Skip to main content

Research Repository

Advanced Search

Outputs (106)

Hierarchical Home Agent Architecture for Mobile IP Communications (2006)
Presentation / Conference Contribution
Romdhani, I., Munoz, J., Bettahar, H., & Bouabdallah, A. (2006). Hierarchical Home Agent Architecture for Mobile IP Communications. In 11th IEEE Symposium on Computers and Communications, 2006. ISCC '06. Proceedings (136-141). https://doi.org/10.1109/isc

While the Mobile IP protocol does not exclude the use of multiple Home Agents (HAs), it does not impose any particular model either. Recent solutions propose that a mobile node uses multiple HAs located in different physical links in his home network... Read More about Hierarchical Home Agent Architecture for Mobile IP Communications.

Cortical activity pattern computation (2006)
Journal Article
Andras, P., & Wennekers, T. (2007). Cortical activity pattern computation. BioSystems, 87(2-3), 179-185. https://doi.org/10.1016/j.biosystems.2006.09.012

Neural computations are modelled in various ways, but still there is no clear understanding of how the brain performs its computational tasks. This paper presents new results about analysis of neural processes in terms of activity pattern computation... Read More about Cortical activity pattern computation.

Data mining a new pilot agriculture extension data warehouse (2006)
Journal Article
Abdullah, A., & Hussain, A. (2006). Data mining a new pilot agriculture extension data warehouse. Journal of Research and Practice in Information Technology, 38(3), 229-248

Pakistan is the world’s fifth largest cotton producer. To monitor cotton growth, different government departments and agencies in Pakistan have been recording pest scouting, agriculture and metrological data for decades. Coarse estimates of just the... Read More about Data mining a new pilot agriculture extension data warehouse.

Metaheuristics for university course timetabling. (2006)
Thesis
Lewis, R. M. R. Metaheuristics for university course timetabling. (Thesis). Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/2392

The work presented in this thesis concerns the problem of timetabling at universities – particularly course-timetabling, and examines the various ways in which metaheuristic techniques might be applied to these sorts of problems. Using a popular benc... Read More about Metaheuristics for university course timetabling..

On balancing network traffic in path-based multicast communication (2006)
Journal Article
Al-Dubai, A., Ould-Khaoua, M., & Mackenzie, L. (2006). On balancing network traffic in path-based multicast communication. Future Generation Computer Systems, 22(7), 805-811. https://doi.org/10.1016/j.future.2006.02.009

This paper presents a new multicast path-based algorithm, referred to here as the Qualified Groups (QG for short), which can achieve a high degree of parallelism and low communication latency over a wide range of traffic loads in the mesh. The QG al... Read More about On balancing network traffic in path-based multicast communication.

Combining dimensional analysis and heuristics for causal ordering. (2006)
Book Chapter
Shen, Q., & Peng, T. (2006). Combining dimensional analysis and heuristics for causal ordering. In A. Bundy, & S. Wilson (Eds.), Rob Milne: A Tribute to a Pioneering AI Scientist, Entrepreneur and Mountaineer (39-53). IOS Press

This paper is a refined version of the work that the authors presented at the 13th International Workshop on Qualitative Reasoning, jointly with the late Dr Rob Milne. It is dedicated to Rob in recognition of his significant contribution and support... Read More about Combining dimensional analysis and heuristics for causal ordering..

Investigating false positive reduction in HTTP via procedure analysis. (2006)
Presentation / Conference Contribution
Abimbola, A., Munoz, J., & Buchanan, W. J. (2006). Investigating false positive reduction in HTTP via procedure analysis. . https://doi.org/10.1109/ICNS.2006.65

This paper focuses on high false-positive rate of attacks. First, the merits and demerits of research work in curbing false positive rate of attacks in intrusion detection systems (IDSs) are discussed. Then we present our research efforts in the form... Read More about Investigating false positive reduction in HTTP via procedure analysis..

Inclusion or alienation? computer literacy in a group of older people. (2006)
Presentation / Conference Contribution
Davenport, E., Turner, P., & Van de Walle, G. (2006, July). Inclusion or alienation? computer literacy in a group of older people. Paper presented at IFIP 8.2 Working Conference on Social Exclusion--Societal and Organisational Implications for Information

Real-time construction of aircraft landing schedules using an evolutionary algorithm (2006)
Presentation / Conference Contribution
Urquhart, N. (2006). Real-time construction of aircraft landing schedules using an evolutionary algorithm. In M. Cattolico, M. Keijzer, M. O. Neill, & C. M. Ryan (Eds.), Genetic and Evolutionary Computation Conference (GECCO). https://doi.org/10.1145/1143

This poster investigates the use of Evolutionary Algorithms (EAs) to optimise solutions to the Dynamic Aircraft Landing Problem (DALP). The approach adopted here uses an EA to evolve improvements to the solution so as to move towards an optimum solut... Read More about Real-time construction of aircraft landing schedules using an evolutionary algorithm.