Research explorer tool

Date


School

Download Available

116 results

Evaluation of a genetic representation for outline shapes

Conference Proceeding
Lapok, P., Lawson, A., & Paechter, B. (2017)
Evaluation of a genetic representation for outline shapes. In GECCO '17 Proceedings of the Genetic and Evolutionary Computation Conference Companion, (1419-1422). https://doi.org/10.1145/3067695.3082501
This work in progress focuses on the evaluation of a genetic representation for outline shapes for planar mechanical levers which addresses the first stage of the complex real...

Evaluating the Performance of an Evolutionary Tool for Exploring Solution Fronts

Conference Proceeding
Urquhart, N. (2018)
Evaluating the Performance of an Evolutionary Tool for Exploring Solution Fronts. In Applications of Evolutionary Computation, (523-537). https://doi.org/10.1007/978-3-319-77538-8_36
EvoFilter is an evolutionary algorithm based tool for searching through large non-dominated fronts in order to find a subset of solutions that are of interest to the user. Ev...

Optimisation and Illumination of a Real-world Workforce Scheduling and Routing Application via Map-Elites

Conference Proceeding
Urquhart, N., & Hart, E. (2018)
Optimisation and Illumination of a Real-world Workforce Scheduling and Routing Application via Map-Elites. In Parallel Problem Solving from Nature – PPSN XV 15th International Conference, Coimbra, Portugal, September 8–12, 2018, Proceedings, Part Ihttps://doi.org/10.1007/978-3-319-99253-2_39
Workforce Scheduling and Routing Problems (WSRP) are very common in many practical domains, and usually have a number of objectives. Illumination algorithms such as Map-Elites...

Modelling enduring institutions: The complementarity of evolutionary and agent-based approaches

Journal Article
Powers, S. T., Ekárt, A., & Lewis, P. R. (2018)
Modelling enduring institutions: The complementarity of evolutionary and agent-based approaches. Cognitive Systems Research, 52, 67-81. https://doi.org/10.1016/j.cogsys.2018.04.012
Empirical work has shown that societies can sometimes avoid antisocial outcomes , such as the Tragedy of the Commons, by establishing institutional rules that govern their int...

Use of machine learning techniques to model wind damage to forests

Journal Article
Hart, E., Sim, K., Kamimura, K., Meredieu, C., Guyon, D., & Gardiner, B. (2019)
Use of machine learning techniques to model wind damage to forests. Agricultural and forest meteorology, 265, 16-29. https://doi.org/10.1016/j.agrformet.2018.10.022
This paper tested the ability of machine learning techniques, namely artificial neural networks and random forests, to predict the individual trees within a forest most at r...

SQL-IDS: evaluation of SQLi attack detection and classification based on machine learning techniques

Conference Proceeding
Sheykhkanloo, N. M. (2015)
SQL-IDS: evaluation of SQLi attack detection and classification based on machine learning techniques. In SIN '15 Proceedings of the 8th International Conference on Security of Information and Networkshttps://doi.org/10.1145/2799979.2800011
Structured Query Language injection (SQLi) attack is a code injection technique where malicious SQL statements are inserted into a given SQL database by simply using a web bro...

Employing Neural Networks for the Detection of SQL Injection Attack

Conference Proceeding
Sheykhkanloo, N. M. (2013)
Employing Neural Networks for the Detection of SQL Injection Attack. In SIN '14 Proceedings of the 7th International Conference on Security of Information and Networksdoi:10.1145/2659651.2659675
Structured Query Language Injection (SQLI) attack is a code injection technique in which malicious SQL statements are inserted into the SQL database by simply using web browse...

Towards an Emotionally Intelligent Interaction Strategy for Multimodal Embodied Conversational Agents acting as Companions

Thesis
Roa Seïler, N. Towards an Emotionally Intelligent Interaction Strategy for Multimodal Embodied Conversational Agents acting as Companions. (Thesis)
Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/Output/462318
Existing Human Computer Interaction (HCI) strategies are seriously limited by current technologies. These are neither sensitive nor accurate enough to respond to users’ emotio...

Strengthening the Forward Variable Selection Stopping Criterion

Conference Proceeding
Herrera, L. J., Rubio, G., Pomares, H., Paechter, B., Guillén, A., & Rojas, I. (2009)
Strengthening the Forward Variable Selection Stopping Criterion. In Artificial Neural Networks – ICANN 2009, (215-224). https://doi.org/10.1007/978-3-642-04277-5_22
Given any modeling problem, variable selection is a preprocess step that selects the most relevant variables with respect to the output variable. Forward selection is the most...

A Pattern Recognition Neural Network Model for Detection and Classification of SQL Injection Attacks

Journal Article
Moradpoor Sheykhkanloo, N. (2015)
A Pattern Recognition Neural Network Model for Detection and Classification of SQL Injection Attacks. International Journal of Computer, Electrical, Automation, Control and Information Engineering, 9(6), 1443-1453
Thousands of organisations store important and confidential information related to them, their customers, and their business partners in databases all across the world. The st...