<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="FeedCreator 1.8" -->
<?xml-stylesheet href="https://davidjohnpaul.com/wiki/lib/exe/css.php?s=feed" type="text/css"?>
<rss version="2.0">
    <channel xmlns:g="http://base.google.com/ns/1.0">
        <title>davidjohnpaul.com - research</title>
        <description></description>
        <link>https://davidjohnpaul.com/wiki/</link>
        <lastBuildDate>Sat, 18 Apr 2026 02:34:31 +0000</lastBuildDate>
        <generator>FeedCreator 1.8</generator>
        <image>
            <url>https://davidjohnpaul.com/wiki/lib/exe/fetch.php/wiki:logo.png</url>
            <title>davidjohnpaul.com</title>
            <link>https://davidjohnpaul.com/wiki/</link>
        </image>
        <item>
            <title>agron2021</title>
            <link>https://davidjohnpaul.com/wiki/doku.php/research:agron2021</link>
            <description>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;automated_muzzle_detection_and_biometric_identification_via_few-shot_deep_transfer_learning_of_mixed_breed_cattle&quot;&gt;Automated Muzzle Detection and Biometric Identification via Few-Shot Deep Transfer Learning of Mixed Breed Cattle&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://doi.org/10.3390/agronomy11112365&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;https://doi.org/10.3390/agronomy11112365&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Download&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;
Shojaeipour, A., Falzon, G., Kwan, P., Hadavi, N., Cowley, F.C., Paul, D. “Automated Muzzle Detection and Biometric Identification via Few-Shot Deep Transfer Learning of Mixed Breed Cattle”, Agronomy, 11(11), 2365, November 2021.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Automated Muzzle Detection and Biometric Identification via Few-Shot Deep Transfer Learning of Mixed Breed Cattle&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;automated_muzzle_detection_and_biometric_identification_via_few-shot_deep_transfer_learning_of_mixed_breed_cattle&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:1,&amp;quot;range&amp;quot;:&amp;quot;1-415&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit2&quot; id=&quot;abstract&quot;&gt;Abstract&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
Livestock welfare and management could be greatly enhanced by the replacement of branding or ear tagging with less invasive visual biometric identification methods. Biometric identification of cattle from muzzle patterns has previously indicated promising results. Significant barriers exist in the translation of these initial findings into a practical precision livestock monitoring system, which can be deployed at scale for large herds. The objective of this study was to investigate and address key limitations to the autonomous biometric identification of cattle. The contributions of this work are fourfold: (1) provision of a large publicly-available dataset of cattle face images (300 individual cattle) to facilitate further research in this field, (2) development of a two-stage YOLOv3-ResNet50 algorithm that first detects and extracts the cattle muzzle region in images and then applies deep transfer learning for biometric identification, (3) evaluation of model performance across a range of cattle breeds, and (4) utilizing few-shot learning (five images per individual) to greatly reduce both the data collection requirements and duration of model training. Results indicated excellent model performance. Muzzle detection accuracy was 99.13% (1024 × 1024 image resolution) and biometric identification achieved 99.11% testing accuracy. Overall, the two-stage YOLOv3-ResNet50 algorithm proposed has substantial potential to form the foundation of a highly accurate automated cattle biometric identification system, which is applicable in livestock farming systems. The obtained results indicate that utilizing livestock biometric monitoring in an advanced manner for resource management at multiple scales of production is possible for future agriculture decision support systems, including providing useful information to forecast acceptable stocking rates of pastures.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Abstract&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;abstract&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:2,&amp;quot;range&amp;quot;:&amp;quot;416-2326&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit3&quot; id=&quot;journal&quot;&gt;Journal&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://www.mdpi.com/journal/agronomy&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;https://www.mdpi.com/journal/agronomy&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Agronomy&lt;/a&gt; - Special Issue &lt;a href=&quot;https://www.mdpi.com/journal/agronomy/special_issues/data_agriculture&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;https://www.mdpi.com/journal/agronomy/special_issues/data_agriculture&quot; rel=&quot;ugc nofollow noopener&quot;&gt;&amp;quot;Data-Driven Agricultural Innovations&amp;quot;&lt;/a&gt;
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Journal&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;journal&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:3,&amp;quot;range&amp;quot;:&amp;quot;2327-&amp;quot;} --&gt;</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Mon, 22 Nov 2021 23:01:36 +0000</pubDate>
        </item>
        <item>
            <title>ai2022</title>
            <link>https://davidjohnpaul.com/wiki/doku.php/research:ai2022</link>
            <description>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;improved_salp_swarm_algorithm_for_solving_single-objective_continuous_optimization_problems&quot;&gt;Improved Salp Swarm Algorithm for Solving Single-objective Continuous Optimization Problems&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://doi.org/10.1007/s10489-022-03269-x&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;https://doi.org/10.1007/s10489-022-03269-x&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Download&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;
Abed-alguni, B., Paul, D., Hammad, R. “Improved Salp Swarm Algorithm for Solving Single-objective Continuous Optimization Problems”, Applied Intelligence, 2022.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Improved Salp Swarm Algorithm for Solving Single-objective Continuous Optimization Problems&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;improved_salp_swarm_algorithm_for_solving_single-objective_continuous_optimization_problems&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:1,&amp;quot;range&amp;quot;:&amp;quot;1-326&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit2&quot; id=&quot;abstract&quot;&gt;Abstract&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
The Salp Swarm Algorithm (SSA) is an effective single-objective optimization algorithm that was inspired by the navigating and foraging behaviors of salps in their natural habitats. Although SSA was successfully tailored and applied to solve various types of optimization problems, it often suffers from premature convergence and typically does not perform well with high-dimensional optimization problems. This paper introduces an Improved SSA (ISSA) algorithm to enhance the performance of SSA in solving single-objective continuous optimization problems. ISSA has four characteristics. First, it employs Gaussian Perturbation to improve the diversity of initial population. Second, it uses highly disruptive polynomial mutation (HDPM) to update the leader salp in the salp chain. Third, it uses the Laplace crossover operator to improve its exploration ability. Fourth, it uses a new opposition learning method called Mixed Opposition-based Learning (MOBL) to improve its convergence rate and exploration ability. A set of 14 standard benchmark functions was used to evaluate the performance of ISSA and compare it to three variations of SSA (SSA, Hybrid SSA with Particle Swarm Optimization HSSAPSO Singh et al. (2020) and Enhanced SSA (ESSA) Zhang et al. (2020)). The overall experimental and statistical results indicate that ISSA is a better optimization algorithm than the other SSA variations. Further, the single-objective IEEE CEC 2014 (IEEE Congress on Evolutionary Computation 2014) functions were used to evaluate and compare the performance of ISSA to 18 well-known and state-of-the-art optimization algorithms (Exploratory Cuckoo Search (ECS) Abed-alguni (2021)), Grey Wolf Optimizer (GWO) Mirjalili and Mirjalili (Advances in Engineering Software, 69, 46–61, 2014), Distributed Grey Wolf Optimize (DGWO) Abed-alguni and Barhoush (2018), Cuckoo Search (CS) Yang and Deb (2009), Distributed adaptive differential evolution with linear population size reduction evolution (L-SHADE) Tanabe and Fukunaga (2014), Memory-based Hybrid Dragonfly Algorithm (MHDA) KS and Murugan (Expert Syst Appl, 83, 63–78, 2017), Fireworks Algorithm with Differential Mutation (FWA-DM) Yu et al. (2014), Differential Evolution-based Salp Swarm Algorithm (DESSA) Dhabal et al. (Soft Comput, 25(3), 1941–1961, 2021), LSHADE with Fitness and Diversity Ranking-Based Mutation Operator (FD-LSHADE) Cheng et al. (Swarm and Evolutionary Computation, 61, 100816, 2021), Distance based SHADE (Db-SHADE) Viktorin et al. (Swarm and Evolutionary Computation, 50, 100462, 2019) and Zeng et al. (Knowl-Based Syst, 226, 107150, 2021), Mean–Variance Mapping Optimization (MVMO) Iacca et al. (Expert Syst Appl, 165, 113902, 2021), Time-varying strategy-based Differential Evolution (TVDE) Sun et al. (Soft Comput, 24(4), 2727–2747, 2020), Butterfly Optimization Algorithm with adaptive gbest-guided search strategy and Pinhole-Imaging-based Learning (PIL-BOA)Long et al. (Appl Soft Comput, 103, 107146, 2021), Memory Guided Sine Cosine Algorithm (MG-SCA) Gupta et al. (Eng Appl Artif Intell, 93, 103718, 2020), Lévy flight Jaya Algorithm (LJA) Iacca et al. (2021), Sine Cosine Algorithm (SCA) Dhabala et al. (2021), Covariance Matrix Adaptation Evolution Strategy (CMA-ES) Hansen et al. (Evolutionary Computation, 11(1), 1–18, 2003) and Coyote Optimization Algorithm (COA) Pierezan and Coelho (2018)). The results indicate that ISSA performs better than the tested optimization algorithms.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Abstract&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;abstract&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:2,&amp;quot;range&amp;quot;:&amp;quot;327-3828&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit3&quot; id=&quot;journal&quot;&gt;Journal&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://link.springer.com/journal/10489&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;https://link.springer.com/journal/10489&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Applied Intelligence&lt;/a&gt;
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Journal&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;journal&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:3,&amp;quot;range&amp;quot;:&amp;quot;3829-&amp;quot;} --&gt;</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Thu, 31 Mar 2022 22:02:27 +0000</pubDate>
        </item>
        <item>
            <title>ai2022b</title>
            <link>https://davidjohnpaul.com/wiki/doku.php/research:ai2022b</link>
            <description>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;opposition-based_sine_cosine_optimizer_utilizing_refraction_learning_and_variable_neighborhood_search_for_feature_selection&quot;&gt;Opposition-based Sine Cosine Optimizer Utilizing Refraction Learning and Variable Neighborhood Search for Feature Selection&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://doi.org/10.1007/s10489-022-04201-z&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;https://doi.org/10.1007/s10489-022-04201-z&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Download&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;
Abed-alguni, B., Alawad, N., Al-Betar, M. A., Paul, D., “Opposition-based Sine Cosine Optimizer Utilizing Refraction Learning and Variable Neighborhood Search for Feature Selection”, Applied Intelligence 2022.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Opposition-based Sine Cosine Optimizer Utilizing Refraction Learning and Variable Neighborhood Search for Feature Selection&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;opposition-based_sine_cosine_optimizer_utilizing_refraction_learning_and_variable_neighborhood_search_for_feature_selection&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:1,&amp;quot;range&amp;quot;:&amp;quot;1-407&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit2&quot; id=&quot;abstract&quot;&gt;Abstract&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
This paper proposes new improved binary versions of the Sine Cosine Algorithm (SCA) for the Feature Selection (FS) problem. FS is an essential machine learning and data mining task of choosing a subset of highly discriminating features from noisy, irrelevant, high-dimensional, and redundant features to best represent a dataset. SCA is a recent metaheuristic algorithm established to emulate a model based on sine and cosine trigonometric functions. It was initially proposed to tackle problems in the continuous domain. The SCA has been modified to Binary SCA (BSCA) to deal with the binary domain of the FS problem. To improve the performance of BSCA, three accumulative improved variations are proposed (i.e., IBSCA1, IBSCA2, and IBSCA3) where the last version has the best performance. IBSCA1 employs Opposition Based Learning (OBL) to help ensure a diverse population of candidate solutions. IBSCA2 improves IBSCA1 by adding Variable Neighborhood Search (VNS) and Laplace distribution to support several mutation methods. IBSCA3 improves IBSCA2 by optimizing the best candidate solution using Refraction Learning (RL), a novel OBL approach based on light refraction. For performance evaluation, 19 real-wold datasets, including a COVID-19 dataset, were selected with different numbers of features, classes, and instances. Three performance measurements have been used to test the IBSCA versions: classification accuracy, number of features, and fitness values. Furthermore, the performance of the last variation of IBSCA3 is compared against 28 existing popular algorithms. Interestingly, IBCSA3 outperformed almost all comparative methods in terms of classification accuracy and fitness values. At the same time, it was ranked 15 out of 19 in terms of number of features. The overall simulation and statistical results indicate that IBSCA3 performs better than the other algorithms. 
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Abstract&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;abstract&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:2,&amp;quot;range&amp;quot;:&amp;quot;408-2321&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit3&quot; id=&quot;journal&quot;&gt;Journal&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://link.springer.com/journal/10489&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;https://link.springer.com/journal/10489&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Applied Intelligence&lt;/a&gt;
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Journal&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;journal&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:3,&amp;quot;range&amp;quot;:&amp;quot;2322-&amp;quot;} --&gt;</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Sun, 09 Oct 2022 22:29:27 +0000</pubDate>
        </item>
        <item>
            <title>am2022</title>
            <link>https://davidjohnpaul.com/wiki/doku.php/research:am2022</link>
            <description>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;attributes_of_personal_electronic_records&quot;&gt;Attributes of Personal Electronic Records&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://doi.org/10.37683/asa.v50.10421&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;https://doi.org/10.37683/asa.v50.10421&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Download&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;
Balogh, M., Billingsley, W., Paul, D., Kennan, M.A. “Attributes of Personal Electronic Records”, Archives &amp;amp; Manuscripts, 50(1), pp 47-70, 2022.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Attributes of Personal Electronic Records&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;attributes_of_personal_electronic_records&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:1,&amp;quot;range&amp;quot;:&amp;quot;1-255&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit2&quot; id=&quot;abstract&quot;&gt;Abstract&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
The purpose of this article is to identify the key attributes of personal electronic records in order to develop systems that may enable people to manage them in the home. As more personal information becomes electronic, this is increasingly necessary. Personal electronic records were identified and categorised using interviews and virtual guided tours. Three main attributes were identified: primary user-subjective categories; attributes which identify the circumstances that give rise to the records; and attributes which describe the legal validity of each record. In addition to providing an improved understanding of personal electronic records in the home, these attributes are developed into a set of potential metadata fields. 
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Abstract&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;abstract&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:2,&amp;quot;range&amp;quot;:&amp;quot;256-1017&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit3&quot; id=&quot;journal&quot;&gt;Journal&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://publications.archivists.org.au/index.php/asa&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;https://publications.archivists.org.au/index.php/asa&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Archives &amp;amp; Manuscripts&lt;/a&gt;
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Journal&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;journal&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:3,&amp;quot;range&amp;quot;:&amp;quot;1018-&amp;quot;} --&gt;</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Sat, 03 Sep 2022 05:34:06 +0000</pubDate>
        </item>
        <item>
            <title>amas2020</title>
            <link>https://davidjohnpaul.com/wiki/doku.php/research:amas2020</link>
            <description>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;revitalising_and_validating_the_novel_approach_of_xaosf_framework_under_industry_40_in_comparison_with_linear_sc&quot;&gt;Revitalising and Validating the Novel Approach of xAOSF Framework Under Industry 4.0 in Comparison with Linear SC&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://doi.org/10.1007/978-981-15-5764-4_1&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;https://doi.org/10.1007/978-981-15-5764-4_1&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Download&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;
Din F.U., Paul D., Ryan J., Henskens F., Wallis M. “Revitalising and Validating the Novel Approach of xAOSF Framework Under Industry 4.0 in Comparison with Linear SC” In Jezic G., Chen-Burger J., Kusek M., Sperka R., Howlett R., Jain L. (eds) Agents and Multi-Agent Systems: Technologies and Applications 2020. Smart Innovation, Systems and Technologies, vol 186. Springer, Singapore, 2020.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Revitalising and Validating the Novel Approach of xAOSF Framework Under Industry 4.0 in Comparison with Linear SC&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;revitalising_and_validating_the_novel_approach_of_xaosf_framework_under_industry_40_in_comparison_with_linear_sc&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:1,&amp;quot;range&amp;quot;:&amp;quot;1-579&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit2&quot; id=&quot;abstract&quot;&gt;Abstract&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
Recent literature claims that Small to Medium Size Enterprises \(SMEs\), as compared to larger setups, may not be able to experience all the benefits of the fourth industrial revolution \(Industry 4.0\). In order to bridge this gap, the Agent Oriented Smart Factory \(AOSF\) framework provides a comprehensive supply chain architecture. AOSF framework does not only provide high-level enterprise integration guidelines but also recommends a thorough implementation in the area of warehousing by providing Agent Oriented Storage and Retrieval \(AOSR\) WMS system. This paper focuses on scenario-based comparison of the extended AOSF framework with a Linear SC model, to explain substantially improved performance efficiency especially in SME-oriented warehousing. These scenario-based experiments indicate that AOSR can yield 60–148% improvement in certain Key Performance Indicators \(KPIs\), i.e. number of products stored in racks, receiving area \(RA\) and expedition areas \(EA\), in comparison with standard WMS strategies.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Abstract&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;abstract&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:2,&amp;quot;range&amp;quot;:&amp;quot;580-1633&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit3&quot; id=&quot;series&quot;&gt;Series&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://link.springer.com/bookseries/8767&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;https://link.springer.com/bookseries/8767&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Smart Innovations, Systems and Technologies&lt;/a&gt;
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Series&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;series&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:3,&amp;quot;range&amp;quot;:&amp;quot;1634-&amp;quot;} --&gt;</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Sun, 24 May 2020 22:59:31 +0000</pubDate>
        </item>
        <item>
            <title>ap2018</title>
            <link>https://davidjohnpaul.com/wiki/doku.php/research:ap2018</link>
            <description>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;on_farm_validation_of_askbill_a_sheep_wellbeing_and_productivity_application_for_australian_industry&quot;&gt;On Farm Validation of ASKBILL – A Sheep Wellbeing and Productivity Application for Australian Industry&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;http://dx.doi.org/10.1071%2FANv58n8abs&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;http://dx.doi.org/10.1071%2FANv58n8abs&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Download&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;
Fitzgerald, P. T., Kahn, L. P., Shahinfar, S., Paul, D., Goodacre, M. Kemmis, L. S. “On Farm Validation of ASKBILL – A Sheep Wellbeing and Productivity Application for Australian Industry”, Animal Production 2018: Fostering Innovation through the Value Chain, Wagga Wagga, Australia, July 2018.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;On Farm Validation of ASKBILL \u2013 A Sheep Wellbeing and Productivity Application for Australian Industry&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;on_farm_validation_of_askbill_a_sheep_wellbeing_and_productivity_application_for_australian_industry&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:1,&amp;quot;range&amp;quot;:&amp;quot;1-471&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit2&quot; id=&quot;introduction&quot;&gt;Introduction&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
The most economically important endemic diseases impacting Australian sheep wellbeing and productivity include perinatal mortalities, internal parasites, dystocia, weaner ill-thrift and mortality, and flystrike. Collectively, these diseases cost the Australian sheep industry more than A$1.5 billion per annum (Lane et al. 2015). 
ASKBILL is a web-based application developed to assist sheep producers to better manage these diseases and thereby improve flock wellbeing and productivity. The ASKBILL application encompasses numerous biophysical models that predict pasture growth, animal performance and risk from flystrike, worm infection and weather stress (Kahn et al. 2017). An important component in the on-going development of ASKBILL is on farm validation designed to allow comparison of measured and predicted values for a range of variables.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Introduction&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;introduction&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:2,&amp;quot;range&amp;quot;:&amp;quot;472-1349&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit3&quot; id=&quot;conference&quot;&gt;Conference&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;http://www.asap.asn.au/2018-conference/&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;http://www.asap.asn.au/2018-conference/&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Animal Production 2018&lt;/a&gt;
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Conference&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;conference&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:3,&amp;quot;range&amp;quot;:&amp;quot;1350-&amp;quot;} --&gt;</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Mon, 24 Jun 2019 00:14:47 +0000</pubDate>
        </item>
        <item>
            <title>ascilite2011</title>
            <link>https://davidjohnpaul.com/wiki/doku.php/research:ascilite2011</link>
            <description>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;an_investigation_into_the_learning_styles_and_self-regulated_learning_strategies_for_computer_science_students&quot;&gt;An Investigation into the Learning Styles and Self-Regulated Learning Strategies for Computer Science Students&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://davidjohnpaul.com/wiki/lib/exe/fetch.php/research:alharbi_ascilite2011.pdf&quot; class=&quot;media mediafile mf_pdf&quot; target=&quot;_self&quot; title=&quot;research:alharbi_ascilite2011.pdf (284 KB)&quot; rel=&quot;noopener&quot;&gt;Download&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;
Alharbi, A., Paul, D., Henskens, F. A. and Hannaford, M. R. “An Investigation into the Learning Styles and Self-Regulated Learning Strategies for Computer Science Students”, Changing Demands, Changing Directions. ascilite, pp. 36-46, 2011.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;An Investigation into the Learning Styles and Self-Regulated Learning Strategies for Computer Science Students&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;an_investigation_into_the_learning_styles_and_self-regulated_learning_strategies_for_computer_science_students&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:1,&amp;quot;range&amp;quot;:&amp;quot;1-415&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit2&quot; id=&quot;abstract&quot;&gt;Abstract&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
This paper examines the different learning styles and self-regulated learning strategies used by students in a core computer science course. An Index of Learning Styles and a Self-Regulated Learning Strategies Questionnaire were administered to second year students studying programming languages concepts and paradigms. Results show that aspects of students’ preferred learning styles had a significant impact on academic performance in the midterm examination. Further, consideration of the self-regulated learning strategies used by students provides evidence that some strategies are of greater benefit than others. These results have implications for future teaching of the course, and are being used to guide the development of an online collaborative learning objects repository that aims to improve self-directed student learning.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Abstract&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;abstract&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:2,&amp;quot;range&amp;quot;:&amp;quot;416-1279&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit3&quot; id=&quot;conference&quot;&gt;Conference&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
Changing Demands, Changing Directions. &lt;a href=&quot;http://www.leishman-associates.com.au/ascilite2011/&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;http://www.leishman-associates.com.au/ascilite2011/&quot; rel=&quot;ugc nofollow noopener&quot;&gt;ascilite&lt;/a&gt;
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Conference&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;conference&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:3,&amp;quot;range&amp;quot;:&amp;quot;1280-&amp;quot;} --&gt;</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Sun, 31 Jan 2016 10:18:47 +0000</pubDate>
        </item>
        <item>
            <title>ast2019</title>
            <link>https://davidjohnpaul.com/wiki/doku.php/research:ast2019</link>
            <description>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;advances_in_livestock_behavior_monitoring_based_on_accelerometer_motion_sensor&quot;&gt;Advances in livestock behavior monitoring based on accelerometer motion sensor.&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://www.cabdirect.org/cabdirect/abstract/20193290386&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;https://www.cabdirect.org/cabdirect/abstract/20193290386&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Download&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;
Guo, L, Wang, W., Kwan, P., Welch, M., Paul, D., Chen, G., Xu, B. “Advances in livestock behavior monitoring based on accelerometer motion sensor.” Journal of Agricultural Science and Technology (Beijing) 21.3, pp.94-101, 2019.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Advances in livestock behavior monitoring based on accelerometer motion sensor.&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;advances_in_livestock_behavior_monitoring_based_on_accelerometer_motion_sensor&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:1,&amp;quot;range&amp;quot;:&amp;quot;1-395&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit2&quot; id=&quot;abstract&quot;&gt;Abstract&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
Accelerometer motion sensor is widely used in animal behavior monitoring, which is an important direction of precision breeding research. This paper summarized the research of accelerometer motion sensor in animal behavior classification, introduced the wearable position of the accelerometer motion sensor on the animal body and compared the difference of its wearing in the legs and neck. The process of livestock behavior classification based on accelerometer motion sensor was discussed in detail, including the determination of sampling time window, feature vector extraction and classification algorithm construction. Automatic behavior classification was the preliminary and foundation for automatic monitoring and precision management of livestock. In the future, key technologies such as classification model construction, multi-sensor fusion and real-time data processing should be further broken through.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Abstract&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;abstract&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:2,&amp;quot;range&amp;quot;:&amp;quot;396-1334&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit3&quot; id=&quot;journal&quot;&gt;Journal&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
Journal of Agricultural Science and Technology (Beijing)
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Journal&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;journal&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:3,&amp;quot;range&amp;quot;:&amp;quot;1335-&amp;quot;} --&gt;</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Thu, 17 Feb 2022 05:30:17 +0000</pubDate>
        </item>
        <item>
            <title>bmj2017</title>
            <link>https://davidjohnpaul.com/wiki/doku.php/research:bmj2017</link>
            <description>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;development_of_an_online_smoking_cessation_program_for_use_in_hospital_and_following_dischargesmoke-free_recovery&quot;&gt;Development of an online smoking cessation program for use in hospital and following discharge: smoke-free recovery&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;http://dx.doi.org/10.1136/bmjinnov-2016-000126&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;http://dx.doi.org/10.1136/bmjinnov-2016-000126&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Download&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;
McCrabb, S., Bonevski, B., Balogh, Z., Baker, A., Harris, I. A., Attia, J., Lott, N., Naylor, J., Doran, C., George, J., Wolfenden, L., Wallis, M., Paul, D., Henskens, F., and Skelton, E. “Development of an online smoking cessation program for use in hospital and following discharge: Smoke-Free Recovery”, BMJ Innovations, 3(2), March 2017.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Development of an online smoking cessation program for use in hospital and following discharge: smoke-free recovery&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;development_of_an_online_smoking_cessation_program_for_use_in_hospital_and_following_dischargesmoke-free_recovery&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:1,&amp;quot;range&amp;quot;:&amp;quot;1-535&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit2&quot; id=&quot;abstract&quot;&gt;Abstract&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
Background Tobacco smoking can have negative health outcomes on recovery from surgery. Although it is recommended best practice to provide patients with advice to quit and follow-up support, provision of post-discharge support is rare. Developing an online smoking cessation program may help address this gap.
&lt;/p&gt;

&lt;p&gt;
Objectives This paper describes the development and pretesting of an online smoking cessation program (smoke-free recovery, SFR) tailored to the orthopaedic trauma population for use while in hospital and post-discharge.
&lt;/p&gt;

&lt;p&gt;
Methods Drawing on the DoTTI framework for developing an online program, the following steps were followed for program development: (1) design and development; (2) testing early iteration; (3) testing for effectiveness and (4) integration and implementation. This article describes the first two stages of SFR program development.
&lt;/p&gt;

&lt;p&gt;
Results SFR is a 10-module online smoking cessation program tailored for patients with orthopaedic trauma. Of the participants who completed testing early iterations, none reported any difficulties orientating themselves to the program or understanding program content. The main themes were that it was ‘helpful’, provision of ‘help to quit’ was low and SFR increased thoughts of ‘staying quit post-discharge’.
&lt;/p&gt;

