Skip to main content

Research Repository

Advanced Search

Outputs (2293)

Human Behavious Modelling for Discrete Event and Agent Based Simulation: A Case Study
Presentation / Conference Contribution
Majid, M., Aickelin, U., & Siebers, P.-O. Human Behavious Modelling for Discrete Event and Agent Based Simulation: A Case Study. Presented at Annual Operational Research Conference 49 (OR 49)

This study is about the comparison of simulation techniques between Discrete Event Simulation (DES) and Agent Based Simulation (ABS). DES is one of the best-known types of simulation techniques in Operational Research. Recently, there has been an e... Read More about Human Behavious Modelling for Discrete Event and Agent Based Simulation: A Case Study.

The Application of a Dendric Cell Algorithm to a Robotic Classifier
Presentation / Conference Contribution
Oates, R., Greensmith, J., Aickelin, U., Garibaldi, J., & Kendall, G. The Application of a Dendric Cell Algorithm to a Robotic Classifier. Presented at Proceedings of the 6th International Conference on Artificial Immune Systems (ICARIS 2007)

The dendritic cell algorithm is an immune-inspired technique for processing time-dependant data. Here we propose it as a possible solution for a robotic classification problem. The dendritic cell algorithm is implemented on a real robot and an invest... Read More about The Application of a Dendric Cell Algorithm to a Robotic Classifier.

A Multi-Agent Simulation of Retail Management Practices
Presentation / Conference Contribution
Siebers, P.-O., Aickelin, U., Celia, H., & Clegg, C. A Multi-Agent Simulation of Retail Management Practices. Presented at Proceedings of the Summer Computer Simulation Conference (SCSC 2007)

We apply Agent-Based Modeling and Simulation (ABMS) to investigate a set of problems in a retail context. Specifically, we are working to understand the relationship between human resource management practices and retail productivity. Despite the fac... Read More about A Multi-Agent Simulation of Retail Management Practices.

Using Intelligent Agents to Understand Management Practices and Retail Productivity
Presentation / Conference Contribution
Siebers, P.-O., Aickelin, U., Celia, H., & Clegg, C. Using Intelligent Agents to Understand Management Practices and Retail Productivity. Presented at Proceedings of the Winter Simulation Conference (WSC 2007)

Intelligent agents offer a new and exciting way of understanding the world of work. In this paper we apply agent-based modeling and simulation to investigate a set of problems in a retail context. Specifically, we are working to understand the relati... Read More about Using Intelligent Agents to Understand Management Practices and Retail Productivity.

Biological Inspiration for Artificial Immune Systems
Presentation / Conference Contribution
Twycross, J., & Aickelin, U. Biological Inspiration for Artificial Immune Systems. Presented at Proceedings of the 6th International Conference on Artificial Immune Systems (ICARIS 2007)

Artificial immune systems (AISs) to date have generally been inspired by naive biological metaphors. This has limited the effectiveness of these systems. In this position paper two ways in which AISs could be made more biologically realistic are disc... Read More about Biological Inspiration for Artificial Immune Systems.

Motif detection inspired by immune memory
Journal Article
Wilson, W., Birkin, P., & Aickelin, U. Motif detection inspired by immune memory. Lecture Notes in Artificial Intelligence, 4628, https://doi.org/10.1007/978-3-540-73922-7_24

The search for patterns or motifs in data represents an area of key interest to many researchers. In this paper we present the Motif Tracking Algorithm, a novel immune inspired pattern identification tool that is able to identify variable length unkn... Read More about Motif detection inspired by immune memory.

Detecting Motifs in System Call Sequences
Presentation / Conference Contribution
Wilson, W., Feyereisl, J., & Aickelin, U. Detecting Motifs in System Call Sequences. Presented at Proceedings of the 8th International Workshop on Information Security Applications (WISA 2007)

The search for patterns or motifs in data represents an area of key interest to many researchers. In this paper we present the Motif Tracking Algorithm, a novel immune inspired pattern identification tool that is able to identify unknown motifs which... Read More about Detecting Motifs in System Call Sequences.

Simulation Optimization of the Crossdock Door Assignmnet Problem
Presentation / Conference Contribution
Aickelin, U., & Adewunmi, A. Simulation Optimization of the Crossdock Door Assignmnet Problem. Presented at UK Operational Research Society Simulation Workshop 2006 (SW06)

The purpose of this report is to present the Crossdock Door Assignment Problem, which involves assigning destinations to outbound dock doors of Crossdock centres such that travel distance by material handling equipment is minimized. We propose a two... Read More about Simulation Optimization of the Crossdock Door Assignmnet Problem.

Improved Squeaky Wheel Optimisation for Driver Scheduling
Presentation / Conference Contribution
Aickelin, U., Burke, E., & Li, J. Improved Squeaky Wheel Optimisation for Driver Scheduling. Presented at Proceedings of the 9th International Conference on Parallel Problem Solving from Nature (PPSN IX)

This paper presents a technique called Improved Squeaky Wheel Optimisation (ISWO) for driver scheduling problems. It improves the original Squeaky Wheel Optimisation’s (SWO) effectiveness and execution speed by incorporating two additional steps of S... Read More about Improved Squeaky Wheel Optimisation for Driver Scheduling.

Detecting Botnets Through Log Correlation
Presentation / Conference Contribution
Al-Hammadi, Y., & Aickelin, U. Detecting Botnets Through Log Correlation. Presented at Proceedings of the Workshop on Monitoring, Attack Detection and Mitigation (MonAM 2006)

Botnets, which consist of thousands of compromised machines, can cause a significant threat to other systems by launching Distributed Denial of Service attacks, keylogging, and backdoors. In response to this threat, new effective techniques are neede... Read More about Detecting Botnets Through Log Correlation.