Skip to main content

Research Repository

Advanced Search

All Outputs (307)

Two dimensional configurational-force-driven crack propagation using the discontinuous Galerkin method with rp-adaptivity (2016)
Presentation / Conference Contribution
Bird, R., Coombs, W., & Giani, S. (2016). Two dimensional configurational-force-driven crack propagation using the discontinuous Galerkin method with rp-adaptivity. In Proceedings of the 24th UK Conference of the Association for Computational Mechanics in Engineering, 31 March - 01 April 2016, Cardiff University, Cardiff (137-140)

This paper presents a quasi-static configurational force (CF) brittle fracture propagation method, [1], using the discontinuous Galerkin (dG) symmetric interior penalty (SIP) method, [2]. The method is derived from the first law of thermodynamics wit... Read More about Two dimensional configurational-force-driven crack propagation using the discontinuous Galerkin method with rp-adaptivity.

A high-order material point method (2016)
Presentation / Conference Contribution
Ghaffari Motlagh, Y., & Coombs, W. (2016). A high-order material point method. In Proceedings of the 24th UK Conference of the Association for Computational Mechanics in Engineering, 31 March - 01 April 2016, Cardiff University, Cardiff (352-355)

The material point method (MPM) is a version of the particle-in-cell (PIC) which has substantial advantages over pure Lagrangian or Eulerian methods in numerical simulations of problems involving large deformations. Using MPM helps to avoid mesh dist... Read More about A high-order material point method.

Branched crack modelling with the Cracking Particle Method (2016)
Presentation / Conference Contribution
Ai, W., Augarde, C., & Trevelyan, J. (2016). Branched crack modelling with the Cracking Particle Method. In Proceedings of the 24th UK Conference of the Association for Computational Mechanics in Engineering, 31 March - 01 April 2016, Cardiff University, Cardiff (125-128)

Multiple crack simulation is of great importance in failure analysis since fracture in brittle materials in practice usually comprises multiple cracks. Traditional numerical methods like the extended finite element and the element free Galerkin metho... Read More about Branched crack modelling with the Cracking Particle Method.

A Contact Detection Code using Triangles for Non-Spherical Particle Simulations (2016)
Presentation / Conference Contribution
Krestenitis, K., Weinzierl, T., & Koziara, T. (2016). A Contact Detection Code using Triangles for Non-Spherical Particle Simulations. In Proceedings of the 24th Conference on Computational Mechanics (ACME-2016): 31 March - 01 April 2016, Cardiff University, Cardiff (227-230)

We present a novel DEM (discrete element method) code with explicit time stepping. DEM codes simulate billions of small particles that interact with each other primarily through collisions. Different to state-of-the-art codes, we rely on triangulated... Read More about A Contact Detection Code using Triangles for Non-Spherical Particle Simulations.

A printed UWB antenna with full ground plane for WBAN applications (2016)
Presentation / Conference Contribution
Simorangkir, R. B. V. B., Abbas, S. M., & Esselle, K. P. (2016, February). A printed UWB antenna with full ground plane for WBAN applications. Paper presented at 2016 International Workshop on Antenna Technology (iWAT), Cocoa Beach, FL, USA

What Do We Know and How Well Do We Know It? Current Knowledge about Software Engineering Practices (2016)
Presentation / Conference Contribution
Budgen, D. (2016). What Do We Know and How Well Do We Know It? Current Knowledge about Software Engineering Practices. In P. Lorenz, J. Cardoso, L. A. Maciaszek, & M. van Sinderen (Eds.), Software Technologies : 10th International Joint Conference, ICSOFT 2015, Colmar, France, July 20-22, 2015. Revised selected papers (3-16). https://doi.org/10.1007/978-3-319-30142-6_1

Context: The ‘prescriptions’ used in software engineering for developing and maintaining systems make use of a set of ‘practice models’, which have largely been derived by codifying successful experiences of expert practitioners. Aim: To review the w... Read More about What Do We Know and How Well Do We Know It? Current Knowledge about Software Engineering Practices.

