Skip to main content

Research Repository

Advanced Search

All Outputs (19)

An estimation of distribution algorithm with intelligent local search for rule-based nurse rostering (2007)
Journal Article
Aickelin, U., Burke, E., & Li, J. (2007). An estimation of distribution algorithm with intelligent local search for rule-based nurse rostering. Journal of the Operational Research Society, 58(12), 1574-1585. https://doi.org/10.1057/palgrave.jors.2602308

This paper proposes a new memetic evolutionary algorithm to achieve explicit learning in rule-based nurse rostering, which involves applying a set of heuristic rules for each nurse's assignment. The main framework of the algorithm is an estimation of... Read More about An estimation of distribution algorithm with intelligent local search for rule-based nurse rostering.

Idiotypic Immune Networks in Mobile-Robot Control (2007)
Journal Article
Whitbrook, A., Aickelin, U., & Garibaldi, J. (2007). Idiotypic Immune Networks in Mobile-Robot Control. IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics, 37(6), 1581-1598. https://doi.org/10.1109/tsmcb.2007.907334

Jerne's idiotypic network theory postulates that the immune response involves inter-antibody stimulation and suppression as well as matching to antigens. The theory has proved the most popular Artificial Immune System (AIS) model for incorporation in... Read More about Idiotypic Immune Networks in Mobile-Robot Control.

Towards improving the utilization of university teaching space (2007)
Journal Article
Beyrouthy, C., Burke, E. K., Landa-Silva, D., McCollum, B., McMullan, P., & Parkes, A. J. (2009). Towards improving the utilization of university teaching space. Journal of the Operational Research Society, 60(1), 130-143. https://doi.org/10.1057/palgrave.jors.2602523

There is a perception that teaching space in universities is a rather scarce resource. However, some studies have revealed that in many institutions it is actually chronically under-used. Often, rooms are occupied only half the time, and even when in... Read More about Towards improving the utilization of university teaching space.

Obtaining better non-dominated sets using volume dominance (2007)
Conference Proceeding
Le, K., & Landa-Silva, D. (2007). Obtaining better non-dominated sets using volume dominance. In 2007 IEEE Congress on Evolutionary Computation, (3119-3126). https://doi.org/10.1109/CEC.2007.4424870

An important goal in multiobjective optimisation is to And a good set of non-dominated solutions that is both well-distributed and well-converged. Most multiobjective optimisation algorithms use the conventional Pareto dominance relationship. Over re... Read More about Obtaining better non-dominated sets using volume dominance.

Immune system approaches to intrusion detection - a review (2007)
Journal Article
Kim, J., Bentley, P., Aickelin, U., Greensmith, J., Tedesco, G., & Twycross, J. (2007). Immune system approaches to intrusion detection - a review. Natural Computing, 6(4), 413-466

The use of artificial immune systems in intrusion detection is an appealing concept for two reasons. Firstly, the human immune system provides the human body with a high level of protection from invading pathogens, in a robust, self-organised and dis... Read More about Immune system approaches to intrusion detection - a review.

Sensing Danger: Innate Immunology for Intrusion Detection (2007)
Journal Article
Aickelin, U., & Greensmith, J. (2007). Sensing Danger: Innate Immunology for Intrusion Detection. Information Security Technical Report, 12(4), 218-227. https://doi.org/10.1016/j.istr.2007.10.003

The immune system provides an ideal metaphor for anomaly detection in general and computer security in particular. Based on this idea, artificial immune systems have been used for a number of years for intrusion detection, unfortunately so far with l... Read More about Sensing Danger: Innate Immunology for Intrusion Detection.

Asynchronous cooperative local search for the office-space-allocation problem (2007)
Journal Article
Landa-Silva, D., & Burke, D. K. (2007). Asynchronous cooperative local search for the office-space-allocation problem. INFORMS Journal on Computing, 19(4), 575-587. https://doi.org/10.1287/ijoc.1060.0200

We investigate cooperative local search to improve upon known results of the office-space-allocation problem in universities and other organizations. A number of entities (e.g., research students, staff, etc.) must be allocated into a set of rooms so... Read More about Asynchronous cooperative local search for the office-space-allocation problem.

Modelling and Animation of Brittle Fracture in Three Dimensions (2007)
Thesis
Kucukyilmaz, A. (2007). Modelling and Animation of Brittle Fracture in Three Dimensions. (Masters). Retrieved from https://nottingham-repository.worktribe.com/output/4040521

This thesis describes a system for simulating fracture in brittle objects. The system combines rigid body simulation methods with a constraint-based model to animate fracturing of arbitrary polyhedral shaped objects under impact. The objects are repr... Read More about Modelling and Animation of Brittle Fracture in Three Dimensions.

Understanding Retail Productivity by Simulating Management Practices (2007)
Conference Proceeding
Siebers, P., Aickelin, U., Celia, H., & Clegg, C. (2007). Understanding Retail Productivity by Simulating Management Practices.

Intelligent agents offer a new and exciting way of understanding the world of work. In this paper we apply agent-based modeling and simulation to investigate a set of problems in a retail context. Specifically, we are working to understand the relati... Read More about Understanding Retail Productivity by Simulating Management Practices.

