Skip to main content

Research Repository

Advanced Search

All Outputs (48)

Evolutionary multi-objective optimization algorithms with probabilistic representation based on pheromone trails (2010)
Presentation / Conference Contribution
Li, H., Landa-Silva, D., & Gandibleux, X. Evolutionary multi-objective optimization algorithms with probabilistic representation based on pheromone trails. Presented at Proceedings of the 2010 IEEE Congress on Evolutionary Computation (CEC 2010)

Recently, the research on quantum-inspired evolutionary algorithms (QEA) has attracted some attention in the area of evolutionary computation. QEA use a probabilistic representation, called Q-bit, to encode individuals in population. Unlike standard... Read More about Evolutionary multi-objective optimization algorithms with probabilistic representation based on pheromone trails.

Towards the design of heuristics by means of self-assembly (2010)
Presentation / Conference Contribution
Terrazas, G., Landa-Silva, D., & Krasnogor, N. Towards the design of heuristics by means of self-assembly. Presented at Developments in Computational Models (DCM 2010)

The current investigations on hyper-heuristics design have sprung up in two different flavours: heuristics that choose heuristics and heuristics that generate heuristics. In the latter, the goal is to develop a problem-domain independent strategy to... Read More about Towards the design of heuristics by means of self-assembly.

Can background baroque music help to improve the memorability of graphical passwords? (2010)
Presentation / Conference Contribution
Gao, H., Chang, X., Ren, Z., Aickelin, U., & Wang, L. (2010, June). Can background baroque music help to improve the memorability of graphical passwords?. Presented at 7th international conference, ICIAR 2010, Povoa de Varzim, Portugal

Graphical passwords have been proposed as an alternative to alphanumeric passwords with their advantages in usability and security. However, they still tend to follow predictable patterns that are easier for attackers to exploit, probably due to user... Read More about Can background baroque music help to improve the memorability of graphical passwords?.

A genetic programming hyper-heuristic approach for evolving 2-D strip packing heuristics (2010)
Journal Article
Burke, E. K., Hyde, M., Kendall, G., & Woodward, J. (2010). A genetic programming hyper-heuristic approach for evolving 2-D strip packing heuristics. IEEE Transactions on Evolutionary Computation, 14(6), https://doi.org/10.1109/tevc.2010.2041061

We present a genetic programming (GP) system to evolve reusable heuristics for the 2-D strip packing problem. The evolved heuristics are constructive, and decide both which piece to pack next and where to place that piece, given the current partial s... Read More about A genetic programming hyper-heuristic approach for evolving 2-D strip packing heuristics.

Discovering beneficial cooperative structures for the automated construction of heuristics (2010)
Book Chapter
Terrazas, G., Landa-Silva, D., & Krasnogor, N. (2010). Discovering beneficial cooperative structures for the automated construction of heuristics. In Nature inspired cooperative strategies for optimization (NICSO 2010) (89-100). Springer Verlag. https://doi.org/10.1007/978-3-642-12538-6_8

The current research trends on hyper-heuristics design have sprung up in two different flavours: heuristics that choose heuristics and heuristics that generate heuristics. In the latter, the goal is to develop a problem-domain independent strategy to... Read More about Discovering beneficial cooperative structures for the automated construction of heuristics.

Stochastic and deterministic multiscale models for systems biology: An auxin-transport case study (2010)
Journal Article
Twycross, J., Band, L. R., Bennett, M. J., King, J. R., & Krasnogor, N. (2010). Stochastic and deterministic multiscale models for systems biology: An auxin-transport case study. BMC Systems Biology, 4, https://doi.org/10.1186/1752-0509-4-34

Background: Stochastic and asymptotic methods are powerful tools in developing multiscale systems biology models; however, little has been done in this context to compare the efficacy of these methods. The majority of current systems biology modellin... Read More about Stochastic and deterministic multiscale models for systems biology: An auxin-transport case study.

