Skip to main content

Research Repository

Advanced Search

All Outputs (38)

Classification of binary fracture using CNN. (2019)
Conference Proceeding
CHITTAJALLU, S.M., MANDALANENI, N.L.D., PARASA, D. and BANO, S. 2019. Classification of binary fracture using CNN. In Proceedings of the 1st Global conference for advancement in technology (GCAT 2019), 18-20 October 2019, Bangalore, India. Piscataway: IEEE [online]. Available from: https://doi.org/10.1109/GCAT47503.2019.8978468

One of the major problems faced by any living organism since infancy are musculoskeletal injuries. To keep it quite simple musculoskeletal injuries are a range of disorders involving muscles, bones, tendons, blood vessels, nerves and other soft tissu... Read More about Classification of binary fracture using CNN..

Social media survey using decision tree and naive Bayes classification. (2019)
Conference Proceeding
ROSHINI, T., SIREESHA, P.V., PARASA, D. and BANO, S. 2019. Social media survey using decision tree and naive Bayes classification. In Proceedings of the 2nd International conference on intelligent communication and computational techniques (ICCT 2019), 28-29 September 2019, Jaipur, India. Piscataway: IEEE [online], pages 265-270. Available from: https://doi.org/10.1109/ICCT46177.2019.8969058

Social media - a website or an application that is used to create and share content among a social network - is one of the most important aspects of our day-to-day life. Recent studies claim that an average person spends roughly 142 minutes per day o... Read More about Social media survey using decision tree and naive Bayes classification..

Food survey using exploratory data analysis. (2019)
Conference Proceeding
RAMYASRI, R., ISHASANJIDA, S., PARASA, D. and BANO, S. 2019. Food survey using exploratory data analysis. In Proceedings of the 2nd International conference on intelligent communication and computational techniques (ICCT 2019), 28-29 September 2019, Jaipur, India. Piscataway: IEEE [online], pages 258-264. Available from: https://doi.org/10.1109/ICCT46177.2019.8969016

A person's eating habits are the most important aspect of maintaining one's physical wellbeing, which in turn is key to enduring the stresses and emotional hurdles that are so commonplace in our modern lifestyles. Our research shows that, over the pa... Read More about Food survey using exploratory data analysis..

Food places classification in egocentric images using Siamese neural networks. (2019)
Conference Proceeding
SARKER, M.M.K., BANU, S.F., RASHWAN, H.A., ABDEL-NASSER, M., SINGH, V.K., CHAMBON, S., RADEVA, P. and PUIG, D. 2019. Food places classification in egocentric images using Siamese neural networks. In Sabater-Mir, J., Torra, V., Aguiló, I. and González-Hidalgo, M. (eds.) Artificial intelligence research and development: proceedings of the 22nd International conference of the Catalan Association for Artificial Intelligence (CCIA 2019), 23-25 October 2019, Colònia de Sant Jordi, Spain. Frontiers in artificial intelligence and applications, 319. Amsterdam: IOS Press [online], pages 145-151. Available from: https://doi.org/10.3233/FAIA190117

Wearable cameras have become more popular in recent years for capturing unscripted moments in the first-person, which help in analysis of the user's lifestyle. In this work, we aim to identify the daily food patterns of a person through recognition o... Read More about Food places classification in egocentric images using Siamese neural networks..

Evolving an optimal decision template for combining classifiers. (2019)
Conference Proceeding
NGUYEN, T.T., LUONG, A.V., DANG, M.T., DAO, L.P., NGUYEN, T.T.T., LIEW, A.W.-C. and MCCALL, J. 2019. Evolving an optimal decision template for combining classifiers. In Gedeon, T., Wong, K.W. and Lee, M. (eds.) Neural information processing: proceedings of the 26th International conference on neural information processing (ICONIP 2019), 12-15 December 2019, Sydney, Australia. Part I. Lecture notes in computer science, 11953. Cham: Springer [online], pages 608-620. Available from: https://doi.org/10.1007/978-3-030-36708-4_50

In this paper, we aim to develop an effective combining algorithm for ensemble learning systems. The Decision Template method, one of the most popular combining algorithms for ensemble systems, does not perform well when working on certain datasets l... Read More about Evolving an optimal decision template for combining classifiers..

