Oral and PechaKucha Presentation Oral and PechaKucha Presentation Abstracts. Doctoral Capability and

download Oral and PechaKucha Presentation Oral and PechaKucha Presentation Abstracts. Doctoral Capability and

of 43

  • date post

    01-Jun-2020
  • Category

    Documents

  • view

    0
  • download

    0

Embed Size (px)

Transcript of Oral and PechaKucha Presentation Oral and PechaKucha Presentation Abstracts. Doctoral Capability and

  • Doctoral Capability and Development 2019 (DCAD19) Conference Tuesday 30th April – Thursday 2nd May

    Oral and PechaKucha Presentation Abstracts

  • Doctoral Capability and Development 2019 (DCAD19) Conference Tuesday 30th April – Thursday 2nd May

    Can We Talk? Does Computer Autonomy Need Speech?

    Adam Bogg

    Tuesday 30 April

    Safety and Security

    14.00-15.40

    We are apparently on the cusp of a technology

    shift; the arrival of the autonomous car that can

    drive itself freeing you to do whatever you want

    other than drive the car. Of course, one question

    that challenges this expectation is: will we accept

    the car as autonomous? Will we over-trust or

    mistrust the autonomy? Human Factors research

    within the last decade on human interactions with

    autonomous IT systems suggests that for humans

    to accept IT as truly autonomous the IT needs to

    behave less like a fixed machine and more like a

    fallible human teammate. Yet, despite

    acknowledging this requirement, research on

    human autonomy interaction still focuses on

    visual-graphical communication as the primary

    form of interaction. This research hypothesises

    that, for humans to view automation as a

    teammate, it is essential that the automation

    interacts through a medium all humans are used

    to; through voice communication.

  • Doctoral Capability and Development 2019 (DCAD19) Conference Tuesday 30th April – Thursday 2nd May

    Mixture Optimization for Compressive Strength of Red Geopolymer Mortar

    Aminu Shinkafi

    Thursday 2 May

    Sustainability and

    Resilience

    11.00-12.30

    Geopolymers are produced from the alkalination

    of reactive alumino silicate source with alkaline

    solution. Previously, iron rich lateritic clay are

    considered as unsuitable precursors, despite their

    global abundance and low embodied energy. This

    is due to the reported harmful action of some

    ferrous compounds Fe++ that hinders the

    geopolymeric reaction. The performance of the

    clay based geopolymers are influenced by the

    calcination process, nature and type of alkaline

    metal source, etc. In this work, mixes based on a

    range of molar oxides and mass ratios were

    designed to achieve the peak strength of the red

    geopolymer mortar cured under sealed condition.

    Also, setting times and rheological properties of

    the peak strength mix were studied. The result

    shows that calcined clay to sodium silicate

    solution mass ratio of 1 gives the highest

    compressive strength of 29 MPa at 28 days and

    the binding phase is poly ferro sialate (Fe-Si-O-Al).

    Keywords: Calcined clay, red geopolymer, mortar,

    compressive strength, setting times

  • Doctoral Capability and Development 2019 (DCAD19) Conference Tuesday 30th April – Thursday 2nd May

    Detecting Automobile Cyber-attacks

    Andrew Tomlinson

    Tuesday 30 April

    Safety and Security

    14.00-15.40

    Modern cars contain many sensors and control

    units connected via internal networks. One in-car

    network, the Controller Area Network, has been

    shown to be particularly vulnerable to cyber-

    attack. On it reside units that govern

    performance-critical and safety-critical functions,

    such as braking, steering and engine operations.

    Attacks on this network could disrupt the car,

    putting drivers, passengers and pedestrians at risk,

    as well as causing damage to the vehicle.

    Detecting such attacks presents many challenges,

    such as: the high volumes of data that are rapidly

    generated on the network; the low computing

    power available in the car; and the

    unpredictability of future attacks. The

    presentation looks at the characteristics of such

    attacks, and shows how the attacks might be

    detected by an in-vehicle cyber-attack detection

    system. Results from testing potential detection

    methods are presented and discussed.

