Skip to main content

Research Repository

Advanced Search

All Outputs (66)

Selective dropout for deep neural networks. (2016)
Conference Proceeding
BARROW, E., EASTWOOD, M. and JAYNE, C. 2016. Selective dropout for deep neural networks. In Hirose, A., Ozawa, S., Doya, K., Ikeda, K., Lee, M. and Liu, D. (eds.) Neural information processing: Proceedings of the 23rd International conference on neural information processing (ICONIP 2016), 16-21 October 2016, Kyoto, Japan. Lecture notes in computer science, 9949. Cham: Springer [online], pages 519-528. Available from: https://doi.org/10.1007/978-3-319-46675-0_57

Dropout has been proven to be an effective method for reducing overfitting in deep artificial neural networks. We present 3 new alternative methods for performing dropout on a deep neural network which improves the effectiveness of the dropout method... Read More about Selective dropout for deep neural networks..

Wireless information and energy transfer in nonregenerative OFDM AF relay systems. (2016)
Journal Article
HUANG, G. and TU, W. 2017. Wireless information and energy transfer in nonregenerative OFDM AF relay systems. Wireless personal communications [online], 94(4), pages 3131-3146. Available from: https://10.1007/s11277-016-3768-9

Energy harvesting (EH) is a promising strategy to prolong the operation of energy-constrained wireless systems. Simultaneous wireless information and energy transfer (SWIET) is a potential EH technique which has recently drawn significant attention.... Read More about Wireless information and energy transfer in nonregenerative OFDM AF relay systems..

The application of 3D visualisation and HD surveying to help stimulate economic growth in historic urban areas. (2016)
Conference Proceeding
LAING, R., TAIT, E., ISAACS, J., LEON, M. and REID, P. 2016. The application of 3D visualisation and HD surveying to help stimulate economic growth in historic urban areas. In Proceedings of the 2016 RICS construction, building and real estate research conference (COBRA 2016), 20-22 September 2016, Toronto, Canada. London: RICS.

This paper concerns the application of cutting edge digital recording techniques within the context of heritage-led urban regeneration. The work is innovative in that it supports the belief of decision makers and local stakeholders that there is pote... Read More about The application of 3D visualisation and HD surveying to help stimulate economic growth in historic urban areas..

Obtaining the consensus of multiple correspondences between graphs through online learning. (2016)
Journal Article
MORENO-GARCÍA, C.F. and SERRATOSA, F. 2017. Obtaining the consensus of multiple correspondences between graphs through online learning. Pattern recognition letters [online], 87, pages 79-86. Available from: https://doi.org/10.1016/j.patrec.2016.09.003

In structural pattern recognition, it is usual to compare a pair of objects through the generation of a correspondence between the elements of each of their local parts. To do so, one of the most natural ways to represent these objects is through att... Read More about Obtaining the consensus of multiple correspondences between graphs through online learning..

Semi-automatic pose estimation of a fleet of robots with embedded stereoscopic cameras. (2016)
Conference Proceeding
CORTÉS, X., SERRATOSA, F. and MORENO-GARCIA, C.-F. 2016. Semi-automatic pose estimation of a fleet of robots with embedded stereoscopic cameras. In Proceedings of 21st Institute of Electrical Electronic Engineers (IEEE) Emerging technologies and factory automation international conference 2016 (ETFA 2016), 6-9 September 2016, Berlin, Germany. Piscataway: IEEE [online], article ID 7733640. Available from: https://doi.org/10.1109/ETFA.2016.7733640

Given a fleet of robots, automatic estimation of the relative poses between them could be inaccurate in specific environments. We propose a framework composed by the fleet of robots with embedded stereoscopic cameras providing 2D and 3D images of the... Read More about Semi-automatic pose estimation of a fleet of robots with embedded stereoscopic cameras..

RK-EDA: a novel random key based estimation of distribution algorithm. (2016)
Conference Proceeding
AYODELE, M., MCCALL, J. and REGNIER-COUDERT, O. 2016. RK-EDA: a novel random key based estimation of distribution algorithm. In Handl, J., Hart, E., Lewis, P.R., López-Ibáñez, M., Ochoa, G. and Paechter, B. (eds.) Parallel problem solving from natuture: proceedings of the 14th International parallel problem solving from nature conference (PPSN XIV), 17-21 September 2016, Edinburgh, UK. Lecture notes in computer science, 9921. Cham: Springer [online], pages 849-858. Available from: https://doi.org/10.1007/978-3-319-45823-6_79

The challenges of solving problems naturally represented as permutations by Estimation of Distribution Algorithms (EDAs) have been a recent focus of interest in the evolutionary computation community. One of the most common alternative representation... Read More about RK-EDA: a novel random key based estimation of distribution algorithm..

