Skip to main content

Research Repository

Advanced Search

All Outputs (2322)

The Application of a Dendric Cell Algorithm to a Robotic Classifier
Presentation / Conference Contribution
Oates, R., Greensmith, J., Aickelin, U., Garibaldi, J., & Kendall, G. The Application of a Dendric Cell Algorithm to a Robotic Classifier. Presented at Proceedings of the 6th International Conference on Artificial Immune Systems (ICARIS 2007)

The dendritic cell algorithm is an immune-inspired technique for processing time-dependant data. Here we propose it as a possible solution for a robotic classification problem. The dendritic cell algorithm is implemented on a real robot and an invest... Read More about The Application of a Dendric Cell Algorithm to a Robotic Classifier.

A Multi-Agent Simulation of Retail Management Practices
Presentation / Conference Contribution
Siebers, P.-O., Aickelin, U., Celia, H., & Clegg, C. A Multi-Agent Simulation of Retail Management Practices. Presented at Proceedings of the Summer Computer Simulation Conference (SCSC 2007)

We apply Agent-Based Modeling and Simulation (ABMS) to investigate a set of problems in a retail context. Specifically, we are working to understand the relationship between human resource management practices and retail productivity. Despite the fac... Read More about A Multi-Agent Simulation of Retail Management Practices.

Using Intelligent Agents to Understand Management Practices and Retail Productivity
Presentation / Conference Contribution
Siebers, P.-O., Aickelin, U., Celia, H., & Clegg, C. Using Intelligent Agents to Understand Management Practices and Retail Productivity. Presented at Proceedings of the Winter Simulation Conference (WSC 2007)

Intelligent agents offer a new and exciting way of understanding the world of work. In this paper we apply agent-based modeling and simulation to investigate a set of problems in a retail context. Specifically, we are working to understand the relati... Read More about Using Intelligent Agents to Understand Management Practices and Retail Productivity.

Biological Inspiration for Artificial Immune Systems
Presentation / Conference Contribution
Twycross, J., & Aickelin, U. Biological Inspiration for Artificial Immune Systems. Presented at Proceedings of the 6th International Conference on Artificial Immune Systems (ICARIS 2007)

Artificial immune systems (AISs) to date have generally been inspired by naive biological metaphors. This has limited the effectiveness of these systems. In this position paper two ways in which AISs could be made more biologically realistic are disc... Read More about Biological Inspiration for Artificial Immune Systems.

Motif detection inspired by immune memory
Journal Article
Wilson, W., Birkin, P., & Aickelin, U. Motif detection inspired by immune memory. Lecture Notes in Artificial Intelligence, 4628, https://doi.org/10.1007/978-3-540-73922-7_24

The search for patterns or motifs in data represents an area of key interest to many researchers. In this paper we present the Motif Tracking Algorithm, a novel immune inspired pattern identification tool that is able to identify variable length unkn... Read More about Motif detection inspired by immune memory.

Detecting Motifs in System Call Sequences
Presentation / Conference Contribution
Wilson, W., Feyereisl, J., & Aickelin, U. Detecting Motifs in System Call Sequences. Presented at Proceedings of the 8th International Workshop on Information Security Applications (WISA 2007)

The search for patterns or motifs in data represents an area of key interest to many researchers. In this paper we present the Motif Tracking Algorithm, a novel immune inspired pattern identification tool that is able to identify unknown motifs which... Read More about Detecting Motifs in System Call Sequences.

Simulation Optimization of the Crossdock Door Assignmnet Problem
Presentation / Conference Contribution
Aickelin, U., & Adewunmi, A. Simulation Optimization of the Crossdock Door Assignmnet Problem. Presented at UK Operational Research Society Simulation Workshop 2006 (SW06)

The purpose of this report is to present the Crossdock Door Assignment Problem, which involves assigning destinations to outbound dock doors of Crossdock centres such that travel distance by material handling equipment is minimized. We propose a two... Read More about Simulation Optimization of the Crossdock Door Assignmnet Problem.

Improved Squeaky Wheel Optimisation for Driver Scheduling
Presentation / Conference Contribution
Aickelin, U., Burke, E., & Li, J. Improved Squeaky Wheel Optimisation for Driver Scheduling. Presented at Proceedings of the 9th International Conference on Parallel Problem Solving from Nature (PPSN IX)

This paper presents a technique called Improved Squeaky Wheel Optimisation (ISWO) for driver scheduling problems. It improves the original Squeaky Wheel Optimisation’s (SWO) effectiveness and execution speed by incorporating two additional steps of S... Read More about Improved Squeaky Wheel Optimisation for Driver Scheduling.

Detecting Botnets Through Log Correlation
Presentation / Conference Contribution
Al-Hammadi, Y., & Aickelin, U. Detecting Botnets Through Log Correlation. Presented at Proceedings of the Workshop on Monitoring, Attack Detection and Mitigation (MonAM 2006)

Botnets, which consist of thousands of compromised machines, can cause a significant threat to other systems by launching Distributed Denial of Service attacks, keylogging, and backdoors. In response to this threat, new effective techniques are neede... Read More about Detecting Botnets Through Log Correlation.

Dempster-Shafer for Anomaly Detection
Presentation / Conference Contribution
Chen, Q., & Aickelin, U. Dempster-Shafer for Anomaly Detection. Presented at Proceedings of the International Conference on Data Mining (DMIN 2006)

In this paper, we implement an anomaly detection system using the Dempster-Shafer method. Using two standard benchmark problems we show that by combining multiple signals it is possible to achieve better results than by using a single signal. We furt... Read More about Dempster-Shafer for Anomaly Detection.

