Using a conceptual data language to describe a database and its interface.
Mitchell, K., Kennedy, J., & Barclay, P. J. (1995)
Using a conceptual data language to describe a database and its interface. In C. Goble, & J. Keane (Eds.), Advances in Databases: Proceedings [of the] 13th British National Conference on Database - BNCOD13, 1995, 101-119. doi:10.1007/BFb0000543
We propose a conceptual approach to defining interfaces to databases which uses the features of a fully object oriented data language to specify interface objects combined wit...
Using an evolutionary algorithm to discover low CO2 tours within a Travelling Salesman Problem
Urquhart, N. B., Scott, C., & Hart, E. (2010)
Using an evolutionary algorithm to discover low CO2 tours within a Travelling Salesman Problem. In C. Chio, A. Brabazon, G. A. Di Caro, M. Ebner, M. Farooq, A. Fink, …N. Urquhart (Eds.), Applications of evolutionary computation : EvoApplications 2010: EvoCOMNET, EvoENVIRONMENT, EvoFIN, EvoMUSART, and EvoTRANSLOG, Istanbul, Turkey, April 7-9, 2010, Proceedings, Part II, (421-430). https://doi.org/10.1007/978-3-642-12242-2_43
This paper examines the issues surrounding the effects of using vehicle emissions as the fitness criteria when solving routing problems using evolutionary techniques. The case...
Using a persistent system to construct a customised interface to an ecological db.
Barclay, P. J., Fraser, C., & Kennedy, J. (1993)
Using a persistent system to construct a customised interface to an ecological db. In R. Cooper (Ed.), Interfaces to Database Systems: Proceedings of the First International Workshop on Interfaces to Database Systems (IDS92), Glasgow, 1-3 July 1992, 225-243
New applications of information technology have increasingly sophisticated user interface requirements. Such interfaces are sometimes highly application specific and therefore...
Using the blended spaces framework to design heritage stories with schoolchildren.
O'Keefe, B., & Benyon, D. (2015)
Using the blended spaces framework to design heritage stories with schoolchildren. International Journal of Child-Computer Interaction, 6, 7-16. https://doi.org/10.1016/j.ijcci.2016.02.001
Blended spaces are spaces where a physical space is deliberately integrated in a close-knit way with a digital space. Blended spaces may take the form of a carefully designed ...
Using graphical information systems to improve vehicle routing problem instances.
Urquhart, N. B., Scott, C., & Hart, E. (2013)
Using graphical information systems to improve vehicle routing problem instances. In C. Blum (Ed.), GECCO'13 Companion, (1097-1102). https://doi.org/10.1145/2464576.2466802
This paper makes the assertion that vehicle routing rearch has produced increasingly more powerful problem solvers, but has not increased the realism or compexity of typical p...
Using ICT to Supporting Course Developers, Tutors, and Students of Scottish Gaelic.
Presentation / Conference
Lawson, A., Mikuta, P., & Cruickshank, P. (2013, September)
Using ICT to Supporting Course Developers, Tutors, and Students of Scottish Gaelic. Poster presented at EUROCALL, University of Évora
This research and development is aimed at learners, tutors and course developers of Scottish Gaelic. The method of teaching Gaelic being used initially with the system is Ùlpa...
Enhancing Big Data Security with Collaborative Intrusion Detection
Tan, Z., Nagar, U. T., He, X., Nanda, P., Liu, R. P., Wang, S., & Hu, J. (2014)
Enhancing Big Data Security with Collaborative Intrusion Detection. IEEE cloud computing, 1(3), 27-33. https://doi.org/10.1109/mcc.2014.53
Big data, often stored in cloud networks, is changing our business models and applications. Rich information residing in big data is driving business decision making to be a d...
Detection of Denial-of-Service Attacks Based on Computer Vision Techniques
Tan, Z., Jamdagni, A., He, X., Nanda, P., Liu, R. P., & Hu, J. (2015)
Detection of Denial-of-Service Attacks Based on Computer Vision Techniques. IEEE Transactions on Computers, 64(9), 2519-2533. https://doi.org/10.1109/tc.2014.2375218
Detection of Denial-of-Service (DoS) attacks has attracted researchers since 1990s. A variety of detection systems has been proposed to achieve this task. Unlike the existing ...
Improving cloud network security using the Tree-Rule firewall
He, X., Chomsiri, T., Nanda, P., & Tan, Z. (2014)
Improving cloud network security using the Tree-Rule firewall. Future Generation Computer Systems, 30, 116-126. https://doi.org/10.1016/j.future.2013.06.024
This study proposes a new model of firewall called the ‘Tree-Rule Firewall’, which offers various benefits and is applicable for large networks such as ‘cloud’ networks. The r...
Hybrid Tree-rule Firewall for High Speed Data Transmission
Chomsiri, T., He, X., Nanda, P., & Tan, Z. (2016)
Hybrid Tree-rule Firewall for High Speed Data Transmission. IEEE transactions on cloud computing, 1-1. https://doi.org/10.1109/tcc.2016.2554548
Traditional firewalls employ listed rules in both configuration and process phases to regulate network traffic. However, configuring a firewall with listed rules may create ru...