Items where Subject is "Q Science > QA Mathematics > QA76 Computer software"

Up a level
Export as [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creators | Item Type
Jump to: A | B | F | G | H | I | J | L | M | N | O | P | R | S | T | U | W | X | Y | Z
Number of items at this level: 51.

A

Abdul Kadir, Nur Fasihah, Abd Razak, Shukor and Chizari, Hassan (2016) Identification of fragmented JPEG files in the absence of file systems. In: 2015 IEEE Conference on Open Systems (ICOS), 24-26 Aug. 2015, Bandar Melaka, Malaysia.

Ajaj, Shaban Al-Furgani (2012) Improving Patient Confidentiality Systems in Libya using UK Experience. PhD thesis, University of Gloucestershire.

Akeel, Hosian (2013) Evaluation of Information Systems Deployment in Libyan Oil Companies: Towards an Assessment Framework. PhD thesis, University of Gloucestershire.

Al-Majeed, Salah, Al-Mejibli, Intisar S. and Karam, Jalal (2015) Home telehealth by Internet of Things (IoT). In: 2015 IEEE 28th Canadian Conference on Electrical and Computer Engineering (CCECE), 3-6 May, Halifax, NS, Canada.

Al-Majeed, Salah, Askar, Shavan K. and Fleury, Martin (2015) H.265 Codec over 4G Networks for Telemedicine System Application. In: 2014 UKSim-AMSS 16th International Conference on Computer Modelling and Simulation, 26-28 March, Cambridge, UK.

Al-Majeed, Salah and Fleury, Martin (2015) Dual Handover vs. QoS for Real Time Broadband Video Streaming over WiMAX Networks. In: 2014 UKSim-AMSS 16th International Conference on Computer Modelling and Simulation, 26-28 March, Cambridge, UK.

Alam, Abu S. (2015) A Programming System for End-user Functional Programming. PhD thesis, University of Gloucestershire.

Ali Mirza, Qublai Khan, Mohi-Ud-Din, Ghulam and Awan, Irfan (2016) A Cloud-Based Energy Efficient System for Enhancing the Detection and Prevention of Modern Malware. In: 2016 IEEE 30th International Conference on Advanced Information Networking and Applications, 23-25 March 2016, Crans-Montana, Switzerland.

B

Bakeer, Ali (2017) A New model for E-business Deployment in Libyan Public Universities. PhD thesis, University of Gloucestershire.

Barbosa, Luis S., Petrenko, Alexander K., Cerone, Antonio and Shaikh, Siraj A (2010) Certification of opensource software A role for formal methods? International Journal of Computer Systems Science Engineering, 25 (4 SRC). pp. 273-281.

Bhat, M. and Olszewska, Joanna Isabelle (2014) DALES: Automated Tool for Detection, Annotation, Labelling and Segmentation of Multiple Objects in Multi-Camera Video Streams. In: Proceedings of the 25th International Conference on Computational Linguistics, August 23-29 2014, Dublin. (Unpublished)

F

Forti, Yousef, Bechkoum, Kamal, Turner, Scott and Ajit, Suraj (2014) The adoption of e-government in Arab Countries - The case of Libya. In: Proceedings of the 14th European Conference on e-Government: ECEG 2014. Academic Conferences International Publishing (ACIP), Reading, pp. 319-327. ISBN 9781909507364

G

Ghoreishi, Seyed-Mohsen, Abd Razak, Shukor, Isnin, Ismail Fauzi and Chizari, Hassan (2015) New secure identity-based and certificateless authenticated Key Agreement protocols without pairings. In: 2014 International Symposium on Biometrics and Security Technologies (ISBAST), 26-27 Aug. 2014, Kuala Lumpur, Malaysia.

Ghoreishi, Seyed-Mohsen, Abd Razak, Shukor, Isnin, Ismail Fauzi and Chizari, Hassan (2015) Rushing attack against routing protocols in Mobile Ad-Hoc Networks. In: 2014 International Symposium on Biometrics and Security Technologies (ISBAST), 26-27 Aug. 2014, Kuala Lumpur, Malaysia.

Ghoreishi, Seyed-Mohsen, Abd Razak, Shukor, Isnin, Ismail Fauzi and Chizari, Hassan (2015) Security evaluation over lightweight cryptographic protocols. In: 2014 International Symposium on Biometrics and Security Technologies (ISBAST), 26-27 Aug. 2014, Kuala Lumpur, Malaysia.

Ghoreishi, Seyed-Mohsen, Isnin, Ismail Fauzi, Abd Razak, Shukor and Chizari, Hassan (2015) Secure and Authenticated Key Agreement protocol with minimal complexity of operations in the context of identity-based cryptosystems. In: IEEE 2015 International Conference on Computer, Communication, and Control Technology (I4CT 2015), 21-23 April 2015, Kuching, Sarawak, Malaysia.

