Sunday 28 December 2014

British Computer Society (Bedford branch) event: Risk Attenuation and Management in Software Projects

A British Computer Society (Bedford branch) event at the Polhill Campus, University of Bedfordshire, Bedford

Date: Wednesday, 28 January 2015

Theme”Risk Attenuation and Management in Software Projects”
Speaker:  Geoffrey Darnton, BA, MBA, CMC, CStat, CEng, CITP, FHEA.  Writer, Publisher, and Visiting Lecturer at the University of Warwick and Regent's University, London.
Time:  6.30-8.00pm; registration starts at 6:00pm

Location:  Room P032, University of Bedfordshire, Polhill Avenue, Bedford, Bedfordshire MK41 9EA.
[Parking available onsite] 

Register online at:  https://events.bcs.org/book/1355

Twitter     : @BCSBedford

Abstract


In many projects it is often taken as a given to break down the project into its constituent parts (WBS), and define project milestones.  Project review meetings then track progress according to the pre-defined milestones and completion of the components. This is often not the best way to proceed and is why there have been so many large public sector project failures, over-runs, etc.

This presentation and discussion challenge much orthodox wisdom about software project management, and suggests that many more projects should be following a spiral method rather than WBS and milestones. The determining characteristics are project novelty and complexity to inform method choices.

Also, what is needed is nearer to one project method per project than one development method for the organization along a spectrum - with waterfall methods at one end and spiral methods at the other.

Geoffrey often describes himself as a multidisciplinary solver of multidimensional problems. He has many years of project experience in a variety of roles involving statistics, econometrics, teaching, research, management, education, meta-modelling, information systems and ICT.  Some projects have even required delving into history, law, philosophy and ethnography.  Geoffrey has managed an international group of consultants who had to address problematic projects at a fourth level of escalation, when the project methods themselves were often the cause of the problems.  He has authored, co-authored or contributed to more than 11 books, journals and conference papers - with more in the pipeline.



Agenda

6.00pm            Registration, refreshments and networking

6.30pm            Introduction
    ‘Risk Attenuation and Management in Software Projects’

7.20pm            Opportunity to question the speaker

7.45pm            Thanks
    Opportunity to network and talk to the speaker

Register online at:  https://events.bcs.org/book/1355

Start the discussion on Social Media and invite your colleagues to participate:
Twitter     :  @BCSBedford

If you require additional information or have a specific question, please send an email to sabongo@gmail.com

If you'd like to find out more about Computing at the University of Northampton go to: www.computing.northampton.ac.uk. All views and opinions are the author's and do not necessarily reflected those of any organisation they are associated with

Wednesday 24 December 2014

primary robot design questionnaire

An undergraduate dissertation student is looking for help. James is a computing student looking at robot designs for primary education towards his dissertation and as part of the wider Junkbots project, and the working going on in both the Department of Computing and Immersive Technologies, and School of Education on Physical Computing at the University of Northampton.

The short questionnaire can be found at http://t.co/zdomXnW2Qe and is aimed at gathering a variety of responses from both current Teachers, Students of Education and from anyone with knowledge of programming teaching methods in both Key Stage 1 and 2. He is planning to create a product which aims to teach programming methods and practices based on the current and new national curriculum.


If you'd like to find out more about Computing at the University of Northampton go to: www.computing.northampton.ac.uk. All views and opinions are the author's and do not necessarily reflected those of any organisation they are associated with.

Friday 19 December 2014

Machine-to-machine communications energy efficiencies: the implications of different M2M communications specifications

A research student, Sylvester Ajah, in the Department of Computing and Immersive Technologies has just had a journal paper published 


http://inderscience.metapress.com/content/57787377v7102g56/



Ajah, S., Al-Sherbaz, A., Turner, S. and Picton, P. (2015) ‘Machine-to-machine communications energy efficiencies: the implications of different M2M communications specifications’, Int. J. Wireless and Mobile Computing, Vol. 8, No. 1, pp.15–26

Abstract
The energy inefficiency of electronic devices is the major limiting factor for the adoption of these devices in Machine-to-Machine Communications (M2M)/Internet of Things (IoT). In order to address this, different emerging M2M communications standardisation organisations have proposed perceived energy efficient protocols. The essence of this paper is to discuss the energy implications of different M2M communication standards on the lifespan of the electronic devices that are to be used for the M2M communications.

