Skip to main content

Research Repository

Advanced Search

All Outputs (95)

Artificial immune systems (2005)
Book Chapter
Aickelin, U., & Dasgupta, D. (2005). Artificial immune systems. In E. K. Burke, & G. Kendall (Eds.), Search Methodologies : Introductory Tutorials in Optimisation, Decision Support Techniques. Springer. https://doi.org/10.1007/0-387-28356-0

The biological immune system is a robust, complex, adaptive system that defends the body from foreign pathogens. It is able to categorize all cells (or molecules) within the body as self-cells or non-self cells. It does this with the help of a distri... Read More about Artificial immune systems.

Hybrid Graph Heuristics within a Hyper-heuristic Approach to Exam Timetabling Problems (2005)
Book Chapter
Burke, E., Dror, M., Petrovic, S., & Qu, R. (2005). Hybrid Graph Heuristics within a Hyper-heuristic Approach to Exam Timetabling Problems. In B. Golden, S. Raghavan, & E. Wasil (Eds.), The Next Wave in Computing, Optimization, and Decision Technologies. Springer

This paper is concerned with the hybridization of two graph coloring heuristics (Saturation Degree and Largest Degree), and their application within a hyperheuristic for exam timetabling problems. Hyper-heuristics can be seen as algorithms which inte... Read More about Hybrid Graph Heuristics within a Hyper-heuristic Approach to Exam Timetabling Problems.

Danger theory: the link between AIS and IDS? (2003)
Book Chapter
Aickelin, U., Bentley, P., Cayzer, S., Kim, J., & McLeod, J. (2003). Danger theory: the link between AIS and IDS?. In J. Timmis, P. Bentley, & E. Hart (Eds.), Artificial immune systems: second international conference, ICARIS 2003, Edinburgh, UK, September 1-3, 2003: proceedings. Springer. https://doi.org/10.1007/978-3-540-45192-1_15

We present ideas about creating a next generation Intrusion Detection System (IDS) based on the latest immunological theories. The central challenge with computer security is determining the difference between normal and potentially harmful activity... Read More about Danger theory: the link between AIS and IDS?.

Case-Based Reasoning as a Heuristic Selector in a Hyper-Heuristic for Course Timetabling Problems (2002)
Book Chapter
Petrovic, S., & Qu, R. (2002). Case-Based Reasoning as a Heuristic Selector in a Hyper-Heuristic for Course Timetabling Problems. In Knowledge-Based Intelligent Information Engineering Systems and Allied Technologies. IOS Press

This paper studies Knowledge Discovery (KD) using Tabu Search and Hill Climbing within Case-Based Reasoning (CBR) as a hyper-heuristic method for course timetabling problems. The aim of the hyper-heuristic is to choose the best heuristic(s) for given... Read More about Case-Based Reasoning as a Heuristic Selector in a Hyper-Heuristic for Course Timetabling Problems.

Three methods to automate the space allocation process in UK universities (2001)
Book Chapter
Burke, E. K., Cowling, P., Landa Silva, J. D., & McCollum, B. (2001). Three methods to automate the space allocation process in UK universities. In Evolutionary Multi-Criterion Optimization: 5th International Conference, EMO 2009, Nantes, France, April 7-10, 2009. Proceedings, (254-273). Springer Verlag. https://doi.org/10.1007/978-3-642-01020-0_38

The space allocation problem within UK universities is highly constrained, has multiple objectives, varies greatly among different institutions, requires frequent modifications and has a direct impact on the functionality of the university. As in eve... Read More about Three methods to automate the space allocation process in UK universities.

An idiotypic immune network as a short-term learning architecture for mobile robots
Book Chapter
Whitbrook, A., Aickelin, U., & Garibaldi, J. M. An idiotypic immune network as a short-term learning architecture for mobile robots. In P. Bentley, D. Lee, & S. Jung (Eds.), Artificial immune systems: 7th international conference, ICARIS 2008, Phuket, Thailand, August 10-13, 2008: proceedings. Springer

A combined Short-Term Learning (STL) and Long-Term Learning (LTL) approach to solving mobile robot navigation problems is presented and tested in both real and simulated environments. The LTL consists of rapid simulations that use a Genetic Algorith... Read More about An idiotypic immune network as a short-term learning architecture for mobile robots.

Optimisation of a crossdocking distribution centre simulation model
Book Chapter
Adewunmi, A., & Aickelin, U. Optimisation of a crossdocking distribution centre simulation model. In Proceedings of the 2008 International Simulation Multi-conference. The Society For Modeling and Simulation International (SCS)

This paper reports on continuing research into the modelling of an order picking process within a Crossdocking distribution centre using Simulation Optimisation. The aim of this project is to optimise a discrete event simulation model and to unde... Read More about Optimisation of a crossdocking distribution centre simulation model.

