Skip to main content

Research Repository

Advanced Search

Outputs (519)

Synchrotron X-ray CT of rose peduncles – evaluation of tissue damage by radiation* (2015)
Journal Article
Herppich, W., Matsushima, U., Graf, W., Zabler, S., Dawson, M., Choinka, G., & Manke, I. (2015). Synchrotron X-ray CT of rose peduncles – evaluation of tissue damage by radiation*. MP Materials Testing, 57(1), 59-63. https://doi.org/10.3139/120.110675

"Bent-neck" syndrome, an important postharvest problem of cut roses, is probably caused by water supply limitations and/or the structural weakness of vascular bundles of the peduncle tissue. For this reason, advanced knowledge about the microstructur... Read More about Synchrotron X-ray CT of rose peduncles – evaluation of tissue damage by radiation*.

A newly discovered epidemic area of echinococcus multilocularis in West Gansu Province in China (2015)
Journal Article
Sim, R., Han, J., Bao, G., Zhang, D., Gao, P., Wu, T., …Jing, T. (2015). A newly discovered epidemic area of echinococcus multilocularis in West Gansu Province in China. PLoS ONE, 10(7), e0132731. https://doi.org/10.1371/journal.pone.0132731

Alveolar echinococcosis (AE) is a lethal parasitic disease. In Gansu Province of China, all AE cases reported in literature were from Zhang and Min Counties, the southern part of the province. Here, we report the discovery of nine AE cases and one cy... Read More about A newly discovered epidemic area of echinococcus multilocularis in West Gansu Province in China.

Toxoplasma gondii coinfection with diseases and parasites in wild rabbits in Scotland (2015)
Journal Article
Mason, S., Dubey, J., SMITH, J., & Boag, B. (2015). Toxoplasma gondii coinfection with diseases and parasites in wild rabbits in Scotland. Parasitology, 142(11), 1415-1421. https://doi.org/10.1017/S003118201500075X

In wild rabbits (Oryctolagus cuniculus) on an estate in Perthshire, central Scotland, the seroprevalence of Toxoplasma gondii was 18/548 (3.3%). The wild rabbit could be a T. gondii reservoir and it has potential value as a sentinel of T. gondii in e... Read More about Toxoplasma gondii coinfection with diseases and parasites in wild rabbits in Scotland.

BIM for client organisations : a continuous improvement approach (2015)
Journal Article
Al Ahbabi, M., & Alshawi, M. (2015). BIM for client organisations : a continuous improvement approach. Construction innovation (London. Online), 15(4), 402-408. https://doi.org/10.1108/CI-04-2015-0023

Purpose - The purpose of this paper is to propose a continuous improvement approach for clients to improve their performance and to maximise the benefits gained from building information modelling (BIM) over time. The role of client organisations is... Read More about BIM for client organisations : a continuous improvement approach.

A source separation evaluation method in object-based spatial audio (2015)
Book Chapter
Liu, Q., Wang, W., Jackson, P., & Cox, T. (2015). A source separation evaluation method in object-based spatial audio. In 2015 23rd European Signal Processing Conference (EUSIPCO) (1088-1092). IEEE. https://doi.org/10.1109/EUSIPCO.2015.7362551

Representing a complex acoustic scene with audio objects is desirable but challenging in object-based spatial audio production and reproduction, especially when concurrent sound signals are present in the scene. Source separation (SS) provides a pote... Read More about A source separation evaluation method in object-based spatial audio.

Insourcing a government information system : an analysis using institutions and the capability approach (2015)
Book Chapter
Omar, A., Bass, J., & Lowit, P. (2015). Insourcing a government information system : an analysis using institutions and the capability approach. In 2015 International Conference on Information Society (i-Society) (91-96). IEEE. https://doi.org/10.1109/i-Society.2015.7366866

This study explores the effectiveness of insourcing in the Malaysian Government. The research discusses the factors and issues of insourcing in a Malaysian government agency in the context of post contract termination of an outsourcing agreement. A q... Read More about Insourcing a government information system : an analysis using institutions and the capability approach.

Enhanced cloud patterns : a case studyof multi-tenancy patterns (2015)
Book Chapter
Adewojo, A., Bass, J., & Allison, I. (2015). Enhanced cloud patterns : a case studyof multi-tenancy patterns. In 2015 International Conference on Information Society (i-Society) (53-58). IEEE. https://doi.org/10.1109/i-Society.2015.7366858

Multi-tenancy is a vital cloud computing property that enables multiple tenants of an application to be served concurrently while guaranteeing isolation between the tenants. Current cloud deployment patterns catalogue for implementing multi-tenancy l... Read More about Enhanced cloud patterns : a case studyof multi-tenancy patterns.

Evaluating degrees of tenant isolation in multitenancy patterns : a case study of cloud-hosted Version Control System (VCS) (2015)
Conference Proceeding
Ochei, L., Petrovski, A., & Bass, J. (2015). Evaluating degrees of tenant isolation in multitenancy patterns : a case study of cloud-hosted Version Control System (VCS). In 2015 International Conference on Information Society (i-Society). https://doi.org/10.1109/i-Society.2015.7366859

One of the key concerns of implementing multitenancy (i.e., serving multiple tenants with a single instance of an application) on the cloud is how to enable the required degree of isolation between tenants, so that the required performance of one ten... Read More about Evaluating degrees of tenant isolation in multitenancy patterns : a case study of cloud-hosted Version Control System (VCS).

Potential cyber-attacks against global oil supply chain (2015)
Book Chapter
Nasir, M., Sultan, S., Nefti-Meziani, S., & Manzoor, U. (2015). Potential cyber-attacks against global oil supply chain. In 2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA) (1-7). IEEE. https://doi.org/10.1109/CyberSA.2015.7166137

The energy sector has been actively looking into cyber risk assessment at a global level, as it has a ripple effect; risk taken at one step in supply chain has an impact on all the other nodes. Cyber-attacks not only hinder functional operations in a... Read More about Potential cyber-attacks against global oil supply chain.

Improving robustness of speaker recognition in noisy and reverberant conditions via training (2015)
Book Chapter
Al-Noori, A., Al-Karawi, K., & Li, F. (2015). Improving robustness of speaker recognition in noisy and reverberant conditions via training. In 2015 European Intelligence and Security Informatics Conference (180-180). IEEE. https://doi.org/10.1109/EISIC.2015.20

Speaker recognition can be used as a security means to authenticate the speaker or as a forensic tool to determine who is likely to be the talker. For such critical applications, robustness or reliability of the system is crucial. In spite of the dev... Read More about Improving robustness of speaker recognition in noisy and reverberant conditions via training.