2024-03-28T14:15:39Zhttp://uobrep.openrepository.com/oai/requestoai:uobrep.openrepository.com:10547/2245182020-04-23T08:42:53Zcom_10547_132192col_10547_132230
Şenyiğit, Ercan
622253f1ea5767c348d4d3d84bb7cc38
-1
Düğenci, Muharrem
607c80e4bc90361dcfdf77767bdf5c91
-1
Aydin, Mehmet Emin
8f4fc37dc7adabfd2df193cf441be46d
-1
Zeydan, Mithat
4acd4b7803b7ccb5652f36ab14e9024a
-1
University of Bedfordshire
2012-05-18T08:13:54Z
2012-05-18T08:13:54Z
2012-05-18
Şenyiğit, E., Düğenci, M., Aydin, M.E. & Zeydan, M. (2012) 'Heuristic-based neural networks for stochastic dynamic lot sizing problem', Applied Soft Computing, .
15684946
10.1016/j.asoc.2012.02.026
http://hdl.handle.net/10547/224518
Applied Soft Computing
This is the final version of the manuscripted accepted before production by the publisher
Multi-period single-item lot sizing problem under stochastic environment has been tackled by few researchers and remains in need of further studies. It is mathematically intractable due to its complex structure. In this paper, an optimum lot-sizing policy based on minimum total relevant cost under price and demand uncertainties was studied by using various artificial neural networks trained with heuristic-based learning approaches; genetic algorithm (GA) and bee algorithm (BA). These combined approaches have been examined with three domain-specific costing heuristics comprising revised silver meal (RSM), revised least unit cost (RLUC), cost benefit (CB). It is concluded that the feed-forward neural network (FF-NN) model trained with BA outperforms the other models with better prediction results. In addition, RLUC is found the best operating domain-specific heuristic to calculate the total cost incurring of the lot-sizing problem. Hence, the best paired heuristics to help decision makers are suggested as RLUC and FF-NN trained with BA.
en
Elsevier
http://linkinghub.elsevier.com/retrieve/pii/S1568494612001196
Archived with thanks to Applied Soft Computing
http://creativecommons.org/licenses/by-nc-nd/4.0/
G400 Computer Science
heuristic-based learning approaches
genetic algorithm
bee algorithm
revised silver meal
revised least unit cost
cost benefit
feed-forward neural network model
neural networks
Heuristic-based neural networks for stochastic dynamic lot sizing problem
Article
2020-04-23T08:42:53Z
Multi-period single-item lot sizing problem under stochastic environment has been tackled by few researchers and remains in need of further studies. It is mathematically intractable due to its complex structure. In this paper, an optimum lot-sizing policy based on minimum total relevant cost under price and demand uncertainties was studied by using various artificial neural networks trained with heuristic-based learning approaches; genetic algorithm (GA) and bee algorithm (BA). These combined approaches have been examined with three domain-specific costing heuristics comprising revised silver meal (RSM), revised least unit cost (RLUC), cost benefit (CB). It is concluded that the feed-forward neural network (FF-NN) model trained with BA outperforms the other models with better prediction results. In addition, RLUC is found the best operating domain-specific heuristic to calculate the total cost incurring of the lot-sizing problem. Hence, the best paired heuristics to help decision makers are suggested as RLUC and FF-NN trained with BA.
ORIGINAL
ASOC-D-12-00047_Final_Copy.pdf
ASOC-D-12-00047_Final_Copy.pdf
final version of the artical before production
application/pdf
423766
https://uobrep.openrepository.com/bitstream/10547/224518/1/ASOC-D-12-00047_Final_Copy.pdf
9ab3e1b1bb4859f9128a4a60b5c290ec
MD5
1
true
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/224518/2/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
2
false
TEXT
ASOC-D-12-00047_Final_Copy.pdf.txt
ASOC-D-12-00047_Final_Copy.pdf.txt
Extracted Text
text/plain
43744
https://uobrep.openrepository.com/bitstream/10547/224518/5/ASOC-D-12-00047_Final_Copy.pdf.txt
a281f2722aac929d9ea0c3501bcadc4f
MD5
5
false
THUMBNAIL
ASOC-D-12-00047_Final_Copy.pdf.jpg
ASOC-D-12-00047_Final_Copy.pdf.jpg
Generated Thumbnail
image/jpeg
2164
https://uobrep.openrepository.com/bitstream/10547/224518/4/ASOC-D-12-00047_Final_Copy.pdf.jpg
2fa119daaf84cd944c35ad4e749cc93d
MD5
4
false
elsevier-thumbnail.png
application/octet-stream
140284
https://uobrep.openrepository.com/bitstream/10547/224518/9/elsevier-thumbnail.png
4b034a9484564e3f2684a03ff06e5999
MD5
9
false
CC-LICENSE
license_url
license_url
text/plain
49
https://uobrep.openrepository.com/bitstream/10547/224518/6/license_url
4afdbb8c545fd630ea7db775da747b2f
MD5
6
false
license_text
license_text
application/octet-stream
0
https://uobrep.openrepository.com/bitstream/10547/224518/7/license_text
d41d8cd98f00b204e9800998ecf8427e
MD5
7
false
license_rdf
license_rdf
application/octet-stream
0
https://uobrep.openrepository.com/bitstream/10547/224518/8/license_rdf
d41d8cd98f00b204e9800998ecf8427e
MD5
8
false
10547/224518
oai:uobrep.openrepository.com:10547/224518
2020-04-23 08:42:53.773
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
Tk9OLUVYQ0xVU0lWRSBESVNUUklCVVRJT04gTElDRU5TRQoKQnkgc2lnbmluZyBhbmQgc3VibWl0dGluZyB0aGlzIGxpY2Vuc2UsIHlvdSAodGhlIGF1dGhvcihzKSBvciBjb3B5cmlnaHQKb3duZXIpIGdyYW50cyB0byB0aGUgVW5pdmVyc2l0eSBvZiBCZWRmb3Jkc2hpcmUgUmVwb3NpdG9yeSAgKFVPQlJFUCkgdGhlIG5vbi1leGNsdXNpdmUgcmlnaHQgdG8gcmVwcm9kdWNlLAp0cmFuc2xhdGUgKGFzIGRlZmluZWQgYmVsb3cpLCBhbmQvb3IgZGlzdHJpYnV0ZSB5b3VyIHN1Ym1pc3Npb24gKGluY2x1ZGluZwp0aGUgYWJzdHJhY3QpIHdvcmxkd2lkZSBpbiBwcmludCBhbmQgZWxlY3Ryb25pYyBmb3JtYXQgYW5kIGluIGFueSBtZWRpdW0sCmluY2x1ZGluZyBidXQgbm90IGxpbWl0ZWQgdG8gYXVkaW8gb3IgdmlkZW8uCgpZb3UgYWdyZWUgdGhhdCBVT0JSRVAgbWF5LCB3aXRob3V0IGNoYW5naW5nIHRoZSBjb250ZW50LCB0cmFuc2xhdGUgdGhlCnN1Ym1pc3Npb24gdG8gYW55IG1lZGl1bSBvciBmb3JtYXQgZm9yIHRoZSBwdXJwb3NlIG9mIHByZXNlcnZhdGlvbi4KCllvdSBhbHNvIGFncmVlIHRoYXQgVU9CUkVQIG1heSBrZWVwIG1vcmUgdGhhbiBvbmUgY29weSBvZiB0aGlzIHN1Ym1pc3Npb24gZm9yCnB1cnBvc2VzIG9mIHNlY3VyaXR5LCBiYWNrLXVwIGFuZCBwcmVzZXJ2YXRpb24uCgpZb3UgcmVwcmVzZW50IHRoYXQgdGhlIHN1Ym1pc3Npb24gaXMgeW91ciBvcmlnaW5hbCB3b3JrLCBhbmQgdGhhdCB5b3UgaGF2ZQp0aGUgcmlnaHQgdG8gZ3JhbnQgdGhlIHJpZ2h0cyBjb250YWluZWQgaW4gdGhpcyBsaWNlbnNlLiBZb3UgYWxzbyByZXByZXNlbnQKdGhhdCB5b3VyIHN1Ym1pc3Npb24gZG9lcyBub3QsIHRvIHRoZSBiZXN0IG9mIHlvdXIga25vd2xlZGdlLCBpbmZyaW5nZSB1cG9uCmFueW9uZSdzIGNvcHlyaWdodC4KCklmIHRoZSBzdWJtaXNzaW9uIGNvbnRhaW5zIG1hdGVyaWFsIGZvciB3aGljaCB5b3UgZG8gbm90IGhvbGQgY29weXJpZ2h0LAp5b3UgcmVwcmVzZW50IHRoYXQgeW91IGhhdmUgb2J0YWluZWQgdGhlIHVucmVzdHJpY3RlZCBwZXJtaXNzaW9uIG9mIHRoZQpjb3B5cmlnaHQgb3duZXIgdG8gZ3JhbnQgVU9CUkVQIHRoZSByaWdodHMgcmVxdWlyZWQgYnkgdGhpcyBsaWNlbnNlLCBhbmQgdGhhdApzdWNoIHRoaXJkLXBhcnR5IG93bmVkIG1hdGVyaWFsIGlzIGNsZWFybHkgaWRlbnRpZmllZCBhbmQgYWNrbm93bGVkZ2VkCndpdGhpbiB0aGUgdGV4dCBvciBjb250ZW50IG9mIHRoZSBzdWJtaXNzaW9uLgoKSUYgVEhFIFNVQk1JU1NJT04gSVMgQkFTRUQgVVBPTiBXT1JLIFRIQVQgSEFTIEJFRU4gU1BPTlNPUkVEIE9SIFNVUFBPUlRFRApCWSBBTiBBR0VOQ1kgT1IgT1JHQU5JWkFUSU9OIE9USEVSIFRIQU4gVEVTVE9SLCBZT1UgUkVQUkVTRU5UIFRIQVQgWU9VIEhBVkUKRlVMRklMTEVEIEFOWSBSSUdIVCBPRiBSRVZJRVcgT1IgT1RIRVIgT0JMSUdBVElPTlMgUkVRVUlSRUQgQlkgU1VDSApDT05UUkFDVCBPUiBBR1JFRU1FTlQuCgpVT0JSRVAgd2lsbCBjbGVhcmx5IGlkZW50aWZ5IHlvdXIgbmFtZShzKSBhcyB0aGUgYXV0aG9yKHMpIG9yIG93bmVyKHMpIG9mIHRoZQpzdWJtaXNzaW9uLCBhbmQgd2lsbCBub3QgbWFrZSBhbnkgYWx0ZXJhdGlvbiwgb3RoZXIgdGhhbiBhcyBhbGxvd2VkIGJ5IHRoaXMKbGljZW5zZSwgdG8geW91ciBzdWJtaXNzaW9uLgo=
oai:uobrep.openrepository.com:10547/2244712020-04-23T08:42:54Zcom_10547_132192col_10547_132230
Aydin, Mehmet Emin
8f4fc37dc7adabfd2df193cf441be46d
-1
Kwan, Raymond
988cf9954db065e19e1cfd54ef91f670
-1
Leung, Cyril
b64476ab53dd63189aaf822d56a843c2
-1
Maple, Carsten
a4dc0842fb0b0b3b6d15dd203a61bd1f
-1
Zhang, Jie
5d16d787b48b3bd6bd9a152177e36bdf
-1
University of Bedfordshire
2012-05-17T16:11:37Z
2012-05-17T16:11:37Z
2012-05-17
Aydin, M.E., Kwan, R., Leung, C., Maple, C. & Zhang, J. (2012) 'A hybrid swarm intelligence algorithm for multiuser scheduling in HSDPA', Applied Soft Computing.
15684946
10.1016/j.asoc.2011.12.007
http://hdl.handle.net/10547/224471
Applied Soft Computing
Multiuser scheduling is an important aspect in the performance optimization of a wireless network since it allows multiple users to access a shared channel efficiently by exploiting multiuser diversity. To perform efficient scheduling, channel state information (CSI) for users is required, and is obtained via their respective feedback channels. In this paper, a more realistic imperfect CSI feedback, in the form of a finite set of Channel Quality Indicator (CQI) values, is assumed as specified in the HSDPA standard. A mathematical model of the problem is developed for use in the optimization process. A hybrid heuristic approach based on particle swarm optimization and simulated annealing is used to solve the problem. Simulation results indicate that the hybrid approach outperforms individual implementations of both simulated annealing and particle swarm optimisation.
en
Elsevier
http://linkinghub.elsevier.com/retrieve/pii/S1568494611004911
Archived with thanks to Applied Soft Computing
http://creativecommons.org/licenses/by-nc-nd/4.0/
multiuser scheduling
wireless networks
channel state information
channel quality indicator
HSDPA
particle swarm optimization
simulated annealing
A hybrid swarm intelligence algorithm for multiuser scheduling in HSDPA
Article
2020-04-23T08:42:53Z
Multiuser scheduling is an important aspect in the performance optimization of a wireless network since it allows multiple users to
access a shared channel efficiently by exploiting multiuser diversity. To perform efficient scheduling, channel state information (CSI) for users is required, and is obtained via their respective feedback channels. In this paper, a more realistic imperfect CSI feedback, in the form of a finite set of Channel Quality Indicator (CQI) values, is assumed as specified in the HSDPA standard. A mathematical model of the problem is developed for use in the optimization process. A hybrid heuristic approach based on particle swarm optimization and simulated annealing is used to solve the problem. Simulation results indicate that the hybrid approach outperforms individual implementations of both simulated annealing and particle swarm optimisation.
ORIGINAL
comboTTI.pdf
comboTTI.pdf
Final version of the paper before production
application/pdf
163931
https://uobrep.openrepository.com/bitstream/10547/224471/1/comboTTI.pdf
313cd409d6deb67b9ad871b37693e4b2
MD5
1
true
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/224471/2/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
2
false
TEXT
comboTTI.pdf.txt
comboTTI.pdf.txt
Extracted Text
text/plain
41388
https://uobrep.openrepository.com/bitstream/10547/224471/5/comboTTI.pdf.txt
9c3f57e7b38fe74b0483d76e73d29d22
MD5
5
false
THUMBNAIL
comboTTI.pdf.jpg
comboTTI.pdf.jpg
Generated Thumbnail
image/jpeg
1743
https://uobrep.openrepository.com/bitstream/10547/224471/4/comboTTI.pdf.jpg
15640582d26feac7e9cfeda002268d01
MD5
4
false
elsevier-thumbnail.png
application/octet-stream
140720
https://uobrep.openrepository.com/bitstream/10547/224471/9/elsevier-thumbnail.png
68ba9eb569e9fbff730c4cad24da049b
MD5
9
false
CC-LICENSE
license_url
license_url
text/plain
49
https://uobrep.openrepository.com/bitstream/10547/224471/6/license_url
4afdbb8c545fd630ea7db775da747b2f
MD5
6
false
license_text
license_text
application/octet-stream
0
https://uobrep.openrepository.com/bitstream/10547/224471/7/license_text
d41d8cd98f00b204e9800998ecf8427e
MD5
7
false
license_rdf
license_rdf
application/octet-stream
0
https://uobrep.openrepository.com/bitstream/10547/224471/8/license_rdf
d41d8cd98f00b204e9800998ecf8427e
MD5
8
false
10547/224471
oai:uobrep.openrepository.com:10547/224471
2020-04-23 08:42:54.029
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
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
oai:uobrep.openrepository.com:10547/2244512020-04-23T08:39:57Zcom_10547_132192col_10547_132230
Aydin, Mehmet Emin
8f4fc37dc7adabfd2df193cf441be46d
-1
Kwan, Raymond
988cf9954db065e19e1cfd54ef91f670
-1
Wu, Joyce
bdd011dc1b0bf612de7be55f24ea49c8
-1
University of Bedfordshire
RanPlan Ltd.
2012-05-17T15:54:19Z
2012-05-17T15:54:19Z
2012-05-17
Aydin, M.E., Kwan, R. & Wu, J. (2012) 'Multiuser scheduling on the LTE downlink with meta-heuristic approaches', Physical Communication.
18744907
10.1016/j.phycom.2012.01.004
http://hdl.handle.net/10547/224451
Physical Communication
en
http://linkinghub.elsevier.com/retrieve/pii/S1874490712000134
Archived with thanks to Physical Communication
Multiuser scheduling on the LTE downlink with meta-heuristic approaches
Article
THUMBNAIL
elsevier-thumbnail.png
application/octet-stream
122797
https://uobrep.openrepository.com/bitstream/10547/224451/2/elsevier-thumbnail.png
2794e0a404c8bbc0d36459f769307606
MD5
2
false
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/224451/1/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
1
false
10547/224451
oai:uobrep.openrepository.com:10547/224451
2020-04-23 08:39:57.983
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
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
oai:uobrep.openrepository.com:10547/2252932020-04-23T07:28:37Zcom_10547_132192col_10547_132230
Aydin, Mehmet Emin
8f4fc37dc7adabfd2df193cf441be46d
-1
University of Bedfordshire
2012-05-22T13:43:15Z
2012-05-22T13:43:15Z
2010-07
Aydin, M. (2010) 'Coordinating metaheuristic agents with swarm intelligence'. Journal of Intelligent Manufacturing
23 (4) pp 991-999
0956-5515
1572-8145
10.1007/s10845-010-0435-y
http://hdl.handle.net/10547/225293
Journal of Intelligent Manufacturing
Coordination of multi agent systems remains as a problem since there is no prominent method suggests any universal solution. Metaheuristic agents are specific implementations of multi-agent systems, which imposes working together to solve optimisation problems using metaheuristic algorithms. An idea for coordinating metaheuristic agents borrowed from swarm intelligence is introduced in this paper. This swarm intelligence-based coordination framework has been implemented as swarms of simulated annealing agents collaborated with particle swarm optimization for multidimensional knapsack problem. A comparative performance analysis is also reported highlighting that the implementation has produced much better results than the previous works.
en
SpringerLink
http://www.springerlink.com/index/10.1007/s10845-010-0435-y
metaheuristic agents
swarm intelligence
particle swarm optimization
simulated annealing
Coordinating metaheuristic agents with swarm intelligence
Animation
Coordination of multi agent systems remains as a problem since there is no prominent method suggests any universal solution. Metaheuristic agents are specific implementations of multi-agent systems, which imposes working together to solve optimisation problems using metaheuristic algorithms. An idea for coordinating metaheuristic agents borrowed from swarm intelligence is introduced in this paper. This swarm intelligence-based coordination framework has been implemented as swarms of simulated annealing agents collaborated with particle swarm optimization for multidimensional knapsack problem. A comparative performance analysis is also reported highlighting that the implementation has produced much better results than the previous works.
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/225293/4/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
4
false
10547/225293
oai:uobrep.openrepository.com:10547/225293
2020-04-23 07:28:37.95
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
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
oai:uobrep.openrepository.com:10547/2252952020-04-23T07:28:39Zcom_10547_132192col_10547_132230
Kwan, Raymond
988cf9954db065e19e1cfd54ef91f670
-1
Aydin, Mehmet Emin
8f4fc37dc7adabfd2df193cf441be46d
-1
Leung, Cyril
b64476ab53dd63189aaf822d56a843c2
-1
Zhang, J.
f4dfd8f82ee60f7283a9963aad431426
-1
2012-05-22T13:46:07Z
2012-05-22T13:46:07Z
2009-08
Kwan, R., Aydin, M., Leung, C. & Zhang, J. (2009) 'Multiuser scheduling in high speed downlink packet access', IET Communications, 3 (8), pp.1363-70.
17518628
10.1049/iet-com.2008.0340
http://hdl.handle.net/10547/225295
IET Communications
Multiuser scheduling is an important aspect in the performance optimisation of a wireless network as it allows multiple users to efficiently access a shared channel by exploiting multiuser diversity. For example, the 3GPP cellular standard supports multiuser scheduling in the high speed downlink packet access (HSDPA) feature. To perform efficient scheduling, channel state information (CSI) for users is required, and is obtained via their respective feedback channels. Multiuser scheduling is studied assuming the availability of perfect CSI, which would require a high bandwidth overhead. A more realistic imperfect CSI feedback in the form of a finite set of channel quality indicator values is assumed, as specified in the HSDPA standard. A global optimal approach and a simulated annealing (CSA) approach are used to solve the optimisation problem. Simulation results suggest that the performances of the two approaches are very close even though the complexity of the simulated annealing (SA) approach is much lower. The performance of a simple greedy approach is found to be significantly worse.
en
IET
http://link.aip.org/link/ICEOCW/v3/i8/p1363/s1&Agg=doi
Archived with thanks to IET Communications
Multiuser scheduling in high speed downlink packet access
Article
Multiuser scheduling is an important aspect in the performance optimisation of a wireless network as it allows multiple users to efficiently access a shared channel by exploiting multiuser diversity. For example, the 3GPP cellular standard supports multiuser scheduling in the high speed downlink packet access (HSDPA) feature. To perform efficient scheduling, channel state information (CSI) for users is required, and is obtained via their respective feedback channels. Multiuser scheduling is studied assuming the availability of perfect CSI, which would require a high bandwidth overhead. A more realistic imperfect CSI feedback in the form of a finite set of channel quality indicator values is assumed, as specified in the HSDPA standard. A global optimal approach and a simulated annealing (CSA) approach are used to solve the optimisation problem. Simulation results suggest that the performances of the two approaches are very close even though the complexity of the simulated annealing (SA) approach is much lower. The performance of a simple greedy approach is found to be significantly worse.
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/225295/4/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
4
false
10547/225295
oai:uobrep.openrepository.com:10547/225295
2020-04-23 07:28:39.064
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
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
oai:uobrep.openrepository.com:10547/2509382020-04-23T07:29:08Zcom_10547_132192col_10547_132230
Kang, Xiaoming
79d9650889f207d1d340850f96aa46ce
-1
Yue, Yong
59d04f0f8e57359fc0492dc893f8df61
-1
Li, Dayou
6295afce2b3b8447f935ff4664ecd492
-1
Maple, Carsten
a4dc0842fb0b0b3b6d15dd203a61bd1f
-1
2012-11-05T09:43:28Z
2012-11-05T09:43:28Z
2011
Genetic algorithm based solution to dead-end problems in robot navigation 2011, 41 (3/4):177-184 International Journal of Computer Applications in Technology
0952-8091
1741-5047
10.1504/IJCAT.2011.042693
http://hdl.handle.net/10547/250938
International Journal of Computer Applications in Technology
In robot navigation, mobile robots can suffer from dead-end problems, that is, they can be stuck in areas which are surrounded by obstacles. Attempts have been reported to avoid a robot entering into such a dead-end area. However, in some applications, for example, rescue work, the dead-end areas must be explored. Therefore, it is vital for the robot to come out from the dead-end areas after exploration. This paper presents an approach which enables a robot to come out from dead-end areas. There are two main parts: a dead-end detection mechanism and a genetic algorithm (GA) based online training mechanism. When the robot realises that it is stuck in a dead-end area, it will operate the online training to produce a new best chromosome that will enable the robot to escape from the area.
en
Inderscience
http://www.inderscience.com/link.php?id=42693
Archived with thanks to International Journal of Computer Applications in Technology
dead end areas
genetic algorithms
obstacle avoidance
robot navigation
mobile robots
robotic exploration
dead-end detection
escape mechanisms
dead ends
Genetic algorithm based solution to dead-end problems in robot navigation
Article
In robot navigation, mobile robots can suffer from dead-end problems, that is, they can be stuck in areas which are surrounded by obstacles. Attempts have been reported to avoid a robot entering into such a dead-end area. However, in some applications, for example, rescue work, the dead-end areas must be explored. Therefore, it is vital for the robot to come out from the dead-end areas after exploration. This paper presents an approach which enables a robot to come out from dead-end areas. There are two main parts: a dead-end detection mechanism and a genetic algorithm (GA) based online training mechanism. When the robot realises that it is stuck in a dead-end area, it will operate the online training to produce a new best chromosome that will enable the robot to escape from the area.
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/250938/1/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
1
false
10547/250938
oai:uobrep.openrepository.com:10547/250938
2020-04-23 07:29:08.833
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
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
oai:uobrep.openrepository.com:10547/2509502020-04-23T07:29:09Zcom_10547_132192col_10547_132230
Oussena, Samia
942cb45708d9e0d19800512b16e1dcdc
-1
French, Tim
c94a03e2298573a8e2e93bd5fc65b42a
-1
2012-11-05T11:09:28Z
2012-11-05T11:09:28Z
2011
Integrating the Semiotic into UML via Enhancing and Cross-validating Use Case with an Enriched Domain Model 2009, 1 (3):15-31 International Journal of Sociotechnology and Knowledge Development
1941-6253
1941-6261
10.4018/jskd.2009070102
http://hdl.handle.net/10547/250950
International Journal of Sociotechnology and Knowledge Development
Use case models are a representation of the way in which users of the system interact with it. The UML specification driven approach to system development enable the use case model to be continuously refined and cross-validated from a number of system viewpoints. However, little has been done for validating the model against the organisational and workgroup setting in which the system will reside. This article aims to address this gap by the use of techniques derived from organisational semiotics for validating use case models against a wider aspect of organisational culture and meaning making at the organisational, workgroup and actor level of abstraction. Such approach will enhance the system development by providing “goodness of fit” between system model and organisational values and beliefs.
en
IGI Global
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/jskd.2009070102
Archived with thanks to International Journal of Sociotechnology and Knowledge Development
Integrating the semiotic into UML via enhancing and cross-validating use case with an enriched domain model
Article
Use case models are a representation of the way in which users of the system interact with it. The UML specification driven approach to system development enable the use case model to be continuously refined and cross-validated from a number of system viewpoints. However, little has been done for validating the model against the organisational and workgroup setting in which the system will reside. This article aims to address this gap by the use of techniques derived from organisational semiotics for validating use case models against a wider aspect of organisational culture and meaning making at the organisational, workgroup and actor level of abstraction. Such approach will enhance the system development by providing “goodness of fit” between system model and organisational values and beliefs.