Modelling Immunological Memory
Book Chapter
Garrett, S., Robbins, M., Walker, J., Wilson, W., & Aickelin, U. Modelling Immunological Memory. In D. Flower, & J. Timmis (Eds.), Silico Immunology. Springer

Accurate immunological models offer the possibility of performing highthroughput experiments in silico that can predict, or at least suggest, in vivo phenomena. In this chapter, we compare various models of immunological memory. We first validate an... Read More about Modelling Immunological Memory.

System dynamics modelling of the processes involving the maintenance of the naive T cell repertoire
Book Chapter
Figueredo, G. P., Aickelin, U., & Whitbrook, A. System dynamics modelling of the processes involving the maintenance of the naive T cell repertoire. In Proceedings of the 9th Annual Workshop on Computational Intelligence (UKCI 2009), Nottingham, UK. Intelligent Modelling & Analysis (IMA)

The study of immune system aging, i.e. immunosenescence, is a relatively new research topic. It deals with understanding the processes of immuno-degradation that indicate signs of functionality loss possibly leading to death. Even though it is not po... Read More about System dynamics modelling of the processes involving the maintenance of the naive T cell repertoire.

The transfer of evolved artificial immune system behaviours between small and large scale robotic platforms
Book Chapter
Whitbrook, A., Aickelin, U., & Garibaldi, J. M. The transfer of evolved artificial immune system behaviours between small and large scale robotic platforms. In P. Collet, N. Monmarché, P. Legrand, M. Schoenauer, & E. Lutton (Eds.), Artificial evolution: 9th International Conference = Evolution Artificielle, EA 2009: Strasbourg, France, October 26-28, 2009: revised selected papers. Springer

This paper demonstrates that a set of behaviours evolved in simulation on a miniature robot (epuck) can be transferred to a much larger scale platform (a virtual Pioneer P3-DX) that also differs in shape, sensor type, sensor configuration and progra... Read More about The transfer of evolved artificial immune system behaviours between small and large scale robotic platforms.

Can background baroque music help to improve the memorability of graphical passwords?
Book Chapter
Gao, H., Chang, X., Ren, Z., Aickelin, U., & Wang, L. Can background baroque music help to improve the memorability of graphical passwords?. In A. Campilho, & M. Kamel (Eds.), Image analysis and recognition: 7th international conference, ICIAR 2010, Povoa de Varzim, Portugal, June 21-23, 2010: proceedings. Springer. https://doi.org/10.1007/978-3-642-13775-4_38

Graphical passwords have been proposed as an alternative to alphanumeric passwords with their advantages in usability and security. However,they still tend to follow predictable patterns that are easier for attackers to exploit,probably due to users’... Read More about Can background baroque music help to improve the memorability of graphical passwords?.

Human-data interaction
Book Chapter
Mortier, R., Haddadi, H., Henderson, T., McAuley, D., Crowcroft, J., & Crabtree, A. (in press). Human-data interaction. In The encyclopedia of human-computer interaction. Interaction Design Foundation

We have moved from a world where computing is siloed and specialised, to a world where computing is ubiquitous and everyday. In many, if not most, parts of the world, networked computing is now mundane as both foreground (e.g., smartphones, tablets)... Read More about Human-data interaction.

Self-organizing maps in computer security
Book Chapter
Feyereisl, J., & Aickelin, U. (in press). Self-organizing maps in computer security. In R. D. Hopkins, & W. P. Tokere (Eds.), Self-organizing maps in computer security: intrusion, detection and prevention. Nova Science

Bayesian Optimisation Algorithm for Nurse Scheduling, Scalable Optimization via Probabilistic Modeling
Book Chapter
Li, J., & Aickelin, U. Bayesian Optimisation Algorithm for Nurse Scheduling, Scalable Optimization via Probabilistic Modeling. In M. Pelikan, K. Sastry, & E. Cantu-Paz (Eds.), Algorithms to Applications (Studies in Computational Intelligence). Springer

Our research has shown that schedules can be built mimicking a human scheduler by using a set of rules that involve domain knowledge. This chapter presents a Bayesian Optimization Algorithm (BOA) for the nurse scheduling problem that chooses such su... Read More about Bayesian Optimisation Algorithm for Nurse Scheduling, Scalable Optimization via Probabilistic Modeling.