• Login
    Search 
    •   Home
    • Research Publications
    • Search
    •   Home
    • Research Publications
    • Search
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Browse

    All of UDORACommunitiesTitleAuthorsIssue DateSubmit DateSubjectsThis CommunityTitleAuthorsIssue DateSubmit DateSubjects

    My Account

    LoginRegister

    Filter by Category

    SubjectsCFD (6)Energy (3)heat transfer devices (3)Thermal comfort (3)wind tower/catcher (3)View MoreJournalEnergy Procedia (4)British Journal of Guidance & Counselling (2)Graduate Market Trends (2)International Journal of Advanced Computer Science and Applications (IJACSA) (2)International Journal of Robotics and Mechatronics (2)View MoreAuthorsCalautit, John Kaiser (9)Hughes, Ben (9)Shahzad, Sally (9)Shahzad, Sally (9) ccHooley, Tristram (6)View MoreYear (Issue Date)
    2015 (51)
    Types
    Article (51)

    About and further information

    AboutOpen Access WebpagesOpen Access PolicyTake Down Policy Quick Guide for Submissions - Doctoral StudentsUniversity NewsTools for ResearchersLibraryUDo

    Statistics

    Display statistics
     

    Search

    Show Advanced FiltersHide Advanced Filters

    Filters

    Now showing items 41-50 of 51

    • List view
    • Grid view
    • Sort Options:
    • Relevance
    • Title Asc
    • Title Desc
    • Issue Date Asc
    • Issue Date Desc
    • Results Per Page:
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100

    • 51CSV
    • 51RefMan
    • 51EndNote
    • 51BibTex
    • Selective Export
    • Select All
    • Help
    Thumbnail

    A survey on top security threats in cloud computing

    Kazim, Muhammad; Zhu, Shao Ying (Science and Information (SAI) Organization Ltd., 2015)
    Cloud computing enables the sharing of resources such as storage, network, applications and software through internet. Cloud users can lease multiple resources according to their requirements, and pay only for the services they use. However, despite all cloud benefits there are many security concerns related to hardware, virtualization, network, data and service providers that act as a significant barrier in the adoption of cloud in the IT industry. In this paper, we survey the top security concerns related to cloud computing. For each of these security threats we describe, i) how it can be used to exploit cloud components and its effect on cloud entities such as providers and users, and ii) the security solutions that must be taken to prevent these threats. These solutions include the security techniques from existing literature as well as the best security practices that must be followed by cloud administrators.
    Thumbnail

    The escape behaviour of wild Greek tortoises Testudo graeca with and emphasis on geometrical shape discrimination

    Glavaschi, Alexandra; Beaumont, Ellen S. (Spanish Herpetological Society, 2015)
    Geometrical shape discrimination has been shown to play an important role in the spatial orientation of a wide variety of mammals and birds, while the study of this ability in particular and of cognitive processes in general has been rather neglected in reptiles. The present experiment aims to investigate the ability of wild Greek tortoises Testudo graeca from Topolog forest, Tulcea County, Romania, to discriminate between simple geometrical shapes. Forty-two adult tortoises were subjected to a task consisting of escaping from a square arena through one of the four available doors, each with a geometrical shape attached. Thirty-one individuals completed ten consecutive trials, requiring significantly less time for the last trial than for the first. This trend suggests that Greek tortoises developed and used an escape strategy, most likely relying on the geometrical shapes provided as cues. This experiment is the first to explore the cognitive processes of this species and further work should expand on the ecological significance of this ability.
    Thumbnail

    Gillick, bone marrow and teenagers

    Cherkassky, Lisa (2015)
    The Human Tissue Authority can authorise a bone marrow harvest on a child of any age if a person with parental responsibility consents to the procedure. Older children have the legal capacity to consent to medical procedures under Gillick, but it is unclear if Gillick can be applied to non-therapeutic medical procedures. The relevant donation guidelines state that the High Court shall be consulted in the event of a disagreement, but what is in the best interests of the teenage donor under s.1 of the Children Act 1989? There are no legal authorities on child bone marrow harvests in the United Kingdom. This article considers the best interests of the older saviour sibling and questions whether, for the purposes of welfare, the speculative benefits could outweigh the physical burdens.
    Thumbnail

    Deep Space

    Crossley, John (Sound on Sound Ltd., 2015)
    For this ambitious project, John Crossley had a full live band play through a 16-speaker system, to create an immersive performance inspired by the Rosetta spacecraft’s journey through the solar system.
    Thumbnail

    Systematic review of effects of current transtibial prosthetic socket designs—Part 1: Qualitative outcomes

    Safari, Reza; Meier, Margrit Regula (PLOS, 2015)
    This review is an attempt to untangle the complexity of transtibial prosthetic socket fit, determine the most important characteristic for a successful fitting, and perhaps find some indication of whether a particular prosthetic socket type might be best for a given situation. Further, it is intended to provide directions for future research. We followed the PRISMA (Preferred Reporting Items for Systematic Reviews and Meta-Analyses) guidelines and used medical subject headings and standard key words to search for articles in relevant databases. No restrictions were made on study design or type of outcome measure. From the obtained search results (n = 1,863), 35 articles were included. The relevant data were entered into a predefined data form that incorporated the Downs and Black risk of bias assessment checklist. Results for the qualitative outcomes (n = 19 articles) are synthesized. Total surface bearing sockets lead to greater activity levels and satisfaction in active persons with amputation, those with a traumatic cause of amputation, and younger persons with amputation than patellar tendon bearing sockets. Evidence on vacuum-assisted suction and hydrostatic sockets is inadequate, and further studies are much needed. To improve the scientific basis for prescription, comparison of and correlation between mechanical properties of interface material, socket designs, user characteristics, and outcome measures should be conducted and reported in future studies.
    Thumbnail