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/250950/1/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
1
false
10547/250950
oai:uobrep.openrepository.com:10547/250950
2020-04-23 07:29:09.746
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
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
oai:uobrep.openrepository.com:10547/2509372020-04-23T07:29:08Zcom_10547_132192col_10547_132230
Wang, Zuobin
87c8914685854b6268383b3da4ed14cc
-1
Li, Dayou
6295afce2b3b8447f935ff4664ecd492
-1
Zhang, Jin
c215d308904dbcdb2e18999b3f4811f5
-1
Ji, Ze
b2059209ce722b41966344d9a7a687ae
-1
Qiu, Renxi
c2878327e497918ac94d317d184846f2
-1
2012-11-05T09:42:36Z
2012-11-05T09:42:36Z
2011
Wang, Z. et al (2011) 'Robotic nanoassembly: current developments and challenges' International Journal of Computer Applications in Technology 41 (3/4):185-194
0952-8091
1741-5047
10.1504/IJCAT.2011.042694
http://hdl.handle.net/10547/250937
International Journal of Computer Applications in Technology
Robotic nanoassembly is an emerging field that deals with the controlled manipulation, handling and assembly of atoms, molecules and nano objects by robots for manufacturing of nano structures, devices and systems. Nanoassembly is expected to have revolutionary applications in almost all the scientific and technological areas. This paper presents a general review of nanoassembly by robots considering its current developments and challenges. It discusses scanning probe-based 2D nanomanipulation, gripper-based 3D nanohandling, object-oriented nanoassembly and hybrid nanoassembly techniques, which are the main topics of interest in the field. The challenging issues in robotic nanoassembly are outlined together with the topics.
en
Inderscience
http://www.inderscience.com/link.php?id=42694
robotic nanoassembly
robotics
nanomanipulation
nanohandling
nanometrology
nanomanufacturing
nanotechnology
robotic assembly
object-oriented nanoassembly
Robotic nanoassembly: current developments and challenges
Article
Robotic nanoassembly is an emerging field that deals with the controlled manipulation, handling and assembly of atoms, molecules and nano objects by robots for manufacturing of nano structures, devices and systems. Nanoassembly is expected to have revolutionary applications in almost all the scientific and technological areas. This paper presents a general review of nanoassembly by robots considering its current developments and challenges. It discusses scanning probe-based 2D nanomanipulation, gripper-based 3D nanohandling, object-oriented nanoassembly and hybrid nanoassembly techniques, which are the main topics of interest in the field. The challenging issues in robotic nanoassembly are outlined together with the topics.
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/250937/1/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
1
false
10547/250937
oai:uobrep.openrepository.com:10547/250937
2020-04-23 07:29:08.958
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
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
oai:uobrep.openrepository.com:10547/2509142020-04-23T08:42:53Zcom_10547_132192col_10547_132230
Chan, K.Y.
5f5caabd08510bdee0ccb9274b453f3c
-1
Kwong, C.K.
cd10d2ae084aca55989e88c6030736b9
-1
Jiang, H.
5fa3e9f83297e676dcdd932089ab2fa6
-1
Aydin, Mehmet Emin
8f4fc37dc7adabfd2df193cf441be46d
-1
Fogarty, T.C.
65fa9954ca50b3ec658957b022144179
-1
2012-11-05T09:50:03Z
2012-11-05T09:50:03Z
2010-05
Chan, K.Y. et al (2010) 'A new orthogonal array based crossover, with analysis of gene interactions, for evolutionary algorithms and its application to car door design' Expert Systems with Applications 37 (5):3853-3862
0957-4174
10.1016/j.eswa.2009.11.033
http://hdl.handle.net/10547/250914
Expert Systems with Applications
Recent research shows that orthogonal array based crossovers outperform standard and existing crossovers in evolutionary algorithms in solving parametrical problems with high dimensions and multi-optima. However, those crossovers employed so far, ignore the consideration of interactions between genes. In this paper, we propose a method to improve the existing orthogonal array based crossovers by integrating information of interactions between genes. It is empirically shown that the proposed orthogonal array based crossover outperforms significantly both the existing orthogonal array based crossovers and standard crossovers on solving parametrical benchmark functions that interactions exist between variables. To further compare the proposed orthogonal array based crossover with the existing crossovers in evolutionary algorithms, a validation test based on car door design is used in which the effectiveness of the proposed orthogonal array based crossover is studied.
en
Elsevier
http://linkinghub.elsevier.com/retrieve/pii/S0957417409009750
A new orthogonal array based crossover, with analysis of gene interactions, for evolutionary algorithms and its application to car door design
Article
Recent research shows that orthogonal array based crossovers outperform standard and existing crossovers in evolutionary algorithms in solving parametrical problems with high dimensions and multi-optima. However, those crossovers employed so far, ignore the consideration of interactions between genes. In this paper, we propose a method to improve the existing orthogonal array based crossovers by integrating information of interactions between genes. It is empirically shown that the proposed orthogonal array based crossover outperforms significantly both the existing orthogonal array based crossovers and standard crossovers on solving parametrical benchmark functions that interactions exist between variables. To further compare the proposed orthogonal array based crossover with the existing crossovers in evolutionary algorithms, a validation test based on car door design is used in which the effectiveness of the proposed orthogonal array based crossover is studied.
THUMBNAIL
elsevier-thumbnail.png
application/octet-stream
141467
https://uobrep.openrepository.com/bitstream/10547/250914/2/elsevier-thumbnail.png
d2beece4d19a1801fb5554aab6f7acb3
MD5
2
false
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/250914/1/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
1
false
10547/250914
oai:uobrep.openrepository.com:10547/250914
2020-04-23 08:42:53.68
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
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
oai:uobrep.openrepository.com:10547/2509482020-04-23T08:42:54Zcom_10547_132192col_10547_132230
Bessis, Nik
c068e2871d34808e59514ab170e6bb1d
-1
Huang, Ye
93ee81c3e583818622fdf975079d822e
-1
Norrington, Peter
7ce7c420f60a4d00ea0ea558e4950764
600
Brown, Antony
db7fd7863767722d18ea1370b456e2be
-1
Kuonen, Pierre
47d0617f081f4c86fc3a5b08e69a1464
-1
Hirsbrunner, Beat
afdee8ba59111b3d88e57ad33a9dc5fc
-1
2012-11-05T10:58:14Z
2012-11-05T10:58:14Z
2011-01
Bessis, N. et al (2011) 'Modelling of a self-led critical friend topology in inter-cooperative grid communities' Simulation Modelling Practice and Theory 19 (1):5-16
1569190X
10.1016/j.simpat.2010.06.020
http://hdl.handle.net/10547/250948
Simulation Modelling Practice and Theory
For decades, much work has been done to increase the effectiveness and efficiency of job sharing amongst available computational resources. Resources can be organized into a variety of topologies, and recent work has shown that a decentralized distributed resource topology is a crucial but complicated scenario. This is because decentralized resources are normally grouped into independent virtual organizations (VOs) and isolated from each other by VO boundaries. To convey jobs across gaps between various virtual organizations, a novel resource topology called the self-led critical friend model (CFM) is proposed in this work. The CFM deals with trust credits between resources according to their historical collaboration records. This trust reveals a feasible, realistic, and transferable correlation to facilitate the resource selection process for job delegation between arbitrarily connected physical resources. Consequently, the CFM is able to overcome the constraints caused by virtual organization boundaries.
en
Elsevier
http://linkinghub.elsevier.com/retrieve/pii/S1569190X10001413
grid
grid scheduling
critical friend model
CFM
self-led critical friend
inter-cooperative grid
Modelling of a self-led critical friend topology in inter-cooperative grid communities
Article
For decades, much work has been done to increase the effectiveness and efficiency of job sharing amongst available computational resources. Resources can be organized into a variety of topologies, and recent work has shown that a decentralized distributed resource topology is a crucial but complicated scenario. This is because decentralized resources are normally grouped into independent virtual organizations (VOs) and isolated from each other by VO boundaries.
To convey jobs across gaps between various virtual organizations, a novel resource topology called the self-led critical friend model (CFM) is proposed in this work. The CFM deals with trust credits between resources according to their historical collaboration records. This trust reveals a feasible, realistic, and transferable correlation to facilitate the resource selection process for job delegation between arbitrarily connected physical resources. Consequently, the CFM is able to overcome the constraints caused by virtual organization boundaries.
THUMBNAIL
elsevier-thumbnail.png
application/octet-stream
108413
https://uobrep.openrepository.com/bitstream/10547/250948/2/elsevier-thumbnail.png
13f24281018a2b7e8befab0705b89c9f
MD5
2
false
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/250948/1/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
1
false
10547/250948
oai:uobrep.openrepository.com:10547/250948
2020-04-23 08:42:54.257
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
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
oai:uobrep.openrepository.com:10547/2509202020-04-23T07:29:09Zcom_10547_132192col_10547_132230
Bessis, Nik
c068e2871d34808e59514ab170e6bb1d
-1
Brown, Antony
db7fd7863767722d18ea1370b456e2be
-1
Asimakopoulou, Eleana
06c90b1547abb919ae8d54ab4a72ac69
-1
2012-11-05T10:59:38Z
2012-11-05T10:59:38Z
2010
A Mathematical Analysis of a Disaster Management Data-Grid Push Service 2010, 1 (3):56-70 International Journal of Distributed Systems and Technologies
1947-3532
1947-3540
10.4018/jdst.2010070104
http://hdl.handle.net/10547/250920
International Journal of Distributed Systems and Technologies
Much work is under way within the Grid technology community on issues associated with the development of services fostering the integration and exploitation of multiple autonomous, distributed data sources through a seamless and flexible virtualized interface. These developments involve fluid and dynamic, ad hoc based interactions between dispersed service providers and consumers. However, several obstacles arise in the design and implementation of such services. In this article, the authors examine a notable obstacle, namely how to keep service consumers informed of relevant changes about data committed in multiple and distributed service provider levels, and most importantly, when these changes can affect others’ well-being. To achieve this, the authors use aggregated case scenarios to demonstrate the need for a data-Grid push service in a disaster management situation. In this regard, the article describes in detail the service architecture, as well as its mathematical analysis for keeping interested stakeholders informed automatically about relevant and critical data changes.
en
IGI Global
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/jdst.2010070104
Archived with thanks to International Journal of Distributed Systems and Technologies
A mathematical analysis of a disaster management data-grid push service
Article
Much work is under way within the Grid technology community on issues associated with the development of services fostering the integration and exploitation of multiple autonomous, distributed data sources through a seamless and flexible virtualized interface. These developments involve fluid and dynamic, ad hoc based interactions between dispersed service providers and consumers. However, several obstacles arise in the design and implementation of such services. In this article, the authors examine a notable obstacle, namely how to keep service consumers informed of relevant changes about data committed in multiple and distributed service provider levels, and most importantly, when these changes can affect others’ well-being. To achieve this, the authors use aggregated case scenarios to demonstrate the need for a data-Grid push service in a disaster management situation. In this regard, the article describes in detail the service architecture, as well as its mathematical analysis for keeping interested stakeholders informed automatically about relevant and critical data changes.
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/250920/1/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
1
false
10547/250920
oai:uobrep.openrepository.com:10547/250920
2020-04-23 07:29:09.429
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
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
oai:uobrep.openrepository.com:10547/2509212020-04-23T07:29:09Zcom_10547_132192col_10547_132230
Brown, Antony
db7fd7863767722d18ea1370b456e2be
-1
Sant, Paul
4d523c3c21b077623d507fc78147194c
-1
Bessis, Nik
c068e2871d34808e59514ab170e6bb1d
-1
French, Tim
c94a03e2298573a8e2e93bd5fc65b42a
-1
Maple, Carsten
a4dc0842fb0b0b3b6d15dd203a61bd1f
-1
2012-11-05T11:02:25Z
2012-11-05T11:02:25Z
2010
Modelling Self-Led Trust Value Management in Grid and Service Oriented Infrastructures 2010, 1 (4):1-18 International Journal of Systems and Service-Oriented Engineering
1947-3052
1947-3060
10.4018/jssoe.2010100101
http://hdl.handle.net/10547/250921
International Journal of Systems and Service-Oriented Engineering
Current developments in grid and service oriented technologies involve fluid and dynamic, ad hoc based interactions between delegates, which in turn, serves to challenge conventional centralised structured trust and security assurance approaches. Delegates ranging from individuals to large-scale VO (Virtual Organisations) require the establishment of trust across all parties as a prerequisite for trusted and meaningful e-collaboration. In this paper, a notable obstacle, namely how such delegates (modelled as nodes) operating within complex collaborative environment spaces can best evaluate in context to optimally and dynamically select the most trustworthy ad hoc based resource/service for e-consumption. A number of aggregated service case scenarios are herein employed in order to consider the manner in which virtual consumers and provider ad hoc based communities converge. In this paper, the authors take the view that the use of graph-theoretic modelling naturally leads to a self-led trust management decision based approach in which delegates are continuously informed of relevant up-to-date trust levels. This will lead to an increased confidence level, which trustful service delegation can occur. The key notion is of a self-led trust model that is suited to an inherently low latency, decentralised trust security paradigm.
en
IGI Global
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/jssoe.2010100101
Archived with thanks to International Journal of Systems and Service-Oriented Engineering
Modelling self-led trust value management in grid and service oriented infrastructures
Article
Current developments in grid and service oriented technologies involve fluid and dynamic, ad hoc based interactions between delegates, which in turn, serves to challenge conventional centralised structured trust and security assurance approaches. Delegates ranging from individuals to large-scale VO (Virtual Organisations) require the establishment of trust across all parties as a prerequisite for trusted and meaningful e-collaboration. In this paper, a notable obstacle, namely how such delegates (modelled as nodes) operating within complex collaborative environment spaces can best evaluate in context to optimally and dynamically select the most trustworthy ad hoc based resource/service for e-consumption. A number of aggregated service case scenarios are herein employed in order to consider the manner in which virtual consumers and provider ad hoc based communities converge. In this paper, the authors take the view that the use of graph-theoretic modelling naturally leads to a self-led trust management decision based approach in which delegates are continuously informed of relevant up-to-date trust levels. This will lead to an increased confidence level, which trustful service delegation can occur. The key notion is of a self-led trust model that is suited to an inherently low latency, decentralised trust security paradigm.
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/250921/1/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
1
false
10547/250921
oai:uobrep.openrepository.com:10547/250921
2020-04-23 07:29:09.536
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
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
oai:uobrep.openrepository.com:10547/2509492020-04-23T07:29:09Zcom_10547_132192col_10547_132230
Shenoy, Aruna
44b98252f94b871d86f50f057f924c25
-1
Anthony, Sue
2efb2bdbb4270dfa18868223697723dc
-1
Frank, Ray
33a6401709e90f30f57811c6f195ef75
-1
Davey, Neil
4868cf38dfcc525e6cbaad576e0f6442
-1
2012-11-05T11:05:27Z
2012-11-05T11:05:27Z
2011-09
Categorizing facial expressions: a comparison of computational models 2011, 20 (6):815-823 Neural Computing and Applications
0941-0643
1433-3058
10.1007/s00521-010-0446-9
http://hdl.handle.net/10547/250949
Neural Computing and Applications
Recognizing expressions is a key part of human social interaction, and processing of facial expression information is largely automatic for humans, but it is a non-trivial task for a computational system. The purpose of this work is to develop computational models capable of differentiating between a range of human facial expressions. Raw face images are examples of high-dimensional data, so here we use two dimensionality reduction techniques: principal component analysis and curvilinear component analysis. We also preprocess the images with a bank of Gabor filters, so that important features in the face images may be identified. Subsequently, the faces are classified using a support vector machine. We show that it is possible to differentiate faces with a prototypical expression from the neutral expression. Moreover, we can achieve this with data that has been massively reduced in size: in the best case the original images are reduced to just 5 components. We also investigate the effect size on face images, a concept which has not been reported previously on faces. This enables us to identify those areas of the face that are involved in the production of a facial expression.
en
Springer Link
http://www.springerlink.com/index/10.1007/s00521-010-0446-9
Archived with thanks to Neural Computing and Applications
Categorizing facial expressions: a comparison of computational models
Article
Recognizing expressions is a key part of human social interaction, and processing of facial expression information is largely automatic for humans, but it is a non-trivial task for a computational system. The purpose of this work is to develop computational models capable of differentiating between a range of human facial expressions. Raw face images are examples of high-dimensional data, so here we use two dimensionality reduction techniques: principal component analysis and curvilinear component analysis. We also preprocess the images with a bank of Gabor filters, so that important features in the face images may be identified. Subsequently, the faces are classified using a support vector machine. We show that it is possible to differentiate faces with a prototypical expression from the neutral expression. Moreover, we can achieve this with data that has been massively reduced in size: in the best case the original images are reduced to just 5 components. We also investigate the effect size on face images, a concept which has not been reported previously on faces. This enables us to identify those areas of the face that are involved in the production of a facial expression.
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/250949/1/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
1
false
10547/250949
oai:uobrep.openrepository.com:10547/250949
2020-04-23 07:29:09.68
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
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
oai:uobrep.openrepository.com:10547/2509232020-04-23T07:29:09Zcom_10547_132192col_10547_132230
French, Tim
c94a03e2298573a8e2e93bd5fc65b42a
-1
2012-11-05T11:06:47Z
2012-11-05T11:06:47Z
2009
Virtual Organisational Trust Requirements 2009, 5 (2):1-16 International Journal of Intelligent Information Technologies
1548-3657
1548-3665
10.4018/jiit.2009040101
http://hdl.handle.net/10547/250923
International Journal of Intelligent Information Technologies
It is suggested that the use of the semiotic ladder, together with a supportive trust agent can be used together to better explicate “soft” trust issues in the context of Grid services. The contribution offered here is intended to fill a gap in current understanding and modelling of such issues and to support Grid service designers to better conceptualise, hence manage trust issues. The semiotic paradigm is intended to offer an integrative viewpoint within which to explicate “soft” trust issues throughout the Grid life-cycle. A computationally lightweight trust agent is described that can be used to verify high level trust of a Virtual Organisation. The potential benefits of the approach that is advocated here include the reduction of risk and potential improvements in the quality and reliability of Grid service partnerships. For these benefits to accrue, explicit “soft” as well as “hard” trust management is essential as is an integrative viewpoint.
en
IGI Global
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/jiit.2009040101
Archived with thanks to International Journal of Intelligent Information Technologies
Virtual organisational trust requirements
Article
It is suggested that the use of the semiotic ladder, together with a supportive trust agent can be used together to better explicate “soft” trust issues in the context of Grid services. The contribution offered here is intended to fill a gap in current understanding and modelling of such issues and to support Grid service designers to better conceptualise, hence manage trust issues. The semiotic paradigm is intended to offer an integrative viewpoint within which to explicate “soft” trust issues throughout the Grid life-cycle. A computationally lightweight trust agent is described that can be used to verify high level trust of a Virtual Organisation. The potential benefits of the approach that is advocated here include the reduction of risk and potential improvements in the quality and reliability of Grid service partnerships. For these benefits to accrue, explicit “soft” as well as “hard” trust management is essential as is an integrative viewpoint.
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/250923/1/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
1
false
10547/250923
oai:uobrep.openrepository.com:10547/250923
2020-04-23 07:29:09.604
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
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
oai:uobrep.openrepository.com:10547/2509252020-04-23T07:29:09Zcom_10547_132192col_10547_132230
French, Tim
c94a03e2298573a8e2e93bd5fc65b42a
-1
Bessis, Nik
c068e2871d34808e59514ab170e6bb1d
-1
Xhafa, Fatos
fe5465dc294cc7b95907e79a5d6bbdea
-1
Maple, Carsten
a4dc0842fb0b0b3b6d15dd203a61bd1f
-1
2012-11-05T11:10:15Z
2012-11-05T11:10:15Z
2011
Towards a corporate governance trust agent scoring model for collaborative virtual organisations 2011, 2 (2):98-108 International Journal of Grid and Utility Computing
1741-847X
1741-8488
10.1504/IJGUC.2011.040597
http://hdl.handle.net/10547/250925
International Journal of Grid and Utility Computing
In this 'visionary' paper, we describe how a semiotic ladder, together with a supportive trust agent, can be used to address 'soft' trust issues in the context of collaborative Virtual Organisations (VOs). The intention is to offer all parties better support for trust (as reputation) management, including the reduction of risk and improved reliability of VO e-services. The semiotic ladder is intended to support the VO e-service life cycle through the articulation of e-trust at various levels of system abstraction, including trust as a measurable confidence level. A novel trust agent is used to provide the consumer with an objective measure of the trustworthiness of the e-service at runtime, just prior to its actual consumption. Specifically, VO consumer confidence level is informed via a set of Corporate Governance (CG) scores, which are used as a trust proxy for the 'real' owner of the VO.
en
Inderscience
http://www.inderscience.com/link.php?id=40597
Archived with thanks to International Journal of Grid and Utility Computing
semiotic ladders
lightweight trust agents
scoring systems
corporate governance scores
past performance historys
grid services
cloud computing
collaborative virtual organisations
context-aware trust
grid computing
collaboration
trust management
reputation management
e-services
electronic services
online services
trustworthiness
Towards a corporate governance trust agent scoring model for collaborative virtual organisations
Article
In this 'visionary' paper, we describe how a semiotic ladder, together with a supportive trust agent, can be used to address 'soft' trust issues in the context of collaborative Virtual Organisations (VOs). The intention is to offer all parties better support for trust (as reputation) management, including the reduction of risk and improved reliability of VO e-services. The semiotic ladder is intended to support the VO e-service life cycle through the articulation of e-trust at various levels of system abstraction, including trust as a measurable confidence level. A novel trust agent is used to provide the consumer with an objective measure of the trustworthiness of the e-service at runtime, just prior to its actual consumption. Specifically, VO consumer confidence level is informed via a set of Corporate Governance (CG) scores, which are used as a trust proxy for the 'real' owner of the VO.
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/250925/1/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
1
false
10547/250925
oai:uobrep.openrepository.com:10547/250925
2020-04-23 07:29:09.82
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
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
oai:uobrep.openrepository.com:10547/2509242020-04-23T07:29:09Zcom_10547_132192col_10547_132230
French, Tim
c94a03e2298573a8e2e93bd5fc65b42a
-1
Bessis, Nik
c068e2871d34808e59514ab170e6bb1d
-1
Maple, Carsten
a4dc0842fb0b0b3b6d15dd203a61bd1f
-1
Asimakopoulou, Eleana
06c90b1547abb919ae8d54ab4a72ac69
-1
2012-11-05T11:07:55Z
2012-11-05T11:07:55Z
2012
Trust Issues on Crowd-Sourcing Methods for Urban Environmental Monitoring 2012, 3 (1):35-48 International Journal of Distributed Systems and Technologies
1947-3532
1947-3540
10.4018/jdst.2012010103
http://hdl.handle.net/10547/250924
International Journal of Distributed Systems and Technologies
This paper explores trust related issues arising from the use of a crowd-sourcing method. Crowd-sourcing is a relatively new method that utilises modern technologies to gather, analyse and visualise specific “on-the-fly” data. The data is typically acquired through the employment of mobile technology, with each device running a bespoke application that captures the desired information. The resulting “crowd sourced” data is readily available and the corresponding maps produced can in turn, be used to support strategic planning and to facilitate overall, more informed decision-making. The purpose is to provide insights into this novel approach to data collection, aggregation and subsequent visualisation. Specifically, the focus centres upon issues of trust and security that are inherent not merely to the use of crowd sourced data capture itself, but also crucially, to the stewardship and usage of the resultant data sets within e-government settings. A novel community centric usage scenario is presented that seeks to show how issues of trust pervade the technology. Hence, both rewards and risks are revealed and we go on to outline a preliminary approach intended to support a trusted and reputable “crowdy” data architecture.
en
IGI Global
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/jdst.2012010103
Archived with thanks to International Journal of Distributed Systems and Technologies
Trust issues on crowd-sourcing methods for urban environmental monitoring
Article
This paper explores trust related issues arising from the use of a crowd-sourcing method. Crowd-sourcing is a relatively new method that utilises modern technologies to gather, analyse and visualise specific “on-the-fly” data. The data is typically acquired through the employment of mobile technology, with each device running a bespoke application that captures the desired information. The resulting “crowd sourced” data is readily available and the corresponding maps produced can in turn, be used to support strategic planning and to facilitate overall, more informed decision-making. The purpose is to provide insights into this novel approach to data collection, aggregation and subsequent visualisation. Specifically, the focus centres upon issues of trust and security that are inherent not merely to the use of crowd sourced data capture itself, but also crucially, to the stewardship and usage of the resultant data sets within e-government settings. A novel community centric usage scenario is presented that seeks to show how issues of trust pervade the technology. Hence, both rewards and risks are revealed and we go on to outline a preliminary approach intended to support a trusted and reputable “crowdy” data architecture.
