Skip to main content

Research Repository

Advanced Search

Psychophysiological approaches to sound and music in games (2021)
Book Chapter
Williams, D. (2021). Psychophysiological approaches to sound and music in games. In M. Fritsch, & T. Summers (Eds.), The Cambridge Companion to Video Game Music (302-318). Cambridge University Press (CUP). https://doi.org/10.1017/9781108670289.019

Psychological research investigating sound and music has increasingly been adapted to the evaluation of soundtracking for games, and is now being considered in the development and design stages of some titles. This chapter summarizes the main finding... Read More about Psychophysiological approaches to sound and music in games.

“Hello Computer, how am I feeling?”, case studies of neural technology to measure emotions (2020)
Book Chapter
Daly, I., & Williams, D. (2020). “Hello Computer, how am I feeling?”, case studies of neural technology to measure emotions. In C. Nam (Ed.), Neuroergonomics (193-219). Springer. https://doi.org/10.1007/978-3-030-34784-0_11

Emotion is a core part of the human experience. Many artistic and creative applications attempt to produce particular emotional experiences, for example, films, games, music, dance, and other visual arts. However, while emotional states are ubiquitou... Read More about “Hello Computer, how am I feeling?”, case studies of neural technology to measure emotions.

A fuzzy ANP based weighted RFM model for customer segmentation in auto insurance sector (2018)
Book Chapter
Ravasan, A., & Mansouri, T. (2018). A fuzzy ANP based weighted RFM model for customer segmentation in auto insurance sector. In Intelligent systems : concepts, methodologies, tools, and applications (1050-1067). IGI Global. https://doi.org/10.4018/978-1-5225-5643-5.ch044

Data mining has a tremendous contribution for researchers to extract the hidden knowledge and information which have been inherited in the raw data. This study has proposed a brand new and practical fuzzy analytic network process (FANP) based weighte... Read More about A fuzzy ANP based weighted RFM model for customer segmentation in auto insurance sector.

A distributed joint sentiment and topic modeling using spark for big opinion mining (2017)
Book Chapter
Zahedi, E., Saraee, M., & Baniasadi, Z. (2017). A distributed joint sentiment and topic modeling using spark for big opinion mining. In Iranian Conference on Electrical Engineering (ICEE), 2017 (1475-1480). IEEE. https://doi.org/10.1109/IranianCEE.2017.7985276

Opinion data are produced rapidly by a large and uncontrolled number of opinion holders in different domains (public, business, politic and etc). The volume, variety and velocity of such data requires an opinion mining model to be also adopted with t... Read More about A distributed joint sentiment and topic modeling using spark for big opinion mining.

Particle Swarm Optimization : a tutorial (2017)
Book Chapter
Tharwat, A., Gaber, T., Hassanien, A., & Elnaghi, B. (2017). Particle Swarm Optimization : a tutorial. In T. Gaber, & A. Hassanien (Eds.), Handbook of Research on Machine Learning Innovations and Trends (614-635). IGI Global. https://doi.org/10.4018/978-1-5225-2229-4.ch026

Optimization algorithms are necessary to solve many problems such as parameter tuning. Particle Swarm Optimization (PSO) is one of these optimization algorithms. The aim of PSO is to search for the optimal solution in the search space. This paper hig... Read More about Particle Swarm Optimization : a tutorial.

A closer look at Syncany Windows and Ubuntu clients’ residual artefacts (2016)
Book Chapter
Yee Yang, T., Dehghantanha, A., Choo, R., Muda, Z., Taufik, A., & Wee-Chait, C. (2016). A closer look at Syncany Windows and Ubuntu clients’ residual artefacts. In Security, Privacy and Anonymity in Computation, Communication and Storage (342-357). SpaCCS. https://doi.org/10.1007/978-3-319-49145-5_34

In this paper, we seek to determine the residual artefacts of forensic value on Windows and Ubuntu client machines of using Syncany private cloud storage service. We demonstrate the types and the locations of the artefacts that can be forensically re... Read More about A closer look at Syncany Windows and Ubuntu clients’ residual artefacts.

Forensic investigation of social media and instant messaging services in Firefox OS : Facebook, Twitter, Google+, Telegram, OpenWapp, and Line as case studies (2016)
Book Chapter
Najvadi, Y., & Dehghantanha, A. (2016). Forensic investigation of social media and instant messaging services in Firefox OS : Facebook, Twitter, Google+, Telegram, OpenWapp, and Line as case studies. In Contemporary Digital Forensic Investigations Of Cloud And Mobile Applications. Elsevier. https://doi.org/10.1016/B978-0-12-805303-4.00004-6

Investigating America Online instant messaging application : data remnants on Windows 8.1 client machine (2016)
Book Chapter
(2016). Investigating America Online instant messaging application : data remnants on Windows 8.1 client machine. In T. Yee Yang, & A. Dehghantanha (Eds.), Contemporary Digital Forensic Investigations Of Cloud And Mobile Applications. Elsevier. https://doi.org/10.1016/B978-0-12-805303-4.00003-4

Instant messaging applications (apps) are one potential source of evidence in a criminal investigation or a civil litigation. To ensure the most effective collection of evidence, it is vital for forensic practitioners to possess up-to-date knowledge... Read More about Investigating America Online instant messaging application : data remnants on Windows 8.1 client machine.