&lt;p&gt;
Conclusions This study found that a theory and evidence-based approach as the basis for an online smoking cessation program for patients with orthopaedic trauma was acceptable to users. A randomised controlled trial will be conducted to examine whether the online smoking cessation program is effective in increasing smoking cessation and how it can be integrated and implemented into hospital practice (stages three and four of the DoTTI framework).
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Abstract&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;abstract&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:2,&amp;quot;range&amp;quot;:&amp;quot;536-2298&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit3&quot; id=&quot;journal&quot;&gt;Journal&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;http://innovations.bmj.com/&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;http://innovations.bmj.com/&quot; rel=&quot;ugc nofollow noopener&quot;&gt;BMJ Innovations&lt;/a&gt;
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Journal&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;journal&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:3,&amp;quot;range&amp;quot;:&amp;quot;2299-&amp;quot;} --&gt;</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Wed, 10 Jul 2024 22:41:14 +0000</pubDate>
        </item>
        <item>
            <title>citisia2023</title>
            <link>https://davidjohnpaul.com/wiki/doku.php/research:citisia2023</link>
            <description>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;using_a_memetic_algorithm_to_discover_secure_s-boxes&quot;&gt;Using A Memetic Algorithm to Discover Secure S-Boxes&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://www.citisia.org/&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;https://www.citisia.org/&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Download&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;
Tori, M., Paul, D., Billingsley, W. “Using A Memetic Algorithm to Discover Secure S-Boxes”, Conference on Innovative Technologies in Intelligent Systems &amp;amp; Industrial Applications (CITISIA2023), 2023.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Using A Memetic Algorithm to Discover Secure S-Boxes&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;using_a_memetic_algorithm_to_discover_secure_s-boxes&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:1,&amp;quot;range&amp;quot;:&amp;quot;1-308&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit2&quot; id=&quot;abstract&quot;&gt;Abstract&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
A Substitution-Box (S-Box) is a cryptographic primitive used in cyber security engineering. In this paper, we describe a Memetic Algorithm to search for so-called “Golden S-Boxes”, which have optimal cryptographic features. We replicate existing results on 4&amp;times;4 S-Boxes to demonstrate the feasibility of the approach, then describe further desirable S-Box properties to allow the algorithm to discover S-Boxes that are both secure and fast enough for lightweight cryptographic applications.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Abstract&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;abstract&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:2,&amp;quot;range&amp;quot;:&amp;quot;309-825&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit3&quot; id=&quot;conference&quot;&gt;Conference&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://www.citisia.org/&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;https://www.citisia.org/&quot; rel=&quot;ugc nofollow noopener&quot;&gt;ICWMC 2022, Conference on Innovative Technologies in Intelligent Systems &amp;amp; Industrial Applications (CITISIA2023)&lt;/a&gt;
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Conference&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;conference&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:3,&amp;quot;range&amp;quot;:&amp;quot;826-&amp;quot;} --&gt;</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 21 Nov 2023 01:57:38 +0000</pubDate>
        </item>
        <item>
            <title>dmsc2023</title>
            <link>https://davidjohnpaul.com/wiki/doku.php/research:dmsc2023</link>
            <description>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;an_examination_of_the_security_of_the_tr-31_and_as_2805_schemes&quot;&gt;An examination of the security of the TR-31 and AS 2805 schemes&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://doi.org/10.47974/JDMSC-1644&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;https://doi.org/10.47974/JDMSC-1644&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Download&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;
Van der Merwe, A., Paul, D., Schmalz, J., Schaerf, T. “An examination of the security of the TR-31 and AS 2805 schemes”, Journal of Discrete Mathematical Sciences and Cryptography, 26(6), 1761–1771, 2023.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;An examination of the security of the TR-31 and AS 2805 schemes&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;an_examination_of_the_security_of_the_tr-31_and_as_2805_schemes&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:1,&amp;quot;range&amp;quot;:&amp;quot;1-337&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit2&quot; id=&quot;abstract&quot;&gt;Abstract&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
In our review of payments cryptography, we analyze the security of the Australian card payment system. In the analysis, we examine existing cryptographic protocols using well-known techniques. We discuss the Australian Triple-DES variant methods (AS 2805) which offer key usage division. We then compare Triple-DES variants with alternative mechanisms to discover a significant weakness in the AS 2805 methods.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Abstract&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;abstract&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:2,&amp;quot;range&amp;quot;:&amp;quot;338-771&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit3&quot; id=&quot;journal&quot;&gt;Journal&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://tarupublications.com/journal/JDMSC&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;https://tarupublications.com/journal/JDMSC&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Journal of Discrete Mathematical Sciences and Cryptography&lt;/a&gt;
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Journal&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;journal&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:3,&amp;quot;range&amp;quot;:&amp;quot;772-&amp;quot;} --&gt;</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Fri, 09 Feb 2024 04:12:30 +0000</pubDate>
        </item>
        <item>
            <title>dmsc2024</title>
            <link>https://davidjohnpaul.com/wiki/doku.php/research:dmsc2024</link>
            <description>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;keyed_s-boxes_from_sponge_functions&quot;&gt;Keyed S-boxes from sponge functions&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://doi.org/10.47974/JDMSC-1724&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;https://doi.org/10.47974/JDMSC-1724&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Download&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;
Van der Merwe, A., Paul, D., Schmalz, J., Schaerf, T. “Keyed S-boxes from sponge functions”, Journal of Discrete Mathematical Sciences and Cryptography, 27(8), 2241–2254, 2024.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Keyed S-boxes from sponge functions&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;keyed_s-boxes_from_sponge_functions&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:1,&amp;quot;range&amp;quot;:&amp;quot;1-281&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit2&quot; id=&quot;abstract&quot;&gt;Abstract&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
This paper examines the generation of key-dependent S-boxes using sponge functions. In this study, we render 8-bit key-dependent S-boxes employing a novel approach that contrasts previous techniques using a mixing strategy. We test the efficiency and security of the resultant S-boxes by performing a sequence of experiments. We consider the integration of the keyed S-boxes into a symmetric cipher and determine the probability of differential cryptanalysis. We found that the maximum differential distribution is approximately 12/256 or ≈ 2&lt;sup&gt;–6&lt;/sup&gt;, with a mean of roughly 11/256 and a standard deviation of 1.2/256. Our review of other methods concludes that they have the same maximum differential distribution, while our generation method is significantly faster. We conclude by characterising future research on keyed S-boxes in a white-box context.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Abstract&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;abstract&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:2,&amp;quot;range&amp;quot;:&amp;quot;282-1169&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit3&quot; id=&quot;journal&quot;&gt;Journal&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://tarupublications.com/journal/JDMSC&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;https://tarupublications.com/journal/JDMSC&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Journal of Discrete Mathematical Sciences and Cryptography&lt;/a&gt;
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Journal&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;journal&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:3,&amp;quot;range&amp;quot;:&amp;quot;1170-&amp;quot;} --&gt;</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Wed, 29 Jan 2025 02:16:25 +0000</pubDate>
        </item>
        <item>
            <title>ehealth2014</title>
            <link>https://davidjohnpaul.com/wiki/doku.php/research:ehealth2014</link>
            <description>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;the_haematology_treatment_aidproviding_personalized_information_to_patients_and_carers&quot;&gt;The Haematology Treatment Aid: Providing Personalized Information to Patients and Carers&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://davidjohnpaul.com/wiki/lib/exe/fetch.php/research:paul_ehealth2014.pdf&quot; class=&quot;media mediafile mf_pdf&quot; target=&quot;_self&quot; title=&quot;research:paul_ehealth2014.pdf (113 KB)&quot; rel=&quot;noopener&quot;&gt;Download&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;
Paul, D., Henskens, F. A., Bryant, J., Smits, R., Sanson-Fisher, R.W., and Stevenson, W. “The Haematology Treatment Aid: Providing Personalized Information to Patients and Carers”, The 6th International Conference on e-Health, Lisbon, Portugal, IADIS, pp. 372-376, July 2014.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;The Haematology Treatment Aid: Providing Personalized Information to Patients and Carers&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;the_haematology_treatment_aidproviding_personalized_information_to_patients_and_carers&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:1,&amp;quot;range&amp;quot;:&amp;quot;1-425&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit2&quot; id=&quot;abstract&quot;&gt;Abstract&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
This paper describes a Web-based tool to provide information and support to patients and carers of people diagnosed with haematological cancers. The Web site provides customized information relevant to the type of cancer the individual has, the treatment options available to the patient at the current stage of their illness, and the support services located near the patient. The application has been designed to allow new information to be entered into the system, including new levels of customization, with minimal extra development. This allows required changes to be implemented quickly and easily without compromising the quality of the system.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Abstract&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;abstract&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:2,&amp;quot;range&amp;quot;:&amp;quot;426-1101&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit3&quot; id=&quot;conference&quot;&gt;Conference&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;http://www.ehealth-conf.org/&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;http://www.ehealth-conf.org/&quot; rel=&quot;ugc nofollow noopener&quot;&gt;The 6th International Conference on e-Health&lt;/a&gt;
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Conference&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;conference&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:3,&amp;quot;range&amp;quot;:&amp;quot;1102-&amp;quot;} --&gt;</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Sun, 31 Jan 2016 10:18:47 +0000</pubDate>
        </item>
        <item>
            <title>ehealth2014b</title>
            <link>https://davidjohnpaul.com/wiki/doku.php/research:ehealth2014b</link>
            <description>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;how_do_health_researchers_benefit_from_web-based_survey_systems&quot;&gt;How do Health Researchers Benefit from Web-based Survey Systems?&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://davidjohnpaul.com/wiki/lib/exe/fetch.php/research:henskens_ehealth2014.pdf&quot; class=&quot;media mediafile mf_pdf&quot; target=&quot;_self&quot; title=&quot;research:henskens_ehealth2014.pdf (157.9 KB)&quot; rel=&quot;noopener&quot;&gt;Download&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;
Henskens, F. A., Paul, D., Wallis, M., Bryant, J., Carey, M., Fradgley, E., Koller, C. E., Paul, C. L., Sanson-Fisher, R. W., and Zucca, A. “How do Health Researchers Benefit from Web-based Survey Systems?”, The 6th International Conference on e-Health, Lisbon, Portugal, IADIS, pp. 254-262, July 2014.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;How do Health Researchers Benefit from Web-based Survey Systems?&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;how_do_health_researchers_benefit_from_web-based_survey_systems&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:1,&amp;quot;range&amp;quot;:&amp;quot;1-432&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit2&quot; id=&quot;abstract&quot;&gt;Abstract&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
This paper discusses the needs of researchers working in areas of medical research in which the collection and analysis of people’s opinions is central to the research activity. Until quite recently, collection of survey data has been either paper- based, or achieved using computer software that largely duplicates paper-based processes with limited additional functionality. The authors, who have developed and used many Web-based surveys in their health-related research, discuss the needs of health researchers who use surveys and similar tools to collect research data, and propose a set of functionalities that efficiently satisfies those needs. A Web-based software architecture that delivers on researchers’ identified needs is presented, and an example implementation that has demonstrated its capabilities in recent research projects is introduced.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Abstract&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;abstract&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:2,&amp;quot;range&amp;quot;:&amp;quot;433-1318&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit3&quot; id=&quot;conference&quot;&gt;Conference&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;http://www.ehealth-conf.org/&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;http://www.ehealth-conf.org/&quot; rel=&quot;ugc nofollow noopener&quot;&gt;The 6th International Conference on e-Health&lt;/a&gt;
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Conference&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;conference&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:3,&amp;quot;range&amp;quot;:&amp;quot;1319-&amp;quot;} --&gt;</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Sun, 31 Jan 2016 10:18:47 +0000</pubDate>
        </item>
        <item>
            <title>emfm2018</title>
            <link>https://davidjohnpaul.com/wiki/doku.php/research:emfm2018</link>
            <description>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;merger_and_acquisition_pricing_using_agent_based_modelling&quot;&gt;Merger and Acquisition Pricing using Agent Based Modelling&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;http://doi.org/10.22381/EMFM13120184&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;http://doi.org/10.22381/EMFM13120184&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Download&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;
Agarwal, N., Kwan, P., and Paul, D. “Merger and Acquisition Pricing using Agent Based Modelling”, Economics, Management, and Financial Markets, 13(1), pp. 84-99, January 2018.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Merger and Acquisition Pricing using Agent Based Modelling&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;merger_and_acquisition_pricing_using_agent_based_modelling&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:1,&amp;quot;range&amp;quot;:&amp;quot;1-302&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit2&quot; id=&quot;abstract&quot;&gt;Abstract&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
Merger &amp;amp; Acquisition pricing utilises traditional financial models like Discount Cash flow analysis and industry multiples. These methods do not consider behaviour finance biases, for example, prospect theory (Kahneman and Tversky 1979). This paper analyses merger &amp;amp; acquisition pricing using behavioural bias of risk aversion (acquiring company behavioural trait) and optimism (target company trait). It then extends the study to include loss aversion from prospect theory, differences in the way humans view gains and losses based on low or high probability based on cumulative prospect theory, and finally the certainty effect (where humans prefer certain outcome to probabilistic outcomes). All these factors have an impact on merger &amp;amp; acquisition pricing for potential deals as acquiring and target companies behave differently and such impacts are not considered by traditional finance models. Results show that as loss aversion reduces, the positive impact of risk taking and optimism behaviours improve. Also, probabilistic gains and losses can have a positive impact, but certainty has the greatest impact. Humans prefer certain outcomes and acquirers and target company behaviours are more effective in such conditions with increasing utility for both parties under such circumstances. However, in the multiple acquirer setting, competition between the acquirer significantly increases the utility, and the loss aversion co-efficient works in the opposite direction as the perceptive difference between gains and losses decreases.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Abstract&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;abstract&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:2,&amp;quot;range&amp;quot;:&amp;quot;303-1866&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit3&quot; id=&quot;journal&quot;&gt;Journal&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://addletonacademicpublishers.com/about-emfm&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;https://addletonacademicpublishers.com/about-emfm&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Economics, Management, and Financial Markets&lt;/a&gt;
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Journal&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;journal&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:3,&amp;quot;range&amp;quot;:&amp;quot;1867-&amp;quot;} --&gt;</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Thu, 11 Jan 2018 06:04:02 +0000</pubDate>
        </item>
        <item>
            <title>eres2009</title>
            <link>https://davidjohnpaul.com/wiki/doku.php/research:eres2009</link>
            <description>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;an_example_of_eresearchthe_australian_schizophrenia_research_bank&quot;&gt;An Example of eResearch: The Australian Schizophrenia Research Bank&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
Henskens, F. A., Carr, V. J., Catts, S. V., Jablensky, A., Michie, P. T., Loughland, C. M., Mowry, B. J., Nasir, A., Pantelis, C., Paul, D., Rasser, P., Richards, J. M., Schall, U. and Scott, R. J., “An Example of eResearch: The Australian Schizophrenia Research Bank”, eResearch Australasia (ERes2009), November 2009.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;An Example of eResearch: The Australian Schizophrenia Research Bank&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;an_example_of_eresearchthe_australian_schizophrenia_research_bank&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:1,&amp;quot;range&amp;quot;:&amp;quot;1-403&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit2&quot; id=&quot;abstract&quot;&gt;Abstract&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
A case study of the Australian Schizophrenia Research Bank.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Abstract&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;abstract&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:2,&amp;quot;range&amp;quot;:&amp;quot;404-486&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit3&quot; id=&quot;conference&quot;&gt;Conference&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;http://conference.eresearch.edu.au/eres2009/&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;http://conference.eresearch.edu.au/eres2009/&quot; rel=&quot;ugc nofollow noopener&quot;&gt;eResearch Australasia&lt;/a&gt;
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Conference&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;conference&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:3,&amp;quot;range&amp;quot;:&amp;quot;487-&amp;quot;} --&gt;</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Sun, 31 Jan 2016 07:13:11 +0000</pubDate>
        </item>
        <item>
            <title>eres2013</title>
            <link>https://davidjohnpaul.com/wiki/doku.php/research:eres2013</link>
            <description>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;improving_the_australian_schizophrenia_research_bank&quot;&gt;Improving the Australian Schizophrenia Research Bank&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
Paul, D., Henskens, F. A. and Bridge, J. “Improving the Australian Schizophrenia Research Bank”, eResearch Australasia (eRes2013), 2013.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Improving the Australian Schizophrenia Research Bank&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;improving_the_australian_schizophrenia_research_bank&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:1,&amp;quot;range&amp;quot;:&amp;quot;1-206&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit2&quot; id=&quot;abstract&quot;&gt;Abstract&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
The Australian Schizophrenia Research Bank (ASRB) is a long-running eResearch project that collects, manages, and provides mediated access to a large set of data in order to facilitate schizophrenia research. This includes the collation of clinical interviews, brain scans, and blood samples, and the keeping of a registry of participants interested in further research, including both people with schizophrenia and healthy controls. Since its inception in 2005, the ASRB has collected data from approximately 2000 participants, and has supported over 65 research projects.
As with any large endeavour, the needs of the ASRB have changed over time. In order to ensure the ASRB software systems continue to meet these changing needs, the project has undergone continual development, involving phases of both in-house and external software engineering. This presentation provides a case study describing how modifications and improvements to the ASRB software system have been implemented, and includes lessons learned which may be useful for similarly scaled projects.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Abstract&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;abstract&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:2,&amp;quot;range&amp;quot;:&amp;quot;207-1297&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit3&quot; id=&quot;conference&quot;&gt;Conference&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;http://conference.eresearch.edu.au/eres2013/&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;http://conference.eresearch.edu.au/eres2013/&quot; rel=&quot;ugc nofollow noopener&quot;&gt;eResearch Australasia 2013&lt;/a&gt;
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Conference&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;conference&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:3,&amp;quot;range&amp;quot;:&amp;quot;1298-&amp;quot;} --&gt;</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Sun, 31 Jan 2016 07:13:10 +0000</pubDate>
        </item>
        <item>
            <title>fi2021</title>
            <link>https://davidjohnpaul.com/wiki/doku.php/research:fi2021</link>
            <description>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;aosr_20a_novel_approach_and_thorough_validation_of_an_agent-oriented_storage_and_retrieval_wms_planner_for_smes_under_industry_40&quot;&gt;AOSR 2.0: A Novel Approach and Thorough Validation of an Agent-Oriented Storage and Retrieval WMS Planner for SMEs, under Industry 4.0&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://doi.org/10.3390/fi13060155&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;https://doi.org/10.3390/fi13060155&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Download&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;
Ud Din, F., Paul, D., Ryan, J., Henskens, F., Wallis, M. “AOSR 2.0: A Novel Approach and Thorough Validation of Agent Oriented Storage and Retrieval WMS planner for SMEs, under Industry 4.0”, Future Internet, 13(6), 155, June 2021.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;AOSR 2.0: A Novel Approach and Thorough Validation of an Agent-Oriented Storage and Retrieval WMS Planner for SMEs, under Industry 4.0&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;aosr_20a_novel_approach_and_thorough_validation_of_an_agent-oriented_storage_and_retrieval_wms_planner_for_smes_under_industry_40&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:1,&amp;quot;range&amp;quot;:&amp;quot;1-432&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit2&quot; id=&quot;abstract&quot;&gt;Abstract&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
The Fourth Industrial Revolution (Industry 4.0), with the help of cyber-physical systems (CPS), the Internet of Things (IoT), and Artificial Intelligence (AI), is transforming the way industrial setups are designed. Recent literature has provided insight about large firms gaining benefits from Industry 4.0, but many of these benefits do not translate to SMEs. The agent-oriented smart factory (AOSF) framework provides a solution to help bridge the gap between Industry 4.0 frameworks and SME-oriented setups by providing a general and high-level supply chain (SC) framework and an associated agent-oriented storage and retrieval (AOSR)-based warehouse management strategy. This paper presents the extended heuristics of the AOSR algorithm and details how it improves the performance efficiency in an SME-oriented warehouse. A detailed discussion on the thorough validation via scenario-based experimentation and test cases explain how AOSR yielded 60–148% improved performance metrics in certain key areas of a warehouse.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Abstract&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;abstract&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:2,&amp;quot;range&amp;quot;:&amp;quot;433-1482&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit3&quot; id=&quot;journal&quot;&gt;Journal&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://www.mdpi.com/journal/futureinternet&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;https://www.mdpi.com/journal/futureinternet&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Future Internet&lt;/a&gt; - Special Issue &lt;a href=&quot;https://www.mdpi.com/journal/futureinternet/special_issues/IIoT_SMS&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;https://www.mdpi.com/journal/futureinternet/special_issues/IIoT_SMS&quot; rel=&quot;ugc nofollow noopener&quot;&gt;&amp;quot;Industrial Internet of Things (IIoT) and Smart Manufacturing Systems&amp;quot;&lt;/a&gt;
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Journal&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;journal&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:3,&amp;quot;range&amp;quot;:&amp;quot;1483-&amp;quot;} --&gt;</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Wed, 16 Jun 2021 03:04:13 +0000</pubDate>
        </item>
        <item>
            <title>frontiers2021</title>
            <link>https://davidjohnpaul.com/wiki/doku.php/research:frontiers2021</link>
            <description>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;women_s_rugby_leaguepositional_groups_and_peak_locomotor_demands&quot;&gt;Women&amp;#039;s Rugby League: Positional Groups and Peak Locomotor Demands&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://doi.org/10.3389/fspor.2021.648126&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;https://doi.org/10.3389/fspor.2021.648126&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Download&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;
Cummins, C., Charlton, G., Paul, D., Shorter, K., Buxton, S., Caia, J., Murphy, A. “Women’s rugby league: Positional groups and peak locomotor demands ”, Frontiers in Sports and Active Living, 3, 2021.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Women&amp;#039;s Rugby League: Positional Groups and Peak Locomotor Demands&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;women_s_rugby_leaguepositional_groups_and_peak_locomotor_demands&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:1,&amp;quot;range&amp;quot;:&amp;quot;1-344&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit2&quot; id=&quot;abstract&quot;&gt;Abstract&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
The aims of this study were to (a) use a data-based approach to identify positional groups within National Rugby League Women&amp;#039;s (NRLW) match-play and (b) quantify the peak locomotor demands of NRLW match-play by positional groups. Microtechnology (Global Navigational Satellite System [GNSS] and integrated inertial sensors; n = 142 files; n = 76 players) and match statistics (n = 238 files; n = 80 players) were collected from all NRLW teams across the 2019 season. Data-based clustering of match statistics was utilized to identify positional clusters through classifying individual playing positions into distinct positional groups. Moving averages (0.5, 1, 2, 3, 5, and 10 min) of peak running and average acceleration/deceleration demands were calculated via microtechnology data for each player per match. All analysis was undertaken in R (R Foundation for Statistical Computing) with positional differences determined via a linear mixed model and effect sizes (ES). Data-based clustering suggested that, when informed by match statistics, individual playing positions can be clustered into one of three positional groups. Based on the clustering of the individual positions, these groups could be broadly defined as backs (fullback, wing, and center), adjustables (halfback, five-eighth, and hooker), and forwards (prop, second-row, and lock). Backs and adjustables demonstrated greater running (backs: ES 0.51–1.00; p &amp;lt; 0.05; adjustables: ES 0.51–0.74, p &amp;lt; 0.05) and average acceleration/deceleration (backs: ES 0.48–0.87; p &amp;lt; 0.05; adjustables: ES 0.60–0.85, p &amp;lt; 0.05) demands than forwards across all durations. Smaller differences (small to trivial) were noted between backs and adjustables across peak running and average acceleration/deceleration demands. Such findings suggest an emerging need to delineate training programs in situations in which individual playing positions train in positional group based settings. Collectively, this work informs the positional groupings that could be applied when examining NRLW data and supports the development of a framework for specifically training female rugby league players for the demands of the NRLW competition.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Abstract&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;abstract&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:2,&amp;quot;range&amp;quot;:&amp;quot;345-2552&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit3&quot; id=&quot;journal&quot;&gt;Journal&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://www.frontiersin.org/journals/sports-and-active-living&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;https://www.frontiersin.org/journals/sports-and-active-living&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Frontiers in Sports and Active Living&lt;/a&gt;
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Journal&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;journal&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:3,&amp;quot;range&amp;quot;:&amp;quot;2553-&amp;quot;} --&gt;</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Sun, 04 Jul 2021 23:27:54 +0000</pubDate>
        </item>
        <item>
            <title>healthinf2009</title>
            <link>https://davidjohnpaul.com/wiki/doku.php/research:healthinf2009</link>
            <description>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;it_support_for_the_australian_schizophrenia_research_bank&quot;&gt;IT Support for the Australian Schizophrenia Research Bank&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://davidjohnpaul.com/wiki/lib/exe/fetch.php/research:henskens_healthinf2009.pdf&quot; class=&quot;media mediafile mf_pdf&quot; target=&quot;_self&quot; title=&quot;research:henskens_healthinf2009.pdf (142.2 KB)&quot; rel=&quot;noopener&quot;&gt;Download&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;
Henskens, F. A., Loughland, C. M., Aphale, M. S., Paul, D., Richards, J. M., Rasser, P., Carr, V. J., Catts, S. V., Jablensky, A., Michie, P. T., Mowry, B. J., Pantelis, C., Schall, U. and Scott, R. J. “IT Support for the Australian Schizophrenia Research Bank”, The 2nd International Conference on Health Informatics (HealthInf2009), Porto, Portugal, INSTICC, pp. 405-410, January 2009.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;IT Support for the Australian Schizophrenia Research Bank&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;it_support_for_the_australian_schizophrenia_research_bank&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:1,&amp;quot;range&amp;quot;:&amp;quot;1-512&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit2&quot; id=&quot;abstract&quot;&gt;Abstract&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
Schizophrenia represents one of the most perplexing and challenging problems confronting both researchers and health-care providers today. An Australian coalition of researchers has commenced construction of a resource termed the Australian Schizophrenia Research Bank (ASRB), which intends to support a wide spectrum of schizophrenia research studies. Software has been written to implement of a series of clinical assessment instruments, and a purpose-built Globus Grid constructed to provide secure aggregation and storage of the collected data. This paper describes the design, technology selections and implementation of the extant computer infrastructure, and discusses planned extensions and enhancements.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Abstract&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;abstract&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:2,&amp;quot;range&amp;quot;:&amp;quot;513-1248&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit3&quot; id=&quot;conference&quot;&gt;Conference&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;http://www.healthinf.biostec.org/HEALTHINF2009/&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;http://www.healthinf.biostec.org/HEALTHINF2009/&quot; rel=&quot;ugc nofollow noopener&quot;&gt; The 2nd International Conference on Health Informatics&lt;/a&gt;
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Conference&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;conference&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:3,&amp;quot;range&amp;quot;:&amp;quot;1249-&amp;quot;} --&gt;</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Sun, 31 Jan 2016 10:18:47 +0000</pubDate>
        </item>
        <item>
            <title>healthinf2012</title>
            <link>https://davidjohnpaul.com/wiki/doku.php/research:healthinf2012</link>
            <description>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;it_development_and_management_of_a_live_e-research_systemexperiences_with_the_australian_schizophrenia_research_bank&quot;&gt;IT Development and Management of a Live e-Research System: Experiences with the Australian Schizophrenia Research Bank&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://davidjohnpaul.com/wiki/lib/exe/fetch.php/research:paul_healthinf2012.pdf&quot; class=&quot;media mediafile mf_pdf&quot; target=&quot;_self&quot; title=&quot;research:paul_healthinf2012.pdf (180.2 KB)&quot; rel=&quot;noopener&quot;&gt;Download&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;
Paul, D. Henskens, F.A. Loughland C.M., Bridge, J., McCabe K., Carr, V.J., Catts, S.V., Jablensky, A., Michie, P.T., Mowry, B.J., Pantelis, C., Schall, U. and Scott, R.J., “IT Development and Management of a Live e-Research System: Experiences with the Australian Schizophrenia Research Bank”, The 5th International Conference on Health Informatics (HealthInf2012), Vilamoura, Portugal, INSTICC, pp. 125-130, 2012.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;IT Development and Management of a Live e-Research System: Experiences with the Australian Schizophrenia Research Bank&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;it_development_and_management_of_a_live_e-research_systemexperiences_with_the_australian_schizophrenia_research_bank&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:1,&amp;quot;range&amp;quot;:&amp;quot;1-596&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit2&quot; id=&quot;abstract&quot;&gt;Abstract&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
The Australian Schizophrenia Research Bank (ASRB) is a nationwide eResearch project that aims to facilitate scientific research into one of the most perplexing and challenging mental disorders facing researchers today. The system is accessed through a Web portal and, subject to ethics approvals, allows researchers access to subsets of the clinical, neuropsychological, and genetic data collected by the project. This paper describes the day-to-day experiences in the on-going development and management of the ASRB IT systems, including current practices, lessons learned, and areas where improvement is required.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Abstract&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;abstract&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:2,&amp;quot;range&amp;quot;:&amp;quot;597-1235&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit3&quot; id=&quot;conference&quot;&gt;Conference&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;http://www.healthinf.biostec.org/Healthinf2012/&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;http://www.healthinf.biostec.org/Healthinf2012/&quot; rel=&quot;ugc nofollow noopener&quot;&gt;The 5th International Conference on Health Informatics&lt;/a&gt;
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Conference&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;conference&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:3,&amp;quot;range&amp;quot;:&amp;quot;1236-&amp;quot;} --&gt;</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Sun, 31 Jan 2016 10:18:47 +0000</pubDate>
        </item>
        <item>
            <title>healthinf2014</title>
            <link>https://davidjohnpaul.com/wiki/doku.php/research:healthinf2014</link>
            <description>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;web-based_support_for_population-based_medical_research_-_presenting_the_quon_survey_system&quot;&gt;Web-based Support for Population-based Medical Research - Presenting the QuON Survey System&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://davidjohnpaul.com/wiki/lib/exe/fetch.php/research:henskens_healthinf2014.pdf&quot; class=&quot;media mediafile mf_pdf&quot; target=&quot;_self&quot; title=&quot;research:henskens_healthinf2014.pdf (261.3 KB)&quot; rel=&quot;noopener&quot;&gt;Download&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;
Henskens, F. A., Paul, D., Wallis, M., Bryant, J., Carey, M., Fradgley, E., Koller, C. E., Paul, C. L., Sanson-Fisher, R. W. and Zucca, A., “Web-based Support for Population-based Medical Research - Presenting the QuON Survey System”, The 7th International Conference on Health Informatics (HealthInf2014), Eseo, Angers, Loire Valley, France, INSTICC, 2014.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Web-based Support for Population-based Medical Research - Presenting the QuON Survey System&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;web-based_support_for_population-based_medical_research_-_presenting_the_quon_survey_system&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:1,&amp;quot;range&amp;quot;:&amp;quot;1-516&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit2&quot; id=&quot;abstract&quot;&gt;Abstract&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
This paper discusses the needs of medical researchers working in the area of patient-centred medicine, in particular their use of survey data in measuring patient opinions, needs, perceived quality of care received, and priorities of health service interventions. Until quite recently, collection of survey data has been either paper-based, or achieved using computer software that largely duplicated paper-based processes with limited additional functionality. The authors investigate the use of web-based technology to support collection of such data from patients, including experiences and observations on enhanced/additional functionality made possible by its adoption. A novel software design termed QuON is presented, together with examples of its capabilities and uses in current research projects.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Abstract&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;abstract&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:2,&amp;quot;range&amp;quot;:&amp;quot;517-1346&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit3&quot; id=&quot;conference&quot;&gt;Conference&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;http://www.healthinf.biostec.org/?y=2014&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;http://www.healthinf.biostec.org/?y=2014&quot; rel=&quot;ugc nofollow noopener&quot;&gt;The 7th International Conference on Health Informatics&lt;/a&gt;
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Conference&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;conference&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:3,&amp;quot;range&amp;quot;:&amp;quot;1347-&amp;quot;} --&gt;</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Sun, 31 Jan 2016 10:18:47 +0000</pubDate>
        </item>
        <item>
            <title>i2ct2018</title>
            <link>https://davidjohnpaul.com/wiki/doku.php/research:i2ct2018</link>
            <description>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;clone_detection_in_model-based_development_using_formal_methods_to_enhance_performance_in_software_development&quot;&gt;Clone Detection in Model-Based Development Using Formal Methods to Enhance Performance in Software Development&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://doi.org/10.1109/I2CT.2018.8529446&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;https://doi.org/10.1109/I2CT.2018.8529446&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Download&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;
Hk, J., Henskens, F., Paul, D., Wallis, M. Clone Detection in Model-Based Development Using Formal Methods to Enhance Performance in Software Development, In 3rd International Conference for Convergence in Technology (I2CT), Pune, India, IEEE, April 2018.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Clone Detection in Model-Based Development Using Formal Methods to Enhance Performance in Software Development&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;clone_detection_in_model-based_development_using_formal_methods_to_enhance_performance_in_software_development&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:1,&amp;quot;range&amp;quot;:&amp;quot;1-439&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit2&quot; id=&quot;abstract&quot;&gt;Abstract&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
Clone detection is gaining more attention due to its advantages of software maintenance. Clone detection helps in code optimization (code present in multiple locations can be updated and optimized once), bug detection (discovering bugs that are copied to multiple locations in the code), and analysis of re-used code in software systems. Importantly, model-based software development is gaining more popularity due to its reduced production time and cost. There are several approaches to detect clones in the code level, but few methods to detect clones at the model level. These methods use syntactic based analysis of models to detect clones at the model level. In this paper, we present a novel approach to detect clones at model-based levels using semantic based analysis. Our method is based on model checking which involves mathematical based analysis. Our method is tested with control flow based models and yields good results in detection of model clones.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Abstract&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;abstract&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:2,&amp;quot;range&amp;quot;:&amp;quot;440-1427&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit3&quot; id=&quot;conference&quot;&gt;Conference&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8509796&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;https://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8509796&quot; rel=&quot;ugc nofollow noopener&quot;&gt;International Conference for Convergence in Technology (I2CT)&lt;/a&gt;
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Conference&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;conference&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:3,&amp;quot;range&amp;quot;:&amp;quot;1428-&amp;quot;} --&gt;</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Fri, 12 Jun 2020 05:04:30 +0000</pubDate>
        </item>
        <item>
            <title>ic3i2016</title>
            <link>https://davidjohnpaul.com/wiki/doku.php/research:ic3i2016</link>
            <description>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;verification_of_interactive_automated_air_traffic_control_system_in_a_model_driven_approach&quot;&gt;Verification of Interactive Automated Air Traffic Control System in a Model Driven Approach&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://doi.org/10.1109/IC3I.2016.7918799&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;https://doi.org/10.1109/IC3I.2016.7918799&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Download&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;
Jnanamurthy HK, Henskens, F. A. and Paul, D. “Verification of Interactive Automated Air Traffic Control System in a Model Driven Approach”, 2nd International Conference on Contemporary Computing and Informatics (IC3I 2016), December 2016.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Verification of Interactive Automated Air Traffic Control System in a Model Driven Approach&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;verification_of_interactive_automated_air_traffic_control_system_in_a_model_driven_approach&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:1,&amp;quot;range&amp;quot;:&amp;quot;1-403&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit2&quot; id=&quot;abstract&quot;&gt;Abstract&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
Nowadays, Model-Driven Architectures (MDAs) are gaining more popularity because they offer an increase in productivity by improving compatibility between systems (reuse of standardized models), simplifying the process of design (models of recurring design patterns in the application domain), and supporting communication between individuals and different teams working on the system. Development of MDA software systems requires high integrity, with verification before deployment in critical applications. Verifying different properties of the system at the beginning of the development is highly desirable as the first line of defense against design faults. In this paper, we have modeled an Automated Air Traffic Control System (AATCS) using MDA and converted into the Process Meta Language (PROMELA) model, which is used by Simple Promela Interpreter (SPIN) model checker for verification. The entities in our model are Airplane, Ground Station, SWIM data and Data store. The communication between entities is modeled as transitions. The model is checked for conformance with its specifications to detect flaws using formal techniques to improve reliability and quality.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Abstract&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;abstract&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:2,&amp;quot;range&amp;quot;:&amp;quot;404-1602&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit3&quot; id=&quot;conference&quot;&gt;Conference&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;http://ic3i.aconf.org/en-us/index.html&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;http://ic3i.aconf.org/en-us/index.html&quot; rel=&quot;ugc nofollow noopener&quot;&gt;2nd International Conference on Contemporary Computing and Informatics (IC3I 2016)&lt;/a&gt;
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Conference&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;conference&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:3,&amp;quot;range&amp;quot;:&amp;quot;1603-&amp;quot;} --&gt;</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Thu, 12 May 2022 03:51:57 +0000</pubDate>
        </item>
        <item>
            <title>icit2019</title>
            <link>https://davidjohnpaul.com/wiki/doku.php/research:icit2019</link>
            <description>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;analysis_of_industrial_control_system_software_to_detect_semantic_clones&quot;&gt;Analysis of Industrial Control System Software to Detect Semantic Clones&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;http://hdl.handle.net/1959.13/1400268&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;http://hdl.handle.net/1959.13/1400268&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Download&lt;/a&gt; &lt;a href=&quot;https://doi.org/10.1109/ICIT.2019.8754957&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;https://doi.org/10.1109/ICIT.2019.8754957&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Download&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;
HK, J., Jetley, R., Henskens, F., Paul, D., Wallis, M., SD, S. “Analysis of Industrial Control System Software to Detect Semantic Clones”, International Conference on Industrial Technology (ICIT19), Melbourne, Australia, IEEE, February 2019.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Analysis of Industrial Control System Software to Detect Semantic Clones&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;analysis_of_industrial_control_system_software_to_detect_semantic_clones&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:1,&amp;quot;range&amp;quot;:&amp;quot;1-438&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit2&quot; id=&quot;abstract&quot;&gt;Abstract&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
The detection of software clones is gaining more attention due to the advantages it can bring to software maintenance. Clone detection helps in code optimization (code present in multiple locations can be updated and optimized once), bug detection (discovering bugs that are copied to various locations in the code), and analysis of re-used code in software systems. There are several approaches to detect clones at the code level, but existing methods do not address the issue of clone detection in the PLC-based IEC 61131-3 languages. In this paper, we present a novel approach to detect clones in PLC-based IEC 61131-3 software using semantic-based analysis. For the semantic analysis, we use I/O based dependency analysis to detect PLC program clones. Our approach is a semantic-based technique to identify clones, making it feasible even for large code bases. Further, experiments indicate that the proposed method is successful in identifying software clones.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Abstract&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;abstract&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:2,&amp;quot;range&amp;quot;:&amp;quot;439-1427&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit3&quot; id=&quot;conference&quot;&gt;Conference&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;http://www.ieee-icit2019.org/&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;http://www.ieee-icit2019.org/&quot; rel=&quot;ugc nofollow noopener&quot;&gt;IEEE International Conference on Industrial Technology (ICIT19)&lt;/a&gt;
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Conference&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;conference&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:3,&amp;quot;range&amp;quot;:&amp;quot;1428-&amp;quot;} --&gt;</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Fri, 09 Feb 2024 04:17:00 +0000</pubDate>
        </item>
        <item>
            <title>icita2016</title>
            <link>https://davidjohnpaul.com/wiki/doku.php/research:icita2016</link>
            <description>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;implementation_and_evaluation_of_a_component-based_framework_for_internet_applications&quot;&gt;Implementation and Evaluation of a Component-Based framework for Internet Applications&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;http://www.icita.org/2016/papers.htm&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;http://www.icita.org/2016/papers.htm&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Download&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;
Wallis, M., Henskens, F. A., Paul, D., and Hannaford, M. “Implementation and Evaluation of a Component-Based framework for Internet Applications”, 11th International Conference on Information Technology and Applications (ICITA2016), July 2016.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Implementation and Evaluation of a Component-Based framework for Internet Applications&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;implementation_and_evaluation_of_a_component-based_framework_for_internet_applications&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:1,&amp;quot;range&amp;quot;:&amp;quot;1-398&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit2&quot; id=&quot;abstract&quot;&gt;Abstract&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
In previous publications we have introduced the concept of using a component-based software engineering paradigm to build Internet-enabled applications. We have proposed that this design allows for greater flexibility in deployment, better utilisation of resources and a reduction in total application development effort. We have described a system and realised that system as an &lt;abbr title=&quot;Application Programming Interface&quot;&gt;API&lt;/abbr&gt; that can be used to design, build and execute such components. In this report we provide an overview of the key system components and present an implementation of an application developed using the system. We use this application to perform experimental and functional comparisons to show that the system provides advancements over the status quo.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Abstract&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;abstract&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:2,&amp;quot;range&amp;quot;:&amp;quot;399-1153&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit3&quot; id=&quot;conference&quot;&gt;Conference&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;http://www.icita.org/2016/home.htm&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;http://www.icita.org/2016/home.htm&quot; rel=&quot;ugc nofollow noopener&quot;&gt;The 11th International Conference on Information Technology and Applications&lt;/a&gt;
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Conference&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;conference&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:3,&amp;quot;range&amp;quot;:&amp;quot;1154-&amp;quot;} --&gt;</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Sun, 31 Jul 2016 23:22:46 +0000</pubDate>
        </item>
        <item>
            <title>icita2017</title>
            <link>https://davidjohnpaul.com/wiki/doku.php/research:icita2017</link>
            <description>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;implementation_and_evaluation_of_a_component-based_framework_for_internet_applications&quot;&gt;Implementation and Evaluation of a Component-Based framework for Internet Applications&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;http://hdl.handle.net/1959.13/1332630&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;http://hdl.handle.net/1959.13/1332630&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Download&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;
Wallis, M., Henskens, F. A., Paul, D., and Hannaford, M. “Implementation and Evaluation of a Component-Based framework for Internet Applications”, Information Technology in Industry, 5(1), pp. 16-23, March 2017.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Implementation and Evaluation of a Component-Based framework for Internet Applications&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;implementation_and_evaluation_of_a_component-based_framework_for_internet_applications&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:1,&amp;quot;range&amp;quot;:&amp;quot;1-367&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit2&quot; id=&quot;description&quot;&gt;Description&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
A journal version of &lt;a href=&quot;https://davidjohnpaul.com/wiki/doku.php/research:icita2016&quot; class=&quot;wikilink1&quot; target=&quot;_self&quot; title=&quot;research:icita2016&quot; data-wiki-id=&quot;research:icita2016&quot;&gt;&amp;quot;Implementation and Evaluation of a Component-Based framework for Internet Applications&amp;quot;&lt;/a&gt;
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Description&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;description&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:2,&amp;quot;range&amp;quot;:&amp;quot;368-517&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit3&quot; id=&quot;journal&quot;&gt;Journal&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;http://www.it-in-industry.org/index.php/itii&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;http://www.it-in-industry.org/index.php/itii&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Information Technology in Industry&lt;/a&gt;
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Journal&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;journal&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:3,&amp;quot;range&amp;quot;:&amp;quot;518-&amp;quot;} --&gt;</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 12 May 2020 23:07:01 +0000</pubDate>
        </item>
        <item>
            <title>icwmc2022</title>
            <link>https://davidjohnpaul.com/wiki/doku.php/research:icwmc2022</link>
            <description>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;considerations_when_designing_sponge-based_extendable-output_functions_for_lightweight_and_mobile_devices&quot;&gt;Considerations When Designing Sponge-based Extendable-Output Functions for Lightweight and Mobile Devices&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://hdl.handle.net/1959.11/55333&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;https://hdl.handle.net/1959.11/55333&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Download&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;
Tori, M., Paul, D., Billingsley, W. “Considerations When Designing Sponge-based Extendable-Output Functions for Lightweight and Mobile Devices”, The Eighteenth International Conference on Wireless and Mobile Communications (ICWMC), 2022.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Considerations When Designing Sponge-based Extendable-Output Functions for Lightweight and Mobile Devices&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;considerations_when_designing_sponge-based_extendable-output_functions_for_lightweight_and_mobile_devices&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:1,&amp;quot;range&amp;quot;:&amp;quot;1-411&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit2&quot; id=&quot;abstract&quot;&gt;Abstract&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
Through the study of existing lightweight cryptographic algorithms, we suggest a number of design guidelines for creating new sponge-based extendable-output functions for use in resource-constrained environments. While several such algorithms exist, some knowledge that can be generalized from studying them in aggregate has not previously been presented. The developed guidelines include consideration of the round function width, the number of rounds, the selection of round constants, the rate, the linear and non-linear layers, and the required security claim. The result of these guidelines is a set of recommendations for the design of sponge-based extendable-output functions that should allow correctly balanced security and performance in environments where compute power, available memory, and battery life may all be limited. These recommendations could be used to help design purpose-built implementations for various wireless or mobile systems.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Abstract&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;abstract&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:2,&amp;quot;range&amp;quot;:&amp;quot;412-1392&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit3&quot; id=&quot;conference&quot;&gt;Conference&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://www.thinkmind.org/index.php?view=instance&amp;amp;instance=ICWMC+2022&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;https://www.thinkmind.org/index.php?view=instance&amp;amp;instance=ICWMC+2022&quot; rel=&quot;ugc nofollow noopener&quot;&gt;ICWMC 2022, The Eighteenth International Conference on Wireless and Mobile Communications&lt;/a&gt;
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Conference&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;conference&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:3,&amp;quot;range&amp;quot;:&amp;quot;1393-&amp;quot;} --&gt;</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Fri, 09 Feb 2024 04:14:14 +0000</pubDate>
        </item>
        <item>
            <title>iepa102016</title>
            <link>https://davidjohnpaul.com/wiki/doku.php/research:iepa102016</link>
            <description>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;metamood_phase_twothe_software_engineering_of_an_android_app_for_a_mental_health_e-health_intervention_using_a_novel_gaming_strategy&quot;&gt;MetaMood Phase Two: The software engineering of an Android app for a mental health e-health intervention using a novel gaming strategy&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://www.researchgate.net/publication/307563566_MetaMood_Phase_Two_The_software_engineering_of_an_Android_app_for_a_mental_health_e-health_intervention_using_a_novel_gaming_strategy&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;https://www.researchgate.net/publication/307563566_MetaMood_Phase_Two_The_software_engineering_of_an_Android_app_for_a_mental_health_e-health_intervention_using_a_novel_gaming_strategy&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Download&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;
Wilson, R. L., Paul, D., Kwan, P. W. H, Billingsley, W and Shaw, A. “MetaMood Phase Two: The software engineering of an Android app for a mental health e-health intervention using a novel gaming strategy” (abstract), IEPA10 Early Intervention in Mental Health, October 2016.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;MetaMood Phase Two: The software engineering of an Android app for a mental health e-health intervention using a novel gaming strategy&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;metamood_phase_twothe_software_engineering_of_an_android_app_for_a_mental_health_e-health_intervention_using_a_novel_gaming_strategy&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:1,&amp;quot;range&amp;quot;:&amp;quot;1-625&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit2&quot; id=&quot;abstract&quot;&gt;Abstract&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
There is a growing literature to support greater engagement of clients in their own health care and recovery using e-health resources such as apps available for personal smart devices such as tablets (Christenson &amp;amp; Petrie, 2013; Pal et al., 2014; Wilson, Ranse, Cashin, &amp;amp; McNamara, 2013). Short intervention metabolic syndrome programs offered by face-to-face clinics have had mixed success in reducing the burden of disease for people with severe mental illness to date. The research presented in this paper reports on phase two of a project that has developed an Android app, MetaMood, designed to replicate the interventions of metabolic syndrome clinics in a digital format. The aim of the research is to develop software and gaming technology suitable for conducting clinical trials in the future to test the efficacy of the app. The completion of phase one (presented at RCN2015) of the project was the production of an app prototype. The completion of phase two has been the refinement of the software prototype. And a third phase will conduct international clinical pilot trials during 2016. This paper will report the progress made on the development of the app by demonstrating how new non-traditional interprofessional/transdisciplinary collaborations across nursing, information technology and software engineering are useful for the transferal of a multimodal metabolic syndrome reduction strategies, either as a standalone person-centric mental health recovery resource, or as an adjunct to enhance therapy as usual. This project highlights the important contributions of mental health nurses and clinicians, software developers and gaming technologists are making to e-health research and development.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Abstract&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;abstract&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:2,&amp;quot;range&amp;quot;:&amp;quot;626-2365&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit3&quot; id=&quot;conference&quot;&gt;Conference&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;http://www.iepaconference.org/&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;http://www.iepaconference.org/&quot; rel=&quot;ugc nofollow noopener&quot;&gt;IEPA 10 - Early Intervention in Mental Health&lt;/a&gt;
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Conference&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;conference&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:3,&amp;quot;range&amp;quot;:&amp;quot;2366-&amp;quot;} --&gt;</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Fri, 09 Feb 2024 04:22:30 +0000</pubDate>
        </item>
        <item>
            <title>ijads2021</title>
            <link>https://davidjohnpaul.com/wiki/doku.php/research:ijads2021</link>
            <description>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;aosran_agent_oriented_storage_and_retrieval_wms_planner_for_smes_associated_with_aosf_framework_under_industry_40&quot;&gt;AOSR: An Agent Oriented Storage and Retrieval WMS planner for SMEs, associated with AOSF framework, under Industry 4.0&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://doi.org/10.1504/IJADS.2022.10041879&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;https://doi.org/10.1504/IJADS.2022.10041879&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Download&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;
Ud Din, F., Paul, D., Henskens, F., Wallis, M., Hashmi, M. “AOSR: An Agent Oriented Storage and Retrieval WMS planner for SMEs, associated with AOSF framework, under Industry 4.0”, International Journal of Applied Decision Sciences, Vol. 15, No. 5, 2022.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;AOSR: An Agent Oriented Storage and Retrieval WMS planner for SMEs, associated with AOSF framework, under Industry 4.0&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;aosran_agent_oriented_storage_and_retrieval_wms_planner_for_smes_associated_with_aosf_framework_under_industry_40&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:1,&amp;quot;range&amp;quot;:&amp;quot;1-448&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit2&quot; id=&quot;abstract&quot;&gt;Abstract&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
The concept of a smart factory, under Industry 4.0 relies heavily on cyber physical systems (CPS) and intra-enterprise-wide-networks (IWN). Cloud-based implementation is incumbent to accomplish the promises of enterprise integration, automation, seamless information exchange and intelligent self-organisation. Extensive research has been conducted in this domain, however, there is still much research to be done from the perspective of such frameworks in small to medium size enterprises (SMEs). In this context, the agent-oriented smart factory (AOSF) framework provides a generic end-to-end supply chain (SC) model, compliant with CPS and Industry 4.0 standards. In order to support the crucial side of warehouse management, this paper presents AOSF&amp;#039;s recommended agent-oriented storage and retrieval (AOSR) warehouse planner with hybrid logic-based strategy, which yields a smart time-stamped plan to manage product placement and retrieval efficiently. The AOSF-associated AOSR-planner uses the hierarchical task network (HTN) AI planning to ensure different warehouse operations in a timely manner.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Abstract&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;abstract&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:2,&amp;quot;range&amp;quot;:&amp;quot;449-1576&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit3&quot; id=&quot;journal&quot;&gt;Journal&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;http://www.inderscience.com/jhome.php?jcode=ijads&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;http://www.inderscience.com/jhome.php?jcode=ijads&quot; rel=&quot;ugc nofollow noopener&quot;&gt;International Journal of Applied Decision Sciences (IJADS)&lt;/a&gt;
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Journal&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;journal&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:3,&amp;quot;range&amp;quot;:&amp;quot;1577-&amp;quot;} --&gt;</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 07 Feb 2023 22:06:26 +0000</pubDate>
        </item>
        <item>
            <title>ijai2016</title>
            <link>https://davidjohnpaul.com/wiki/doku.php/research:ijai2016</link>
            <description>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;a_comparison_study_of_cooperative_q-learning_algorithms_for_independent_learners&quot;&gt;A Comparison Study of Cooperative Q-learning Algorithms for Independent Learners&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;http://www.ceser.in/ceserp/index.php/ijai/article/view/4253&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;http://www.ceser.in/ceserp/index.php/ijai/article/view/4253&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Download&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;
Abed-Alguni, B. H., Paul, D., Chalup, S. K., and Henskens, F. A. “A Comparison Study of Cooperative Q-learning Algorithms for Independent Learners”, International Journal of Artificial Intelligence, 14:1, pp 71-93, March 2016.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;A Comparison Study of Cooperative Q-learning Algorithms for Independent Learners&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;a_comparison_study_of_cooperative_q-learning_algorithms_for_independent_learners&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:1,&amp;quot;range&amp;quot;:&amp;quot;1-398&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit2&quot; id=&quot;abstract&quot;&gt;Abstract&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
Cooperative reinforcement learning algorithms such as BEST-Q, AVE-Q, PSO-Q, and WSS use Q-value sharing strategies between reinforcement learners to accelerate the learning process. This paper presents a comparison study of the performance of these cooperative algorithms as well as an algorithm that aggregates their results. In addition, this paper studies the effects of the frequency of Q-value sharing on the learning speed of the independent learners that share their Q-values among each other. The algorithms are compared using the taxi problem (multi-task problem) and different instances of the shortest path problem (single-task problem). The experimental results when learners have equal levels of experience suggest that sharing of Q-values is not beneficial and produces similar results to single agent Q-learning. However, the experimental results when learners have different levels of experience suggest that most of the cooperative Q-learning algorithms perform similarly, but better than single agent Q-learning, especially when Q-value sharing is highly frequent. This paper then places Q-value sharing in the context of modern reinforcement learning techniques and suggests some future directions for research.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Abstract&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;abstract&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:2,&amp;quot;range&amp;quot;:&amp;quot;399-1652&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit3&quot; id=&quot;journal&quot;&gt;Journal&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;http://www.ceser.in/ceserp/index.php/ijai/index&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;http://www.ceser.in/ceserp/index.php/ijai/index&quot; rel=&quot;ugc nofollow noopener&quot;&gt;International Journal of Artificial Intelligence&lt;/a&gt;
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Journal&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;journal&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:3,&amp;quot;range&amp;quot;:&amp;quot;1653-&amp;quot;} --&gt;</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 02 Feb 2016 20:58:21 +0000</pubDate>
        </item>
        <item>
            <title>ijcat2020</title>
            <link>https://davidjohnpaul.com/wiki/doku.php/research:ijcat2020</link>
            <description>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;multi-level_analysis_of_iec_61131-3_languages_to_detect_clones&quot;&gt;Multi-Level Analysis of IEC 61131-3 Languages to Detect Clones&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://doi.org/10.1504/IJCAT.2020.110413&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;https://doi.org/10.1504/IJCAT.2020.110413&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Download&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;
HK, J., Jetley, R., Henskens, F., Paul, D., Wallis, M., SD, S. “Multi-Level Analysis of IEC 61131-3 Languages to Detect Clones”, International Journal of Computer Applications in Technology, October 2020.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Multi-Level Analysis of IEC 61131-3 Languages to Detect Clones&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;multi-level_analysis_of_iec_61131-3_languages_to_detect_clones&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:1,&amp;quot;range&amp;quot;:&amp;quot;1-340&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit2&quot; id=&quot;abstract&quot;&gt;Abstract&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
Nowadays, automation can be assisted by using programmable logic controllers (PLCs). PLCs are typically programmed with IEC 61131-3 languages to automate and implement the applications. PLC program classification plays an important role in the identification of similar functionality, which can be considered as software clones. In this paper, we present work to identify clones in IEC 61131-3 languages, using an approach based on four different perspectives: (a) clone prediction: filtering based on heuristics; (b) structural analysis: detect syntactic code clones; © semantic analysis: analysis of output variable dependency and input variable impact usage to detect semantic clones; (d) variable interval analysis: analysis of each program variable intervals to examine and detect clones. Our approach is a combination of structural, semantic and data interval based analysis. As a result, our approach is feasible and yields good results in detecting clones on our test data.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Abstract&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;abstract&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:2,&amp;quot;range&amp;quot;:&amp;quot;341-1347&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit3&quot; id=&quot;journal&quot;&gt;Journal&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://www.inderscienceonline.com/loi/ijcat/&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;https://www.inderscienceonline.com/loi/ijcat/&quot; rel=&quot;ugc nofollow noopener&quot;&gt;International Journal of Computer Applications in Technology&lt;/a&gt;
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Journal&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;journal&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:3,&amp;quot;range&amp;quot;:&amp;quot;1348-&amp;quot;} --&gt;</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Sun, 08 Nov 2020 22:27:06 +0000</pubDate>
        </item>
        <item>
            <title>ijcat2020b</title>
            <link>https://davidjohnpaul.com/wiki/doku.php/research:ijcat2020b</link>
            <description>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;formal_specification_at_model-level_of_model-driven_engineering_using_modelling_techniques&quot;&gt;Formal Specification at Model-Level of Model-Driven Engineering using Modelling Techniques&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://doi.org/10.1504/IJCAT.2021.122345&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;https://doi.org/10.1504/IJCAT.2021.122345&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Download&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;
H.K., J., Henskens, F., Paul, D., Wallis, M. “Formal Specification at Model-Level of Model-Driven Engineering using Modelling Techniques”, International Journal of Computer Applications in Technology, 67(4), 2021.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Formal Specification at Model-Level of Model-Driven Engineering using Modelling Techniques&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;formal_specification_at_model-level_of_model-driven_engineering_using_modelling_techniques&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:1,&amp;quot;range&amp;quot;:&amp;quot;1-377&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit2&quot; id=&quot;abstract&quot;&gt;Abstract&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
Nowadays Model-Driven Engineering (MDE) is gaining more popularity due to high-level development leading to a faster generation of executable code, which reduces manual intervention. Verification is crucial at different levels of model-based development. Model-based development, along with formal verification process, assures the developed model satisfies software requirements described in formal specifications. Owing the inadequate knowledge of formal methods (complex mathematical theory), software developers are not adopting formal methods during software development. There are several approaches in the literature available to transform MDE models into formal models directly for formal verification, and these approaches require an additional input of formal specifications to verification tools for formal verification. But these methods have not addressed the problem of formal specifications at the model level. In this paper, we design a modelling framework using modelling techniques, which allows specifying formal properties at the model level, automatically extracting formal specifications and formal models from developed application models, which are used for formal verification. The proposed method allows full automation and reduces the time for formal verification process during the development life-cycle. Furthermore, the method reduces the complexity of learning formal specification notations (specifications specified at the model level are automatically converted into formal specifications), which are required to input verification tools for formal verification.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Abstract&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;abstract&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:2,&amp;quot;range&amp;quot;:&amp;quot;378-1998&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit3&quot; id=&quot;journal&quot;&gt;Journal&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://www.inderscienceonline.com/journal/ijcat&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;https://www.inderscienceonline.com/journal/ijcat&quot; rel=&quot;ugc nofollow noopener&quot;&gt;International Journal of Computer Applications in Technology&lt;/a&gt;
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Journal&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;journal&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:3,&amp;quot;range&amp;quot;:&amp;quot;1999-&amp;quot;} --&gt;</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Wed, 15 Jun 2022 03:03:56 +0000</pubDate>
        </item>
        <item>
            <title>intellisys2022</title>
            <link>https://davidjohnpaul.com/wiki/doku.php/research:intellisys2022</link>
            <description>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;demystifying_xaosf_aosr_framework_in_the_context_of_digital_twin_and_industry_40&quot;&gt;Demystifying xAOSF/AOSR framework in the context of Digital Twin and Industry 4.0&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://doi.org/10.1007/978-3-031-16075-2_44&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;https://doi.org/10.1007/978-3-031-16075-2_44&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Download&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;
Ud Din, F., Paul, D. “Demystifying xAOSF/AOSR framework in the context of Digital Twin and Industry 4.0”, Intelligent Systems and Applications (IntelliSys 2022), Lecture Notes in Networks and Systems, vol 544, 2023.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Demystifying xAOSF\/AOSR framework in the context of Digital Twin and Industry 4.0&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;demystifying_xaosf_aosr_framework_in_the_context_of_digital_twin_and_industry_40&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:1,&amp;quot;range&amp;quot;:&amp;quot;1-373&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit2&quot; id=&quot;abstract&quot;&gt;Abstract&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
With recent advances in the information revolution, Digital Twin, with its complementary technologies, especially Big Data, Internet of Thing (IoT), Artificial Intelligence (AI) and Multi-Agent Systems (MAS), is becoming the core of novel strategies to maintain sustainability in Industry 4.0 networks and smart manufacturing. Despite the potential advantages of Digital Twin, such as virtual accessibility, remote monitoring, and timely customisation, not all sorts of enterprises have the resources or capabilities to incorporate such an advanced system, particularly Small to Medium size Enterprises (SMEs), due to their volatile nature of Supply Chains (SC). In this context, a Cyber-Physical Systems (CPS)-based, Agent Oriented Smart Factory (xAOSF) framework presents an over-arching SC architecture, with an associated Agent Oriented Storage and Retrieval (AOSR) based warehouse management strategy to help bridge the gap between Industry 4.0 frameworks and SME-oriented setups. This paper presents an approach towards realising the concept of Digital Twin via the xAOSF/AOSR framework, utilising state-of-the-art semantic modelling and analytical industrial tools. An amalgamation of CPS and Big Data Analytics is important to establish an effective Digital Twin to improve system scalability, security, and efficiency. This paper brings attention to this critical intersection and highlights how the xAOSF/AOSR framework can be scaled to implement Digital Twin effectively, which helps in analysing the bottleneck and threshold-states in real-time, especially in manufacturing organisations, which can lead towards full autonomy in an Industry 4.0 environment. 
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Abstract&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;abstract&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:2,&amp;quot;range&amp;quot;:&amp;quot;374-2067&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit3&quot; id=&quot;proceedings&quot;&gt;Proceedings&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://doi.org/10.1007/978-3-031-16075-2&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;https://doi.org/10.1007/978-3-031-16075-2&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Intelligent Systems and Applications (IntelliSys 2022)&lt;/a&gt;
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Proceedings&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;proceedings&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:3,&amp;quot;range&amp;quot;:&amp;quot;2068-&amp;quot;} --&gt;</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Sat, 03 Sep 2022 05:50:51 +0000</pubDate>
        </item>
        <item>
            <title>ir2022</title>
            <link>https://davidjohnpaul.com/wiki/doku.php/research:ir2022</link>
            <description>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;understanding_the_management_of_personal_records_at_homea_virtual_guided_tour&quot;&gt;Understanding the management of personal records at home: A virtual guided tour&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://doi.org/10.47989/irpaper926&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;https://doi.org/10.47989/irpaper926&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Download&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;
Balogh, M., Billingsley, W., Paul, D., Kennan, M.A. “Understanding the management of personal records at home: A virtual guided tour”, Information Research, 27(2), paper 926, 2022.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Understanding the management of personal records at home: A virtual guided tour&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;understanding_the_management_of_personal_records_at_homea_virtual_guided_tour&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:1,&amp;quot;range&amp;quot;:&amp;quot;1-327&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit2&quot; id=&quot;abstract&quot;&gt;Abstract&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;/div&gt;