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/250924/1/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
1
false
10547/250924
oai:uobrep.openrepository.com:10547/250924
2020-04-23 07:29:09.897
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
Tk9OLUVYQ0xVU0lWRSBESVNUUklCVVRJT04gTElDRU5TRQoKQnkgc2lnbmluZyBhbmQgc3VibWl0dGluZyB0aGlzIGxpY2Vuc2UsIHlvdSAodGhlIGF1dGhvcihzKSBvciBjb3B5cmlnaHQKb3duZXIpIGdyYW50cyB0byB0aGUgVW5pdmVyc2l0eSBvZiBCZWRmb3Jkc2hpcmUgUmVwb3NpdG9yeSAgKFVPQlJFUCkgdGhlIG5vbi1leGNsdXNpdmUgcmlnaHQgdG8gcmVwcm9kdWNlLAp0cmFuc2xhdGUgKGFzIGRlZmluZWQgYmVsb3cpLCBhbmQvb3IgZGlzdHJpYnV0ZSB5b3VyIHN1Ym1pc3Npb24gKGluY2x1ZGluZwp0aGUgYWJzdHJhY3QpIHdvcmxkd2lkZSBpbiBwcmludCBhbmQgZWxlY3Ryb25pYyBmb3JtYXQgYW5kIGluIGFueSBtZWRpdW0sCmluY2x1ZGluZyBidXQgbm90IGxpbWl0ZWQgdG8gYXVkaW8gb3IgdmlkZW8uCgpZb3UgYWdyZWUgdGhhdCBVT0JSRVAgbWF5LCB3aXRob3V0IGNoYW5naW5nIHRoZSBjb250ZW50LCB0cmFuc2xhdGUgdGhlCnN1Ym1pc3Npb24gdG8gYW55IG1lZGl1bSBvciBmb3JtYXQgZm9yIHRoZSBwdXJwb3NlIG9mIHByZXNlcnZhdGlvbi4KCllvdSBhbHNvIGFncmVlIHRoYXQgVU9CUkVQIG1heSBrZWVwIG1vcmUgdGhhbiBvbmUgY29weSBvZiB0aGlzIHN1Ym1pc3Npb24gZm9yCnB1cnBvc2VzIG9mIHNlY3VyaXR5LCBiYWNrLXVwIGFuZCBwcmVzZXJ2YXRpb24uCgpZb3UgcmVwcmVzZW50IHRoYXQgdGhlIHN1Ym1pc3Npb24gaXMgeW91ciBvcmlnaW5hbCB3b3JrLCBhbmQgdGhhdCB5b3UgaGF2ZQp0aGUgcmlnaHQgdG8gZ3JhbnQgdGhlIHJpZ2h0cyBjb250YWluZWQgaW4gdGhpcyBsaWNlbnNlLiBZb3UgYWxzbyByZXByZXNlbnQKdGhhdCB5b3VyIHN1Ym1pc3Npb24gZG9lcyBub3QsIHRvIHRoZSBiZXN0IG9mIHlvdXIga25vd2xlZGdlLCBpbmZyaW5nZSB1cG9uCmFueW9uZSdzIGNvcHlyaWdodC4KCklmIHRoZSBzdWJtaXNzaW9uIGNvbnRhaW5zIG1hdGVyaWFsIGZvciB3aGljaCB5b3UgZG8gbm90IGhvbGQgY29weXJpZ2h0LAp5b3UgcmVwcmVzZW50IHRoYXQgeW91IGhhdmUgb2J0YWluZWQgdGhlIHVucmVzdHJpY3RlZCBwZXJtaXNzaW9uIG9mIHRoZQpjb3B5cmlnaHQgb3duZXIgdG8gZ3JhbnQgVU9CUkVQIHRoZSByaWdodHMgcmVxdWlyZWQgYnkgdGhpcyBsaWNlbnNlLCBhbmQgdGhhdApzdWNoIHRoaXJkLXBhcnR5IG93bmVkIG1hdGVyaWFsIGlzIGNsZWFybHkgaWRlbnRpZmllZCBhbmQgYWNrbm93bGVkZ2VkCndpdGhpbiB0aGUgdGV4dCBvciBjb250ZW50IG9mIHRoZSBzdWJtaXNzaW9uLgoKSUYgVEhFIFNVQk1JU1NJT04gSVMgQkFTRUQgVVBPTiBXT1JLIFRIQVQgSEFTIEJFRU4gU1BPTlNPUkVEIE9SIFNVUFBPUlRFRApCWSBBTiBBR0VOQ1kgT1IgT1JHQU5JWkFUSU9OIE9USEVSIFRIQU4gVEVTVE9SLCBZT1UgUkVQUkVTRU5UIFRIQVQgWU9VIEhBVkUKRlVMRklMTEVEIEFOWSBSSUdIVCBPRiBSRVZJRVcgT1IgT1RIRVIgT0JMSUdBVElPTlMgUkVRVUlSRUQgQlkgU1VDSApDT05UUkFDVCBPUiBBR1JFRU1FTlQuCgpVT0JSRVAgd2lsbCBjbGVhcmx5IGlkZW50aWZ5IHlvdXIgbmFtZShzKSBhcyB0aGUgYXV0aG9yKHMpIG9yIG93bmVyKHMpIG9mIHRoZQpzdWJtaXNzaW9uLCBhbmQgd2lsbCBub3QgbWFrZSBhbnkgYWx0ZXJhdGlvbiwgb3RoZXIgdGhhbiBhcyBhbGxvd2VkIGJ5IHRoaXMKbGljZW5zZSwgdG8geW91ciBzdWJtaXNzaW9uLgo=
oai:uobrep.openrepository.com:10547/2509222020-04-23T07:29:09Zcom_10547_132192col_10547_132230
Sotiriadis, Stelios
3ca64c0b285d4587eea31a2a378a7279
-1
Bessis, Nik
c068e2871d34808e59514ab170e6bb1d
-1
Huang, Ye
93ee81c3e583818622fdf975079d822e
-1
Sant, Paul
4d523c3c21b077623d507fc78147194c
-1
Maple, Carsten
a4dc0842fb0b0b3b6d15dd203a61bd1f
-1
2012-11-05T11:03:57Z
2012-11-05T11:03:57Z
2011
Defining Minimum Requirements of Inter-Collaborated Nodes by Measuring the Weight of Node Interactions 2011, 2 (3):19-37 International Journal of Distributed Systems and Technologies
1947-3532
1947-3540
10.4018/jdst.2011070102
http://hdl.handle.net/10547/250922
International Journal of Distributed Systems and Technologies
This paper focuses on defining the minimum requirements to support the inter-cooperation between various scales, dynamically evolved Virtual Organizations (VOs). This proposed method is able to assign a weighted value to each pair-wise path that each member (node) can select in order to locate neighbouring nodes according to their preferences. The method also takes into account the communication overhead between each node interaction. The weight of each path is to be measured by the analysis of prerequisites in order to achieve a mutually agreed interaction between nodes. Requirements are defined as the least parameters or conditions that a node needs to achieve in order to determine its accessibility factor. The motivation behind this work is the vision of the Critical Friends Community model, which is a suitable topology for interoperable grid environments. The topology suggests that capturing inter-cooperated nodes interactions that can be publicly available could lead to knowledge of neighbouring VO members which, in turn, could be used for facilitating a more effective resource discovery and selection decision.
en
IGI Global
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/jdst.2011070102
Archived with thanks to International Journal of Distributed Systems and Technologies
Defining minimum requirements of inter-collaborated nodes by measuring the weight of node interactions
Article
This paper focuses on defining the minimum requirements to support the inter-cooperation between various scales, dynamically evolved Virtual Organizations (VOs). This proposed method is able to assign a weighted value to each pair-wise path that each member (node) can select in order to locate neighbouring nodes according to their preferences. The method also takes into account the communication overhead between each node interaction. The weight of each path is to be measured by the analysis of prerequisites in order to achieve a mutually agreed interaction between nodes. Requirements are defined as the least parameters or conditions that a node needs to achieve in order to determine its accessibility factor. The motivation behind this work is the vision of the Critical Friends Community model, which is a suitable topology for interoperable grid environments. The topology suggests that capturing inter-cooperated nodes interactions that can be publicly available could lead to knowledge of neighbouring VO members which, in turn, could be used for facilitating a more effective resource discovery and selection decision.
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/250922/1/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
1
false
10547/250922
oai:uobrep.openrepository.com:10547/250922
2020-04-23 07:29:09.97
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
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
oai:uobrep.openrepository.com:10547/2509162020-04-23T08:42:53Zcom_10547_132192col_10547_132230
Liu, Jiamin
c62076efe90e24d0267529aab534b41f
-1
Yue, Yong
59d04f0f8e57359fc0492dc893f8df61
-1
Dong, Zongran
b061ba2999ece90382e597cc77565e54
-1
Maple, Carsten
a4dc0842fb0b0b3b6d15dd203a61bd1f
-1
Keech, Malcolm
3e06bf1a506f8ba63715e193be0dc516
-1
2012-11-05T10:26:39Z
2012-11-05T10:26:39Z
2011-04
Liu, J. et al (2011) 'A novel hybrid tabu search approach to container loading' Computers & Operations Research 38 (4):797-807
0305-0548
10.1016/j.cor.2010.09.002
http://hdl.handle.net/10547/250916
Computers & Operations Research
The container loading problem, which is significant for a number of industrial sectors, aims to obtain a high space utilisation in the container while satisfying practical constraints. This paper presents a novel hybrid tabu search approach to the container loading problem. A loading heuristic is devised to incorporate heuristic strategies with a handling method for remaining spaces to generate optimal loading arrangements of boxes with stability considered. The tabu search technique, which covers the encoding, evaluation criteria and configuration of neighbourhood and candidate solutions, is used to improve the performance of the loading heuristic. Experimental results with benchmark data show that the hybrid approach provides a better space utilisation than the published approaches under the condition of all loaded boxes with one hundred percent support from below. Moreover, it is shown that the hybrid tabu search can solve problems with the constraints of weight limit and weight distribution with real world data.
en
Elsevier
http://linkinghub.elsevier.com/retrieve/pii/S0305054810001917
heuristic
tabu search
container loading
stability
weight distribution
A novel hybrid tabu search approach to container loading
Article
The container loading problem, which is significant for a number of industrial sectors, aims to obtain a high space utilisation in the container while satisfying practical constraints. This paper presents a novel hybrid tabu search approach to the container loading problem. A loading heuristic is devised to incorporate heuristic strategies with a handling method for remaining spaces to generate optimal loading arrangements of boxes with stability considered. The tabu search technique, which covers the encoding, evaluation criteria and configuration of neighbourhood and candidate solutions, is used to improve the performance of the loading heuristic. Experimental results with benchmark data show that the hybrid approach provides a better space utilisation than the published approaches under the condition of all loaded boxes with one hundred percent support from below. Moreover, it is shown that the hybrid tabu search can solve problems with the constraints of weight limit and weight distribution with real world data.
THUMBNAIL
elsevier-thumbnail.png
application/octet-stream
138632
https://uobrep.openrepository.com/bitstream/10547/250916/2/elsevier-thumbnail.png
3be067c947cf69c7ab3c47067423c443
MD5
2
false
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/250916/1/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
1
false
10547/250916
oai:uobrep.openrepository.com:10547/250916
2020-04-23 08:42:53.875
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
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
oai:uobrep.openrepository.com:10547/2509442020-04-23T07:35:29Zcom_10547_132192col_10547_132230
Ahmed, Ejaz
47d8c67840c5cbb7b3a0b93bb5b00955
600
Bessis, Nik
c068e2871d34808e59514ab170e6bb1d
-1
Norrington, Peter
7ce7c420f60a4d00ea0ea558e4950764
600
Yue, Yong
59d04f0f8e57359fc0492dc893f8df61
-1
2012-11-05T10:07:28Z
2012-11-05T10:07:28Z
2010
Managing Inconsistencies in Data Grid Environments 2010, 2 (4):51-65 International Journal of Grid and High Performance Computing
1938-0259
1938-0267
10.4018/jghpc.2010100105
http://hdl.handle.net/10547/250944
International Journal of Grid and High Performance Computing
Much work has been done in the area of data access and integration using various data mapping, matching, and loading techniques. One of the main concerns when integrating data from heterogeneous data sources is data redundancy. The concern is mainly due to the different business contexts and purposes from which the data systems were originally built. A common process for accessing data from integrated databases involves the use of each data source’s own catalogue or metadata schema. In this article, the authors take the view that there is a greater chance of data inconsistencies, such as data redundancies when integrating them within a grid environment as compared to traditional distributed paradigms. The importance of improving the data search and matching process is briefly discussed, and a partial service oriented generic strategy is adopted to consolidate distinct catalogue schemas of federated databases to access information seamlessly. To this end, a proposed matching strategy between structure objects and data values across federated databases in a grid environment is presented.
en
IGI Global
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/jghpc.2010100105
Archived with thanks to International Journal of Grid and High Performance Computing
Managing inconsistencies in data grid environments
Article
Much work has been done in the area of data access and integration using various data mapping, matching, and loading techniques. One of the main concerns when integrating data from heterogeneous data sources is data redundancy. The concern is mainly due to the different business contexts and purposes from which the data systems were originally built. A common process for accessing data from integrated databases involves the use of each data source’s own catalogue or metadata schema. In this article, the authors take the view that there is a greater chance of data inconsistencies, such as data redundancies when integrating them within a grid environment as compared to traditional distributed paradigms. The importance of improving the data search and matching process is briefly discussed, and a partial service oriented generic strategy is adopted to consolidate distinct catalogue schemas of federated databases to access information seamlessly. To this end, a proposed matching strategy between structure objects and data values across federated databases in a grid environment is presented.
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/250944/1/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
1
false
10547/250944
oai:uobrep.openrepository.com:10547/250944
2020-04-23 07:35:29.654
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
Tk9OLUVYQ0xVU0lWRSBESVNUUklCVVRJT04gTElDRU5TRQoKQnkgc2lnbmluZyBhbmQgc3VibWl0dGluZyB0aGlzIGxpY2Vuc2UsIHlvdSAodGhlIGF1dGhvcihzKSBvciBjb3B5cmlnaHQKb3duZXIpIGdyYW50cyB0byB0aGUgVW5pdmVyc2l0eSBvZiBCZWRmb3Jkc2hpcmUgUmVwb3NpdG9yeSAgKFVPQlJFUCkgdGhlIG5vbi1leGNsdXNpdmUgcmlnaHQgdG8gcmVwcm9kdWNlLAp0cmFuc2xhdGUgKGFzIGRlZmluZWQgYmVsb3cpLCBhbmQvb3IgZGlzdHJpYnV0ZSB5b3VyIHN1Ym1pc3Npb24gKGluY2x1ZGluZwp0aGUgYWJzdHJhY3QpIHdvcmxkd2lkZSBpbiBwcmludCBhbmQgZWxlY3Ryb25pYyBmb3JtYXQgYW5kIGluIGFueSBtZWRpdW0sCmluY2x1ZGluZyBidXQgbm90IGxpbWl0ZWQgdG8gYXVkaW8gb3IgdmlkZW8uCgpZb3UgYWdyZWUgdGhhdCBVT0JSRVAgbWF5LCB3aXRob3V0IGNoYW5naW5nIHRoZSBjb250ZW50LCB0cmFuc2xhdGUgdGhlCnN1Ym1pc3Npb24gdG8gYW55IG1lZGl1bSBvciBmb3JtYXQgZm9yIHRoZSBwdXJwb3NlIG9mIHByZXNlcnZhdGlvbi4KCllvdSBhbHNvIGFncmVlIHRoYXQgVU9CUkVQIG1heSBrZWVwIG1vcmUgdGhhbiBvbmUgY29weSBvZiB0aGlzIHN1Ym1pc3Npb24gZm9yCnB1cnBvc2VzIG9mIHNlY3VyaXR5LCBiYWNrLXVwIGFuZCBwcmVzZXJ2YXRpb24uCgpZb3UgcmVwcmVzZW50IHRoYXQgdGhlIHN1Ym1pc3Npb24gaXMgeW91ciBvcmlnaW5hbCB3b3JrLCBhbmQgdGhhdCB5b3UgaGF2ZQp0aGUgcmlnaHQgdG8gZ3JhbnQgdGhlIHJpZ2h0cyBjb250YWluZWQgaW4gdGhpcyBsaWNlbnNlLiBZb3UgYWxzbyByZXByZXNlbnQKdGhhdCB5b3VyIHN1Ym1pc3Npb24gZG9lcyBub3QsIHRvIHRoZSBiZXN0IG9mIHlvdXIga25vd2xlZGdlLCBpbmZyaW5nZSB1cG9uCmFueW9uZSdzIGNvcHlyaWdodC4KCklmIHRoZSBzdWJtaXNzaW9uIGNvbnRhaW5zIG1hdGVyaWFsIGZvciB3aGljaCB5b3UgZG8gbm90IGhvbGQgY29weXJpZ2h0LAp5b3UgcmVwcmVzZW50IHRoYXQgeW91IGhhdmUgb2J0YWluZWQgdGhlIHVucmVzdHJpY3RlZCBwZXJtaXNzaW9uIG9mIHRoZQpjb3B5cmlnaHQgb3duZXIgdG8gZ3JhbnQgVU9CUkVQIHRoZSByaWdodHMgcmVxdWlyZWQgYnkgdGhpcyBsaWNlbnNlLCBhbmQgdGhhdApzdWNoIHRoaXJkLXBhcnR5IG93bmVkIG1hdGVyaWFsIGlzIGNsZWFybHkgaWRlbnRpZmllZCBhbmQgYWNrbm93bGVkZ2VkCndpdGhpbiB0aGUgdGV4dCBvciBjb250ZW50IG9mIHRoZSBzdWJtaXNzaW9uLgoKSUYgVEhFIFNVQk1JU1NJT04gSVMgQkFTRUQgVVBPTiBXT1JLIFRIQVQgSEFTIEJFRU4gU1BPTlNPUkVEIE9SIFNVUFBPUlRFRApCWSBBTiBBR0VOQ1kgT1IgT1JHQU5JWkFUSU9OIE9USEVSIFRIQU4gVEVTVE9SLCBZT1UgUkVQUkVTRU5UIFRIQVQgWU9VIEhBVkUKRlVMRklMTEVEIEFOWSBSSUdIVCBPRiBSRVZJRVcgT1IgT1RIRVIgT0JMSUdBVElPTlMgUkVRVUlSRUQgQlkgU1VDSApDT05UUkFDVCBPUiBBR1JFRU1FTlQuCgpVT0JSRVAgd2lsbCBjbGVhcmx5IGlkZW50aWZ5IHlvdXIgbmFtZShzKSBhcyB0aGUgYXV0aG9yKHMpIG9yIG93bmVyKHMpIG9mIHRoZQpzdWJtaXNzaW9uLCBhbmQgd2lsbCBub3QgbWFrZSBhbnkgYWx0ZXJhdGlvbiwgb3RoZXIgdGhhbiBhcyBhbGxvd2VkIGJ5IHRoaXMKbGljZW5zZSwgdG8geW91ciBzdWJtaXNzaW9uLgo=
oai:uobrep.openrepository.com:10547/2509412020-04-23T07:29:10Zcom_10547_132192col_10547_132230
Yong Yue
37c8663fc765fde42d94f0c6a49f43aa
-1
Clark, J.W.
d1b54a3a086769129b1a7e27e4d1d53e
-1
Khoury, D.S.
53e5c29b795a95e99044998976763856
-1
2012-11-05T09:49:10Z
2012-11-05T09:49:10Z
2008-10
Speckle Tracking in Intracardiac Echocardiography for the Assessment of Myocardial Deformation 2009, 56 (2):416-425 IEEE Transactions on Biomedical Engineering
0018-9294
1558-2531
10.1109/TBME.2008.2006036
http://hdl.handle.net/10547/250941
IEEE Transactions on Biomedical Engineering
Intracardiac echocardiography has proven to be useful for online anatomical imaging during catheterization. Our objective was to develop a speckle tracking method for myocardial motion estimation from intracardiac echocardiographic image sequences in order to provide a mean for regional functional imaging. Our approach was to solve two problems in motion estimation from two-dimensional intracardiac echocardiographic image sequences: non-rigid myocardial deformation and speckle decorrelation. To achieve robust noise resistance, we employed maximum likelihood estimation while fully exploiting ultrasound speckle statistics, and treated the maximization of motion probability as the minimization of an energy function. Non-rigid myocardial deformation was estimated by optimizing this energy function within a framework of parametric elastic registration. Evaluation of the method was carried out using a computer model that synthesized echocardiographic image sequences, and subsequently an animal model that provided continuous intracardiac echocardiographic images as well as reference measurements using sonomicrometry crystals. In conclusion, accurate estimation of regional myocardial deformation from intracardiac echocardiography by novel speckle tracking is feasible. This approach may have important clinical implications for multimodal imaging during catheterization.
en
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=4639510
Archived with thanks to IEEE Transactions on Biomedical Engineering
cardiac imaging
myocardial strain
elastic registration
non-rigid deformation
sonomicrometry
Speckle tracking in intracardiac echocardiography for the assessment of myocardial deformation
Article
Intracardiac echocardiography has proven to be useful for online anatomical imaging during catheterization. Our objective was to develop a speckle tracking method for myocardial motion estimation from intracardiac echocardiographic image sequences in order to provide a mean for regional functional imaging. Our approach was to solve two problems in motion estimation from two-dimensional intracardiac echocardiographic image sequences: non-rigid myocardial deformation and speckle decorrelation. To achieve robust noise resistance, we employed maximum likelihood estimation while fully exploiting ultrasound speckle statistics, and treated the maximization of motion probability as the minimization of an energy function. Non-rigid myocardial deformation was estimated by optimizing this energy function within a framework of parametric elastic registration. Evaluation of the method was carried out using a computer model that synthesized echocardiographic image sequences, and subsequently an animal model that provided continuous intracardiac echocardiographic images as well as reference measurements using sonomicrometry crystals. In conclusion, accurate estimation of regional myocardial deformation from intracardiac echocardiography by novel speckle tracking is feasible. This approach may have important clinical implications for multimodal imaging during catheterization.
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/250941/1/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
1
false
10547/250941
oai:uobrep.openrepository.com:10547/250941
2020-04-23 07:29:10.116
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
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
oai:uobrep.openrepository.com:10547/2509402020-04-23T08:42:53Zcom_10547_132192col_10547_132230
Viduto, Valentina
daa57fcd000111bf463ee9df7c457587
600
Maple, Carsten
a4dc0842fb0b0b3b6d15dd203a61bd1f
-1
Huang, Wei
79e77a152c5bf6b8d75438d4d7bfbf33
-1
López-Peréz, David
79fab873b7620f1856c6eb21ab2df768
-1
2012-11-05T09:47:02Z
2012-11-05T09:47:02Z
2012-06
Viduto, V. et al (2012) 'A novel risk assessment and optimisation model for a multi-objective network security countermeasure selection problem' Decision Support Systems 53 (3):599-610
0167-9236
10.1016/j.dss.2012.04.001
http://hdl.handle.net/10547/250940
Decision Support Systems
Budget cuts and the high demand in strengthening the security of computer systems and services constitute a challenge. Poor system knowledge and inappropriate selection of security measures may lead to unexpected financial and data losses. This paper proposes a novel Risk Assessment and Optimisation Model (RAOM) to solve a security countermeasure selection problem, where variables such as financial cost and risk may affect a final decision. A Multi-Objective Tabu Search (MOTS) algorithm has been developed to construct an efficient frontier of non-dominated solutions, which can satisfy organisational security needs in a cost-effective manner.
en
els
http://linkinghub.elsevier.com/retrieve/pii/S0167923612000978
financial decision support
risk assessment
countermeasure selection problem
multi-objective optimisation
tabu search
A novel risk assessment and optimisation model for a multi-objective network security countermeasure selection problem
Article
Budget cuts and the high demand in strengthening the security of computer systems and services constitute a challenge. Poor system knowledge and inappropriate selection of security measures may lead to unexpected financial and data losses. This paper proposes a novel Risk Assessment and Optimisation Model (RAOM) to solve a security countermeasure selection problem, where variables such as financial cost and risk may affect a final decision. A Multi-Objective Tabu Search (MOTS) algorithm has been developed to construct an efficient frontier of non-dominated solutions, which can satisfy organisational security needs in a cost-effective manner.
THUMBNAIL
elsevier-thumbnail.png
application/octet-stream
131893
https://uobrep.openrepository.com/bitstream/10547/250940/2/elsevier-thumbnail.png
d01e225f7c4831d487ebdbaba32fb63d
MD5
2
false
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/250940/1/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
1
false
10547/250940
oai:uobrep.openrepository.com:10547/250940
2020-04-23 08:42:53.952
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
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
oai:uobrep.openrepository.com:10547/2509192020-04-23T07:36:54Zcom_10547_132192col_10547_132230
Conrad, Marc
c6d205a5c2149a7b0af55b805ff88a6c
600
Neale, Jo
89a50b624b661d12f6befd44b75341e3
600
Charles, Alec
cf9e6d97ca7829dfe8d96224d7b45fdf
-1
University of Bedfordshire
2012-11-05T10:57:08Z
2012-11-05T10:57:08Z
2010-12
Conrad, M.,Neale, J.,Charles, A. (2010) 'This Is My Body: The Uses and Effects of the Avatar in the Virtual World', International Journal for Infonomics, 3 (4): 360-368
1742-4712
http://hdl.handle.net/10547/250919
International Journal for Infonomics
The study focuses on the relationship users of virtual worlds, such as Second Life, may or may not develop toward the avatar they use. A questionnaire was developed to collect both qualitative and quantitative data from students engaged in a university assignment that required them to use an avatar in Second Life. The findings are contextualized and discussed: The distinctions between software, hardware and self are blurred.
en
Infonomics Society
http://www.infonomics-society.org/IJI/Contents%20Page%20Volume%203%20Issue%204.pdf
This is my body: the uses and effects of the avatar in the virtual world
Article
The study focuses on the relationship users of
virtual worlds, such as Second Life, may or may not
develop toward the avatar they use. A questionnaire
was developed to collect both qualitative and
quantitative data from students engaged in a
university assignment that required them to use an
avatar in Second Life. The findings are
contextualized and discussed: The distinctions
between software, hardware and self are blurred.