Performance of android forensics data recovery tools (2016)
Book Chapter
Ogazi-Onyemaechi, B., Dehghantanha, A., & Choo, K. (2016). Performance of android forensics data recovery tools. In K. Choo, & A. Dehghantanha (Eds.), Contemporary Digital Forensic Investigations of Cloud and Mobile Applications (91-110). Elsevier. https://doi.org/10.1016/B978-0-12-805303-4.00007-1

Recovering deleted or hidden data is among the most important duties of forensics investigators. Extensive utilization of smartphones as subject, objects, or tools of crime made them an important part of residual forensics. This chapter investigates... Read More about Performance of android forensics data recovery tools.

Network traffic forensics on Firefox Mobile OS : Facebook, Twitter and Telegram as case studies (2016)
Book Chapter
Mohd Najwadi, Y., & Dehghantanha, A. (2016). Network traffic forensics on Firefox Mobile OS : Facebook, Twitter and Telegram as case studies. In Contemporary Digital Forensic Investigations Of Cloud And Mobile Applications. Elsevier. https://doi.org/10.1016/B978-0-12-805303-4.00005-8

The development of a mobile web-centric OS such as Firefox OS (FxOS) has created new challenges and opportunities for digital investigators. Network traffic forensics plays an important role in cybercrime investigation to detect subject(s) and object... Read More about Network traffic forensics on Firefox Mobile OS : Facebook, Twitter and Telegram as case studies.

Bringing the client and therapist together in virtual reality telepresence exposure therapy (2016)
Book Chapter
Roberts, D., Fairchild, A., Campion, S., Garcia Jimenez, A., & Wolff, R. (2016). Bringing the client and therapist together in virtual reality telepresence exposure therapy. In P. Sharkey, & A. Rizzo (Eds.), Proceedings of the 11th international conference on disability, virtual reality and associated technologies (ICDVRAT 2016) (157-163). University of Reading

We present a technology demonstrator of the potential utility of our telepresence approach to supporting tele-therapy, in which client and remote therapist are immersed together. The aim is to demonstrate an approach in which a wide range of non-verb... Read More about Bringing the client and therapist together in virtual reality telepresence exposure therapy.

Aerodynamic analysis of upper surface wing morphing efficiency for the S4 Éhecatl unmanned aerial system (2016)
Book Chapter
Sugar-Gabor, O., Koreanschi, A., & Botez, R. (2016). Aerodynamic analysis of upper surface wing morphing efficiency for the S4 Éhecatl unmanned aerial system. In Unmanned Aircraft Systems (ICUAS), 2016 International Conference on 7-10 June 2016 (185-194). IEEE. https://doi.org/10.1109/ICUAS.2016.7502530

This paper investigates the aerodynamic performance improvement of the Hydra Technologies S4 Unmanned Aerial System using a morphing wing concept. A part of the wing's upper surface is morphed, as function of the flight condition, in order to increas... Read More about Aerodynamic analysis of upper surface wing morphing efficiency for the S4 Éhecatl unmanned aerial system.

Relationship between hedonic preference and audio quality in tests of music production quality (2016)
Book Chapter
Wilson, A., & Fazenda, B. (2016). Relationship between hedonic preference and audio quality in tests of music production quality. In 2016 Eighth International Conference on Quality of Multimedia Experience (QoMEX) (1-6). IEEE. https://doi.org/10.1109/QoMEX.2016.7498937

In many subjective listening tests, audio is evaluated on either "quality" or "preference". These terms are often conflated. Little evidence has been gathered which explains the subtle differences between these terms in audio perception --- we may no... Read More about Relationship between hedonic preference and audio quality in tests of music production quality.

Applications of computational intelligence to robotics and autonomous systems (2016)
Book Chapter
autonomous systems. In P. Angelov (Ed.), Handbook on Computational Intelligence (821-863). World Scientific. https://doi.org/10.1142/9789814675017_0025

This chapter discusses the application of computational intelligence in the field of autonomous mobile robotics. The chapter is focused on basic concepts of computational intelligence in robotic domain with an emphasis on essential aspects of navigat... Read More about Applications of computational intelligence to robotics and autonomous systems.

Exploit kits : the production line of the cybercrime economy? (2016)
Book Chapter
economy?. In 2015 Second International Conference on Information Security and Cyber Forensics (InfoSec) 15-17 Nov. 2015 (23-27). IEEE. https://doi.org/10.1109/InfoSec.2015.7435501

The annual cost of Cybercrime to the global economy is estimated to be around $400 billion, in support of which Exploit Kits have been providing enabling technology since 2006. This paper reviews the recent developments in Exploit Kit capability and... Read More about Exploit kits : the production line of the cybercrime economy?.