    Affiliative and prosocial motives and emotions in mental health

    Gilbert, Paul (Servier Research Group, 2015)
    This paper argues that studies of mental health and wellbeing can be contextualized within an evolutionary approach that highlights the coregulating processes of emotions and motives. In particular, it suggests that, although many mental health symptoms are commonly linked to threat processing, attention also needs to be directed to the major regulators of threat processing, ie, prosocial and affiliative interactions with self and others. Given that human sociality has been a central driver for a whole range of human adaptations, a better understanding of the effects of prosocial interactions on health is required, and should be integrated into psychiatric formulations and interventions. Insight into the coregulating processes of motives and emotions, especially prosocial ones, offers improved ways of understanding mental health difficulties and their prevention and relief.
    Thumbnail

    Selecting a disabled embryo can constitute grievous bodily harm

    Cherkassky, Lisa (2015)
    The Human Fertilisation and Embryology Act 1990 (as amended) in the UK allows parents to select a disabled embryo for implantation as part of fertility treatment services. There was widespread condemnation of a couple in the United States who intentionally conceived two deaf children, and there is evidence to suggest that requests for dwarfism are on the rise. This article suggests that it is an offence against the person to give birth to an intentionally disabled child, and that this is a unique criminal act that can be distinguished from a wrongful life action (rejected in UK law by McKay v Essex Area Health Authority [1982] Q.B. 1166). The components of s.18 of the Offences Against the Person Act 1861 will be explored to prove that should an intentionally disabled child ever come forward, a prosecution may be possible under the criminal law.
    Thumbnail

    The survival and development of UK public libraries under the global financial crisis

    Zhou, Lihong; Huang, Ruhua; Zijlstra, Tim R. (China Knowledge Network Beijing (CKNI), 2015)
    This paper discusses the survival and development of the public libraries in UK under the currentglobal financial crisis,as well as the severe problems of public funding cuts,public library closures,staff loss and significant decrease in service quality.
    Thumbnail

    Derby Cathedral as a beacon: the role of the Church of England in tourism management.

    Wiltshier, Peter (2015)
    In this research the role of the Cathedral is as a beacon inspiring and guiding community development. Good practice case studies in community collaboration, like the Cathedral's, are perceived as central and critical to the success of regeneration and development. The philosophical approach used engages the paradigms of community development (Moscardo, 2014; Ness, 2014; Goodson and Phillimore, 2012; Gilchrist and Taylor, 2011). A bottom-up, endogenous approach to development is perceived to deliver unique selling points to the community. An exogenous and centralist approach is perceived to deliver standardised outcomes that may not encourage actors to develop distinctive and special features for future strategies. This report measured the strength of the Cathedral, the seat of the Bishop of Derby, in delivering community outcomes that reflect both the values, beliefs and aims of the Church of England and of the city. At the same time it identifies the structures required within the Cathedral to support these aims and objectives. A participatory action approach, rooted in social constructivism, is used to frame the investigation into delivery and operation (Mayo et al., 2013). With the active encouragement of participants at the Cathedral and within other specific organisations located in the City the future requirements of strategy and operations to deliver exceptional outcomes that encompass the good practices are explored. This approach incorporates analysis of community's beliefs, expectations and values. The model then creates a framework for supporting, advocating and co-creating a development agenda that has the Cathedral at its core. The model reflects on the achievements of the Cathedral, the structure needed to make those achievements, it sells the strategy for people to operate it, and it tells the stories of that strategy to reflect the output and outcomes and concludes with indicators for future development by the Cathedral. The paper concludes reflecting the increased social capital that is created in this approach.
    Thumbnail

    Challenging the concept of risk in relation to women's entrepreneurship

    Humbert, Anne Laure; Brindley, Clare (Emerald Group Publishing Limited, 2015)
    Purpose This paper aims to challenge the myth of risk-averseness among women entrepreneurs and analyses risk in the context of gender. It explores risk perceptions and examines the relationship between the concept of risk and women's socially attributed roles. Design/methodology/approach This paper adopts a qualitative approach, where ten Irish women business owners were interviewed, that encouraged them to talk about their entrepreneurial experiences. The research design aimed to elicit data concerning how gender and the socio-economic context influenced risk. Findings Risk is shown as a gendered concept which needs to be widened to suit the experiences of women entrepreneurs and the influences of the gendered expectations of care dictated by the socio-economic environment. Practical implications Risk as a concept needs to be expanded to go beyond financial risk. The different types of risk encountered by women should be addressed by policy to promote a further growth of women-led enterprises and support those considering self-employment. Originality/value The paper develops an understanding of risk among women entrepreneurs in their socio-economic context. It challenges the viewpoint of seeing women entrepreneurs as risk-averse and thus leading to low-growth prospects for their business ventures.
    • 1
    • . . .
    • 2
    • 3
    • 4
    • 5
    • 6
    DSpace software (copyright © 2002 - 2019)  DuraSpace
    Quick Guide | Contact Us
    Open Repository is a service operated by 
    Atmire NV
     

    Export search results

    The export option will allow you to export the current search results of the entered query to a file. Different formats are available for download. To export the items, click on the button corresponding with the preferred download format.

    By default, clicking on the export buttons will result in a download of the allowed maximum amount of items.

    To select a subset of the search results, click "Selective Export" button and make a selection of the items you want to export. The amount of items that can be exported at once is similarly restricted as the full export.

    After making a selection, click one of the export format buttons. The amount of items that will be exported is indicated in the bubble next to export format.