&lt;h4 id=&quot;introduction&quot;&gt;Introduction&lt;/h4&gt;
&lt;div class=&quot;level4&quot;&gt;

&lt;p&gt;
This paper considers how we can better manage personal records in the home by addressing questions such as how and why personal records are retained in an electronic form and how they are managed.
&lt;/p&gt;

&lt;/div&gt;

&lt;h4 id=&quot;method&quot;&gt;Method&lt;/h4&gt;
&lt;div class=&quot;level4&quot;&gt;

&lt;p&gt;
A qualitative method with semi-structured interviews was used. Participants were recruited through social media. The interviews included virtual guided tours of personal records. There were thirty participants in twenty-two interviews (some interviews were with couples).
&lt;/p&gt;

&lt;/div&gt;

&lt;h4 id=&quot;analysis&quot;&gt;Analysis&lt;/h4&gt;
&lt;div class=&quot;level4&quot;&gt;

&lt;p&gt;
Each stage of the personal records management process described by participants was observed and categorised, resulting in an inclusive flow diagram.
&lt;/p&gt;

&lt;/div&gt;

&lt;h4 id=&quot;results&quot;&gt;Results&lt;/h4&gt;
&lt;div class=&quot;level4&quot;&gt;

&lt;p&gt;
The management of personal records at home can be categorised and described in terms of a flow. Some commonalities were found between personal information management in the workplace and at home, such as the frequent use of e-mail to manage records and the use of micro-notes and reminders.
&lt;/p&gt;

&lt;/div&gt;

&lt;h4 id=&quot;conclusion&quot;&gt;Conclusion&lt;/h4&gt;
&lt;div class=&quot;level4&quot;&gt;

&lt;p&gt;
Personal records management at home can be described as a flow through which records progress. The fact that the study of personal information management has rarely addressed personal information management at home offers many opportunities for fruitful future research. 
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Abstract&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;abstract&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:2,&amp;quot;range&amp;quot;:&amp;quot;328-1627&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit3&quot; id=&quot;journal&quot;&gt;Journal&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;http://informationr.net/ir/27-2/infres272.html&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;http://informationr.net/ir/27-2/infres272.html&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Information Research: an international electronic journal&lt;/a&gt;
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Journal&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;journal&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:3,&amp;quot;range&amp;quot;:&amp;quot;1628-&amp;quot;} --&gt;</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Wed, 15 Jun 2022 02:57:27 +0000</pubDate>
        </item>
        <item>
            <title>ir2024</title>
            <link>https://davidjohnpaul.com/wiki/doku.php/research:ir2024</link>
            <description>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;practices_and_pain_points_in_personal_records&quot;&gt;Practices and pain points in personal records&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://doi.org/10.47989/ir291604&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;https://doi.org/10.47989/ir291604&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Download&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;
Balogh, M., Billingsley, W., Paul, D., Kennan, M.A., Robertson-Dean, M. “Practices and pain points in personal records”, Information Research, Vol 29, No 1, 2024.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Practices and pain points in personal records&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;practices_and_pain_points_in_personal_records&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:1,&amp;quot;range&amp;quot;:&amp;quot;1-273&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit2&quot; id=&quot;abstract&quot;&gt;Abstract&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
&lt;strong&gt;Introduction.&lt;/strong&gt; This paper reports the findings of a survey on personal electronic records management practices focussing on records that people deal with in their everyday lives at home. The aim of this research was to determine which personal electronic records practices were most effective in averting oversights and generating satisfaction in participant’s records management practices. This paper presents one stage of a broader design science research program.
&lt;/p&gt;

&lt;p&gt;
&lt;strong&gt;Method.&lt;/strong&gt; The research for this paper was conducted by means of an online questionnaire using Qualtrics software and participants were recruited through social media.
&lt;/p&gt;

&lt;p&gt;
&lt;strong&gt;Analysis.&lt;/strong&gt; Analysis was conducted using tabular analysis in SPSS, and Principal Component Analysis in R.
&lt;/p&gt;