VitruCare: Using digital health to overcome the bounded willpower of patients with long term conditions (2016)
Presentation / Conference Contribution
Wilson, C. (2016, February). VitruCare: Using digital health to overcome the bounded willpower of patients with long term conditions. Paper presented at 2nd Behaviour Change Conference: Digital Health and Wellbeing., London, UK

Background: Long term conditions affect 40% of the UK population whilst utilising 70% of the health and social care funding. Digital health has emerged as a solution, to aid patients in self-managing their health and alter unhealthy behaviours. Howev... Read More about VitruCare: Using digital health to overcome the bounded willpower of patients with long term conditions.

Filling the complexity gaps for colouring planar and bounded degree graphs (2016)
Presentation / Conference Contribution
Dabrowski, K. K., Dross, F., Johnson, M., & Paulusma, D. (2015, October). Filling the complexity gaps for colouring planar and bounded degree graphs. Presented at 26th International Workshop on Combinatorial Algorithms (IWOCA 2015), Verona, Italy

We consider a natural restriction of the List Colouring problem, k-Regular List Colouring, which corresponds to the List Colouring problem where every list has size exactly k. We give a complete classification of the complexity of k-Regular List Colo... Read More about Filling the complexity gaps for colouring planar and bounded degree graphs.

Assessment of insider attack with learning statistics methods (2016)
Presentation / Conference Contribution
Kotsiuba, I. (2016, February). Assessment of insider attack with learning statistics methods. Presented at ICISSP 2016 - 2nd International Conference on Information Systems Security and Privacy, Doctoral Consortium

The popularity of mobile devices, wearable devices used in collaborative information systems, has dramatically exploded over the past decade. Thus, we understand that in ordinary office, a single person can use plenty of active interfaces like wirel... Read More about Assessment of insider attack with learning statistics methods.

Design and development of an agent-based model for business operations faced with flood disruption (2016)
Presentation / Conference Contribution
Li, C., Coates, G., Rzevski, G., & Brebbia, C. (2016). Design and development of an agent-based model for business operations faced with flood disruption. In Complex systems : fundamentals and applications (275-286). https://doi.org/10.2495/978-1-78466-155-7/023

Small and Medium Enterprises (SMEs) constitute a major component of the United Kingdom’s economy, accounting for 99.9% of all private sector businesses and approximately 47% of annual turnover in 2014 [1]. However, these companies can suffer signific... Read More about Design and development of an agent-based model for business operations faced with flood disruption.

On using Feature Descriptors as Visual Words for Object Detection within X-ray Baggage Security Screening (2016)
Presentation / Conference Contribution
Kundegorski, M., Akcay, S., Devereux, M., Mouton, A., & Breckon, T. (2016). On using Feature Descriptors as Visual Words for Object Detection within X-ray Baggage Security Screening. In Proc. Int. Conf. on Imaging for Crime Detection and Prevention (12 (6 .)-12 (6 .)(1)). https://doi.org/10.1049/ic.2016.0080

Here we explore the use of various feature point descriptors as visual word variants within a Bag-of-Visual-Words (BoVW) representation scheme for image classification based threat detection within baggage security X-ray imagery. Using a classical Bo... Read More about On using Feature Descriptors as Visual Words for Object Detection within X-ray Baggage Security Screening.

On temporally connected graphs of small cost (2016)
Presentation / Conference Contribution
Akrida, E., Gasieniec, L., Mertzios, G., & Spirakis, P. (2015, September). On temporally connected graphs of small cost. Presented at 13th Workshop on Approximation and Online Algorithms (WAOA), Patras, Greece

We study the design of small cost temporally connected graphs, under various constraints. We mainly consider undirected graphs of n vertices, where each edge has an associated set of discrete availability instances (labels). A journey from vertex u t... Read More about On temporally connected graphs of small cost.