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/250919/1/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
1
false
10547/250919
oai:uobrep.openrepository.com:10547/250919
2020-04-23 07:36:54.792
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
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
oai:uobrep.openrepository.com:10547/2509392020-04-23T07:30:53Zcom_10547_132192col_10547_132230
Trinitis, Carsten
6a34947dfac48fd0c1891c400a06e265
-1
Küstner, Tilman
8e84b3491bf454041c28a305a0cd9cda
-1
Weidendorfer, Josef
606e5270239bfdeb523552f3cfd92164
-1
Smajic, Jasmin
7d27bdf7bc1472c7d49600865bed79fb
-1
2012-11-05T09:45:43Z
2012-11-05T09:45:43Z
2010
Trinitis, C. et al (2010) 'Sparse matrix operations on several multi-core architectures' The Journal of Supercomputing 57 (2):132-140
0920-8542
1573-0484
10.1007/s11227-010-0428-9
http://hdl.handle.net/10547/250939
The Journal of Supercomputing
From the issue entitled "Special Issue on Parallel Computing Technologies"
This paper compares various contemporary multicore-based microprocessor architectures from different vendors with different memory interconnects regarding performance, speedup, and parallel efficiency. Sparse matrix decomposition is used as a benchmark application. The example matrix used in the experiments comes from an electrical engineering application, where numerical simulation of physical processes plays an important role in the design of industrial products. Within this context, thread-to-core pinning and cache optimization are two important aspects which are investigated in more detail.
en
SpringerLink
http://www.springerlink.com/index/10.1007/s11227-010-0428-9
multicore
pinning
cache optimization
performance optimization
sparse matrices
Sparse matrix operations on several multi-core architectures
Article
This paper compares various contemporary multicore-based microprocessor architectures from different vendors with different memory interconnects regarding performance, speedup, and parallel efficiency. Sparse matrix decomposition is used as a benchmark application. The example matrix used in the experiments comes from an electrical engineering application, where numerical simulation of physical processes plays an important role in the design of industrial products. Within this context, thread-to-core pinning and cache optimization are two important aspects which are investigated in more detail.
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/250939/1/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
1
false
10547/250939
oai:uobrep.openrepository.com:10547/250939
2020-04-23 07:30:53.861
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
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
oai:uobrep.openrepository.com:10547/2518142020-04-23T07:29:13Zcom_10547_132192col_10547_132230
Trinitis, Carsten
6a34947dfac48fd0c1891c400a06e265
-1
Weidendorfer, Josef
606e5270239bfdeb523552f3cfd92164
-1
2012-11-12T13:29:24Z
2012-11-12T13:29:24Z
2008-11
Weidendorfer, J., Trinitis, C.
(2008) 'Off-loading application controlled data prefetching in numerical codes for multicore
processors', 4 (1): 22-28, Int. J. of Computational Science and Engineering
1742-7185
http://hdl.handle.net/10547/251814
1742-7193
International Journal of Computational Science and Engineering
An important issue when designing numerical code in High Performance Computing is cache optimisation in order to exploit the performance potential of a given target architecture. This includes techniques to improve memory access locality as well as prefetching. Inherent algorithm constrains often limit the first approach, which typically uses a blocking technique. While there exist automatic prefetching mechanisms in hardware and/or compilers, they can not complement blocking with additional prefetching. We provide an infrastructure for off-loading application controlled prefetching on a chip multiprocessor, allowing to further improve numerical code already optimised by standard cache optimisation. Clear benefits are shown for real workloads on existing hardware.
en
Inderscience
http://dl.acm.org/citation.cfm?id=1457171
Off-loading application controlled data prefetching in numerical codes for multi-core processors
Article
An important issue when designing numerical code in High Performance Computing is cache optimisation in order to exploit the performance potential of a given target architecture. This includes techniques to improve memory access locality as well as prefetching. Inherent algorithm constrains often limit the first approach, which typically uses a blocking technique. While there exist automatic prefetching mechanisms in hardware and/or compilers, they can not complement blocking with additional prefetching. We provide an infrastructure for off-loading application controlled prefetching on a chip multiprocessor, allowing to further improve numerical code already optimised by standard cache optimisation. Clear benefits are shown for real workloads on existing hardware.
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/251814/1/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
1
false
10547/251814
oai:uobrep.openrepository.com:10547/251814
2020-04-23 07:29:13.182
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
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
oai:uobrep.openrepository.com:10547/2550522018-06-19T10:34:36Zcom_10547_132192col_10547_132230
Chen, Weiru
Lu, Jing
0000-0001-9163-8795
600
Keech, Malcolm
2012-12-10T08:16:52Z
2012-12-10T08:16:52Z
2010
Chen, w. Lu, J, Keech, M (2010) Discovering exclusive patterns in frequent sequences. International Journal of Data Mining, Modelling and Management,Vol.2,(3) pp.252 - 267
1759-1163
1759-1171
http://hdl.handle.net/10547/255052
International Journal of Data Mining, Modelling and Management
en
Inderscience Publishers
http://www.inderscience.com/info/inarticle.php?artid=33536
An error occurred on the license name.
An error occurred getting the license - uri.
G560 Data Management
G510 Information Modelling
data mining
Discovering exclusive patterns in frequent sequences
Article
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/255052/4/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
4
false
10547/255052
oai:uobrep.openrepository.com:10547/255052
2018-06-19 10:34:36.758
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
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
oai:uobrep.openrepository.com:10547/2682922020-04-23T07:29:19Zcom_10547_132192col_10547_132230
Larsen, Birger
ffd460f956ec73c305c801bf1c0e128d
-1
Lioma, Christina
d6d040e5368878cab858c62633809989
-1
Frommholz, Ingo
396e6c54333cdc57cfa200c3f67a3f28
-1
Schütze, Hinrich
69f4e0b1c927f85f390c864e2778a34f
-1
2013-02-05T11:44:21Z
2013-02-05T11:44:21Z
2012-08
Birger Larsen, Christina Lioma, Ingo Frommholz, and Hinrich Schütze. 2012. Preliminary study of technical terminology for the retrieval of scientific book metadata records. In Proceedings of the 35th international ACM SIGIR conference on Research and development in information retrieval (SIGIR '12). ACM, New York, NY, USA, 1131-1132. DOI=10.1145/2348283.2348504 http://doi.acm.org/10.1145/2348283.2348504
10.1145/2348283.2348504
http://hdl.handle.net/10547/268292
SIGIR, 2012
Books only represented by brief metadata (book records) are particularly hard to retrieve. One way of improving their retrieval is by extracting retrieval enhancing features from them. This work focusses on scientific (physics) book records. We ask if their technical terminology can be used as a retrieval enhancing feature. A study of 18,443 book records shows a strong correlation between their technical terminology and their likelihood of relevance. Using this finding for retrieval yields >+5% precision and recall gains.
en
Association for Computing Machinery (ACM)
http://dl.acm.org/citation.cfm?doid=2348283.2348504
G500 Information Systems
book records
technical terminology
information storage and retrieval
metadata
Preliminary study of technical terminology for the retrieval of scientific book metadata records
Conference papers, meetings and proceedings
Books only represented by brief metadata (book records) are particularly hard to retrieve. One way of improving their retrieval is by extracting retrieval enhancing features from them. This work focusses on scientific (physics) book records. We ask if their technical terminology can be used as a retrieval enhancing feature. A study of 18,443 book records shows a strong correlation between their technical terminology and their likelihood of relevance. Using this finding for retrieval yields >+5% precision and recall gains.
ORIGINAL
Frommholz.pdf
Frommholz.pdf
Full text
application/pdf
381605
https://uobrep.openrepository.com/bitstream/10547/268292/1/Frommholz.pdf
fb311e895929d0898ba17c9d75f3d600
MD5
1
true
CC-LICENSE
license_url
license_url
text/plain
49
https://uobrep.openrepository.com/bitstream/10547/268292/2/license_url
fd26723f8d7edacdb29e3f03465c3b03
MD5
2
false
license_text
license_text
application/octet-stream
0
https://uobrep.openrepository.com/bitstream/10547/268292/3/license_text
d41d8cd98f00b204e9800998ecf8427e
MD5
3
false
license_rdf
license_rdf
application/octet-stream
23599
https://uobrep.openrepository.com/bitstream/10547/268292/4/license_rdf
9e2b7f6edbd693264102b96ece20428a
MD5
4
false
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/268292/5/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
5
false
TEXT
Frommholz.pdf.txt
Frommholz.pdf.txt
Extracted Text
text/plain
10807
https://uobrep.openrepository.com/bitstream/10547/268292/8/Frommholz.pdf.txt
3ff5af85efdbef99004a66b617306bdd
MD5
8
false
THUMBNAIL
Frommholz.pdf.jpg
Frommholz.pdf.jpg
Generated Thumbnail
image/jpeg
2466
https://uobrep.openrepository.com/bitstream/10547/268292/7/Frommholz.pdf.jpg
f856e4d80692f0a443197bb6446ec380
MD5
7
false
10547/268292
oai:uobrep.openrepository.com:10547/268292
2020-04-23 07:29:19.975
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
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
oai:uobrep.openrepository.com:10547/2705782020-04-23T07:29:24Zcom_10547_132192col_10547_132230
Maple, Carsten
a4dc0842fb0b0b3b6d15dd203a61bd1f
-1
Short, Emma
a8c128810fc10c0f9f8155c13b72e825
-1
Brown, Antony
db7fd7863767722d18ea1370b456e2be
-1
University of Bedfordshire
2013-02-27T16:49:07Z
2013-02-27T16:49:07Z
2011
Maple, C., Shart, E., Brown, A. (2011) Cyberstalking in the United Kingdom: An Analysis of the ECHO Pilot Survey.
http://hdl.handle.net/10547/270578
An Analysis of the ECHO Pilot Survey
Network for Surviving Stalking is internationally recognised as the leading Registered Charity in the United Kingdom dedicated to supporting victims of stalking, free of cost or commercial gain. It aims to provide support to victims, potential victims and others affected by stalking or harassment throughout the UK, to raise awareness of the subject and to provide information about stalking and harassment to professionals, relevant agencies and the public. As we have moved into an age of electronic information and communication, stalkers have found new, more effective and efficient means to perpetrate their malicious acts; stalkers have become Cyberstalkers. Cyberstalking has become somewhat of an epidemic stretching across the globe. Network for Surviving Stalking began to notice that an increasing number of people searching for support were being stalked or harassed online, making the charity concerned as to the prevalence, nature and impact of cyberstalking. The charity commissioned a team of researchers and together developed an online questionnaire to establish answers to these questions. This report provides an analysis of the responses to the questionnaire.
Crown Prosecution Service and Network for Surviving Stalking.
en
University of Bedfordshire
http://www.beds.ac.uk/__data/assets/pdf_file/0003/83109/ECHO_Pilot_Final.pdf
cyber security
cyberstalking
Cyberstalking in the United Kingdom: an analysis of the ECHO Pilot Survey
Technical Report
Network for Surviving Stalking is internationally recognised as the leading Registered Charity in the United Kingdom dedicated to supporting victims of stalking, free of cost or commercial gain. It aims to provide support to victims, potential victims and others affected by stalking or harassment throughout the UK, to raise awareness of the subject and to provide information about stalking and harassment to professionals, relevant agencies and the public. As we have moved into an age of electronic information and communication, stalkers have found new, more effective and efficient means to perpetrate their malicious acts; stalkers have become Cyberstalkers. Cyberstalking has become somewhat of an epidemic stretching across the globe. Network for Surviving Stalking began to notice that an increasing number of people searching for support were being stalked or harassed online, making the charity concerned as to the prevalence, nature and impact of cyberstalking. The charity commissioned a team of researchers and together developed an online questionnaire to establish answers to these questions. This report provides an analysis of the responses to the questionnaire.
ORIGINAL
ECHO_Pilot_Final.pdf
ECHO_Pilot_Final.pdf
Full-text paper
application/pdf
4122509
https://uobrep.openrepository.com/bitstream/10547/270578/1/ECHO_Pilot_Final.pdf
9006cdd992950a5666bee9adf564332f
MD5
1
true
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/270578/2/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
2
false
TEXT
ECHO_Pilot_Final.pdf.txt
ECHO_Pilot_Final.pdf.txt
Extracted Text
text/plain
54506
https://uobrep.openrepository.com/bitstream/10547/270578/8/ECHO_Pilot_Final.pdf.txt
4c25eda5432265953a7085bc30f7af50
MD5
8
false
THUMBNAIL
ECHO_Pilot_Final.pdf.jpg
ECHO_Pilot_Final.pdf.jpg
Generated Thumbnail
image/jpeg
2032
https://uobrep.openrepository.com/bitstream/10547/270578/4/ECHO_Pilot_Final.pdf.jpg
53bdd1f032139155841baa7b84823a75
MD5
4
false
CC-LICENSE
license_url
license_url
text/plain
49
https://uobrep.openrepository.com/bitstream/10547/270578/5/license_url
fd26723f8d7edacdb29e3f03465c3b03
MD5
5
false
license_text
license_text
application/octet-stream
0
https://uobrep.openrepository.com/bitstream/10547/270578/7/license_text
d41d8cd98f00b204e9800998ecf8427e
MD5
7
false
license_rdf
license_rdf
application/octet-stream
23599
https://uobrep.openrepository.com/bitstream/10547/270578/6/license_rdf
9e2b7f6edbd693264102b96ece20428a
MD5
6
false
10547/270578
oai:uobrep.openrepository.com:10547/270578
2020-04-23 07:29:24.217
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
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
oai:uobrep.openrepository.com:10547/2706072020-04-23T07:29:24Zcom_10547_132192col_10547_132230
Cheng, Long
ef13dccadbf7f4eff7bef8da7ee29db2
-1
Wu, Chengdong
281255bcbe86a4f5d9a24f4d9c9f2ed9
-1
Zhang, Yunzhou
cafdfe877fdbe06e800a16984d18b0c0
-1
Wu, Hao
8d82ab562af5049ca30c872d539b007d
-1
Li, Mengxin
4319a499f805716bea30fe0898ef4c4b
-1
Maple, Carsten
a4dc0842fb0b0b3b6d15dd203a61bd1f
-1
2013-02-27T17:25:32Z
2013-02-27T17:25:32Z
2012
Cheng, L., Wu, C., Zhang, Y., Wu, H., Li, M. and Maple, C. (2012) “A Survey of Localization in Wireless Sensor Network,” International Journal of Distributed Sensor Networks, 2012,. doi:10.1155/2012/962523
1550-1329
1550-1477
10.1155/2012/962523
http://hdl.handle.net/10547/270607
International Journal of Distributed Sensor Networks
Localization is one of the key techniques in wireless sensor network. The location estimation methods can be classified into target/source localization and node self-localization. In target localization, we mainly introduce the energy-based method. Then we investigate the node self-localization methods. Since the widespread adoption of the wireless sensor network, the localization methods are different in various applications. And there are several challenges in some special scenarios. In this paper, we present a comprehensive survey of these challenges: localization in non-line-of-sight, node selection criteria for localization in energy-constrained network, scheduling the sensor node to optimize the tradeoff between localization performance and energy consumption, cooperative node localization, and localization algorithm in heterogeneous network. Finally, we introduce the evaluation criteria for localization in wireless sensor network.
en
Hindawi Publishing Corporation
http://www.hindawi.com/journals/ijdsn/2012/962523/
Archived with thanks to International Journal of Distributed Sensor Networks
wireless sensor networks
A survey of localization in wireless sensor network
Article
Localization is one of the key techniques in wireless sensor network. The location estimation methods can be classified into target/source localization and node self-localization. In target localization, we mainly introduce the energy-based method. Then we investigate the node self-localization methods. Since the widespread adoption of the wireless sensor network, the localization methods are different in various applications. And there are several challenges in some special scenarios. In this paper, we present a comprehensive survey of these challenges: localization in non-line-of-sight, node selection criteria for localization in energy-constrained network, scheduling the sensor node to optimize the tradeoff between localization performance and energy consumption, cooperative node localization, and localization algorithm in heterogeneous network. Finally, we introduce the evaluation criteria for localization in wireless sensor network.
ORIGINAL
962523.pdf
962523.pdf
application/pdf
693310
https://uobrep.openrepository.com/bitstream/10547/270607/1/962523.pdf
fc68c73b16c3bdba7c540e5136b18e13
MD5
1
true
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/270607/2/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
2
false
TEXT
962523.pdf.txt
962523.pdf.txt
Extracted Text
text/plain
66126
https://uobrep.openrepository.com/bitstream/10547/270607/8/962523.pdf.txt
e3ce9386d9db42ab2e155b436b145ab5
MD5
8
false
THUMBNAIL
962523.pdf.jpg
962523.pdf.jpg
Generated Thumbnail
image/jpeg
2099
https://uobrep.openrepository.com/bitstream/10547/270607/4/962523.pdf.jpg
54cc126ee05707465809293c0cf08ce9
MD5
4
false
CC-LICENSE
license_url
license_url
text/plain
49
https://uobrep.openrepository.com/bitstream/10547/270607/5/license_url
fd26723f8d7edacdb29e3f03465c3b03
MD5
5
false
license_text
license_text
application/octet-stream
0
https://uobrep.openrepository.com/bitstream/10547/270607/7/license_text
d41d8cd98f00b204e9800998ecf8427e
MD5
7
false
license_rdf
license_rdf
application/octet-stream
23599
https://uobrep.openrepository.com/bitstream/10547/270607/6/license_rdf
9e2b7f6edbd693264102b96ece20428a
MD5
6
false
10547/270607
oai:uobrep.openrepository.com:10547/270607
2020-04-23 07:29:24.549
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
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
oai:uobrep.openrepository.com:10547/2729732020-04-23T07:36:21Zcom_10547_132192col_10547_132230
Li, Wei
0fb59e4f674fb439baae270740ff659e
-1
Zhang, Yue
7e778400de5b478534ca65f047d7d1c5
600
Huang, Li-Ke
8601a9e6beebcb2f6a35238b50048dea
-1
Maple, Carsten
a4dc0842fb0b0b3b6d15dd203a61bd1f
-1
Cosmas, John
d37b74c73c1b0b91155543dfaffe08a3
600
University of Bedfordshire
2013-03-15T13:30:57Z
2013-03-15T13:30:57Z
2012
Li, W., Zhang, Y., Huang, L.K., Maple, C., Cosmas, J.P. (2012) 'Implementation and Co-Simulation of Hybrid Pilot-Aided Channel Estimation With Decision Feedback Equalizer for OFDM Systems' IEEE Transactions on Broadcasting 58 (4):590-602
0018-9316
1557-9611
10.1109/TBC.2012.2207249
http://hdl.handle.net/10547/272973
IEEE Transactions on Broadcasting
This paper introduces novel hybrid pilot-aided channel estimation with decision feedback equalizer(DFE) for OFDM systems and its corresponding hardware co-simulation platform. This pilot-aided channel estimation algorithm consists of two parts: coarse estimation and fine estimation. In the coarse estimation, the combined classical channel estimation methods including carrier frequency offset (CFO) and channel impulse response (CIR) estimation are used. Based on the received training sequence and pilot tones in the frequency domain, the major CFO, sampling clock frequency offset (SFO) and CIR effect coefficients are derived. In the fine estimation, the pilot-aided polynomial interpolation estimation combined with a new decision feedback equalizer scheme based on minimum mean squared error (MMSE) criteria is proposed to reduce the residual effect caused by imperfect CIR equalizer, SFO and CFO. At the same time, for the purpose of speeding up the whole development and verification process, a new architecture of co-simulation platform which combines software and hardware is introduced. The simulation results on the co-simulation platform indicate that the proposed hybrid channel estimation scheme can enhance the receiver performance by 6 dB in terms of error vector magnitude (EVM) over large ranges of CFO and SFO and BER performance by 7 dB for SNR range over 15 dB.
en
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6279474
Archived with thanks to IEEE Transactions on Broadcasting
CFO
DFE
EVM
FPGA
MMSE
OFDM
SFO
channel estimation
co-simulation
OFDM modulation
Implementation and co-simulation of hybrid pilot-aided channel estimation with decision feedback equalizer for OFDM systems
Article
This paper introduces novel hybrid pilot-aided channel estimation with decision feedback equalizer(DFE) for OFDM systems and its corresponding hardware co-simulation platform. This pilot-aided channel estimation algorithm consists of two parts: coarse estimation and fine estimation. In the coarse estimation, the combined classical channel estimation methods including carrier frequency offset (CFO) and channel impulse response (CIR) estimation are used. Based on the received training sequence and pilot tones in the frequency domain, the major CFO, sampling clock frequency offset (SFO) and CIR effect coefficients are derived. In the fine estimation, the pilot-aided polynomial interpolation estimation combined with a new decision feedback equalizer scheme based on minimum mean squared error (MMSE) criteria is proposed to reduce the residual effect caused by imperfect CIR equalizer, SFO and CFO. At the same time, for the purpose of speeding up the whole development and verification process, a new architecture of co-simulation platform which combines software and hardware is introduced. The simulation results on the co-simulation platform indicate that the proposed hybrid channel estimation scheme can enhance the receiver performance by 6 dB in terms of error vector magnitude (EVM) over large ranges of CFO and SFO and BER performance by 7 dB for SNR range over 15 dB.
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/272973/1/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
1
false
10547/272973
oai:uobrep.openrepository.com:10547/272973
2020-04-23 07:36:21.604
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
Tk9OLUVYQ0xVU0lWRSBESVNUUklCVVRJT04gTElDRU5TRQoKQnkgc2lnbmluZyBhbmQgc3VibWl0dGluZyB0aGlzIGxpY2Vuc2UsIHlvdSAodGhlIGF1dGhvcihzKSBvciBjb3B5cmlnaHQKb3duZXIpIGdyYW50cyB0byB0aGUgVW5pdmVyc2l0eSBvZiBCZWRmb3Jkc2hpcmUgUmVwb3NpdG9yeSAgKFVPQlJFUCkgdGhlIG5vbi1leGNsdXNpdmUgcmlnaHQgdG8gcmVwcm9kdWNlLAp0cmFuc2xhdGUgKGFzIGRlZmluZWQgYmVsb3cpLCBhbmQvb3IgZGlzdHJpYnV0ZSB5b3VyIHN1Ym1pc3Npb24gKGluY2x1ZGluZwp0aGUgYWJzdHJhY3QpIHdvcmxkd2lkZSBpbiBwcmludCBhbmQgZWxlY3Ryb25pYyBmb3JtYXQgYW5kIGluIGFueSBtZWRpdW0sCmluY2x1ZGluZyBidXQgbm90IGxpbWl0ZWQgdG8gYXVkaW8gb3IgdmlkZW8uCgpZb3UgYWdyZWUgdGhhdCBVT0JSRVAgbWF5LCB3aXRob3V0IGNoYW5naW5nIHRoZSBjb250ZW50LCB0cmFuc2xhdGUgdGhlCnN1Ym1pc3Npb24gdG8gYW55IG1lZGl1bSBvciBmb3JtYXQgZm9yIHRoZSBwdXJwb3NlIG9mIHByZXNlcnZhdGlvbi4KCllvdSBhbHNvIGFncmVlIHRoYXQgVU9CUkVQIG1heSBrZWVwIG1vcmUgdGhhbiBvbmUgY29weSBvZiB0aGlzIHN1Ym1pc3Npb24gZm9yCnB1cnBvc2VzIG9mIHNlY3VyaXR5LCBiYWNrLXVwIGFuZCBwcmVzZXJ2YXRpb24uCgpZb3UgcmVwcmVzZW50IHRoYXQgdGhlIHN1Ym1pc3Npb24gaXMgeW91ciBvcmlnaW5hbCB3b3JrLCBhbmQgdGhhdCB5b3UgaGF2ZQp0aGUgcmlnaHQgdG8gZ3JhbnQgdGhlIHJpZ2h0cyBjb250YWluZWQgaW4gdGhpcyBsaWNlbnNlLiBZb3UgYWxzbyByZXByZXNlbnQKdGhhdCB5b3VyIHN1Ym1pc3Npb24gZG9lcyBub3QsIHRvIHRoZSBiZXN0IG9mIHlvdXIga25vd2xlZGdlLCBpbmZyaW5nZSB1cG9uCmFueW9uZSdzIGNvcHlyaWdodC4KCklmIHRoZSBzdWJtaXNzaW9uIGNvbnRhaW5zIG1hdGVyaWFsIGZvciB3aGljaCB5b3UgZG8gbm90IGhvbGQgY29weXJpZ2h0LAp5b3UgcmVwcmVzZW50IHRoYXQgeW91IGhhdmUgb2J0YWluZWQgdGhlIHVucmVzdHJpY3RlZCBwZXJtaXNzaW9uIG9mIHRoZQpjb3B5cmlnaHQgb3duZXIgdG8gZ3JhbnQgVU9CUkVQIHRoZSByaWdodHMgcmVxdWlyZWQgYnkgdGhpcyBsaWNlbnNlLCBhbmQgdGhhdApzdWNoIHRoaXJkLXBhcnR5IG93bmVkIG1hdGVyaWFsIGlzIGNsZWFybHkgaWRlbnRpZmllZCBhbmQgYWNrbm93bGVkZ2VkCndpdGhpbiB0aGUgdGV4dCBvciBjb250ZW50IG9mIHRoZSBzdWJtaXNzaW9uLgoKSUYgVEhFIFNVQk1JU1NJT04gSVMgQkFTRUQgVVBPTiBXT1JLIFRIQVQgSEFTIEJFRU4gU1BPTlNPUkVEIE9SIFNVUFBPUlRFRApCWSBBTiBBR0VOQ1kgT1IgT1JHQU5JWkFUSU9OIE9USEVSIFRIQU4gVEVTVE9SLCBZT1UgUkVQUkVTRU5UIFRIQVQgWU9VIEhBVkUKRlVMRklMTEVEIEFOWSBSSUdIVCBPRiBSRVZJRVcgT1IgT1RIRVIgT0JMSUdBVElPTlMgUkVRVUlSRUQgQlkgU1VDSApDT05UUkFDVCBPUiBBR1JFRU1FTlQuCgpVT0JSRVAgd2lsbCBjbGVhcmx5IGlkZW50aWZ5IHlvdXIgbmFtZShzKSBhcyB0aGUgYXV0aG9yKHMpIG9yIG93bmVyKHMpIG9mIHRoZQpzdWJtaXNzaW9uLCBhbmQgd2lsbCBub3QgbWFrZSBhbnkgYWx0ZXJhdGlvbiwgb3RoZXIgdGhhbiBhcyBhbGxvd2VkIGJ5IHRoaXMKbGljZW5zZSwgdG8geW91ciBzdWJtaXNzaW9uLgo=
oai:uobrep.openrepository.com:10547/2729722020-04-23T07:29:26Zcom_10547_132192col_10547_132230
Liu, Beisheng
f51f42a3f46e7e2d07193c35b06bd311
-1
Li, Dayou
6295afce2b3b8447f935ff4664ecd492
-1
Qiu, Renxi
c2878327e497918ac94d317d184846f2
-1
Yue, Yong
59d04f0f8e57359fc0492dc893f8df61
-1
Maple, Carsten
a4dc0842fb0b0b3b6d15dd203a61bd1f
-1
Gu, Shuang
72fffe9c536e25b43a27fdad6ae32cda
-1
University of Bedfordshire
2013-03-15T11:45:11Z
2013-03-15T11:45:11Z
2012
Liu, B., Li, D., Qiu, R., Yue, Y., Maple, C., Gu, S. (2012) 'Fuzzy optimisation based symbolic grounding for service robots' Intelligent Robots and Systems (IROS), 2012 IEEE/RSJ International Conference on , vol., no., pp.1658-1664, 7-12 Oct. 2012
9781467317375
10.1109/IROS.2012.6385777
http://hdl.handle.net/10547/272972
Symbolic grounding is a bridge between high-level planning and actual robot sensing, and actuation. Uncertainties raised by the unstructured environment make a bottleneck for integrating traditional artificial intelligence with service robotics. This paper presents a fuzzy logic based approach to formalise the grounding problems into a fuzzy optimization problem, which is robust to uncertainties. Novel techniques are applied to establish the objective function, to model fuzzy constraints and to perform fuzzy optimisation. The outcome is tested with a service robot fetch and carry task, where the fuzzy optimisation approach helps the robot to determine the most comfortable position (location and orientation) for grasping objects. Experimental results show that the proposed approach improves the robustness of the task implementation in unstructured environments.
en
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6385777
collision avoidance
grasping
grounding
optimization
robot sensing systems
trajectory
robotics
fuzzy optimisation
Fuzzy optimisation based symbolic grounding for service robots
Conference papers, meetings and proceedings
Symbolic grounding is a bridge between high-level planning and actual robot sensing, and actuation. Uncertainties raised by the unstructured environment make a bottleneck for integrating traditional artificial intelligence with service robotics. This paper presents a fuzzy logic based approach to formalise the grounding problems into a fuzzy optimization problem, which is robust to uncertainties. Novel techniques are applied to establish the objective function, to model fuzzy constraints and to perform fuzzy optimisation. The outcome is tested with a service robot fetch and carry task, where the fuzzy optimisation approach helps the robot to determine the most comfortable position (location and orientation) for grasping objects. Experimental results show that the proposed approach improves the robustness of the task implementation in unstructured environments.