Ethical and professional complications in the construction of multi-developer hobbyist games. (2016)
Journal Article
HERON, M.J. 2016. Ethical and professional complications in the construction of multi-developer hobbyist games. Computer games journal [online], 5(3), pages 115-129. Available from: https://doi.org/10.1007/s40869-016-0025-0

The modern availability of powerful video game development frameworks has resulted in something of an indie renaissance. Within this blossoming of small scale development are numerous hobbyist developers who build games for their own inherent satisfa... Read More about Ethical and professional complications in the construction of multi-developer hobbyist games..

Intelligent measurement in unmanned aerial cyber physical systems for traffic surveillance. (2016)
Conference Proceeding
PETROVSKI, A., RATTADILOK, P. and PETROVSKII, S. 2016. Intelligent measurement in unmanned aerial cyber physical systems for traffic surveillance. In Jayne, C. and Iliadis, L. (eds.) Engineering applications of neural networks: proceedings of the 17th International engineering applications of neural networks conference (EANN 2016), 2-5 September 2016, Aberdeen, UK. Communications in computer and information science, 629. Cham: Springer [online], pages 161-175. Available from: https://doi.org/10.1007/978-3-319-44188-7_12 161-175. Available from: https://doi.org/10.1007/978-3-319-44188-7_12

An adaptive framework for building intelligent measurement systems has been proposed in the paper and tested on simulated traffic surveillance data. The use of the framework enables making intelligent decisions related to the presence of anomalies in... Read More about Intelligent measurement in unmanned aerial cyber physical systems for traffic surveillance..

Deep active learning for autonomous navigation. (2016)
Conference Proceeding
HUSSEIN, A., GABER, M.M. and ELYAN, E. 2016. Deep active learning for autonomous navigation. In Jayne, C. and Iliadis, L. (eds.) Engineering applications of neural networks: proceedings of the 17th International engineering applications of neural networks conference (EANN 2016), 2-5 September 2016, Aberdeen, UK. Communications in computer and information science, 629. Cham: Springer [online], pages 3-17. Available from: https://doi.org/10.1007/978-3-319-44188-7_1

Imitation learning refers to an agent's ability to mimic a desired behavior by learning from observations. A major challenge facing learning from demonstrations is to represent the demonstrations in a manner that is adequate for learning and efficien... Read More about Deep active learning for autonomous navigation..

An outlier ranking tree selection approach to extreme pruning of random forests. (2016)
Conference Proceeding
FAWAGREH, K., GABER, M.M. and ELYAN, E. 2016. An outlier ranking tree selection approach to extreme pruning of random forests. In Jayne, C. and Iliadis, L. (eds.) Engineering applications of neural networks: proceedings of the 17th International engineering applications of neural networks conference (EANN 2016), 2-5 September 2016, Aberdeen, UK. Communications in computer and information science, 629. Cham: Springer [online], pages 267-282. Available from: https://doi.org/10.1007/978-3-319-44188-7_20

Random Forest (RF) is an ensemble classification technique that was developed by Breiman over a decade ago. Compared with other ensemble techniques, it has proved its accuracy and superiority. Many researchers, however, believe that there is still ro... Read More about An outlier ranking tree selection approach to extreme pruning of random forests..

Designing a context-aware cyber physical system for smart conditional monitoring of platform equipment. (2016)
Conference Proceeding
MAJDANI, F., PETROVSKI, A. and DOOLAN, D. 2016. Designing a context-aware cyber physical system for smart conditional monitoring of platform equipment. In Jayne, C. and Iliadis, L. (eds.) Engineering applications of neural networks: proceedings of the 17th International engineering applications of neural networks conference (EANN 2016), 2-5 September 2016, Aberdeen, UK. Communications in computer and information science, 629. Cham: Springer [online], pages 198-210. Available from: https://doi.org/10.1007/978-3-319-44188-7_15

An adaptive multi-tiered framework, which can be utilised for designing a context-aware cyber physical system is proposed and applied within the context of assuring offshore asset integrity. Adaptability is achieved through the combined use of machin... Read More about Designing a context-aware cyber physical system for smart conditional monitoring of platform equipment..

A genetic algorithm approach to optimising random forests applied to class engineered data. (2016)
Journal Article
ELYAN, E. and GABER, M.M. 2017. A genetic algorithm approach to optimising random forests applied to class engineered data. Information sciences [online], 384, pages 220-234. Available from: https://doi.org/10.1016/j.ins.2016.08.007

In numerous applications and especially in the life science domain, examples are labelled at a higher level of granularity. For example, binary classification is dominant in many of these datasets, with the positive class denoting the existence of a... Read More about A genetic algorithm approach to optimising random forests applied to class engineered data..

Persona-driven information security awareness. (2016)
Conference Proceeding
KI-ARIES, D., FAILY, S. and BECKERS, K. 2016. Persona-driven information security awareness. In Proceedings of the 30th International BCS human computer interaction conference (HCI 2016): fusion, 11-15 July 2016, Poole, UK. Swindon: BCS [online], article number 97. Available from: https://doi.org/10.14236/ewic/HCI2016.97

Because human factors are a root cause of security breaches in many organisations, security awareness activities are often used to address problematic behaviours and improve security culture. Previous work has found that personas are useful for ident... Read More about Persona-driven information security awareness..