  • Doctoral Capability and Development 2019 (DCAD19) Conference Tuesday 30th April – Thursday 2nd May

    How Can You Win the Global Talent War?

    Beena Manoj

    Wednesday 1 May

    Sustainability and

    Resilience

    13.45-15.00

    The most fundamental aspect for any MNC is to

    ensure that an organisational task demanding high

    skill is sufficiently staffed with the right set of

    appropriately-skilled people. The talented

    workforce needs to be motivated for achieving the

    objectives of the task at hand and ensuring

    organisational success. Therefore, the

    management of such a workforce is important to

    ensure organisational requirements are met with

    success. To achieve this, an organisation is

    required to understand the multiple factors that

    can influence different types of talents. This

    research aims to understand the global talent

    management and mobility strategies adopted by a

    company while exploring the individual

    motivational factors that influence a global

    talent’s decision-making process. It also

    investigates the methodology a company uses to

    employ talent for its global talent pool. The

    research uses semi-structured interviews to study

    global talent management and global talent

    mobility.

  • Doctoral Capability and Development 2019 (DCAD19) Conference Tuesday 30th April – Thursday 2nd May

    Automatic Identification of Core Sections in Scientific Research Publications

    Bello Aliyu

    Muhammad

    Wednesday 1 May

    Intelligent Products

    and Processes

    15.30-17.10

    As the volume of published literature grows bigger

    and at an exponential rate, the extraction of

    information becomes time consuming and error

    prone. Hence, the need for automation

    procedures for the extraction of relevant

    information from the publications (papers). First, a

    canonical model based on the well-established

    structure of the scientific research articles was

    proposed as a unified approach for the automatic

    data extraction. The model is simply a depiction

    of the core sections the articles contain. However,

    the machines do not have true understanding of

    these sections. This paper presents the machine

    learning models that enables the computer

    system to understand the canonical model to

    identify the core sections of the articles. The

    study involves 3,000 full-text research journal

    articles from the software engineering. Support

    Vector Machine (SVM), Naive Bayes, Random

    Forest and Logistic Regression algorithms were

    used in the experiment. Logistic regression

    achieved the highest accuracy of 78%.

  • Doctoral Capability and Development 2019 (DCAD19) Conference Tuesday 30th April – Thursday 2nd May

    The Use of Big

    Data Analytics

    for Retail Fraud

    Prevention

    Chiwuokem Nwoko

    Tuesday 30 April

    Safety and Security

    14.00-15.40

    Big data has been researched in many disciplines

    and industries (e.g., Günther, et al., 2017; Wang,

    et al., 2018). However, a peruse of literature not

    only shows that there is little research into the use

    of big data for retail fraud prevention, but also

    that many a literature focus on

    technical/quantitative methods in big data

    discourse (e.g., Herodotou, et al., 2011; Cheng, et

    al., 2014).

    Therefore, we aim to evaluate the use of big data

    as a technique to investigate cybercrime

    management practices and develop a holistic

    theoretical framework for online retailers to

    improve their practice and prevention strategies.

    We adopt a qualitative case studies research

    method using semi-structured interviews and

    combined with internal documents and external

    publications about case studies.

    Our research will offer better in-depth insights

    into the design of a novel big data-enabled

    cybersecurity framework that is proactive and

    replicable in the retail industry.

  • Doctoral Capability and Development 2019 (DCAD19) Conference Tuesday 30th April – Thursday 2nd May

    “You’ll Never Walk Alone”: Exploring Collective Emotion at the Hillsborough Vigil

    Chris Day

    Tuesday 30 April

    Health and Wellbeing

    10.00-11.00

    This presentation explores collective emotions, at

    the Hillsborough Vigil in 2016, by triangulating

    multiple forms of data including online sources,

    interviews etc. This research analyses

    documented present-tense and retrospective

    collective emotion in response to the vindicating

    verdict. A cursory analysis of crowd behaviour at

    the event would suggest a celebratory and

    positive atmosphere.