25 results

Representing temporal relationships between events and their effects.

Conference Proceeding
Ma, J., Knight, B., & Peng, T. (1996)
Representing temporal relationships between events and their effects. In Proc. of the 4th Workshop on Temporal Representation and Reasoning, 148-152. doi:10.1109/TIME.1997.600796
Temporal relationships between events and their effects are complex. As the ejjects of a given event, a proposition may change its truth value immediately after the occurrence...

A comparison of techniques for name matching

Journal Article
Peng, T., Li, L., & Kennedy, J. (2012)
A comparison of techniques for name matching. GSTF journal on computing, 2,
Information explosion is a problem for everyone nowadays. It is a great challenge to all kinds of businesses to maintain high quality of data in their information applications...

Dimensional analysis based causal ordering

Conference Proceeding
Shen, Q., Peng, T., & Milne, R. (1998)
Dimensional analysis based causal ordering. In Proceedings of the 13th International Workshop on Qualitative Reasoning, 193-202
This paper presents a novel approach for generating causal dependencies between system variables, from an acausal description of the system behaviour, and for identifying the ...

Towards a Synthetic Data Generator for Matching Decision Trees

Conference Proceeding
Peng, T., & Hanke, F. (2016)
Towards a Synthetic Data Generator for Matching Decision Trees. In Proceedings of the 18th International Conference on Enterprise Information Systems. , (135-141). https://doi.org/10.5220/0005829001350141
It is popular to use real-world data to evaluate or teach data mining techniques. However, there are some disadvantages to use real-world data for such purposes. Firstly, real...

The VoIP intrusion detection through a LVQ-based neural network.

Presentation / Conference
Zheng, L., & Peng, T. (2009, November)
The VoIP intrusion detection through a LVQ-based neural network. Paper presented at The 4th International Conference for Internet Technology and Secured Transactions, London, UK
Being a fast-growing Internet application, Voice over Internet Protocol shares the network resources with the regular Internet traffic. However it is susceptible to the existi...

Multi-Objective Evolutionary Optimisation for Prototype-Based Fuzzy Classifiers

Journal Article
Gu, X., Li, M., Shen, L., Tang, G., Ni, Q., Peng, T., & Shen, Q. (in press)
Multi-Objective Evolutionary Optimisation for Prototype-Based Fuzzy Classifiers. IEEE Transactions on Fuzzy Systems, https://doi.org/10.1109/tfuzz.2022.3214241
Evolving intelligent systems (EISs), particularly, the zero-order ones have demonstrated strong performance on many real-world problems concerning data stream classification, ...

Visualization of Online Datasets

Conference Proceeding
Peng, T., & Downie, C. (2017)
Visualization of Online Datasets. In Proceedings of 15th IEEE/ACIS International Conference on Software Engineering Research, Management and Application (SERA). , (239-246
As computing technology advances, computers are being used to orchestrate and advance wide spectrums of commercial and personal life, an element even more significant as we im...

Feature selection Inspired classifier ensemble reduction.

Journal Article
Diao, R., Chao, F., Peng, T., Snooke, N., & Shen, Q. (2014)
Feature selection Inspired classifier ensemble reduction. IEEE Transactions on Cybernetics, 44, 1259-1268. https://doi.org/10.1109/TCYB.2013.2281820
Classifier ensembles constitute one of the main research directions in machine learning and data mining. The use of multiple classifiers generally allows better predictive per...

An Approach to a Laser-Touchscreen System

Book Chapter
Aizeboje, J., & Peng, T. (2016)
An Approach to a Laser-Touchscreen System. In Enterprise Information Systems; Lecture Notes in Business Information Processing (476-495). Cham, Switzerland: Springer. https://doi.org/10.1007/978-3-319-29133-8_23
As modern day technologies advance, so have different methods in which users can interact with computers. Computers are currently being used in combination with devices like p...

Best practice for implementing a data warehouse: a review for strategic alignment.

Conference Proceeding
Weir, R., Peng, T., & Kerridge, J. (2003)
Best practice for implementing a data warehouse: a review for strategic alignment. In Design and Management of Data Warehouses 2003: Proceedings of the 5th Intl. Workshop DMDW'2003, Berlin, Germany, September 8, 2003
A review of literature pertaining to data warehouse implementations over the last eight years has been undertaken. It was found that the views of data warehouse practitioners ...

Date


10 results

A closer look at adaptation mechanisms in simulated environment-driven evolutionary swarm robotics

2013 - 2018
Swarm robotics is a special case within the general field of robotics. The distributed nature makes it...
Dr Andreas Steyven | Director of Studies: Prof Emma Hart | Second Supervisor: Prof Ben Paechter

Test-bed and evaluation of a home-based adverse event prediction infrastructure

2013 - 2021
The "Frailty Framework" is the development of a next generation health assessment and predictive analysis system. It will...
Adrian Smales | Director of Studies: Prof Bill Buchanan | Second Supervisor: Alistair Lawson

Embedded document security using sticky policies and identity based encryption

2013 - 2019
As we move into storing data within a public cloud infrastructure we reduce the defences and must embed security into the ...
Grzegorz Spyra | Director of Studies: Prof Bill Buchanan | Second Supervisor: Dr Elias Ekonomou

Towards a Novel Multi-Modal Arabic Sentiment Analysis Framework: Integrating Dependency-Grammar Rules and Deep Learning Based Models

2020 - date
Arwa Diwali | Director of Studies: Prof Amir Hussain | Second Supervisor: Dr Taoxin Peng

Privacy-preserving systems around trust and identity within smart phones

2021 - date
Sam Grierson | Director of Studies: Prof Bill Buchanan | Second Supervisor: Dr Craig Thomson

Evolving Robust Behaviours for Robotic Swarms with a Modular Design Approach

2019 - date
Kirsty Montague | Director of Studies: Prof Emma Hart | Second Supervisor: Prof Ben Paechter

Reliable and energy efficient mechanisms for wireless sensor networks

2013 - 2019
Mr Alsnousi Ali | Director of Studies: Prof Ahmed Al-Dubai | Second Supervisor: Dr Imed Romdhani

A new approach to engineering secure microservices-in IoT applications with blockchain and distributed ledger technologies

2021 - date
Chukwunonso Ngwu | Director of Studies: Dr Zakwan Jaroucheh | Second Supervisor: Prof Ahmed Al-Dubai

Data quality and data cleaning in database applications

2008 - 2012
Today, data plays an important role in people’s daily activities. With the help of some database applications such as decision support systems an...
Lin Li | Director of Studies: Dr Taoxin Peng | Second Supervisor: Prof Jessie Kennedy

A configuration approach for selecting a data warehouse architecture

2002 - 2008
Hollie (Brown) | Director of Studies: Prof Jon Kerridge | Second Supervisor: Dr Taoxin Peng

Date


Date