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/272972/1/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
1
false
10547/272972
oai:uobrep.openrepository.com:10547/272972
2020-04-23 07:29:26.528
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
Tk9OLUVYQ0xVU0lWRSBESVNUUklCVVRJT04gTElDRU5TRQoKQnkgc2lnbmluZyBhbmQgc3VibWl0dGluZyB0aGlzIGxpY2Vuc2UsIHlvdSAodGhlIGF1dGhvcihzKSBvciBjb3B5cmlnaHQKb3duZXIpIGdyYW50cyB0byB0aGUgVW5pdmVyc2l0eSBvZiBCZWRmb3Jkc2hpcmUgUmVwb3NpdG9yeSAgKFVPQlJFUCkgdGhlIG5vbi1leGNsdXNpdmUgcmlnaHQgdG8gcmVwcm9kdWNlLAp0cmFuc2xhdGUgKGFzIGRlZmluZWQgYmVsb3cpLCBhbmQvb3IgZGlzdHJpYnV0ZSB5b3VyIHN1Ym1pc3Npb24gKGluY2x1ZGluZwp0aGUgYWJzdHJhY3QpIHdvcmxkd2lkZSBpbiBwcmludCBhbmQgZWxlY3Ryb25pYyBmb3JtYXQgYW5kIGluIGFueSBtZWRpdW0sCmluY2x1ZGluZyBidXQgbm90IGxpbWl0ZWQgdG8gYXVkaW8gb3IgdmlkZW8uCgpZb3UgYWdyZWUgdGhhdCBVT0JSRVAgbWF5LCB3aXRob3V0IGNoYW5naW5nIHRoZSBjb250ZW50LCB0cmFuc2xhdGUgdGhlCnN1Ym1pc3Npb24gdG8gYW55IG1lZGl1bSBvciBmb3JtYXQgZm9yIHRoZSBwdXJwb3NlIG9mIHByZXNlcnZhdGlvbi4KCllvdSBhbHNvIGFncmVlIHRoYXQgVU9CUkVQIG1heSBrZWVwIG1vcmUgdGhhbiBvbmUgY29weSBvZiB0aGlzIHN1Ym1pc3Npb24gZm9yCnB1cnBvc2VzIG9mIHNlY3VyaXR5LCBiYWNrLXVwIGFuZCBwcmVzZXJ2YXRpb24uCgpZb3UgcmVwcmVzZW50IHRoYXQgdGhlIHN1Ym1pc3Npb24gaXMgeW91ciBvcmlnaW5hbCB3b3JrLCBhbmQgdGhhdCB5b3UgaGF2ZQp0aGUgcmlnaHQgdG8gZ3JhbnQgdGhlIHJpZ2h0cyBjb250YWluZWQgaW4gdGhpcyBsaWNlbnNlLiBZb3UgYWxzbyByZXByZXNlbnQKdGhhdCB5b3VyIHN1Ym1pc3Npb24gZG9lcyBub3QsIHRvIHRoZSBiZXN0IG9mIHlvdXIga25vd2xlZGdlLCBpbmZyaW5nZSB1cG9uCmFueW9uZSdzIGNvcHlyaWdodC4KCklmIHRoZSBzdWJtaXNzaW9uIGNvbnRhaW5zIG1hdGVyaWFsIGZvciB3aGljaCB5b3UgZG8gbm90IGhvbGQgY29weXJpZ2h0LAp5b3UgcmVwcmVzZW50IHRoYXQgeW91IGhhdmUgb2J0YWluZWQgdGhlIHVucmVzdHJpY3RlZCBwZXJtaXNzaW9uIG9mIHRoZQpjb3B5cmlnaHQgb3duZXIgdG8gZ3JhbnQgVU9CUkVQIHRoZSByaWdodHMgcmVxdWlyZWQgYnkgdGhpcyBsaWNlbnNlLCBhbmQgdGhhdApzdWNoIHRoaXJkLXBhcnR5IG93bmVkIG1hdGVyaWFsIGlzIGNsZWFybHkgaWRlbnRpZmllZCBhbmQgYWNrbm93bGVkZ2VkCndpdGhpbiB0aGUgdGV4dCBvciBjb250ZW50IG9mIHRoZSBzdWJtaXNzaW9uLgoKSUYgVEhFIFNVQk1JU1NJT04gSVMgQkFTRUQgVVBPTiBXT1JLIFRIQVQgSEFTIEJFRU4gU1BPTlNPUkVEIE9SIFNVUFBPUlRFRApCWSBBTiBBR0VOQ1kgT1IgT1JHQU5JWkFUSU9OIE9USEVSIFRIQU4gVEVTVE9SLCBZT1UgUkVQUkVTRU5UIFRIQVQgWU9VIEhBVkUKRlVMRklMTEVEIEFOWSBSSUdIVCBPRiBSRVZJRVcgT1IgT1RIRVIgT0JMSUdBVElPTlMgUkVRVUlSRUQgQlkgU1VDSApDT05UUkFDVCBPUiBBR1JFRU1FTlQuCgpVT0JSRVAgd2lsbCBjbGVhcmx5IGlkZW50aWZ5IHlvdXIgbmFtZShzKSBhcyB0aGUgYXV0aG9yKHMpIG9yIG93bmVyKHMpIG9mIHRoZQpzdWJtaXNzaW9uLCBhbmQgd2lsbCBub3QgbWFrZSBhbnkgYWx0ZXJhdGlvbiwgb3RoZXIgdGhhbiBhcyBhbGxvd2VkIGJ5IHRoaXMKbGljZW5zZSwgdG8geW91ciBzdWJtaXNzaW9uLgo=
oai:uobrep.openrepository.com:10547/2729542020-04-23T07:36:21Zcom_10547_132192col_10547_132230
Liu, Jiamin
c62076efe90e24d0267529aab534b41f
-1
Zhang, Xiaorui
7996d537cf02056803eca7f3060b2099
-1
Yue, Yong
59d04f0f8e57359fc0492dc893f8df61
-1
Maple, Carsten
a4dc0842fb0b0b3b6d15dd203a61bd1f
-1
Shenyang University of Technology
University of Bedfordshire
2013-03-15T11:41:50Z
2013-03-15T11:41:50Z
2012
Liu, J., Zhang, X., Yue, Y., Maple, C., (2012) 'Effectively handling three-dimensional spaces for container loading' 2012 International Conference on Numerical Analysis and Applied Mathematics, Kos, Greece, 19-25 September 2012
9780735410916
10.1063/1.4756569
http://hdl.handle.net/10547/272954
To improve space utilization, the method for handling spaces plays an important role in the container loading problem. This paper deals with loading a set of cuboid items into a single container to maximize the utilization of the space. Six space partitions are presented and a set of rules for merging spaces is proposed. Through experimentation, using a benchmark data set, the influence of partitioning and merging are analyzed. The experimental results show that partitioning and merging in which all loaded boxes have one hundred percent support from below can produce good space utilization.
en
American Institute of Physics
http://link.aip.org/link/APCPCS/v1479/i1/p1960/s1&Agg=doi
space utilization
Effectively handling three-dimensional spaces for container loading
Conference papers, meetings and proceedings
To improve space utilization, the method for handling spaces plays an important role in the container loading problem. This paper deals with loading a set of cuboid items into a single container to maximize the utilization of the space. Six space partitions are presented and a set of rules for merging spaces is proposed. Through experimentation, using a benchmark data set, the influence of partitioning and merging are analyzed. The experimental results show that partitioning and merging in which all loaded boxes have one hundred percent support from below can produce good space utilization.
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/272954/1/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
1
false
10547/272954
oai:uobrep.openrepository.com:10547/272954
2020-04-23 07:36:21.088
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
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
oai:uobrep.openrepository.com:10547/2729532020-04-23T07:29:26Zcom_10547_132192col_10547_132230
Liu, Beisheng
f51f42a3f46e7e2d07193c35b06bd311
-1
Li, Dayou
6295afce2b3b8447f935ff4664ecd492
-1
Yue, Yong
59d04f0f8e57359fc0492dc893f8df61
-1
Maple, Carsten
a4dc0842fb0b0b3b6d15dd203a61bd1f
-1
Gu, Shuang
72fffe9c536e25b43a27fdad6ae32cda
-1
Qiu, Renxi
c2878327e497918ac94d317d184846f2
-1
University of Bedfordshire
2013-03-15T11:38:55Z
2013-03-15T11:38:55Z
2012
Beisheng Liu;, Dayou Li, Yong Yue, Maple, C., Shuang Gu, Renxi Qiu, (2012) 'Fuzzy logic based symbolic grounding for best grasp pose for homecare robotics', Industrial Informatics (INDIN), 10th IEEE International Conference on , pp.1164-1169, 25-27 July 2012
9781467303125
10.1109/INDIN.2012.6300855
http://hdl.handle.net/10547/272953
Symbolic grounding in unstructured environments remains an important challenge in robotics [7]. Homecare robots are often required to be instructed by their human users intuitively, which means the robots are expected to take highlevel commands and execute corresponding tasks in a domestic environment. High-level commands are represented with symbolic terms such as “near” and “close” and, on the other hand, robots are controlled based on trajectories. The robots need to translate the symbolic terms to trajectories. In addition, domestic environment is unstructured where the same objects can be placed in different places over the time. This increases the difficulties in symbolic grounding. This paper presents a fuzzy logic based approach to symbolic grounding. In this approach, grounded concepts are modelled as fuzzy sets and the existing knowledge is used to deduce grounded values given real-time sensory inputs. Experiments results show that this approach works well in unstructured environment.
en
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6300855
fuzzy logic
homecare robots
robotics
symbolic grounding
unstructured environments
Fuzzy logic based symbolic grounding for best grasp pose for homecare robotics
Conference papers, meetings and proceedings
Symbolic grounding in unstructured environments remains an important challenge in robotics [7]. Homecare robots are often required to be instructed by their human users intuitively, which means the robots are expected to take highlevel commands and execute corresponding tasks in a domestic environment. High-level commands are represented with symbolic terms such as “near” and “close” and, on the other hand, robots are controlled based on trajectories. The robots need to translate the symbolic terms to trajectories. In addition, domestic environment is unstructured where the same objects can be placed in different places over the time. This increases the difficulties in symbolic grounding. This paper presents a fuzzy logic based approach to symbolic grounding. In this approach, grounded concepts are modelled as fuzzy sets and the existing knowledge is used to deduce grounded values given real-time sensory inputs. Experiments results show that this approach works well in unstructured environment.
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/272953/1/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
1
false
10547/272953
oai:uobrep.openrepository.com:10547/272953
2020-04-23 07:29:26.609
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
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
oai:uobrep.openrepository.com:10547/2707782020-04-23T07:29:33Zcom_10547_132192col_10547_132230
Viduto, Valentina
daa57fcd000111bf463ee9df7c457587
600
Maple, Carsten
a4dc0842fb0b0b3b6d15dd203a61bd1f
-1
Huang, Wei
79e77a152c5bf6b8d75438d4d7bfbf33
-1
Bochenkov, Alexey
d52b9a3f8c69333aa01d1fa02354b3a7
-1
2013-03-01T10:33:41Z
2013-03-01T10:33:41Z
2012
Viduto, V., Maple, C., Huang. W. and Bochenkov, A. (2012) "A multi-objective genetic algorithm for minimising network security risk and cost," High Performance Computing and Simulation (HPCS), 2012 International Conference on , pp.462-467, 2-6 July 2012
9781467323598
10.1109/HPCSim.2012.6266959
http://hdl.handle.net/10547/270778
Security countermeasures help ensure information security: confidentiality, integrity and availability(CIA), by mitigating possible risks associated with the security event. Due to the fact, that it is often difficult to measure such an impact quantitatively, it is also difficult to deploy appropriate security countermeasures. In this paper, we demonstrate a model of quantitative risk analysis, where an optimisation routine is developed to help a human decision maker to determine the preferred trade-off between investment cost and resulting risk. An offline optimisation routine deploys a genetic algorithm to search for the best countermeasure combination, while multiple risk factors are considered. We conduct an experimentation with real world data, taken from the PTA(Practical Threat Analysis) case study to show that our method is capable of delivering solutions for real world problem data sets. The results show that the multi-objective genetic algorithm (MOGA) approach provides high quality solutions, resulting in better knowledge for decision making.
en
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6266959
countermeasure selection problem
decision making
genetic algorithm
IT security
risk optimisation
computer security
A multi-objective genetic algorithm for minimising network security risk and cost
Conference papers, meetings and proceedings
Security countermeasures help ensure information security: confidentiality, integrity and availability(CIA), by mitigating possible risks associated with the security event. Due to the fact, that it is often difficult to measure such an impact quantitatively, it is also difficult to deploy appropriate security countermeasures. In this paper, we demonstrate a model of quantitative risk analysis, where an optimisation routine is developed to help a human decision maker to determine the preferred trade-off between investment cost and resulting risk. An offline optimisation routine deploys a genetic algorithm to search for the best countermeasure combination, while multiple risk factors are considered. We conduct an experimentation with real world data, taken from the PTA(Practical Threat Analysis) case study to show that our method is capable of delivering solutions for real world problem data sets. The results show that the multi-objective genetic algorithm (MOGA) approach provides high quality solutions, resulting in better knowledge for decision making.
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/270778/1/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
1
false
ORIGINAL
06266959.pdf
06266959.pdf
Full text
application/pdf
167987
https://uobrep.openrepository.com/bitstream/10547/270778/2/06266959.pdf
3f159e7bb92d2971a2c26ad18508b579
MD5
2
true
CC-LICENSE
license_url
license_url
text/plain
49
https://uobrep.openrepository.com/bitstream/10547/270778/3/license_url
fd26723f8d7edacdb29e3f03465c3b03
MD5
3
false
license_text
license_text
application/octet-stream
0
https://uobrep.openrepository.com/bitstream/10547/270778/5/license_text
d41d8cd98f00b204e9800998ecf8427e
MD5
5
false
license_rdf
license_rdf
application/octet-stream
23599
https://uobrep.openrepository.com/bitstream/10547/270778/4/license_rdf
9e2b7f6edbd693264102b96ece20428a
MD5
4
false
TEXT
06266959.pdf.txt
06266959.pdf.txt
Extracted Text
text/plain
28411
https://uobrep.openrepository.com/bitstream/10547/270778/8/06266959.pdf.txt
13f8ddf7f29f077b6fb132d1ebb37eb8
MD5
8
false
THUMBNAIL
06266959.pdf.jpg
06266959.pdf.jpg
Generated Thumbnail
image/jpeg
2352
https://uobrep.openrepository.com/bitstream/10547/270778/7/06266959.pdf.jpg
5f5b01f11737131858490cfa51499b87
MD5
7
false
10547/270778
oai:uobrep.openrepository.com:10547/270778
2020-04-23 07:29:33.187
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
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
oai:uobrep.openrepository.com:10547/2706052020-04-23T07:29:24Zcom_10547_132192col_10547_132230
Maple, Carsten
a4dc0842fb0b0b3b6d15dd203a61bd1f
-1
Phillips, Alan
ad8d180e4b96df43fe91499106dd26ee
-1
University of Bedfordshire
7Safe
2013-02-27T16:51:41Z
2013-02-27T16:51:41Z
2010
Maple C., Phillips, A. (2010) UK Security Breach Investigations Report: An Analysis of Data Compromise Cases
http://hdl.handle.net/10547/270605
This report, rather than relying on questionnaires and self-reporting, concerns cases that were investigated by the forensic investigation team at 7Safe. Whilst removing any inaccuracies arising from self-reporting, the authors acknowledge that the limitation of the sample size remains. It is hoped that the unbiased reporting by independent investigators has yielded interesting facts about modern security breaches. All data in this study is based on genuine completed breach investigations conducted by the compromise investigation team over the last 18 months.
Serious Oganised Crime Agency and the Police Central e-Crime Unit.
en
7Safe
http://www.7safe.com/breach_report/
security policy
breach investigations
UK security breach investigations report: an analysis of data compromise cases
Technical Report
This report, rather than relying on questionnaires and self-reporting, concerns cases that were investigated by the forensic investigation team at 7Safe. Whilst removing any inaccuracies arising from self-reporting, the authors acknowledge that the limitation of the sample size remains. It is hoped that the unbiased reporting by independent investigators has yielded interesting facts about modern security breaches. All data in this study is based on genuine completed breach investigations conducted by the compromise investigation team over the last 18 months.
ORIGINAL
Breach_report_2010.pdf
Breach_report_2010.pdf
Full-text paper
application/pdf
3373231
https://uobrep.openrepository.com/bitstream/10547/270605/1/Breach_report_2010.pdf
5a005c2777c0cc1ecd90e3599b3026b6
MD5
1
true
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/270605/2/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
2
false
TEXT
Breach_report_2010.pdf.txt
Breach_report_2010.pdf.txt
Extracted Text
text/plain
69333
https://uobrep.openrepository.com/bitstream/10547/270605/8/Breach_report_2010.pdf.txt
0b27eef83b0ebe55f7880c1eacda677e
MD5
8
false
THUMBNAIL
Breach_report_2010.pdf.jpg
Breach_report_2010.pdf.jpg
Generated Thumbnail
image/jpeg
1654
https://uobrep.openrepository.com/bitstream/10547/270605/4/Breach_report_2010.pdf.jpg
05511a053a9a1f3f4c30f4818bd66679
MD5
4
false
CC-LICENSE
license_url
license_url
text/plain
49
https://uobrep.openrepository.com/bitstream/10547/270605/5/license_url
fd26723f8d7edacdb29e3f03465c3b03
MD5
5
false
license_text
license_text
application/octet-stream
0
https://uobrep.openrepository.com/bitstream/10547/270605/7/license_text
d41d8cd98f00b204e9800998ecf8427e
MD5
7
false
license_rdf
license_rdf
application/octet-stream
23599
https://uobrep.openrepository.com/bitstream/10547/270605/6/license_rdf
9e2b7f6edbd693264102b96ece20428a
MD5
6
false
10547/270605
oai:uobrep.openrepository.com:10547/270605
2020-04-23 07:29:24.332
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
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
oai:uobrep.openrepository.com:10547/2706122020-04-23T07:37:24Zcom_10547_132192col_10547_132230
Gibson, Marcia
08478298d098c1995b7174d2b8c766d4
600
Renaud, Karen
3d88affde4a623f0305cc9edb5fca0bf
-1
Conrad, Marc
c6d205a5c2149a7b0af55b805ff88a6c
600
Maple, Carsten
a4dc0842fb0b0b3b6d15dd203a61bd1f
-1
2013-02-28T09:47:04Z
2013-02-28T09:47:04Z
2012
Gibson, M., Renaud K., Conrad, M., Maple, C. (2012) “Music is the key: Using our superior memory for songs to help users log on”, in: Gupta, M., Walp, J., Sharman, R. (eds), Strategic and Practical Approaches for Information Security Governance, ch.8, pages 137-157. Technology and Applied Solutions, IGI Global.
9781466601970
10.4018/978-1-4666-0197-0.ch008
http://hdl.handle.net/10547/270612
Devising access control systems to support needs and capabilities of users, as well as the security requirements of organisations, is a key challenge faced in many of today’s business environments. If users are to behave securely, they must not be overburdened with unworkable authentication policies and methods. Yet the prevailing alphanumeric password can be a double-edged sword: secure passwords are inherently difficult to recall and vice-versa. Consequentially, a growing number of alternatives are emerging. In this chapter, the authors describe one novel scheme - a musical password. Musipass was designed with the user in mind and is tailored toward the task of authentication on the Web, where biometric and token-based systems have proved unsuccessful in replacing the flawed, yet prevalent traditional password. This chapter, which includes discussion on current thinking in the field of authentication, will be of interest to information managers, security practitioners, and HCI professionals.
en
IGI Global
http://www.igi-global.com/book/strategic-practical-approaches-information-security/58283
sound based passwords
Music is the key: using our enduring memory for songs to help users log on
Book chapter
Devising access control systems to support needs and capabilities of users, as well as the security requirements of organisations, is a key challenge faced in many of today’s business environments. If users are to behave securely, they must not be overburdened with unworkable authentication policies and methods. Yet the prevailing alphanumeric password can be a double-edged sword: secure passwords are inherently difficult to recall and vice-versa. Consequentially, a growing number of alternatives are emerging. In this chapter, the authors describe one novel scheme - a musical password. Musipass was designed with the user in mind and is tailored toward the task of authentication on the Web, where biometric and token-based systems have proved unsuccessful in replacing the flawed, yet prevalent traditional password. This chapter, which includes discussion on current thinking in the field of authentication, will be of interest to information managers, security practitioners, and HCI professionals.
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/270612/1/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
1
false
10547/270612
oai:uobrep.openrepository.com:10547/270612
2020-04-23 07:37:24.409
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
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
oai:uobrep.openrepository.com:10547/2706322024-02-06T10:42:41Zcom_10547_132192col_10547_132230
Gu, Shuang
72fffe9c536e25b43a27fdad6ae32cda
500
Yue, Yong
59d04f0f8e57359fc0492dc893f8df61
500
Maple, Carsten
a4dc0842fb0b0b3b6d15dd203a61bd1f
500
Wu, Chengdong
281255bcbe86a4f5d9a24f4d9c9f2ed9
500
University of Bedfordshire
2013-02-28T09:50:41Z
2013-02-28T09:50:41Z
2012
Gu, S., Yue, Y., Maple, C., Wu, C., (2012) "Fuzzy logic based localisation in wireless sensor networks for disaster environments," Automation and Computing (ICAC), 2012 18th International Conference on , pp.1-5, 7-8 Sept.