Goodenough, Anne E and Goodenough, Andrew S. (2011) Development of a Rapid and Precise Method of Digital Image Analysis to Quantify Canopy Density and Structural Complexity. ISRN Ecology, 2012. pp. 1-11. ISSN 2090-4622

Goodenough, Anne E, Hart, Adam G and Stafford, Richard (2012) Regression with Empirical Variable Selection: Description of a New Method and Application to Ecological Datasets. PLoS ONE, 7 (3). e34338. ISSN 1932-6203

H

Huang, Jun, Zhou, Zude, Liu, Mingyao, Zhang, Erlong, Chen, Ming, Pham, Duc Truong and Ji, Chunqian (2015) Real-time measurement of temperature field in heavy-duty machine tools using fiber Bragg grating sensors and analysis of thermal shift errors. Mechatronics, 31. pp. 16-21. ISSN 09574158

I

Ikram, Ahsan, Anjum, Ashiq and Bessis, Nik (2015) A cloud resource management model for the creation and orchestration of social communities. Simulation Modelling Practice and Theory, 50. pp. 130-150. ISSN 1569-190X

J

Jensen, Maggie (2014) DigiKnow: Using Google Sites. [Teaching Resource] (Unpublished)

Jensen, Maggie (2014) DigiKnow: Windows Movie Maker. [Teaching Resource] (Unpublished)

L

Liu, Quan, Yan, Junwei, Pham, Duc Truong, Zhou, Zude, Xu, Wenjun, Wei, Qing and Ji, Chunqian (2016) Identification and optimal selection of temperature-sensitive measuring points of thermal error compensation on a heavy-duty machine tool. International Journal of Advanced Manufacturing Technology, 85 (1). pp. 345-353. ISSN 0268-3768

Lu, Jisheng (2015) SVG 3D Graphical Presentation for Web-based Applications. PhD thesis, University of Gloucestershire.

M

Mahler, Michael (2014) A new framework for supporting and managing multi-disciplinary system-simulation in a PLM environment. PhD thesis, University of Gloucestershire.

Mason, Carol Ann (2002) Towards a general model for the design of virtual reality learning environments. PhD thesis, University of Gloucestershire.

N

Namanya, Anitta Patience, Ali Mirza, Qublai Khan, Al-Mohannadi, Hamad, Awan, Irfan U. and Disso, Jules Ferdinand Pagna (2016) Detection of Malicious Portable Executables Using Evidence Combinational Theory with Fuzzy Hashing. In: 2016 IEEE 4th International Conference on Future Internet of Things and Cloud, 22-24 Aug. 2016, Vienna, Austria.

Nwaki, Michael Menonye, Zhang, Shujun, Bechkoum, Kamal and Liewe, David (2016) ACO-based discrete and continuous optimisation algorithm for optimising multi-level truss topological design. In: 5th international conference on Bionics Engineering ICBE 2016, 21st to 24th June 2016, Ningbo Campus, University of Nottingham, Ningbo, China.

O

Olszewska, Joanna Isabelle (2015) Active contour based optical character recognition for automated scene understanding. Neurocomputing, 161. pp. 65-71. ISSN 09252312

Olszewska, Joanna Isabelle (2015) Where is My Cup? - Fully Automatic Detection and Recognition of Textureless Objects in Real-World Images. Computer Analysis of Images and Patterns, 9256. pp. 501-512. ISSN 0302-9743

Olszewska, Joanna Isabelle, Simpson, R. and McCluskey, T. L. (2014) Dynamic OWL Ontology Design Using UML and BPMN. In: International Conference on Knowledge Engineering and Ontology Development, 21-24 October 2014, Rome. (Unpublished)

Olzmann, Matthias (2014) A New Conceptual and Operational Framework for the Switching of IT Outsourcing Providers. DBA thesis, University of Gloucestershire.

P

Pearce, Gillian, Wong, Julian, Mirtskhulava, Lela, Al-Majeed, Salah, Bakuria, Koba and Gulua, Nana (2016) Artificial Neural Network and Mobile Applications in Medical Diagnosis. In: 2015 17th UKSim-AMSS International Conference on Modelling and Simulation, 25-27 March, Cambridge, UK.

R

Rezaeian, Maryam and Wynn, Martin G (2016) Implementing Integrated Software Solutions in Iranian SMEs. eKNOW 2016, The Eighth International Conference on Information, Process, and Knowledge Management. pp. 76-84. ISSN 2308-4375

S

Sidoumou, Mohamed R, Bechkoum, Kamal, Turner, Scott and Picton, Phil (2015) Multitasking in Emotion Modelling: Attention Control. In: 2015 International Conference on Affective Computing and Intelligent Interaction (ACII). IEEE Computer Society, pp. 308-314. ISBN 978-1-4799-9953-8

Stafford, Richard, Goodenough, Anne E, Slater, Kathy, Carpenter, William, Collins, Laura, Cruickshank, Heather, Downing, Sarah, Hall, Sally, McDonald, Katie, McDonnell, Heather, Overs, Bryony, Spiers, Lizzie, Stetter, Mark, Zitzer, Heike and Hart, Adam G (2011) Inferential and visual analysis of ethogram data using multivariate techniques. Animal Behaviour, 83 (2). pp. 563-569. ISSN 00033472

