Skip to main content

Research Repository

Advanced Search

Outputs (273)

Increasing transparency of recommender systems for type 1 diabetes patients (2015)
Conference Proceeding
Vargheese, J. P., Harrison, R., Balbontin, M. M., Aldea, A., & Brown, D. (2015). Increasing transparency of recommender systems for type 1 diabetes patients. In Artificial Intelligence for Diabetes: 1st ECAI Workshop on Artificial intelligence for Diabetes, Proceedings (26-27)

Self-management of type 1 diabetes is a challenging and complex task due the constant need for self monitoring and the diverse range of factors to consider in order to effectively regulate blood glucose levels. Recommender systems have been demonstra... Read More about Increasing transparency of recommender systems for type 1 diabetes patients.

Comparative analysis of DIPPM scheme for Visible Light Communications (2015)
Conference Proceeding
Jan, S. U., Lee, Y., & Koo, I. (2015). Comparative analysis of DIPPM scheme for Visible Light Communications. In 2015 International Conference on Emerging Technologies (ICET). https://doi.org/10.1109/icet.2015.7389192

Visible Light Communications (VLC) uses solid-state light sources for data transmission in addition to its primary function of illumination. The dual functionality of light source provokes some challenges for VLC including dimming control and perceiv... Read More about Comparative analysis of DIPPM scheme for Visible Light Communications.

Replication-based cost scheduling strategy for fault tolerance in distributed knowledge management systems (2015)
Journal Article
Bamgboye, O. O., Folorunso, O., Akinwale, A. T., & Adebayo, G. A. (2015). Replication-based cost scheduling strategy for fault tolerance in distributed knowledge management systems. Journal of Natural Sciences Engineering and Technology, 14(1), https://doi.org/10.51406/jnset.v14i1.1487

Distributed Knowledge Management Systems (DKMS) often depends on the Semantic Web Peer-to-Peer (SW-P2P) model. The reason for this is based on its support for autonomy of knowledge node, ease of accessibility and scalability. The susceptibility to fa... Read More about Replication-based cost scheduling strategy for fault tolerance in distributed knowledge management systems.

Inducing Clause-Combining Rules: A Case Study with the SPaRKy Restaurant Corpus (2015)
Conference Proceeding
White, M., & Howcroft, D. M. (2015). Inducing Clause-Combining Rules: A Case Study with the SPaRKy Restaurant Corpus. In Proceedings of the 15th European Workshop on Natural Language Generation (ENLG) (28-37). https://doi.org/10.18653/v1/w15-4704

We describe an algorithm for inducing clause-combining rules for use in a traditional natural language generation architecture. An experiment pairing lexicalized text plans from the SPaRKy Restaurant Corpus with logical forms obtained by parsing the... Read More about Inducing Clause-Combining Rules: A Case Study with the SPaRKy Restaurant Corpus.

Optimal control in a value-based automatic behavior composition framework (2015)
Conference Proceeding
Barati, M., & St-Denis, R. (2015). Optimal control in a value-based automatic behavior composition framework. In 2015 7th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT). https://doi.org/10.1109/icumt.2015.7382395

The behavior composition problem consists in the automatic synthesis of a controller being able to realize a desired target behavior by coordinating a set of available behaviors. Although many frameworks have been proposed for this problem, one of th... Read More about Optimal control in a value-based automatic behavior composition framework.

Behavior Composition Meets Supervisory Control (2015)
Conference Proceeding
Barati, M., & St-Denis, R. (2015). Behavior Composition Meets Supervisory Control. In 2015 IEEE International Conference on Systems, Man, and Cybernetics (SMC). https://doi.org/10.1109/smc.2015.33

With the evolution of software engineering since the advent of structured programming until now, software engineers are faced with tremendous challenges mostly due to the development of large software programs that behave as open systems. Multi-agent... Read More about Behavior Composition Meets Supervisory Control.

Risk and Regulation of Access to Personal Data on Online Social Networking Services in the UK (2015)
Thesis
Haynes, D. (2015). Risk and Regulation of Access to Personal Data on Online Social Networking Services in the UK. (Thesis). City University London. Retrieved from http://researchrepository.napier.ac.uk/Output/2458208

This research investigates the relative effectiveness of different modes of regulation of access to personal data on social networking services in the UK. A review of the literature demonstrated that there was a gap in research comparing different re... Read More about Risk and Regulation of Access to Personal Data on Online Social Networking Services in the UK.

A new chaos-based secure image encryption scheme using multiple substitution boxes (2015)
Conference Proceeding
Khan, J. S., ur Rehman, A., Ahmad, J., & Habib, Z. (2015). A new chaos-based secure image encryption scheme using multiple substitution boxes. In 2015 Conference on Information Assurance and Cyber Security (CIACS). https://doi.org/10.1109/ciacs.2015.7395561

Due to development in Internet and networking technology, multimedia data is broadly transmitted via wired and wireless medium. Thus security is a major concern in modern communication systems. Encryption is one of the pre-eminent ways to guarantee s... Read More about A new chaos-based secure image encryption scheme using multiple substitution boxes.

Solar powered wheel chair for physically challenged people using surface EMG signal (2015)
Conference Proceeding
Kaiser, S., Chowdhury, Z. I., Mamun, S., Hussain, A., & Mahmud, M. (2015). Solar powered wheel chair for physically challenged people using surface EMG signal. In 2015 IEEE Symposium Series on Computational Intelligence (833-836). https://doi.org/10.1109/SSCI.2015.123

This paper presents the design of low cost solar powered wheel chair for physically challenged people. The signals necessary to maneuver the wheel chair are acquired from different muscles of the hand using surface Electromyography (sEMG) technique.... Read More about Solar powered wheel chair for physically challenged people using surface EMG signal.