Skip to main content

Research Repository

Advanced Search

Strengthening the Forward Variable Selection Stopping Criterion (2009)
Presentation / Conference Contribution
Herrera, L. J., Rubio, G., Pomares, H., Paechter, B., Guillén, A., & Rojas, I. Strengthening the Forward Variable Selection Stopping Criterion

Given any modeling problem, variable selection is a preprocess step that selects the most relevant variables with respect to the output variable. Forward selection is the most straightforward strategy for variable selection; its application using the... Read More about Strengthening the Forward Variable Selection Stopping Criterion.

Intrusion Detection Using Geometrical Structure (2009)
Presentation / Conference Contribution
Jamdagni, A., Tan, Z., Nanda, P., He, X., & Liu, R. (2009, December). Intrusion Detection Using Geometrical Structure. Presented at 2009 Fourth International Conference on Frontier of Computer Science and Technology, Shanghai, China

We propose a statistical model, namely Geometrical Structure Anomaly Detection (GSAD) to detect intrusion using the packet payload in the network. GSAD takes into account the correlations among the packet payload features arranged in a geometrical st... Read More about Intrusion Detection Using Geometrical Structure.

Fragments of place : revealing sense of place through shared phone images. (2009)
Digital Artefact
Smyth, M., & Helgason, I. (2009). Fragments of place : revealing sense of place through shared phone images

Is an interactive new media art installation that explores how the sharing of images, normally hidden on mobile phones, can reveal more about people's sense of place and this ultimately shared experience. Traditional views on sense of place, as exemp... Read More about Fragments of place : revealing sense of place through shared phone images..

Revisiting the potentialities of a mechanical thesaurus. (2009)
Presentation / Conference Contribution
Priss, U., & Old, L. J. (2009, May). Revisiting the potentialities of a mechanical thesaurus

This paper revisits the lattice-based thesaurus models which Margaret Masterman used for machine translation in the 1950’s and 60’s. Masterman’s notions are mapped onto modern, Formal Concept Analysis (FCA) terminology and three of her thesaurus algo... Read More about Revisiting the potentialities of a mechanical thesaurus..

Relation algebra operations on formal contexts (2009)
Presentation / Conference Contribution
Priss, U. (2009, July). Relation algebra operations on formal contexts. Presented at 17th International Conference on Conceptual Structures, ICCS 2009, Moscow, Russia

This paper discusses the use of relation algebra operations on formal contexts. These operations are a generalisation of some of the context operations that are described in the standard FCA textbook (Ganter & Wille, 1999). This paper extends previou... Read More about Relation algebra operations on formal contexts.

Application of CoSMoS parallel design patterns to a pedestrian simulation. (2009)
Presentation / Conference Contribution
Clayton, S., Urquhart, N. B., & Kerridge, J. (2009, September). Application of CoSMoS parallel design patterns to a pedestrian simulation. Presented at International Conference on Parallel Processing and Applied Mathematics PPAM 2009: Parallel Processing and Applied Mathematics

In this paper, we discuss the implementation of a simple pedestrian simulation that uses a multi agent based design pattern developed by the CoSMoS research group. Given the nature of Multi Agent Systems (MAS), parallel processing techniques are inev... Read More about Application of CoSMoS parallel design patterns to a pedestrian simulation..

An application of CoSMoS design methods to pedestrian simulation. (2009)
Presentation / Conference Contribution
Clayton, S., Urquhart, N., & Kerridge, J. (2009, November). An application of CoSMoS design methods to pedestrian simulation. Presented at 32nd Communicating Process Architectures Conference, CPA 2009, Eindhoven, The Netherlands

In this paper, we discuss the implementation of a simple pedestrian simulation that uses a multi agent based design pattern developed by the CoSMoS research group. Given the nature of Multi Agent Systems (MAS), parallel processing techniques are inev... Read More about An application of CoSMoS design methods to pedestrian simulation..

Exploiting Collaborations in the Immune System: The Future of Artificial Immune Systems (2009)
Book Chapter
Hart, E., McEwan, C., & Davoudani, D. (2009). Exploiting Collaborations in the Immune System: The Future of Artificial Immune Systems. In C. Mumford, & L. Jain (Eds.), Intelligent Systems Reference Library; Computational Intelligence (527-558). Springer-Verlag. https://doi.org/10.1007/978-3-642-01799-5_16

Despite a steady increase in the application of algorithms inspired by the natural immune system to a variety of domains over the previous decade, we argue that the field of Artificial Immune Systems has yet to achieve its full potential. We suggest... Read More about Exploiting Collaborations in the Immune System: The Future of Artificial Immune Systems.

Instruction, Feedback and Biometrics: The User Interface for Fingerprint Authentication Systems (2009)
Presentation / Conference Contribution
Riley, C., Johnson, G., McCracken, H., & Al-Saffar, A. (2009, August). Instruction, Feedback and Biometrics: The User Interface for Fingerprint Authentication Systems. Presented at 12th IFIP TC 13 International Conference, Uppsala, Sweden

Biometric authentication is the process of establishing an individual’s identity through measurable characteristics of their behaviour, anatomy or physiology. Biometric technologies, such as fingerprint systems, are increasingly being used in a diver... Read More about Instruction, Feedback and Biometrics: The User Interface for Fingerprint Authentication Systems.