&lt;p&gt;
&lt;strong&gt;Results.&lt;/strong&gt; The research found that there is a statistical relationship between the practices that respondents adopted with their personal electronic records management and their level of satisfaction with that process. For example, respondents who saved records on a computer or in the cloud reported higher levels of satisfaction with how they managed their personal records and experienced fewer adverse incidents such as losing documents or failing to pay bills on time.
&lt;strong&gt;
Conclusion.&lt;/strong&gt; The paper concludes by identifying some specific personal records management practices that are likely to improve satisfaction with that task, such as saving and sorting records that need to be retained outside of email in a structured filing system. 
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Abstract&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;abstract&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:2,&amp;quot;range&amp;quot;:&amp;quot;274-1793&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit3&quot; id=&quot;journal&quot;&gt;Journal&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://informationr.net/infres/index&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;https://informationr.net/infres/index&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Information Research&lt;/a&gt;
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Journal&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;journal&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:3,&amp;quot;range&amp;quot;:&amp;quot;1794-&amp;quot;} --&gt;</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 19 Mar 2024 22:22:23 +0000</pubDate>
        </item>
        <item>
            <title>iticse25</title>
            <link>https://davidjohnpaul.com/wiki/doku.php/research:iticse25</link>
            <description>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;diverging_assessmenta_student_perspective&quot;&gt;Diverging Assessment: A Student Perspective&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://doi.org/10.1145/3724363.3729052&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;https://doi.org/10.1145/3724363.3729052&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Download&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;
Billingsley, W., Brankovic, L., Li, N., Paul, D., Sakzad, A., Skerritt, M. P., and Sheard, J. “Diverging Assessment: A Student Perspective”, the 30th ACM Conference on Innovation and Technology in Computer Science Education V. 1 (ITiCSE 2025), June 2025.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Diverging Assessment: A Student Perspective&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;diverging_assessmenta_student_perspective&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:1,&amp;quot;range&amp;quot;:&amp;quot;1-369&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit2&quot; id=&quot;abstract&quot;&gt;Abstract&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
Diverging assessment maintains a common question set for all students but varies the input data so that each student has a unique problem to solve. It is an approach in student assessment that offers a unique and authentic learning experience. Although such assessments have been implemented in computing courses, their effectiveness and students&amp;#039; perceptions in different contexts remain unexplored. In this paper, we investigate student perspectives on diverging assessment. We surveyed students in four courses across three different universities. Each surveyed student was enrolled in one of the four courses on networking, operation systems, digital forensics or ethical hacking. Each course featured at least one diverging assessment. The students&amp;#039; overall perceptions about diverging assessments and three different aspects of diverging assessment, namely authenticity, assessment-as-learning, and academic integrity, are surveyed, reported, and analyzed.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Abstract&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;abstract&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:2,&amp;quot;range&amp;quot;:&amp;quot;370-1355&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit3&quot; id=&quot;conference&quot;&gt;Conference&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://dl.acm.org/doi/proceedings/10.1145/3724363&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;https://dl.acm.org/doi/proceedings/10.1145/3724363&quot; rel=&quot;ugc nofollow noopener&quot;&gt;The 30th ACM Conference on Innovation and Technology in Computer Science Education (ITiCSE 2025)&lt;/a&gt;
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Conference&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;conference&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:3,&amp;quot;range&amp;quot;:&amp;quot;1356-&amp;quot;} --&gt;</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 24 Jun 2025 05:04:26 +0000</pubDate>
        </item>
        <item>
            <title>itisia2024</title>
            <link>https://davidjohnpaul.com/wiki/doku.php/research:itisia2024</link>
            <description>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;using_a_memetic_algorithm_to_discover_secure_s-boxes&quot;&gt;Using A Memetic Algorithm to Discover Secure S-Boxes&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://doi.org/10.1007/978-3-031-71773-4_29&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;https://doi.org/10.1007/978-3-031-71773-4_29&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Download&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;
Tori, M., Paul, D., Billingsley, W. “Using a Memetic Algorithm to Discover Secure S-Boxes”, Innovative Technologies in Intelligent Systems and Industrial Applications, Lecture Notes in Electrical Engineering, vol 117, 2024.
&lt;/p&gt;

&lt;p&gt;
An extended version of &lt;a href=&quot;https://davidjohnpaul.com/wiki/doku.php/research:citisia2023&quot; class=&quot;wikilink1&quot; target=&quot;_self&quot; title=&quot;research:citisia2023&quot; data-wiki-id=&quot;research:citisia2023&quot;&gt;Using A Memetic Algorithm to Discover Secure S-Boxes&lt;/a&gt;.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Using A Memetic Algorithm to Discover Secure S-Boxes&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;using_a_memetic_algorithm_to_discover_secure_s-boxes&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:1,&amp;quot;range&amp;quot;:&amp;quot;1-455&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit2&quot; id=&quot;abstract&quot;&gt;Abstract&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
A Substitution-Box (S-Box) is a cryptographic primitive used in cyber security engineering. In this paper, we describe a Memetic Algorithm to search for so-called “Golden S-Boxes”, which have optimal cryptographic features. We replicate existing results on 4&amp;times;4 S-Boxes to demonstrate the feasibility of the approach, then describe further desirable S-Box properties to allow the algorithm to discover S-Boxes that are both secure and fast enough for lightweight cryptographic applications.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Abstract&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;abstract&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:2,&amp;quot;range&amp;quot;:&amp;quot;456-972&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit3&quot; id=&quot;book&quot;&gt;Book&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://doi.org/10.1007/978-3-031-71773-4&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;https://doi.org/10.1007/978-3-031-71773-4&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Innovative Technologies in Intelligent Systems and Industrial Applications (CITISIA2023)&lt;/a&gt;
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Book&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;book&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:3,&amp;quot;range&amp;quot;:&amp;quot;973-&amp;quot;} --&gt;</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Wed, 29 Jan 2025 02:31:51 +0000</pubDate>
        </item>
        <item>
            <title>its2012</title>
            <link>https://davidjohnpaul.com/wiki/doku.php/research:its2012</link>
            <description>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;issues_preventing_the_migration_of_the_australian_schizophrenia_research_bank_to_the_cloud&quot;&gt;Issues Preventing the Migration of the Australian Schizophrenia Research Bank to The Cloud&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://davidjohnpaul.com/wiki/lib/exe/fetch.php/research:paul_its2012.pdf&quot; class=&quot;media mediafile mf_pdf&quot; target=&quot;_self&quot; title=&quot;research:paul_its2012.pdf (123.6 KB)&quot; rel=&quot;noopener&quot;&gt;Download&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;
Paul, D., Henskens, F.A., Loughland, C., McCabe, K., Bridge, J., Duffy, L., Carr, V., Catts, S., Jablensky, A., Michie, P., Mowry, B., Pantelis, P., Schall, U., and Scott, R.J. “Issues Preventing the Migration of the Australian Schizophrenia Research Bank to The Cloud”, IADIS International Conference on Internet Technologies &amp;amp; Society (ITS 2012), IADIS, pp. 305-308, 2012.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Issues Preventing the Migration of the Australian Schizophrenia Research Bank to The Cloud&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;issues_preventing_the_migration_of_the_australian_schizophrenia_research_bank_to_the_cloud&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:1,&amp;quot;range&amp;quot;:&amp;quot;1-522&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit2&quot; id=&quot;abstract&quot;&gt;Abstract&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
The Australian Schizophrenia Research Bank (ASRB) is an eResearch project that aims to facilitate scientific research in one of the most perplexing mental disorders facing researchers today. There has been a recent push to move the ASRB systems into an Australian research cloud. This paper describes the issues that are currently preventing such a migration.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Abstract&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;abstract&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:2,&amp;quot;range&amp;quot;:&amp;quot;523-905&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit3&quot; id=&quot;conference&quot;&gt;Conference&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;http://www.iadisportal.org/previouseditions/ITS_2012.pdf&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;http://www.iadisportal.org/previouseditions/ITS_2012.pdf&quot; rel=&quot;ugc nofollow noopener&quot;&gt;IADIS International Conference on Internet Technologies &amp;amp; Society&lt;/a&gt;
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Conference&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;conference&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:3,&amp;quot;range&amp;quot;:&amp;quot;906-&amp;quot;} --&gt;</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Sun, 31 Jan 2016 10:18:47 +0000</pubDate>
        </item>
        <item>
            <title>its2017</title>
            <link>https://davidjohnpaul.com/wiki/doku.php/research:its2017</link>
            <description>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;gamification_in_e-mental_healthdevelopment_of_a_digital_intervention_addressing_severe_mental_illness_and_metabolic_syndrome&quot;&gt;Gamification in e-Mental Health: Development of a Digital Intervention addressing Severe Mental Illness and Metabolic Syndrome&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://davidjohnpaul.com/wiki/lib/exe/fetch.php/research:shaw_its2017.pdf&quot; class=&quot;media mediafile mf_pdf&quot; target=&quot;_self&quot; title=&quot;research:shaw_its2017.pdf (386 KB)&quot; rel=&quot;noopener&quot;&gt;Download&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;
Shaw, A., Paul, D., Billingsley, W., Kwan, P., and Wilson, R. “Gamification in e-Mental Health: Development of a Digital Intervention addressing Severe Mental Illness and Metabolic Syndrome”, IADIS International Conference on Internet Technologies &amp;amp; Society (ITS 2017), Sydney, Australia, IADIS, pp. 83-90, December 2017.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Gamification in e-Mental Health: Development of a Digital Intervention addressing Severe Mental Illness and Metabolic Syndrome&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;gamification_in_e-mental_healthdevelopment_of_a_digital_intervention_addressing_severe_mental_illness_and_metabolic_syndrome&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:1,&amp;quot;range&amp;quot;:&amp;quot;1-505&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit2&quot; id=&quot;abstract&quot;&gt;Abstract&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
MetaMood is a gamified Android application, developed from an existing paper-based health intervention program, designed to increase the motivation and engagement of participants. The development process followed a clinician-based design which was necessary to avoid exposing participants to an untested and unverified clinical tool. This paper describes design considerations and outcomes which could be useful for similar gamification attempts. It also presents the implementation and evaluation of a clinician review process, a vital step required before a full clinical trial. The success of MetaMood, evaluated through the results of the clinician review, suggests that a similar design, development, and evaluation process should be followed by future mobile e-health interventions before they are released through a public App Store.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Abstract&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;abstract&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:2,&amp;quot;range&amp;quot;:&amp;quot;506-1369&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit3&quot; id=&quot;conference&quot;&gt;Conference&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;http://its-conf.org/&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;http://its-conf.org/&quot; rel=&quot;ugc nofollow noopener&quot;&gt;IADIS International Conference on Internet Technologies &amp;amp; Society&lt;/a&gt;
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Conference&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;conference&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:3,&amp;quot;range&amp;quot;:&amp;quot;1370-&amp;quot;} --&gt;</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Wed, 20 Dec 2017 21:30:56 +0000</pubDate>
        </item>
        <item>
            <title>jis2024</title>
            <link>https://davidjohnpaul.com/wiki/doku.php/research:jis2024</link>
            <description>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;a_study_on_the_challenges_of_human-centric_cyber-security_and_the_guarantee_of_information_quality&quot;&gt;A Study on the Challenges of Human-Centric Cyber-Security and the Guarantee of Information Quality&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://doi.org/10.4236/jis.2024.152013&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;https://doi.org/10.4236/jis.2024.152013&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Download&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;
Kurdi, M. H., Denden, M., Paul, D. “A Study on the Challenges of Human-Centric Cyber-Security and the Guarantee of Information Quality”, Journal of Information Security, Vol 15, No 2, 2024.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;A Study on the Challenges of Human-Centric Cyber-Security and the Guarantee of Information Quality&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;a_study_on_the_challenges_of_human-centric_cyber-security_and_the_guarantee_of_information_quality&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:1,&amp;quot;range&amp;quot;:&amp;quot;1-359&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit2&quot; id=&quot;abstract&quot;&gt;Abstract&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
Information security and quality management are often considered two different fields. However, organizations must be mindful of how software security may affect quality control. This paper examines and promotes methods through which secure software development processes can be integrated into the Systems Software Development Life-cycle (SDLC) to improve system quality. Cyber-security and quality assurance are both involved in reducing risk. Software security teams work to reduce security risks, whereas quality assurance teams work to decrease risks to quality. There is a need for clear standards, frameworks, processes, and procedures to be followed by organizations to ensure high-level quality while reducing security risks. This research uses a survey of industry professionals to help identify best practices for developing software with fewer defects from the early stages of the SDLC to improve both the quality and security of software. Results show that there is a need for better security awareness among all members of software development teams.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Abstract&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;abstract&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:2,&amp;quot;range&amp;quot;:&amp;quot;360-1447&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit3&quot; id=&quot;journal&quot;&gt;Journal&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://www.scirp.org/journal/journalarticles.aspx?journalid=175&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;https://www.scirp.org/journal/journalarticles.aspx?journalid=175&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Journal of Information Security&lt;/a&gt;
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Journal&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;journal&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:3,&amp;quot;range&amp;quot;:&amp;quot;1448-&amp;quot;} --&gt;</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Wed, 10 Jul 2024 22:46:22 +0000</pubDate>
        </item>
        <item>
            <title>jisys2018</title>
            <link>https://davidjohnpaul.com/wiki/doku.php/research:jisys2018</link>
            <description>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;hybridizing_the_cuckoo_search_algorithm_with_different_mutation_operators_for_numerical_optimization_problems&quot;&gt;Hybridizing the Cuckoo Search Algorithm with Different Mutation Operators for Numerical Optimization Problems&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://doi.org/10.1515/jisys-2018-0331&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;https://doi.org/10.1515/jisys-2018-0331&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Download&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;
Abed-alguni, B., Paul, D. “Hybridizing The Cuckoo Search Algorithm with Different Mutation operators for Numerical Optimization Problems”, Journal of Intelligent Systems, Vol. 29 (Issue 1), pp. 1043-1062, 2020.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Hybridizing the Cuckoo Search Algorithm with Different Mutation Operators for Numerical Optimization Problems&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;hybridizing_the_cuckoo_search_algorithm_with_different_mutation_operators_for_numerical_optimization_problems&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:1,&amp;quot;range&amp;quot;:&amp;quot;1-391&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit2&quot; id=&quot;abstract&quot;&gt;Abstract&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
The Cuckoo search (CS) algorithm is an efficient evolutionary algorithm inspired by the nesting and parasitic reproduction behaviors of some cuckoo species. Mutation is an operator used in evolutionary algorithms to maintain the diversity of the population from one generation to the next. The original CS algorithm uses the Lévy flight method, which is a special mutation operator, for efficient exploration of the search space. The major goal of the current paper is to experimentally evaluate the performance of the CS algorithm after replacing the Lévy flight method in the original CS algorithm with seven different mutation methods. The proposed variations of CS were evaluated using 14 standard benchmark functions in terms of the accuracy and reliability of the obtained results over multiple simulations. The experimental results suggest that the CS with polynomial mutation provides more accurate results and is more reliable than the other CS variations.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Abstract&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;abstract&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:2,&amp;quot;range&amp;quot;:&amp;quot;392-1382&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit3&quot; id=&quot;series&quot;&gt;Series&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://www.degruyter.com/view/j/jisys.ahead-of-print/jisys-2018-0331/jisys-2018-0331.xml&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;https://www.degruyter.com/view/j/jisys.ahead-of-print/jisys-2018-0331/jisys-2018-0331.xml&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Journal of Intelligent Systems&lt;/a&gt;
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Series&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;series&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:3,&amp;quot;range&amp;quot;:&amp;quot;1383-&amp;quot;} --&gt;</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Wed, 13 Oct 2021 00:35:57 +0000</pubDate>
        </item>
        <item>
            <title>jmir2014</title>
            <link>https://davidjohnpaul.com/wiki/doku.php/research:jmir2014</link>
            <description>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;consumer_participation_in_quality_improvements_for_chronic_disease_caredevelopment_and_evaluation_of_an_interactive_patient-centered_survey_to_identify_preferred_service_initiatives&quot;&gt;Consumer Participation in Quality Improvements for Chronic Disease Care: Development and Evaluation of an Interactive Patient-Centered Survey to Identify Preferred Service Initiatives&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://doi.org/10.2196/jmir.3545&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;https://doi.org/10.2196/jmir.3545&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Download&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;
Fradgley, E. A., Paul, C. L., Bryany, J., Roos, I. A. G., Henskens, F. A., and Paul, D. “Consumer Participation in Quality Improvements for Chronic Disease Care: Development and Evaluation of an Interactive Patient-centered Survey to Identify Preferred Service Initiatives”, Journal of Medical Internet Research, 16(12):e292, December 2014.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Consumer Participation in Quality Improvements for Chronic Disease Care: Development and Evaluation of an Interactive Patient-Centered Survey to Identify Preferred Service Initiatives&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;consumer_participation_in_quality_improvements_for_chronic_disease_caredevelopment_and_evaluation_of_an_interactive_patient-centered_survey_to_identify_preferred_service_initiatives&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:1,&amp;quot;range&amp;quot;:&amp;quot;1-589&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit2&quot; id=&quot;abstract&quot;&gt;Abstract&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
Background: With increasing attention given to the quality of chronic disease care, a measurement approach that empowers consumers to participate in improving quality of care and enables health services to systematically introduce patient-centered initiatives is needed. A Web-based survey with complex adaptive questioning and interactive survey items would allow consumers to easily identify and prioritize detailed service initiatives.
&lt;/p&gt;

&lt;p&gt;
Objective: The aim was to develop and test a Web-based survey capable of identifying and prioritizing patient-centered initiatives in chronic disease outpatient services. Testing included (1) test-retest reliability, (2) patient-perceived acceptability of the survey content and delivery mode, and (3) average completion time, completion rates, and Flesch-Kincaid reading score.
&lt;/p&gt;

&lt;p&gt;
Methods: In Phase I, the Web-based Consumer Preferences Survey was developed based on a structured literature review and iterative feedback from expert groups of service providers and consumers. The touchscreen survey contained 23 general initiatives, 110 specific initiatives available through adaptive questioning, and a relative prioritization exercise. In Phase II, a pilot study was conducted within 4 outpatient clinics to evaluate the reliability properties, patient-perceived acceptability, and feasibility of the survey. Eligible participants were approached to complete the survey while waiting for an appointment or receiving intravenous therapy. The age and gender of nonconsenters was estimated to ascertain consent bias. Participants with a subsequent appointment within 14 days were asked to complete the survey for a second time.
&lt;/p&gt;

&lt;p&gt;
Results: A total of 741 of 1042 individuals consented to participate (71.11% consent), 529 of 741 completed all survey content (78.9% completion), and 39 of 68 completed the test-retest component. Substantial or moderate reliability (Cohen’s kappa&amp;gt;0.4) was reported for 16 of 20 general initiatives with observed percentage agreement ranging from 82.1%-100.0%. The majority of participants indicated the Web-based survey was easy to complete (97.9%, 531/543) and comprehensive (93.1%, 505/543). Participants also reported the interactive relative prioritization exercise was easy to complete (97.0%, 189/195) and helped them to decide which initiatives were of most importance (84.6%, 165/195). Average completion time was 8.54 minutes (SD 3.91) and the Flesch-Kincaid reading level was 6.8. Overall, 84.6% (447/529) of participants indicated a willingness to complete a similar survey again.
&lt;/p&gt;

&lt;p&gt;
Conclusions: The Web-based Consumer Preferences Survey is sufficiently reliable and highly acceptable to patients. Based on completion times and reading level, this tool could be integrated in routine clinical practice and allows consumers to easily participate in quality evaluation. Results provide a comprehensive list of patient-prioritized initiatives for patients with major chronic conditions and delivers practice-ready evidence to guide improvements in patient-centered care.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Abstract&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;abstract&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:2,&amp;quot;range&amp;quot;:&amp;quot;590-3660&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit3&quot; id=&quot;journal&quot;&gt;Journal&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;http://www.jmir.org/&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;http://www.jmir.org/&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Journal of Medical Internet Research&lt;/a&gt;
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Journal&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;journal&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:3,&amp;quot;range&amp;quot;:&amp;quot;3661-&amp;quot;} --&gt;</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Thu, 12 May 2022 03:55:08 +0000</pubDate>
        </item>
        <item>
            <title>joitmc2025</title>
            <link>https://davidjohnpaul.com/wiki/doku.php/research:joitmc2025</link>
            <description>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;driving_ai_chatbot_adoptiona_systematic_review_of_factors_barriers_and_future_research_directions&quot;&gt;Driving AI Chatbot Adoption: A Systematic Review of Factors, Barriers, and Future Research Directions&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://doi.org/10.1016/j.joitmc.2025.100590&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;https://doi.org/10.1016/j.joitmc.2025.100590&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Download&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;
Alharbi, N., Ud Din, F., Paul, D., and Sadgrove, E. “Driving AI Chatbot Adoption: A Systematic Review of Factors, Barriers, and Future Research Directions”, Journal of Open Innovation: Technology, Market, and Complexity, 11(3), 2025.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Driving AI Chatbot Adoption: A Systematic Review of Factors, Barriers, and Future Research Directions&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;driving_ai_chatbot_adoptiona_systematic_review_of_factors_barriers_and_future_research_directions&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:1,&amp;quot;range&amp;quot;:&amp;quot;1-411&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit2&quot; id=&quot;abstract&quot;&gt;Abstract&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
Adopting AI chatbots has gained significant momentum across various industries due to advancements in artificial intelligence. Despite their potential, AI chatbot adoption remains a complex process affected by numerous factors that are not fully understood. This systematic review seeks to identify and categorize the factors influencing AI chatbot adoption, including drivers and impediments. Following the PRISMA guidelines, a comprehensive review process was conducted. From 459 publications collected via Web of Science and Scopus, 84 research articles meeting eligibility criteria were analyzed to provide insights into the determinants of adoption. This review systematically examines the theoretical models employed, geographic distribution, primary domains of study, methodologies, and key factors shaping adoption. Furthermore, the study outlines future research directions to guide advancements in this area. The findings contribute to theoretical understanding by synthesizing determinants like anthropomorphism, trust, and hedonic motivation and advocating for integrating underexplored frameworks and hybrid methodologies. Practical implications are provided for developers, marketers, and policymakers, emphasizing user-centric design, privacy protection, and sector-specific strategies. This review advances knowledge in AI chatbot adoption and offers actionable insights for successful implementation across diverse industries.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Abstract&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;abstract&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:2,&amp;quot;range&amp;quot;:&amp;quot;412-1878&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit3&quot; id=&quot;journal&quot;&gt;Journal&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://tarupublications.com/journal/JDMSC&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;https://tarupublications.com/journal/JDMSC&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Journal of Discrete Mathematical Sciences and Cryptography&lt;/a&gt;
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Journal&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;journal&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:3,&amp;quot;range&amp;quot;:&amp;quot;1879-&amp;quot;} --&gt;</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Wed, 16 Jul 2025 01:30:14 +0000</pubDate>
        </item>
        <item>
            <title>jsw2020</title>
            <link>https://davidjohnpaul.com/wiki/doku.php/research:jsw2020</link>
            <description>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;validating_time_efficiency_of_aosr_20a_novel_wms_planner_algorithm_for_smes_under_industry_40&quot;&gt;Validating Time Efficiency of AOSR 2.0: A Novel WMS Planner Algorithm for SMEs, under Industry 4.0&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://doi.org/10.17706/jsw.15.2.53-61&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;https://doi.org/10.17706/jsw.15.2.53-61&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Download&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;
Ud Din, F., Paul, D., Ryan, J., Henskens, F., Wallis, M. “Validating Time Efficiency of AOSR 2.0: A Novel WMS planner Algorithm for SMEs, under Industry 4.0”, Journal of Software, 15(2), pp. 53-61, 2020.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Validating Time Efficiency of AOSR 2.0: A Novel WMS Planner Algorithm for SMEs, under Industry 4.0&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;validating_time_efficiency_of_aosr_20a_novel_wms_planner_algorithm_for_smes_under_industry_40&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:1,&amp;quot;range&amp;quot;:&amp;quot;1-373&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit2&quot; id=&quot;abstract&quot;&gt;Abstract&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
Agent Oriented Storage and Retrieval \(AOSR\) WMS planner algorithm is part of the general Agent Oriented Smart Factory \(AOSF\) framework, which provides a comprehensive Supply Chain \(SC\) architecture to help bridge the gap between Industry 4.0 standards and SME-oriented setups. This paper provides validation of AOSR algorithm with respect to time efficiency on top of substantially improved performance efficiency in SME-oriented warehousing operations. This article, which is part of a series of recent contributions, explains the efficiency of AOSR WMS planner algorithm in scenario-based test cases with experimentation in certain WMS Key Performance Indicators \(KPIs\).
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Abstract&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;abstract&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:2,&amp;quot;range&amp;quot;:&amp;quot;374-1077&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit3&quot; id=&quot;series&quot;&gt;Series&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;http://www.jsoftware.us/&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;http://www.jsoftware.us/&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Journal of Software&lt;/a&gt;
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Series&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;series&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:3,&amp;quot;range&amp;quot;:&amp;quot;1078-&amp;quot;} --&gt;</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Thu, 14 May 2020 02:56:42 +0000</pubDate>
        </item>
        <item>
            <title>jsw2020b</title>
            <link>https://davidjohnpaul.com/wiki/doku.php/research:jsw2020b</link>
            <description>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;conceptualised_visualisation_of_extended_agent_oriented_smart_factory_xaosf_framework_with_associated_aosr-wms_system&quot;&gt;Conceptualised Visualisation of Extended Agent Oriented Smart Factory (xAOSF) Framework with Associated AOSR-WMS System&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://doi.org/10.17706/jsw.16.4.182-199&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;https://doi.org/10.17706/jsw.16.4.182-199&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Download&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;
Ud Din, F., Paul, D., Henskens, F., Wallis, M. “Conceptualised Visualisation of Extended Agent Oriented Smart Factory (xAOSF) framework with associated AOSR-WMS system”, Journal of Software, 16(4), 2021.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Conceptualised Visualisation of Extended Agent Oriented Smart Factory (xAOSF) Framework with Associated AOSR-WMS System&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;conceptualised_visualisation_of_extended_agent_oriented_smart_factory_xaosf_framework_with_associated_aosr-wms_system&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:1,&amp;quot;range&amp;quot;:&amp;quot;1-396&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit2&quot; id=&quot;abstract&quot;&gt;Abstract&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
The emergence of the fourth industrial revolution (Industry 4.0) has sparked proliferation in thedomain of Cyber-Physical Systems (CPS), and extensive research has been conductedin this area since its beginning. However, recent literature claims that Smallto Medium Size Enterprises (SMEs) are not getting the benefits of Industry 4.0 (I4.0) in a full potential because of unresolved compatibility-mismatch issues and involvement of high infrastructuralcost. In order to help bridge this gap, the Extended Agent-Oriented Smart Factory (xAOSF) framework provides a high-level guideline solution, integrating the whole supply chain (SC), from supplier-end to customer-end with an objective to expose SMEs towards the benefits of I4.0. This paper, as part of a publication series, provides a conceptualised visualisation of the xAOSF framework as a customised CPS,which presents an elegant mediation mechanism between multiple xAOSF agents to uptake negotiation and coordination schemes at different enterprise levels. This paper also includes detail on howthe I4.0 based xAOSF framework caters to three-dimensional enterprise integration, in order to provide seamless connectivity and robustness in enterprise-wide operations. Furthermore, for the purpose of validation and to justify the claim, the experimentation is performed by applying a comprehensive test scenario onxAOSF&amp;#039;s recommended AOSR WMS strategy in comparison with linear SC-based standard WMS system, which yields a substantial performance improvement in certain key-performance areas.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Abstract&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;abstract&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:2,&amp;quot;range&amp;quot;:&amp;quot;397-1969&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit3&quot; id=&quot;journal&quot;&gt;Journal&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;http://jsoftware.us/&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;http://jsoftware.us/&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Journal of Software&lt;/a&gt;
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Journal&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;journal&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:3,&amp;quot;range&amp;quot;:&amp;quot;1970-&amp;quot;} --&gt;</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Wed, 16 Jun 2021 03:10:24 +0000</pubDate>
        </item>
        <item>
            <title>kes18</title>
            <link>https://davidjohnpaul.com/wiki/doku.php/research:kes18</link>
            <description>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;agent-oriented_smart_factory_aosfan_mas_based_framework_for_smes_under_industry_40&quot;&gt;Agent-Oriented Smart Factory (AOSF): An MAS Based Framework for SMEs Under Industry 4.0&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;http://doi.org/10.1007/978-3-319-92031-3_5&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;http://doi.org/10.1007/978-3-319-92031-3_5&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Download&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;
Ud Din, F., Henskens, F., Paul, D., Wallis, M. “Agent-Oriented Smart Factory (AOSF): An MAS Based Framework for SMEs Under Industry 4.0”, In Agents and Multi-Agent Systems: Technologies and Applications 2018 Proceedings of the 12th International Conference on Agents and Multi-Agent Systems: Technologies and Applications (KES-AMSTA-18). 44-54. Springer, May 2018
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Agent-Oriented Smart Factory (AOSF): An MAS Based Framework for SMEs Under Industry 4.0&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;agent-oriented_smart_factory_aosfan_mas_based_framework_for_smes_under_industry_40&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:1,&amp;quot;range&amp;quot;:&amp;quot;1-525&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit2&quot; id=&quot;abstract&quot;&gt;Abstract&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
For the concept of Industry 4.0 to come true, a mature amalgamation of allied technologies is obligatory, i.e. Internet of Things (IoT), Big Data analytics, Mobile Computing, Multi-Agent Systems (MAS) and Cloud Computing. With the emergence of the fourth industrial revolution, proliferation in the field of Cyber-Physical Systems (CPS) and Smart Factory gave a boost to recent research in this dimension. Despite many autonomous frameworks contributed in this area, there are very few widely acceptable implementation frameworks, particularly for Small to Medium Size Enterprises (SMEs) under the umbrella of Industry 4.0. This paper presents an Agent-Oriented Smart Factory (AOSF) framework, integrating the whole supply chain (SC), from supplier-end to customer-end. The AOSF framework presents an elegant mediating mechanism between multiple agents to increase robustness in decision making at the base level. Classification of agents, negotiation mechanism and few results from a test case are presented.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Abstract&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;abstract&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:2,&amp;quot;range&amp;quot;:&amp;quot;526-1558&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit3&quot; id=&quot;series&quot;&gt;Series&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://link.springer.com/bookseries/8767&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;https://link.springer.com/bookseries/8767&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Smart Innovation, Systems and Technologies&lt;/a&gt;
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Series&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;series&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:3,&amp;quot;range&amp;quot;:&amp;quot;1559-&amp;quot;} --&gt;</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 24 Jul 2018 05:32:46 +0000</pubDate>
        </item>
        <item>
            <title>kes2025</title>
            <link>https://davidjohnpaul.com/wiki/doku.php/research:kes2025</link>
            <description>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;a_systematic_literature_review_on_cybersecurity_ontology&quot;&gt;A Systematic Literature Review on Cybersecurity Ontology&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://doi.org/10.1016/j.procs.2025.09.485&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;https://doi.org/10.1016/j.procs.2025.09.485&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Download&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;
Hasan, A. B. M. M., Brankovic, L., Paul, D., and Sanin, C. “A Systematic Literature Review on Cybersecurity Ontology”, Procedia Computer Science, 270, 2025.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;A Systematic Literature Review on Cybersecurity Ontology&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;a_systematic_literature_review_on_cybersecurity_ontology&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:1,&amp;quot;range&amp;quot;:&amp;quot;1-288&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit2&quot; id=&quot;abstract&quot;&gt;Abstract&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
Nowadays, organisations in various industries are required to have sustainable planning and implementation of cybersecurity frameworks, where communication, analysis, and responses are crucial for various stakeholders, including cybersecurity experts, supply chain partners, and customers. The cybersecurity domain is a complex area with a very involved terminology and encompasses numerous security mechanisms to provide security services, which in turn thwart attacks and protect data and other resources. Unfortunately, there are significant inconsistencies and ambiguities in the use of cybersecurity terminology across the sector, and this hinders communication among cybersecurity professionals. In this paper, we review the most significant existing cybersecurity ontology studies with the help of a refined search strategy, data management, and continuous evaluation. This Systematic Literature Review identifies knowledge gaps and a need for a new cybersecurity ontology focusing on mapping standard terms and identifying semantic equivalences to leverage current ontologies and support practical applications.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Abstract&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;abstract&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:2,&amp;quot;range&amp;quot;:&amp;quot;289-1431&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit3&quot; id=&quot;journal&quot;&gt;Journal&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://www.sciencedirect.com/journal/procedia-computer-science&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;https://www.sciencedirect.com/journal/procedia-computer-science&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Procedia Computer Science&lt;/a&gt;
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Journal&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;journal&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:3,&amp;quot;range&amp;quot;:&amp;quot;1432-&amp;quot;} --&gt;</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Sun, 09 Nov 2025 22:43:51 +0000</pubDate>
        </item>
        <item>
            <title>lnbip2013</title>
            <link>https://davidjohnpaul.com/wiki/doku.php/research:lnbip2013</link>
            <description>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;engineering_flexible_service-oriented_transactions&quot;&gt;Engineering Flexible Service-Oriented Transactions&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://doi.org/10.1007/978-3-662-44300-2_3&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;https://doi.org/10.1007/978-3-662-44300-2_3&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Download&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;
Paul, D. and Henskens, F. A. “Engineering Flexible Service-Oriented Transactions”, Lecture Notes in Business Information Processing (LNBIP), Volume 189, Springer-Verlag, pp 37-52, July 2014.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Engineering Flexible Service-Oriented Transactions&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;engineering_flexible_service-oriented_transactions&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:1,&amp;quot;range&amp;quot;:&amp;quot;1-316&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit2&quot; id=&quot;abstract&quot;&gt;Abstract&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
The traditional ACID properties for transactions are not always appropriate in service-oriented environments. Instead, it is often preferable to “relax” the transactional guarantees, reducing isolation or atomicity to ensure acceptable performance at a reasonable cost. Existing standards require providers to constantly offer a fixed level of transaction support to each client that requests a particular service. We present a mechanism that allows providers to dynamically alter the level of transaction support offered on a per-service-call basis. Further, we engineer a cost-based model, based on πt-calculus, that allows clients to automatically reason about workflows consisting of service requests with various levels of transaction support. The viability of this scheme is tested with a Web Services transactions simulator, with results indicating potential benefits for both clients and service providers.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Abstract&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;abstract&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:2,&amp;quot;range&amp;quot;:&amp;quot;317-1259&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit3&quot; id=&quot;book&quot;&gt;Book&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;http://link.springer.com/book/10.1007/978-3-662-44300-2&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;http://link.springer.com/book/10.1007/978-3-662-44300-2&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Web Information Systems and Technologies&lt;/a&gt;
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Book&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;book&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:3,&amp;quot;range&amp;quot;:&amp;quot;1260-&amp;quot;} --&gt;</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Thu, 12 May 2022 03:56:51 +0000</pubDate>
        </item>
        <item>
            <title>mathsport22</title>
            <link>https://davidjohnpaul.com/wiki/doku.php/research:mathsport22</link>
            <description>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;modelling_human_gait_using_a_nonlinear_differential_equation&quot;&gt;Modelling human gait using a nonlinear differential equation&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://doi.org/10.1101/2021.03.16.435713&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;https://doi.org/10.1101/2021.03.16.435713&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Download&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;
Schmalz, J., Paul, D., Shorter, K., Schmalz, X., Cooper, M., Murphy, A. “Modelling human gait using a nonlinear differential equation”, 16th Australasian Conference on Mathematics and Computers in Sport (Mathsport 2022), 2022.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Modelling human gait using a nonlinear differential equation&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;modelling_human_gait_using_a_nonlinear_differential_equation&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:1,&amp;quot;range&amp;quot;:&amp;quot;1-360&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit2&quot; id=&quot;abstract&quot;&gt;Abstract&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
We introduce an innovative method for the investigation of human gait, which is based on the visualisation of the vertical component of the movement of the centre of mass during walking or running, in the space of the coordinates position, velocity, and acceleration of the centre of mass. Collected data has been numerically approximated by the best fitting curve for a non-linear model. The resulting equation for the best fitting plane or curve in this space is a differential equation of second order. The model that we suggest is a Duffing equation with coefficients that depend on the height of a walker or runner and on the angular frequency of the oscillation. Statistics about the distribution of the Duffing stiffness depending on the speed is presented.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Abstract&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;abstract&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:2,&amp;quot;range&amp;quot;:&amp;quot;361-1148&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit3&quot; id=&quot;conference&quot;&gt;Conference&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://www.anziam.org.au/Mathsport&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;https://www.anziam.org.au/Mathsport&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Mathsport 2022, 16th Australasian Conference on Mathematics and Computers in Sport&lt;/a&gt;
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Conference&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;conference&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:3,&amp;quot;range&amp;quot;:&amp;quot;1149-&amp;quot;} --&gt;</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Sat, 03 Sep 2022 05:41:23 +0000</pubDate>
        </item>
        <item>
            <title>pa2025</title>
            <link>https://davidjohnpaul.com/wiki/doku.php/research:pa2025</link>
            <description>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;joint_plant-spraypoint_detector_with_convnext_modules_and_histmatch_normalization&quot;&gt;Joint plant-spraypoint detector with ConvNeXt modules and HistMatch normalization&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://doi.org/10.1007/s11119-024-10208-y&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;https://doi.org/10.1007/s11119-024-10208-y&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Download&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;
Ford, J., Sadgrove, E., Paul, D. “Joint plant-spraypoint detector with ConvNeXt modules and HistMatch normalization”, Precision Agriculture, 26(24), 2025.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Joint plant-spraypoint detector with ConvNeXt modules and HistMatch normalization&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;joint_plant-spraypoint_detector_with_convnext_modules_and_histmatch_normalization&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:1,&amp;quot;range&amp;quot;:&amp;quot;1-310&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit2&quot; id=&quot;abstract&quot;&gt;Abstract&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
&lt;strong&gt;Context&lt;/strong&gt;
&lt;/p&gt;

