Now showing items 78-97 of 119

  • Medical students opinions on the inclusion of non-traditional skills in the curriculum. 

    Brady, Chevonne; Zarb, Mark (Allied Business Academies https://www.abacademies.org/articles/medical-students-opinions-on-the-inclusion-of-nontraditional-skills-in-the-curriculum-7099.html, 2018-04-04)
    BRADY, C. and ZARB, M. 2018. Medical students opinions on the inclusion of non-traditional skills in the curriculum. Journal of entrepreneurship education [online], 21(2), article ID 152. Available from: https://www.abacademies.org/articles/medical-students-opinions-on-the-inclusion-of-nontraditional-skills-in-the-curriculum-7099.html
    Background: Up to 50% of foundation year 2 doctors do not proceed directly into speciality training. This change in direction of our profession places increasing demands on an already stretched NHS. In the UK, medical ...
  • Meeple centred design: a heuristic toolkit for evaluating the accessibility of tabletop games. 

    Heron, Michael James; Belford, Pauline Helen; Reid, Hayley; Crabb, Michael (Springer https://doi.org/10.1007/s40869-018-0057-8, 2018-04-27)
    HERON, M., BELFORD, P.H., REID, H. and CRABB, M. 2018. Meeple centred design: a heuristic toolkit for evaluating the accessibility of tabletop games. The computer games journal [online], 7(2), pages 97-114. Available from: https://doi.org/10.1007/s40869-018-0057-8
    Evaluation of accessibility within a tabletop context is much more complicated than it is within a video game environment. There is a considerable amount of variation in game systems, game mechanisms, and interaction ...
  • Migrating software products to the cloud: an adaptive STS perspective. 

    Werfs, Marc; Baxter, Gordon; Allison, Ian K.; Sommerville, Ian (IIAM (International Information Management Association) http://www.iima.org/index.php?option=com_phocadownload&view=category&download=507:223werfs&id=83:jitim223&Itemid=77, 2013)
    WERFS, M., BAXTER, G., ALLISON, I. K. and SOMMERVILLE, I., 2013. Migrating software products to the cloud: an adaptive STS perspective. Journal of International Technology and Information Management, 22 (3), pp. 37-54.
    Cloud computing, as a disruptive innovation, has the potential to adversely affect companies. The effects can be particularly extreme for small and medium sized enterprises (SMEs). Subsequently, considerations of organisational ...
  • A model for optimising the deployment of cloud-hosted application components for guaranteeing multitenancy isolation. 

    Ochei, Laud Charles; Ejiofor, Christopher Ifeanyichukwu (ASTES Journal https://doi.org/10.25046/aj030220, 2018-03-27)
    OCHEI, L.C. and EJIOFOR, C.I. 2018. A model for optimising the deployment of cloud-hosted application components for guaranteeing multitenancy isolation. Advances in science, technology and engineering systems journal [online], 3(2), pages 174-183. Available from: https://doi.org/10.25046/aj030220
    Tenants associated with a cloud-hosted application seek to reduce running costs and minimize resource consumption by sharing components and resources. However, despite the benefits, sharing resources can affect tenant’s ...
  • Multi-label classification via label correlation and first order feature dependence features in a data stream. 

    Nguyen, Tien Thanh; Nguyen, Thi Thu Thuy; Luong, Anh Vu; Nguyen, Quoc Viet Hung; Liew, Alan Wee-Chung; Stantic, Bela (Elsevier https://doi.org/10.1016/j.patcog.2019.01.007, 2019-01-06)
    NGUYEN, T.T., NGUYEN, T.T.T., LUONG, A.V., NGUYEN, Q.V.H., LIEW, A.W.-C. and STANTIC, B. 2019. Multi-label classification via label correlation and first order feature dependance in a data stream. Pattern recognition [online], 90, pages 35-51. Available from: https://doi.org/10.1016/j.patcog.2019.01.007
    Many batch learning algorithms have been introduced for offline multi-label classification (MLC) over the years. However, the increasing data volume in many applications such as social networks, sensor networks, and traffic ...
  • Multi-source video multicast in internet-connected wireless mesh networks. 

    Tu, Wanqing; Sreenan, Cormac; Jha, Sanjay; Zhang, Qian (IEEE https://doi.org/10.1109/TMC.2017.2691706, 2017-04-06)
    TU, W., SREENAN, C.J., JHA, S. and ZHANG, Q. 2017. Multi-source video multicast in internet-connected wireless mesh networks. IEEE transactions on mobile computing [online], 16(12), pages 3431-3444. Available from: https://doi.org/10.1109/TMC.2017.2691706
    Wireless mesh networks (WMNs) connect to the Internet via access gateways. This paper studies multi-sourcevideo multicast in Internet-connected WMNs. The focus is onthe design of a shareable integrated multicast that allows ...
  • Multiple case study approach to identify aggravating variables of insider threats in information systems. 