The paper is available at: http://inderscience.metapress.com/content/57787377v7102g56/



If you'd like to find out more about Computing at the University of Northampton go to: www.computing.northampton.ac.uk. All views and opinions are the author's and do not necessarily reflected those of any organisation they are associated with

Thursday 18 December 2014

University of Northampton and Naaya Aayam Multi-Disciplinary Institute in Nepal to jointly deliver two BSc (Hons) Computing programmes

Taken from: http://www.northampton.ac.uk/news/university-of-northampton-and-naaya-aayam-multi-disciplinary-institute-in-nepal-to-jointly-deliver-two-bsc-hons-programmes

  • The University of Northampton has recently signed a Memorandum of Cooperation (MoC) with Naaya Aayam Multi-Disciplinary Institute (NAMI) in Nepal to jointly deliver two BSc (Hons) programmes.
    Approximately 50 students have already been recruited onto the three-year programmes in Environmental Science or Computing, which will begin in January 2015. Students are also expected to complete a year working in a related industry.
    Both NAMI and the University of Northampton have closely aligned missions in terms of overt commitment to social impact and have worked closely together to design NAMI's brand new facilities in Kathmandu. A significant amount of staff development has been undertaken with the NAMI team, which includes Nepalese alumni of the University of Northampton.
    Dr Arzu Rana Deuba, Chairperson of NAMI, visited the University of Northampton on Wednesday 10 December to formally sign the MoU with Vice Chancellor Nick Petford.
    John Sinclair, Dean of the School of Science and Technology at the University of Northampton, said "The School of Science and Technology is delighted to have formalised its collaboration with NAMI, which has been in development since early 2013.  We are extremely optimistic that more of the University of Northampton's curriculum will be approved for delivery by NAMI in the near future and we see this as an extremely important partnership for the future of both the School of Science and Technology and the University."




If you'd like to find out more about Computing at the University of Northampton go to: www.computing.northampton.ac.uk. All views and opinions are the author's and do not necessarily reflected those of any organisation they are associated with

Monday 15 December 2014

Editorial Enhancing the Learner Experience in Higher education and TOC 2014

Editorial

Anna Crouch, Rachel Maunder, Simon Sneddon, Scott Turner

Abstract


Editorial for the 2014 issue

Full Text:

PDF

References


Kell, P. and Vogl, G. (2012) International students in the Asia Pacific: mobility, risks and global optimism. Springer.
National Union of Students (2012) Student experience research 2012: Part 1: Teaching and learning: Student experience research to gain insight into the quality of the learning experience. National Union of Students. Available at: http://www.nus.org.uk/PageFiles/12238/2012_NUS_QAA_Teaching_and_Learning.pdf (accessed 7/12/14)


The Journal Enhancing the Learner Experience in Higher Education can be found at: http://journals.northampton.ac.uk/index.php/elehe/index


Vol 6, No 1 (2014)


If you'd like to find out more about Computing at the University of Northampton go to: www.computing.northampton.ac.uk. All views and opinions are the author's and do not necessarily reflected those of any organisation they are associated with

Book review: International Students in the Asia Pacific – Mobility, Risks and Optimism

International Students in the Asia Pacific – Mobility, Risks and Optimism (Peter Kell and Gillian Vogl, 2012)

Rashmi Dravid

Abstract


The book offers a comprehensive understanding of complex dynamics of factors that characterize international student mobility while unpacking the inherent contradictions.

Keywords


Internationalisation; student mobility; student experience

Full Text:

PDF

References


Beck, U. (2006) ‘Living in the World Risk Society.’ Economy and Society, 35 (3): 329-345. http://dx.doi.org/10.1080/03085140600844902
Kell, P. M. and Vogl, G. J. (2007) Internationalisation, national development and markets: Key dilemmas for leadership in higher education in Australia. In Kell, P. and Vogl, G. (eds) Between The Flags! From Local Dangers to Global Risks for International Students. International Students in the Asia Pacific. Springer.
Kell, P. and Vogl, G. (2012) International students in the Asia Pacific. Springer.
UNESCO/Council of Europe (2001) Code of Good Practice in the provision of Transnational Education. Available at http://www.coe.int/t/dg4/highereducation/recognition/code%20of%20good%20practice_EN.asp (accessed 6/12/14)
Vogl, G. and Kell, P. (2010) Welcome to Wollongong: host communities and international students. Macquarie University Research Online.