Ethical hazards and safeguards in penetration testing. (2016)
Conference Proceeding
FAILY, S., IACOB, C. and FIELD, S. 2016. Ethical hazards and safeguards in penetration testing. In Proceedings of the 30th International BCS human computer interaction conference (HCI 2016): fusion, 11-15 July 2016, Poole, UK. Swindon: BCS [online], article number 83. Available from: https://doi.org/10.14236/ewic/HCI2016.83

Penetration testing entails attacking a system to identify and report insecurity, but doing so without harming the system nor encroaching on the dignity of those affected by it. To improve the interaction between penetration testers and their process... Read More about Ethical hazards and safeguards in penetration testing..

Human-centered specification exemplars for critical infrastructure environments. (2016)
Conference Proceeding
FAILY, S., LYKOU, G., PARTRIDGE, A., GRITZALIS, D., MYLONAS, A. and KATOS, V. 2016. Human-centered specification exemplars for critical infrastructure environments. In Proceedings of the 30th International BCS human computer interaction conference (HCI 2016): fusion, 11-15 July 2016, Poole, UK. Swindon: BCS [online], article number 93. Available from: https://doi.org/10.14236/ewic/HCI2016.93

Specification models of critical infrastructure focus on parts of a larger environment. However, to consider the security of critical infrastructure systems, we need approaches for modelling the sum of these parts; these include people and activities... Read More about Human-centered specification exemplars for critical infrastructure environments..

Improving human-reviews interaction: a study of the role, use and place of online reviews. (2016)
Conference Proceeding
IACOB, C. and FAILY, S. 2016. Improving human-reviews interaction: a study of the role, use and place of online reviews. In Proceedings of the 30th International BCS human computer interaction conference (HCI 2016): fusion, 11-15 July 2016, Poole, UK. Swindon: BCS [online], article number 21. Available from: https://doi.org/10.14236/ewic/HCI2016.21

The use and benefits of online reviews are undeniable, yet the interaction means available for buyers when consulting reviews remain limited. This study aims to provide a better understanding of the role and use of online reviews, presenting a set of... Read More about Improving human-reviews interaction: a study of the role, use and place of online reviews..

The application of useless Japanese inventions for requirements elicitation in information security. (2016)
Conference Proceeding
PARTRIDGE, A. and FAILY, S. 2016. The application of useless Japanese inventions for requirements elicitation in information security. In Proceedings of the 30th International BCS human computer interaction conference (HCI 2016): fusion, 11-15 July 2016, Poole, UK. Swindon: BCS [online], article number 102. Available from: https://doi.org/10.14236/ewic/HCI2016.102

Rules of requirements elicitation in security are broken through the use of Chindōgu, by designing impractical security countermeasures in the first instance, then using these to create usable security requirements. We present a process to conceive t... Read More about The application of useless Japanese inventions for requirements elicitation in information security..

Gulfs of expectation: eliciting and verifying differences in trust expectations using personas (2016)
Journal Article
FAILY, S., POWER, D. and FLÉCHAIS, I. 2016. Gulfs of expectation: eliciting and verifying differences in trust expectations using personas. Journal of trust management [online], 3, article number 4. Available from: https://doi.org/10.1186/s40493-016-0025-9

Personas are a common tool used in Human Computer Interaction to represent the needs and expectations of a system's stakeholders, but they are also grounded in large amounts of qualitative data. Our aim is to make use of this data to anticipate the d... Read More about Gulfs of expectation: eliciting and verifying differences in trust expectations using personas.

BPGA-EDA for the multi-mode resource constrained project scheduling problem. (2016)
Conference Proceeding
AYODELE, M., MCCALL, J. and REGNIER-COUDERT, O. 2016. BPGA-EDA for the multi-mode resource constrained project scheduling problem. In Proceedings of the 2016 IEEE congress on evolutionary computation (CEC 2016), 24-29 July 2016, Vancouver, Canada. Piscataway, NJ: IEEE [online], article number 7744222, pages 3417-3424. Available from: https://doi.org/10.1109/CEC.2016.7744222

The Multi-mode Resource Constrained Project Scheduling Problem (MRCPSP) has been of research interest for over two decades. The problem is composed of two interacting sub problems: mode assignment and activity scheduling. These problems cannot be sol... Read More about BPGA-EDA for the multi-mode resource constrained project scheduling problem..

Predictive planning with neural networks. (2016)
Conference Proceeding
AINSLIE, R., MCCALL, J., SHAKYA, S. and OWUSU, G. 2016. Predictive planning with neural networks. In Proceedings of the International joint conference on neural networks (IJCNN), 24-29 July 2016, Vancouver, Canada. Piscataway: IEEE [online], pages 2110-2117. Available from: https://doi.org/10.1109/IJCNN.2016.7727460

Critical for successful operations of service industries, such as telecoms, utility companies and logistic companies, is the service chain planning process. This involves optimizing resources against expected demand to maximize the utilization and mi... Read More about Predictive planning with neural networks..