&lt;p&gt;
Serrated tussock (Nassella trichotoma) is a weed of national significance in Australia which offers little to no nutritional value to livestock, and has the potential to reduce carrying capacity and agricultural return of infested pastures.
&lt;/p&gt;

&lt;p&gt;
&lt;strong&gt;Aims&lt;/strong&gt;
&lt;/p&gt;

&lt;p&gt;
The aim of this study was to adapt existing Convolutional Neural Networks (CNNs) for plant segmentation and spraypoint detection in the challenging environments of pastures.
&lt;/p&gt;

&lt;p&gt;
&lt;strong&gt;Methods&lt;/strong&gt;
&lt;/p&gt;

&lt;p&gt;
CNNs that were designed for joint plant and stem segmentation in crop fields were repurposed for dual-task applications in pastures. Given the poor performance of these models in complex pasture environments, a new model drawing inspiration from the recently proposed ConvNeXt was developed, tested for its effectiveness on unseen field data, and enhanced with a novel normalization technique, called HistMatch.
&lt;/p&gt;

&lt;p&gt;
&lt;strong&gt;Key results&lt;/strong&gt;
&lt;/p&gt;

&lt;p&gt;
Experimentation demonstrated that unlike pre-existing models, which were designed for the simpler environments encountered in early-stage crop fields, our model was able to generalize well to growing conditions not seen during training, achieving 0.807 mIoU and 0.796 F1-score for the plant and spraypoint tasks respectively. This is in comparison to pre-existing models, which achieved 0.270 - 0.454 mIoU and 0.073 - 0.496 F1-score for the same tasks. These results were further improved to 0.854 mIoU and 0.806 F1-score using HistMatch normalization. In spite of greater model complexity, our model had a inference time of 15.7 ms which was comparable to pre-existing models, and suitable for real-time applications.
&lt;/p&gt;

&lt;p&gt;
&lt;strong&gt;Conclusion&lt;/strong&gt;
&lt;/p&gt;

&lt;p&gt;
Models with greater complexity are required for the relatively complex environments encountered in pastures, but this greater complexity need not come at the expense of real time capability. HistMatch normalization can improve model accuracy, and is particularly effective in cases where models are struggling to generalize well to testing conditions that vary significantly from those seen during training.
&lt;/p&gt;

&lt;p&gt;
&lt;strong&gt;Implications and impacts&lt;/strong&gt;
&lt;/p&gt;

&lt;p&gt;
The successful adaptation and improvement of CNNs for weed management in pastures could significantly reduce the reliance on blanket herbicide application. HistMatch normalization could also be considered for other agricultural applications, including weed management and disease detection in crop fields and orchards.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Abstract&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;abstract&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:2,&amp;quot;range&amp;quot;:&amp;quot;311-2710&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit3&quot; id=&quot;journal&quot;&gt;Journal&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://link.springer.com/journal/11119&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;https://link.springer.com/journal/11119&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Precision Agriculture&lt;/a&gt;
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Journal&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;journal&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:3,&amp;quot;range&amp;quot;:&amp;quot;2711-&amp;quot;} --&gt;</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Tue, 15 Jul 2025 06:19:35 +0000</pubDate>
        </item>
        <item>
            <title>pdcat2007</title>
            <link>https://davidjohnpaul.com/wiki/doku.php/research:pdcat2007</link>
            <description>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;isolation_and_web_services_transactions&quot;&gt;Isolation and Web Services Transactions&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://doi.org/10.1109/pdcat.2007.4420169&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;https://doi.org/10.1109/pdcat.2007.4420169&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Download&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;
Paul, D., Henskens, F. A. and Hannaford, M. R. “Isolation and Web Services Transactions”, The 8th International Conference on Parallel and Distributed Computing Applications and Technologies (PDCAT&amp;#039;07), Adelaide, Australia, December 2007.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Isolation and Web Services Transactions&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;isolation_and_web_services_transactions&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:1,&amp;quot;range&amp;quot;:&amp;quot;1-352&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit2&quot; id=&quot;abstract&quot;&gt;Abstract&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
The traditional ACID properties for transactions are typically ignored in the Web services environment to ensure an acceptable level of service. However, this common lack of isolation can cause difficulties. We look at ways to reduce these problems but still maintain an acceptable level of service.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Abstract&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;abstract&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:2,&amp;quot;range&amp;quot;:&amp;quot;353-675&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit3&quot; id=&quot;conference&quot;&gt;Conference&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;http://cs.adelaide.edu.au/users/pdcat07/&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;http://cs.adelaide.edu.au/users/pdcat07/&quot; rel=&quot;ugc nofollow noopener&quot;&gt;The 8th International Conference on Parallel and Distributed Computing Applications and Technologies&lt;/a&gt;
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Conference&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;conference&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:3,&amp;quot;range&amp;quot;:&amp;quot;676-&amp;quot;} --&gt;</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Fri, 09 Feb 2024 04:07:45 +0000</pubDate>
        </item>
        <item>
            <title>phd</title>
            <link>https://davidjohnpaul.com/wiki/doku.php/research:phd</link>
            <description>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;deliberate_cooperation_in_service-oriented_environmentsdynamic_transactional_workflows_for_web_services&quot;&gt;Deliberate Cooperation in Service-Oriented Environments: Dynamic Transactional Workflows for Web Services&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;http://hdl.handle.net/1959.13/932268&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;http://hdl.handle.net/1959.13/932268&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Download&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;
Paul D., “Deliberate Cooperation in Service-Oriented Environments: Dynamic Transactional Workflows for Web Services”, PhD thesis, University of Newcastle, Australia, 2012.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Deliberate Cooperation in Service-Oriented Environments: Dynamic Transactional Workflows for Web Services&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;deliberate_cooperation_in_service-oriented_environmentsdynamic_transactional_workflows_for_web_services&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:1,&amp;quot;range&amp;quot;:&amp;quot;1-345&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit2&quot; id=&quot;abstract&quot;&gt;Abstract&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
Modern society is complex and, in order to achieve desired goals, individuals must work together. Cooperation between parties can either be accidental, forced, or deliberate. Deliberate cooperation occurs when individuals realise that a successful outcome is more likely when they team up with others to achieve common goals. This thesis presents a method to support deliberate cooperation in service-oriented architectures. In such an environment, deliberate cooperation can be provided through improved transaction support. Service-oriented architectures are based on the concept of services. Providers advertise the services that they offer and clients send requests for the services to be performed without needing to understand the intricate details of how the outcomes are achieved. Clients often require services from multiple unrelated providers in order to achieve their goals, but current systems make it difficult to combine these services in such a way that the client is guaranteed an acceptable outcome. Further, the existing standards are not always flexible enough to allow service providers to always offer their desired level of transaction support. This thesis presents a method that allows service providers to dynamically alter the level of transaction support they offer for their services. This approach is more flexible than current approaches for Web Services transactions, and ensures that providers are always able to offer a level of support for cooperation with which they are comfortable. A formal system is also presented that allows clients to use the transactional guarantees offered by providers to reason about service compositions and ensure that client workflows always end in an acceptable state. To augment these theoretical results, a Web Services transactions simulator has been developed. By simulating transaction flow rather than service flow, this allows the dynamic transaction scheme described in this thesis to be compared with more traditional Web Services transactions. Results indicate that support for dynamic transactional workflows can provide an overall benefit for both clients and service providers, and the simulator allows detailed study of how changes to the transactional behaviour of participants affects the outcome of particular scenarios.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Abstract&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;abstract&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:2,&amp;quot;range&amp;quot;:&amp;quot;346-2672&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit3&quot; id=&quot;university&quot;&gt;University&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;http://www.newcastle.edu.au&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;http://www.newcastle.edu.au&quot; rel=&quot;ugc nofollow noopener&quot;&gt;The University of Newcastle, Australia&lt;/a&gt;
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;University&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;university&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:3,&amp;quot;range&amp;quot;:&amp;quot;2673-&amp;quot;} --&gt;</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Sun, 31 Jan 2016 07:13:57 +0000</pubDate>
        </item>
        <item>
            <title>research</title>
            <link>https://davidjohnpaul.com/wiki/doku.php/research:research</link>
            <description>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;research&quot;&gt;Research&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
My research interests are mostly in the areas of the Internet, Cloud computing, networking, and security and privacy.
However I am also interested in many areas of applied computer science, including e-Health, agriculture, sports science, business, and education.
&lt;/p&gt;

