Skip to main content

Research Repository

Advanced Search

All Outputs (22)

Richard II and the Fiction of Majority Rule (2008)
Book Chapter
Dodd, G. (2008). Richard II and the Fiction of Majority Rule. In C. Beem (Ed.), The Royal Minorities of Medieval and Early Modern England, 103-159. Palgrave Macmillan. doi:10.1057/9780230616189_4

For Thomas Walsingham, one of the first occasions when Richard II revealed the true nature of his rule came in the Summer of 1383 when, accompanied by his new queen, he went on a “shrine-crawl” of the eastern counties, imposing himself and his househ... Read More about Richard II and the Fiction of Majority Rule.

Using technology in health promotion interventions (2008)
Book Chapter
Blake, H. (2008). Using technology in health promotion interventions. In Life style and health research, 17-76. Nova Science Publishers

Improving health in the general population is key to government policy and essential to address the increasing prevalence of non-communicable disease in our society. Whether aiming to improve health at the individual, community, regional or national... Read More about Using technology in health promotion interventions.

Multiple-Scale Hierarchical Connectivity of Cortical Networks Limits the Spread of Activity (2008)
Book Chapter
Kaiser, M. (2008). Multiple-Scale Hierarchical Connectivity of Cortical Networks Limits the Spread of Activity. In Computational Neuroscience in Epilepsy (132-140). https://doi.org/10.1016/B978-012373649-9.50012-0

The anatomy of the brain that cortical architecture and connections are organized in a hierarchical and modular way, from cellular microcircuits in cortical columns at the lowest level, via cortical areas at the intermediate level, to clusters of hig... Read More about Multiple-Scale Hierarchical Connectivity of Cortical Networks Limits the Spread of Activity.

An Immune Inspired Approach to Anomaly Detection (2008)
Book Chapter
Twycross, J., & Aickelin, U. (2009). An Immune Inspired Approach to Anomaly Detection. In Handbook of Research on Information Assurance and Security (109-121). IDEAS Publishing

The immune system provides a rich metaphor for computer security: anomaly detection that works in nature should work for machines. However, early artificial immune system approaches for computer security had only limited success. Arguably, this was d... Read More about An Immune Inspired Approach to Anomaly Detection.

A simple evolutionary algorithm with self-adaptation for multi-objective nurse scheduling (2008)
Book Chapter
Landa-Silva, D., & Le, K. N. (2008). A simple evolutionary algorithm with self-adaptation for multi-objective nurse scheduling. In Adaptive and Multilevel Metaheuristics, (133-155). Springer Verlag. https://doi.org/10.1007/978-3-540-79438-7_7

We present a multi-objective approach to tackle a real-world nurse scheduling problem using an evolutionary algorithm. The aim is to generate a few good quality non-dominated schedules so that the decision-maker can select the most appropriate one. O... Read More about A simple evolutionary algorithm with self-adaptation for multi-objective nurse scheduling.

Introduction to Multi-Agent Simulation (2008)
Book Chapter
Siebers, P., & Aickelin, U. (2008). Introduction to Multi-Agent Simulation. In F. Adam, & P. Humphreys (Eds.), Encyclopedia of Decision Making and Decision Support Technologies. IGI Global

When designing systems that are complex, dynamic and stochastic in nature, simulation is generally recognised as one of the best design support technologies, and a valuable aid in the strategic and tactical decision making process. A simulation model... Read More about Introduction to Multi-Agent Simulation.

Adaptive and assortative mating scheme for evolutionary multi-objective algorithms (2008)
Book Chapter
Le, K., & Landa-Silva, D. (2008). Adaptive and assortative mating scheme for evolutionary multi-objective algorithms. In Artificial Evolution: 8th International Conference, Evolution Artificielle, EA 2007, Tours, France, October 29-31, 2007, Revised Selected Papers, (172-183). Springer Verlag. https://doi.org/10.1007/978-3-540-79305-2_15

We are interested in the role of restricted mating schemes in the context of evolutionary multi-objective algorithms. In this paper, we propose an adaptive assortative mating scheme that uses similarity in the decision space (genotypic assortative ma... Read More about Adaptive and assortative mating scheme for evolutionary multi-objective algorithms.