Speculative document evaluation (2007)
Conference Proceeding
Macdonald, A. J., Brailsford, D. F., Bagley, S. R., & Lumley, J. (2007). Speculative document evaluation.

Optimisation of real world Variable Data printing (VDP) documents is a dicult problem because the interdependencies between layout functions may drastically reduce the number of invariant blocks that can be factored out for pre-rasterisation. This... Read More about Speculative document evaluation.

An estimation of distribution algorithm for nurse scheduling (2007)
Journal Article
Aickelin, U., & Li, J. (2007). An estimation of distribution algorithm for nurse scheduling. Annals of Operations Research, 155(1), 289-309. https://doi.org/10.1007/s10479-007-0214-0

Schedules can be built in a similar way to a human scheduler by using a set of rules that involve domain knowledge. This paper presents an Estimation of Distribution Algorithm (EDA) for the nurse scheduling problem, which involves choosing a suitable... Read More about An estimation of distribution algorithm for nurse scheduling.

Wavelet and multiwavelet watermarking (2007)
Journal Article
Serdean, C., Ibrahim, M., Moemeni, A., & Al-Akaidi, M. (2007). Wavelet and multiwavelet watermarking. IET Image Processing, 1(2), 223-230. https://doi.org/10.1049/iet-ipr%3A20060214

The main objective of the paper is to provide a like-with-like performance comparison between the wavelet domain and the multiwavelet domain watermarking, under a variety of attacks. The investigation is restricted to balanced multiwavelets. Furtherm... Read More about Wavelet and multiwavelet watermarking.

Rule Generalisation in Intrusion Detection Systems using Snort (2007)
Journal Article
Aickelin, U., Twycross, J., & Hesketh-Roberts, T. (2007). Rule Generalisation in Intrusion Detection Systems using Snort. International Journal of Electronic Security and Digital Forensics, 1(1), 101-116. https://doi.org/10.1504/IJESDF.2007.013596

Intrusion Detection Systems (IDSs) provide an important layer of security for computer systems and networks, and are becoming more and more necessary as reliance on Internet services increases and systems with sensitive data are more commonly open to... Read More about Rule Generalisation in Intrusion Detection Systems using Snort.

Enabling rapid and cost-effective creation of massive pervasive games in very unstable environments (2007)
Conference Proceeding
Wietrzyk, B., & Radenkovic, M. (2007). Enabling rapid and cost-effective creation of massive pervasive games in very unstable environments. In 2007 Fourth Annual Conference on Wireless on Demand Network Systems and Services. https://doi.org/10.1109/WONS.2007.340493

Pervasive gaming is a new form of multimedia entertainment that extends the traditional computer gaming experience out into the real world. Through a combination of personal devices, positioning systems and other sensors, combined with wireless netwo... Read More about Enabling rapid and cost-effective creation of massive pervasive games in very unstable environments.

An affine invariant function using PCA bases with an application to within-class object recognition (2007)
Conference Proceeding
Tzimiropoulos, G., Mitianoudis, N., & Stathaki, T. (2007). An affine invariant function using PCA bases with an application to within-class object recognition.

The problem of shape-based recognition of objects under affine transformations is considered. We focus on the construction of a robust and highly discriminative affine invariant function that can be used for within-class object recognition applicatio... Read More about An affine invariant function using PCA bases with an application to within-class object recognition.

Robust recognition of planar shapes under affine transforms using principal component analysis (2007)
Journal Article
Tzimiropoulos, G., Mitianoudis, N., & Stathaki, T. (2007). Robust recognition of planar shapes under affine transforms using principal component analysis. IEEE Signal Processing Letters, 14(10), https://doi.org/10.1109/LSP.2007.896434

A scheme, based on Principal Component Analysis (PCA), is proposed that can be used for the recognition of 2D planar shapes under affine transformations. A PCA step is first used to map the object boundary to its canonical form, reducing the problem... Read More about Robust recognition of planar shapes under affine transforms using principal component analysis.

Extracting reusable document components for variable data printing (2007)
Conference Proceeding
Bagley, S. R., Brailsford, D. F., & Ollis, J. A. (2007). Extracting reusable document components for variable data printing.

Variable Data Printing (VDP) has brought new flexibility and dynamism to the printed page. Each printed instance of a specific class of document can now have different degrees of customized content within the document template. This flexibility co... Read More about Extracting reusable document components for variable data printing.

A graph-based hyper heuristic for timetabling problems (2007)
Journal Article
Burke, E., MacCloumn, B., Meisels, A., Petrovic, S., & Qu, R. (2007). A graph-based hyper heuristic for timetabling problems. European Journal of Operational Research, 176(1), https://doi.org/10.1016/j.ejor.2005.08.012

This paper presents an investigation of a simple generic hyper-heuristic approach upon a set of widely used constructive heuristics (graph coloring heuristics) in timetabling. Within the hyperheuristic framework, a Tabu Search approach is employed to... Read More about A graph-based hyper heuristic for timetabling problems.