Haptic negotiation and role exchange for collaboration in virtual environments (2010)
Presentation / Conference Contribution
Oguz, S. O., Kucukyilmaz, A., Sezgin, T. M., & Basdogan, C. (2010, March). Haptic negotiation and role exchange for collaboration in virtual environments. Presented at 2010 IEEE Haptics Symposium, Waltham, MA, USA

We investigate how collaborative guidance can be realized in multi-modal virtual environments for dynamic tasks involving motor control. Haptic guidance in our context can be defined as any form of force/tactile feedback that the computer generates t... Read More about Haptic negotiation and role exchange for collaboration in virtual environments.

TopoGSA: network topological gene set analysis (2010)
Journal Article
Glaab, E., Baudot, A., Krasnogor, N., & Valencia, A. (2010). TopoGSA: network topological gene set analysis. Bioinformatics, 26(9), https://doi.org/10.1093/bioinformatics/btq131

TopoGSA (Topology-based Gene Set Analysis) is a web-application dedicated to the computation and visualization of network topological properties for gene and protein sets in molecular interaction networks. Different topological characteristics, such... Read More about TopoGSA: network topological gene set analysis.

A methodology to identify consensus classes from clustering algorithms applied to immunohistochemical data from breast cancer patients (2010)
Journal Article
Soria, D., Garibaldi, J. M., Ambrogi, F., Green, A. R., Powe, D., Rakha, E., Douglas Macmillan, R., Blamey, R. W., Ball, G., Lisboa, P. J., Etchells, T. A., Boracchi, P., Biganzoli, E. M., & Ellis, I. O. (2010). A methodology to identify consensus classes from clustering algorithms applied to immunohistochemical data from breast cancer patients. Computers in Biology and Medicine, 40(3), https://doi.org/10.1016/j.compbiomed.2010.01.003

Single clustering methods have often been used to elucidate clusters in high dimensional medical data, even though reliance on a single algorithm is known to be problematic. In this paper, we present a methodology to determine a set of ‘core classes’... Read More about A methodology to identify consensus classes from clustering algorithms applied to immunohistochemical data from breast cancer patients.

Towards modelling cost and risks of infrequent events in the cargo screening process (2010)
Presentation / Conference Contribution
Sherman, G., Menachof, D., Aickelin, U., & Siebers, P.-O. (2010, March). Towards modelling cost and risks of infrequent events in the cargo screening process. Presented at UK OR Society Simulation Workshop 2010 (SW10), Worcestershire, UK

We introduce a simulation model of the port of Calais with a focus on the operation of immigration controls. Our aim is to compare the cost and benefits of different screening policies. Methodologically, we are trying to understand the limits of disc... Read More about Towards modelling cost and risks of infrequent events in the cargo screening process.

Behavioural correlation for detecting P2P bots (2010)
Book Chapter
Al-Hammadi, Y., & Aickelin, U. (2010). Behavioural correlation for detecting P2P bots. In Second International Conference on Future Networks, 2010: ICFN '10. IEEE. https://doi.org/10.1109/ICFN.2010.72

In the past few years, IRC bots, malicious programs which
are remotely controlled by the attacker through IRC servers,
have become a major threat to the Internet and users. These
bots can be used in different malicious ways such as issuing
distri... Read More about Behavioural correlation for detecting P2P bots.

Reputation-based security protocol for MANETs in highly mobile disconnection-prone environments (2010)
Presentation / Conference Contribution
Radenkovic, M., Zakhary, S. R., & Radenkovic, M. Reputation-based security protocol for MANETs in highly mobile disconnection-prone environments. Presented at Wireless On-demand Network Systems and Services (WONS), 2010 Seventh International Conference on

This paper is concerned with fully distributed reputation-based mechanisms that improve security in MANETS. We introduce a number of optimisations to the current reputation schemes used in MANETs such as selective deviation tests and adaptive expirat... Read More about Reputation-based security protocol for MANETs in highly mobile disconnection-prone environments.

Fast wavelet-based pansharpening of multi-spectral images (2010)
Presentation / Conference Contribution
Mitianoudis, N., Tzimiropoulos, G., & Stathaki, T. Fast wavelet-based pansharpening of multi-spectral images. Presented at 2010 IEEE International Conference on Imaging Systems and Techniques (IST)

Remote Sensing systems enhance the spatial quality of low-resolution Multi-Spectral (MS) images using information from Pan-chromatic (PAN) images under the pansharpening framework. Most decimated multi-resolution pansharpening approaches upsample the... Read More about Fast wavelet-based pansharpening of multi-spectral images.

