Skip to main content

Research Repository

Advanced Search

All Outputs (520)

SelfBACK: Activity recognition for self-management of low back pain. (2016)
Conference Proceeding
SANI, S., WIRATUNGA, N., MASSIE, S. and COOPER, K. 2016. SelfBACK: Activity recognition for self-management of low back pain. In Bramer, M. and Petridis, M. (eds.) 2016. Research and development in intelligent systems XXXIII: incorporating applications and innovations in intelligent systems XXIV: proceedings of the 36th SGAI nternational conference on innovative techniques and applications of artificial intelligence (SGAI 2016), 13-15 December 2016, Cambridge, UK. Cham: Springer [online], pages 281-294. Available from: https://doi.org/10.1007/978-3-319-47175-4_21

Low back pain (LBP) is the most significant contributor to years lived with disability in Europe and results in significant financial cost to European economies. Guidelines for the management of LBP have self-management at their cornerstone, where pa... Read More about SelfBACK: Activity recognition for self-management of low back pain..

Generalised median of a set of correspondences based on the hamming distance. (2016)
Conference Proceeding
MORENO-GARCÍA, C.F., SERRATOSA, F. and CORTÉS, X. 2016. Generalised median of a set of correspondences based on the hamming distance. In: Robles-Kelly A., Loog M., Biggio B., Escolano F., Wilson R. (eds.) Structural, syntatic and statistical pattern recognition: proceedings of the 2016 Joint International Association of Pattern Recognition (IAPR) structural, syntatic and statistical pattern recognition international workshop (S+SSPR 2016), 29 November - 2 December 2016, Mérida, Mexico. Lecture Notes in Computer Science, vol 10029. Cham: Springer, pages 507-518. Available from: https://doi.org/10.1007/978-3-319-49055-7_45

A correspondence is a set of mappings that establishes a relation between the elements of two data structures (i.e. sets of points, strings, trees or graphs). If we consider several correspondences between the same two structures, one option to defin... Read More about Generalised median of a set of correspondences based on the hamming distance..

A graph repository for learning error-tolerant graph matching. (2016)
Conference Proceeding
MORENO-GARCÍA, C.F., CORTÉS, X. and SERRATOSA, F. 2016. A graph repository for learning error-tolerant graph matching. In Robles-Kelly, A., Loog, M., Biggio, B., Escolano, F. and Wilson, R. (eds.) Structural, syntactic and statistical pattern recognition: proceedings of 2016 Joint International Association of Pattern Recognition (IAPR) Structural and syntactic pattern recognition internaional workshops (SSPR 2016), and Statistical techniques in pattern recognition (SPR 2016) (S+SSPR 2016), 20 November - 2 December 2016, Mérida, Mexico. Lecture notes in computer science, 10029. Cham: Springer [online], pages 519-529. Available from: https://doi.org/10.1007/978-3-319-49055-7_46

In the last years, efforts in the pattern recognition field have been especially focused on developing systems that use graph based representations. To that aim, some graph repositories have been presented to test graph-matching algorithms or to lear... Read More about A graph repository for learning error-tolerant graph matching..

Students envisioning the future. (2016)
Conference Proceeding
LIND, T., CAJANDER, Å., SANDBLAD, B., DANIELS, M., LÁRUSDÓTTIR, M., MCDERMOTT, R. and CLEAR, T. 2016. Students envisioning the future. In Proceedings of the Institute of Electrical and Electonic Engineers (IEEE) frontiers in education 2016 conference (FIE 2016): the crossroads of engineering and business, 12-15 October 2016, Erie, USA. Piscataway: IEEE [online], article ID 7757701. Available from: https://doi.org/10.1109/FIE.2016.7757701.

How can students be included as critical stakeholders in the systems and services provided by a university? To address the whole student experience, we engaged students and employees at a large Swedish university in a vision seminar process to elicit... Read More about Students envisioning the future..

