Skip to main content

Research Repository

Advanced Search

All Outputs (66)

Attributes for causal inference in electronic healthcare databases (2013)
Presentation / Conference Contribution
Reps, J., Garibaldi, J. M., Aickelin, U., Soria, D., Gibson, J. E., & Hubbard, R. B. Attributes for causal inference in electronic healthcare databases. Presented at CBMS 2013, The 26th IEEE International Symposium on Computer-Based Medical Systems, Porto

Side effects of prescription drugs present a serious issue.
Existing algorithms that detect side effects generally
require further analysis to confirm causality. In this paper
we investigate attributes based on the Bradford-Hill causality criteria... Read More about Attributes for causal inference in electronic healthcare databases.

Measuring the directional distance between fuzzy sets (2013)
Presentation / Conference Contribution
McCulloch, J., Wagner, C., & Aickelin, U. Measuring the directional distance between fuzzy sets. Presented at UKCI 2013, the 13th Annual Workshop on Computational Intelligence

The measure of distance between two fuzzy sets is a fundamental tool within fuzzy set theory. However, current distance measures within the literature do not account for the direction of change between fuzzy sets; a useful concept in a variety of app... Read More about Measuring the directional distance between fuzzy sets.

Wavelet feature extraction and genetic algorithm for biomarker detection in colorectal cancer data (2013)
Journal Article
Liu, Y., Aickelin, U., Feyereisl, J., & Durrant, L. G. (2013). Wavelet feature extraction and genetic algorithm for biomarker detection in colorectal cancer data. Knowledge-Based Systems, 37, https://doi.org/10.1016/j.knosys.2012.09.011

Biomarkers which predict patient’s survival can play an important role in medical diagnosis and
treatment. How to select the significant biomarkers from hundreds of protein markers is a key step in
survival analysis. In this paper a novel method is... Read More about Wavelet feature extraction and genetic algorithm for biomarker detection in colorectal cancer data.

The under-performing unfold: a new approach to optimising corecursive programs (2013)
Presentation / Conference Contribution
Hackett, J., Hutton, G., & Jaskelioff, M. The under-performing unfold: a new approach to optimising corecursive programs. Presented at International Symposium on Implementation and Application of Functional Languages (25th)

This paper presents a new approach to optimising corecursive programs by factorisation. In particular, we focus on programs written using the corecursion operator unfold. We use and expand upon the proof techniques of guarded coinduction and unfold f... Read More about The under-performing unfold: a new approach to optimising corecursive programs.

User requirements for the development of smartphone self-reporting applications in healthcare (2013)
Presentation / Conference Contribution
Craven, M. P., Selvarajah, K., Miles, R., Schnädelbach, H., Massey, A., Vedhara, K., Raine-Fenning, N., & Crowe, J. User requirements for the development of smartphone self-reporting applications in healthcare. Presented at HCI International 2013: 15th International Conference

Two case studies of the development of Smartphone self-reporting mHealth applications are described: a wellness diary for asthma management combined with Bluetooth pulse oximeter and manual peak flow measurements; and a questionnaire for ecological a... Read More about User requirements for the development of smartphone self-reporting applications in healthcare.

Towards a more systematic approach to secure systems design and analysis (2013)
Journal Article
Miller, S., Appleby, S., Garibaldi, J. M., & Aickelin, U. (2013). Towards a more systematic approach to secure systems design and analysis. International Journal of Secure Software Engineering, 4(1), https://doi.org/10.4018/jsse.2013010102

The task of designing secure software systems is fraught with uncertainty, as data on uncommon attacks is limited, costs are difficult to estimate, and technology and tools are continually changing. Consequently, experts may interpret the security ri... Read More about Towards a more systematic approach to secure systems design and analysis.