9781467317221
http://hdl.handle.net/10547/270632
Progress in micro-electromechanical systems (MEMS) and radio frequency (RF) technology has fostered the development of wireless sensor networks (WSNs). Although WSNs have been successfully applied in built environments, their applications and benefits have not been fully explored in the areas of disaster recovery and rescuing. In this paper, a novel probabilistic fuzzy logic based Range-free localisation algorithm (PFRL) is proposed. The proposed algorithm is compared with other range free localisation algorithms. Simulation results demonstrate the accurate and effectiveness of the proposed algorithm.
en
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?reload=true&arnumber=6330549
WSNs
fuzzy logic
localisation
Fuzzy logic based localisation in wireless sensor networks for disaster environment
Conference papers, meetings and proceedings
Progress in micro-electromechanical systems (MEMS) and radio frequency (RF) technology has fostered the development of wireless sensor networks (WSNs). Although WSNs have been successfully applied in built environments, their applications and benefits have not been fully explored in the areas of disaster recovery and rescuing. In this paper, a novel probabilistic fuzzy logic based Range-free localisation algorithm (PFRL) is proposed. The proposed algorithm is compared with other range free localisation algorithms. Simulation results demonstrate the accurate and effectiveness of the proposed algorithm.
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/270632/1/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
1
false
10547/270632
oai:uobrep.openrepository.com:10547/270632
2024-02-06 10:42:41.896
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
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
oai:uobrep.openrepository.com:10547/2706132024-02-06T10:40:36Zcom_10547_132192col_10547_132230
Gu, Shuang
72fffe9c536e25b43a27fdad6ae32cda
500
Yue, Yong
59d04f0f8e57359fc0492dc893f8df61
500
Wu, Chengdong
281255bcbe86a4f5d9a24f4d9c9f2ed9
500
Maple, Carsten
a4dc0842fb0b0b3b6d15dd203a61bd1f
500
Liu, Beisheng
f51f42a3f46e7e2d07193c35b06bd311
500
University of Bedfordshire
2013-02-28T10:04:28Z
2013-02-28T10:04:28Z
2012
Shuang Gu; Yong Yue; Maple, C.; Beisheng Liu; Chengdong Wu; , "Classification of multi-channels SEMG signals using wavelet and neural networks on assistive robot," Industrial Informatics (INDIN), 2012 10th IEEE International Conference on , pp.1158-1163, 25-27 July 2012
9781467303125
10.1109/INDIN.2012.6301140
http://hdl.handle.net/10547/270613
Recently, the robot technology research is changing from manufacturing industry to non-manufacturing industry, especially the service industry related to the human life. Assistive robot is a kind of novel service robot. It can not only help the elder and disabled people to rehabilitate their impaired musculoskeletal functions, but also help healthy people to perform tasks requiring large forces. This kind of robot has a broad application prospect in many areas, such as medical rehabilitation, special military operations, special/high intensity physical labour, space, sports, and entertainment. SEMG (Surface Electromyography) of Palmaris longus, brachioradialis, flexor carpiulnaris and biceps brachii are analysed with a wavelet transform method. The absolute variance of 3-layer wavelet coefficients is distilled and regarded as signal characteristics to compose eigenvectors. The eigenvectors are input data of a neural network classifier used to identify 5 different kinds of movement patterns including wrist flexor, wrist extensor, elbow flexion, forearm pronation and forearm rotation. Experiments verify the effectiveness of the proposed method.
en
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
http://ieeexplore.ieee.org/xpls/abs_all.jsp?tp=&arnumber=6301140
assistive robot
neural networks
surface electromyography
wavelet
Classification of multi-channels SEMG signals using wavelet and neural networks on assistive robot
Conference papers, meetings and proceedings
Recently, the robot technology research is changing from manufacturing industry to non-manufacturing industry, especially the service industry related to the human life. Assistive robot is a kind of novel service robot. It can not only help the elder and disabled people to rehabilitate their impaired musculoskeletal functions, but also help healthy people to perform tasks requiring large forces. This kind of robot has a broad application prospect in many areas, such as medical rehabilitation, special military operations, special/high intensity physical labour, space, sports, and entertainment. SEMG (Surface Electromyography) of Palmaris longus, brachioradialis, flexor carpiulnaris and biceps brachii are analysed with a wavelet transform method. The absolute variance of 3-layer wavelet coefficients is distilled and regarded as signal characteristics to compose eigenvectors. The eigenvectors are input data of a neural network classifier used to identify 5 different kinds of movement patterns including wrist flexor, wrist extensor, elbow flexion, forearm pronation and forearm rotation. Experiments verify the effectiveness of the proposed method.
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/270613/1/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
1
false
10547/270613
oai:uobrep.openrepository.com:10547/270613
2024-02-06 10:40:36.751
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
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
oai:uobrep.openrepository.com:10547/2706142020-04-23T07:29:25Zcom_10547_132192col_10547_132230
Hamid, Thaier K.A.
1ecd345495e297f346d943290ed35f7f
-1
Maple, Carsten
a4dc0842fb0b0b3b6d15dd203a61bd1f
-1
Yue, Yong
59d04f0f8e57359fc0492dc893f8df61
-1
2013-02-28T10:20:04Z
2013-02-28T10:20:04Z
2012
Hamid, T., Maple, C. and Yue, Y. (2012) 'A parallel algorithm to calculate the costrank of a network', International Journal of Computer Applications, 44 (3), pp.17-22.
0975-8887
10.5120/6243-8161
http://hdl.handle.net/10547/270614
International Journal of Computer Applications
We developed analogous parallel algorithms to implement CostRank for distributed memory parallel computers using multi processors. Our intent is to make CostRank calculations for the growing number of hosts in a fast and a scalable way. In the same way we intent to secure large scale networks that require fast and reliable computing to calculate the ranking of enormous graphs with thousands of vertices (states) and millions or arcs (links). In our proposed approach we focus on a parallel CostRank computational architecture on a cluster of PCs networked via Gigabit Ethernet LAN to evaluate the performance and scalability of our implementation. In particular, a partitioning of input data, graph files, and ranking vectors with load balancing technique can improve the runtime and scalability of large-scale parallel computations. An application case study of analogous Cost Rank computation is presented. Applying parallel environment models for one-dimensional sparse matrix partitioning on a modified research page, results in a significant reduction in communication overhead and in per-iteration runtime. We provide an analytical discussion of analogous algorithms performance in terms of I/O and synchronization cost, as well as of memory usage.
en
Foundation of Computer Science, New York, USA
http://research.ijcaonline.org/volume44/number3/pxc3878161.pdf
parallel computing
distributed algorithms
pagerank
A parallel algorithm to calculate the costrank of a network
Article
We developed analogous parallel algorithms to implement CostRank for distributed memory parallel computers using multi processors. Our intent is to make CostRank calculations for the growing number of hosts in a fast and a scalable way. In the same way we intent to secure large scale networks that require fast and reliable computing to calculate the ranking of enormous graphs with thousands of vertices (states) and millions or arcs (links). In our proposed approach we focus on a parallel CostRank computational architecture on a cluster of PCs networked via Gigabit Ethernet LAN to evaluate the performance and scalability of our implementation. In particular, a partitioning of input data, graph files, and ranking vectors with load balancing technique can improve the runtime and scalability of large-scale parallel computations. An application case study of analogous Cost Rank computation is presented. Applying parallel environment models for one-dimensional sparse matrix partitioning on a modified research page, results in a significant reduction in communication overhead and in per-iteration runtime. We provide an analytical discussion of analogous algorithms performance in terms of I/O and synchronization cost, as well as of memory usage.
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/270614/1/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
1
false
10547/270614
oai:uobrep.openrepository.com:10547/270614
2020-04-23 07:29:25.4
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
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
oai:uobrep.openrepository.com:10547/2709562020-04-23T07:29:26Zcom_10547_132192col_10547_132230
Maple, Carsten
a4dc0842fb0b0b3b6d15dd203a61bd1f
-1
Yue, Yong
59d04f0f8e57359fc0492dc893f8df61
-1
Li, Dayou
6295afce2b3b8447f935ff4664ecd492
-1
Bochenkov, Alexey
d52b9a3f8c69333aa01d1fa02354b3a7
-1
University of Bedfordshire
2013-03-04T16:13:58Z
2013-03-04T16:13:58Z
2012
Maple, C., Yong Yue, Dayou Li, Bochenkov, A. (2012 ) 'Case study: Multi-role shadow robotic system for independent living' High Performance Computing and Simulation (HPCS), 2012 International Conference pp.415
9781467323598
10.1109/HPCSim.2012.6266950
http://hdl.handle.net/10547/270956
The project is focused on development and prototyping of remotely-controlled, semi-autonomous robotic solutions in domestic environments to support elderly people. In particular, the SRS project is demonstrating an innovative, practical and efficient system called "SRS robot" for personalised home care and assisted living.
en
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6266950
EU FP7
EU Project
international collaboration
robotics
robotic system
SRS robot
assisted living
personalised home care
Case study: multi-role shadow robotic system for independent living
Article
The project is focused on development and prototyping of remotely-controlled, semi-autonomous robotic solutions in domestic environments to support elderly people. In particular, the SRS project is demonstrating an innovative, practical and efficient system called "SRS robot" for personalised home care and assisted living.
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/270956/1/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
1
false
10547/270956
oai:uobrep.openrepository.com:10547/270956
2020-04-23 07:29:26.689
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
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
oai:uobrep.openrepository.com:10547/2707842024-02-06T10:46:32Zcom_10547_132192col_10547_132230
Maple, Carsten
a4dc0842fb0b0b3b6d15dd203a61bd1f
500
Lang, Richard
a64e6d5d607a02afb4e0f214a188316a
500
University of Bedfordshire
2013-03-01T11:56:16Z
2013-03-01T11:56:16Z
2012
Maple, C. and Lang, R. (2012) “Vulnerability, Victims and Free Movement: the Case of Cyberstalking”, New Journal of European Criminal Law, 3 (2): 208-221
http://hdl.handle.net/10547/270784
2032-2844
New Journal of European Criminal Law
Any crime can have enormous emotional and physical consequences for the victim. However, two potential attributes of a crime which can signifi cantly worsen the ordeal suff ered by the victim are, fi rstly, that it is committed behind closed doors, especially the doors of one’s home, and secondly, that it is committed anonymously.1 Cyberstalking, by which high-tech methods are used to distress, frighten and intimidate the victim, is almost unique in that it can possess both of these attributes, sometimes even both at once. Despite this, the European Commission, in a recent proposal for a directive, has not seen fi t to include it on a list of crimes the victims of which are “particularly vulnerable”. In this article, the authors consider the proposal in detail, before looking at cyberstalking itself, and demonstrating why, in their opinion, the new directive should be amended to contain a specific reference to this crime. Going forward, they call for bespoke EU legislation to protect victims of cyberstalking throughout Europe.
en
Intersentia
http://www.njecl.eu/table_of_content.aspx?sy=2012&pn=2
cyberstalking
Vulnerability, victims and free movement: the case of cyberstalking
Article
Any crime can have enormous emotional and physical consequences for the victim.
However, two potential attributes of a crime which can signifi cantly worsen the ordeal
suff ered by the victim are, fi rstly, that it is committed behind closed doors, especially
the doors of one’s home, and secondly, that it is committed anonymously.1
Cyberstalking, by which high-tech methods are used to distress, frighten and
intimidate the victim, is almost unique in that it can possess both of these attributes,
sometimes even both at once. Despite this, the European Commission, in a recent
proposal for a directive, has not seen fi t to include it on a list of crimes the victims of
which are “particularly vulnerable”. In this article, the authors consider the proposal
in detail, before looking at cyberstalking itself, and demonstrating why, in their
opinion, the new directive should be amended to contain a specific reference to this
crime. Going forward, they call for bespoke EU legislation to protect victims of
cyberstalking throughout Europe.
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/270784/1/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
1
false
10547/270784
oai:uobrep.openrepository.com:10547/270784
2024-02-06 10:46:32.226
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
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
oai:uobrep.openrepository.com:10547/2708012020-04-23T07:29:26Zcom_10547_132192col_10547_132230
Maple, Carsten
a4dc0842fb0b0b3b6d15dd203a61bd1f
-1
Short, Emma
a8c128810fc10c0f9f8155c13b72e825
-1
Brown, Antony
db7fd7863767722d18ea1370b456e2be
-1
Bryden, Chris
915134d27e5d6551587dadcf3ba647b3
-1
Salter, Michael
7ffd849e576917077ef4486d8160d96f
-1
2013-03-01T11:16:53Z
2013-03-01T11:16:53Z
2012
Maple, C., Short, E., Brown, A., Bryden, C., & Salter, M. (2012). 'Cyberstalking in the UK: Analysis and Recommendations.' International Journal of Distributed Systems and Technologies (IJDST), 3(4), 34-51. doi:10.4018/jdst.2012100104
1947-3532
1947-3540
10.4018/jdst.2012100104
http://hdl.handle.net/10547/270801
International Journal of Distributed Systems and Technologies
The growth in the use of interconnected devices in the UK is well-documented. Society has embraced new technology allowing access to information, systems, and people; children are being described as digital natives and social networking, internet telephony, and accessing digital entertainment are a major part of their lives. However, whilst the ubiquitous nature of modern communication systems has brought many benefits, there exist a minority that uses the technology to harass others. This paper considers the phenomenon of Cyberstalking and presents an analysis of the problem and the responses provided on the first survey that addresses issue specifically. The paper discusses the nature of attacks, the victim-attacker relationship, the impact of the attacks and the actions taken to resolve the issue. The paper also considers both the legal and technological aspects and presents recommendations to help reduce the occurrence of Cyberstalking.
en
IGI Global
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/jdst.2012100104
Archived with thanks to International Journal of Distributed Systems and Technologies
cyberstalking
Cyberstalking in the UK: analysis and recommendations.
Article
The growth in the use of interconnected devices in the UK is well-documented. Society has embraced new technology allowing access to information, systems, and people; children are being described as digital natives and social networking, internet telephony, and accessing digital entertainment are a major part of their lives. However, whilst the ubiquitous nature of modern communication systems has brought many benefits, there exist a minority that uses the technology to harass others. This paper considers the phenomenon of Cyberstalking and presents an analysis of the problem and the responses provided on the first survey that addresses issue specifically. The paper discusses the nature of attacks, the victim-attacker relationship, the impact of the attacks and the actions taken to resolve the issue. The paper also considers both the legal and technological aspects and presents recommendations to help reduce the occurrence of Cyberstalking.
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/270801/1/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
1
false
10547/270801
oai:uobrep.openrepository.com:10547/270801
2020-04-23 07:29:26.829
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
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
oai:uobrep.openrepository.com:10547/2707802020-04-23T07:29:26Zcom_10547_132192col_10547_132230
Shah, Munam Ali
62c1ab7612e92b3bfee2c9c3ccb6873d
-1
Safdar, Ghazanfar Ali
1f739524cf4ea6e5418976a09d95b50d
-1
Maple, Carsten
a4dc0842fb0b0b3b6d15dd203a61bd1f
-1
2013-03-01T10:44:50Z
2013-03-01T10:44:50Z
2011
Shah, M., Safdar, G. and Maple, C. (2011) "DDH-MAC: A novel Dynamic De-Centralized Hybrid MAC protocol for Cognitive Radio Networks," Roedunet International Conference (RoEduNet), 2011 10th , pp.1-6, 23-25 June 2011
9781457712333
10.1109/RoEduNet.2011.5993685
http://hdl.handle.net/10547/270780
The radio spectrum (3kHz - 300GHz) has become saturated and proven to be insufficient to address the proliferation of new wireless applications. Cognitive Radio Technology which is an opportunistic network and is equipped with fully programmable wireless devices that empowers the network by OODA cycle and then make intelligent decisions by adapting their MAC and physical layer characteristics such as waveform, has appeared to be the only solution for current low spectrum availability and under utilization problem. In this paper a novel Dynamic De-Centralized Hybrid “DDH-MAC” protocol for Cognitive Radio Networks has been presented which lies between Global Common Control Channel (GCCC) and non-GCCC categories of cognitive radio MAC protocols. DDH-MAC is equipped with the best features of GCCC MAC protocols but also overcomes the saturation and security issues in GCCC. To the best of authors' knowledge, DDH-MAC is the first protocol which is hybrid between GCCC and non-GCCC family of protocols. DDH-MAC provides multiple levels of security and partially use GCCC to transmit beacon which sets and announces local control channel for exchange of free channel list (FCL) sensed by the co-operatively communicating cognitive radio nodes, subsequently providing secure transactions among participating nodes over the decided local control channel. This paper describes the framework of the DDH-MAC protocol in addition to its pseudo code for implementation; it is shown that the pre-transmission time for DDH-MAC is on average 20% better while compared to other cognitive radio MAC protocols.
en
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5993685
co-operative communication
cognitive radio
common control channel
MAC protocols
security
DDH-MAC: a novel dynamic de-centralized hybrid MAC protocol for cognitive radio networks
Conference papers, meetings and proceedings
The radio spectrum (3kHz - 300GHz) has become saturated and proven to be insufficient to address the proliferation of new wireless applications. Cognitive Radio Technology which is an opportunistic network and is equipped with fully programmable wireless devices that empowers the network by OODA cycle and then make intelligent decisions by adapting their MAC and physical layer characteristics such as waveform, has appeared to be the only solution for current low spectrum availability and under utilization problem. In this paper a novel Dynamic De-Centralized Hybrid “DDH-MAC” protocol for Cognitive Radio Networks has been presented which lies between Global Common Control Channel (GCCC) and non-GCCC categories of cognitive radio MAC protocols. DDH-MAC is equipped with the best features of GCCC MAC protocols but also overcomes the saturation and security issues in GCCC. To the best of authors' knowledge, DDH-MAC is the first protocol which is hybrid between GCCC and non-GCCC family of protocols. DDH-MAC provides multiple levels of security and partially use GCCC to transmit beacon which sets and announces local control channel for exchange of free channel list (FCL) sensed by the co-operatively communicating cognitive radio nodes, subsequently providing secure transactions among participating nodes over the decided local control channel. This paper describes the framework of the DDH-MAC protocol in addition to its pseudo code for implementation; it is shown that the pre-transmission time for DDH-MAC is on average 20% better while compared to other cognitive radio MAC protocols.
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/270780/1/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
1
false
ORIGINAL
05993685.pdf
05993685.pdf
Full text
application/pdf
429502
https://uobrep.openrepository.com/bitstream/10547/270780/2/05993685.pdf
cbaeeed87651d0df17603f0d9f4066d5
MD5
2
true
CC-LICENSE
license_url
license_url
text/plain
49
https://uobrep.openrepository.com/bitstream/10547/270780/3/license_url
fd26723f8d7edacdb29e3f03465c3b03
MD5
3
false
license_text
license_text
application/octet-stream
0
https://uobrep.openrepository.com/bitstream/10547/270780/5/license_text
d41d8cd98f00b204e9800998ecf8427e
MD5
5
false
license_rdf
license_rdf
application/octet-stream
23599
https://uobrep.openrepository.com/bitstream/10547/270780/4/license_rdf
9e2b7f6edbd693264102b96ece20428a
MD5
4
false
TEXT
05993685.pdf.txt
05993685.pdf.txt
Extracted Text
text/plain
30213
https://uobrep.openrepository.com/bitstream/10547/270780/8/05993685.pdf.txt
940621ab52c5afbfbc57c76d80ea6a33
MD5
8
false
THUMBNAIL
05993685.pdf.jpg
05993685.pdf.jpg
Generated Thumbnail
image/jpeg
3144
https://uobrep.openrepository.com/bitstream/10547/270780/7/05993685.pdf.jpg
3e3bf504e4e724b81a9817602433d8cf
MD5
7
false
10547/270780
oai:uobrep.openrepository.com:10547/270780
2020-04-23 07:29:26.901
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
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
oai:uobrep.openrepository.com:10547/2707792024-02-06T10:40:08Zcom_10547_132192col_10547_132230
Shah, Munam Ali
62c1ab7612e92b3bfee2c9c3ccb6873d
500
Zhang, Sijing
8869599367845ea20d13dffa6e0e2388
500
Maple, Carsten
a4dc0842fb0b0b3b6d15dd203a61bd1f
500
University of Bedfordshire
2013-03-01T10:40:59Z
2013-03-01T10:40:59Z
2012
Shah, M., Zhang, S. and Maple, C. (2012) "An analysis on decentralized adaptive MAC protocols for Cognitive Radio networks," Automation and Computing (ICAC), 2012 18th International Conference on , pp.1-5, 7-8 Sept. 2012
9781467317221
10.1007/s11633-013-0695-z
http://hdl.handle.net/10547/270779
The scarcity of bandwidth in the radio spectrum has become more vital since the demand for more and more wireless applications has increased. Most of the spectrum bands have been allocated although many studies have shown that these bands are significantly underutilized most of the time. The problem of unavailability of spectrum and inefficiency in its utilization has been smartly addressed by the Cognitive Radio (CR) Technology which is an opportunistic network that senses the environment, observes the network changes, and then using knowledge gained from the prior interaction with the network, makes intelligent decisions by dynamically adapting their transmission characteristics. In this paper some of the decentralized adaptive MAC protocols for CR networks have been critically analyzed and a novel adaptive MAC protocol for CR networks, DNG-MAC which is decentralized and non-global in nature, has been proposed. The results show the DNG-MAC out performs other CR MAC protocols in terms of time and energy efficiency.
en
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6330514
cognitive radio
common control channel
co-operative communication
MAC protocols
An analysis on decentralized adaptive MAC protocols for Cognitive Radio networks
Conference papers, meetings and proceedings
The scarcity of bandwidth in the radio spectrum has become more vital since the demand for more and more wireless applications has increased. Most of the spectrum bands have been allocated although many studies have shown that these bands are significantly underutilized most of the time. The problem of unavailability of spectrum and inefficiency in its utilization has been smartly addressed by the Cognitive Radio (CR) Technology which is an opportunistic network that senses the environment, observes the network changes, and then using knowledge gained from the prior interaction with the network, makes intelligent decisions by dynamically adapting their transmission characteristics. In this paper some of the decentralized adaptive MAC protocols for CR networks have been critically analyzed and a novel adaptive MAC protocol for CR networks, DNG-MAC which is decentralized and non-global in nature, has been proposed. The results show the DNG-MAC out performs other CR MAC protocols in terms of time and energy efficiency.
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/270779/1/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
1
false
ORIGINAL
06330514.pdf
06330514.pdf
Full text
application/pdf
283471
https://uobrep.openrepository.com/bitstream/10547/270779/2/06330514.pdf
caa9fda83270979cffae350d44de46a7
MD5
2
true
CC-LICENSE
license_url
license_url
text/plain
49
https://uobrep.openrepository.com/bitstream/10547/270779/3/license_url
fd26723f8d7edacdb29e3f03465c3b03
MD5
3
false
license_text
license_text
application/octet-stream
0
https://uobrep.openrepository.com/bitstream/10547/270779/5/license_text
d41d8cd98f00b204e9800998ecf8427e
MD5
5
false
license_rdf
license_rdf
application/octet-stream
23599
https://uobrep.openrepository.com/bitstream/10547/270779/4/license_rdf
9e2b7f6edbd693264102b96ece20428a
MD5
4
false
TEXT
06330514.pdf.txt
06330514.pdf.txt
Extracted Text
text/plain
23989
https://uobrep.openrepository.com/bitstream/10547/270779/8/06330514.pdf.txt
7ea7319a0cb57eaf34dc0642680eaba0
MD5
8
false
THUMBNAIL
06330514.pdf.jpg
06330514.pdf.jpg
Generated Thumbnail
image/jpeg
2799
https://uobrep.openrepository.com/bitstream/10547/270779/7/06330514.pdf.jpg
e75eb061f291c15643d999d6de4f162b
MD5
7
false
10547/270779
oai:uobrep.openrepository.com:10547/270779
2024-02-06 10:40:08.819
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
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
oai:uobrep.openrepository.com:10547/2707972020-04-23T07:29:27Zcom_10547_132192col_10547_132230
Shah, Munam Ali
62c1ab7612e92b3bfee2c9c3ccb6873d
-1
Zhang, Sijing
8869599367845ea20d13dffa6e0e2388
-1
Maple, Carsten
a4dc0842fb0b0b3b6d15dd203a61bd1f
-1
University of Bedfordshire
2013-03-01T10:37:45Z
2013-03-01T10:37:45Z
2012
Shah, M., Zhang, S. Maple, C. (2012) "A novel multi-fold security framework for cognitive radio wireless ad-hoc networks," Automation and Computing (ICAC), 2012 18th International Conference on , pp.1-6, 7-8 Sept. 2012
9781467317221
http://hdl.handle.net/10547/270797
Cognitive Radio (CR) Technology has emerged as a smart and intelligent technology to address the problem of spectrum scarcity and its under-utilization. CR nodes sense the environment for vacant channels, exchange control information, and agree upon free channels list (FCL) to use for data transmission and conclusion. CR technology is heavily dependent on the control channel to dialogue on the exchanged control information which is usually in the Industrial-Scientific-Medical (ISM) band. As the ISM band is publically available this makes the CR network more prone to security vulnerabilities and flaws. In this paper a novel multi-fold security framework for cognitive radio wireless ad-hoc networks has been proposed. Multiple security levels, such as, encryption of beacon frame and privately exchanging the FCL, and the dynamic and adaptive behaviour of the framework makes the proposed protocol more resilient and secure against the traditional security attacks when compared with existing protocols.
en
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6330515
co-operative communication
cognitive radio
control channel
MAC protocols
security framework
A novel multi-fold security framework for cognitive radio wireless ad-hoc networks
Conference papers, meetings and proceedings
Cognitive Radio (CR) Technology has emerged as a smart and intelligent technology to address the problem of spectrum scarcity and its under-utilization. CR nodes sense the environment for vacant channels, exchange control information, and agree upon free channels list (FCL) to use for data transmission and conclusion. CR technology is heavily dependent on the control channel to dialogue on the exchanged control information which is usually in the Industrial-Scientific-Medical (ISM) band. As the ISM band is publically available this makes the CR network more prone to security vulnerabilities and flaws. In this paper a novel multi-fold security framework for cognitive radio wireless ad-hoc networks has been proposed. Multiple security levels, such as, encryption of beacon frame and privately exchanging the FCL, and the dynamic and adaptive behaviour of the framework makes the proposed protocol more resilient and secure against the traditional security attacks when compared with existing protocols.
