Date


People

Download Available

Dewey Decimal

1413 results

A new technique for designing 8 × 8 substitution box for image encryption applications

Conference Proceeding
Khan, F. A., Ahmed, J., Khan, J. S., Ahmad, J., Khan, M. A., & Hwang, S. O. (2017)
A new technique for designing 8 × 8 substitution box for image encryption applications. In 2017 9th Computer Science and Electronic Engineering (CEEC)https://doi.org/10.1109/ceec.2017.8101591
To create confusion in ciphertexts, encryption processes depends upon nonlinear mappings. This nonlinear mapping can be achieved by a process known as substitution. In a secur...

A systematic investigation of GA performance on jobshop scheduling problems.

Conference Proceeding
Hart, E., & Ross, P. (2003)
A systematic investigation of GA performance on jobshop scheduling problems. In Real-World Applications of Evolutionary Computing. , (280-289). https://doi.org/10.1007/3-540-45561-2_27
Although there has been a wealth of work reported in the literature on the application of genetic algorithms (GAs) to jobshop scheduling problems, much of it contains some gro...

Measuring perceived clutter in concept diagrams

Conference Proceeding
Hou, T., Chapman, P., & Oliver, I. (2016)
Measuring perceived clutter in concept diagrams. In 2016 IEEE Symposium on Visual Languages and Human-Centric Computinghttps://doi.org/10.1109/vlhcc.2016.7739661
Clutter in a diagram can be broadly defined as how visually complex the diagram is. It may be that different users perceive clutter in different ways, however. Moreover, it ha...

Reducing the Impact of Network Bottlenecks on Remote Contraband Detection

Conference Proceeding
McKeown, S., Russell, G., & Leimich, P. (2018)
Reducing the Impact of Network Bottlenecks on Remote Contraband Detection. In 2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)https://doi.org/10.1109/CyberSecPODS.2018.8560671
Cloud based storage is increasing in popularity, with large volumes of data being stored remotely. Digital forensics investigators examining such systems remotely are limited ...

Evolving robust policies for community energy system management

Conference Proceeding
Cardoso, R., Hart, E., & Pitt, J. (2019)
Evolving robust policies for community energy system management. In GECCO '19: Proceedings of the Genetic and Evolutionary Computation Conference Companion. , (1120-1128). https://doi.org/10.1145/3321707.3321763
Community energy systems (CESs) are shared energy systems in which multiple communities generate and consume energy from renewable resources. At regular time intervals, each p...

Visual attention model with a novel learning strategy and its application to target detection from SAR images

Conference Proceeding
Gao, F., Xue, X., Wang, J., Sun, J., Hussain, A., & Yang, E. (2016)
Visual attention model with a novel learning strategy and its application to target detection from SAR images. In Advances in Brain Inspired Cognitive Systems. , (149-160). https://doi.org/10.1007/978-3-319-49685-6_14
The selective visual attention mechanism in human visual system helps human to act efficiently when dealing with massive visual information. Over the last two decades, biologi...

Short-long term anomaly detection in wireless sensor networks based on machine learning and multi-parameterized edit distance

Journal Article
Cauteruccio, F., Fortino, G., Guerrieri, A., Liotta, A., Mocanu, D. C., Perra, C., …Torres Vega, M. (2019)
Short-long term anomaly detection in wireless sensor networks based on machine learning and multi-parameterized edit distance. Information Fusion, 52, 13-30. https://doi.org/10.1016/j.inffus.2018.11.010
Heterogeneous wireless sensor networks are a source of large amount of different information representing environmental aspects such as light, temperature, and humidity. A ver...

Hierarchical Home Agent Architecture for Mobile IP Communications

Conference Proceeding
Romdhani, I., Munoz, J., Bettahar, H., & Bouabdallah, A. (2006)
Hierarchical Home Agent Architecture for Mobile IP Communications. In 11th IEEE Symposium on Computers and Communications, 2006. ISCC '06. Proceedings, 136-141. doi:10.1109/iscc.2006.84
While the Mobile IP protocol does not exclude the use of multiple Home Agents (HAs), it does not impose any particular model either. Recent solutions propose that a mobile nod...

An immune system approach to scheduling in changing environments.

Conference Proceeding
Hart, E., & Ross, P. (1998)
An immune system approach to scheduling in changing environments. In W. Banzhaf, J. M. Daida, A. E. Eiben, M. H. Garzon, V. Honavar, M. Jakiela, & R. E. Smith (Eds.), GECCO-99 : proceedings of the genetic and evolutionary computation conference. Volume 2, 1559-1566
This paper describes the application of an artificial immune system, (AIS), model to a scheduling application, in which sudden changes in the scheduling environment require th...

Fusing audio, visual and textual clues for sentiment analysis from multimodal content

Journal Article
Poria, S., Cambria, E., Howard, N., Huang, G., & Hussain, A. (2016)
Fusing audio, visual and textual clues for sentiment analysis from multimodal content. Neurocomputing, 174(Part A), 50-59. https://doi.org/10.1016/j.neucom.2015.01.095
A huge number of videos are posted every day on social media platforms such as Facebook and YouTube. This makes the Internet an unlimited source of information. In the coming ...