A novel framework to elucidate core classes in a dataset (2010)
Presentation / Conference Contribution
Soria, D., & Garibaldi, J. M. A novel framework to elucidate core classes in a dataset. Presented at IEEE Congress on Evolutionary Computation (CEC) 2010

In this paper we present an original framework to extract representative groups from a dataset, and we validate it
over a novel case study. The framework specifies the application of different clustering algorithms, then several statistical and visu... Read More about A novel framework to elucidate core classes in a dataset.

Bidirectional relighting for 3D-aided 2D face recognition (2010)
Presentation / Conference Contribution
Toderici, G., Passalis, G., Zafeiriou, S., Tzimiropoulos, G., Petrou, M., Theoharis, T., & Kakadiaris, I. A. Bidirectional relighting for 3D-aided 2D face recognition. Presented at IEEE Computer Society Conference on Computer Vision and Pattern Recognition

In this paper, we present a new method for bidirectional relighting for 3D-aided 2D face recognition under large pose and illumination changes. During subject enrollment, we build subject-specific 3D annotated models by using the subjects' raw 3D dat... Read More about Bidirectional relighting for 3D-aided 2D face recognition.

Scenario analysis, decision trees and simulation for cost benefit analysis of the cargo screening process (2010)
Book Chapter
Sherman, G., Siebers, P.-O., Aickelin, U., & Menachof, D. (2010). Scenario analysis, decision trees and simulation for cost benefit analysis of the cargo screening process. In A. G. Bruzzone, L. Landau, G. G. Cunha, & S. Saetta (Eds.), The International Workshop on Applied Modelling and Simulation: WAMS, Buizos, 2010. COPPE/UFRJ

In this paper we present our ideas for conducting a cost
benefit analysis by using three different methods: scenario analysis, decision trees and simulation. Then we introduce our case study and examine these methods in a real world situation. We sh... Read More about Scenario analysis, decision trees and simulation for cost benefit analysis of the cargo screening process.

ExoBuilding: breathing Life into architecture (2010)
Book Chapter
Schnädelbach, H., Glover, K., & Irune, A. A. (2010). ExoBuilding: breathing Life into architecture. In E. Þ. Hvannberg, M. K. Lárusdóttir, A. Blandford, & J. Gulliksen (Eds.), NordiCHI 2010: proceedings of the 6th Nordic Conference on Human-Computer Interaction, October 16-20, 2010, Reykjavik, Iceland. ACM Press. https://doi.org/10.1145/1868914.1868965

ExoBuilding explores the novel design space that emerges when an individual‟s physiological data and the fabric of building architecture are linked. In its current form ExoBuilding is a tent-like structure that externalises a person‟s physiological d... Read More about ExoBuilding: breathing Life into architecture.

An audio CAPTCHA to distinguish humans from computers (2010)
Book Chapter
Haichang, G., Liu, H., Yao, D., Liu, X., & Aickelin, U. (2010). An audio CAPTCHA to distinguish humans from computers. In F. Yu, M. Russell, N. Rubens, & J. Zhang (Eds.), Third International Symposium on Electronic Commerce and Security, ISECS2010: Guangzhou, China, 29-31 July 2010. IEEE Computer Society. https://doi.org/10.1109/ISECS.2010.65

CAPTCHAs are employed as a security measure to differentiate human users from bots. A new sound-based
CAPTCHA is proposed in this paper, which exploits the gaps
between human voice and synthetic voice rather than relays on the auditory perception o... Read More about An audio CAPTCHA to distinguish humans from computers.

Artificial immune systems (2010)
Book Chapter
Greensmith, J., Whitbrook, A., & Aickelin, U. (2010). Artificial immune systems. In M. Gendreau, & J.-Y. Potvin (Eds.), Handbook of metaheuristics. Springer

The human immune system has numerous properties that make it ripe for exploitation in the computational domain, such as robustness and fault tolerance, and many different algorithms, collectively termed Artificial Immune Systems
(AIS), have been ins... Read More about Artificial immune systems.