Date


Output Type

Download Available

62 results

Fundamental Issues in Mobile Healthcare Information Systems

Journal Article
Shahzad, B., Orgun, M. A., & Thuemmler, C. (2016)
Fundamental Issues in Mobile Healthcare Information Systems. Mobile Information Systems, 2016, 1-2. https://doi.org/10.1155/2016/6504641
Fundamental Issues in Mobile Healthcare Information Systems

Detecting plants on railway embankment.

Journal Article
Nyberg, R., Gupta, N. K., Yella, S., & Dougherty, M. (2013)
Detecting plants on railway embankment. Journal of Software Engineering and Applications, 6, 8-12. https://doi.org/10.4236/jsea.2013.63b003
This paper investigates problems concerning vegetation along railways and proposes automatic means of detecting ground vegetation. Digital images of railway embankments have b...

VIPER: a visualisation tool for exploring inheritance inconsistencies in genotyped pedigrees

Journal Article
Paterson, T., Graham, M., Kennedy, J., & Law, A. (2012)
VIPER: a visualisation tool for exploring inheritance inconsistencies in genotyped pedigrees. BMC Bioinformatics, 13/8, https://doi.org/10.1186/1471-2105-13-S8-S5
Pedigree genotype datasets are used for analysing genetic inheritance and to map genetic markers and traits. Such datasets consist of hundreds of related animals genotyped for...

Ontology-based quality attributes prediction in component-based development

Journal Article
Li, C., Pooley, R., & Liu, X. (2010)
Ontology-based quality attributes prediction in component-based development. International journal of computer science & information technology, 2, 12-29. https://doi.org/10.5121/ijcsit.2010.2502
Despite the success that Component-Based Development (CBD) has achieved so far, component mismatch remains as a big obstacle for wider and smoother component reuse. Mismatch r...

Ant Colony Optimization for Optimal Control of Pumps in Water Distribution Networks

Journal Article
López-Ibáñez, M., Prasad, T. D., & Paechter, B. (2008)
Ant Colony Optimization for Optimal Control of Pumps in Water Distribution Networks. Journal of Water Resources Planning and Management, 134, 337-346. https://doi.org/10.1061/%28ASCE%290733-9496%282008%29134%3A4%28337%29
Reducing energy consumption of water distribution networks has never had more significance than today. The greatest energy savings can be obtained by careful scheduling of ope...

Generative aspect-oriented component adaptation

Journal Article
Feng, Y., Liu, X., Liu, X., Feng, Y., & Kerridge, J. (2008)
Generative aspect-oriented component adaptation. IET Software, 2(2), 149. https://doi.org/10.1049/iet-sen%3A20070049
As a solution to eliminating component mismatches, a generative aspect- oriented approach to component adaptation is presented. The approach enjoys high level of automation an...

How affinity influences tolerance in an idiotypic network.

Journal Article
Hart, E., Bersini, H. & Santos, F. (2007)
How affinity influences tolerance in an idiotypic network. Journal of Theoretical Biology. 249, 422-436. doi:10.1016/j.jtbi.2007.07.019. ISSN 0022-5193
The mutability of bacteriophages offers a particular advantage in the treatment of bacterial infections not afforded by other antimicrobial therapies. When phage-resistant bac...

A digital photographic method for 3D reconstruction of standing tree shape.

Journal Article
Hapca, A. I., Mothe, F., & Leban, J. (2007)
A digital photographic method for 3D reconstruction of standing tree shape. Annals of Forest Science, 64(6), 631-637. https://doi.org/10.1051/forest%3A2007041
A digital photographic method is presented which is able to reconstruct the profile of the stem on standing trees up to a height of 12 m and to provide a fine level of detail....

NetHost-Sensor: Investigating the capture of end-to-end encrypted intrusive data

Journal Article
Buchanan, W., Munoz, J., Abimbola, A., Abimbola, A., Munoz, J., & Buchanan, W. J. (2006)
NetHost-Sensor: Investigating the capture of end-to-end encrypted intrusive data. Computers and Security, 25(6), 445-451. doi:10.1016/j.cose.2006.04.001
Intrusion Detection Systems (IDSs) are systems that protect against violation of data integrity, confidentiality and availability of resources. In the past 20 years, these sys...

A standard data model representation for taxonomic information.

Journal Article
Kennedy, J., Hyam, R., Kukla, R., & Paterson, T. (2006)
A standard data model representation for taxonomic information. OMICS, 10, 220-230. doi:10.1089/omi.2006.10.220
The names used by biologists to label the observations they make are imprecise. This is an issue as workers increasingly seek to exploit data gathered from multiple, unrelated...