&lt;p&gt;
Please get in touch (&lt;a href=&quot;mailto:&amp;#68;&amp;#97;&amp;#118;&amp;#105;&amp;#100;&amp;#46;&amp;#80;&amp;#97;&amp;#117;&amp;#108;&amp;#64;&amp;#117;&amp;#110;&amp;#101;&amp;#46;&amp;#101;&amp;#100;&amp;#117;&amp;#46;&amp;#97;&amp;#117;&quot; class=&quot;mail&quot; title=&quot;&amp;#68;&amp;#97;&amp;#118;&amp;#105;&amp;#100;&amp;#46;&amp;#80;&amp;#97;&amp;#117;&amp;#108;&amp;#64;&amp;#117;&amp;#110;&amp;#101;&amp;#46;&amp;#101;&amp;#100;&amp;#117;&amp;#46;&amp;#97;&amp;#117;&quot;&gt;&amp;#68;&amp;#97;&amp;#118;&amp;#105;&amp;#100;&amp;#46;&amp;#80;&amp;#97;&amp;#117;&amp;#108;&amp;#64;&amp;#117;&amp;#110;&amp;#101;&amp;#46;&amp;#101;&amp;#100;&amp;#117;&amp;#46;&amp;#97;&amp;#117;&lt;/a&gt;) if you&amp;#039;d like me to be involved in a project in these areas (if you would like me to supervise you for a research degree please &lt;a href=&quot;https://davidjohnpaul.com/wiki/doku.php/miscellaneous:research&quot; class=&quot;wikilink1&quot; target=&quot;_self&quot; title=&quot;miscellaneous:research&quot; data-wiki-id=&quot;miscellaneous:research&quot;&gt;read this first&lt;/a&gt;). Please also see my &lt;a href=&quot;https://scholar.google.com.au/citations?hl=en&amp;amp;user=vanLg40AAAAJ&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;https://scholar.google.com.au/citations?hl=en&amp;amp;user=vanLg40AAAAJ&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Google Scholar profile&lt;/a&gt;.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Research&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;research&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:1,&amp;quot;range&amp;quot;:&amp;quot;1-620&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit2&quot; id=&quot;grants&quot;&gt;Grants&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;
&lt;ol&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; University of New England SABL Teaching &amp;amp; Learning Grant, $9,967. &lt;em&gt;Development of Labs to Support Teaching and Learning Activities for Cybersecurity Training&lt;/em&gt;. With Tupakula, Brankovic, Billingsley, and Gaywood (2023)&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; University of New England SABL Teaching &amp;amp; Learning Grant, $9,971. &lt;em&gt;Creating and Developing Repository of Industry Partners for Cybersecurity and Computer Science Units and Projects&lt;/em&gt;. With Sadgrove, Brankovic, Tupakula, and Wysel (2023)&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; Australian Council of Deans of Information &amp;amp; Communications Technology, $16,000. &lt;em&gt;Technical and Educational Guidelines for Personalising Assessments through Assessment-as-Learning in Cybersecurity&lt;/em&gt;. With Sakzad, Sheard, Brankovic, Skerritt, Li, Billingsley, and Simon (2022-2023)&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; SheepCRC, $496,087. &lt;em&gt;Livestock Research Database&lt;/em&gt;. With Kwan and Billingsley, (2015-2016)&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; SheepCRC, $667,408. &lt;em&gt;Livestock App Building&lt;/em&gt;. With Kwan and Billingsley (2015-2016)&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; NeCTAR, $687,980. &lt;em&gt;Extension and Enhancement of Systems for the Australian Schizophrenia Research Bank (ASRB)&lt;/em&gt;. With Henskens, Loughland, McCabe, Bridge, Carr, and Duffy (2012)&lt;/div&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Grants&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;grants&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:2,&amp;quot;range&amp;quot;:&amp;quot;621-1761&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit3&quot; id=&quot;peer-reviewed_publications&quot;&gt;Peer-reviewed Publications&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;
&lt;ol&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; Ford, J., Sadgrove, E., &lt;strong&gt;Paul, D.&lt;/strong&gt; &lt;a href=&quot;https://davidjohnpaul.com/wiki/doku.php/research:sat2025&quot; class=&quot;wikilink1&quot; target=&quot;_self&quot; title=&quot;research:sat2025&quot; data-wiki-id=&quot;research:sat2025&quot;&gt;&amp;quot;Dual-Task Multi-Species Network Design and Training Using Advanced Augmentation Techniques&amp;quot;&lt;/a&gt;, Smart Agricultural Technology, 2025.&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; Hasan, A. B. M. M., Brankovic, L., &lt;strong&gt;Paul, D.&lt;/strong&gt;, and Sanin, C. &lt;a href=&quot;https://davidjohnpaul.com/wiki/doku.php/research:kes2025&quot; class=&quot;wikilink1&quot; target=&quot;_self&quot; title=&quot;research:kes2025&quot; data-wiki-id=&quot;research:kes2025&quot;&gt;&amp;quot;A Systematic Literature Review on Cybersecurity Ontology&amp;quot;&lt;/a&gt;, Procedia Computer Science, 270, 2025.&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; Alharbi, N., Ud Din, F., &lt;strong&gt;Paul, D.&lt;/strong&gt;, and Sadgrove, E. &lt;a href=&quot;https://davidjohnpaul.com/wiki/doku.php/research:joitmc2025&quot; class=&quot;wikilink1&quot; target=&quot;_self&quot; title=&quot;research:joitmc2025&quot; data-wiki-id=&quot;research:joitmc2025&quot;&gt;&amp;quot;Driving AI Chatbot Adoption: A Systematic Review of Factors, Barriers, and Future Research Directions&amp;quot;&lt;/a&gt;, Journal of Open Innovation: Technology, Market, and Complexity, 11(3), 2025.&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; Billingsley, W., Brankovic, L., Li, N., &lt;strong&gt;Paul, D.&lt;/strong&gt;, Sakzad, A., Skerritt, M. P., and Sheard, J. &lt;a href=&quot;https://davidjohnpaul.com/wiki/doku.php/research:iticse25&quot; class=&quot;wikilink1&quot; target=&quot;_self&quot; title=&quot;research:iticse25&quot; data-wiki-id=&quot;research:iticse25&quot;&gt;Diverging Assessment: A Student Perspective&lt;/a&gt;, the 30th ACM Conference on Innovation and Technology in Computer Science Education V. 1 (ITiCSE 2025), June 2025.&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; Ford, J., Sadgrove, E., &lt;strong&gt;Paul, D.&lt;/strong&gt; &lt;a href=&quot;https://davidjohnpaul.com/wiki/doku.php/research:pa2025&quot; class=&quot;wikilink1&quot; target=&quot;_self&quot; title=&quot;research:pa2025&quot; data-wiki-id=&quot;research:pa2025&quot;&gt;&amp;quot;Joint plant-spraypoint detector with ConvNeXt modules and HistMatch normalization&amp;quot;&lt;/a&gt;, Precision Agriculture, 26(24), 2025.&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; Tori, M., &lt;strong&gt;Paul, D.&lt;/strong&gt;, Billingsley, W. &lt;a href=&quot;https://davidjohnpaul.com/wiki/doku.php/research:itisia2024&quot; class=&quot;wikilink1&quot; target=&quot;_self&quot; title=&quot;research:itisia2024&quot; data-wiki-id=&quot;research:itisia2024&quot;&gt;&amp;quot;Using a Memetic Algorithm to Discover Secure S-Boxes&amp;quot;&lt;/a&gt;, Innovative Technologies in Intelligent Systems and Industrial Applications, Lecture Notes in Electrical Engineering, vol 117, 2024.&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; Van der Merwe, A., &lt;strong&gt;Paul, D.&lt;/strong&gt;, Schmalz, J., Schaerf, T. &lt;a href=&quot;https://davidjohnpaul.com/wiki/doku.php/research:dmsc2024&quot; class=&quot;wikilink1&quot; target=&quot;_self&quot; title=&quot;research:dmsc2024&quot; data-wiki-id=&quot;research:dmsc2024&quot;&gt;&amp;quot;Keyed S-boxes from sponge functions&amp;quot;&lt;/a&gt;, Journal of Discrete Mathematical Sciences and Cryptography, 27(8), 2241–2254, 2024.&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; Cummins, C., Charlton, G., Buxton, S., Shorter, K., &lt;strong&gt;Paul, D.&lt;/strong&gt;, Murphy, A. &lt;a href=&quot;https://davidjohnpaul.com/wiki/doku.php/research:smif2024&quot; class=&quot;wikilink1&quot; target=&quot;_self&quot; title=&quot;research:smif2024&quot; data-wiki-id=&quot;research:smif2024&quot;&gt;&amp;quot;Need a break? The locomotor and tackle pacing profile and loads of women’s rugby league match-play following various between-match turnaround durations&amp;quot;&lt;/a&gt;, Science and Medicine in Football, Vol. 1, No. 14, 2024.&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; Kurdi, M. H., Denden, M., &lt;strong&gt;Paul, D.&lt;/strong&gt; &lt;a href=&quot;https://davidjohnpaul.com/wiki/doku.php/research:jis2024&quot; class=&quot;wikilink1&quot; target=&quot;_self&quot; title=&quot;research:jis2024&quot; data-wiki-id=&quot;research:jis2024&quot;&gt;&amp;quot;A Study on the Challenges of Human-Centric Cyber-Security and the Guarantee of Information Quality&amp;quot;&lt;/a&gt;, Journal of Information Security, Vol 15, No 2, 2024.&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; Balogh, M., Billingsley, W., &lt;strong&gt;Paul, D.&lt;/strong&gt;, Kennan, M.A., Robertson-Dean, M. &lt;a href=&quot;https://davidjohnpaul.com/wiki/doku.php/research:ir2024&quot; class=&quot;wikilink1&quot; target=&quot;_self&quot; title=&quot;research:ir2024&quot; data-wiki-id=&quot;research:ir2024&quot;&gt;&amp;quot;Practices and pain points in personal records&amp;quot;&lt;/a&gt;, Information Research, Vol 29, No 1, 2024.&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; Sakzad, A., &lt;strong&gt;Paul, D.&lt;/strong&gt;, Sheard, J., Brankovic, L., Skerritt, M. P., Li, N., Minagar, S., Simon, Billingsley, W. &lt;a href=&quot;https://davidjohnpaul.com/wiki/doku.php/research:sigcse24&quot; class=&quot;wikilink1&quot; target=&quot;_self&quot; title=&quot;research:sigcse24&quot; data-wiki-id=&quot;research:sigcse24&quot;&gt;&amp;quot;Diverging assessments: What, Why, and Experiences&amp;quot;&lt;/a&gt;, SIGCSE 2024: Proceedings of the 55th ACM Technical Symposium on Computer Science Education V. 1, March 2024.&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; Wiltshire, I., Adapa, S., &lt;strong&gt;Paul, D.&lt;/strong&gt; &lt;a href=&quot;https://davidjohnpaul.com/wiki/doku.php/research:smebu2023&quot; class=&quot;wikilink1&quot; target=&quot;_self&quot; title=&quot;research:smebu2023&quot; data-wiki-id=&quot;research:smebu2023&quot;&gt;&amp;quot;Pandemic Speed: Accelerating Innovation in Cyber Security&amp;quot;&lt;/a&gt;, In Adapa, S., McKeown, T., Lazaris, M., Jurado, T. (eds) Small and Medium-sized Enterprises, and Business Uncertainty. Palgrave Studies in Global Entrepreneurship. Palgrave Macmillan, Singapore, 2023.&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; Tori, M., &lt;strong&gt;Paul, D.&lt;/strong&gt;, Billingsley, W. &lt;a href=&quot;https://davidjohnpaul.com/wiki/doku.php/research:citisia2023&quot; class=&quot;wikilink1&quot; target=&quot;_self&quot; title=&quot;research:citisia2023&quot; data-wiki-id=&quot;research:citisia2023&quot;&gt;&amp;quot;Using A Memetic Algorithm to Discover Secure S-Boxes&amp;quot;&lt;/a&gt;, Conference on Innovative Technologies in Intelligent Systems &amp;amp; Industrial Applications (CITISIA2023), 2023.&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; Van der Merwe, A., &lt;strong&gt;Paul, D.&lt;/strong&gt;, Schmalz, J., Schaerf, T. &lt;a href=&quot;https://davidjohnpaul.com/wiki/doku.php/research:dmsc2023&quot; class=&quot;wikilink1&quot; target=&quot;_self&quot; title=&quot;research:dmsc2023&quot; data-wiki-id=&quot;research:dmsc2023&quot;&gt;&amp;quot;An examination of the security of the TR-31 and AS 2805 schemes&amp;quot;&lt;/a&gt;, Journal of Discrete Mathematical Sciences and Cryptography, 26(6), 1761–1771, 2023.&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; Ford, J., Sadgrove, E., &lt;strong&gt;Paul, D.&lt;/strong&gt; &lt;a href=&quot;https://davidjohnpaul.com/wiki/doku.php/research:sat2023&quot; class=&quot;wikilink1&quot; target=&quot;_self&quot; title=&quot;research:sat2023&quot; data-wiki-id=&quot;research:sat2023&quot;&gt;&amp;quot;Developing an extreme learning machine based approach to weed segmentation in pastures&amp;quot;&lt;/a&gt;, Smart Agricultural Technology, 2023.&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; Ud Din, F., &lt;strong&gt;Paul, D.&lt;/strong&gt; &lt;a href=&quot;https://davidjohnpaul.com/wiki/doku.php/research:intellisys2022&quot; class=&quot;wikilink1&quot; target=&quot;_self&quot; title=&quot;research:intellisys2022&quot; data-wiki-id=&quot;research:intellisys2022&quot;&gt;&amp;quot;Demystifying xAOSF/AOSR framework in the context of Digital Twin and Industry 4.0&amp;quot;&lt;/a&gt;, Intelligent Systems and Applications (IntelliSys 2022), Lecture Notes in Networks and Systems, vol 544, 2023.&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; Cummins, C., Charlton, G., &lt;strong&gt;Paul, D.&lt;/strong&gt;, Buxton, S., Murphy, A. &lt;a href=&quot;https://davidjohnpaul.com/wiki/doku.php/research:smif2022&quot; class=&quot;wikilink1&quot; target=&quot;_self&quot; title=&quot;research:smif2022&quot; data-wiki-id=&quot;research:smif2022&quot;&gt;&amp;quot;How fast is fast? Defining Velocity Zones in Women’s Rugby League&amp;quot;&lt;/a&gt;, Science and Medicine in Football, Vol. 7, No. 2, 2023.&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; Cummins, C., Charlton, G., &lt;strong&gt;Paul, D.&lt;/strong&gt;, Murphy, A. &lt;a href=&quot;https://davidjohnpaul.com/wiki/doku.php/research:smif2022b&quot; class=&quot;wikilink1&quot; target=&quot;_self&quot; title=&quot;research:smif2022b&quot; data-wiki-id=&quot;research:smif2022b&quot;&gt;&amp;quot;Changing gears: data-driven velocity zones to support monitoring and research in men’s rugby league&amp;quot;&lt;/a&gt;, Science and Medicine in Football, 2022.&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; Ud Din, F., &lt;strong&gt;Paul, D.&lt;/strong&gt;, Henskens, F., Wallis, M., Hashmi, M. &lt;a href=&quot;https://davidjohnpaul.com/wiki/doku.php/research:ijads2021&quot; class=&quot;wikilink1&quot; target=&quot;_self&quot; title=&quot;research:ijads2021&quot; data-wiki-id=&quot;research:ijads2021&quot;&gt;&amp;quot;AOSR: An Agent Oriented Storage and Retrieval WMS planner for SMEs, associated with AOSF framework, under Industry 4.0&amp;quot;&lt;/a&gt;, International Journal of Applied Decision Sciences, Vol. 15, No. 5, 2022.&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; Abed-alguni, B., Alawad, N., Al-Betar, M. A., &lt;strong&gt;Paul, D.&lt;/strong&gt;, &lt;a href=&quot;https://davidjohnpaul.com/wiki/doku.php/research:ai2022b&quot; class=&quot;wikilink1&quot; target=&quot;_self&quot; title=&quot;research:ai2022b&quot; data-wiki-id=&quot;research:ai2022b&quot;&gt;&amp;quot;Opposition-based Sine Cosine Optimizer Utilizing Refraction Learning and Variable Neighborhood Search for Feature Selection&amp;quot;&lt;/a&gt;, Applied Intelligence 2022.&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; Alghamdi, A., &lt;strong&gt;Paul, D.&lt;/strong&gt;, Sadgrove, E., &lt;a href=&quot;https://davidjohnpaul.com/wiki/doku.php/research:sncs2022&quot; class=&quot;wikilink1&quot; target=&quot;_self&quot; title=&quot;research:sncs2022&quot; data-wiki-id=&quot;research:sncs2022&quot;&gt;&amp;quot;Designing a RESTful Northbound Interface for Incompatible Software Defined Network Controllers&amp;quot;&lt;/a&gt;, SN Computer Science, 3(502), 2022.&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; Balogh, M., Billingsley, W., &lt;strong&gt;Paul, D.&lt;/strong&gt;, Kennan, M.A. &lt;a href=&quot;https://davidjohnpaul.com/wiki/doku.php/research:am2022&quot; class=&quot;wikilink1&quot; target=&quot;_self&quot; title=&quot;research:am2022&quot; data-wiki-id=&quot;research:am2022&quot;&gt;&amp;quot;Attributes of Personal Electronic Records&amp;quot;&lt;/a&gt;, Archives &amp;amp; Manuscripts, 50(1), pp 47-70, 2022.&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; Schmalz, J., &lt;strong&gt;Paul, D.&lt;/strong&gt;, Shorter, K., Schmalz, X., Cooper, M., Murphy, A. &lt;a href=&quot;https://davidjohnpaul.com/wiki/doku.php/research:mathsport22&quot; class=&quot;wikilink1&quot; target=&quot;_self&quot; title=&quot;research:mathsport22&quot; data-wiki-id=&quot;research:mathsport22&quot;&gt;&amp;quot;Modelling human gait using a nonlinear differential equation&amp;quot;&lt;/a&gt;, 16th Australasian Conference on Mathematics and Computers in Sport (Mathsport 2022), 2022.&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; Balogh, M., Billingsley, W., &lt;strong&gt;Paul, D.&lt;/strong&gt;, Kennan, M.A. &lt;a href=&quot;https://davidjohnpaul.com/wiki/doku.php/research:ir2022&quot; class=&quot;wikilink1&quot; target=&quot;_self&quot; title=&quot;research:ir2022&quot; data-wiki-id=&quot;research:ir2022&quot;&gt;&amp;quot;Understanding the management of personal records at home: A virtual guided tour&amp;quot;&lt;/a&gt;, Information Research, 27(2), paper 926, 2022.&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; Tori, M., &lt;strong&gt;Paul, D.&lt;/strong&gt;, Billingsley, W. &lt;a href=&quot;https://davidjohnpaul.com/wiki/doku.php/research:icwmc2022&quot; class=&quot;wikilink1&quot; target=&quot;_self&quot; title=&quot;research:icwmc2022&quot; data-wiki-id=&quot;research:icwmc2022&quot;&gt;&amp;quot;Considerations When Designing Sponge-based Extendable-Output Functions for Lightweight and Mobile Devices&amp;quot;&lt;/a&gt;, The Eighteenth International Conference on Wireless and Mobile Communications (ICWMC), 2022.&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; Abed-alguni, B., &lt;strong&gt;Paul, D.&lt;/strong&gt;, Hammad, R. &lt;a href=&quot;https://davidjohnpaul.com/wiki/doku.php/research:ai2022&quot; class=&quot;wikilink1&quot; target=&quot;_self&quot; title=&quot;research:ai2022&quot; data-wiki-id=&quot;research:ai2022&quot;&gt;&amp;quot;Improved Salp Swarm Algorithm for Solving Single-objective Continuous Optimization Problems&amp;quot;&lt;/a&gt;, Applied Intelligence, 2022.&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; Abed-alguni, B., &lt;strong&gt;Paul, D.&lt;/strong&gt; &lt;a href=&quot;https://davidjohnpaul.com/wiki/doku.php/research:soft2021&quot; class=&quot;wikilink1&quot; target=&quot;_self&quot; title=&quot;research:soft2021&quot; data-wiki-id=&quot;research:soft2021&quot;&gt;&amp;quot;Island-based Cuckoo Search with Elite Opposition-based Learning and Multiple Mutation Methods for Solving Optimization Problems&amp;quot;&lt;/a&gt;, Soft Computing, 2022.&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; H.K., J., Henskens, F., &lt;strong&gt;Paul, D.&lt;/strong&gt;, Wallis, M. &lt;a href=&quot;https://davidjohnpaul.com/wiki/doku.php/research:ijcat2020b&quot; class=&quot;wikilink1&quot; target=&quot;_self&quot; title=&quot;research:ijcat2020b&quot; data-wiki-id=&quot;research:ijcat2020b&quot;&gt;&amp;quot;Formal Specification at Model-Level of Model-Driven Engineering using Modelling Techniques&amp;quot;&lt;/a&gt;, International Journal of Computer Applications in Technology, 67(4), 2021.&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; Shojaeipour, A., Falzon, G., Kwan, P., Hadavi, N., Cowley, F.C., &lt;strong&gt;Paul, D.&lt;/strong&gt; &lt;a href=&quot;https://davidjohnpaul.com/wiki/doku.php/research:agron2021&quot; class=&quot;wikilink1&quot; target=&quot;_self&quot; title=&quot;research:agron2021&quot; data-wiki-id=&quot;research:agron2021&quot;&gt;&amp;quot;Automated Muzzle Detection and Biometric Identification via Few-Shot Deep Transfer Learning of Mixed Breed Cattle&amp;quot;&lt;/a&gt;, Agronomy, 11(11), 2365, November 2021.&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; Alghamdi, A., &lt;strong&gt;Paul, D.&lt;/strong&gt; and Sadgrove, E. &lt;a href=&quot;https://davidjohnpaul.com/wiki/doku.php/research:webist2021&quot; class=&quot;wikilink1&quot; target=&quot;_self&quot; title=&quot;research:webist2021&quot; data-wiki-id=&quot;research:webist2021&quot;&gt;&amp;quot;A RESTful Northbound Interface for Applications in Software Defined Networks&amp;quot;&lt;/a&gt;, 17th International Conference on Web Information Systems and Technologies (WEBIST 2021), pp. 453-459, October 2021.&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; Cummins, C., Charlton, G., &lt;strong&gt;Paul, D.&lt;/strong&gt;, Shorter, K., Buxton, S., Caia, J., Murphy, A. &lt;a href=&quot;https://davidjohnpaul.com/wiki/doku.php/research:frontiers2021&quot; class=&quot;wikilink1&quot; target=&quot;_self&quot; title=&quot;research:frontiers2021&quot; data-wiki-id=&quot;research:frontiers2021&quot;&gt;&amp;quot;Women’s rugby league: Positional groups and peak locomotor demands &amp;quot;&lt;/a&gt;, Frontiers in Sports and Active Living, 3, 2021.&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; Ud Din, F., &lt;strong&gt;Paul, D.&lt;/strong&gt;, Ryan, J., Henskens, F., Wallis, M. &lt;a href=&quot;https://davidjohnpaul.com/wiki/doku.php/research:fi2021&quot; class=&quot;wikilink1&quot; target=&quot;_self&quot; title=&quot;research:fi2021&quot; data-wiki-id=&quot;research:fi2021&quot;&gt;&amp;quot;AOSR 2.0: A Novel Approach and Thorough Validation of Agent Oriented Storage and Retrieval WMS planner for SMEs, under Industry 4.0&amp;quot;&lt;/a&gt;, Future Internet, 13(6), 155, June 2021.&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; Ud Din, F., &lt;strong&gt;Paul, D.&lt;/strong&gt;, Henskens, F., Wallis, M. &lt;a href=&quot;https://davidjohnpaul.com/wiki/doku.php/research:jsw2020b&quot; class=&quot;wikilink1&quot; target=&quot;_self&quot; title=&quot;research:jsw2020b&quot; data-wiki-id=&quot;research:jsw2020b&quot;&gt;&amp;quot;Conceptualised Visualisation of Extended Agent Oriented Smart Factory (xAOSF) framework with associated AOSR-WMS system&amp;quot;&lt;/a&gt;, Journal of Software, 16(4), 2021.&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; Din F.U., Paul D., Ryan J., Henskens F., Wallis M. &lt;a href=&quot;https://davidjohnpaul.com/wiki/doku.php/research:amas2020&quot; class=&quot;wikilink1&quot; target=&quot;_self&quot; title=&quot;research:amas2020&quot; data-wiki-id=&quot;research:amas2020&quot;&gt;&amp;quot;Revitalising and Validating the Novel Approach of xAOSF Framework Under Industry 4.0 in Comparison with Linear SC&amp;quot;&lt;/a&gt; In Jezic G., Chen-Burger J., Kusek M., Sperka R., Howlett R., Jain L. (eds) Agents and Multi-Agent Systems: Technologies and Applications 2020. Smart Innovation, Systems and Technologies, vol 186. Springer, Singapore, 2020.&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; HK, J., Jetley, R., Henskens, F., &lt;strong&gt;Paul, D.&lt;/strong&gt;, Wallis, M., SD, S. &lt;a href=&quot;https://davidjohnpaul.com/wiki/doku.php/research:ijcat2020&quot; class=&quot;wikilink1&quot; target=&quot;_self&quot; title=&quot;research:ijcat2020&quot; data-wiki-id=&quot;research:ijcat2020&quot;&gt;&amp;quot;Multi-Level Analysis of IEC 61131-3 Languages to Detect Clones&amp;quot;&lt;/a&gt;, International Journal of Computer Applications in Technology, October 2020.&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; Ud Din, F., &lt;strong&gt;Paul, D.&lt;/strong&gt;, Ryan, J., Henskens, F., Wallis, M. &lt;a href=&quot;https://davidjohnpaul.com/wiki/doku.php/research:jsw2020&quot; class=&quot;wikilink1&quot; target=&quot;_self&quot; title=&quot;research:jsw2020&quot; data-wiki-id=&quot;research:jsw2020&quot;&gt;&amp;quot;Validating Time Efficiency of AOSR 2.0: A Novel WMS planner Algorithm for SMEs, under Industry 4.0&amp;quot;&lt;/a&gt;, Journal of Software, 15(2), pp. 53-61, 2020.&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; Abed-alguni, B., &lt;strong&gt;Paul, D.&lt;/strong&gt; &lt;a href=&quot;https://davidjohnpaul.com/wiki/doku.php/research:jisys2018&quot; class=&quot;wikilink1&quot; target=&quot;_self&quot; title=&quot;research:jisys2018&quot; data-wiki-id=&quot;research:jisys2018&quot;&gt;&amp;quot;Hybridizing The Cuckoo Search Algorithm with Different Mutation operators for Numerical Optimization Problems&amp;quot;&lt;/a&gt;, Journal of Intelligent Systems, Vol. 29 (Issue 1), pp. 1043-1062, 2020.&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; Guo, L, Wang, W., Kwan, P., Welch, M., &lt;strong&gt;Paul, D.&lt;/strong&gt;, Chen, G., Xu, B. &lt;a href=&quot;https://davidjohnpaul.com/wiki/doku.php/research:ast2019&quot; class=&quot;wikilink1&quot; target=&quot;_self&quot; title=&quot;research:ast2019&quot; data-wiki-id=&quot;research:ast2019&quot;&gt;&amp;quot;Advances in livestock behavior monitoring based on accelerometer motion sensor.&amp;quot;&lt;/a&gt; Journal of Agricultural Science and Technology (Beijing) 21.3, pp.94-101, 2019.&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; HK, J., Jetley, R., Henskens, F., &lt;strong&gt;Paul, D.&lt;/strong&gt;, Wallis, M., SD, S. &lt;a href=&quot;https://davidjohnpaul.com/wiki/doku.php/research:icit2019&quot; class=&quot;wikilink1&quot; target=&quot;_self&quot; title=&quot;research:icit2019&quot; data-wiki-id=&quot;research:icit2019&quot;&gt;&amp;quot;Analysis of Industrial Control System Software to Detect Semantic Clones&amp;quot;&lt;/a&gt;, International Conference on Industrial Technology (ICIT19), Melbourne, Australia, IEEE, February 2019.&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; Ud Din, F., Henskens, F., &lt;strong&gt;Paul, D.&lt;/strong&gt;, Wallis, M. &lt;a href=&quot;https://davidjohnpaul.com/wiki/doku.php/research:ten2018&quot; class=&quot;wikilink1&quot; target=&quot;_self&quot; title=&quot;research:ten2018&quot; data-wiki-id=&quot;research:ten2018&quot;&gt;&amp;quot;Formalisation of Problem and Domain Definition for Agent Oriented Smart Factory (AOSF)&amp;quot;&lt;/a&gt;, IEEE TENSYMP 2018, Sydney, Australia, IEEE, July 2018.&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; Fitzgerald, P. T., Kahn, L. P., Shahinfar, S., &lt;strong&gt;Paul, D.&lt;/strong&gt;, Goodacre, M. Kemmis, L. S. &lt;a href=&quot;https://davidjohnpaul.com/wiki/doku.php/research:ap2018&quot; class=&quot;wikilink1&quot; target=&quot;_self&quot; title=&quot;research:ap2018&quot; data-wiki-id=&quot;research:ap2018&quot;&gt;&amp;quot;On Farm Validation of ASKBILL – A Sheep Wellbeing and Productivity Application for Australian Industry&amp;quot;&lt;/a&gt;, Animal Production 2018: Fostering Innovation through the Value Chain, Wagga Wagga, Australia, July 2018.&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; Ud Din, F., Henskens, F., &lt;strong&gt;Paul, D.&lt;/strong&gt;, Wallis, M. &lt;a href=&quot;https://davidjohnpaul.com/wiki/doku.php/research:kes18&quot; class=&quot;wikilink1&quot; target=&quot;_self&quot; title=&quot;research:kes18&quot; data-wiki-id=&quot;research:kes18&quot;&gt;&amp;quot;Agent-Oriented Smart Factory (AOSF): An MAS Based Framework for SMEs Under Industry 4.0&amp;quot;&lt;/a&gt;, In Agents and Multi-Agent Systems: Technologies and Applications 2018 Proceedings of the 12th International Conference on Agents and Multi-Agent Systems: Technologies and Applications (KES-AMSTA-18). 44-54. Springer, May 2018 (Awarded Best Paper at conference).&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; Hk, J., Henskens, F., &lt;strong&gt;Paul, D.&lt;/strong&gt;, Wallis, M. &lt;a href=&quot;https://davidjohnpaul.com/wiki/doku.php/research:i2ct2018&quot; class=&quot;wikilink1&quot; target=&quot;_self&quot; title=&quot;research:i2ct2018&quot; data-wiki-id=&quot;research:i2ct2018&quot;&gt;&amp;quot;Clone Detection in Model-Based Development Using Formal Methods to Enhance Performance in Software Development&amp;quot;&lt;/a&gt;, In 3rd International Conference for Convergence in Technology (I2CT), Pune, India, IEEE, April 2018.&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; Agarwal, N., Kwan, P., and &lt;strong&gt;Paul, D.&lt;/strong&gt; &lt;a href=&quot;https://davidjohnpaul.com/wiki/doku.php/research:sc2018&quot; class=&quot;wikilink1&quot; target=&quot;_self&quot; title=&quot;research:sc2018&quot; data-wiki-id=&quot;research:sc2018&quot;&gt;&amp;quot;Behavioral merger and acquisition pricing: Application to Verizon mergers with AOL and Yahoo&amp;quot;&lt;/a&gt;, Strategic Change, 27(1), pp. 9-22, January 2018.&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; Agarwal, N., Kwan, P., and &lt;strong&gt;Paul, D.&lt;/strong&gt; &lt;a href=&quot;https://davidjohnpaul.com/wiki/doku.php/research:emfm2018&quot; class=&quot;wikilink1&quot; target=&quot;_self&quot; title=&quot;research:emfm2018&quot; data-wiki-id=&quot;research:emfm2018&quot;&gt;&amp;quot;Merger and Acquisition Pricing using Agent Based Modelling&amp;quot;&lt;/a&gt;, Economics, Management, and Financial Markets, 13(1), pp. 84-99, January 2018.&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; Shaw, A., &lt;strong&gt;Paul, D.&lt;/strong&gt;, Billingsley, W., Kwan, P., and Wilson, R. &lt;a href=&quot;https://davidjohnpaul.com/wiki/doku.php/research:its2017&quot; class=&quot;wikilink1&quot; target=&quot;_self&quot; title=&quot;research:its2017&quot; data-wiki-id=&quot;research:its2017&quot;&gt;&amp;quot;Gamification in e-Mental Health: Development of a Digital Intervention addressing Severe Mental Illness and Metabolic Syndrome&amp;quot;&lt;/a&gt;, IADIS International Conference on Internet Technologies &amp;amp; Society (ITS 2017), Sydney, Australia, IADIS, pp. 83-90, December 2017.&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; McCrabb, S., Bonevski, B., Balogh, Z., Baker, A., Harris, I. A., Attia, J., Lott, N., Naylor, J., Doran, C., George, J., Wolfenden, L., Wallis, M., &lt;strong&gt;Paul, D.&lt;/strong&gt;, Henskens, F., and Skelton, E. &lt;a href=&quot;https://davidjohnpaul.com/wiki/doku.php/research:bmj2017&quot; class=&quot;wikilink1&quot; target=&quot;_self&quot; title=&quot;research:bmj2017&quot; data-wiki-id=&quot;research:bmj2017&quot;&gt;&amp;quot;Development of an online smoking cessation program for use in hospital and following discharge: Smoke-Free Recovery&amp;quot;&lt;/a&gt;, BMJ Innovations, 3(2), March 2017.&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; Wallis, M., Henskens, F. A., Hannaford, M. and &lt;strong&gt;Paul, D.&lt;/strong&gt; J. &lt;a href=&quot;https://davidjohnpaul.com/wiki/doku.php/research:icita2017&quot; class=&quot;wikilink1&quot; target=&quot;_self&quot; title=&quot;research:icita2017&quot; data-wiki-id=&quot;research:icita2017&quot;&gt;&amp;quot;Implementation and Evaluation of a Component-Based framework for Internet Applications&amp;quot;&lt;/a&gt;, Information Technology in Industry, 5(1), pp. 16-23, March 2017.&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; Jnanamurthy HK, Henskens, F. A. and &lt;strong&gt;Paul, D.&lt;/strong&gt; &lt;a href=&quot;https://davidjohnpaul.com/wiki/doku.php/research:ic3i2016&quot; class=&quot;wikilink1&quot; target=&quot;_self&quot; title=&quot;research:ic3i2016&quot; data-wiki-id=&quot;research:ic3i2016&quot;&gt;&amp;quot;Verification of Interactive Automated Air Traffic Control System in a Model Driven Approach&amp;quot;&lt;/a&gt;, 2nd International Conference on Contemporary Computing and Informatics (IC3I 2016), December 2016.&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; Wilson, R. L., &lt;strong&gt;Paul, D.&lt;/strong&gt;, Kwan, P. W. H, Billingsley, W and Shaw, A. &lt;a href=&quot;https://davidjohnpaul.com/wiki/doku.php/research:iepa102016&quot; class=&quot;wikilink1&quot; target=&quot;_self&quot; title=&quot;research:iepa102016&quot; data-wiki-id=&quot;research:iepa102016&quot;&gt;&amp;quot;MetaMood Phase Two: The software engineering of an Android app for a mental health e-health intervention using a novel gaming strategy&amp;quot;&lt;/a&gt; (abstract), IEPA10 Early Intervention in Mental Health, October 2016.&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; Wallis, M., Henskens, F. A., &lt;strong&gt;Paul, D.&lt;/strong&gt;, and Hannaford, M. &lt;a href=&quot;https://davidjohnpaul.com/wiki/doku.php/research:icita2016&quot; class=&quot;wikilink1&quot; target=&quot;_self&quot; title=&quot;research:icita2016&quot; data-wiki-id=&quot;research:icita2016&quot;&gt;&amp;quot;Implementation and Evaluation of a Component-Based framework for Internet Applications&amp;quot;&lt;/a&gt;, 11th International Conference on Information Technology and Applications (ICITA2016), July 2016.&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; Abed-Alguni, B. H., &lt;strong&gt;Paul, D.&lt;/strong&gt;, Chalup, S. K., and Henskens, F. A. &lt;a href=&quot;https://davidjohnpaul.com/wiki/doku.php/research:ijai2016&quot; class=&quot;wikilink1&quot; target=&quot;_self&quot; title=&quot;research:ijai2016&quot; data-wiki-id=&quot;research:ijai2016&quot;&gt;&amp;quot;A Comparison Study of Cooperative Q-learning Algorithms for Independent Learners&amp;quot;&lt;/a&gt;, International Journal of Artificial Intelligence, 14:1, pp 71-93, March 2016.&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; Abed-Alguni, B. H., Chalup, S. K., Henskens, F. A., and &lt;strong&gt;Paul, D.&lt;/strong&gt; &lt;a href=&quot;https://davidjohnpaul.com/wiki/doku.php/research:vjcs2015&quot; class=&quot;wikilink1&quot; target=&quot;_self&quot; title=&quot;research:vjcs2015&quot; data-wiki-id=&quot;research:vjcs2015&quot;&gt;&amp;quot;A Multi-Agent Cooperative Reinforcement Learning Model Using a Hierarchy of Consultants, Tutors and Workers&amp;quot;&lt;/a&gt;, Vietnam Journal of Computer Science, 2:4, pp 213-226, November 2015.&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; Fradgley, E. A., Paul, C. L., Bryany, J., Roos, I. A. G., Henskens, F. A., and &lt;strong&gt;Paul, D.&lt;/strong&gt; &lt;a href=&quot;https://davidjohnpaul.com/wiki/doku.php/research:jmir2014&quot; class=&quot;wikilink1&quot; target=&quot;_self&quot; title=&quot;research:jmir2014&quot; data-wiki-id=&quot;research:jmir2014&quot;&gt;&amp;quot;Consumer Participation in Quality Improvements for Chronic Disease Care: Development and Evaluation of an Interactive Patient-centered Survey to Identify Preferred Service Initiatives&amp;quot;&lt;/a&gt;, Journal of Medical Internet Research, December 2014.&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; Henskens, F. A., &lt;strong&gt;Paul, D.&lt;/strong&gt;, Wallis, M., Bryant, J., Carey, M., Fradgley, E., Koller, C. E., Paul, C. L., Sanson-Fisher, R. W., and Zucca, A. &lt;a href=&quot;https://davidjohnpaul.com/wiki/doku.php/research:ehealth2014b&quot; class=&quot;wikilink1&quot; target=&quot;_self&quot; title=&quot;research:ehealth2014b&quot; data-wiki-id=&quot;research:ehealth2014b&quot;&gt;&amp;quot;How do Health Researchers Benefit from Web-based Survey Systems?&amp;quot;&lt;/a&gt;, The 6th International Conference on e-Health, Lisbon, Portugal, IADIS, pp. 254-262, July 2014.&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; &lt;strong&gt;Paul, D.&lt;/strong&gt;, Henskens, F. A., Bryant, J., Smits, R., Sanson-Fisher, R.W., and Stevenson, W. &lt;a href=&quot;https://davidjohnpaul.com/wiki/doku.php/research:ehealth2014&quot; class=&quot;wikilink1&quot; target=&quot;_self&quot; title=&quot;research:ehealth2014&quot; data-wiki-id=&quot;research:ehealth2014&quot;&gt;&amp;quot;The Haematology Treatment Aid: Providing Personalized Information to Patients and Carers&amp;quot;&lt;/a&gt;, The 6th International Conference on e-Health, Lisbon, Portugal, IADIS, pp. 372-376, July 2014.&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; &lt;strong&gt;Paul, D.&lt;/strong&gt; and Henskens, F. A. &lt;a href=&quot;https://davidjohnpaul.com/wiki/doku.php/research:lnbip2013&quot; class=&quot;wikilink1&quot; target=&quot;_self&quot; title=&quot;research:lnbip2013&quot; data-wiki-id=&quot;research:lnbip2013&quot;&gt;&amp;quot;Engineering Flexible Service-Oriented Transactions&amp;quot;&lt;/a&gt;, Lecture Notes in Business Information Processing (LNBIP), Volume 189, Springer-Verlag, pp 37-52, July 2014.&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; Henskens, F. A., &lt;strong&gt;Paul, D.&lt;/strong&gt;, Wallis, M., Bryant, J., Carey, M., Fradgley, E., Koller, C. E., Paul, C. L., Sanson-Fisher, R. W. and Zucca, A. &lt;a href=&quot;https://davidjohnpaul.com/wiki/doku.php/research:healthinf2014&quot; class=&quot;wikilink1&quot; target=&quot;_self&quot; title=&quot;research:healthinf2014&quot; data-wiki-id=&quot;research:healthinf2014&quot;&gt;&amp;quot;Web-based Support for Population-based Medical Research - Presenting the QuON Survey System&amp;quot;&lt;/a&gt;, The 7th International Conference on Health Informatics (HealthInf14), Angers, France, INSTICC, March 2014.&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; &lt;strong&gt;Paul, D.&lt;/strong&gt;, Henskens, F. A. and Bridge, J. &lt;a href=&quot;https://davidjohnpaul.com/wiki/doku.php/research:eres2013&quot; class=&quot;wikilink1&quot; target=&quot;_self&quot; title=&quot;research:eres2013&quot; data-wiki-id=&quot;research:eres2013&quot;&gt;&amp;quot;Improving the Australian Schizophrenia Research Bank&amp;quot;&lt;/a&gt;, eResearch Australasia (eRes2013), Brisbane, Australia, 2013.&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; &lt;strong&gt;Paul, D.&lt;/strong&gt;, Wallis, M., Henskens, F. A. and Nolan, K. &lt;a href=&quot;https://davidjohnpaul.com/wiki/doku.php/research:webist2013a&quot; class=&quot;wikilink1&quot; target=&quot;_self&quot; title=&quot;research:webist2013a&quot; data-wiki-id=&quot;research:webist2013a&quot;&gt;&amp;quot;QuON - A Generic Platform for the Collation and Sharing of Web Survey Data&amp;quot;&lt;/a&gt;, The 9th International Conference on Web Information Systems and Technologies (WEBIST2013), Aachen, Germany, INSTICC, pp. 111-116, May 2013.&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; &lt;strong&gt;Paul, D.&lt;/strong&gt;, Henskens, F. A. and Hannaford, M. R. &lt;a href=&quot;https://davidjohnpaul.com/wiki/doku.php/research:webist2013&quot; class=&quot;wikilink1&quot; target=&quot;_self&quot; title=&quot;research:webist2013&quot; data-wiki-id=&quot;research:webist2013&quot;&gt;&amp;quot;Dynamic Transactional Workflows In Service-Oriented Environments&amp;quot;&lt;/a&gt;, The 9th International Conference on Web Information Systems and Technologies (WEBIST2013), Aachen, Germany, INSTICC, pp. 26-36, May 2013.&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; &lt;strong&gt;Paul, D.&lt;/strong&gt;, Henskens, F.A., Loughland, C., McCabe, K., Bridge, J., Duffy, L., Carr, V., Catts, S., Jablensky, A., Michie, P., Mowry, B., Pantelis, P., Schall, U., and Scott, R.J. &lt;a href=&quot;https://davidjohnpaul.com/wiki/doku.php/research:its2012&quot; class=&quot;wikilink1&quot; target=&quot;_self&quot; title=&quot;research:its2012&quot; data-wiki-id=&quot;research:its2012&quot;&gt;&amp;quot;Issues Preventing the Migration of the Australian Schizophrenia Research Bank to The Cloud&amp;quot;&lt;/a&gt;, IADIS International Conference on Internet Technologies &amp;amp; Society (ITS 2012), Perth, Australia, IADIS, pp. 305-308, November 2012.&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; Paul D., &lt;a href=&quot;https://davidjohnpaul.com/wiki/doku.php/research:phd&quot; class=&quot;wikilink1&quot; target=&quot;_self&quot; title=&quot;research:phd&quot; data-wiki-id=&quot;research:phd&quot;&gt;&amp;quot;Deliberate Cooperation in Service-Oriented Environments: Dynamic Transactional Workflows for Web Services&amp;quot;&lt;/a&gt;, PhD thesis, University of Newcastle, Australia, 2012.&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; Henskens, F.A., &lt;strong&gt;Paul, D.&lt;/strong&gt;, Loughland, C., Bridge, J., McCabe, K., Catts, S., Jablensky, A., Michie, P., Mowry, B., Pantelis, P., Schall, U., Tooney, P., Duffy, L. and Carr, V. &lt;a href=&quot;https://davidjohnpaul.com/wiki/doku.php/research:schizophreniaresearch2012&quot; class=&quot;wikilink1&quot; target=&quot;_self&quot; title=&quot;research:schizophreniaresearch2012&quot; data-wiki-id=&quot;research:schizophreniaresearch2012&quot;&gt;&amp;quot;The Australian Schizophrenia Research Biobank (ASRB): IT development and management of a live e-research system&amp;quot;&lt;/a&gt;, Schizophrenia Research 136(Supplement 1), Elsevier, pp. S250, 2012.&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; &lt;strong&gt;Paul, D.&lt;/strong&gt; Henskens, F.A. Loughland C.M., Bridge, J., McCabe K., Carr, V.J., Catts, S.V., Jablensky, A., Michie, P.T., Mowry, B.J., Pantelis, C., Schall, U. and Scott, R.J., &lt;a href=&quot;https://davidjohnpaul.com/wiki/doku.php/research:healthinf2012&quot; class=&quot;wikilink1&quot; target=&quot;_self&quot; title=&quot;research:healthinf2012&quot; data-wiki-id=&quot;research:healthinf2012&quot;&gt;&amp;quot;IT Development and Management of a Live e-Research System: Experiences with the Australian Schizophrenia Research Bank&amp;quot;&lt;/a&gt;, The 5th International Conference on Health Informatics (HealthInf2012), Vilamoura, Portugal, INSTICC, pp. 125-130, February 2012.&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; Alharbi, A., &lt;strong&gt;Paul, D.&lt;/strong&gt;, Henskens, F. A. and Hannaford, M. R. &lt;a href=&quot;https://davidjohnpaul.com/wiki/doku.php/research:ascilite2011&quot; class=&quot;wikilink1&quot; target=&quot;_self&quot; title=&quot;research:ascilite2011&quot; data-wiki-id=&quot;research:ascilite2011&quot;&gt;&amp;quot;An Investigation into the Learning Styles and Self-Regulated Learning Strategies for Computer Science Students&amp;quot;&lt;/a&gt;, Changing Demands, Changing Directions. ascilite, pp. 36-46, December 2011.&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; &lt;strong&gt;Paul, D.&lt;/strong&gt;, Henskens, F. A. and Hannaford, M. R. &lt;a href=&quot;https://davidjohnpaul.com/wiki/doku.php/research:webist2011&quot; class=&quot;wikilink1&quot; target=&quot;_self&quot; title=&quot;research:webist2011&quot; data-wiki-id=&quot;research:webist2011&quot;&gt;&amp;quot;Simulating Web Services Transactions&amp;quot;&lt;/a&gt;, Web Services Principles &amp;amp; Applications (WSPA) at 7th International Conference on Web Information Systems and Technologies (WEBIST2011), Noordwijkerhout, The Netherlands, INSTICC/ACM-SIGMIS, pp. 615-623, May 2011.&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; Henskens, F., Carr, V., Catts, S., Jablensky, A., Michie, P., Loughland, C., McCabe, K., Mowry, B., Nasir, A., Pantelis, C., Rasser, P., &lt;strong&gt;Paul, D.&lt;/strong&gt;, Richards, J., Schall, U. and Scott, R. &lt;a href=&quot;https://davidjohnpaul.com/wiki/doku.php/research:schizophreniaresearch2010&quot; class=&quot;wikilink1&quot; target=&quot;_self&quot; title=&quot;research:schizophreniaresearch2010&quot; data-wiki-id=&quot;research:schizophreniaresearch2010&quot;&gt;&amp;quot;The Australian Schizophrenia Research Bank (ASRB): An example of eResearch&amp;quot;&lt;/a&gt;, Schizophrenia Research Society Congress, Florence, Italy, April 2010.&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; &lt;strong&gt;Paul, D.&lt;/strong&gt;, Henskens, F. A. and Hannaford, M. R. &lt;a href=&quot;https://davidjohnpaul.com/wiki/doku.php/research:webist2010&quot; class=&quot;wikilink1&quot; target=&quot;_self&quot; title=&quot;research:webist2010&quot; data-wiki-id=&quot;research:webist2010&quot;&gt;&amp;quot;Per-request Contracts for Web Services Transactions&amp;quot;&lt;/a&gt;, The 6th International Conference on Web Information Systems &amp;amp; Technologies (WEBIST2010), Valencia, Spain, INSTICC, pp. 81-88, April 2010.&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; Henskens, F. A., Carr, V. J., Catts, S. V., Jablensky, A., Michie, P. T., Loughland, C. M., Mowry, B. J., Nasir, A., Pantelis, C., &lt;strong&gt;Paul, D.&lt;/strong&gt;, Rasser, P., Richards, J. M., Schall, U. and Scott, R. J., &lt;a href=&quot;https://davidjohnpaul.com/wiki/doku.php/research:eres2009&quot; class=&quot;wikilink1&quot; target=&quot;_self&quot; title=&quot;research:eres2009&quot; data-wiki-id=&quot;research:eres2009&quot;&gt;&amp;quot;An Example of eResearch: The Australian Schizophrenia Research Bank&amp;quot;&lt;/a&gt;, eResearch Australasia (ERes2009), Sydney, Australia, November 2009.&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; Wallis, M., &lt;strong&gt;Paul, D.&lt;/strong&gt;, Henskens, F. A. and Hannaford, M. R. &lt;a href=&quot;https://davidjohnpaul.com/wiki/doku.php/research:webist2009&quot; class=&quot;wikilink1&quot; target=&quot;_self&quot; title=&quot;research:webist2009&quot; data-wiki-id=&quot;research:webist2009&quot;&gt;&amp;quot;Web Browser Transactionality&amp;quot;&lt;/a&gt;, The 5th International Conference on Web Information Systems &amp;amp; Technologies (WEBIST2009), Lisbon, Portugal, INSTICC, pp. 93-100, March 2009.&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; Henskens, F. A., Loughland, C. M., Aphale, M. S., &lt;strong&gt;Paul, D.&lt;/strong&gt;, Richards, J. M., Rasser, P., Carr, V. J., Catts, S. V., Jablensky, A., Michie, P. T., Mowry, B. J., Pantelis, C., Schall, U. and Scott, R. J. &lt;a href=&quot;https://davidjohnpaul.com/wiki/doku.php/research:healthinf2009&quot; class=&quot;wikilink1&quot; target=&quot;_self&quot; title=&quot;research:healthinf2009&quot; data-wiki-id=&quot;research:healthinf2009&quot;&gt;&amp;quot;IT Support for the Australian Schizophrenia Research Bank&amp;quot;&lt;/a&gt;, The 2nd International Conference on Health Informatics (HealthInf2009), Porto, Portugal, INSTICC, pp. 405-410, January 2009.&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; &lt;strong&gt;Paul, D.&lt;/strong&gt;, Wallis, M., Henskens, F. A. and Hannaford, M. R. &lt;a href=&quot;https://davidjohnpaul.com/wiki/doku.php/research:webist2008&quot; class=&quot;wikilink1&quot; target=&quot;_self&quot; title=&quot;research:webist2008&quot; data-wiki-id=&quot;research:webist2008&quot;&gt;&amp;quot;Transaction Support for Interactive Web Applications&amp;quot;&lt;/a&gt;, The 4th International Conference on Web Information Systems &amp;amp; Technologies (WEBIST2008), Funchal-Madeira, Portugal, INSTICC, May 2008.&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; &lt;strong&gt;Paul, D.&lt;/strong&gt;, Henskens, F. A. and Hannaford, M. R. &lt;a href=&quot;https://davidjohnpaul.com/wiki/doku.php/research:pdcat2007&quot; class=&quot;wikilink1&quot; target=&quot;_self&quot; title=&quot;research:pdcat2007&quot; data-wiki-id=&quot;research:pdcat2007&quot;&gt;&amp;quot;Isolation and Web Services Transactions&amp;quot;&lt;/a&gt;, The 8th International Conference on Parallel and Distributed Computing Applications and Technologies (PDCAT&amp;#039;07), Adelaide, Australia, December 2007.&lt;/div&gt;
&lt;/li&gt;
&lt;li class=&quot;level1&quot;&gt;&lt;div class=&quot;li&quot;&gt; &lt;strong&gt;Paul, D.&lt;/strong&gt;, Henskens, F.A., Johnston, P. and Hannaford, M.R. &lt;a href=&quot;https://davidjohnpaul.com/wiki/doku.php/research:sc2006&quot; class=&quot;wikilink1&quot; target=&quot;_self&quot; title=&quot;research:sc2006&quot; data-wiki-id=&quot;research:sc2006&quot;&gt;&amp;quot;Portal-based Support for Mental Health Research&amp;quot;&lt;/a&gt;, Grid Computing Environments Workshop (GCE), Supercomputing SC06, IEEE Computer Society and ACM, Tampa, Florida, November 2006.&lt;/div&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Peer-reviewed Publications&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;peer-reviewed_publications&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:3,&amp;quot;range&amp;quot;:&amp;quot;1762-&amp;quot;} --&gt;</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Sun, 09 Nov 2025 22:47:51 +0000</pubDate>
        </item>
        <item>
            <title>sat2023</title>
            <link>https://davidjohnpaul.com/wiki/doku.php/research:sat2023</link>
            <description>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;developing_an_extreme_learning_machine_based_approach_to_weed_segmentation_in_pastures&quot;&gt;Developing an extreme learning machine based approach to weed segmentation in pastures&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://doi.org/10.1016/j.atech.2023.100288&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;https://doi.org/10.1016/j.atech.2023.100288&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Download&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;
Ford, J., Sadgrove, E., Paul, D. “Developing an extreme learning machine based approach to weed segmentation in pastures”, Smart Agricultural Technology, 2023.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Developing an extreme learning machine based approach to weed segmentation in pastures&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;developing_an_extreme_learning_machine_based_approach_to_weed_segmentation_in_pastures&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:1,&amp;quot;range&amp;quot;:&amp;quot;1-321&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit2&quot; id=&quot;abstract&quot;&gt;Abstract&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
Effective weed management in pastures is critical for maintaining the productivity of grazing land. Autonomous ground vehicles (AGVs) are increasingly being considered for weed localization and treatment in agricultural land. Weeds, however, can be difficult to distinguish from background plants, due to similarities in colour, shape and texture. While deep learning approaches can be used to solve the localization issue, they are computationally expensive, and require a large volume of training images in order to combat overfitting. In this paper we present a novel Extreme Learning Machine based network for segmenting weeds from the background pasture. The proposed method utilizes a combination of LBP, HOG and colour features, and is tested on four small datasets, achieving a high mean Intersection over Union of 87.1, 79.5, 81.6 and 87.6 for Bathurst burr, horehound, thistle and serrated tussock respectively.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Abstract&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;abstract&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:2,&amp;quot;range&amp;quot;:&amp;quot;322-1266&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit3&quot; id=&quot;journal&quot;&gt;Journal&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://www.sciencedirect.com/journal/smart-agricultural-technology&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;https://www.sciencedirect.com/journal/smart-agricultural-technology&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Smart Agricultural Technology&lt;/a&gt;
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Journal&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;journal&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:3,&amp;quot;range&amp;quot;:&amp;quot;1267-&amp;quot;} --&gt;</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Fri, 28 Jul 2023 06:18:16 +0000</pubDate>
        </item>
        <item>
            <title>sat2025</title>
            <link>https://davidjohnpaul.com/wiki/doku.php/research:sat2025</link>
            <description>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;dual-task_multi-species_network_design_and_training_using_advanced_augmentation_techniques&quot;&gt;Dual-Task Multi-Species Network Design and Training Using Advanced Augmentation Techniques&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://doi.org/10.1016/j.atech.2025.101594&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;https://doi.org/10.1016/j.atech.2025.101594&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Download&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;
Ford, J., Sadgrove, E., Paul, D. “Dual-Task Multi-Species Network Design and Training Using Advanced Augmentation Techniques”, Smart Agricultural Technology, 2025.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Dual-Task Multi-Species Network Design and Training Using Advanced Augmentation Techniques&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;dual-task_multi-species_network_design_and_training_using_advanced_augmentation_techniques&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:1,&amp;quot;range&amp;quot;:&amp;quot;1-329&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit2&quot; id=&quot;abstract&quot;&gt;Abstract&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
Accurate weed localization in pasture environments is essential for effective site-specific weed management (SSWM). This study evaluates two dual-task convolutional neural networks (CNNs) - a truncated ConvNeXt (tCN) and a truncated UniStemNet (tUSN) - for simultaneous plant segmentation and spraypoint detection across four weed species in south-east Australian pastures. To assess model performance, two testing regimes were used: a pooled test, where all images were randomly split for training and validation, and condition-invariance tests, in which models were trained and evaluated on entirely separate groups of images collected under different environmental conditions. Four data augmentation strategies were compared, including advanced image blending techniques CutMix and MixUp, which had not previously been explored in this domain. In the pooled test, the tUSN model achieved a mean Intersection over Union (mIU) of up to 0.897 for plant segmentation, while the tCN model reached an F1-score of 0.880 for spraypoint detection. Under condition-invariance testing, CutMix augmentation provided the most consistent generalization, with mIU values up to 0.897 for plant segmentation, and F1-scores up to 0.954 for spraypoint detection. HistMatch normalization assisted with model generalization in weaker augmentation setups. These findings demonstrate that advanced augmentation and normalization strategies are critical for achieving robust CNN-based weed detection across diverse real-world field conditions.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Abstract&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;abstract&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:2,&amp;quot;range&amp;quot;:&amp;quot;330-1875&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit3&quot; id=&quot;journal&quot;&gt;Journal&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://www.sciencedirect.com/journal/smart-agricultural-technology&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;https://www.sciencedirect.com/journal/smart-agricultural-technology&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Smart Agricultural Technology&lt;/a&gt;
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Journal&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;journal&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:3,&amp;quot;range&amp;quot;:&amp;quot;1876-&amp;quot;} --&gt;</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Sun, 09 Nov 2025 22:49:04 +0000</pubDate>
        </item>
        <item>
            <title>sc2006</title>
            <link>https://davidjohnpaul.com/wiki/doku.php/research:sc2006</link>
            <description>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;portal-based_support_for_mental_health_research&quot;&gt;Portal-based Support for Mental Health Research&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;http://hdl.handle.net/1959.13/30091&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;http://hdl.handle.net/1959.13/30091&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Download&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;
Paul, D., Henskens, F.A., Johnston, P. and Hannaford, M.R. “Portal-based Support for Mental Health Research”, Grid Computing Environments Workshop (GCE), Supercomputing SC06, IEEE Computer Society and ACM, Tampa, Florida, Nov 2006.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Portal-based Support for Mental Health Research&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;portal-based_support_for_mental_health_research&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:1,&amp;quot;range&amp;quot;:&amp;quot;1-346&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit2&quot; id=&quot;abstract&quot;&gt;Abstract&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
This paper describes experiences with the use of the Globus toolkit and related technologies for development of a secure portal that allows nationally-distributed Australian researchers to share data and application programs. The portal allows researchers to access infrastructure that will be used to enhance understanding of the causes of schizophrenia and advance its treatment, and aims to provide access to a resource that can expand into the world’s largest on-line collaborative mental health research facility. Since access to patient data is controlled by local ethics approvals, the portal must transparently both provide and deny access to patient data in accordance with the fine-grained access permissions afforded individual researchers. Interestingly, the access protocols are able to provide researchers with hints about currently inaccessible data that may be of interest to them, providing them the impetus to gain further access permissions.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Abstract&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;abstract&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:2,&amp;quot;range&amp;quot;:&amp;quot;347-1332&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit3&quot; id=&quot;conference&quot;&gt;Conference&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;http://www.cogkit.org/GCE06/GCE06/Program.html&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;http://www.cogkit.org/GCE06/GCE06/Program.html&quot; rel=&quot;ugc nofollow noopener&quot;&gt;The Second International Workshop on Grid Computing Environments&lt;/a&gt; at &lt;a href=&quot;http://sc06.supercomputing.org/&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;http://sc06.supercomputing.org/&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Supercomputing 2006&lt;/a&gt;
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Conference&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;conference&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:3,&amp;quot;range&amp;quot;:&amp;quot;1333-&amp;quot;} --&gt;</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Sun, 31 Jan 2016 07:13:11 +0000</pubDate>
        </item>
        <item>
            <title>sc2018</title>
            <link>https://davidjohnpaul.com/wiki/doku.php/research:sc2018</link>
            <description>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;behavioral_merger_and_acquisition_pricingapplication_to_verizon_mergers_with_aol_and_yahoo&quot;&gt;Behavioral merger and acquisition pricing: Application to Verizon mergers with AOL and Yahoo&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;http://doi.org/10.1002/jsc.2176&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;http://doi.org/10.1002/jsc.2176&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Download&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;
Agarwal, N., Kwan, P., and Paul, D. “Behavioral merger and acquisition pricing: Application to Verizon mergers with AOL and Yahoo”, Strategic Change, 27(1), pp. 9-22, January 2018.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Behavioral merger and acquisition pricing: Application to Verizon mergers with AOL and Yahoo&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;behavioral_merger_and_acquisition_pricingapplication_to_verizon_mergers_with_aol_and_yahoo&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:1,&amp;quot;range&amp;quot;:&amp;quot;1-336&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit2&quot; id=&quot;abstract&quot;&gt;Abstract&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
Mergers and acquisitions (M&amp;amp;A) are important to companies as it allows them to acquire capabilities that they cannot create internally and to grow quickly. M&amp;amp;A transaction pricing relates to the pricing of these M&amp;amp;A deals and this article analyzes if behavioral finance factors like risk aversion, optimism, and loss aversion have an impact on this pricing. Prospect Theory and Cumulative Prospect Theory are applied to an agent-based model to solve this problem. Results of this article show that M&amp;amp;A transaction price does respond to a change in risk aversion and optimism traits of the acquirer and target companies respectively, as well as, loss aversion and certainty (probability of gains and losses). When, the acquirer is risk taking and target company is optimistic, the M&amp;amp;A transaction price increases. However, with increasing certainty of gains and reducing loss aversion (increasing loss aversion co-efficient; as gains are perceived to have the same weight as losses), the M&amp;amp;A transaction price seems to reduce. These results are compared with the recent mergers of Verizon and AOL as well as Verizon and Yahoo, to understand if these results would occur in practice. Analyzing these mergers, it seems that the outcomes from this model does provide insight on the pricing of these M&amp;amp;A transactions. This article also analyzes how these behaviors would impact the pricing when three different acquirers are trying to take over a target company. Results show that loss aversion has a significant effect on this pricing with risk aversion and optimism also having some minor impact. But, the existence of multiple acquirers does positively increase the M&amp;amp;A transaction price.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Abstract&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;abstract&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:2,&amp;quot;range&amp;quot;:&amp;quot;337-2046&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit3&quot; id=&quot;journal&quot;&gt;Journal&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;http://wileyonlinelibrary.com/journal/jsc&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;http://wileyonlinelibrary.com/journal/jsc&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Strategic Change&lt;/a&gt;
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Journal&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;journal&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:3,&amp;quot;range&amp;quot;:&amp;quot;2047-&amp;quot;} --&gt;</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Fri, 16 Feb 2018 03:17:26 +0000</pubDate>
        </item>
        <item>
            <title>schizophreniaresearch2010</title>
            <link>https://davidjohnpaul.com/wiki/doku.php/research:schizophreniaresearch2010</link>
            <description>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;the_australian_schizophrenia_research_bank_asrban_example_of_eresearch&quot;&gt;The Australian Schizophrenia Research Bank (ASRB): An example of eResearch&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
Henskens, F., Carr, V., Catts, S., Jablensky, A., Michie, P., Loughland, C., McCabe, K., Mowry, B., Nasir, A., Pantelis, C., Rasser, P., Paul, D., Richards, J., Schall, U. and Scott, R. “The Australian Schizophrenia Research Bank (ASRB): An example of eResearch”, Schizophrenia Research Society Congress, Florence, 2010.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;The Australian Schizophrenia Research Bank (ASRB): An example of eResearch&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;the_australian_schizophrenia_research_bank_asrban_example_of_eresearch&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:1,&amp;quot;range&amp;quot;:&amp;quot;1-412&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit2&quot; id=&quot;abstract&quot;&gt;Abstract&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
The Australian Schizophrenia Research Bank (ASRB) operates to collect, store and distribute linked clinical, cognitive, neuroimaging and genetic data from a large sample of people with schizophrenia and matched healthy controls.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Abstract&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;abstract&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:2,&amp;quot;range&amp;quot;:&amp;quot;413-664&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit3&quot; id=&quot;conference&quot;&gt;Conference&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;http://www.schizophreniaresearchsociety.org/2010_Biennial.aspx&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;http://www.schizophreniaresearchsociety.org/2010_Biennial.aspx&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Schizophrenia Research Society Congress&lt;/a&gt;
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Conference&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;conference&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:3,&amp;quot;range&amp;quot;:&amp;quot;665-&amp;quot;} --&gt;</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Sun, 31 Jan 2016 07:13:10 +0000</pubDate>
        </item>
        <item>
            <title>schizophreniaresearch2012</title>
            <link>https://davidjohnpaul.com/wiki/doku.php/research:schizophreniaresearch2012</link>
            <description>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;the_australian_schizophrenia_research_biobank_asrbit_development_and_management_of_a_live_e-research_system&quot;&gt;The Australian Schizophrenia Research Biobank (ASRB): IT development and management of a live e-research system&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
Henskens, F.A., Paul, D., Loughland, C., Bridge, J., McCabe, K., Catts, S., Jablensky, A., Michie, P., Mowry, B., Pantelis, P., Schall, U., Tooney, P., Duffy, L. and Carr, V. “The Australian Schizophrenia Research Biobank (ASRB): IT development and management of a live e-research system”, Schizophrenia Research 136(Supplement 1), Elsevier, pp. S250, 2012.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;The Australian Schizophrenia Research Biobank (ASRB): IT development and management of a live e-research system&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;the_australian_schizophrenia_research_biobank_asrbit_development_and_management_of_a_live_e-research_system&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:1,&amp;quot;range&amp;quot;:&amp;quot;1-486&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit2&quot; id=&quot;abstract&quot;&gt;Abstract&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
An extended version of &lt;a href=&quot;https://davidjohnpaul.com/wiki/doku.php/research:healthinf2012&quot; class=&quot;wikilink1&quot; target=&quot;_self&quot; title=&quot;research:healthinf2012&quot; data-wiki-id=&quot;research:healthinf2012&quot;&gt;HealthInf2012&lt;/a&gt;.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Abstract&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;abstract&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:2,&amp;quot;range&amp;quot;:&amp;quot;487-551&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit3&quot; id=&quot;journal&quot;&gt;Journal&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;http://www.journals.elsevier.com/schizophrenia-research/&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;http://www.journals.elsevier.com/schizophrenia-research/&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Schizophrenia Research&lt;/a&gt; 136(Supplement 1)
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Journal&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;journal&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:3,&amp;quot;range&amp;quot;:&amp;quot;552-&amp;quot;} --&gt;</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Sun, 31 Jan 2016 07:13:11 +0000</pubDate>
        </item>
        <item>
            <title>sigcse24</title>
            <link>https://davidjohnpaul.com/wiki/doku.php/research:sigcse24</link>
            <description>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;diverging_assessmentswhat_why_and_experiences&quot;&gt;Diverging assessments: What, Why, and Experiences&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://doi.org/10.1145/3626252.3630832&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;https://doi.org/10.1145/3626252.3630832&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Download&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;
Sakzad, A., Paul, D., Sheard, J., Brankovic, L., Skerritt, M. P., Li, N., Minagar, S., Simon, Billingsley, W. “Diverging assessments: What, Why, and Experiences”, SIGCSE 2024: Proceedings of the 55th ACM Technical Symposium on Computer Science Education V. 1, March 2024.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Diverging assessments: What, Why, and Experiences&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;diverging_assessmentswhat_why_and_experiences&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:1,&amp;quot;range&amp;quot;:&amp;quot;1-392&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit2&quot; id=&quot;abstract&quot;&gt;Abstract&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
In this experience paper, we introduce the concept of &amp;#039;diverging assessments&amp;#039;, process-based assessments designed so that they become unique for each student while all students see a common skeleton. We present experiences with diverging assessments in the contexts of computer networks, operating systems, ethical hacking, and software development. All the given examples allow the use of generative-AI-based tools, are authentic, and are designed to generate learning opportunities that foster students&amp;#039; meta-cognition. Finally, we reflect upon these experiences in five different courses across four universities, showing how diverging assessments enhance students&amp;#039; learning while respecting academic integrity.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Abstract&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;abstract&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:2,&amp;quot;range&amp;quot;:&amp;quot;393-1130&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit3&quot; id=&quot;conference&quot;&gt;Conference&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://dl.acm.org/doi/proceedings/10.1145/3626252&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;https://dl.acm.org/doi/proceedings/10.1145/3626252&quot; rel=&quot;ugc nofollow noopener&quot;&gt;The 55th ACM Technical Symposium on Computer Science Education (SIGCSE 2024)&lt;/a&gt;
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Conference&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;conference&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:3,&amp;quot;range&amp;quot;:&amp;quot;1131-&amp;quot;} --&gt;</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Thu, 14 Mar 2024 00:49:49 +0000</pubDate>
        </item>
        <item>
            <title>smebu2023</title>
            <link>https://davidjohnpaul.com/wiki/doku.php/research:smebu2023</link>
            <description>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;pandemic_speedaccelerating_innovation_in_cyber_security&quot;&gt;Pandemic Speed: Accelerating Innovation in Cyber Security&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://doi.org/10.1007/978-981-99-4844-4_9&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;https://doi.org/10.1007/978-981-99-4844-4_9&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Download&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;
Wiltshire, I., Adapa, S., Paul, D. “Pandemic Speed: Accelerating Innovation in Cyber Security”, In Adapa, S., McKeown, T., Lazaris, M., Jurado, T. (eds) Small and Medium-sized Enterprises, and Business Uncertainty. Palgrave Studies in Global Entrepreneurship. Palgrave Macmillan, Singapore, 2023.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Pandemic Speed: Accelerating Innovation in Cyber Security&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;pandemic_speedaccelerating_innovation_in_cyber_security&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:1,&amp;quot;range&amp;quot;:&amp;quot;1-429&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit2&quot; id=&quot;abstract&quot;&gt;Abstract&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
Cyber security developers and threat-attackers have always had a reactive relationship. Developers spend time building secure defences only for attackers to exploit new vulnerabilities. Academic and practice literature revealed that human error and motivation plays a major role in the success of a cyber defence strategy and whilst technology and process have their place, implementation and management can significantly affect results. Organisations learn from experience protecting against human error with process and shadow IT with policy. Threat-actors also learn; sharing vulnerability information with others and developing new attack methods with their peers. COVID-19s’ isolation countermeasures may have shifted the balance of power towards the attackers. As cyberattack disruption moves from virtual to the physical world, countries must consider and weigh the benefits of international collaboration against potential exploitation by a more advanced collaborative partner. To address identified gaps, website analysis and in-depth interviews were conducted. I interviewed thirty staff in small and medium-sized Australian organisations to gain an understanding of their perspectives on cyber security and several of the findings may be relevant to future ways of working. No standards exist for cyber security products and configuration by unskilled consumers could increase the quantity of insecure devices available for threat actors to use for disruption and control. As COVID-19 created an environment where rapid innovation became a necessity, the ability to absorb intelligence and adopt more diversity in design and implementation becomes a necessary consideration for those who want to succeed. Creating pathways for cultures, genders and ages to collaborate, could help improve cyber defences for all.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Abstract&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;abstract&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:2,&amp;quot;range&amp;quot;:&amp;quot;430-2278&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit3&quot; id=&quot;book&quot;&gt;Book&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://doi.org/10.1007/978-981-99-4844-4&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;https://doi.org/10.1007/978-981-99-4844-4&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Small and Medium-sized Enterprises, and Business Uncertainty&lt;/a&gt;
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Book&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;book&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:3,&amp;quot;range&amp;quot;:&amp;quot;2279-&amp;quot;} --&gt;</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Mon, 04 Dec 2023 21:37:15 +0000</pubDate>
        </item>
        <item>
            <title>smif2022</title>
            <link>https://davidjohnpaul.com/wiki/doku.php/research:smif2022</link>
            <description>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;how_fast_is_fast_defining_velocity_zones_in_women_s_rugby_league&quot;&gt;How fast is fast? Defining Velocity Zones in Women’s Rugby League&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://doi.org/10.1080/24733938.2022.2062438&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;https://doi.org/10.1080/24733938.2022.2062438&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Download&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;
Cummins, C., Charlton, G., Paul, D., Buxton, S., Murphy, A. &lt;a href=&quot;https://davidjohnpaul.com/wiki/doku.php/research:smif2022&quot; class=&quot;wikilink1&quot; target=&quot;_self&quot; title=&quot;research:smif2022&quot; data-wiki-id=&quot;research:smif2022&quot;&gt;&amp;quot;How fast is fast? Defining Velocity Zones in Women’s Rugby League&amp;quot;&lt;/a&gt;, Science and Medicine in Football, Vol. 7, No. 2, 2023.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;How fast is fast? Defining Velocity Zones in Women\u2019s Rugby League&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;how_fast_is_fast_defining_velocity_zones_in_women_s_rugby_league&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:1,&amp;quot;range&amp;quot;:&amp;quot;1-343&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit2&quot; id=&quot;abstract&quot;&gt;Abstract&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;/div&gt;