A comparison of feature extractors for panorama stitching in an autonomous car architecture. (2019)
Conference Proceeding
CORTÉS-GALLARDO, E., MORENO-GARCIA, C.F., ZHU, A., CHÍPULI-SILVA, D., GONZÁLEZ-GONZÁLEZ, J.A., MORALES-ORTIZ, D., FERNÁNDEZ, S., URRIZA, B., VALVERDE-LÓPEZ, J., MARÍN, A., PÉREZ, H., IZQUIERDO-REYES, J. and BUSTAMANTE-BELLO, R. 2019. A comparison of feature extractors for panorama stitching in an autonomous care architecture. In Proceedings of 2019 International conference on mechatronics, electronics and automotive engineering (ICMEAE 2019), 26-29 November 2019, Cuernavaca, Mexico. Piscataway: IEEE [online], page 50-55. Available from: https://doi.org/10.1109/ICMEAE.2019.00017

Panorama stitching consists on frames being put together to create a 360o view. This technique is proposed for its implementation in autonomous vehicles instead of the use of an external 360o camera, mostly due to its reduced cost and improved aerody... Read More about A comparison of feature extractors for panorama stitching in an autonomous car architecture..

Developing a catalogue of explainability methods to support expert and non-expert users. (2019)
Conference Proceeding
MARTIN, K., LIRET, A., WIRATUNGA, N., OWUSU, G. and KERN, M. 2019. Developing a catalogue of explainability methods to support expert and non-expert users. In Bramer, M. and Petridis, M. (eds.) Artificial intelligence XXXVI: proceedings of the 39th British Computer Society's Specialist Group on Artificial Intelligence (SGAI) international Artificial intelligence conference 2019 (AI 2019), 17-19 December 2019, Cambridge, UK. Lecture notes in computer science, 11927. Cham: Springer [online], pages 309-324. Available from: https://doi.org/10.1007/978-3-030-34885-4_24

Organisations face growing legal requirements and ethical responsibilities to ensure that decisions made by their intelligent systems are explainable. However, provisioning of an explanation is often application dependent, causing an extended design... Read More about Developing a catalogue of explainability methods to support expert and non-expert users..

Towards a conversational agent for threat detection in the internet of things. (2019)
Conference Proceeding
MCDERMOTT, C.D., JEANNELLE, B. and ISAACS, J.P. 2019. Towards a conversational agent for threat detection in the internet of things. In Proceedings of the 2019 International Cyber science on cyber situational awareness, data analytics and assessment (Cyber SA): pioneering research and innovation in cyber situational awareness, 3-4 June 2019, Oxford, UK. Piscataway: IEEE [online], chapter 6. Available from: https://doi.org/10.1109/CyberSA.2019.8899580

A conversational agent to detect anomalous traffic in consumer IoT networks is presented. The agent accepts two inputs in the form of user speech received by Amazon Alexa enabled devices, and classified IDS logs stored in a DynamoDB Table. Aural anal... Read More about Towards a conversational agent for threat detection in the internet of things..

Reducing computational cost in IoT cyber security: case study of artificial immune system algorithm. (2019)
Conference Proceeding
ZAKARIYYA, I., AL-KADRI, M.O., KALUTARGE, H. and PETROVSKI, A. 2019. Reducing computational cost in IoT cyber security: case study of artificial immune system algorithm. In Obaidat, M. and Samarati, P. (eds.) Proceedings of the 16th International security and cryptography conference (SECRYPT 2019), co-located with the 16th International joint conference on e-business and telecommunications (ICETE 2019), 26-28 July 2019, Prague, Czech Republic. Setúbal, Portugal: SciTePress [online], 2, pages 523-528. Available from: https://doi.org/10.5220/0008119205230528.

Using Machine Learning (ML) for Internet of Things (IoT) security monitoring is a challenge. This is due to their resource constraint nature that limits the deployment of resource-hungry monitoring algorithms. Therefore, the aim of this paper is to i... Read More about Reducing computational cost in IoT cyber security: case study of artificial immune system algorithm..

Design thinking and acceptance requirements for designing gamified software. (2019)
Conference Proceeding
PIRAS, L., DELLAGIACOMA, D., PERINI, A., SUSI, A., GIORGINI, P. and MYLOPOULOS, J. 2019. Design thinking and acceptance requirements for designing gamified software. In Kolp, M., Vanderdonckt, J., Snoeck, M. and Wautelet, Y. (eds.) Proceedings of 13th Institute of Electrical and Electronics Engineers (IEEE) Research challenges in information science international conference 2019 (RICS 2019): towards a design science for information systems, 29-31 May 2019, Brussels, Belgium. Piscataway: IEEE [online], pages 81-92. Available from: https://doi.org/10/1109/RCIS.2019.8876973

Gamification is increasingly applied to engage people in performing tool-supported collaborative tasks. From previous experiences we learned that available gamification guidelines are not sufficient, and more importantly that motivational and accepta... Read More about Design thinking and acceptance requirements for designing gamified software..