Modelling Immunological Memory
Book Chapter
Garrett, S., Robbins, M., Walker, J., Wilson, W., & Aickelin, U. Modelling Immunological Memory. In D. Flower, & J. Timmis (Eds.), Silico Immunology. Springer

Accurate immunological models offer the possibility of performing highthroughput experiments in silico that can predict, or at least suggest, in vivo phenomena. In this chapter, we compare various models of immunological memory. We first validate an... Read More about Modelling Immunological Memory.

Dendritic Cells for Real-Time Anomaly Detection
Presentation / Conference Contribution
Greensmith, J., & Aickelin, U. Dendritic Cells for Real-Time Anomaly Detection. Presented at Proceedings of the Workshop on Artificial Immune Systems and Immune System Modelling (AISB 2006)

Dendritic Cells (DCs) are innate immune system cells which have the power to activate or suppress the immune system. The behaviour of human DCs is abstracted to form an algorithm suitable for anomaly detection. We test this algorithm on the real-time... Read More about Dendritic Cells for Real-Time Anomaly Detection.

Articulation and Clarification of the Dendric Cell Algorithm
Presentation / Conference Contribution
Greensmith, J., Aickelin, U., & Twycross, J. Articulation and Clarification of the Dendric Cell Algorithm. Presented at Proceedings of the 5th International Conference on Artificial Immune Systems (ICARIS 2006)

The Dendritic Cell algorithm (DCA) is inspired by recent
work in innate immunity. In this paper a formal description of the DCA is given. The DCA is described in detail, and its use as an anomaly detector is illustrated within the context of compute... Read More about Articulation and Clarification of the Dendric Cell Algorithm.

Dendritic Cells for Anomaly Detection
Presentation / Conference Contribution
Greensmith, J., Twycross, J., & Aickelin, U. Dendritic Cells for Anomaly Detection. Presented at Proceedings of the IEEE Congress on Evolutionary Computation (CEC 2006)

Artificial immune systems, more specifically the negative selection algorithm, have previously been applied to intrusion detection. The aim of this research is to develop
an intrusion detection system based on a novel concept in
immunology, the Dan... Read More about Dendritic Cells for Anomaly Detection.

Bayesian Optimisation Algorithm for Nurse Scheduling, Scalable Optimization via Probabilistic Modeling
Book Chapter
Li, J., & Aickelin, U. Bayesian Optimisation Algorithm for Nurse Scheduling, Scalable Optimization via Probabilistic Modeling. In M. Pelikan, K. Sastry, & E. Cantu-Paz (Eds.), Algorithms to Applications (Studies in Computational Intelligence). Springer

Our research has shown that schedules can be built mimicking a human scheduler by using a set of rules that involve domain knowledge. This chapter presents a Bayesian Optimization Algorithm (BOA) for the nurse scheduling problem that chooses such su... Read More about Bayesian Optimisation Algorithm for Nurse Scheduling, Scalable Optimization via Probabilistic Modeling.

A Component Based Heuristic Search Method with AdaptivePerturbations for Hospital Personnel Scheduling
Journal Article
Li, J., Aickelin, U., & Burke, E. A Component Based Heuristic Search Method with AdaptivePerturbations for Hospital Personnel Scheduling

Nurse rostering is a complex scheduling problem that affects hospital personnel on a daily basis all over the world. This paper presents a new component-based approach with adaptive perturbations, for a nurse scheduling problem arising at a major UK... Read More about A Component Based Heuristic Search Method with AdaptivePerturbations for Hospital Personnel Scheduling.

An Immune Network Intrusion Detection System Utilising Correlation Context
Presentation / Conference Contribution
Tedesco, G., & Aickelin, U. An Immune Network Intrusion Detection System Utilising Correlation Context. Presented at Proceedings of the Workshop on Artificial Immune Systems and Immume System Modelling (AISB 2006)

Network Intrusion Detection Systems (NIDS) are computer systems which monitor a network with the aim of discerning malicious from benign activity on that network. While a wide range of approaches have met varying levels of success, most IDSs rely on... Read More about An Immune Network Intrusion Detection System Utilising Correlation Context.

Integrating Innate and Adaptive Immunity for Intrusion Detection
Presentation / Conference Contribution
Tedesco, G., Twycross, J., & Aickelin, U. Integrating Innate and Adaptive Immunity for Intrusion Detection. Presented at Proceedings of the 5th International Conference on Artificial Immune Systems (ICARIS 2006)

Network Intrusion Detection Systems (NIDS) monitor a net-
work with the aim of discerning malicious from benign activity on that network. While a wide range of approaches have met varying levels of success, most IDS’s rely on having access to a data... Read More about Integrating Innate and Adaptive Immunity for Intrusion Detection.

Experimenting with Innate Immunity
Presentation / Conference Contribution
Twycross, J., & Aickelin, U. Experimenting with Innate Immunity. Presented at Proceedings of the Workshop on Artificial Immune Systems and Immune System Modelling (AISB 2006)

libtissue is a software system for implementing and testing AIS algorithms on real-world computer security problems. AIS algorithms are implemented as a collection of cells, antigen and signals interacting within a tissue compartment. Input data to t... Read More about Experimenting with Innate Immunity.

Libtissue - Implementing Innate Immunity
Presentation / Conference Contribution
Twycross, J., & Aickelin, U. Libtissue - Implementing Innate Immunity. Presented at Proceedings of the IEEE Congress on Evolutionary Computation (CEC 2006)

In a previous paper the authors argued the case for incorporating ideas from innate immunity into artificial
immune systems (AISs) and presented an outline for a conceptualframework for such systems. A number of key general properties observed in th... Read More about Libtissue - Implementing Innate Immunity.