Aligning quality assurance at the course unit and educational program levels. (2016)
Conference Proceeding
JONSSON, B.T., LAUSDOTTIR, M.K., DANIELS, M., CLEAR, A. and MCDERMOTT, R. 2016. Aligning quality assurance at the course unit and educational program levels. In Proceedings of the Institute of Electrical and Electonic Engineers (IEEE) frontiers in education 2016 conference (FIE 2016): the crossroads of engineering and business, 12-15 October 2016, Erie, USA. Piscataway: IEEE [online], article ID 7757419. Available from: https://doi.org/10.1109/FIE.2016.7757419.

Quality assurance is a subject that has grown dramatically in importance in recent times. In previous work, we have described how the ACM Curricula can be used to support the Quality Assurance process of educational programs, using the Computer Scien... Read More about Aligning quality assurance at the course unit and educational program levels..

A framework for writing learning agreements. (2016)
Conference Proceeding
CLEAR, T., MCDERMOTT, R., PARSJÖ, E., CAJANDER, Å., DANIELS, M. and LAGERQVIST, N. 2016. A framework for writing learning agreements. In Proceedings of the Institute of Electrical and Electonic Engineers (IEEE) frontiers in education 2016 conference (FIE 2016): the crossroads of engineering and business, 12-15 October 2016, Erie, USA. Piscataway: IEEE [online], article ID 7757718. Available from: https://doi.org/10.1109/FIE.2016.7757718.

Active learning is a popular concept for motivating learning. Learning agreements are one strategy towards this goal. They can be used to aid the students to take ownership of their learning and in becoming more active in a course. Learning Agreement... Read More about A framework for writing learning agreements..

Selective dropout for deep neural networks. (2016)
Conference Proceeding
BARROW, E., EASTWOOD, M. and JAYNE, C. 2016. Selective dropout for deep neural networks. In Hirose, A., Ozawa, S., Doya, K., Ikeda, K., Lee, M. and Liu, D. (eds.) Neural information processing: Proceedings of the 23rd International conference on neural information processing (ICONIP 2016), 16-21 October 2016, Kyoto, Japan. Lecture notes in computer science, 9949. Cham: Springer [online], pages 519-528. Available from: https://doi.org/10.1007/978-3-319-46675-0_57

Dropout has been proven to be an effective method for reducing overfitting in deep artificial neural networks. We present 3 new alternative methods for performing dropout on a deep neural network which improves the effectiveness of the dropout method... Read More about Selective dropout for deep neural networks..

The application of 3D visualisation and HD surveying to help stimulate economic growth in historic urban areas. (2016)
Conference Proceeding
LAING, R., TAIT, E., ISAACS, J., LEON, M. and REID, P. 2016. The application of 3D visualisation and HD surveying to help stimulate economic growth in historic urban areas. In Proceedings of the 2016 RICS construction, building and real estate research conference (COBRA 2016), 20-22 September 2016, Toronto, Canada. London: RICS.

This paper concerns the application of cutting edge digital recording techniques within the context of heritage-led urban regeneration. The work is innovative in that it supports the belief of decision makers and local stakeholders that there is pote... Read More about The application of 3D visualisation and HD surveying to help stimulate economic growth in historic urban areas..

Semi-automatic pose estimation of a fleet of robots with embedded stereoscopic cameras. (2016)
Conference Proceeding
CORTÉS, X., SERRATOSA, F. and MORENO-GARCIA, C.-F. 2016. Semi-automatic pose estimation of a fleet of robots with embedded stereoscopic cameras. In Proceedings of 21st Institute of Electrical Electronic Engineers (IEEE) Emerging technologies and factory automation international conference 2016 (ETFA 2016), 6-9 September 2016, Berlin, Germany. Piscataway: IEEE [online], article ID 7733640. Available from: https://doi.org/10.1109/ETFA.2016.7733640

Given a fleet of robots, automatic estimation of the relative poses between them could be inaccurate in specific environments. We propose a framework composed by the fleet of robots with embedded stereoscopic cameras providing 2D and 3D images of the... Read More about Semi-automatic pose estimation of a fleet of robots with embedded stereoscopic cameras..

