Skip to main content

Research Repository

Advanced Search

Concept neighbourhoods in knowledge organisation systems. (2010)
Presentation / Conference Contribution
Priss, U., & Old, L. J. (2010, February). Concept neighbourhoods in knowledge organisation systems. Presented at Eleventh international ISKO conference, Rome, Italy

This paper discusses the application of concept neighbourhoods (in the sense of Formal Concept Analysis) to Knowledge Organisation Systems.
Examples are provided using Roget’s Thesaurus, WordNet and Wikipedia categories

A Two-Tier System for Web Attack Detection Using Linear Discriminant Method (2010)
Presentation / Conference Contribution
Tan, Z., Jamdagni, A., He, X., Nanda, P., Liu, R. P., Jia, W., & Yeh, W.-C. (2010, December). A Two-Tier System for Web Attack Detection Using Linear Discriminant Method. Presented at 12th International Conference, ICICS 2010, Barcelona, Spain

The reliability and availability of network services are being threatened by the growing number of Denial-of-Service (DoS) attacks. Effective mechanisms for DoS attack detection are demanded. Therefore, we propose a multivariate correlation analysis... Read More about A Two-Tier System for Web Attack Detection Using Linear Discriminant Method.

Case study methodology (2010)
Presentation / Conference Contribution
Demeke, W. (2010, December). Case study methodology. Paper presented at West London University, School of Hospitality and Tourism

No abstract available.

Concept Neighbourhoods in Lexical Databases (2010)
Presentation / Conference Contribution
Priss, U., & Old, L. J. (2010, March). Concept Neighbourhoods in Lexical Databases. Presented at International Conference on Formal Concept Analysis ICFCA 2010: Formal Concept Analysis, Agadir, Morocco

This paper discusses results from an experimental study of concept
neighbourhoods in WordNet and Roget’s Thesaurus. The general aim of this research is to determine ways in which neighbourhood lattices can be derived in real time from a lexical data... Read More about Concept Neighbourhoods in Lexical Databases.

Using an evolutionary algorithm to discover low CO2 tours within a Travelling Salesman Problem (2010)
Presentation / Conference Contribution
Urquhart, N. B., Scott, C., & Hart, E. (2010, April). Using an evolutionary algorithm to discover low CO2 tours within a Travelling Salesman Problem. Presented at Applications of evolutionary computation : EvoApplications 2010, Istanbul, Turkey

This paper examines the issues surrounding the effects of using vehicle emissions as the fitness criteria when solving routing problems using evolutionary techniques. The case-study examined is that of the Travelling Salesman Problem (TSP) based upon... Read More about Using an evolutionary algorithm to discover low CO2 tours within a Travelling Salesman Problem.

Towards self-aware PerAda systems. (2010)
Presentation / Conference Contribution
Hart, E., & Paechter, B. (2010, July). Towards self-aware PerAda systems

Pervasive Adaptation (PerAda) refers to massive-scale pervasive information and communication systems which are capable of autonomously adapting to highly dynamic and open technological and user contexts. PerAda systems are thus a special case of col... Read More about Towards self-aware PerAda systems..

Symbiotic cognitive networks: a proposal. (2010)
Presentation / Conference Contribution
Rasheed, T., Hart, E., Falconer, R., & Bown, J. (2010, July). Symbiotic cognitive networks: a proposal. Presented at 9th International Conference Artificial Immune Systems ICARIS 2010

We describe the concept of a cognitive network and propose that ecosystems of co-existing networks which are globally energy efficient while providing the expected quality of service can be realised by exploiting two mechanisms which occur in biologi... Read More about Symbiotic cognitive networks: a proposal..

Privacy-preserving data acquisition protocol. (2010)
Presentation / Conference Contribution
Kwecka, Z., Buchanan, W. J., & Spiers, D. A. (2010, July). Privacy-preserving data acquisition protocol

Current investigative data acquisition techniques often breach human and natural rights of the data subject and can jeopardize an investigation. Often the investigators need to reveal to the data controller precise details of their suspect’s identity... Read More about Privacy-preserving data acquisition protocol..

Informing the design of the future urban landscape. (2010)
Presentation / Conference Contribution
Smyth, M., & Helgason, I. (2010, August). Informing the design of the future urban landscape. Presented at DIS '10, Aarhus, Denmark

The urban spaces of the future will be saturated with both visible and hidden media that gather and transmit information. How we as physical beings connect with, interpret and shape this increase of data residing in our environment will be a signific... Read More about Informing the design of the future urban landscape..

Soundscape mapping: comparing listening experiences (2010)
Thesis
McGregor, I. Soundscape mapping: comparing listening experiences. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/id/eprint/4284

The perceived auditory environment is an increasingly important part of people’s everyday interactive experiences. While sound design is an established discipline in media such as video games and cinema, this is not the case in Human-Computer Interac... Read More about Soundscape mapping: comparing listening experiences.

Recognize contextual situation in pervasive environments using process mining techniques (2010)
Journal Article
Jaroucheh, Z., Liu, X., & Smith, S. (2011). Recognize contextual situation in pervasive environments using process mining techniques. Journal of Ambient Intelligence and Humanized Computing, 2(1), 53-69. https://doi.org/10.1007/s12652-010-0038-7

Research in pervasive computing and ambience intelligence aims to enable users to interact with the environment in a context-aware way. To achieve this, a complex set of features describing different aspects of the environment has to be captured and... Read More about Recognize contextual situation in pervasive environments using process mining techniques.

Novel security assessment for personal health data. (2010)
Presentation / Conference Contribution
Hazelhoff Roelfzema, N. (2010, November). Novel security assessment for personal health data. Paper presented at Perada workshop on Privacy, Security & Trust

An e-Health cloud. (2010)
Presentation / Conference Contribution
Buchanan, W. J., Thuemmler, C., Fan, L., Lo, O., & Khedim, A. S. (2010, August). An e-Health cloud. Presented at Cloud Computing for the Public Sector

A significant weakness within cloud-based systems is often their security. This presentation shows how a health care cloud has been created which preserves the rights of the patient to control access to their captured data, and then how this is used... Read More about An e-Health cloud..

On artificial immune systems and swarm intelligence (2010)
Journal Article
Timmis, J., Andrews, P., & Hart, E. (2010). On artificial immune systems and swarm intelligence. Swarm Intelligence, 4(4), 247-273. https://doi.org/10.1007/s11721-010-0045-5

This position paper explores the nature and role of two bio-inspired paradigms, namely Artificial Immune Systems (AIS) and Swarm Intelligence (SI). We argue that there are many aspects of AIS that have direct parallels with SI and examine the role of... Read More about On artificial immune systems and swarm intelligence.

Mapping Features to Context Information: Supporting Context Variability for Context-Aware Pervasive Applications (2010)
Presentation / Conference Contribution
Jaroucheh, Z., Liu, X., & Smith, S. (2010, August). Mapping Features to Context Information: Supporting Context Variability for Context-Aware Pervasive Applications. Presented at 2010 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology

Context-aware computing is widely accepted as a promising paradigm to enable seamless computing. Several middlewares and ontology-based models for describing context information have been developed in order to support context-aware applications. Howe... Read More about Mapping Features to Context Information: Supporting Context Variability for Context-Aware Pervasive Applications.