School of Computer Science and Informatics
Recent Submissions
-
Deep Clustering for Metagenomics
(Article)Metagenomics is an area that is supported by modern next generation sequencing technology, which investigates microorganisms obtained directly from environmental samples, without the need to isolate them. This type of ... -
Framing governance for a contested emerging technology: insights from AI policy
(Article)This paper examines how the governance in AI policy documents have been framed as way to resolve public controversies surrounding AI. It draws on the studies of governance of emerging technologies, the concept of policy ... -
The use of through vial impedance spectroscopy (TVIS) for determination of ice nucleation, solidification end point, and mannitol crystallization during freezing and re-heating
(Conference)This is a study of the freezing/reheating behavior of aqueous solutions of mannitol with respect to lyophilization process development given the prevalent use of the excipient. Here, through-vial impedance spectroscopy ... -
Artificial intelligence for human flourishing – Beyond principles for machine learning
(Article)The technical and economic benefits of artificial intelligence (AI) are counterbalanced by legal, social and ethical issues. It is challenging to conceptually capture and empirically measure both benefits and downsides. ... -
Cybersecurity in the Era of Digital Transformation: The case of Greece
(Conference)This article presents the cybersecurity progress in Greece since the creation of the Greek National Cyber Security Authority as nation-wide cybersecurity coordination and policy-making unit. During this period, Greece ... -
Between Location Protection and Overthrowing: A Contrariness Framework Study for Smart Vehicles
(Conference)Internet of Vehicles (IoV) capabilities can be used to decrease the number of accidents by sharing information among entities like the location of the Smart Cars (SC). This information is not encrypted due to several ... -
Pickpocketing Recognition in Still Images
(Conference)Human activity recognition (HAR) is a challenging topic in the computer vision eld. Pickpocketing is a type of human criminal ac- tions. It needs extensive research and development for detection. This paper investigates ... -
Knowledge and Skills Sets for Telecare Service Staff in the Context of Digital Health
(Article)Telecare services have an established place within the United Kingdom. Through employing online technologies to help mostly older people to remain at home, they are increasingly recognised as having a support role for ... -
The History of Telemedicine in the UK
(Book chapter)Introduction The United Kingdom (UK) is located on the north-west extremity of the continent of Europe. In 2018 it had a population of 66.4 million people [3]. The UK is an island nation comprising Great Britain and ... -
Micro-macro dynamics of the online opinion evolution: an asynchronous network model approach
(Article)This paper investigates the complex relationship between endogenous and exogenous, deterministic and stochastic stimulating factors in public opinion dynamics. An asynchronous multi-agent network model is proposed to explore ... -
A Survey on Privacy and Security of Internet of Things
(Article)Internet of Things (IoT) has fundamentally changed the way information technology and communication environments work, with significant advantages derived from wireless sensors and nanotechnology, among others. While IoT ... -
Applying NMR compound identification using NMRfilter to match predicted to experimental data
(Article)Introduction Metabolomics is the approach of choice to guide the understanding of biological systems and its molecular intricacies, but compound identification is yet a bottleneck to be overcome. Objective To assay ... -
Robust event-based non-intrusive appliance recognition using multi-scale wavelet packet tree and ensemble bagging tree
(Article)Providing the user with appliance-level consumption data is the core of each energy efficiency system. To that end, non-intrusive load monitoring is employed for extracting appliance specific consumption data at a low ... -
Designing Strong Privacy Metrics Suites Using Evolutionary Optimization
(Article)The ability to measure privacy accurately and consistently is key in the development of new privacy protections. However, recent studies have uncovered weaknesses in existing privacy metrics, as well as weaknesses caused ... -
An initial study to assess the perceived realism of agent crowd behaviour in a virtual city
(Conference)This paper examines the development of a crowd simulation in a virtual city, and a perceptual experiment to identify features of behaviour which can be linked to perceived realism. This research is expected to feedback ... -
A perceptual study into the behaviour of autonomous agents within a virtual urban environment
(Conference)Simulating vast crowds of autonomous agents within a procedurally generated virtual environment is a challenging endeavour from a technical perspective, however it becomes even more difficult when the subjective nature of ... -
SUPER-RESOLUTION OF 3D MRI CORRUPTED BY HEAVY NOISE WITH THE MEDIAN FILTER TRANSFORM
(Conference)The acquisition of 3D MRIs is adversely affected by many degrading factors including low spatial resolution and noise. Image enhancement techniques are commonplace, but there are few proposals that address the increase of ... -
Developing Gamified Elements to Influence Positive Behavioural Change towards Organisational Energy Efficiency
(Conference)Demands for energy within public sector buildings, such as administrative offices, cultural heritage sites, and museums, represent a significant financial and environmental burden. With issues relating to climate change ... -
Perceived Realism of Crowd Behaviour with Social Forces
(Conference)This paper investigates the development of an urban crowd simulation for the purposes of psychophysical experimentation. Whilst artificial intelligence (AI) is advancing to produce more concise and interesting crowd ...