    Nicho, Mathew; Kamoun, Faouzi (Association for Information Systems. http://aisel.aisnet.org/cais/vol35/iss1/18, 2014)
    NICHO, M. and KAMOUN, F., 2014. Multiple case study approach to identify aggravating variables of insider threats in information systems. Communications of the Association for Information Systems, Volume 35, Article 18.
    Malicious insiders present a serious threat to information systems due to privilege of access, knowledge of internal computer resources, and potential threats on the part of disgruntled employees or insiders collaborating ...
  • Musings on misconduct: a practitioner reflection on the ethical investigation of plagiarism within programming modules. 

    Heron, Michael James; Belford, Pauline Helen (ACM http://dx.doi.org/10.1145/2874239.2874304, 2015-09-01)
    HERON, M.J. and BELFORD, P. 2015. Musings on misconduct: a practitioner reflection on the ethical investigation of plagiarism within programming modules. ACM SIGCAS computers and society [online], 45(3), pages 438-444. Available from: http://dx.doi.org/10.1145/2874239.2874304
    Tools for algorithmically detecting plagiarism have become very popular, but none of these tools offers an effective and reliable way to identify plagiarism within academic software development. As a result, the identification ...
  • New trends on digitisation of complex engineering drawings. 

    Moreno-García, Carlos Francisco; Elyan, Eyad; Jayne, Chrisina (Springer https://doi.org/10.1007/s00521-018-3583-1, 2018-06-13)
    MORENO-GARCIA, C.F., ELYAN, E. and JAYNE, C. 2018. New trends on digitisation of complex engineering drawings. Neural computing and applications [online], OnlineFirst. Available from: https://doi.org/10.1007/s00521-018-3583-1
    Engineering drawings are commonly used across different industries such as oil and gas, mechanical engineering and others. Digitising these drawings is becoming increasingly important. This is mainly due to the legacy of ...
  • Non-traditional skills in undergraduate medical education: the development of a teaching programme. 

    Brady, Chevonne; Zarb, Mark (Sage https://doi.org/10.1177/0036933018776837, 2018-05-27)
    BRADY, C. and ZARB, M. 2018. Non-traditional skills in undergraduate medical education: the development of a teaching programme. Scottish medical journal [online], 63(3), pages 80-81. Available from: https://doi.org/10.1177/0036933018776837
    As a junior doctor in what is an increasingly struggling healthcare system, I am concerned to see that many of my junior and senior colleagues have opted not to continue onto the next stage of training. Whilst entrepreneurship, ...
  • On the relationship between variational level set-based and SOM-based active contours. 

    Abdelsamea, Mohammed M.; Gnecco, Giorgio; Gaber, Mohamed Medhat; Elyan, Eyad (Hindawi Publishing Corporation. http://dx.doi.org/10.1155/2015/109029, 2015-03)
    ABDELSAMEA, M. M., GNECCO, G., GABER, M. M. and ELYAN, E., 2015. On the relationship between variational level set-based and SOM-based active contours. Computational Intelligence and Neuroscience, Volume 2015, Article ID 109029.
    Most Active Contour Models (ACMs) deal with the image segmentation problem as a functional optimization problem, as they work on dividing an image into several regions by optimizing a suitable functional. Among ACMs, ...
  • The online dissemination of nature-health concepts: lessons from sentiment analysis of social media relating to "Nature-Deficit Disorder". 

    Palomino, Marco; Taylor, Tim; Goker, Ayse; Isaacs, John; Warber, Sara (MDPI https://doi.org/10.3390/ijerph13010142, 2016-01-19)
    PALOMINO, M., TAYLOR, T., GOKER, A., ISAACS, J. and WARBER, S. 2016. The online dissemination of nature-health concepts: lessons from sentiment analysis of social media relating to "Nature-Deficit Disorder". International journal of environmental research and public health [online], 13(1), article number 142. Available from: https://doi.org/10.3390/ijerph13010142.
    Evidence continues to grow supporting the idea that restorative environments, green exercise, and nature-based activities positively impact human health. Nature-deficit disorder, a journalistic term proposed to describe ...
  • Optimal resource allocation in wireless-powered OFDM relay networks. 

    Huang, Gaofei; Tu, Wanqing (Elsevier https://dx.doi.org/10.1016/j.comnet.2016.05.006, 2016-05-11)
    HUANG, G. and TU, W. 2016. Optimal resource allocation in wireless-powered OFDM relay networks. Computer networks [online], 104, pages 94-107. Available from: https://dx.doi.org/10.1016/j.comnet.2016.05.006.
    This paper studies resource allocation in wireless-powered orthogonal-frequency-division multiplexing (OFDM) amplify-and-forward (AF) or decode-and-forward (DF) relay networks with time-switching (TS) based relaying. Our ...
  • Pacman's canon in C#: a quantum interpretation of video game canon. 

