Skip to main content

Research Repository

Advanced Search

Outputs (2360)

An estimation of distribution algorithm for nurse scheduling (2007)
Journal Article
Aickelin, U., & Li, J. (2007). An estimation of distribution algorithm for nurse scheduling. Annals of Operations Research, 155(1), 289-309. https://doi.org/10.1007/s10479-007-0214-0

Schedules can be built in a similar way to a human scheduler by using a set of rules that involve domain knowledge. This paper presents an Estimation of Distribution Algorithm (EDA) for the nurse scheduling problem, which involves choosing a suitable... Read More about An estimation of distribution algorithm for nurse scheduling.

Wavelet and multiwavelet watermarking (2007)
Journal Article
Serdean, C., Ibrahim, M., Moemeni, A., & Al-Akaidi, M. (2007). Wavelet and multiwavelet watermarking. IET Image Processing, 1(2), 223-230. https://doi.org/10.1049/iet-ipr%3A20060214

The main objective of the paper is to provide a like-with-like performance comparison between the wavelet domain and the multiwavelet domain watermarking, under a variety of attacks. The investigation is restricted to balanced multiwavelets. Furtherm... Read More about Wavelet and multiwavelet watermarking.

Rule Generalisation in Intrusion Detection Systems using Snort (2007)
Journal Article
Aickelin, U., Twycross, J., & Hesketh-Roberts, T. (2007). Rule Generalisation in Intrusion Detection Systems using Snort. International Journal of Electronic Security and Digital Forensics, 1(1), 101-116. https://doi.org/10.1504/IJESDF.2007.013596

Intrusion Detection Systems (IDSs) provide an important layer of security for computer systems and networks, and are becoming more and more necessary as reliance on Internet services increases and systems with sensitive data are more commonly open to... Read More about Rule Generalisation in Intrusion Detection Systems using Snort.

Enabling rapid and cost-effective creation of massive pervasive games in very unstable environments (2007)
Presentation / Conference Contribution
Wietrzyk, B., & Radenkovic, M. Enabling rapid and cost-effective creation of massive pervasive games in very unstable environments. Presented at 2007 Fourth Annual Conference on Wireless on Demand Network Systems and Services

Pervasive gaming is a new form of multimedia entertainment that extends the traditional computer gaming experience out into the real world. Through a combination of personal devices, positioning systems and other sensors, combined with wireless netwo... Read More about Enabling rapid and cost-effective creation of massive pervasive games in very unstable environments.

A graph-based hyper heuristic for timetabling problems (2007)
Journal Article
Burke, E., MacCloumn, B., Meisels, A., Petrovic, S., & Qu, R. (2007). A graph-based hyper heuristic for timetabling problems. European Journal of Operational Research, 176(1), https://doi.org/10.1016/j.ejor.2005.08.012

This paper presents an investigation of a simple generic hyper-heuristic approach upon a set of widely used constructive heuristics (graph coloring heuristics) in timetabling. Within the hyperheuristic framework, a Tabu Search approach is employed to... Read More about A graph-based hyper heuristic for timetabling problems.

Robust recognition of planar shapes under affine transforms using principal component analysis (2007)
Journal Article
Tzimiropoulos, G., Mitianoudis, N., & Stathaki, T. (2007). Robust recognition of planar shapes under affine transforms using principal component analysis. IEEE Signal Processing Letters, 14(10), https://doi.org/10.1109/LSP.2007.896434

A scheme, based on Principal Component Analysis (PCA), is proposed that can be used for the recognition of 2D planar shapes under affine transformations. A PCA step is first used to map the object boundary to its canonical form, reducing the problem... Read More about Robust recognition of planar shapes under affine transforms using principal component analysis.

Extracting reusable document components for variable data printing (2007)
Presentation / Conference Contribution
Bagley, S. R., Brailsford, D. F., & Ollis, J. A. Extracting reusable document components for variable data printing. Presented at ACM Symposium on Document Engineering

Variable Data Printing (VDP) has brought new flexibility and dynamism to the printed page. Each printed instance of a specific class of document can now have different degrees of customized content within the document template.

This flexibility co... Read More about Extracting reusable document components for variable data printing.

An affine invariant function using PCA bases with an application to within-class object recognition (2007)
Presentation / Conference Contribution
Tzimiropoulos, G., Mitianoudis, N., & Stathaki, T. An affine invariant function using PCA bases with an application to within-class object recognition. Presented at ICASSP 2007 - 2007 IEEE International Conference on Acoustics, Speech and Signal Processing

The problem of shape-based recognition of objects under affine transformations is considered. We focus on the construction of a robust and highly discriminative affine invariant function that can be used for within-class object recognition applicatio... Read More about An affine invariant function using PCA bases with an application to within-class object recognition.

Articulation and Clarification of the Dendritic Cell Algorithm (2006)
Presentation / Conference Contribution
Greensmith, J., Aickelin, U., & Twycross, J. (2006, September). Articulation and Clarification of the Dendritic Cell Algorithm. Presented at 5th International Conference, ICARIS 2006, Oeiras, Portugal

The Dendritic Cell algorithm (DCA) is inspired by recent work in innate immunity. In this paper a formal description of the DCA is given. The DCA is described in detail, and its use as an anomaly detector is illustrated within the context of computer... Read More about Articulation and Clarification of the Dendritic Cell Algorithm.