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/270797/1/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
1
false
ORIGINAL
06330515.pdf
06330515.pdf
Full text
application/pdf
258286
https://uobrep.openrepository.com/bitstream/10547/270797/2/06330515.pdf
d85663f7623a1e103761e94d3c864b83
MD5
2
true
CC-LICENSE
license_url
license_url
text/plain
49
https://uobrep.openrepository.com/bitstream/10547/270797/3/license_url
fd26723f8d7edacdb29e3f03465c3b03
MD5
3
false
license_text
license_text
application/octet-stream
0
https://uobrep.openrepository.com/bitstream/10547/270797/5/license_text
d41d8cd98f00b204e9800998ecf8427e
MD5
5
false
license_rdf
license_rdf
application/octet-stream
23599
https://uobrep.openrepository.com/bitstream/10547/270797/4/license_rdf
9e2b7f6edbd693264102b96ece20428a
MD5
4
false
TEXT
06330515.pdf.txt
06330515.pdf.txt
Extracted Text
text/plain
27895
https://uobrep.openrepository.com/bitstream/10547/270797/8/06330515.pdf.txt
4109481459e3f917c293115732107a35
MD5
8
false
THUMBNAIL
06330515.pdf.jpg
06330515.pdf.jpg
Generated Thumbnail
image/jpeg
2595
https://uobrep.openrepository.com/bitstream/10547/270797/7/06330515.pdf.jpg
3d6a5697a73bbc45eeb2527e3a9184f0
MD5
7
false
10547/270797
oai:uobrep.openrepository.com:10547/270797
2020-04-23 07:29:27.183
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
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
oai:uobrep.openrepository.com:10547/2707772020-04-23T07:29:27Zcom_10547_132192col_10547_132230
Hamid, Thaier K.A.
1ecd345495e297f346d943290ed35f7f
-1
Maple, Carsten
a4dc0842fb0b0b3b6d15dd203a61bd1f
-1
2013-03-01T09:47:58Z
2013-03-01T09:47:58Z
2011
Hamid, T. and Maple, C. (2011) 'A Graph theoretical approach to Network Vulnerability Analysis and Countermeasures', International Journal of Computer Applications, 1, pp.13-18
10.5120/4320-007
http://hdl.handle.net/10547/270777
IJCA Special Issue on Network Security and Cryptography NSC
Computer networks are certainly vulnerable as long as they deliver services from different machines. An attack graph is a security model representing the chains of vulnerability exploits in a network displays the ways an attacker can compromise a network or host. A number of researchers have admitted attack graph visual complications and a large amount of source data must be assembled to accurately build an attack graph, the difficulty scaling to large, enterprise-size networks with tens of thousands of hosts and the lack comprehensive understanding. Information on vulnerabilities is present in public vulnerability databases, such as the National Vulnerability Database and Nessus. But current attack graph tools are reserved to only limited attributes. The automatic formation of vulnerability information has been troublesome and vulnerability descriptions were created by hand or based on limited information. Much vulnerability has still not been discov-ered and many others without patches or solutions Our approach to developing a cost metric exploits the Markov’s model using combinations well known vulnerabilities (the Common Vulnerability Scoring System, CVSS) and Risk Assessment Values (RAV) and using ranking algorithms (similar to V. Mehta et al. 2006 and kijsanayothin, 2010) but instead of using vulnerabilities. For each host we have developed a cost rank Markov’s model reducing the complexity in the attack graph, representing the network topology and dipping the problem of visibility.
en
Foundation of Computer Science, New York, USA
http://www.ijcaonline.org/specialissues/nsc/number1/4320-spe007t
ranking attack graph
network security
security metrics
A Graph theoretical approach to Network Vulnerability Analysis and Countermeasures
Article
Computer networks are certainly vulnerable as long as they deliver services from different machines. An attack graph is a security model representing the chains of vulnerability exploits in a network displays the ways an attacker can compromise a network or host. A number of researchers have admitted attack graph visual complications and a large amount of source data must be assembled to accurately build an attack graph, the difficulty scaling to large, enterprise-size networks with tens of thousands of hosts and the lack comprehensive understanding. Information on vulnerabilities is present in public vulnerability databases, such as the National Vulnerability Database and Nessus. But current attack graph tools are reserved to only limited attributes. The automatic formation of vulnerability information has been troublesome and vulnerability descriptions were created by hand or based on limited information. Much vulnerability has still not been discov-ered and many others without patches or solutions Our approach to developing a cost metric exploits the Markov’s model using combinations well known vulnerabilities (the Common Vulnerability Scoring System, CVSS) and Risk Assessment Values (RAV) and using ranking algorithms (similar to V. Mehta et al. 2006 and kijsanayothin, 2010) but instead of using vulnerabilities. For each host we have developed a cost rank Markov’s model reducing the complexity in the attack graph, representing the network topology and dipping the problem of visibility.
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/270777/1/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
1
false
10547/270777
oai:uobrep.openrepository.com:10547/270777
2020-04-23 07:29:27.297
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
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
oai:uobrep.openrepository.com:10547/2707762024-02-06T10:46:09Zcom_10547_132192col_10547_132230
Viduto, Valentina
daa57fcd000111bf463ee9df7c457587
600
Huang, Wei
79e77a152c5bf6b8d75438d4d7bfbf33
500
Maple, Carsten
a4dc0842fb0b0b3b6d15dd203a61bd1f
500
University of Bedfordshire
2013-03-01T09:37:32Z
2013-03-01T09:37:32Z
2011
Viduto, V., Wei Huang and Maple, C. (2011) "Toward optimal multi-objective models of network security: Survey," Automation and Computing (ICAC), 2011 17th International Conference on , pp.6-11, 10-10 Sept. 2011
9781467300001
http://hdl.handle.net/10547/270776
Information security is an important aspect of a successful business today. However, financial difficulties and budget cuts create a problem of selecting appropriate security measures and keeping networked systems up and running. Economic models proposed in the literature do not address the challenging problem of security countermeasure selection. We have made a classification of security models, which can be used to harden a system in a cost effective manner based on the methodologies used. In addition, we have specified the challenges of the simplified risk assessment approaches used in the economic models and have made recommendations how the challenges can be addressed in order to support decision makers.
en
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6084892&tag=1
multi-objective models
network security optimisation
risk assessment
survey
visualisation techniques
Towards optimal multi-objective models of network security: survey
Conference papers, meetings and proceedings
Information security is an important aspect of a successful business today. However, financial difficulties and budget cuts create a problem of selecting appropriate security measures and keeping networked systems up and running. Economic models proposed in the literature do not address the challenging problem of security countermeasure selection. We have made a classification of security models, which can be used to harden a system in a cost effective manner based on the methodologies used. In addition, we have specified the challenges of the simplified risk assessment approaches used in the economic models and have made recommendations how the challenges can be addressed in order to support decision makers.
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/270776/1/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
1
false
ORIGINAL
06084892.pdf
06084892.pdf
Full text
application/pdf
375805
https://uobrep.openrepository.com/bitstream/10547/270776/2/06084892.pdf
a8e308fb10a7b2c27250724550baaac3
MD5
2
true
CC-LICENSE
license_url
license_url
text/plain
49
https://uobrep.openrepository.com/bitstream/10547/270776/3/license_url
fd26723f8d7edacdb29e3f03465c3b03
MD5
3
false
license_text
license_text
application/octet-stream
0
https://uobrep.openrepository.com/bitstream/10547/270776/5/license_text
d41d8cd98f00b204e9800998ecf8427e
MD5
5
false
license_rdf
license_rdf
application/octet-stream
23599
https://uobrep.openrepository.com/bitstream/10547/270776/4/license_rdf
9e2b7f6edbd693264102b96ece20428a
MD5
4
false
TEXT
06084892.pdf.txt
06084892.pdf.txt
Extracted Text
text/plain
26883
https://uobrep.openrepository.com/bitstream/10547/270776/8/06084892.pdf.txt
5b7d2975532d643cc7dbcc46e815dfec
MD5
8
false
THUMBNAIL
06084892.pdf.jpg
06084892.pdf.jpg
Generated Thumbnail
image/jpeg
2688
https://uobrep.openrepository.com/bitstream/10547/270776/7/06084892.pdf.jpg
75fb02f2d96f94dbd5a85eb599f1303e
MD5
7
false
10547/270776
oai:uobrep.openrepository.com:10547/270776
2024-02-06 10:46:09.834
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
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
oai:uobrep.openrepository.com:10547/2707932020-04-23T07:29:36Zcom_10547_132192col_10547_132230
al-Khateeb, Haider
54275b0ef8ef741d117ef5998d7a3aa8
600
Maple, Carsten
a4dc0842fb0b0b3b6d15dd203a61bd1f
-1
Conrad, Marc
c6d205a5c2149a7b0af55b805ff88a6c
600
University of Bedfordshire
2013-03-01T09:30:01Z
2013-03-01T09:30:01Z
2010
Al-khateeb,H., Maple,C. and Conrad,M. (2010) Enhancing Usability and Security in Click-Based Visual Password Systems”, IADIS e-Society 2010 (ES 2010),pp.371-376, Porto, Portugal.
9789728939076
http://hdl.handle.net/10547/270793
Security and usability are key elements in system design. A bad design might result in unnecessary inverse proportion between the two, while a good design must find a balance to achieve usable security. In this paper we present and discuss the results of a user study to show how good application of click-based systems can produce a system people can easily use while maintaining security. In this study, participants were asked to do trials using 5 different prototypes of the system. A comparison between them helped to find the best criteria where there is an acceptable balance between security and usability. For instance, using a relatively small tolerance distance enhances security by increasing the password space, the comparison helps to find how small the distance can be while maintaining usability. Another objective of this study was to distinguish between two types of images; the results revealed that using cartoon images have positive impact on usability. Nevertheless, hotspots occurred and that makes particular images more vulnerable to dictionary attacks. Experiments also show that, if they can chose, users select images more vulnerable to hotspots.
en
IADIS
http://www.iadis.net/dl/Search_list_open.asp?code=6912
click-based systems
HybridPass
visual passwords
cued recall
usable security
authentication
computer security
Enhancing usability and security in click-based visual password systems
Conference papers, meetings and proceedings
Security and usability are key elements in system design. A bad design might result in unnecessary inverse proportion between the two, while a good design must find a balance to achieve usable security. In this paper we present and discuss the results of a user study to show how good application of click-based systems can produce a system people can easily use while maintaining security. In this study, participants were asked to do trials using 5 different prototypes of the system. A comparison between them helped to find the best criteria where there is an acceptable balance between security and usability. For instance, using a relatively small tolerance distance enhances security by increasing the password space, the comparison helps to find how small the distance can be while maintaining usability. Another objective of this study was to distinguish between two types of images; the results revealed that using cartoon images have positive impact on usability. Nevertheless, hotspots occurred and that makes particular images more vulnerable to dictionary attacks. Experiments also show that, if they can chose, users select images more vulnerable to hotspots.
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/270793/1/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
1
false
10547/270793
oai:uobrep.openrepository.com:10547/270793
2020-04-23 07:29:36.772
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
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
oai:uobrep.openrepository.com:10547/2707742020-04-23T07:29:27Zcom_10547_132192col_10547_132230
French, Timothy Stewart
84fd7f4bf2cc687a921813f2e3f2a2ce
-1
Bessis, Nik
c068e2871d34808e59514ab170e6bb1d
-1
Maple, Carsten
a4dc0842fb0b0b3b6d15dd203a61bd1f
-1
2013-03-01T09:22:12Z
2013-03-01T09:22:12Z
2010
French, T., Bessis, N. and Maple, C. (2010) “A High-level Trust Agent Scoring System for Collaborative Virtual Organisations”, In Proceedings: International Workshop on Advances in Mobile Computing and Applications: Security, Privacy and Trust (AMCA), in conjunction with the IEEE 24th International Conference on Advanced Information Networking and Application (AINA 2010), 20th-23rd April 2010, Perth, pp.: 1114-1120.
150-445X
10.1109/WAINA.2010.173
http://hdl.handle.net/10547/270774
In this paper, we describe how a semiotic ladder, together with a supportive trust agent, can be used to address “soft” trust issues in the context of collaborative Virtual Organisations (VO). The intention is to offer all parties better support for trust (as reputation) management including the reduction of risk and improved reliability of VO e-services. The semiotic ladder is intended to support the VO e-service lifecycle through the articulation of e-trust at various levels of system abstraction, including trust as measurable confidence. At the social level, reputation and reliability measures of e-trust are the relevant dimensions as regards choice of VO partner and are also relevant to the negotiation of service level agreements between the VO partners. By contrast, at the lower levels of the trust ladder, e-trust measures typically address the degree to which secure sign on and message level security conforms to various tangible technological security protocols. The novel trust agent provides the e-service consumer with an objective measure of the trustworthiness of the e-service at run-time, just prior to its actual consumption. Specifically, VO e-service consumer confidence level is informed, by leveraging third party objective evidence. This evidence comprises a set of Corporate Governance (CG) scores. These scores are used as a trust proxy for the "real" owner of the VO. There are also inherent limitations associated with the use of CG scores. These are duly acknowledged.
en
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5480988
risk management
security of data
virtual enterprises
data security
A high-level semiotic trust agent scoring model for collaborative virtual organisations
Conference papers, meetings and proceedings
In this paper, we describe how a semiotic ladder, together with a supportive trust agent, can be used to address “soft” trust issues in the context of collaborative Virtual Organisations (VO). The intention is to offer all parties better support for trust (as reputation) management including the reduction of risk and improved reliability of VO e-services. The semiotic ladder is intended to support the VO e-service lifecycle through the articulation of e-trust at various levels of system abstraction, including trust as measurable confidence. At the social level, reputation and reliability measures of e-trust are the relevant dimensions as regards choice of VO partner and are also relevant to the negotiation of service level agreements between the VO partners. By contrast, at the lower levels of the trust ladder, e-trust measures typically address the degree to which secure sign on and message level security conforms to various tangible technological security protocols. The novel trust agent provides the e-service consumer with an objective measure of the trustworthiness of the e-service at run-time, just prior to its actual consumption. Specifically, VO e-service consumer confidence level is informed, by leveraging third party objective evidence. This evidence comprises a set of Corporate Governance (CG) scores. These scores are used as a trust proxy for the "real" owner of the VO. There are also inherent limitations associated with the use of CG scores. These are duly acknowledged.
ORIGINAL
05480988.pdf
05480988.pdf
Full-text paper
application/pdf
297233
https://uobrep.openrepository.com/bitstream/10547/270774/1/05480988.pdf
1ff7ece980202f313947d611c76690b4
MD5
1
true
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/270774/2/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
2
false
CC-LICENSE
license_url
license_url
text/plain
49
https://uobrep.openrepository.com/bitstream/10547/270774/3/license_url
fd26723f8d7edacdb29e3f03465c3b03
MD5
3
false
license_text
license_text
application/octet-stream
0
https://uobrep.openrepository.com/bitstream/10547/270774/5/license_text
d41d8cd98f00b204e9800998ecf8427e
MD5
5
false
license_rdf
license_rdf
application/octet-stream
23599
https://uobrep.openrepository.com/bitstream/10547/270774/4/license_rdf
9e2b7f6edbd693264102b96ece20428a
MD5
4
false
TEXT
05480988.pdf.txt
05480988.pdf.txt
Extracted Text
text/plain
42754
https://uobrep.openrepository.com/bitstream/10547/270774/8/05480988.pdf.txt
5b5697142766884faf8e367870c7e2b5
MD5
8
false
THUMBNAIL
05480988.pdf.jpg
05480988.pdf.jpg
Generated Thumbnail
image/jpeg
2611
https://uobrep.openrepository.com/bitstream/10547/270774/7/05480988.pdf.jpg
976d07e061c7fa002ce852650dff8b2c
MD5
7
false
10547/270774
oai:uobrep.openrepository.com:10547/270774
2020-04-23 07:29:27.365
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
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
oai:uobrep.openrepository.com:10547/2706932020-04-23T07:37:20Zcom_10547_132192col_10547_132230
Gibson, Marcia
08478298d098c1995b7174d2b8c766d4
600
Conrad, Marc
c6d205a5c2149a7b0af55b805ff88a6c
600
Maple, Carsten
a4dc0842fb0b0b3b6d15dd203a61bd1f
-1
Renaud, Karen
3d88affde4a623f0305cc9edb5fca0bf
-1
University of Bedfordshire
2013-02-28T16:34:44Z
2013-02-28T16:34:44Z
2010
Gibson, M., Conrad, M., Maple, C. and Renaud, K. (2010) "Accessible and secure? Design constraints on image and sound based passwords," Information Society (i-Society), 2010 International Conference on , pp.423-428, 28-30 June 2010
9780956426338
http://hdl.handle.net/10547/270693
When members of society cannot access the World Wide Web, or the information and services it contains in a meaningful or useful way, they can become digitally excluded. Many factors have been highlighted as having an effect on the likelihood of exclusion, including psychological, material and skills related barriers. In this paper, we consider the role played by authentication systems in the divide. In light of the widely researched tension between aspects of usability and security in authentication, we identify a number of conflicting accessibility and security goals as manifested in image and sound based schemes.
en
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6018741&tag=1
authentication
media
psychology
synchronization
usability
visualization
visual passwords
sound based passwords
Accessible and secure? design constraints on image and sound based passwords
Conference papers, meetings and proceedings
When members of society cannot access the World Wide Web, or the information and services it contains in a meaningful or useful way, they can become digitally excluded. Many factors have been highlighted as having an effect on the likelihood of exclusion, including psychological, material and skills related barriers. In this paper, we consider the role played by authentication systems in the divide. In light of the widely researched tension between aspects of usability and security in authentication, we identify a number of conflicting accessibility and security goals as manifested in image and sound based schemes.
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/270693/1/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
1
false
10547/270693
oai:uobrep.openrepository.com:10547/270693
2020-04-23 07:37:20.315
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
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
oai:uobrep.openrepository.com:10547/2706602024-02-06T10:45:48Zcom_10547_132192col_10547_132230
Sotiriadis, Stelios
3ca64c0b285d4587eea31a2a378a7279
500
Bessis, Nik
c068e2871d34808e59514ab170e6bb1d
500
Huang, Ye
93ee81c3e583818622fdf975079d822e
500
Sant, Paul
4d523c3c21b077623d507fc78147194c
500
Maple, Carsten
a4dc0842fb0b0b3b6d15dd203a61bd1f
500
University of Bedfordshire
2013-02-28T15:57:30Z
2013-02-28T15:57:30Z
2010
Sotiriadis, S., Bessis, N., Ye Huang, Sant, P. and Maple, C. (2010) "Towards decentralized grid agent models for continuous resource discovery of interoperable grid Virtual Organisations," Digital Information Management (ICDIM), 2010 Fifth International Conference on , pp.530-535, 5-8 July 2010
978-1-4244-7572-8
10.1109/ICDIM.2010.5664653
http://hdl.handle.net/10547/270660
Grid technology enables resource sharing among a massive number of dynamic and geographically distributed resources. The significance of such environments is based on the aptitude of grid members to look across multiple grids for resource discovery and allocation. Parallel to grid, agents are autonomous problem solvers capable of self-directed actions in flexible environments. As grid systems require self-sufficiency, agents may be the means by which to achieve a robust autonomy infrastructure. In this direction we propose a resource discovery method of interoperable grid agents which travel within Virtual Organizations (VOs) and by capturing resource information regarding their action domain; they update the internal data of each grid member. Moreover we propose that resource discovery is a systematic and continually updating process that occurs within a VO and allows information exchange to happen. This exchange takes place between various community members at a pre-defined interval, aiming to distribute internal knowledge about the domain.
en
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5664653
grid
mMobile agents
self-led critical friends
Towards decentralized grid agent models for continuous resource discovery of interoperable grid Virtual Organisations
Conference papers, meetings and proceedings
Grid technology enables resource sharing among a massive number of dynamic and geographically distributed resources. The significance of such environments is based on the aptitude of grid members to look across multiple grids for resource discovery and allocation. Parallel to grid, agents are autonomous problem solvers capable of self-directed actions in flexible environments. As grid systems require self-sufficiency, agents may be the means by which to achieve a robust autonomy infrastructure. In this direction we propose a resource discovery method of interoperable grid agents which travel within Virtual Organizations (VOs) and by capturing resource information regarding their action domain; they update the internal data of each grid member. Moreover we propose that resource discovery is a systematic and continually updating process that occurs within a VO and allows information exchange to happen. This exchange takes place between various community members at a pre-defined interval, aiming to distribute internal knowledge about the domain.
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/270660/1/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
1
false
10547/270660
oai:uobrep.openrepository.com:10547/270660
2024-02-06 10:45:48.65
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
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
oai:uobrep.openrepository.com:10547/2707732024-02-06T10:41:07Zcom_10547_132192col_10547_132230
Sotiriadis, Stelios
3ca64c0b285d4587eea31a2a378a7279
500
Bessis, Nik
c068e2871d34808e59514ab170e6bb1d
500
Huang, Ye
93ee81c3e583818622fdf975079d822e
500
Sant, Paul
4d523c3c21b077623d507fc78147194c
500
Maple, Carsten
a4dc0842fb0b0b3b6d15dd203a61bd1f
500
University of Bedfordshire
2013-03-01T09:02:43Z
2013-03-01T09:02:43Z
2010
Sotiriadis, S., Bessis, N., Ye Huang, Sant, P. and Maple, C. (2010) "Defining Minimum Requirements of Inter-collaborated Nodes by Measuring the Weight of Node Interactions," Complex, Intelligent and Software Intensive Systems (CISIS), 2010 International Conference on , pp.291-298, 15-18 Feb. 2010
9781424459179
10.1109/CISIS.2010.84
http://hdl.handle.net/10547/270773
In this paper we are focusing on the minimum requirements to be addressed in order to demonstrate a inter-node communication within a Virtual Organisation (VO) using the method of Self-led Critical Friends (SCF). The method is able to decide paths that a node can choose in order to locate neighbouring nodes by aiming at realizing the overhead of each communication. The weight of each path will be measured by the analysis of prerequisites in order to achieve the interaction between nodes. We define requirements as the least fundamentals that a node needs to achieve in order to determine its accessibility factor. The information gathered from an interaction is then stored in a snapshot, a profile that is made available during the discovery stage.
en
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5447439
graph theory
grid technology
metadata snapshot profile
self-led critical friends
Defining minimum requirements of inter-collaborated nodes by measuring the weight of node interactions
Conference papers, meetings and proceedings
In this paper we are focusing on the minimum requirements to be addressed in order to demonstrate a inter-node communication within a Virtual Organisation (VO) using the method of Self-led Critical Friends (SCF). The method is able to decide paths that a node can choose in order to locate neighbouring nodes by aiming at realizing the overhead of each communication. The weight of each path will be measured by the analysis of prerequisites in order to achieve the interaction between nodes. We define requirements as the least fundamentals that a node needs to achieve in order to determine its accessibility factor. The information gathered from an interaction is then stored in a snapshot, a profile that is made available during the discovery stage.
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/270773/1/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
1
false
10547/270773
oai:uobrep.openrepository.com:10547/270773
2024-02-06 10:41:07.7
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
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
oai:uobrep.openrepository.com:10547/2706422024-02-06T10:42:22Zcom_10547_132192col_10547_132230
Sotiriadis, Stelios
3ca64c0b285d4587eea31a2a378a7279
500
Bessis, Nik
c068e2871d34808e59514ab170e6bb1d
500
Sant, Paul
4d523c3c21b077623d507fc78147194c
500
Maple, Carsten
a4dc0842fb0b0b3b6d15dd203a61bd1f
500
University of Bedfordshire
2013-02-28T14:45:30Z
2013-02-28T14:45:30Z
2010
Sotiriadis,S., Bessis, N., Sant, P. and Maple, C. (2010) “From Grids to Clouds: A collective intelligence study for inter-cooperated infrastructures”, The Fourth International Conference on Advanced Engineering Computing and Applications in Sciences (ADVCOMP-2010), IARIA, 25 – 30 October 2010, Florence, Italy, p.p.: 142-147
9781612081014
http://hdl.handle.net/10547/270642
Recently, more effort has been put into developing interoperable and distributed environments that offer users exceptional opportunities for utilizing resources over the internet. By utilising grids and clouds, resource consumers and providers, they gain significant benefits by either using or purchasing the computer processing capacities and the information provided by data centres. On the other hand, the collective intelligence paradigm is characterized as group based intelligence that emerges from the collaboration of many individuals, who in turn, define a coordinated knowledge model. It is envisaged that such a knowledge model could be of significant advantage if it is incorporated within the grid and cloud community. The dynamic load and access balancing of the grid and cloud data centres and the collective intelligence provides multiple opportunities, involving resource provisioning and development of scalable and heterogeneous applications. The contribution of this paper is that by utilizing grid and cloud resources, internal information stored within a public profile of each participant, resource providers as well as consumers, can lead to an effective mobilization of improved skills of members. We aim to unify the grid and cloud functionality as consumable computational power, for a) discussing the supreme advantages of such on-line resource utilization and provisioning models and b) analyzing the impact of the collective intelligence in the future trends of the aforementioned technologies.
en
IARIA
http://www.iaria.org/conferences2010/ADVCOMP10.html
From grids to clouds: a collective intelligence study for inter-cooperated infrastructures
Conference papers, meetings and proceedings
Recently, more effort has been put into developing
interoperable and distributed environments that offer users exceptional opportunities for utilizing resources over the internet. By utilising grids and clouds, resource consumers and
providers, they gain significant benefits by either using or purchasing the computer processing capacities and the information provided by data centres. On the other hand, the
collective intelligence paradigm is characterized as group based intelligence that emerges from the collaboration of many individuals, who in turn, define a coordinated knowledge model. It is envisaged that such a knowledge model could be of
significant advantage if it is incorporated within the grid and cloud community. The dynamic load and access balancing of the grid and cloud data centres and the collective intelligence
provides multiple opportunities, involving resource provisioning and development of scalable and heterogeneous applications. The contribution of this paper is that by utilizing grid and cloud resources, internal information stored within a
public profile of each participant, resource providers as well as consumers, can lead to an effective mobilization of improved skills of members. We aim to unify the grid and cloud
functionality as consumable computational power, for a) discussing the supreme advantages of such on-line resource utilization and provisioning models and b) analyzing the impact of the collective intelligence in the future trends of the aforementioned technologies.
