Browsing School of Computer and Mathematical Sciences by Date

Sort by: Order: Results:

  • Westbrook, JI; Rob, MI; Woods, A; Parry, D (AUT University, BMJ Publishing Group Ltd and the Health Foundation; 26 M)
    Background Intravenous medication administrations have a high incidence of error but there is limited evidence of associated factors or error severity.Objective To measure the frequency, type and severity of intravenous ...
  • Hussain, W; Clear, T (IEEE; 2014)
    Globally distributed stakeholders employ various collaborative technologies to manage requirements. While these technologies facilitate requirements collaboration, their perceived purpose, use and structure co-evolve over ...
  • Shanmuganathan, S; Narayanan, A; Mohamed, M; Ibrahim, R; Haron, K (Soft Computing and Data Mining (SCDM), University Tun Hussein Onn, Malaysia; 2014)
    Understanding the climate change effects on local crops is vital for adapting new cultivation practices and assuring world food security. Given the volume of palm oil produced in Malaysia, climate change effects on oil ...
  • Klymchuk, S (Taylor & Francis; 2014)
    The paper describes a personal experience with using counterexamples as a pedagogical strategy in the teaching and learning of an introductory calculus course at a university of technology.
  • Soorty, B; Sarkar, NI (International Journal of Computer and Information Technology (IJCIT); 2014)
    In this paper the performance of IPv6 is investigated using Windows and Linux operating systems over a Gigabit Ethernet link. IPv6 is set to take over IPv4 and is built into most new Windows and Linux client/server operating ...
  • Zhang, W (arXiv.org; 2014)
    A stochastic model with hidden discrete Markov processes is constructed to understand the behavior of debtors.
  • Zhang, W (arXiv.org; 2014)
    It is known that curvature relation plays a key role in the propagation of two-dimensional waves in an excitable model. Such a relation is believed to obey the eikonal equation for typical excitable models (e.g., the ...
  • Shanmuganathan, S; Sallis, P (MDPI AG, Basel, Switzerland.; 2014)
    Gaining knowledge on weather patterns, trends and the influence of their extremes on various crop production yields and quality continues to be a quest by scientists, agriculturists, and managers. Precise and timely ...
  • Tegginmath, S; Pears, R; Kasabov, N (Springer; 2014)
    In this chapter we review the uses of ontologies within bioinformatics and neuroinformatics and the various attempts to combine machine learning (ML) and ontologies, and the uses of data mining ontologies. This is a diverse ...
  • Georgieva, P; Silva, F; Milanova, M; Kasabov, N (Springer-Verlag; 2014)
    This chapter is focused on recent advances in electroencephalogram (EEG) signal processing for brain computer interface (BCI) design. A general overview of BCI technologies is first presented, and then the protocol for ...
  • Hu, Y; Kasabov, N; Liang, W (Springer; 2014)
    Personalised modelling offers a new and effective approach for the study in pattern recognition and knowledge discovery, especially for biomedical applications. The created models are more useful and informative for analysing ...
  • Liang, L; Krishnamurthi, R; Kasabov, N; Feigin, V (Springer Verlag; 2014)
    Stroke is a major cause of disability and mortality in most economically developed countries. It is the second leading cause of death worldwide (after cancer and heart disease) [55.1, 2] and a major cause of disability in ...
  • Schliebs, S; Kasabov, N (Springer-Verlag Berlin; 2014)
    This chapter reviews recent developments in the area of spiking neural networks (SNN) and summarizes the main contributions to this research field. We give background information about the functioning of biological neurons, ...
  • Kasabov, N (Springer-Verlag; 2014)
    This chapter discusses opportunities and challenges for the creation of methods of computational intelligence (CI) and more specifically – artificial neural networks (ANN), inspired by principles at different levels of ...
  • Clear, T (Association for Computing Machinery (ACM); 2014)
    No abstract.
  • Liu, F; Yan, W-Q; Li, P; Wu, C (Springer; 2013)
    Visual Cryptography (VC) is a powerful technique that combines the notions of perfect ciphers and secret sharing in cryptography with that of raster graphics. A binary image can be divided into shares that are able to be ...
  • Tauch, S; Liu, W; Pears, R (IEEE; 2013)
    Intricate webs of interlinked critical infrastructures such as electrical grid, telecommunication, and transportation are essential for the minimal functioning of contemporary societies and economies. Advances in Information ...
  • Medagoda, N; Shanmuganathan, S; Whalley, J (IEEE; 2013)
    In the past decade many opinion mining and sentiment classification studies have been carried out for opinions in English. However, the amount of work done for non-English text opinions is very limited.In this review, we ...
  • Castellon, Y; Gutierrez, J (; 2013)
    Modern organizations generate a great amount of information that stays dispersed throughout the different operating units. This makes it difficult for management to identify useful relationships among the disparate pieces ...
  • Shanmuganathan, S (International Conference on Computational and Network Technologies; 2013)
    Data/Text mining techniques in modelling climate change effects on crops from data mining and knowledge discovery (in databases) to big data analytics and knowledge extraction for applications in science “Data mining” for ...

Search Scholarly Commons


Advanced Search

Browse

Theses and Dissertations

About Scholarly Commons

Usage Statistics