Skip to main content

Research Repository

Advanced Search

All Outputs (3398)

An Agent-based Classification Model
Presentation / Conference Contribution
Gu, F., Aickelin, U., & Greensmith, J. An Agent-based Classification Model.

The major function of this model is to access the UCI Wisconsin Breast Cancer data-set[1] and classify the data items into two categories, which are normal and anomalous. This kind of classification can be referred as anomaly detection, which discri... Read More about An Agent-based Classification Model.

Human Behavious Modelling for Discrete Event and Agent Based Simulation: A Case Study
Presentation / Conference Contribution
Majid, M., Aickelin, U., & Siebers, P. Human Behavious Modelling for Discrete Event and Agent Based Simulation: A Case Study.

This study is about the comparison of simulation techniques between Discrete Event Simulation (DES) and Agent Based Simulation (ABS). DES is one of the best-known types of simulation techniques in Operational Research. Recently, there has been an e... Read More about Human Behavious Modelling for Discrete Event and Agent Based Simulation: A Case Study.

The Application of a Dendric Cell Algorithm to a Robotic Classifier
Presentation / Conference Contribution
Oates, R., Greensmith, J., Aickelin, U., Garibaldi, J., & Kendall, G. The Application of a Dendric Cell Algorithm to a Robotic Classifier.

The dendritic cell algorithm is an immune-inspired technique for processing time-dependant data. Here we propose it as a possible solution for a robotic classification problem. The dendritic cell algorithm is implemented on a real robot and an invest... Read More about The Application of a Dendric Cell Algorithm to a Robotic Classifier.

A Multi-Agent Simulation of Retail Management Practices
Presentation / Conference Contribution
Siebers, P., Aickelin, U., Celia, H., & Clegg, C. A Multi-Agent Simulation of Retail Management Practices.

We apply Agent-Based Modeling and Simulation (ABMS) to investigate a set of problems in a retail context. Specifically, we are working to understand the relationship between human resource management practices and retail productivity. Despite the fac... Read More about A Multi-Agent Simulation of Retail Management Practices.

Using Intelligent Agents to Understand Management Practices and Retail Productivity
Presentation / Conference Contribution
Siebers, P., Aickelin, U., Celia, H., & Clegg, C. Using Intelligent Agents to Understand Management Practices and Retail Productivity.

Intelligent agents offer a new and exciting way of understanding the world of work. In this paper we apply agent-based modeling and simulation to investigate a set of problems in a retail context. Specifically, we are working to understand the relati... Read More about Using Intelligent Agents to Understand Management Practices and Retail Productivity.

Simulation Optimization of the Crossdock Door Assignmnet Problem
Presentation / Conference Contribution
Aickelin, U., & Adewunmi, A. (2006). Simulation Optimization of the Crossdock Door Assignmnet Problem.

The purpose of this report is to present the Crossdock Door Assignment Problem, which involves assigning destinations to outbound dock doors of Crossdock centres such that travel distance by material handling equipment is minimized. We propose a two... Read More about Simulation Optimization of the Crossdock Door Assignmnet Problem.

Improved Squeaky Wheel Optimisation for Driver Scheduling
Presentation / Conference Contribution
Aickelin, U., Burke, E., & Li, J. Improved Squeaky Wheel Optimisation for Driver Scheduling.

This paper presents a technique called Improved Squeaky Wheel Optimisation (ISWO) for driver scheduling problems. It improves the original Squeaky Wheel Optimisation’s (SWO) effectiveness and execution speed by incorporating two additional steps of S... Read More about Improved Squeaky Wheel Optimisation for Driver Scheduling.

Articulation and Clarification of the Dendric Cell Algorithm
Presentation / Conference Contribution
Greensmith, J., Aickelin, U., & Twycross, J. Articulation and Clarification of the Dendric Cell Algorithm.

The Dendritic Cell algorithm (DCA) is inspired by recent work in innate immunity. In this paper a formal description of the DCA is given. The DCA is described in detail, and its use as an anomaly detector is illustrated within the context of compute... Read More about Articulation and Clarification of the Dendric Cell Algorithm.

Dendritic Cells for Anomaly Detection
Presentation / Conference Contribution
Greensmith, J., Twycross, J., & Aickelin, U. Dendritic Cells for Anomaly Detection.

Artificial immune systems, more specifically the negative selection algorithm, have previously been applied to intrusion detection. The aim of this research is to develop an intrusion detection system based on a novel concept in immunology, the Dan... Read More about Dendritic Cells for Anomaly Detection.

Rule-based and Resource-bounded: A New Look at Epistemic Logic
Presentation / Conference Contribution
Jago, M. (2006). Rule-based and Resource-bounded: A New Look at Epistemic Logic.

Syntactic logics do not suffer from the problems of logical omniscience but are often thought to lack interesting properties relating to epistemic notions. By focusing on the case of rule-based agents, I develop a framework for modelling resource-bou... Read More about Rule-based and Resource-bounded: A New Look at Epistemic Logic.

Rumours, Bargains and Lies: How to advocate Open Access repositories more successfully
Presentation / Conference Contribution
Johnson, G. J. (2006). Rumours, Bargains and Lies: How to advocate Open Access repositories more successfully.

In this workshop seminar delivered twice at the CoFHE/UCR 2006 conference the author explored aspects relating to successful advocacy of Open Access and repositories. Areas covered included preconceptions on the part of academics and support staff, a... Read More about Rumours, Bargains and Lies: How to advocate Open Access repositories more successfully.

An Immune Network Intrusion Detection System Utilising Correlation Context
Presentation / Conference Contribution
Tedesco, G., & Aickelin, U. An Immune Network Intrusion Detection System Utilising Correlation Context.

Network Intrusion Detection Systems (NIDS) are computer systems which monitor a network with the aim of discerning malicious from benign activity on that network. While a wide range of approaches have met varying levels of success, most IDSs rely on... Read More about An Immune Network Intrusion Detection System Utilising Correlation Context.

Integrating Innate and Adaptive Immunity for Intrusion Detection
Presentation / Conference Contribution
Tedesco, G., Twycross, J., & Aickelin, U. Integrating Innate and Adaptive Immunity for Intrusion Detection.

Network Intrusion Detection Systems (NIDS) monitor a net- work with the aim of discerning malicious from benign activity on that network. While a wide range of approaches have met varying levels of success, most IDS’s rely on having access to a data... Read More about Integrating Innate and Adaptive Immunity for Intrusion Detection.