Presentation / Conference
Morgan, A., Deane, A., & Flint, T. (2010, June)
Future Perfect. Paper presented at Create 10
A workshop exploring the process of creating an immersive location based game driven by narrative. The game is specifically designed to be portable with minimal effort to tail...
From Singapore with Nature.
Exhibition / Performance
Supartono, A., Renhui, R. Z., Ang, S. N., Marvin, T., & Woong, S. T. From Singapore with Nature. 28 September 2018 - 27 January 2019)
Supartono, A., Renhui, R. Z., Ang, S. N., Marvin, T., & Woong, S. T. From Singapore with Nature. 28 September 2018 - 27 January 2019
In this year’s Thessaloniki PhotoBiennale 2018, the central exhibition entitled “Capitalist Realism“, which is structured in two large sections, at the Thessaloniki Museum of ...
Performance evaluation of RPL metrics in environments with strained transmission ranges.
Thomson, C., Wadhaj, I., Romdhani, I., & Al-Dubai, A. (2017)
Performance evaluation of RPL metrics in environments with strained transmission ranges. In 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA)https://doi.org/10.1109/aiccsa.2016.7945687
An examination of existing studies in the area of Routing Protocol for Low-Power and Lossy Networks (RPL) implementation in wireless sensor networks (WSNs) reveals a consisten...
Lam, L. (2017)
Shadowplay. (1). London, UK: Pan MacMillan
Micah Grey almost died when he fled the circus with Drystan - now he and the ex-clown seek to outrun disaster. Drystan persuades his old friend Jasper Maske, a once-renowned m...
Public perception of cigarette marketing
Presentation / Conference
Aroean, L., & Tjandra, N. (2018, May)
Public perception of cigarette marketing. Paper presented at 46th Academy of Marketing Science Conference, New Orleans
How do people conceive of an ethically good action? How do people link their perceptual arguments which is compelling? Do people not simply line up reasons for a specific cour...
Cryptographic privacy-preserving enhancement method for investigative data acquisition
Kwecka, Z. (2011)
Cryptographic privacy-preserving enhancement method for investigative data acquisition. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/4437
The current processes involved in the acquisition of investigative data from third parties, such as banks, Internet Service Providers (ISPs) and employers, by the public autho...
Comparison of pattern recognition techniques for the classification of impact acoustic emissions.
Yella, S., Gupta, N. K. & Dougherty, M. S. (2007)
Comparison of pattern recognition techniques for the classification of impact acoustic emissions. Transportation Research Part C: Emerging Technologies. 15, 345-360. doi:10.1016/j.trc.2007.05.004. ISSN 0968-090X
Current day condition monitoring applications involving wood are mostly carried out through visual inspection and if necessary some impact acoustic examination is carried out....
Computopia Revisited: Yoneji Masuda’s Realistic Utopianism
Duff, A., & Ito, Y. (in press)
Computopia Revisited: Yoneji Masuda’s Realistic Utopianism. Keio communication review, 42,
Utopianism has always had a bad press. The whole genre, not least classics such as Thomas More’s Utopia (More, 1516), Robert Owen’s New View of Society (Owen, 1813), and Willi...