Morpho-evolution with learning using a controller archive as an inheritance mechanism
Journal Article
Le Goff, L. K., Buchanan, E., Hart, E., Eiben, A. E., Li, W., De Carlo, M., …Tyrrell, A. M. (in press)
Morpho-evolution with learning using a controller archive as an inheritance mechanism. IEEE Transactions on Cognitive and Developmental Systems, https://doi.org/10.1109/tcds.2022.3148543
Most work in evolutionary robotics centres on evolving a controller for a fixed body-plan. However, previous studiessuggest that simultaneously evolving both controller ...
Three-Dimensional Local Energy-Based Shape Histogram (3D-LESH): A Novel Feature Extraction Technique
Journal Article
Wajid, S. K., Hussain, A., & Huang, K. (2018)
Three-Dimensional Local Energy-Based Shape Histogram (3D-LESH): A Novel Feature Extraction Technique. Expert Systems with Applications, 112, 388-400. https://doi.org/10.1016/j.eswa.2017.11.057
In this paper, we present a novel feature extraction technique, termed Three-Dimensional Local Energy-Based Shape Histogram (3D-LESH), and exploit it to detect breast cancer i...
Novel Fuzzy and Game Theory Based Clustering and Decision Making for VANETs
Journal Article
Alsarhan, A., Kilani, Y., Al-Dubai, A., Zomaya, A. Y., & Hussain, A. (2020)
Novel Fuzzy and Game Theory Based Clustering and Decision Making for VANETs. IEEE Transactions on Vehicular Technology, 69(2), 1568-1581. https://doi.org/10.1109/TVT.2019.2956228
Different studies have recently emphasized the importance of deploying clustering schemes in Vehicular ad hoc Network (VANET) to overcome challenging problems related to scala...
PLC Memory Attack Detection and Response in a Clean Water Supply System
Journal Article
Robles-Durazno, A., Moradpoor, N., McWhinnie, J., Russell, G., & Maneru-Marin, I. (2019)
PLC Memory Attack Detection and Response in a Clean Water Supply System. International Journal of Critical Infrastructure Protection, 26, https://doi.org/10.1016/j.ijcip.2019.05.003
Industrial Control Systems (ICS) are frequently used in manufacturing and critical infrastructures like water treatment, chemical plants, and transportation schemes. Citizens ...
Visual Speech Recognition with Lightweight Psychologically Motivated Gabor Features
Journal Article
Zhang, X., Xu, Y., Abel, A. K., Smith, L. S., Watt, R., Hussain, A., & Gao, C. (2020)
Visual Speech Recognition with Lightweight Psychologically Motivated Gabor Features. Entropy, 22(12), https://doi.org/10.3390/e22121367
Extraction of relevant lip features is of continuing interest in the visual speech domain. Using end-to-end feature extraction can produce good results, but at the cost of the...
Scalability analysis comparisons of cloud-based software services
Journal Article
Ahmad, A. A., & Andras, P. (2019)
Scalability analysis comparisons of cloud-based software services. Journal of cloud computing: advances, systems and applications, 8, Article 10. https://doi.org/10.1186/s13677-019-0134-y
Performance and scalability testing and measurements of cloud-based software services are necessary for future optimizations and growth of cloud computing. Scalability, elasti...
An Artificial Neural Network-Based Model for Effective Software Development Effort Estimation
Journal Article
Rashid, J., Kanwal, S., Wasif Nisar, M., Kim, J., & Hussain, A. (2023)
An Artificial Neural Network-Based Model for Effective Software Development Effort Estimation. Computer Systems Science and Engineering, 44(2), 1309-1324. https://doi.org/10.32604/csse.2023.026018
In project management, effective cost estimation is one of the most crucial activities to efficiently manage resources by predicting the required cost to fulfill a given task....
Use Of Smartphones for Ensuring Vulnerable Road User Safety through Path Prediction and Early Warning: An In-Depth Review of Capabilities, Limitations and Their Applications in Cooperative Intelligent Transport Systems
Journal Article
Vourgidis, I., Maglaras, L., Alfakeeh, A. S., Al-Bayatti, A. H., & Ferrag, M. A. (2020)
Use Of Smartphones for Ensuring Vulnerable Road User Safety through Path Prediction and Early Warning: An In-Depth Review of Capabilities, Limitations and Their Applications in Cooperative Intelligent Transport Systems. Sensors, 20(4), Article 997. https://doi.org/10.3390/s20040997
The field of cooperative intelligent transport systems and more specifically pedestrians to vehicles could be characterized as quite challenging, since there is a broad resear...
Factors, frameworks and theory: a review of the information systems literature on success factors in project management
Journal Article
Irvine, R., & Hall, H. (2015)
Factors, frameworks and theory: a review of the information systems literature on success factors in project management. Information Research, 20(3),
INTRODUCTION We provide a critical evaluation of the literature on success factors in information systems projects, with a particular focus on organisational information syste...
Formal security policy implementations in network firewalls.
Journal Article
Macfarlane, R., Buchanan, W. J., Ekonomou, E., Uthmani, O., Fan, L., & Lo, O. (2012)
Formal security policy implementations in network firewalls. Computers and Security, 31(2), 253-270. https://doi.org/10.1016/j.cose.2011.10.003
Network security should be based around security policies. From high-level natural language, non-technical, policies created by management, down to device and vendor specific ...