiotherapy techniques have evolved rapidly in recent years. However, the uptake and clinical implementation of novel techniques, such as intensity modulated radiotherapy (IMRT), was slower than was initially anticipated. One of the reasons often gi... Read More about Radiotherapy training tools for yesterday’s future.

A phantom based approach to fluoroscopic navigation for orthopaedic surgery (2004)
Book Chapter
Phillips, R., Mohsen, A., Viant, W., Malek, S., Li, Q., Shah, N., …Sherman, K. (2004). A phantom based approach to fluoroscopic navigation for orthopaedic surgery. In Medical Image Computing and Computer-Assisted Intervention – MICCAI 2004; Lecture Notes in Computer Science (621-628). Springer Verlag. https://doi.org/10.1007/978-3-540-30136-3_76

The use of the C-arm fluoroscope for surgical navigation in various Computer Assisted Orthopaedic Surgery Systems (CAOS) has been an important success of research into CAOS technology. To use the fluoroscope for quantitative surgical navigation invol... Read More about A phantom based approach to fluoroscopic navigation for orthopaedic surgery.