Research explorer tool

Date


People

Download Available

Dewey Decimal

626 results

Representation in the (Artificial) Immune System

Journal Article
McEwan, C., & Hart, E. (2009)
Representation in the (Artificial) Immune System. Journal of Mathematical Modelling and Algorithms, 8, 125-149. https://doi.org/10.1007/s10852-009-9104-6
Much of contemporary research in Artificial Immune Systems (AIS) has partitioned into either algorithmic machine learning and optimisation, or, modelling biologically plausibl...

Making and Unfinishedness: Designing Toolkits for Negotiation

Journal Article
Smyth, M., & Helgason, I. (2017)
Making and Unfinishedness: Designing Toolkits for Negotiation. Design Journal, 20(sup1), S3966-S3974. https://doi.org/10.1080/14606925.2017.1352899
The diffusion and democratisation of computing technologies and physical prototyping systems has supported the rise of Do-It-Yourself culture. In the context of design innovat...

Towards Modelling and Reasoning about Uncertain Data of Sensor Measurements for Decision Support in Smart Spaces.

Conference Proceeding
Bamgboye, O., Liu, X., & Cruickshank, P. (2018)
Towards Modelling and Reasoning about Uncertain Data of Sensor Measurements for Decision Support in Smart Spaces. In 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC)https://doi.org/10.1109/COMPSAC.2018.10330
Smart Spaces currently benefits from Internet of Things (IoT) infrastructures in order to realise its objectives. In many cases, it demonstrates this through certain automated...

Fast Millimeter Wave Assisted Beam-Steering for Passive Indoor Optical Wireless Networks

Journal Article
Torres Vega, M., Koonen, A. M. J., Liotta, A., & Famaey, J. (2018)
Fast Millimeter Wave Assisted Beam-Steering for Passive Indoor Optical Wireless Networks. IEEE Wireless Communications Letters, 7(2), 278-281. https://doi.org/10.1109/lwc.2017.2771771
In light of the extreme radio congestion, the time has come to consider the upper parts of the electromagnetic spectrum. Optical beam-steered wireless communications offer gre...

Interaction strategies for an affective conversational agent

Journal Article
Smith, C., Crook, N., Dobnik, S., Charlton, D., Boye, J., Pulman, S., …Cavazza, M. (2011)
Interaction strategies for an affective conversational agent. Presence: Teleoperators and Virtual Environments, 20, 395-411. https://doi.org/10.1162/PRES_a_00063
The development of embodied conversational agents (ECA) as companions brings several challenges for both affective and conversational dialogue. These include challenges in gen...

Developing a core ontology for taxonomic data.

Conference Proceeding
Kennedy, J., Gales, R., Hyam, R., Kukla, R., Wieczorek, J., Hagedorn, G., …Vieglais, D. (2006)
Developing a core ontology for taxonomic data. In L. Belbin, A. Rissoné, & A. Weitzman (Eds.), Proceedings of TDWG (2006), St Louis, MI
Over recent years several sub-groups within the Taxonomic Databases Working Group (TDWG) have developed models and exchange standards to facilitate data sharing within the tax...

Privacy-preserving Surveillance Methods using Homomorphic Encryption

Conference Proceeding
Bowditch, W., Abramson, W., Buchanan, W. J., Pitropakis, N., & Hall, A. J. (2020)
Privacy-preserving Surveillance Methods using Homomorphic Encryption. In ICISSP: Proceedings of the 6th International Conference on Information Systems Security and Privacy. , (240-248). https://doi.org/10.5220/0008864902400248
Data analysis and machine learning methods often involve the processing of cleartext data, and where this could breach the rights to privacy. Increasingly, we must use encrypt...

Employing a Machine Learning Approach to Detect Combined Internet of Things Attacks Against Two Objective Functions Using a Novel Dataset

Journal Article
Foley, J., Moradpoor, N., & Ochen, H. (2020)
Employing a Machine Learning Approach to Detect Combined Internet of Things Attacks Against Two Objective Functions Using a Novel Dataset. Security and Communication Networks, 2020, 1-17. https://doi.org/10.1155/2020/2804291
One of the important features of Routing Protocol for Low-Power and Lossy Networks (RPL) is Objective Function (OF). OF influences an IoT network in terms of routing strategie...

Wireless Body Area Network (WBAN): A Survey on Reliability, Fault Tolerance, and Technologies Coexistence

Journal Article
Salayma, M., Al-Dubai, A., Romdhani, I., & Nasser, Y. (2017)
Wireless Body Area Network (WBAN): A Survey on Reliability, Fault Tolerance, and Technologies Coexistence. ACM computing surveys, 50(1), 1-38. https://doi.org/10.1145/3041956
Wireless Body Area Network (WBAN) has been a key element in e-health to monitor bodies. This technology enables new applications under the umbrella of different domains, inclu...

A fuzzy logic controller applied to a diversity-based multi-objective evolutionary algorithm for single-objective optimisation

Journal Article
Segredo, E., Seguro, C., Coromoto, L., & Hart, E. (2014)
A fuzzy logic controller applied to a diversity-based multi-objective evolutionary algorithm for single-objective optimisation. Soft Computing, 19(10), 2927-2945. https://doi.org/10.1007/s00500-014-1454-y
In recent years, Multi-Objective Evolutionary Algorithms (MOEAS) that consider diversity as an objective have been used to tackle single-objective optimisation prob- lems. The...