RK-EDA: a novel random key based estimation of distribution algorithm. (2016)
Conference Proceeding
AYODELE, M., MCCALL, J. and REGNIER-COUDERT, O. 2016. RK-EDA: a novel random key based estimation of distribution algorithm. In Handl, J., Hart, E., Lewis, P.R., López-Ibáñez, M., Ochoa, G. and Paechter, B. (eds.) Parallel problem solving from natuture: proceedings of the 14th International parallel problem solving from nature conference (PPSN XIV), 17-21 September 2016, Edinburgh, UK. Lecture notes in computer science, 9921. Cham: Springer [online], pages 849-858. Available from: https://doi.org/10.1007/978-3-319-45823-6_79

The challenges of solving problems naturally represented as permutations by Estimation of Distribution Algorithms (EDAs) have been a recent focus of interest in the evolutionary computation community. One of the most common alternative representation... Read More about RK-EDA: a novel random key based estimation of distribution algorithm..

Designing a context-aware cyber physical system for smart conditional monitoring of platform equipment. (2016)
Conference Proceeding
MAJDANI, F., PETROVSKI, A. and DOOLAN, D. 2016. Designing a context-aware cyber physical system for smart conditional monitoring of platform equipment. In Jayne, C. and Iliadis, L. (eds.) Engineering applications of neural networks: proceedings of the 17th International engineering applications of neural networks conference (EANN 2016), 2-5 September 2016, Aberdeen, UK. Communications in computer and information science, 629. Cham: Springer [online], pages 198-210. Available from: https://doi.org/10.1007/978-3-319-44188-7_15

An adaptive multi-tiered framework, which can be utilised for designing a context-aware cyber physical system is proposed and applied within the context of assuring offshore asset integrity. Adaptability is achieved through the combined use of machin... Read More about Designing a context-aware cyber physical system for smart conditional monitoring of platform equipment..

Intelligent measurement in unmanned aerial cyber physical systems for traffic surveillance. (2016)
Conference Proceeding
PETROVSKI, A., RATTADILOK, P. and PETROVSKII, S. 2016. Intelligent measurement in unmanned aerial cyber physical systems for traffic surveillance. In Jayne, C. and Iliadis, L. (eds.) Engineering applications of neural networks: proceedings of the 17th International engineering applications of neural networks conference (EANN 2016), 2-5 September 2016, Aberdeen, UK. Communications in computer and information science, 629. Cham: Springer [online], pages 161-175. Available from: https://doi.org/10.1007/978-3-319-44188-7_12 161-175. Available from: https://doi.org/10.1007/978-3-319-44188-7_12

An adaptive framework for building intelligent measurement systems has been proposed in the paper and tested on simulated traffic surveillance data. The use of the framework enables making intelligent decisions related to the presence of anomalies in... Read More about Intelligent measurement in unmanned aerial cyber physical systems for traffic surveillance..

Deep active learning for autonomous navigation. (2016)
Conference Proceeding
HUSSEIN, A., GABER, M.M. and ELYAN, E. 2016. Deep active learning for autonomous navigation. In Jayne, C. and Iliadis, L. (eds.) Engineering applications of neural networks: proceedings of the 17th International engineering applications of neural networks conference (EANN 2016), 2-5 September 2016, Aberdeen, UK. Communications in computer and information science, 629. Cham: Springer [online], pages 3-17. Available from: https://doi.org/10.1007/978-3-319-44188-7_1

Imitation learning refers to an agent's ability to mimic a desired behavior by learning from observations. A major challenge facing learning from demonstrations is to represent the demonstrations in a manner that is adequate for learning and efficien... Read More about Deep active learning for autonomous navigation..

An outlier ranking tree selection approach to extreme pruning of random forests. (2016)
Conference Proceeding
FAWAGREH, K., GABER, M.M. and ELYAN, E. 2016. An outlier ranking tree selection approach to extreme pruning of random forests. In Jayne, C. and Iliadis, L. (eds.) Engineering applications of neural networks: proceedings of the 17th International engineering applications of neural networks conference (EANN 2016), 2-5 September 2016, Aberdeen, UK. Communications in computer and information science, 629. Cham: Springer [online], pages 267-282. Available from: https://doi.org/10.1007/978-3-319-44188-7_20

Random Forest (RF) is an ensemble classification technique that was developed by Breiman over a decade ago. Compared with other ensemble techniques, it has proved its accuracy and superiority. Many researchers, however, believe that there is still ro... Read More about An outlier ranking tree selection approach to extreme pruning of random forests..