Security and Routing Scoped IP Multicast Addresses (2009)
Presentation / Conference Contribution
Romdhani, I., Al-Dubai, A., & Kellil, M. (2009, September). Security and Routing Scoped IP Multicast Addresses. Presented at 2009 International Conference on Parallel Processing Workshops

IP multicast is an efficient and scalable network layer delivering method for multimedia content to a large number of receivers across the Internet. It saves the network bandwidth and optimizes the processing overhead of the source. However, current... Read More about Security and Routing Scoped IP Multicast Addresses.

A performance model for integrated wireless mesh networks and WLANs with heterogeneous stations. (2009)
Presentation / Conference Contribution
Wu, Y., Min, G., Li, K., & Al-Dubai, A. (2009, November). A performance model for integrated wireless mesh networks and WLANs with heterogeneous stations. Presented at IEEE Global Telecommunications Conference, IEEE GLOBECOM 2009, Honolulu, Hawaii

The increasing demand for the coverage of high-speed wireless local area networks (WLANs) is driving the installation of a very large number of access points. Wireless mesh networks (WMNs) have emerged as a promising technology in next generation net... Read More about A performance model for integrated wireless mesh networks and WLANs with heterogeneous stations..

Minimization of incompletely specified mixed polarity Reed Muller functions using genetic algorithm. (2009)
Presentation / Conference Contribution
Al-Jassani, B. A., Urquhart, N. B., & Almaini, A. E. A. (2009, November). Minimization of incompletely specified mixed polarity Reed Muller functions using genetic algorithm. Presented at 3rd IEEE international conference on Signal Circuits and Systems

A New and efficient Genetic Algorithm (GA) based approach is presented to minimise the number of terms of Mixed Polarity Reed Muller (MPRM) single and multi output incompletely specified Boolean functions. The algorithm determines the allocation of d... Read More about Minimization of incompletely specified mixed polarity Reed Muller functions using genetic algorithm..

Enhanced event time-lining for digital forensic systems (2009)
Thesis
Symon, C. Enhanced event time-lining for digital forensic systems. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/id/eprint/4028

In a digital forensics investigation, log files can be used as a form of evidence by reconstructing timelines of the computer system events recorded in log files. Log files can come from a variety of sources, each of which may make use of proprietary... Read More about Enhanced event time-lining for digital forensic systems.

The VoIP intrusion detection through a LVQ-based neural network. (2009)
Presentation / Conference Contribution
Zheng, L., & Peng, T. (2009, November). The VoIP intrusion detection through a LVQ-based neural network. Paper presented at The 4th International Conference for Internet Technology and Secured Transactions

Being a fast-growing Internet application, Voice over Internet Protocol shares the network resources with the regular Internet traffic. However it is susceptible to the existing security holes of the Internet. In this paper, a highly effective VoIP i... Read More about The VoIP intrusion detection through a LVQ-based neural network..

Performance modelling and optimazation of integrated wireless LANs and multi-hop Mesh networks (2009)
Journal Article
Min, G., Wu, Y., Li, K., & Al-Dubai, A. (2009). Performance modelling and optimazation of integrated wireless LANs and multi-hop Mesh networks. International Journal of Communication Systems, 23, 1111-1126. https://doi.org/10.1002/dac.1074

The increasing demand for the coverage of high-speed wireless local area networks (WLANs) is driving the installation of a very large number of access points (APs). Wireless mesh networks (WMNs) have emerged as a promising technology in the next gene... Read More about Performance modelling and optimazation of integrated wireless LANs and multi-hop Mesh networks.

Dendritic cell trafficking: from Immunology to Engineering. (2009)
Presentation / Conference Contribution
Hart, E., & Davoudani, D. (2009, August). Dendritic cell trafficking: from Immunology to Engineering. Presented at 8th International Conference, ICARIS 2009, York, UK

The field of Artificial Immune Systems (AIS) has derived inspiration from many different elements of the natural immune system in order to develop engineered systems that operate in environments with constraints similar to those faced by the immune s... Read More about Dendritic cell trafficking: from Immunology to Engineering..

Integrated many-to-many multicast addressing and access control method (2009)
Presentation / Conference Contribution
Romdhani, I., & Yassin Al-Dubai, A. (2009, July). Integrated many-to-many multicast addressing and access control method. Presented at 2009 IEEE Symposium on Computers and Communications, Sousse, Tunisia

IP multicast is an efficient method for distributing multimedia content to a large number of receivers while saving the network bandwidth and reducing processing overhead on the source side. However, current IP multicast deployment figure is still fa... Read More about Integrated many-to-many multicast addressing and access control method.

Culture & biometrics: regional differences in the perception of biometric authentication technologies (2009)
Journal Article
Riley, C. W., Buckner, K., Johnson, G., & Benyon, D. (2009). Culture & biometrics: regional differences in the perception of biometric authentication technologies. AI & society, 24(3), 295-306. https://doi.org/10.1007/s00146-009-0218-1

Previous research has identified user concerns about biometric authentication technology, but most of this research has been conducted in European contexts. There is a lack of research that has investigated attitudes towards biometric technology in o... Read More about Culture & biometrics: regional differences in the perception of biometric authentication technologies.