Multi-Agent Simulation and Management Practices (2008)
Book Chapter
Siebers, P., Aickelin, U., Celia, H., & Clegg, C. (2008). Multi-Agent Simulation and Management Practices. In Encyclopedia of Decision Making and Decision Support Technologies. IGI Global

Intelligent agents offer a new and exciting way of understanding the world of work. Agent-Based Simulation (ABS), one way of using intelligent agents, carries great potential for progressing our understanding of management practices and how they link... Read More about Multi-Agent Simulation and Management Practices.

Heterobranchia II: The Pulmonata (2008)
Book Chapter
Mordan, P., & Wade, C. (2008). Heterobranchia II: The Pulmonata. In W. Ponder (Ed.), Phylogeny and Evolution of the Mollusca (409-426). University of California Press. https://doi.org/10.1525/california/9780520250925.003.0015

This chapter focuses on the Pulmonata, gastropods belonging to the clade Heterobranchia. It explains that the pulmonates include the large majority of land snails and slugs, as well as many freshwater snails and a few small families of estuarine and... Read More about Heterobranchia II: The Pulmonata.

Real-time alert correlation with type graphs (2008)
Book Chapter
Tedesco, G., & Aickelin, U. (2008). Real-time alert correlation with type graphs. In R. Sekar, & A. K. Pujari (Eds.), Information systems security: 4th international conference, ICISS 2008, Hyderabad, India, December 16-20, 2008: proceedings /. Springer

The premise of automated alert correlation is to accept that false alerts from a low level intrusion detection system are inevitable and use attack models to explain the output in an understandable way. Several algorithms exist for this purpose whic... Read More about Real-time alert correlation with type graphs.

Changing international health policy and changing international development goals (2008)
Book Chapter
Pupavac, V. (2008). Changing international health policy and changing international development goals. In D. Wainwright (Ed.), A sociology of health. Sage

The World Health Organisation (WHO) was founded in 1948 with a remit to promote public health around the world. The WHO’s constitution sets out its objective as ‘the attainment by all peoples of the highest possible level of health’ (WHO, 1948). The... Read More about Changing international health policy and changing international development goals.

The Definition of Curriculum Areas in Occupational Health Psychology (2008)
Book Chapter
Houdmont, J., Leka, S., & Bulger, C. (2008). The Definition of Curriculum Areas in Occupational Health Psychology. In Occupational Health Psychology: European Perspectives on Research, Education and Practice. Nottingham University Press

Across the international educational landscape, numerous higher education institutions (HEIs) offer postgraduate programmes in occupational health psychology (OHP). These seek to empower the next generation of OHP practitioners with the knowledge and... Read More about The Definition of Curriculum Areas in Occupational Health Psychology.

Further exploration of the Dendritic Cell Algorithm: antigen multiplier and time windows (2008)
Book Chapter
Gu, F., Greensmith, J., & Aickelin, U. (2008). Further exploration of the Dendritic Cell Algorithm: antigen multiplier and time windows. In P. Bentley, D. Lee, & S. Jung (Eds.), Artificial immune systems: 7th international conference, ICARIS 2008, Phuket, Thailand, August 10-13, 2008: proceedings. Springer

As an immune-inspired algorithm, the Dendritic Cell Algorithm (DCA), produces promising performance in the field of anomaly detection. This paper presents the application of the DCA to a standard data set, the KDD 99 data set. The results of differen... Read More about Further exploration of the Dendritic Cell Algorithm: antigen multiplier and time windows.

Nanoscale characterisation of MBE-grown GaMnN / (001) GaAs (2008)
Book Chapter
Fay, M. W., Han, Y., Novikov, S. V., Edmonds, K., Gallagher, B., Campion, R., …Brown, P. D. (2008). Nanoscale characterisation of MBE-grown GaMnN / (001) GaAs. In A. Cullis, & P. Midgley (Eds.), Microscopy of semiconducting materials 2007: proceedings of the 15th conference, 2-5 April 2007, Cambridge, UK. Springer-Verlag

The growth of cubic (Ga,Mn)N/(001)GaAs heterostructures by plasma assisted molecular beam epitaxy has been appraised as a function of Ga:N ratio, Mn concentration and growth temperature. The combined analytical techniques of EFTEM, EDX, CBED and dark... Read More about Nanoscale characterisation of MBE-grown GaMnN / (001) GaAs.