Skip to main content

Research Repository

Advanced Search

All Outputs (54)

Collaborative hybrid agent provision of learner needs using ontology based semantic technology (2017)
Journal Article
Brayshaw, M., Nganji, J., & Gordon, N. (2017). Collaborative hybrid agent provision of learner needs using ontology based semantic technology. Lecture notes in computer science, 10296 LNCS, 341-351. https://doi.org/10.1007/978-3-319-58515-4_27

© Springer International Publishing AG 2017. This paper describes the use of Intelligent Agents and Ontologies to implement knowledge navigation and learner choice when interacting with complex information locations. The paper is in two parts: the fi... Read More about Collaborative hybrid agent provision of learner needs using ontology based semantic technology.

Flexible virtual environments: Gamifying immersive learning (2017)
Journal Article
Gordon, N., & Brayshaw, M. (2017). Flexible virtual environments: Gamifying immersive learning. Communications in computer and information science, 714, 115-121. https://doi.org/10.1007/978-3-319-58753-0_18

© Springer International Publishing AG 2017. The availability of Virtual Reality (VR) and Virtual Environment (VE) equipment - with the launch of domestic technologies such as the Oculus Rift, Microsoft Hololens and Sony Playstation VR) - offer new w... Read More about Flexible virtual environments: Gamifying immersive learning.

Computational methods for finding long simple cycles in complex networks (2017)
Journal Article
Chalupa, D., Balaghan, P., Hawick, K. A., & Gordon, N. A. (2017). Computational methods for finding long simple cycles in complex networks. Knowledge-Based Systems, 125, 96-107. https://doi.org/10.1016/j.knosys.2017.03.022

© 2017 Elsevier B.V. Detection of long simple cycles in real-world complex networks finds many applications in layout algorithms, information flow modelling, as well as in bioinformatics. In this paper, we propose two computational methods for findin... Read More about Computational methods for finding long simple cycles in complex networks.

Flexible learning in computer science (2016)
Journal Article
Gordon, N. A. (2016). Flexible learning in computer science. New Directions in the Teaching of Physical Sciences, 11(1), https://doi.org/10.29311/ndtps.v0i11.575

This paper outlines the concept of Flexible Pedagogy and how it can assist in addressing some of the issues facing STEM disciplines in general, and Computer Science in particular. The paper considers what flexible pedagogy is and how technologies dev... Read More about Flexible learning in computer science.

Heuristic Evaluation for Serious Immersive Games and M-instruction (2016)
Journal Article
Brayshaw, M., Gordon, N., & Aljaber, T. (2016). Heuristic Evaluation for Serious Immersive Games and M-instruction. Lecture notes in computer science, 9753, 310-319. https://doi.org/10.1007/978-3-319-39483-1_29

© Springer International Publishing Switzerland 2016. Two fast growing areas for technology-enhanced learning are serious games and mobile instruction (M-instruction or M-Learning). Serious games are ones that are meant to be more than just entertain... Read More about Heuristic Evaluation for Serious Immersive Games and M-instruction.

A safety analysis approach to clinical workflows : application and evaluation (2014)
Journal Article
Gordon, N., Kabir, S., Sharvia, S., Walker, M., & Al-Qora’n, L. (in press). A safety analysis approach to clinical workflows : application and evaluation. International Journal of Advanced Computer Science and Applications, 4(3), 82-91. https://doi.org/10.14569/SpecialIssue.2014.040310

Clinical workflows are safety critical workflows as they have the potential to cause harm or death to patients. Their safety needs to be considered as early as possible in the development process. Effective safety analysis methods are required to ens... Read More about A safety analysis approach to clinical workflows : application and evaluation.

Investigating heuristic evaluation as a methodology for evaluating pedagogical software: An analysis employing three case studies (2014)
Journal Article
Nganji, J., Brayshaw, M., Gordon, N., Butterfield, A., & Wen, L. (2014). Investigating heuristic evaluation as a methodology for evaluating pedagogical software: An analysis employing three case studies. Lecture notes in computer science, 8523 LNCS(PART 1), 25-35. https://doi.org/10.1007/978-3-319-07482-5_3

This paper looks specifically at how to develop light weight methods of evaluating pedagogically motivated software. Whilst we value traditional usability testing methods this paper will look at how Heuristic Evaluation can be used as both a driving... Read More about Investigating heuristic evaluation as a methodology for evaluating pedagogical software: An analysis employing three case studies.

