Date


People

Download Available

157 results

Learning from Few Samples with Memory Network

Journal Article
Zhang, S., Huang, K., Zhang, R., & Hussain, A. (2018)
Learning from Few Samples with Memory Network. Cognitive Computation, 10(1), 15-22. https://doi.org/10.1007/s12559-017-9507-z
Neural networks (NN) have achieved great successes in pattern recognition and machine learning. However, the success of a NN usually relies on the provision of a sufficiently ...

Space, place and memory prosthetics.

Book Chapter
Turner, P. (2008)
Space, place and memory prosthetics. In P. Turner, S. Turner, & E. Davenport (Eds.), Exploration of Space, Technology and Spatiality: Interdisciplinary Perspectives, 183-195. Idea Press. https://doi.org/10.4018/978-1-60566-020-2.ch014
Recent years have witnessed a number of initiatives to develop technology (“memory prosthetics”) to enhance and extend human memory. Typical of these is “Memories for Life,” w...

A Self-Organizing Memory Neural Network for Aerosol Concentration Prediction

Journal Article
Liu, Q., Zou, Y., & Liu, X. (2019)
A Self-Organizing Memory Neural Network for Aerosol Concentration Prediction. Computer Modeling in Engineering and Sciences, 119(3), 617-637. https://doi.org/10.32604/cmes.2019.06272
Haze-fog, which is an atmospheric aerosol caused by natural or man-made factors, seriously affects the physical and mental health of human beings. PM2.5 (a particulate matter ...

Controlling a simulated Khepera with an XCS classifier system with memory.

Conference Proceeding
Webb, A., Hart, E., Ross, P. & Lawson, A. (2003)
Controlling a simulated Khepera with an XCS classifier system with memory. ISBN 9783540200574
Autonomous agents commonly suffer from perceptual aliasing in which differing situations are perceived as identical by the robots sensors, yet require different courses of act...

PLC Memory Attack Detection and Response in a Clean Water Supply System

Journal Article
Robles-Durazno, A., Moradpoor, N., McWhinnie, J., Russell, G., & Maneru-Marin, I. (2019)
PLC Memory Attack Detection and Response in a Clean Water Supply System. International Journal of Critical Infrastructure Protection, 26, https://doi.org/10.1016/j.ijcip.2019.05.003
Industrial Control Systems (ICS) are frequently used in manufacturing and critical infrastructures like water treatment, chemical plants, and transportation schemes. Citizens ...

Deriving ChaCha20 Key Streams From Targeted Memory Analysis

Journal Article
McLaren, P., Buchanan, W. J., Russell, G., & Tan, Z. (2019)
Deriving ChaCha20 Key Streams From Targeted Memory Analysis. Journal of Information Security and Applications, 48, https://doi.org/10.1016/j.jisa.2019.102372
There can be performance and vulnerability concerns with block ciphers, thus stream ciphers can used as an alternative. Although many symmetric key stream ciphers are fairly r...

Implementation and Detection of Novel Attacks to the PLC Memory on a Clean Water Supply System

Conference Proceeding
Robles-Durazno, A., Moradpoor, N., McWhinnie, J., Russell, G., & Maneru-Marin, I. (2019)
Implementation and Detection of Novel Attacks to the PLC Memory on a Clean Water Supply System. In CITT 2018. , (91-103). https://doi.org/10.1007/978-3-030-05532-5_7
Critical infrastructures such as nuclear plants or water supply systems are mainly managed through electronic control systems. Such systems comprise of a number of elements, s...

Complex Biological Memory Conceptualized as an Abstract Communication System – Human Long Term Memories Grow in Complexity during Sleep and Undergo Selection while Awake

Book Chapter
Charlton, B. G., & Andras, P. (2007)
Complex Biological Memory Conceptualized as an Abstract Communication System – Human Long Term Memories Grow in Complexity during Sleep and Undergo Selection while Awake. In L. I. Perlovsky, & R. Kozma (Eds.), Neurodynamics of Cognition and Consciousness (325-339). Berlin: Springer. https://doi.org/10.1007/978-3-540-73267-9_15
Biological memory in humans and other animals with a central nervous system is often extremely complex in its organization and functioning.A description of memory from the per...

Exploiting the analogy between the immune system and sparse distributed memory.

Journal Article
Hart, E., & Ross, P. (2002)
Exploiting the analogy between the immune system and sparse distributed memory. Genetic Programming and Evolvable Machines, 4(4), 333-358. doi:10.1023/a:1026191011609
The relationship between immunological memory and a class of associative memories known as sparse distributed memories (SDM) is well known. This paper proposes a new model for...

Activity Classification Using Raw Range and I & Q Radar Data with Long Short Term Memory Layers

Conference Proceeding
Loukas, C., Fioranelli, F., Le Kernec, J., & Yang, S. (2018)
Activity Classification Using Raw Range and I & Q Radar Data with Long Short Term Memory Layers. In 2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech). https://doi.org/10.1109/dasc/picom/datacom/cyberscitec.2018.00088
This paper presents the first initial results of using radar raw I & Q data and range profiles combined with Long Short Term Memory layers to classify human activities. Althou...
7 results

MemoryCrypt

2019 - 2020
The usage of encryption keys is an important aspect in preserving privacy in communications. Increasingly these communications are protected using SSL/TLS methods. Along with this, there is a general ...
Funder: The Scottish Informatics & Computer Science Alliance | Value: £10,759

dot.rural Portrait KE

2015 - 2016
Portrait is a software tool developed to help care staff get to know personal and social information about clients that live in residential care facilities. The Portrait system consists of a biography...
Funder: University of Aberdeen | Value: £3,287

MEMCRYPT CyberASAP Phase 2

2020 - 2021
Ransomware is a form of malicious software that blocks user access to data by encrypting files. A user is then required to pay the attacker a sum of money to receive the encryption artefacts and start...
Funder: Innovate UK | Value: £52,310

MemCrypt

2020 - 2020
At the core of the work is to addresses risks related to the leakage of encryption keys, and which can lead to data loss issues and trust breaches. Along with detecting keys in memory, the team has de...
Funder: Innovate UK | Value: £31,930

Security and Privacy in Vehicular Ad-hoc Networks

2022 - 2024
The great leap forward in wireless communications technology drives the recent advancements of Vehicular Ad hoc NETworks (VANETs). As a key part of the Intelligent Transportation Systems (ITS) framewo...
Funder: Royal Society | Value: £12,000

Flexiant Ltd, Innovation voucher

2011 - 2012
This research project studies the feasibility of a Cloud-based platform which is used to evaluate the performance of digital forensics tools. Along with measuring key quality metrics, such as true-pos...
Funder: Scottish Funding Council | Value: £5,000

SIGNAL

2001 - 2004
This is an EU-funded research project to develop basic methodologies and principles of systemic intelligence for artefacts such as robots that will be capable of steadily growing their knowledge throu...
Funder: European Commission | Value: £299,196

Date