Date


People

Download Available

Dewey Decimal

1389 results

Visual Exploration of Alternative Taxonomies through Concepts

Journal Article
Graham, M., & Kennedy, J. (2007)
Visual Exploration of Alternative Taxonomies through Concepts. Ecological Informatics, 2, 248-261. https://doi.org/10.1016/j.ecoinf.2007.07.004
A graphical user interface is presented that allows users of taxonomic data to explore concept relationships between conflicting but related taxonomic classifications. Ecolog...

HI-risk: A method to analyse health information risk intelligence

Conference Proceeding
Buchanan, W. J., & van Deursen, N. (2016)
HI-risk: A method to analyse health information risk intelligence. In 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom)https://doi.org/10.1109/healthcom.2016.7749536
Information security threat intelligence is a prevalent topic amongst researchers, long-established IT-vendors and start-ups. The possibilities of Big Data analytics to securi...

Soundscape mapping: comparing listening experiences

Thesis
McGregor, I. Soundscape mapping: comparing listening experiences. (Thesis)
Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/4284
The perceived auditory environment is an increasingly important part of people’s everyday interactive experiences. While sound design is an established discipline in media suc...

A Review on Deep Learning Approaches to Image Classification and Object Segmentation

Journal Article
Wu, H., Liu, Q., & Liu, X. (2019)
A Review on Deep Learning Approaches to Image Classification and Object Segmentation. Computers, Materials & Continua, 60(2), 575-597. https://doi.org/10.32604/cmc.2019.03595
Deep learning technology has brought great impetus to artificial intelligence, especially in the fields of image processing, pattern and object recognition in recent years. Pr...

DEEPC: Dynamic Energy Profiling of Components

Conference Proceeding
Liu, X., Chinenyeze, S. J., & Al-Dubai, A. (2016)
DEEPC: Dynamic Energy Profiling of Components. In 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC)https://doi.org/10.1109/COMPSAC.2016.90
Many software projects are built using reusable components (i.e. reusable objects - as per component and connectors in software architectures). During component selection in C...

Ethnography, theory and systems design: from intuition to insight

Journal Article
MACAULAY, C., BENYON, D., & CRERAR, A. (2000)
Ethnography, theory and systems design: from intuition to insight. International Journal of Human-Computer Studies, 53(1), 35-60. https://doi.org/10.1006/ijhc.2000.0376
The idea for this paper came from a debate at the 1998 ISCRAT conference in Denmark on cultural-historical activity theory (CHAT). A leading activist in the movement to bring ...

An Optimized Speculative Execution Strategy Based on Local Data Prediction in a Heterogeneous Hadoop Environment

Conference Proceeding
Liu, X., & Liu, Q. (2017)
An Optimized Speculative Execution Strategy Based on Local Data Prediction in a Heterogeneous Hadoop Environment. In Proceedings of 2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC), (128-131). https://doi.org/10.1109/cse-euc.2017.208
Hadoop is a famous distributed computing framework that is applied to process large-scale data. "Straggling tasks" have a serious impact on Hadoop performance due to imbalance...

Clustering Moving Data with a Modified Immune Algorithm

Conference Proceeding
Hart, E., & Ross, P. (2001)
Clustering Moving Data with a Modified Immune Algorithm. In E. Boers (Ed.), Applications of Evolutionary Computing, 394-403. https://doi.org/10.1007/3-540-45365-2_41
In this paper we present a prototype of a new model for performing clustering in large, non-static databases. Although many machine learning algorithms for data clustering hav...

Mobile Multicast Route Optimisation

Conference Proceeding
Romdhani, I., Munoz, J., Bettahar, H., & Bouabdallah, A. (2006)
Mobile Multicast Route Optimisation. In IEEE International Conference on Communications, 2006. ICC '06, 1977-1983. doi:10.1109/icc.2006.255060
The multiparty nature of multicast applications presents new challenges for Mobile IP users. Unfortunately, when a multicast receiver is mobile, it will experience additional ...

Comparative analysis of chaotic and non-chaotic image encryption schemes

Conference Proceeding
Younas, M. B., & Ahmad, J. (2014)
Comparative analysis of chaotic and non-chaotic image encryption schemes. In 2014 International Conference on Emerging Technologies (ICET)https://doi.org/10.1109/icet.2014.7021021
In modern era, multimedia technologies have been developed significantly. Multimedia data such as audio, video and image transfers over the internet is open and insecure. Secu...