An approach to safety analysis of clinical workflows (2014)
Journal Article
Al-Qora'n, L., Gordon, N., Sharvia, S., Walker, M., & Papadopoulos, Y. (2014). An approach to safety analysis of clinical workflows. Athens Journal of Health, 1(3), 201-216. https://doi.org/10.30958/ajh.1-3-4

A clinical workflow considers the information and processes that are involved in providing a clinical service. They are safety critical since even minor faults have the potential to propagate and consequently cause harm to a patient, or even for a pa... Read More about An approach to safety analysis of clinical workflows.

Using simulation to evaluate dynamic systems with weibull or lognormal distributions (2014)
Journal Article
Edifor, E., Gordon, N., Walker, M., & Papadopoulos, Y. (2014). Using simulation to evaluate dynamic systems with weibull or lognormal distributions. Advances in Intelligent Systems and Computing, 286, 117-187. https://doi.org/10.1007/978-3-319-07013-1_17

© Springer International Publishing Switzerland 2014. Most techniques for quantitatively analysing the temporal fault trees of safety-critical systems are used with the assumption that the systems under study have exponentially distributed component... Read More about Using simulation to evaluate dynamic systems with weibull or lognormal distributions.

Quantification of temporal fault trees based on fuzzy set theory (2014)
Journal Article
Kabir, S., Edifor, E., Walker, M., & Gordon, N. (2014). Quantification of temporal fault trees based on fuzzy set theory. Advances in Intelligent Systems and Computing, 286, 255-264. https://doi.org/10.1007/978-3-319-07013-1_24

© Springer International Publishing Switzerland 2014. Fault tree analysis (FTA) has been modified in different ways to make it capable of performing quantitative and qualitative safety analysis with temporal gates, thereby overcoming its limitation i... Read More about Quantification of temporal fault trees based on fuzzy set theory.

Quantification of Simultaneous-AND Gates in Temporal Fault Trees (2013)
Journal Article
Edifor, E., Walker, M., & Gordon, N. (2013). Quantification of Simultaneous-AND Gates in Temporal Fault Trees. Advances in Intelligent Systems and Computing, 224, 141-151. https://doi.org/10.1007/978-3-319-00945-2_13

Fault Tree Analysis has been a cornerstone of safety-critical systems for many years. It has seen various extensions to enable it to analyse dynamic behaviours exhibited by modern systems with redundant components. However, none of these extended FTA... Read More about Quantification of Simultaneous-AND Gates in Temporal Fault Trees.

Maximising gain for minimal pain: Utilising natural game mechanics (2013)
Journal Article
Gordon, N., Brayshaw, M., & Grey, S. (2013). Maximising gain for minimal pain: Utilising natural game mechanics. Innovation in teaching and learning in information and computer sciences, 12(1), 27-38. https://doi.org/10.11120/ital.2013.00004

This paper considers the application of natural games mechanics within higher education as a vehicle to encourage student engagement and achievement of desired learning outcomes. It concludes with desiderata of features for a learning environment whe... Read More about Maximising gain for minimal pain: Utilising natural game mechanics.

Tetrads of lines spanning PG(7,2) (2013)
Journal Article
Shaw, R., Gordon, N., & Havlicek, H. (2013). Tetrads of lines spanning PG(7,2). Bulletin of the Belgian Mathematical Society, Simon Stevin, 20(4), 735-752. https://doi.org/10.36045/bbms/1382448192

Our starting point is a very simple one, namely that of a set L₄ of four mutually skew lines in PG(7,2). Under the natural action of the stabilizer group G(L₄)

Quantification of priority-OR gates in temporal fault trees (2012)
Journal Article
Edifor, E., Walker, M., & Gordon, N. (2012). Quantification of priority-OR gates in temporal fault trees. Lecture notes in computer science, 7612 LNCS, 99-110. https://doi.org/10.1007/978-3-642-33678-2_9

Fault Tree Analysis has been used in reliability engineering for many decades and has seen various modifications to enable it to analyse fault trees with dynamic and temporal gates so it can incorporate sequential failure in its analysis. Pandora is... Read More about Quantification of priority-OR gates in temporal fault trees.

