Date


School

Output Type

Download Available

33 results

Employing a Machine Learning Approach to Detect Combined Internet of Things Attacks Against Two Objective Functions Using a Novel Dataset

Journal Article
Foley, J., Moradpoor, N., & Ochen, H. (2020)
Employing a Machine Learning Approach to Detect Combined Internet of Things Attacks Against Two Objective Functions Using a Novel Dataset. Security and Communication Networks, 2020, 1-17. https://doi.org/10.1155/2020/2804291
One of the important features of Routing Protocol for Low-Power and Lossy Networks (RPL) is Objective Function (OF). OF influences an IoT network in terms of routing strategie...

A Review on Deep Learning Approaches to Image Classification and Object Segmentation

Journal Article
Wu, H., Liu, Q., & Liu, X. (2019)
A Review on Deep Learning Approaches to Image Classification and Object Segmentation. Computers, Materials & Continua, 60(2), 575-597. https://doi.org/10.32604/cmc.2019.03595
Deep learning technology has brought great impetus to artificial intelligence, especially in the fields of image processing, pattern and object recognition in recent years. Pr...

Trusting Intelligent Machines: Deepening Trust Within Socio-Technical Systems

Journal Article
Andras, P., Esterle, L., Guckert, M., Anh Han, T., Lewis, P. R., Milanovic, K., …Wells, S. (2018)
Trusting Intelligent Machines: Deepening Trust Within Socio-Technical Systems. IEEE technology & society magazine, 37(4), 76-83. https://doi.org/10.1109/MTS.2018.2876107
Intelligent machines have reached capabilities that go beyond a level that a human being can fully comprehend without sufficiently detailed understanding of the underlying mec...

Use of machine learning techniques to model wind damage to forests

Journal Article
Hart, E., Sim, K., Kamimura, K., Meredieu, C., Guyon, D., & Gardiner, B. (2019)
Use of machine learning techniques to model wind damage to forests. Agricultural and forest meteorology, 265, 16-29. https://doi.org/10.1016/j.agrformet.2018.10.022
This paper tested the ability of machine learning techniques, namely artificial neural networks and random forests, to predict the individual trees within a forest most at r...

Modelling enduring institutions: The complementarity of evolutionary and agent-based approaches

Journal Article
Powers, S. T., Ekárt, A., & Lewis, P. R. (2018)
Modelling enduring institutions: The complementarity of evolutionary and agent-based approaches. Cognitive Systems Research, 52, 67-81. https://doi.org/10.1016/j.cogsys.2018.04.012
Empirical work has shown that societies can sometimes avoid antisocial outcomes , such as the Tragedy of the Commons, by establishing institutional rules that govern their int...

The institutional approach for modeling the evolution of human societies

Journal Article
Powers, S. T. (2018)
The institutional approach for modeling the evolution of human societies. Artificial Life, 24(1), 10-28. https://doi.org/10.1162/ARTL_a_00251
Artificial Life is concerned with understanding the dynamics of human societies. A defining feature of any society is its institutions. However, defining exactly what an insti...

A hyper-heuristic ensemble method for static job-shop scheduling.

Journal Article
Hart, E., & Sim, K. (2016)
A hyper-heuristic ensemble method for static job-shop scheduling. Evolutionary Computation, 24(4), 609-635. https://doi.org/10.1162/EVCO_a_00183
We describe a new hyper-heuristic method NELLI-GP for solving job-shop scheduling problems (JSSP) that evolves an ensemble of heuristics. The ensemble adopts a divide-and-conq...

Comparative Evaluation of Radio and Audio Logo Sound Designs

Journal Article
McGregor, I., & Cunningham, S. (2015)
Comparative Evaluation of Radio and Audio Logo Sound Designs. Journal of the Audio Engineering Society, 63(11), 876-888. https://doi.org/10.17743/jaes.2015.0076
This study aims to explore the suitability of capturing designers’ and listeners’ experiences of sound design for a radio drama and audio logos using the repertory grid techni...

A Pattern Recognition Neural Network Model for Detection and Classification of SQL Injection Attacks

Journal Article
Moradpoor Sheykhkanloo, N. (2015)
A Pattern Recognition Neural Network Model for Detection and Classification of SQL Injection Attacks. International Journal of Computer, Electrical, Automation, Control and Information Engineering, 9(6), 1443-1453
Thousands of organisations store important and confidential information related to them, their customers, and their business partners in databases all across the world. The st...

The limits of pretending

Journal Article
Turner, P., Hetherington, R., Turner, S., & Kosek, M. (2015)
The limits of pretending. Digital Creativity, 26(3-4), 304-317. https://doi.org/10.1080/14626268.2015.1091778
We propose that pretending is a cognitive faculty which enables us to create and immerse ourselves in possible worlds. These worlds range from the veridical to the fantastic a...