When is quality assurance a constructive force in engineering education? (2019)
Conference Proceeding
PEARS, A., DANIELS, M., NYLEN, A., and MCDERMOTT, R. 2020. When is quality assurance a constructive force in engineering education? In Proceedings of the 49th Institute of Electrical and Electronics Engineers (IEEE) Frontiers in education conference 2019 (FIE 2019): bridging education to the future, 16-19 October 2019, Cincinnati, USA. Piscataway: IEEE [online], article ID 9028377. Available from: https://doi.org/10.1109/FIE43999.2019.9028377

Quality assurance processes in education have been a key area of engineering education development for several decades. ABET, ENQA - The European Association for Quality Assurance in Higher Education, as well as other agencies in Europe and the Asia... Read More about When is quality assurance a constructive force in engineering education?.

Context-aware anomaly detector for monitoring cyber attacks on automotive CAN bus. (2019)
Conference Proceeding
KALUTARAGE, H.K., AL-KADRI, M.O., CHEAH, M. and MADZUDZO, G. 2019. Context-aware anomaly detector for monitoring cyber attacks on automotive CAN bus. In Hof, H.-J., Fritz, M., Kraub, C. and Wasenmüller, O. (eds.). Proceedings of 2019 Computer science in cars symposium (CSCS 2019), 8 October 2019, Kaiserslautern, Germany. New York: ACM [online], article number 7. Available from: https://doi.org/10.1145/3359999.3360496

Automotive electronics is rapidly expanding. An average vehicle contains million lines of software codes, running on 100 of electronic control units (ECUs), in supporting number of safety, driver assistance and infotainment functions. These ECUs are... Read More about Context-aware anomaly detector for monitoring cyber attacks on automotive CAN bus..

Multiple fake classes GAN for data augmentation in face image dataset. (2019)
Conference Proceeding
ALI-GOMBE, A., ELYAN, E. and JAYNE, C. 2019. Multiple fake classes GAN for data augmentation in face image dataset. In Proceedings of the 2019 International joint conference on neural networks (IJCNN 2019), 14-19 July 2019, Budapest, Hungary. Piscataway: IEEE [online], article ID 8851953. Available from: https://doi.org/10.1109/IJCNN.2019.8851953

Class-imbalanced datasets often contain one or more class that are under-represented in a dataset. In such a situation, learning algorithms are often biased toward the majority class instances. Therefore, some modification to the learning algorithm o... Read More about Multiple fake classes GAN for data augmentation in face image dataset..

Digitisation of assets from the oil and gas industry: challenges and opportunities. (2019)
Conference Proceeding
MORENO-GARCIA, C.F. and ELYAN, E. 2019. Digitisation of assets from the oil and gas industry: challenges and opportunities. In Proceedings of 2019 International conference on document analysis and recognition workshops (ICDARW), 22-25 September 2019, Sydney, Australia. Piscataway: IEEE [online], 7, pages 2-5. Available from: https://doi.org/10.1109/ICDARW.2019.60122

Automated processing and analysis of legacies of printed documents across the Oil & Gas industry provide a unique opportunity and at the same time pose a significant challenge. One particular example is the case of Piping and Instrumentation Diagrams... Read More about Digitisation of assets from the oil and gas industry: challenges and opportunities..

Dimensions of ‘socio’ vulnerabilities of advanced persistent threats. (2019)
Conference Proceeding
NICHO, M. and MCDERMOTT, C.D. 2019. Dimensions of ‘socio’ vulnerabilities of advanced persistent threats. In Begušić, D., Rožić, N., Radić, J. and Šarić, M. (eds.) Proceedings of the 27th International software, telecommunications and computer networks conference 2019 (SoftCOM 2019), 19-21 September 2019, Split, Croatia. Piscataway: IEEE [online], article ID 8903788. Available from: https://doi.org/10.23919/SOFTCOM.2019.8903788

Advanced Persistent Threats (APT) are highly targeted and sophisticated multi-stage attacks, utilizing zero day or near zero-day malware. Directed at internetworked computer users in the workplace, their growth and prevalence can be attributed to bot... Read More about Dimensions of ‘socio’ vulnerabilities of advanced persistent threats..