    Heron, Michael James (Springer https://doi.org/10.1007/s40869-017-0036-5, 2017-05-22)
    HERON, M. 2017. Pacman's canon in C#: a quantum interpretation of video game canon. The computer games journal [online], 6(3), pages 135-151. Available from: https://doi.org/10.1007/s40869-017-0036-5
    The topic of what constitutes canon with a video game is an under-explored topic in critical discussion. We rely, as a field, on largely intuitive and insubstantial parameters for the elements that we choose to analyse. ...
  • Perceiving and using genre by form - an eye-tracking study. 

    Clark, Malcolm John; Ruthven, Ian; Holt, Patrik (De Gruyter. http://dx.doi.org/10.1515/libr.2010.023, 2010-09)
    CLARK, M., RUTHVEN, I. and HOLT, P. O’B., 2010. Perceiving and using genre by form – an eye-tracking study. Libri, 60 (3), pp. 268-280.
    This paper reports on an approach to the analysis of genre recognition using eye-tracking. The researchers focused on eight different types of e-mail, such as calls for papers, newsletters and spam, which were chosen to ...
  • Power and perception in the scandal in academia. 

    Heron, Michael James; Belford, Pauline Helen (ACM http://dx.doi.org/10.1145/2809957.2809961, 2015-07-30)
    HERON, M.J. and BELFORD, P. 2015. Power and perception in the scandal in academia. ACM SIGCAS computers and society [online], 45(2), pages 11-19. Available from: http://dx.doi.org/10.1145/2809957.2809961
    The Scandal in Academia is a large-scale fictional ethical case study of around 17,000 words and fourteen separate revelations. They are delivered as newspaper extracts from a newspaper reporting on an ongoing crisis at a ...
  • A practitioner reflection on teaching computer ethics with case studies and psychology. 

    Heron, Michael James; Belford, Pauline Helen (Oxford Brookes University http://bejlt.brookes.ac.uk/paper/a-practitioner-reflection-on-teaching-computer-ethics-with-case-studies-and-psychology/, 2015-09-01)
    HERON, M. and BELFORD, P., 2015. A practitioner reflection on teaching computer ethics with case studies and psychology. Brookes eJournal of Learning and Teaching, Vol 7(1).
    Three issues complicate teaching computer ethics in an undergraduate course. The first relates to the often technically intensive knowledge required to fully understand the complexity of real world examples. The second ...
  • A process model for implementing information systems security governance. 

    Nicho, Mathew (Emerald https://doi.org/10.1108/ICS-07-2016-0061, 2018-02-01)
    NICHO, M. 2018. A process model for implementing information systems security governance. Information and computer security [online], 26(1), pages 10-38. Available from: https://doi.org/10.1108/ICS-07-2016-0061
    Purpose: The frequent and increasingly potent cyber-attacks due to lack of an optimal mix of technical as well as non-technical IT controls, has led to increased adoption of security governance controls by organizations. ...
  • (Re)presenting heritage: laser scanning and 3D visualisations for cultural resilience and community engagement. 

    Tait, Elizabeth; Laing, Richard Alexander; Grinnall, Andy; Burnett, Simon M.; Isaacs, John (SAGE https://dx.doi.org/10.1177/0165551516636306, 2016-03-11)
    TAIT, E., LAING, R., GRINNALL, A., BURNETT, S. and ISAACS, J. 2016. (Re)presenting heritage: laser scanning and 3D visualisations for cultural resilience and community engagement. Journal of information science [online], 42(3), pages 420-433. Available from: https://dx.doi.org/10.1177/0165551516636306
    Cultural heritage is increasingly being viewed as an economic asset for geographic areas who aim to capitalise in the surge in interest in local history and heritage tourism from members of the public. Digital technologies ...
  • Real-time relative permeability prediction using deep learning. 

    Arigbe, Ovoke D.; Oyeneyin, Babs; Arana, Ines; Droubi, Mohamad Ghazi (Springer https://doi.org/10.1007/s13202-018-0578-5, 2018-11-24)
    ARIGBE, O.D., OYENEYIN, M.B., ARANA, I. and GHAZI, M.D. 2018. Real-time relative permeability prediction using deep learning. Journal of petroleum exploration and production technologies [online], In Press. Available from: https://doi.org/10.1007/s13202-018-0578-5
    A review of the existing two and three phase relative permeability correlations shows a lot of pitfalls and restrictions imposed by (a) their assumptions (b) generalization ability and (c) difficulty with updating in real ...