DOI: http://dx.doi.org/10.14234/elehe.v6i1.91


All views are the authors, and may not reflect the views of any organisation the author is connected with in any way.



If you'd like to find out more about Computing at the University of Northampton go to: www.computing.northampton.ac.uk. All views and opinions are the author's and do not necessarily reflected those of any organisation they are associated with

Friday 5 December 2014

BCS Northampton Lecture: Machine To Machine

9th December 2014 - Machine To Machine Lectures

Location: Room NW205 in The Newton Building, 
Avenue Campus, 
University Of Northampton, NN2 6JB
Duration 19:00 for 19:30 - 21:00
Presenter: Barney Duffey

  • What is it?
  • What is it used for?
  • Connectivity
  • Fixed and Mobile devices
  • Why is machine to machine so important?
  • What is the connection with the internet of everything?

Open to members and non-members.

More about BCS Northampton Branch can be found at: http://northampton.bcs.org/events.php?menu_id=4


Related Links from this blog:


 

 


If you'd like to find out more about Computing at the University of Northampton go to: www.computing.northampton.ac.uk. All views and opinions are the author's and do not necessarily reflected those of any organisation they are associated with

Thursday 27 November 2014

Learning Smart - a community-driven, best learning resource sharing website.

Dr James Xue from Department of Computing and Immersive Technologies, University of Northampton and Ahmed Salim (an MSc Computing student) have developed a community-driven, best learning resource sharing website. 



Originally developed as his Ahmed's dissertation under James supervision, it is now live at  www.learningsmart.co.uk

The following are some of the main features: 
  1. Top-five resource list for each subject area is updated at real-time (nearly) automatically based on real users’ reviews (one user can only review a resource once, this stops fake reviews)
  2. Learning resources are classified based on levels of difficulty (e.g., beginner, intermediate, advanced) so that learners won’t waste time searching for the right resources or reading inappropriate resources.
  3. Any contribution (upload and review of resources, interaction with other learners) will be rewarded some points, top contributors are displayed on the home page. As a result, more good resources are expected.
  4. Users can create learning groups and other learners at similar levels can join the groups.
  5. Messaging service allows learners to discuss issues on a one-to-one basis.
  6. Seamless Facebook integration to reach wider audience. e.g.,Facebook login, cross comments on both sites.
  7. Personalised reading lists allow learners to create their own learning portfolio.
James Xue "... this site will benefit our students and other learners in general in many aspects. e.g., it’s a good addition to our “Module Reading List” as they are created and reviewed by the community (instead of the lecturers). It encourages collaborative learning..."

Go have a go yourself go to http://www.learningsmart.co.uk/ 


If you'd like to find out more about Computing at the University of Northampton go to: www.computing.northampton.ac.uk. All views and opinions are the author's and do not necessarily reflected those of any organisation they are associated with

Monday 24 November 2014

Design and Implementation a Real Time Healthcare System Based on WSN

A recently published paper by Dr Ali Al-Sherbaz 

Design and Implementation a Real Time Healthcare System Based on WSN 
Murtadha G. Kadhim, Samir J. Mohammed, and Ali Al-Sherbaz

Journal Of Telecommunications

Volume 27, Issue 1, September 2014


Abstract— The development of monitoring systems of healthcare on the basis of WSN has seen a significant increase on a large scale in previous years. These systems are more prevalent because of the importance of human life and the provision of appropriate technologies to be applied. Therefore it must be appropriate to the requirements of healthcare. In this paper, a real- time healthcare monitoring system based on WSN is designed. The system senses and displays ECG, SPO2, Heart Rate (HR), Breathing, respiratory rate, Blood pressure and temperature of a patient. A new algorithm is developed in this paper to measure a respiratory rate from breathing (Airflow sensor). The system features a friendly GUI in base station which is easy to use, and very simple to administer by a specialist doctor. The network technology, which is used in the system is a star topology with wireless ZigBee protocol. In base station, LabVIEW software and Visual studio 2012 are used to do tasks such as a processing, monitoring, graphical user interface, reporting, and alarming. The aim of this paper is to design a real time healthcare monitoring and alarming system using WSN for sensing breathing, ECG, temperature, SPO2, and blood pressure through Zigbee protocol







