Now showing items 10261-10280 of 11146

    • Transdermal drug delivery devices: Skin perturbation systems 

      Brown, M.B.; Traynor, M.J.; Martin, G.P.; Akomeah, F.K. (Springer (Humana Press), 2008)
      Human skin serves a protective function by imposing physicochemical limitations to the type of permeant that can traverse the barrier. For a drug to be delivered passively via the skin it needs to have a suitable lipophilicity ...
    • Cannabinoids and Bronchial Airways 

      Dudasova, Anita (2009-07-01)
      Although there is a renewed interest in the therapeutic potential of cannabinoids, pharmacological and physiological characterisation of these promising compounds is currently not well documented in the respiratory system. ...
    • Cytokine Gene and Protein Expression in BCG Vaccinated and Non-Vaccinated Mycobacterium bovis Infected cattle 

      Witchell, J. (2009-07-01)
      The persistent increase of bovine tuberculosis (bTB) over the past twenty years has put a substantial strain on both the British economy and the welfare of livestock. However, the development of an effective bTB vaccine ...
    • Any Time? Any Place? The impact on student learning of an on-line learning environment. 

      Jefferies, A.; Thornton, M.E.; Doolan, M.; Parkhurst, S.; Alltree, J. (ACTA Press, 2005)
      An increasing number of HE institutions are adopting virtual and managed learning environments (VLEs and MLEs), which offer flexible access to on-line learning materials all day and every day. There are multiple claims ...
    • Accessiblity Through Usability 

      Egan, C.; Johal, J.; Jefferies, A. (ACTA Press, 2003)
      In the UK there has been an increasing number of students in Higher Education through the last decade. As this number grows there is a greater diversity in the student population and therefore an increasing number of ...
    • Auditory memory for timbre 

      McKeown, D.; Wellsted, D. (2009)
      Psychophysical studies are reported examining how the context of recent auditory stimulation may modulate the processing of new sounds. The question posed is how recent tone stimulation may affect ongoing performance in a ...
    • Technique for authentication, access control and resource management in open distributed systems 

      Low, M.R.; Christianson, B. (1994)
      A consistent approach to authentication and access control is proposed. In this new approach, resource management is included. By combining the properties of public key encryption with cascading proxies a single mechanism ...
    • Key-spoofing attacks on nested signature blocks 

      Christianson, B.; Low, M.R. (1995)
      For a given signature block and any other data, there exists a key which produces the same signature block. The threat that this poses to schemes which use nested signature blocks as pointers to other tokens is identified, ...
    • Optimizing Preventive Maintenance Models. 

      Christianson, B.; Bartholomew-Biggs, M. (2005)
      We consider the problem of scheduling preventive maintenance so as to minimize the expected total repair and replacement costs over the lifetime of a system. Our AD-based approach involves some non-standard features, such ...
    • “Fair” Authentication in Pervasive Computing 

      Christianson, B.; Li, J.; Loomes, M. (2006)
      Authentication is traditionally required to be strong enough to distinguish legitimate entities from unauthorised entities, and always involves some form of proof of identity, directly or indirectly. Conventional storable ...
    • Formal Systems, Not Methods 

      Loomes, M.; Christianson, B.; Davey, N. (2004)
      In this paper we will present an approach for teaching formalisms to Computer Science undergraduate students that has been developed over the past 23 years at the University of Hertfordshire (formerly Hatfield Polytechnic). ...
    • Shrink-Wrapped Optimism: The DODA Approach to Distributed Document Processing 

      Christianson, B.; Snook, J.F. (2003)
      In this paper we introduce a distributed object-based document architecture called DODA in order to illustrate a novel strategy for achieving both high availability and high integrity in the context of open processing ...
    • Auditable Anonymous Delegation 

      Christianson, B.; Das Chowdhury, P.; Malcolm, J. (2005)
      The contribution of this paper is an alternative mechanism for delegation, whereby users can share their credentials in such a way that it is difficult for the delegatee to re-use credentials of the delegator. An auditor ...
    • Practice as Role Enactment: Managing Purposive Sophisticated Cooperation 

      Charlebois, Cameron (2009-06-17)
      This doctoral dissertation proposes a fuller, more inclusive account of practice than that which dominates current discourse on organizations, which typically turns upon occupations, professions and jobs as manifestations ...
    • Anonymous Context Based Role Activation Mechanism 

      Das Chowdhury, P.; Christianson, B.; Malcolm, J. (2005)
      Privacy is not an explicit goal of traditional authorisation mechanisms. The contribution of this paper is an authorisation mechanism which takes identity out of the trust management envelope. Our protocol supports weak ...
    • Wavelet neural network approach for fault diagnosis of analogue circuits 

      Sun, Y.; He, Y.; Tan, Y. (2004)
      A systematic method for fault diagnosis of analogue circuits based on the combination of neural networks and wavelet transforms is presented. Using wavelet decomposition as a tool for removing noise from the sampled signals, ...
    • Tuning of leapfrog multiple loop feedback bandpass filters 

      Moritz, J.; Sun, Y. (2001)
      Off-line tuning of leapfrog multiple loop feedback bandpass filters is demonstrated using a modification of Dishal's method. The proposed method has advantages including simplified tuning circuits and algorithms, minimal ...
    • Improved dynamic cutting force model in ball end milling - Part 1 : Theoretical modelling and experimental callibration 

      Liu, X.; Cheng, K.; Longstaff, A.P.; Widiyarto, M.H.; Ford, D. (2005)
      An accurate cutting force model of ball-end milling is essential for precision prediction and compensation of tool deflection that dominantly determines the dimensional accuracy of the machined surface. This paper presents ...
    • A simulated investigation on the machining instability and dynamic surface generation 

      Liu, X.; Cheng, F. (2005)
      In this paper, the authors propose the generic concept of machining instability based on the analysis of all kinds of machining instable behaviours and their features. The investigation covers all aspects of the machining ...