T

Trovati, Marcello, Win, Thu Yein, Sun, Quanbin and Kontonatsios, Georgios (2017) Assessment of Security Threats via Network Topology Analysis: An Initial Investigation. Green, Pervasive, and Cloud Computing, 10232. pp. 416-425. ISSN 0302-9743

U

Usman, Mohammed Joda, Ismail, Samad Abdul, Chizari, Hassan and Aliyu, Ahmed (2017) Energy-Efficient virtual machine allocation technique using interior search algorithm for cloud datacenter. In: Energy-Efficient Virtual Machine Allocation Technique, 23-24 May 2017, Skudai, Malaysia.

W

Win, Thu Yein, Tianfield, Huaglory and Mair, Quentin (2017) Big Data Based Security Analytics for Protecting Virtualized Infrastructures in Cloud Computing. IEEE Transactions on Big Data (99). pp. 1-15. ISSN 2332-7790

Win, Thu Yein, Tianfield, Huaglory and Mair, Quentin (2016) Detection of Malware and Kernel-Level Rootkits in Cloud Computing Environments. In: The 2nd IEEE International Conference on Cyber Security and Cloud Computing, 3-5 November 2015, New York, United States.

Win, Thu Yein, Tianfield, Huaglory and Mair, Quentin (2014) Virtualization Security Combining Mandatory Access Control and Virtual Machine Introspection. In: 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing, 8-11 December 2014, London, United Kingdom.

Win, Thu Yein, Tianfield, Huaglory, Mair, Quentin, Said, Taimur Al and Rana, Omer F. (2014) Virtual Machine Introspection. In: SIN '14: Proceedings of the 7th International Conference on Security of Information and Networks, September 09 - 11, 2014, Glasgow, United Kingdom.

Wynn, Martin G and Brandao, Raul (2010) Using Information Systems to Drive Process Change: An Aerospace Industry Example from the Knowledge Transfer Partnership Scheme. In: Innovation through Knowledge Transfer 2010. Smart Innovation, Systems and Technologies (5). Springer-Verlag, Berlin, pp. 213-222. ISBN 978-3-642-14594-0

Wynn, Martin G and Brinkmann, Daniel (2016) Exploiting Business Intelligence for Strategic Knowledge Management: A German Healthcare Insurance Industry Case Study. International Journal of Business Intelligence Research, 7 (1). pp. 11-24. ISSN 1947-3591

X

Xie, Yongquan, Zhou, Zude, Pham, Duc Truong, Xu, Wenjun and Ji, Chunqian (2015) A Multiuser Manufacturing Resource Service Composition Method Based on the Bees Algorithm. Computational Intelligence and Neuroscience, 2015. pp. 1-13. ISSN 1687-5265

Xu, Wenjun, Yu, Jiajia, Zhou, Zude, Xie, Yongquan, Pham, Duc Truong and Ji, Chunqian (2015) Dynamic Modeling of Manufacturing Equipment Capability Using Condition Information in Cloud Manufacturing. Journal of Manufacturing Science and Engineering, 137 (4). 040907. ISSN 1087-1357

Y

Yalung, Christofer, Al-Majeed, Salah, Adolfo, Cid Mathew, Karam, Jalal and Mirtskhulava, Lela (2017) Gyroscope explorer terrain angles classification. In: 2016 IEEE East-West Design & Test Symposium (EWDTS), 14-17 October, Yerevan, Armenia.

Z

Zhang, Shujun, Clark, Michael, Chen, Donghui and Ren, Luquan (2016) The Effects of the bio-inspired pulsed electromagnetic fields on ATP and health. In: 5th international conference on Bionics Engineering ICBE 2016, 21st to 24th June 2016, Ningbo Campus, University of Nottingham, Ningbo, China.

Zhang, Shujun, Clark, Michael, Chen, Donghui and Ren, Luquan (2016) Study of a bionic system for health enhancements. In: 5th international conference on Bionics Engineering ICBE 2016, 21st to 24th June 2016, Ningbo Campus, University of Nottingham, Ningbo, China.

Zhang, Shujun, Hapeshi, Kevin, Chen, Donghui and Zhang, Xu (2016) 3-D Modelling of Biological Systems for Biomimetics. In: Bio-Inspired Surfaces and Applications. World Scientific, Singapore, pp. 321-388. ISBN 978-981-4704-48-9

Zhang, Xu (2012) A new method for generic three dimensional human face modelling for emotional bio-robots. PhD thesis, University of Gloucestershire.

This list was generated on Sat Jun 23 12:51:48 2018 UTC.

University Of Gloucestershire

Bookmark and Share

Find Us On Social Media:

Social Media Icons Facebook Twitter Google+ YouTube Pinterest Linkedin

Other University Web Sites

University of Gloucestershire, The Park, Cheltenham, Gloucestershire, GL50 2RH. Telephone +44 (0)844 8010001.