Revisiting the potentialities of a mechanical thesaurus.
Priss, U., & Old, L. J. (2009)
Revisiting the potentialities of a mechanical thesaurus. In R. Ferre (Ed.), Proceedings of the 7th International Conference on Formal Concept Analysis, ICFCA, 284-298. https://doi.org/10.1007/978-3-642-01815-2_21
This paper revisits the lattice-based thesaurus models which Margaret Masterman used for machine translation in the 1950’s and 60’s. Masterman’s notions are mapped onto modern...
Integrated many-to-many multicast addressing and access control method
Romdhani, I., & Yassin Al-Dubai, A. (2009)
Integrated many-to-many multicast addressing and access control method. In 2009 IEEE Symposium on Computers and Communications, 649-654. https://doi.org/10.1109/iscc.2009.5202288
IP multicast is an efficient method for distributing multimedia content to a large number of receivers while saving the network bandwidth and reducing processing overhead on t...
Software agents and computer network security.
Pikoulas, J., Mannion, M., & Buchanan, W. J. (2000)
Software agents and computer network security. In Engineering of Computer Based Systems, 2000. (ECBS 2000) Proceedings. Seventh IEEE International Conference and Workshopon the, 211-217. https://doi.org/10.1109/ECBS.2000.839879
Preventing unauthorised access to corporate information systems is essential for many organisations. To address this problem we built a security enhancement software system us...
Higher-order statistics-based nonlinear speech analysis
Soraghan, J. J., Hussain, A., Alkulabi, A., & Durrani, T. (2002)
Higher-order statistics-based nonlinear speech analysis. Control and Intelligent Systems, 30, 11-18
A fast and robust three-level binary higher order statistics (HOS) based algorithm for simultaneous voiced/unvoiced detection and pitch estimation of speech signals in coloure...
Employing a Machine Learning Approach to Detect Combined Internet of Things Attacks Against Two Objective Functions Using a Novel Dataset
Foley, J., Moradpoor, N., & Ochen, H. (2020)
Employing a Machine Learning Approach to Detect Combined Internet of Things Attacks Against Two Objective Functions Using a Novel Dataset. Security and Communication Networks, 2020, 1-17. https://doi.org/10.1155/2020/2804291
One of the important features of Routing Protocol for Low-Power and Lossy Networks (RPL) is Objective Function (OF). OF influences an IoT network in terms of routing strategie...
Machine Learning for Health and Social Care Demographics in Scotland
Presentation / Conference
Buchanan, W. J., Smales, A., Lawson, A., & Chute, C. (2019, November)
Machine Learning for Health and Social Care Demographics in Scotland. Paper presented at HEALTHINFO 2019, Valencia, Spain
This paper outlines an extensive study of applying machine learning to the analysis of publicly available health and social care data within Scotland, with a focus on learning...
Lattice-based modelling of thesauri.
Priss, U. & Old, L. J. (2007)
Lattice-based modelling of thesauri
This paper revisits ideas about the use of lattices as underlying conceptual structures in information retrieval and machine translation as suggested by researchers in the 195...
Towards efficient collective communications for interconnection networks.
Al-Dubai, A. (2004)
Towards efficient collective communications for interconnection networks. (Thesis). University of Glasgow. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/3679