If you'd like to find out more about Computing at the University of Northampton go to: www.computing.northampton.ac.uk. All views and opinions are the author's and do not necessarily reflected those of any organisation they are associated with

Double tag car parking secure system based on RFID

A recently published paper by Dr Ali Al-Sherbaz 

Double tag car parking secure system based on RFID
Ahmed Al-Baghdadi, Mahmoud Al-Shammari and Ali Al-Sherba

Journal Of Telecommunications

Volume 27, Issue 1, September 2014


Abstract—Radio frequency identification system technology is employed in this proposed security system in order to create high level of accuracy as possible. Whereas the accuracy is considered as a heart of system because any simple error may lead to breach whole security system. Beside the accuracy we should close all the expected Illegals methods which could be exploited for illegal entry. Our solution represented by eight main stages, the first stage consists of embedding the ID into a tag and assigning the same to a car. The second stage is reading the IDs from the RFID tags in the reading range. The third stage is checking from the matched tags. The fourth stage involve take the decision about open the gate. In the fifth stage the camera capture a photo of the car and save it with the date of entry. The sixth stage involves opening gate and change the traffic light to green color. The seventh stage is checking the under gate arm area by using loop detector sensor. In the final stage change the traffic light to red and close the gate. 

Full Text: http://www.scribd.com/doc/241492521/Double-tag-car-parking-secure-system-based-on-RFID


If you'd like to find out more about Computing at the University of Northampton go to: www.computing.northampton.ac.uk. All views and opinions are the author's and do not necessarily reflected those of any organisation they are associated with

Monday 17 November 2014

IEEE 1609.4 for safety and non-safety messages dissemination in VANET

A recent paper by Dr Ali Al-Sherbaz in partnership with  College of Information Engineering, Al-Nahrain University, Baghdad, Iraq looks at a VANET protocol for safety and non-safety message dissemination.


Evaluation Study of IEEE 1609.4 Performance for safety and non-safety messages dissemination
Mina Alaa1, Mohammed A. Abdala2, Ali Al-Sherbaz3,

1,2Network Engineering Department, College of Information Engineering, Al-Nahrain University, Baghdad, Iraq 3Computing and Immersive Technologies Department, The University of Northampton, School of Science and Technology, Northampton, U.K.
International Journal of Enhanced Research in Science Technology & Engineering, ISSN: 2319-7463Vol. 3 Issue 11, November-2014, pp: (29-36)



Abstract

 The IEEE 1609.4 was developed to support multi-channel operation and channel switching procedure in order to provide both safety and non-safety vehicular applications. However, this protocol has some drawback because it does not make efficient usage of channel bandwidth resources for single radio WAVE devices and suffer from high bounded delay and lost packet especially for large-scale networks in terms of the number of active nodes. This paper evaluates IEEE 1609.4 multi-channel protocol performance for safety and non-safety application and compare it with the IEEE 802.11p single channel protocol. Multi-channel and single- channel protocols are analyzed in different environments to investigate their performance. By relying on a realistic dataset and using OMNeT++ simulation tool as network simulator, SUMO as traffic simulator and coupling them by employing Veins framework. Performance evaluation results show that the delay of single- channel protocol IEEE 802.11p has been degraded 36% compared with multi-channel protocol.





If you'd like to find out more about Computing at the University of Northampton go to: www.computing.northampton.ac.uk. All views and opinions are the author's and do not necessarily reflected those of any organisation they are associated with

Tuesday 4 November 2014

What do Computing students do? STEM

Ben Foward, a second year student within the Department of Computing and Immersive  Technologies, University of Northampton, has been actively involved with STEM outreach activities. These include running activities but also being the student representative on the university-wide STEM Steering Group (http://mypad.northampton.ac.uk/stem/stem-steering-group/) . 