The use of machine learning algorithms for detecting advanced persistent threats. (2019)
Conference Proceeding
EKE, H.N., PETROVSKI, A. and AHRIZ, H. 2019. The use of machine learning algorithms for detecting advanced persistent threats. In Makarevich, O., Babenko, L., Anikeev, M., Elci, A. and Shahriar, H. (eds.). Proceedings of the 12th Security of information and networks international conference 2019 (SIN 2019), 12-15 September 2019, Sochi, Russia. New York: ACM [online], article No. 5. Available from: https://doi.org/10.1145/3357613.3357618

Advanced Persistent Threats (APTs) have been a major challenge in securing both Information Technology (IT) and Operational Technology (OT) systems. Due to their capability to navigates around defenses and to evade detection for a prolonged period of... Read More about The use of machine learning algorithms for detecting advanced persistent threats..

Learning to self-manage by intelligent monitoring, prediction and intervention. (2019)
Conference Proceeding
WIRATUNGA, N., CORSAR, D., MARTIN, K., WIJEKOON, A., ELYAN, E., COOPER, K., IBRAHIM, Z., CELIKTUTAN, O., DOBSON, R.J., MCKENNA, S., MORRIS, J., WALLER, A., ABD-ALHAMMED, R., QAHWAJI, R. and CHAUDHURI, R. 2019. Learning to self-manage by intelligent monitoring, prediction and intervention. In Wiratunga, N., Coenen, F. and Sani, S. (eds.) Proceedings of the 4th International workshop on knowledge discovery in healthcare data (KDH 2019), co-located with the 28th International joint conference on artificial intelligence (IJCAI-19), 10-11 August 2019, Macao, China. CEUR workshop proceedings, 2429. Aachen: CEUR-WS [online], pages 60-67. Available from: http://ceur-ws.org/Vol-2429/paper10.pdf

Despite the growing prevalence of multimorbidities, current digital self-management approaches still prioritise single conditions. The future of out-of-hospital care requires researchers to expand their horizons; integrated assistive technologies sho... Read More about Learning to self-manage by intelligent monitoring, prediction and intervention..

Anomaly detection in network traffic using dynamic graph mining with a sparse autoencoder. (2019)
Conference Proceeding
JIA, G., MILLER, P., HONG, X., KALUTARAGE, H. and BAN, T. 2019. Anomaly detection in network traffic using dynamic graph mining with a sparse autoencoder. In Proceedings of 18th Institution of Electrical and Electronics Engineers (IEEE) international Trust, security and privacy in computing and communications conference, co-located with 13th IEEE international Big data science and engineering conference (TrustCom/BigDataSE), 5-8 August 2019, Rotorua, New Zealand. Piscataway: IEEE [online], pages 458-465. Available from: https://doi.org/10.1109/TrustCom/BigDataSE.2019.00068

Network based attacks on ecommerce websites can have serious economic consequences. Hence, anomaly detection in dynamic network traffic has become an increasingly important research topic in recent years. This paper proposes a novel dynamic Graph and... Read More about Anomaly detection in network traffic using dynamic graph mining with a sparse autoencoder..

Introducing the dynamic customer location-allocation problem. (2019)
Conference Proceeding
ANKRAH, R., LACROIX, B., MCCALL, J., HARDWICK, A. and CONWAY, A. 2019. Introducing the dynamic customer location-allocation problem. In Proceedings of the 2019 Institute of Electrical and Electronics Engineers (IEEE) Congress on evolutionary computation (IEEE CEC 2019), 10-13 June 2019, Wellington, NZ. Piscataway: IEEE [online], pages 3157-3164. Available from: https://doi.org/10.1109/CEC.2019.8790150

In this paper, we introduce a new stochastic Location-Allocation Problem which assumes the movement of customers over time. We call this new problem Dynamic Customer Location-Allocation Problem (DC-LAP). The problem is based on the idea that customer... Read More about Introducing the dynamic customer location-allocation problem..

Comparative analysis of two asynchronous parallelization variants for a multi-objective coevolutionary solver. (2019)
Conference Proceeding
ZAVOIANU, A.-C., SAMINGER-PLATZ, S. and AMRHEIN, W. 2019. Comparative analysis of two asynchronous parallelization variants for a multi-objective coevolutionary solver. In Proceedings of the 2019 Institute of Electrical and Electronics Engineers (IEEE) congress on evolutionary computation (IEEE CEC 2019), 10-13 June 2019, Wellington, New Zealand. Piscataway: IEEE [online], article number 8790133, pages 3078-3085. Available from: https://doi.org/10.1109/CEC.2019.8790133

We describe and compare two steady state asynchronous parallelization variants for DECMO2++, a recently proposed multi-objective coevolutionary solver that generally displays a robust run-time convergence behavior. The two asynchronous variants were... Read More about Comparative analysis of two asynchronous parallelization variants for a multi-objective coevolutionary solver..