Persona-driven information security awareness. (2016)
Conference Proceeding
KI-ARIES, D., FAILY, S. and BECKERS, K. 2016. Persona-driven information security awareness. In Proceedings of the 30th International BCS human computer interaction conference (HCI 2016): fusion, 11-15 July 2016, Poole, UK. Swindon: BCS [online], article number 97. Available from: https://doi.org/10.14236/ewic/HCI2016.97

Because human factors are a root cause of security breaches in many organisations, security awareness activities are often used to address problematic behaviours and improve security culture. Previous work has found that personas are useful for ident... Read More about Persona-driven information security awareness..

Ethical hazards and safeguards in penetration testing. (2016)
Conference Proceeding
FAILY, S., IACOB, C. and FIELD, S. 2016. Ethical hazards and safeguards in penetration testing. In Proceedings of the 30th International BCS human computer interaction conference (HCI 2016): fusion, 11-15 July 2016, Poole, UK. Swindon: BCS [online], article number 83. Available from: https://doi.org/10.14236/ewic/HCI2016.83

Penetration testing entails attacking a system to identify and report insecurity, but doing so without harming the system nor encroaching on the dignity of those affected by it. To improve the interaction between penetration testers and their process... Read More about Ethical hazards and safeguards in penetration testing..

Human-centered specification exemplars for critical infrastructure environments. (2016)
Conference Proceeding
FAILY, S., LYKOU, G., PARTRIDGE, A., GRITZALIS, D., MYLONAS, A. and KATOS, V. 2016. Human-centered specification exemplars for critical infrastructure environments. In Proceedings of the 30th International BCS human computer interaction conference (HCI 2016): fusion, 11-15 July 2016, Poole, UK. Swindon: BCS [online], article number 93. Available from: https://doi.org/10.14236/ewic/HCI2016.93

Specification models of critical infrastructure focus on parts of a larger environment. However, to consider the security of critical infrastructure systems, we need approaches for modelling the sum of these parts; these include people and activities... Read More about Human-centered specification exemplars for critical infrastructure environments..

Improving human-reviews interaction: a study of the role, use and place of online reviews. (2016)
Conference Proceeding
IACOB, C. and FAILY, S. 2016. Improving human-reviews interaction: a study of the role, use and place of online reviews. In Proceedings of the 30th International BCS human computer interaction conference (HCI 2016): fusion, 11-15 July 2016, Poole, UK. Swindon: BCS [online], article number 21. Available from: https://doi.org/10.14236/ewic/HCI2016.21

The use and benefits of online reviews are undeniable, yet the interaction means available for buyers when consulting reviews remain limited. This study aims to provide a better understanding of the role and use of online reviews, presenting a set of... Read More about Improving human-reviews interaction: a study of the role, use and place of online reviews..

The application of useless Japanese inventions for requirements elicitation in information security. (2016)
Conference Proceeding
PARTRIDGE, A. and FAILY, S. 2016. The application of useless Japanese inventions for requirements elicitation in information security. In Proceedings of the 30th International BCS human computer interaction conference (HCI 2016): fusion, 11-15 July 2016, Poole, UK. Swindon: BCS [online], article number 102. Available from: https://doi.org/10.14236/ewic/HCI2016.102

Rules of requirements elicitation in security are broken through the use of Chindōgu, by designing impractical security countermeasures in the first instance, then using these to create usable security requirements. We present a process to conceive t... Read More about The application of useless Japanese inventions for requirements elicitation in information security..

Predictive planning with neural networks. (2016)
Conference Proceeding
AINSLIE, R., MCCALL, J., SHAKYA, S. and OWUSU, G. 2016. Predictive planning with neural networks. In Proceedings of the International joint conference on neural networks (IJCNN), 24-29 July 2016, Vancouver, Canada. Piscataway: IEEE [online], pages 2110-2117. Available from: https://doi.org/10.1109/IJCNN.2016.7727460

Critical for successful operations of service industries, such as telecoms, utility companies and logistic companies, is the service chain planning process. This involves optimizing resources against expected demand to maximize the utilization and mi... Read More about Predictive planning with neural networks..