&lt;h4 id=&quot;objectives&quot;&gt;Objectives&lt;/h4&gt;
&lt;div class=&quot;level4&quot;&gt;

&lt;p&gt;
The study aimed to: 1) apply a data-mining approach to identify velocity zone thresholds for female rugby league players and; 2) apply these velocity zones to examine the locomotor demands of match-play.
&lt;/p&gt;

&lt;/div&gt;

&lt;h4 id=&quot;methods&quot;&gt;Methods&lt;/h4&gt;
&lt;div class=&quot;level4&quot;&gt;

&lt;p&gt;
Microtechnology data were collected from elite female rugby league players representing all National Rugby League Women’s teams (n=85 players; n=224 files) over one season. Spectral clustering with a beta smoothing cut-off of 0.1 was applied to each player’s instantaneous match-play velocity data for the identification of four zones. To account for outliers within repeated data-points, the velocity zones for each player were calculated as the median. The overarching velocity zones were determined through an incremental search to minimise the root mean square error.
&lt;/p&gt;

&lt;/div&gt;

&lt;h4 id=&quot;results&quot;&gt;Results&lt;/h4&gt;
&lt;div class=&quot;level4&quot;&gt;

&lt;p&gt;
Through a data-mining approach, four velocity zones were determined. Rounded to the nearest 0.5 km.h&lt;sup&gt;−1&lt;/sup&gt; the velocity values across each zone were classified as low (0 to 11.49 km.h&lt;sup&gt;−1&lt;/sup&gt;), moderate (11.50 to 17.49 km.h&lt;sup&gt;−1&lt;/sup&gt;), high (17.50 to 20.99 km.h&lt;sup&gt;−1&lt;/sup&gt;) and very-high (&amp;gt;21.00 km.h&lt;sup&gt;−1&lt;/sup&gt;). Practical application of the zones demonstrated positional group differences in the absolute (effect size (ES): -0.03 to 1.77) and relative (ES: -0.04 to 1.60) locomotor demands of match-play. The back positional group covered greater absolute and relative distances at a very-high velocity than all other positions.
&lt;/p&gt;

&lt;/div&gt;

&lt;h4 id=&quot;conclusions&quot;&gt;Conclusions&lt;/h4&gt;
&lt;div class=&quot;level4&quot;&gt;

&lt;p&gt;
This work informs the velocity zones that could be applied consistently to women’s rugby league data within practical (i.e. in the training and monitoring of players) and academic (i.e. as a model for future research to analyse locomotor demands) settings.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Abstract&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;abstract&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:2,&amp;quot;range&amp;quot;:&amp;quot;344-2143&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit3&quot; id=&quot;journal&quot;&gt;Journal&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://www.tandfonline.com/journals/rsmf20&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;https://www.tandfonline.com/journals/rsmf20&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Science and Medicine in Football&lt;/a&gt;
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Journal&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;journal&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:3,&amp;quot;range&amp;quot;:&amp;quot;2144-&amp;quot;} --&gt;</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Thu, 20 Jul 2023 22:20:22 +0000</pubDate>
        </item>
        <item>
            <title>smif2022b</title>
            <link>https://davidjohnpaul.com/wiki/doku.php/research:smif2022b</link>
            <description>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;changing_gearsdata-driven_velocity_zones_to_support_monitoring_and_research_in_men_s_rugby_league&quot;&gt;Changing gears: data-driven velocity zones to support monitoring and research in men’s rugby league&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://doi.org/10.1080/24733938.2022.2152482&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;https://doi.org/10.1080/24733938.2022.2152482&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Download&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;
Cummins, C., Charlton, G., Paul, D., Murphy, A. “Changing gears: data-driven velocity zones to support monitoring and research in men’s rugby league.”, Science and Medicine in Football, 2022.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Changing gears: data-driven velocity zones to support monitoring and research in men\u2019s rugby league&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;changing_gearsdata-driven_velocity_zones_to_support_monitoring_and_research_in_men_s_rugby_league&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:1,&amp;quot;range&amp;quot;:&amp;quot;1-372&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit2&quot; id=&quot;abstract&quot;&gt;Abstract&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;/div&gt;

&lt;h4 id=&quot;objectives&quot;&gt;Objectives&lt;/h4&gt;
&lt;div class=&quot;level4&quot;&gt;

&lt;p&gt;
The study aimed to (1) apply a data-mining approach to league-wide microtechnology data to identify absolute velocity zone thresholds and (2) apply the respective velocity zones to microtechnology data to examine the locomotor demands of elite match-play.
&lt;/p&gt;

&lt;/div&gt;

&lt;h4 id=&quot;methods&quot;&gt;Methods&lt;/h4&gt;
&lt;div class=&quot;level4&quot;&gt;

&lt;p&gt;
League-wide microtechnology data were collected from elite male rugby league players representing all National Rugby League (NRL) teams (n = 16 teams, one excluded due to a different microtechnology device; n = 4836 files) over one season. To identify four velocity zones, spectral clustering with a beta smoothing cut-off of 0.1 was applied to each players’ instantaneous match-play velocity data. Velocity zones for each player were calculated as the median while the overarching velocity zones were determined through an incremental search to minimise root mean square error.
&lt;/p&gt;

&lt;/div&gt;

&lt;h4 id=&quot;results&quot;&gt;Results&lt;/h4&gt;
&lt;div class=&quot;level4&quot;&gt;

&lt;p&gt;
The velocity zones identified through spectral clustering were 0–13.99 km · h−1 (i.e., low velocity), 14.00–20.99 km · h−1 (i.e., moderate velocity), 21.00–24.49 km · h−1 (i.e., high velocity) and &amp;gt;24.50 km · h−1 (i.e., very-high velocity).
&lt;/p&gt;

&lt;/div&gt;

&lt;h4 id=&quot;conclusions&quot;&gt;Conclusions&lt;/h4&gt;
&lt;div class=&quot;level4&quot;&gt;