Activating cognitive activities among students through the application of WebPA in teaching knowledge on mathematical operations in upper secondary schools of Vietnam (2012)
Journal Article
Nguyen, T., & Gordon, N. (2012). Activating cognitive activities among students through the application of WebPA in teaching knowledge on mathematical operations in upper secondary schools of Vietnam

In Vietnam, the inspection and evaluation in education is usually performed by traditional assessments, including regular testing and periodic examination. The biggest advantage of these assessments are that they are easy to deploy and fairly accurat... Read More about Activating cognitive activities among students through the application of WebPA in teaching knowledge on mathematical operations in upper secondary schools of Vietnam.

Personalized content provision for virtual learning environments via the semantic web (2012)
Journal Article
Wen, L., Brayshaw, M., & Gordon, N. (2012). Personalized content provision for virtual learning environments via the semantic web. Innovation in teaching and learning in information and computer sciences, 11(1), 14-26. https://doi.org/10.11120/ital.2012.11010014

In this paper we discuss how we may personalize e-learning along three distinct axes, namely: teaching and learning pedagogical philosophies, personalized educational processes to taste and the coordination of these processes during execution. In doi... Read More about Personalized content provision for virtual learning environments via the semantic web.

Aspects of the Segre variety S1,1,1(2) (2011)
Journal Article
Shaw, R., Gordon, N., & Havlicek, H. (2012). Aspects of the Segre variety S1,1,1(2). Designs, codes, and cryptography, 62(2), 225-239. https://doi.org/10.1007/s10623-011-9508-y

We consider various aspects of the Segre variety S := S_{1,1,1}(2) in PG(7,2), whose stabilizer group G_S < GL(8, 2) has the structure N {\rtimes} Sym(3), where N := GL(2,2)\times GL(2,2)\times GL(2,2). In particular we prove that S determines a dist... Read More about Aspects of the Segre variety S1,1,1(2).

Education for sustainable development in computer science (2010)
Journal Article
Gordon, N. (2010). Education for sustainable development in computer science. Innovation in teaching and learning in information and computer sciences, 9(2), 1-6. https://doi.org/10.11120/ital.2010.09020003

In this paper we will consider some of the aspects related to the teaching of sustainable development within the Higher Education computing curriculum - including students' views on the relevance of this to their education, grounded on the outcome fr... Read More about Education for sustainable development in computer science.

The cubic Segre variety in PG(5,2) (2008)
Journal Article
Shaw, R., & Gordon, N. A. (2009). The cubic Segre variety in PG(5,2). Designs, codes, and cryptography, 51(2), 141-156. https://doi.org/10.1007/s10623-008-9250-2

The Segre variety S 1,2 in PG(5, 2) is a 21-set of points which is shown to have a cubic equation Q(x) = 0. If T(x, y, z) denotes the alternating trilinear form obtained by completely polarizing the cubic polynomial Q, then the associate U # of an r-... Read More about The cubic Segre variety in PG(5,2).

The polynomial degree of the Grassmannian G1,n,2 (2006)
Journal Article
Shaw, R., & Gordon, N. A. (2006). The polynomial degree of the Grassmannian G1,n,2. Designs, codes, and cryptography, 39(2), 289-306. https://doi.org/10.1007/s10623-005-4524-4

For a subset ψ of PG(N, 2) a known result states that ψ has polynomial degree ≤ r, r ≤ N, if and only if ψ intersects every r-flat of PG(N, 2) in an odd number of points. Certain refinements of this result are considered, and are then applied in the... Read More about The polynomial degree of the Grassmannian G1,n,2.