A example of an activity taken from http://mypad.northampton.ac.uk/stem/2014/10/29/be-steam-event-success/ is shown below:

BE STEAM Ideas wall
Students were able to find out how they can get involved in the University’s STEM Champion Programme, and the growing STEM network and the aims of the STEM Steering Group which represents staff and students from across Schools and professional services.
BE STEAM Biosciences How clean is your ....
Activities were led by STEM Champions including Ben Forward and Eunice Quason who demonstrated Greenscreening techniques (part of the Digital Leaders project), Ronan Egan and Julia Taylor who challenged fellow students to see how clean their hands and environment were, Izzie Trott cooked up some exciting experiments in her Kitchen Chemistry and Murhib Uddin got students thinking about introducing children to engineering through his Knex Challenge.
For more information go to: http://mypad.northampton.ac.uk/stem/


If you'd like to find out more about Computing at the University of Northampton go to: www.computing.northampton.ac.uk. All views and opinions are the author's and do not necessarily reflected those of any organisation they are associated with

Monday 3 November 2014

Problems first, second and third DOI: 10.4018/ijqaete.2014070104

A paper has recently been published in International Journal of Quality Assurance in Engineering and Technology Education on problem-solving and programming by two members of the Department of Computing and Immersive Technologies, University of Northampton.



Problems First, Second and Third. 
Gary Hill and Scott Turner
DOI:  10.4018/ijqaete.2014070104

Abstract
This paper considers the need to focus initial programming education on problem-solving, prior to the teaching of programming syntax and software design methodology. The main vehicle for this approach is simple Lego based robots programmed in Java, followed by the programming of a graphical representation/simulation to develop programming skills. Problem solving is not trivial (Beaumont & Fox, 2003) and is an important skill, central to computing and engineering. The paper extends the authors earlier research on problems first and problem solving (Hill & Turner, 2011) to further emphasise the importance of problem-solving, problem based learning and the benefits of both physical and visual solutions. An approach will be considered, illustrated with a series of problem-solving tasks that increase in complexity at each stage and give the students practice in attempting problem-solving approaches, as well as assisting them to learn from their mistakes. Some of the problems include ambiguities or are purposely ill-defined, to enable the student to resolve these as part of the process. The benefits to students will be discussed including students' statements that this approach, using robots, provides a method to visually and physically see the outcome of a problem. In addition, students report that the method improves their satisfaction with the course. The importance of linking the problem-solving robot activity and the programming assignment, whilst maintaining the visual nature of the problem, will be discussed, together with the comparison of this work with similar work reported by other authors relating to teaching programming using robots (Williams, 2003). In addition, limitations will be discussed relating to the access to the physical robots and the alternative attempts to simulate the robots using three options of, Microsoft Robotics Studio (MSRS), Lego Mindstorms and Greenfoot simulators.





To read a preview of the paper go to: http://www.igi-global.com/viewtitlesample.aspx?id=117560&ptid=91662&t=Problems%20First,%20Second%20and%20Third



If you'd like to find out more about Computing at the University of Northampton go to: www.computing.northampton.ac.uk. All views and opinions are the author's and do not necessarily reflected those of any organisation they are associated with

Friday 31 October 2014

BCS Event Report: Raspberry Pi

Two parallel Raspberry Pi activities were run by the BCS Northampton branch at the Newton Building, University of Northampton, UK 











The first activity was aimed at generating interest in the use of of VOIP on the Raspberry PI  and covered a number of topics:-

  • Outline of VOIP as a voice technology
  • Advantages of VOIP telephony for business and the consumer.
  • FreePBX on the Raspberry PI - build, configuration and usage.
  • Discussion of VOIP trunk technology, VOIP services.
  • Demo of a PI FreePBX system with two VOIP phones.



The second activity was aimed a beginners to the Raspberry Pi and was run by staff and a student from the Department of Computing and Immersive Technologies, University of Northampton. 


The central aim was, what can you do with that Raspberry Pi this half term? You brought a Raspberry Pi but never got around to using it, what could you try?  

During this session some basic example activities were shown. 
  • Basic Scratch programming activity:- Bonfire Night Game. Create graphical stars and make them act like fireworks - shot across the screen, multiply, expand changing colours and then shrink
  • Scratch control of LEDs via a Raspberry Pi making two LEDs flash all under the control of a Scratch based program.
  • Junkbot  program a robot made from a Raspberry Pi, a drinks can, pens, and a motor and get it to draw (see the video below and http://junkbots.blogspot.co.uk/ for more details)

The event attracted both members of the BCS and non-members (youngest two being 7 years old).








If you'd like to find out more about Computing at the University of Northampton go to: www.computing.northampton.ac.uk. All views and opinions are the author's and do not necessarily reflected those of any organisation they are associated with.