&lt;p&gt;
The application of spectral clustering (i.e., a data-mining method) to league-wide rugby league microtechnology data yielded insights into the distribution of velocity data, thereby informing the cut-off values which best place similar data points into the same velocity zones. As the identified zones are representative of the intensities of locomotion achieved by elite male rugby league players, it is suggested that when absolute zones are used, the consistent application of the identified zones would facilitate standardisation, longitudinal athlete monitoring as well as comparisons between teams, leagues and published literature.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Abstract&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;abstract&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:2,&amp;quot;range&amp;quot;:&amp;quot;373-2224&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit3&quot; id=&quot;journal&quot;&gt;Journal&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://www.tandfonline.com/journals/rsmf20&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;https://www.tandfonline.com/journals/rsmf20&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Science and Medicine in Football&lt;/a&gt;
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Journal&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;journal&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:3,&amp;quot;range&amp;quot;:&amp;quot;2225-&amp;quot;} --&gt;</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Thu, 01 Dec 2022 22:32:50 +0000</pubDate>
        </item>
        <item>
            <title>smif2024</title>
            <link>https://davidjohnpaul.com/wiki/doku.php/research:smif2024</link>
            <description>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;need_a_break_the_locomotor_and_tackle_pacing_profile_and_loads_of_women_s_rugby_league_match-play_following_various_between-match_turnaround_durations&quot;&gt;Need a break? The locomotor and tackle pacing profile and loads of women’s rugby league match-play following various between-match turnaround durations&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://doi.org/10.1080/24733938.2024.2351224&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;https://doi.org/10.1080/24733938.2024.2351224&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Download&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;
Cummins, C., Charlton, G., Buxton, S., Shorter, K., Paul, D., Murphy, A. “Need a break? The locomotor and tackle pacing profile and loads of women’s rugby league match-play following various between-match turnaround durations”, Science and Medicine in Football, Vol. 1, No. 14, 2024.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Need a break? The locomotor and tackle pacing profile and loads of women\u2019s rugby league match-play following various between-match turnaround durations&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;need_a_break_the_locomotor_and_tackle_pacing_profile_and_loads_of_women_s_rugby_league_match-play_following_various_between-match_turnaround_durations&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:1,&amp;quot;range&amp;quot;:&amp;quot;1-516&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit2&quot; id=&quot;abstract&quot;&gt;Abstract&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;/div&gt;

&lt;h4 id=&quot;objectives&quot;&gt;Objectives&lt;/h4&gt;
&lt;div class=&quot;level4&quot;&gt;

&lt;p&gt;
The study investigated the locomotor and tackle pacing profile and loads of female rugby league players following various between-match turnaround durations. Specifically, the study examined the (1) pacing of locomotor and tackle loads across the time-course of a match and; (2) whole-match and peak locomotor and tackle loads of match-play.
&lt;/p&gt;

&lt;/div&gt;

&lt;h4 id=&quot;methods&quot;&gt;Methods&lt;/h4&gt;
&lt;div class=&quot;level4&quot;&gt;

&lt;p&gt;
Microtechnology data were collected from elite female rugby league players (n = 172) representing all National Rugby League Women’s teams (n = 6 teams) across two seasons. Players were categorised into backs, adjustables, forwards or interchange players. Data was calculated for the whole-match (m), per minute (m.min−1) and peak (running: m.min−1; acceleration: m.s−2) locomotor and tackle loads (number and efficiency (%)) of match-play. The pacing as well as the locomotor and tackle loads of match-play were examined following short (≤6 days), normal (7 days) or long (≥8 days) turnarounds.
&lt;/p&gt;

&lt;/div&gt;

&lt;h4 id=&quot;results&quot;&gt;Results&lt;/h4&gt;
&lt;div class=&quot;level4&quot;&gt;

&lt;p&gt;
The pacing profile of playing positions varied across short, normal and long match turnarounds. Trivial to moderate differences existed in the whole-match, per minute and peak locomotor loads across match turnaround durations (effect size ≤ 1.2).
&lt;/p&gt;

&lt;/div&gt;

&lt;h4 id=&quot;conclusions&quot;&gt;Conclusions&lt;/h4&gt;
&lt;div class=&quot;level4&quot;&gt;

&lt;p&gt;
Following various between-match turnaround durations (i.e., short, normal and long match turnarounds), there were variations in the locomotor and tackle pacing profile and loads whereby, the pacing profile of positional groups was more affected than the load profile. The findings can be used in applied settings to guide the recovery strategies and training plans of female rugby league players to optimise performance and wellbeing across various match turnaround durations.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Abstract&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;abstract&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:2,&amp;quot;range&amp;quot;:&amp;quot;517-2310&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit3&quot; id=&quot;journal&quot;&gt;Journal&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://www.tandfonline.com/journals/rsmf20&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;https://www.tandfonline.com/journals/rsmf20&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Science and Medicine in Football&lt;/a&gt;
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Journal&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;journal&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:3,&amp;quot;range&amp;quot;:&amp;quot;2311-&amp;quot;} --&gt;</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Thu, 16 May 2024 12:09:17 +0000</pubDate>
        </item>
        <item>
            <title>sncs2022</title>
            <link>https://davidjohnpaul.com/wiki/doku.php/research:sncs2022</link>
            <description>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;designing_a_restful_northbound_interface_for_incompatible_software_defined_network_controllers&quot;&gt;Designing a RESTful Northbound Interface for Incompatible Software Defined Network Controllers&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://doi.org/10.1007/s42979-022-01423-3&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;https://doi.org/10.1007/s42979-022-01423-3&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Download&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;
Alghamdi, A., Paul, D., Sadgrove, E., “Designing a RESTful Northbound Interface for Incompatible Software Defined Network Controllers”, SN Computer Science, 3(502), 2022.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Designing a RESTful Northbound Interface for Incompatible Software Defined Network Controllers&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;designing_a_restful_northbound_interface_for_incompatible_software_defined_network_controllers&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:1,&amp;quot;range&amp;quot;:&amp;quot;1-339&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit2&quot; id=&quot;abstract&quot;&gt;Abstract&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
In Software Defined Networking, applications often need to communicate with network controllers to query or modify the current state of the network. However, there is currently no standard northbound interface that allows this communication to occur. Instead, each Software Defined Networking implementation defines its own interface, meaning applications typically need to be modified to allow them to work with different controllers. In this paper we present a high-level design for a REST-like reactive northbound interface which would allow applications to be written once and then work with multiple otherwise-incompatible controllers. 
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Abstract&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;abstract&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:2,&amp;quot;range&amp;quot;:&amp;quot;340-1004&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit3&quot; id=&quot;collection&quot;&gt;Collection&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://link.springer.com/journal/42979/topicalCollection/AC_c413a65096b62cb173a9bb6e900fb01e&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;https://link.springer.com/journal/42979/topicalCollection/AC_c413a65096b62cb173a9bb6e900fb01e&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Web Information Systems and Technologies 2021&lt;/a&gt;
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Collection&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;collection&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:3,&amp;quot;range&amp;quot;:&amp;quot;1005-&amp;quot;} --&gt;</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Fri, 07 Oct 2022 05:36:31 +0000</pubDate>
        </item>
        <item>
            <title>soft2021</title>
            <link>https://davidjohnpaul.com/wiki/doku.php/research:soft2021</link>
            <description>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;island-based_cuckoo_search_with_elite_opposition-based_learning_and_multiple_mutation_methods_for_solving_optimization_problems&quot;&gt;Island-based Cuckoo Search with elite opposition-based learning and multiple mutation methods for solving optimization problems&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://doi.org/10.1007/s00500-021-06665-6&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;https://doi.org/10.1007/s00500-021-06665-6&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Download&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;
Abed-alguni, B., Paul, D. “Island-based Cuckoo Search with Elite Opposition-based Learning and Multiple Mutation Methods for Solving Optimization Problems”, Soft Computing, 2022.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Island-based Cuckoo Search with elite opposition-based learning and multiple mutation methods for solving optimization problems&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;island-based_cuckoo_search_with_elite_opposition-based_learning_and_multiple_mutation_methods_for_solving_optimization_problems&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:1,&amp;quot;range&amp;quot;:&amp;quot;1-380&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit2&quot; id=&quot;abstract&quot;&gt;Abstract&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
The island Cuckoo Search (iCSPM) algorithm is a variation of Cuckoo Search that uses the island model and highly disruptive polynomial mutation to solve optimization problems. This article introduces an improved iCSPM algorithm called iCSPM with elite opposition-based learning and multiple mutation methods (iCSPM2). iCSPM2 has three main characteristics. Firstly, it separates candidate solutions into several islands (sub-populations) and then divides the islands among four improved Cuckoo Search algorithms: Cuckoo Search via Lévy flights, Cuckoo Search with highly disruptive polynomial mutation, Cuckoo Search with Jaya mutation and Cuckoo Search with pitch adjustment mutation. Secondly, it uses elite opposition-based learning to improve its convergence rate and exploration ability. Finally, it makes continuous candidate solutions discrete using the smallest position value method. A set of 15 popular benchmark functions indicate iCSPM2 performs better than iCSPM. However, based on sensitivity analysis of both algorithms, convergence behavior seems sensitive to island model parameters. Further, the single-objective IEEE-CEC 2014 functions were used to evaluate and compare the performance of iCSPM2 to four well-known swarm optimization algorithms: distributed grey wolf optimizer, distributed adaptive differential evolution with linear population size reduction evolution, memory-based hybrid dragonfly algorithm and fireworks algorithm with differential mutation. Experimental and statistical results suggest iCSPM2 has better performance than the four other algorithms. iCSPM2’s performance was also shown to be favorable compared to two powerful discrete optimization algorithms (generalized accelerations for insertion-based heuristics and memetic algorithm with novel semi-constructive crossover and mutation operators) using a set of Taillard’s benchmark instances for the permutation flow shop scheduling problem.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Abstract&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;abstract&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:2,&amp;quot;range&amp;quot;:&amp;quot;381-2347&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit3&quot; id=&quot;journal&quot;&gt;Journal&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://link.springer.com/journal/500&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;https://link.springer.com/journal/500&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Soft Computing&lt;/a&gt;
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Journal&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;journal&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:3,&amp;quot;range&amp;quot;:&amp;quot;2348-&amp;quot;} --&gt;</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Sun, 30 Jan 2022 22:55:38 +0000</pubDate>
        </item>
        <item>
            <title>ten2018</title>
            <link>https://davidjohnpaul.com/wiki/doku.php/research:ten2018</link>
            <description>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;formalisation_of_problem_and_domain_definition_for_agent_oriented_smart_factory_aosf&quot;&gt;Formalisation of Problem and Domain Definition for Agent Oriented Smart Factory (AOSF)&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://doi.org/10.1109/TENCONSpring.2018.8691967&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;https://doi.org/10.1109/TENCONSpring.2018.8691967&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Download&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;
Ud Din, F., Henskens, F., Paul, D., Wallis, M. “Formalisation of Problem and Domain Definition for Agent Oriented Smart Factory (AOSF)”, IEEE TENSYMP 2018, Sydney, Australia, IEEE, July 2018.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Formalisation of Problem and Domain Definition for Agent Oriented Smart Factory (AOSF)&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;formalisation_of_problem_and_domain_definition_for_agent_oriented_smart_factory_aosf&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:1,&amp;quot;range&amp;quot;:&amp;quot;1-359&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit2&quot; id=&quot;abstract&quot;&gt;Abstract&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
For the concept of Industry 4.0 to come true, a mature amalgamation of allied technologies is obligatory, i.e. Internet of Things (IoT), Big Data analytics, Mobile Computing, Multi-Agent Systems (MAS) and Cloud Computing. With the emergence of the fourth industrial revolution, proliferation in the field of Cyber-Physical Systems (CPS) and Smart Factory gave a boost to recent research in this dimension. Despite many autonomous frameworks contributed in this area, there are very few widely acceptable implementation frameworks, particularly for Small to Medium Size Enterprises (SMEs) under the umbrella of Industry 4.0. This paper presents an Agent-Oriented Smart Factory (AOSF) framework, integrating the whole supply chain (SC), from supplier-end to customer-end. The AOSF framework presents an elegant mediating mechanism between multiple agents to increase robustness in decision making at the base level. Classification of agents, negotiation mechanism and few results from a test case are presented.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Abstract&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;abstract&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:2,&amp;quot;range&amp;quot;:&amp;quot;360-1392&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit3&quot; id=&quot;series&quot;&gt;Series&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;http://sites.ieee.org/tensymp2018/&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;http://sites.ieee.org/tensymp2018/&quot; rel=&quot;ugc nofollow noopener&quot;&gt;IEEE TENSYMP&lt;/a&gt;
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Series&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;series&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:3,&amp;quot;range&amp;quot;:&amp;quot;1393-&amp;quot;} --&gt;</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Fri, 12 Jun 2020 04:49:21 +0000</pubDate>
        </item>
        <item>
            <title>vjcs2015</title>
            <link>https://davidjohnpaul.com/wiki/doku.php/research:vjcs2015</link>
            <description>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;a_multi-agent_cooperative_reinforcement_learning_model_using_a_hierarchy_of_consultants_tutors_and_workers&quot;&gt;A Multi-agent Cooperative Reinforcement Learning Model Using a Hierarchy of Consultants, Tutors and Workers&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://doi.org/10.1007/s40595-015-0045-x&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;https://doi.org/10.1007/s40595-015-0045-x&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Download&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;
Abed-Alguni, B. H., Chalup, S. K., Henskens, F. A., and Paul, D. “A Multi-Agent Cooperative Reinforcement Learning Model Using a Hierarchy of Consultants, Tutors and Workers”, Vietnam Journal of Computer Science, 2:4, November 2015, pp 213-226, DOI: 10.1007/s40595-015-0045-x.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;A Multi-agent Cooperative Reinforcement Learning Model Using a Hierarchy of Consultants, Tutors and Workers&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;a_multi-agent_cooperative_reinforcement_learning_model_using_a_hierarchy_of_consultants_tutors_and_workers&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:1,&amp;quot;range&amp;quot;:&amp;quot;1-457&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit2&quot; id=&quot;abstract&quot;&gt;Abstract&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
The hierarchical organisation of distributed systems can provide an efficient decomposition for machine learning. This paper proposes an algorithm for cooperative policy construction for independent learners, named Q-learning with Aggregation (QA-learning). The algorithm is based on a distributed hierarchical learning model and utilises three specialisations of agents: workers, tutors and consultants. The consultant agent incorporates the entire system in its problem space, which it decomposes into sub-problems that are assigned to the tutor and worker agents. The QA-learning algorithm aggregates the Q-tables of worker agents into a central repository managed by their tutor agent. Each tutor&amp;#039;s Q-table is then incorporated into the consultant&amp;#039;s Q- table, resulting in a Q-table for the entire problem. The algorithm was tested using a distributed hunter prey problem, and experimental results show that QA-learning converges to a solution faster than single agent Q-learning and some famous cooperative Q-learning algorithms.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Abstract&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;abstract&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:2,&amp;quot;range&amp;quot;:&amp;quot;458-1515&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit3&quot; id=&quot;journal&quot;&gt;Journal&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;http://www.springer.com/computer/information+systems+and+applications/journal/40595&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;http://www.springer.com/computer/information+systems+and+applications/journal/40595&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Vietnam Journal of Computer Science&lt;/a&gt;
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Journal&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;journal&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:3,&amp;quot;range&amp;quot;:&amp;quot;1516-&amp;quot;} --&gt;</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Thu, 12 May 2022 03:54:23 +0000</pubDate>
        </item>
        <item>
            <title>webist2008</title>
            <link>https://davidjohnpaul.com/wiki/doku.php/research:webist2008</link>
            <description>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;transaction_support_for_interactive_web_applications&quot;&gt;Transaction Support for Interactive Web Applications&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;http://hdl.handle.net/1959.13/29350&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;http://hdl.handle.net/1959.13/29350&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Download&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;
Paul, D., Wallis, M., Henskens, F. A. and Hannaford, M. R. “Transaction Support for Interactive Web Applications”, The 4th International Conference on Web Information Systems &amp;amp; Technologies (WEBIST2008), Funchal-Madeira, Portugal, INSTICC, May 2008.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Transaction Support for Interactive Web Applications&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;transaction_support_for_interactive_web_applications&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:1,&amp;quot;range&amp;quot;:&amp;quot;1-369&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit2&quot; id=&quot;abstract&quot;&gt;Abstract&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
In the Web Services environment, traditional ACID transactions are not always sufficient to support the activities that businesses would like to process. While Web Services transactions standards do exist, it is still difficult for an end-user to combine services from loosely-coupled providers into a single action to be performed. We describe the use of a “Super Browser” that enables users to more easily find and combine Webapplications into a single activity that they can view and manipulate throughout its life-cycle.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Abstract&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;abstract&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:2,&amp;quot;range&amp;quot;:&amp;quot;370-917&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit3&quot; id=&quot;conference&quot;&gt;Conference&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;http://www.webist.org/WEBIST2008/&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;http://www.webist.org/WEBIST2008/&quot; rel=&quot;ugc nofollow noopener&quot;&gt;The 4th International Conference on Web Information Systems &amp;amp; Technologies&lt;/a&gt;
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Conference&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;conference&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:3,&amp;quot;range&amp;quot;:&amp;quot;918-&amp;quot;} --&gt;</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Sun, 31 Jan 2016 07:13:10 +0000</pubDate>
        </item>
        <item>
            <title>webist2009</title>
            <link>https://davidjohnpaul.com/wiki/doku.php/research:webist2009</link>
            <description>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;web_browser_transactionality&quot;&gt;Web Browser Transactionality&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;http://hdl.handle.net/1959.13/39684&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;http://hdl.handle.net/1959.13/39684&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Download&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;
Wallis, M., Paul, D., Henskens, F. A. and Hannaford, M. R. “Web Browser Transactionality”, The 5th International Conference on Web Information Systems &amp;amp; Technologies (WEBIST2009), Lisboa, Portugal, INSTICC, pp. 93-100, March 2009.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Web Browser Transactionality&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;web_browser_transactionality&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:1,&amp;quot;range&amp;quot;:&amp;quot;1-326&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit2&quot; id=&quot;abstract&quot;&gt;Abstract&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
As the complexity of web applications increases new challenges are faced in relation to data integrity and system scalability. Traditional client server fat applications allow for a high level of transactionality between the client and server, due largely to transactional protocols and tight coupling between components. Transactional functionality within web applications is historically limited to within the web server hosting the application. The scope of the traditional transaction in this context does not extend outside of the web server and its attached services. This paper proposes that web applications can achieve increased system integrity by extending the scope of the transaction to encompass tasks performed by the web browser. An additional layer is introduced to the standard HTTP protocol to facilitate the new functionality, and a simulator is presented as the basis for further research.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Abstract&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;abstract&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:2,&amp;quot;range&amp;quot;:&amp;quot;327-1260&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit3&quot; id=&quot;conference&quot;&gt;Conference&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;http://www.webist.org/WEBIST2009/&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;http://www.webist.org/WEBIST2009/&quot; rel=&quot;ugc nofollow noopener&quot;&gt;The 5th International Conference on Web Information Systems &amp;amp; Technologies&lt;/a&gt;
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Conference&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;conference&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:3,&amp;quot;range&amp;quot;:&amp;quot;1261-&amp;quot;} --&gt;</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Sun, 31 Jan 2016 07:13:10 +0000</pubDate>
        </item>
        <item>
            <title>webist2010</title>
            <link>https://davidjohnpaul.com/wiki/doku.php/research:webist2010</link>
            <description>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;per-request_contracts_for_web_services_transactions&quot;&gt;Per-request Contracts for Web Services Transactions&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;http://hdl.handle.net/1959.13/804146&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;http://hdl.handle.net/1959.13/804146&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Download&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;
Paul, D., Henskens, F. A. and Hannaford, M. R. “Per-request Contracts for Web Services Transactions”, The 6th International Conference on Web Information Systems &amp;amp; Technologies (WEBIST2010), INSTICC, pp. 81-88, 2010.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Per-request Contracts for Web Services Transactions&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;per-request_contracts_for_web_services_transactions&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:1,&amp;quot;range&amp;quot;:&amp;quot;1-336&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit2&quot; id=&quot;abstract&quot;&gt;Abstract&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
To allow providers to keep their autonomy and ensure the overall system can run satisfactorily, it is common practice in the Web Services environment for providers to reduce the strength of some of the traditionally required ACID properties when offering transactional support. However, current standards require providers to offer a constant level of transactional support for each operation they provide. We describe a method that allows service providers to dynamically decide on the level of transactional support to offer for each client request. This allows the provider to base the level of transactional support offered on the current state of the system and internal logic, resulting in potential benefits for both service providers and consumers.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Abstract&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;abstract&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:2,&amp;quot;range&amp;quot;:&amp;quot;337-1116&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit3&quot; id=&quot;conference&quot;&gt;Conference&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;http://www.webist.org/WEBIST2010/&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;http://www.webist.org/WEBIST2010/&quot; rel=&quot;ugc nofollow noopener&quot;&gt;The 6th International Conference on Web Information Systems &amp;amp; Technologies&lt;/a&gt;
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Conference&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;conference&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:3,&amp;quot;range&amp;quot;:&amp;quot;1117-&amp;quot;} --&gt;</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Sun, 31 Jan 2016 07:13:10 +0000</pubDate>
        </item>
        <item>
            <title>webist2011</title>
            <link>https://davidjohnpaul.com/wiki/doku.php/research:webist2011</link>
            <description>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;simulating_web_services_transactions&quot;&gt;Simulating Web Services Transactions&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://davidjohnpaul.com/wiki/lib/exe/fetch.php/research:paul_webist2011.pdf&quot; class=&quot;media mediafile mf_pdf&quot; target=&quot;_self&quot; title=&quot;research:paul_webist2011.pdf (92.1 KB)&quot; rel=&quot;noopener&quot;&gt;Download&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;
Paul, D., Henskens, F. A. and Hannaford, M. R. “Simulating Web Services Transactions”, Web Services Principles &amp;amp; Applications (WSPA) at 7th International Conference on Web Information Systems and Technologies (WEBIST2011), INSTICC/ACM-SIGMIS, pp. 615-623, 2011.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Simulating Web Services Transactions&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;simulating_web_services_transactions&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:1,&amp;quot;range&amp;quot;:&amp;quot;1-358&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit2&quot; id=&quot;abstract&quot;&gt;Abstract&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
Transactions in a service-oriented environment are very different to traditional transactions. The typical ACID properties are not always appropriate when processing transactions where multiple service providers wish to maintain autonomy and process all requests in a timely manner. Thus, reductions to the ACID properties, such as semantic atomicity and tentative holds, are often used to provide transactions for Web Services. This paper describes a simulator for modelling various Web Services transaction strategies. The simulator is deterministic, allowing the specification of network conditions, provider resources, and client workflows to be kept constant while altering the level of transaction support each provider offers. By modelling transaction flow rather than service flow, this allows true comparison of transaction techniques in various scenarios. The simulator is demonstrated using a validation experiment, and future use outlines how the simulator is being used to test a system where providers offer a dynamic level of transaction support to clients.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Abstract&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;abstract&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:2,&amp;quot;range&amp;quot;:&amp;quot;359-1454&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit3&quot; id=&quot;conference&quot;&gt;Conference&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
Web Services Principles &amp;amp; Applications at &lt;a href=&quot;http://www.webist.org/WEBIST2011/&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;http://www.webist.org/WEBIST2011/&quot; rel=&quot;ugc nofollow noopener&quot;&gt;The 7th International Conference on Web Information Systems &amp;amp; Technologies&lt;/a&gt;
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Conference&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;conference&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:3,&amp;quot;range&amp;quot;:&amp;quot;1455-&amp;quot;} --&gt;</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Sun, 31 Jan 2016 10:18:47 +0000</pubDate>
        </item>
        <item>
            <title>webist2013</title>
            <link>https://davidjohnpaul.com/wiki/doku.php/research:webist2013</link>
            <description>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;dynamic_transactional_workflows_in_service-oriented_environments&quot;&gt;Dynamic Transactional Workflows In Service-Oriented Environments&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://davidjohnpaul.com/wiki/lib/exe/fetch.php/research:paul_webist2013.pdf&quot; class=&quot;media mediafile mf_pdf&quot; target=&quot;_self&quot; title=&quot;research:paul_webist2013.pdf (133.8 KB)&quot; rel=&quot;noopener&quot;&gt;Download&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;
Paul, D., Henskens, F. A. and Hannaford, M. R. “Dynamic Transactional Workflows In Service-Oriented Environments”, The 9th International Conference on Web Information Systems and Technologies (WEBIST2013), Aachen, Germany, pp. 26-36, 2013.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Dynamic Transactional Workflows In Service-Oriented Environments&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;dynamic_transactional_workflows_in_service-oriented_environments&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:1,&amp;quot;range&amp;quot;:&amp;quot;1-364&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit2&quot; id=&quot;abstract&quot;&gt;Abstract&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
Transactions in service-oriented environments, such as those provided by Web Services, traditionally support a reduced set of the ACID properties. This has typically required providers to constantly offer a fixed level of transaction support for each client request to a service. Further, clients have been limited in their ability to combine services with different transactional guarantees into a single workflow. We present a mechanism that allows the dynamic specification of transaction support for a given service call, and a cost-based model that allows clients to automatically reason about workflows consisting of service requests with various levels of transaction support. A Web Services transactions simulator is used to verify the viability of this dynamic transaction scheme, with results indicating potential benefits for both service providers and clients.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Abstract&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;abstract&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:2,&amp;quot;range&amp;quot;:&amp;quot;365-1260&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit3&quot; id=&quot;conference&quot;&gt;Conference&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;http://www.webist.org/?y=2013&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;http://www.webist.org/?y=2013&quot; rel=&quot;ugc nofollow noopener&quot;&gt;The 9th International Conference on Web Information Systems &amp;amp; Technologies&lt;/a&gt;
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Conference&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;conference&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:3,&amp;quot;range&amp;quot;:&amp;quot;1261-&amp;quot;} --&gt;</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Sun, 31 Jan 2016 10:18:47 +0000</pubDate>
        </item>
        <item>
            <title>webist2013a</title>
            <link>https://davidjohnpaul.com/wiki/doku.php/research:webist2013a</link>
            <description>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;quon_-_a_generic_platform_for_the_collation_and_sharing_of_web_survey_data&quot;&gt;QuON - A Generic Platform for the Collation and Sharing of Web Survey Data&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://davidjohnpaul.com/wiki/lib/exe/fetch.php/research:paul_webist2013b.pdf&quot; class=&quot;media mediafile mf_pdf&quot; target=&quot;_self&quot; title=&quot;research:paul_webist2013b.pdf (183.9 KB)&quot; rel=&quot;noopener&quot;&gt;Download&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;
Paul, D., Wallis, M., Henskens, F. A. and Nolan, K. “QuON - A Generic Platform for the Collation and Sharing of Web Survey Data”, The 9th International Conference on Web Information Systems and Technologies (WEBIST2013), Aachen, Germany, pp. 111-116, 2013.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;QuON - A Generic Platform for the Collation and Sharing of Web Survey Data&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;quon_-_a_generic_platform_for_the_collation_and_sharing_of_web_survey_data&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:1,&amp;quot;range&amp;quot;:&amp;quot;1-392&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit2&quot; id=&quot;abstract&quot;&gt;Abstract&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
QuON is an open-source system that allows researchers to design and conduct Web-based surveys. It was cre- ated to overcome limitations in existing survey systems, and is especially concerned with conditional branch- ing, user and group management, and the generation of metadata to allow optional sharing and external dis- covery of collected survey data. This paper describes the current QuON software system, its features, and future directions.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Abstract&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;abstract&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:2,&amp;quot;range&amp;quot;:&amp;quot;393-864&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit3&quot; id=&quot;conference&quot;&gt;Conference&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;http://www.webist.org/?y=2013&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;http://www.webist.org/?y=2013&quot; rel=&quot;ugc nofollow noopener&quot;&gt;The 9th International Conference on Web Information Systems &amp;amp; Technologies&lt;/a&gt;
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Conference&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;conference&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:3,&amp;quot;range&amp;quot;:&amp;quot;865-&amp;quot;} --&gt;</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Sun, 31 Jan 2016 10:18:47 +0000</pubDate>
        </item>
        <item>
            <title>webist2021</title>
            <link>https://davidjohnpaul.com/wiki/doku.php/research:webist2021</link>
            <description>
&lt;h1 class=&quot;sectionedit1&quot; id=&quot;a_restful_northbound_interface_for_applications_in_software_defined_networks&quot;&gt;A RESTful Northbound Interface for Applications in Software Defined Networks&lt;/h1&gt;
&lt;div class=&quot;level1&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;https://doi.org/10.5220/0010713300003058&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;https://doi.org/10.5220/0010713300003058&quot; rel=&quot;ugc nofollow noopener&quot;&gt;Download&lt;/a&gt;
&lt;/p&gt;

&lt;p&gt;
Alghamdi, A., Paul, D. and Sadgrove, E. “A RESTful Northbound Interface for Applications in Software Defined Networks”, 17th International Conference on Web Information Systems and Technologies (WEBIST 2021), pp. 453-459, October 2021.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;A RESTful Northbound Interface for Applications in Software Defined Networks&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;a_restful_northbound_interface_for_applications_in_software_defined_networks&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:1,&amp;quot;range&amp;quot;:&amp;quot;1-383&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit2&quot; id=&quot;abstract&quot;&gt;Abstract&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
Software Defined Networking (SDN) aims to help overcome the complexities inherent in traditional networks. The main concept in SDN is the decoupling of the data layer from the control layer, the latter of which is centralised in a controller. OpenFlow has been adopted as the standard protocol for the southbound interface, where the controller communicates with forwarding devices. However, the northbound interface (NBI), connecting the controller with end-user business applications, does not have an open standard. NBIs have accelerated application development because developers can implement required functionality without the need to consider matters related to the data layer, but there is an issue of compatibility because each SDN has its own NBI. In this position paper we present a plan to design a RESTful NBI for SDN applications to improve compatibility across SDN technologies.
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Abstract&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;abstract&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:2,&amp;quot;range&amp;quot;:&amp;quot;384-1300&amp;quot;} --&gt;
&lt;h2 class=&quot;sectionedit3&quot; id=&quot;conference&quot;&gt;Conference&lt;/h2&gt;
&lt;div class=&quot;level2&quot;&gt;

&lt;p&gt;
&lt;a href=&quot;http://www.webist.org/?y=2021&quot; class=&quot;urlextern&quot; target=&quot;_self&quot; title=&quot;http://www.webist.org/?y=2021&quot; rel=&quot;ugc nofollow noopener&quot;&gt;The 17th International Conference on Web Information Systems &amp;amp; Technologies&lt;/a&gt;
&lt;/p&gt;

&lt;/div&gt;
&lt;!-- EDIT{&amp;quot;target&amp;quot;:&amp;quot;section&amp;quot;,&amp;quot;name&amp;quot;:&amp;quot;Conference&amp;quot;,&amp;quot;hid&amp;quot;:&amp;quot;conference&amp;quot;,&amp;quot;codeblockOffset&amp;quot;:0,&amp;quot;secid&amp;quot;:3,&amp;quot;range&amp;quot;:&amp;quot;1301-&amp;quot;} --&gt;</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Mon, 01 Nov 2021 02:01:24 +0000</pubDate>
        </item>
    </channel>
</rss>