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/270642/1/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
1
false
10547/270642
oai:uobrep.openrepository.com:10547/270642
2024-02-06 10:42:22.618
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
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
oai:uobrep.openrepository.com:10547/2706532024-02-06T10:44:16Zcom_10547_132192col_10547_132230
Sotiriadis, Stelios
3ca64c0b285d4587eea31a2a378a7279
-1
Bessis, Nik
c068e2871d34808e59514ab170e6bb1d
-1
Sant, Paul
4d523c3c21b077623d507fc78147194c
-1
Maple, Carsten
a4dc0842fb0b0b3b6d15dd203a61bd1f
-1
University of Bedfordshire
2013-02-28T13:52:16Z
2013-02-28T13:52:16Z
2010
Sotiriadis,S., Bessis, N., Sant, P. and Maple, C. (2010) “A Mobile Agent Strategy for Grid Interoperable Virtual Organisations”, 1st International Conference on Collaborative Technologies (ICCT-2010), IADIS, 26th – 28thJuly, Freiburg, pp.: 168-172.
9789728939212
http://hdl.handle.net/10547/270653
en
IADIS
http://www.iadisportal.org/ct-2010-proceedings
A mobile agent strategy for grid interoperable virtual organisations
Conference papers, meetings and proceedings
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/270653/1/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
1
false
10547/270653
oai:uobrep.openrepository.com:10547/270653
2024-02-06 10:44:16.433
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
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
oai:uobrep.openrepository.com:10547/2706382020-04-23T07:29:36Zcom_10547_132192col_10547_132230
Maple, Carsten
a4dc0842fb0b0b3b6d15dd203a61bd1f
-1
Viduto, Valentina
daa57fcd000111bf463ee9df7c457587
600
2013-02-28T13:50:54Z
2013-02-28T13:50:54Z
2010
Viduto, V., Maple, C. (2010) “A visualisation technique for the identification of security threats in networked systems”, In 14th International Conference on Information Visualisation, IV 2010, 26-29 July, London, UK, IEEE Computer Society, 2010,pp. 551-556.
9780769541655
10.1109/IV.2010.81
http://hdl.handle.net/10547/270638
This paper is primarily focused on the increased IT complexity problem and the identification of security threats in networked systems. Modern networking systems, applications and services are found to be more complex in terms of integration and distribution, therefore, harder to be managed and protected. CIOs have to put their effort on threat's identification, risk management and security evaluation processes. Objective decision making requires measuring, identifying and evaluating all enterprise events, either positive (opportunities) or negative (risks) and keeping them in perspective with the business objectives. Our approach is based on a visualisation technique that helps in decision making process, focusing on the threat identification using attack scenarios. For constructing attack scenarios we use the notion of attack graphs, as well as layered security approach. The proposed onion skin model combines attack graphs and security layers to illustrate possible threats and shortest paths to the attacker's goal. By providing few examples we justify the advantage of the threat identification technique in decision making process.
en
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5571147
A visualisation technique for the identification of security threats in networked systems
Conference papers, meetings and proceedings
This paper is primarily focused on the increased IT complexity problem and the identification of security threats in networked systems. Modern networking systems, applications and services are found to be more complex in terms of integration and distribution, therefore, harder to be managed and protected. CIOs have to put their effort on threat's identification, risk management and security evaluation processes. Objective decision making requires measuring, identifying and evaluating all enterprise events, either positive (opportunities) or negative (risks) and keeping them in perspective with the business objectives. Our approach is based on a visualisation technique that helps in decision making process, focusing on the threat identification using attack scenarios. For constructing attack scenarios we use the notion of attack graphs, as well as layered security approach. The proposed onion skin model combines attack graphs and security layers to illustrate possible threats and shortest paths to the attacker's goal. By providing few examples we justify the advantage of the threat identification technique in decision making process.
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/270638/1/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
1
false
10547/270638
oai:uobrep.openrepository.com:10547/270638
2020-04-23 07:29:36.489
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
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
oai:uobrep.openrepository.com:10547/2706042018-06-19T10:29:54Zcom_10547_132192col_10547_132230
Viduto, Valentina
0000-0001-5412-8243
600
Huang, Wei
Maple, Carsten
University of Bedfordshire
2013-02-27T16:28:03Z
2013-02-27T16:28:03Z
2010
Viduto, V., Huang, W., and Maple, C. (2010) “A novel strategy for optimal security investments”. In Proceedings of the 16th International Conference on Automation and Computing, Birmingham, UK, September 2010.
http://hdl.handle.net/10547/270604
en
A novel strategy for optimal security investments
Conference papers, meetings and proceedings
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/270604/1/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
1
false
10547/270604
oai:uobrep.openrepository.com:10547/270604
2018-06-19 10:29:54.164
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
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
oai:uobrep.openrepository.com:10547/2705762020-04-23T07:29:36Zcom_10547_132192col_10547_132230
al-Khateeb, Haider
54275b0ef8ef741d117ef5998d7a3aa8
600
Maple, Carsten
a4dc0842fb0b0b3b6d15dd203a61bd1f
-1
Conrad, Marc
c6d205a5c2149a7b0af55b805ff88a6c
600
University of Bedfordshire
2013-02-27T16:27:15Z
2013-02-27T16:27:15Z
2009
Al-Khateeb, H., Maple, C., Conrad, M., (2009) "Hybrid Pass: Authentication Mechanism for Web Applications – Both Secure and User-Friendly"; In IADIS International Conference e-Society 2009, 1, pp.332-338, Barcelona, Spain
9789728924782
http://hdl.handle.net/10547/270576
A variety of visual passwords approaches were proposed that aim to replace conventional text passwords. The main advantage of both systems is that unlike biometrics and tokens they do not require special hardware. However they still fail to provide a satisfying solution to the usability problems of today’s authentication systems. Both text and visual passwords have limitations. We show how those limitations can be minimized by combining the two systems together to provide an integrated login mechanism suitable for web applications. The design is user friendly and makes use of the human factor to enhance security and usability. Due to the hybrid nature of our approach, it includes an anti-phishing technique.
en
IADIS
http://www.iadis.net/dl/Search_list_open.asp?code=5667
secure login
authentication
visual password
user-friendly
usable security
Hybrid pass: authentication mechanism for web applications – both secure and user-friendly
Conference papers, meetings and proceedings
A variety of visual passwords approaches were proposed that aim to replace conventional text passwords. The main advantage of both systems is that unlike biometrics and tokens they do not require special hardware. However they still fail to provide a satisfying solution to the usability problems of today’s authentication systems. Both text and visual passwords have limitations. We show how those limitations can be minimized by combining the two systems together to provide an integrated login mechanism suitable for web applications. The design is user friendly and makes use of the human factor to enhance security and usability. Due to the hybrid nature of our approach, it includes an anti-phishing technique.
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/270576/1/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
1
false
10547/270576
oai:uobrep.openrepository.com:10547/270576
2020-04-23 07:29:36.919
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
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
oai:uobrep.openrepository.com:10547/2706032020-04-23T07:37:20Zcom_10547_132192col_10547_132230
Gibson, Marcia
08478298d098c1995b7174d2b8c766d4
600
Renaud, Karen
3d88affde4a623f0305cc9edb5fca0bf
-1
Conrad, Marc
c6d205a5c2149a7b0af55b805ff88a6c
600
Maple, Carsten
a4dc0842fb0b0b3b6d15dd203a61bd1f
-1
2013-02-27T16:26:03Z
2013-02-27T16:26:03Z
2009
Gibson, M., Renaud, K., Conrad, M., Maple, C. (2009) “Musipass: Authenticating me softly with ‘my’ song”, New Security Paradigms Workshop (NSPW'09),pp. 85-100, The Queens College, University of Oxford, UK
9781605588452
10.1145/1719030.1719043
http://hdl.handle.net/10547/270603
The modern world increasingly requires us to prove our identity. When this has to be done remotely, as is the case when people make use of web sites, the most popular technique is the password. Unfortunately the profusion of web sites and the associated passwords reduces their efficacy and puts severe strain on users' limited cognitive resources. There is clearly a need for some creativity in terms of providing viable alternatives to passwords. This paper reports experiences of the use of a musical password, one composed of melodies instead of alphanumerics. Music is universal all over the globe and humans have superior memory for music. We report here on the evaluation of a prototype of such a musical password system, which demonstrates superior memorability.
en
ACM
http://portal.acm.org/citation.cfm?doid=1719030.1719043
sound based passwords
Musipass: authenticating me softly with "my" song
Conference papers, meetings and proceedings
The modern world increasingly requires us to prove our identity. When this has to be done remotely, as is the case when people make use of web sites, the most popular technique is the password. Unfortunately the profusion of web sites and the associated passwords reduces their efficacy and puts severe strain on users' limited cognitive resources. There is clearly a need for some creativity in terms of providing viable alternatives to passwords. This paper reports experiences of the use of a musical password, one composed of melodies instead of alphanumerics. Music is universal all over the globe and humans have superior memory for music.
We report here on the evaluation of a prototype of such a musical password system, which demonstrates superior memorability.
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/270603/1/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
1
false
10547/270603
oai:uobrep.openrepository.com:10547/270603
2020-04-23 07:37:20.214
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
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
oai:uobrep.openrepository.com:10547/2707942020-04-23T07:36:21Zcom_10547_132192col_10547_132230
Zhang, Yue
7e778400de5b478534ca65f047d7d1c5
600
Huang, Li-Ke
8601a9e6beebcb2f6a35238b50048dea
-1
Maple, Carsten
a4dc0842fb0b0b3b6d15dd203a61bd1f
-1
Xuan, Qing
3b469ac6975878717b7eebc4e53b3aec
-1
2013-03-01T09:33:20Z
2013-03-01T09:33:20Z
2011-12
Zhang,Y., Huang,L.-K., Maple,C. and Xuan, Q. (2011) 'Design of Software-Defined Down-Conversion and Up-Conversion: An Overview', ZTE Communications 9(4):10-14,
1673-5188
http://hdl.handle.net/10547/270794
ZTE Communications
In recent years, much attention has been paid to software-defined radio (SDR) technologies for multimode wireless systems. SDR can be defined as a radio communication system that uses software to modulate and demodulate radio signals. This article describes concepts, theory, and design principles for SDR down-conversion and up-conversion. Design issues in SDR down-conversion are discussed, and two different architectures, super-heterodyne and direct-conversion, are proposed. Design issues in SDR up-conversion are also discussed, and trade-offs in the design of filters, mixers, NCO, DAC, and signal processing are highlighted.
en
ZTE corporation, China
http://wwwen.zte.com.cn/endata/magazine/ztecommunications/2011Year/no4/articles/201202/t20120202_283025.html
SDR down-conversion
up-conversion
direct-conversion
super-heterodyne conversion
Design of software defined down-conversion and up-conversion: an overview
Article
In recent years, much attention has been paid to software-defined radio (SDR) technologies for multimode wireless systems. SDR can be defined as a radio communication system that uses software to modulate and demodulate radio signals. This article describes concepts, theory, and design principles for SDR down-conversion and up-conversion. Design issues in SDR down-conversion are discussed, and two different architectures, super-heterodyne and direct-conversion, are proposed. Design issues in SDR up-conversion are also discussed, and trade-offs in the design of filters, mixers, NCO, DAC, and signal processing are highlighted.
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/270794/1/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
1
false
10547/270794
oai:uobrep.openrepository.com:10547/270794
2020-04-23 07:36:21.162
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
Tk9OLUVYQ0xVU0lWRSBESVNUUklCVVRJT04gTElDRU5TRQoKQnkgc2lnbmluZyBhbmQgc3VibWl0dGluZyB0aGlzIGxpY2Vuc2UsIHlvdSAodGhlIGF1dGhvcihzKSBvciBjb3B5cmlnaHQKb3duZXIpIGdyYW50cyB0byB0aGUgVW5pdmVyc2l0eSBvZiBCZWRmb3Jkc2hpcmUgUmVwb3NpdG9yeSAgKFVPQlJFUCkgdGhlIG5vbi1leGNsdXNpdmUgcmlnaHQgdG8gcmVwcm9kdWNlLAp0cmFuc2xhdGUgKGFzIGRlZmluZWQgYmVsb3cpLCBhbmQvb3IgZGlzdHJpYnV0ZSB5b3VyIHN1Ym1pc3Npb24gKGluY2x1ZGluZwp0aGUgYWJzdHJhY3QpIHdvcmxkd2lkZSBpbiBwcmludCBhbmQgZWxlY3Ryb25pYyBmb3JtYXQgYW5kIGluIGFueSBtZWRpdW0sCmluY2x1ZGluZyBidXQgbm90IGxpbWl0ZWQgdG8gYXVkaW8gb3IgdmlkZW8uCgpZb3UgYWdyZWUgdGhhdCBVT0JSRVAgbWF5LCB3aXRob3V0IGNoYW5naW5nIHRoZSBjb250ZW50LCB0cmFuc2xhdGUgdGhlCnN1Ym1pc3Npb24gdG8gYW55IG1lZGl1bSBvciBmb3JtYXQgZm9yIHRoZSBwdXJwb3NlIG9mIHByZXNlcnZhdGlvbi4KCllvdSBhbHNvIGFncmVlIHRoYXQgVU9CUkVQIG1heSBrZWVwIG1vcmUgdGhhbiBvbmUgY29weSBvZiB0aGlzIHN1Ym1pc3Npb24gZm9yCnB1cnBvc2VzIG9mIHNlY3VyaXR5LCBiYWNrLXVwIGFuZCBwcmVzZXJ2YXRpb24uCgpZb3UgcmVwcmVzZW50IHRoYXQgdGhlIHN1Ym1pc3Npb24gaXMgeW91ciBvcmlnaW5hbCB3b3JrLCBhbmQgdGhhdCB5b3UgaGF2ZQp0aGUgcmlnaHQgdG8gZ3JhbnQgdGhlIHJpZ2h0cyBjb250YWluZWQgaW4gdGhpcyBsaWNlbnNlLiBZb3UgYWxzbyByZXByZXNlbnQKdGhhdCB5b3VyIHN1Ym1pc3Npb24gZG9lcyBub3QsIHRvIHRoZSBiZXN0IG9mIHlvdXIga25vd2xlZGdlLCBpbmZyaW5nZSB1cG9uCmFueW9uZSdzIGNvcHlyaWdodC4KCklmIHRoZSBzdWJtaXNzaW9uIGNvbnRhaW5zIG1hdGVyaWFsIGZvciB3aGljaCB5b3UgZG8gbm90IGhvbGQgY29weXJpZ2h0LAp5b3UgcmVwcmVzZW50IHRoYXQgeW91IGhhdmUgb2J0YWluZWQgdGhlIHVucmVzdHJpY3RlZCBwZXJtaXNzaW9uIG9mIHRoZQpjb3B5cmlnaHQgb3duZXIgdG8gZ3JhbnQgVU9CUkVQIHRoZSByaWdodHMgcmVxdWlyZWQgYnkgdGhpcyBsaWNlbnNlLCBhbmQgdGhhdApzdWNoIHRoaXJkLXBhcnR5IG93bmVkIG1hdGVyaWFsIGlzIGNsZWFybHkgaWRlbnRpZmllZCBhbmQgYWNrbm93bGVkZ2VkCndpdGhpbiB0aGUgdGV4dCBvciBjb250ZW50IG9mIHRoZSBzdWJtaXNzaW9uLgoKSUYgVEhFIFNVQk1JU1NJT04gSVMgQkFTRUQgVVBPTiBXT1JLIFRIQVQgSEFTIEJFRU4gU1BPTlNPUkVEIE9SIFNVUFBPUlRFRApCWSBBTiBBR0VOQ1kgT1IgT1JHQU5JWkFUSU9OIE9USEVSIFRIQU4gVEVTVE9SLCBZT1UgUkVQUkVTRU5UIFRIQVQgWU9VIEhBVkUKRlVMRklMTEVEIEFOWSBSSUdIVCBPRiBSRVZJRVcgT1IgT1RIRVIgT0JMSUdBVElPTlMgUkVRVUlSRUQgQlkgU1VDSApDT05UUkFDVCBPUiBBR1JFRU1FTlQuCgpVT0JSRVAgd2lsbCBjbGVhcmx5IGlkZW50aWZ5IHlvdXIgbmFtZShzKSBhcyB0aGUgYXV0aG9yKHMpIG9yIG93bmVyKHMpIG9mIHRoZQpzdWJtaXNzaW9uLCBhbmQgd2lsbCBub3QgbWFrZSBhbnkgYWx0ZXJhdGlvbiwgb3RoZXIgdGhhbiBhcyBhbGxvd2VkIGJ5IHRoaXMKbGljZW5zZSwgdG8geW91ciBzdWJtaXNzaW9uLgo=
oai:uobrep.openrepository.com:10547/2706512024-02-06T10:41:46Zcom_10547_132192col_10547_132230
Sotiriadis, Stelios
3ca64c0b285d4587eea31a2a378a7279
-1
Bessis, Nik
c068e2871d34808e59514ab170e6bb1d
-1
Sant, Paul
4d523c3c21b077623d507fc78147194c
-1
Maple, Carsten
a4dc0842fb0b0b3b6d15dd203a61bd1f
-1
University of Bedfordshire
2013-02-28T15:42:58Z
2013-02-28T15:42:58Z
2010
Sotiriadis,S., Bessis, N., Sant, P. and Maple, C. (2010) “Encoding minimum requirements of ad hoc inter-connected grids to a genetic algorithm infrastructure”, 1st International Conference on Collaborative Technologies (ICCT-2010), IADIS, 26th – 28th July, Freiburg, p.p.: 142-149.
9789728939212
http://hdl.handle.net/10547/270651
en
IADIS
http://www.iadisportal.org/ct-2010-proceedings
Encoding minimum requirements of ad hoc inter-connected grids to a genetic algorithm infrastructure
Conference papers, meetings and proceedings
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/270651/1/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
1
false
10547/270651
oai:uobrep.openrepository.com:10547/270651
2024-02-06 10:41:46.323
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
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
oai:uobrep.openrepository.com:10547/2706412024-02-06T10:45:24Zcom_10547_132192col_10547_132230
Sotiriadis, Stelios
3ca64c0b285d4587eea31a2a378a7279
500
Bessis, Nik
c068e2871d34808e59514ab170e6bb1d
500
Sant, Paul
4d523c3c21b077623d507fc78147194c
500
Maple, Carsten
a4dc0842fb0b0b3b6d15dd203a61bd1f
500
University of Bedfordshire
2013-02-28T14:41:07Z
2013-02-28T14:41:07Z
2010
Sotiriadis, S., Bessis, N., Sant, P. and Maple, C.(2010) "A Resource Discovery Architecture of Loosely Coupled Grid Inter-cooperated Virtual Organisations Using Mobile Agents and Neural Networks," P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), 2010 International Conference on , pp.320-325, 4-6 Nov. 2010
978-0-7695-4237-9
10.1109/3PGCIC.2010.53
http://hdl.handle.net/10547/270641
Grid computing offers a service for sharing resources over uncertain and complex environments. In such multi-participated settings it is essential to make the grid middleware functionality transparent to members by providing the ability to act autonomous and learning from the environment. Parallel to grid, artificial neural networks is a paradigm for processing information, which is inspired by the processes of biological nervous systems. The latter fields can be really promoted from the artificial intelligent agents, which offer an autonomous acting infrastructure of members with proactive and reactive aptitude. As grid is about sharing and allocating resources within uncertain domains, intelligent agents and neural networks may be the mean of achieving an autonomous learning environment of self-motivated members. In this study, we focus on the mobility agents' model aiming to discovery resources dynamically, parallel to the artificial neural networks as a way to achieve the best resource discovery paths. Our work is fundamentally based on the Self-led Critical Friends method, a technique for realizing inter-cooperation among various scales Virtual Organisations (VOs). Their mediator acting nature redirects communication to other parties of different VOs by utilizing a public profile of data stored within VO members.
en
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5662769
grid
metadata snapshot profile
mobile agents
self organizing maps
self-led critical friends
A resource discovery architecture of loosely coupled grid inter-cooperated virtual organisations using mobile agents and neural networks
Conference papers, meetings and proceedings
Grid computing offers a service for sharing resources over uncertain and complex environments. In such multi-participated settings it is essential to make the grid middleware functionality transparent to members by providing the ability to act autonomous and learning from the environment. Parallel to grid, artificial neural networks is a paradigm for processing information, which is inspired by the processes of biological nervous systems. The latter fields can be really promoted from the artificial intelligent agents, which offer an autonomous acting infrastructure of members with proactive and reactive aptitude. As grid is about sharing and allocating resources within uncertain domains, intelligent agents and neural networks may be the mean of achieving an autonomous learning environment of self-motivated members. In this study, we focus on the mobility agents' model aiming to discovery resources dynamically, parallel to the artificial neural networks as a way to achieve the best resource discovery paths. Our work is fundamentally based on the Self-led Critical Friends method, a technique for realizing inter-cooperation among various scales Virtual Organisations (VOs). Their mediator acting nature redirects communication to other parties of different VOs by utilizing a public profile of data stored within VO members.
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/270641/1/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
1
false
10547/270641
oai:uobrep.openrepository.com:10547/270641
2024-02-06 10:45:24.778
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
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
oai:uobrep.openrepository.com:10547/2705772020-04-23T07:29:36Zcom_10547_132192col_10547_132230
Viduto, Valentina
daa57fcd000111bf463ee9df7c457587
600
Maple, Carsten
a4dc0842fb0b0b3b6d15dd203a61bd1f
-1
Huang, Wei
79e77a152c5bf6b8d75438d4d7bfbf33
-1
2013-02-27T16:46:51Z
2013-02-27T16:46:51Z
2010
Viduto, V.; Maple, C.; Huang, W.; (2010) "An Analytical Evaluation of Network Security Modelling Techniques Applied to Manage Threats," Broadband, Wireless Computing, Communication and Applications (BWCCA), 2010 International Conference on , pp.117-123, 4-6 Nov. 2010
9780769542362
10.1109/BWCCA.2010.58
http://hdl.handle.net/10547/270577
The current ubiquity of information coupled with the reliance on such data by businesses has led to a great deal of resources being deployed to ensure the security of this information. Threats can come from a number of sources and the dangers from those insiders closest to the source have increased significantly recently. This paper focuses on techniques used to identify and manage threats as well as the measures that every organisation should consider to put into action. A novel game-based onion skin model has been proposed, combining techniques used in theory-based and hardware-based hardening strategies.
en
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5633801
attack graph
attack tree
network hardening
threats
computer security
An analytical evaluation of network security modelling techniques applied to manage threats
Conference papers, meetings and proceedings
The current ubiquity of information coupled with the reliance on such data by businesses has led to a great deal of resources being deployed to ensure the security of this information. Threats can come from a number of sources and the dangers from those insiders closest to the source have increased significantly recently. This paper focuses on techniques used to identify and manage threats as well as the measures that every organisation should consider to put into action. A novel game-based onion skin model has been proposed, combining techniques used in theory-based and hardware-based hardening strategies.
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/270577/1/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
1
false
10547/270577
oai:uobrep.openrepository.com:10547/270577
2020-04-23 07:29:36.417
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
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
oai:uobrep.openrepository.com:10547/2706012018-07-16T13:06:32Zcom_10547_132192col_10547_132230
Shukla, Mitul
0000-0003-2774-7086
600
Bessis, Nik
Conrad, Marc
0000-0003-1796-209X
600
Maple, Carsten
University of Bedfordshire
2013-02-27T16:21:09Z
2013-02-27T16:21:09Z
2009
Shukla, M., Bessis, N., Conrad, M., Maple, C. (2009) A Dynamically Adaptive Dimensionalised Experience Feedback Mechanism within Second Life, in Proceedings of the International Conference Applied Computing 2009, IADIS, 19th-21st November, Rome
9789728924973
http://hdl.handle.net/10547/270601
en
IADIS
http://www.iadisportal.org/applied-computing-2009-proceedings
A dynamically adaptive dimensionalised experience feedback mechanism within Second Life
Conference papers, meetings and proceedings
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/270601/1/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
1
false
10547/270601
oai:uobrep.openrepository.com:10547/270601
2018-07-16 13:06:32.344
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
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
oai:uobrep.openrepository.com:10547/2706002020-04-23T07:29:27Zcom_10547_132192col_10547_132230
Li, Dayou
6295afce2b3b8447f935ff4664ecd492
-1
Liu, Beisheng
f51f42a3f46e7e2d07193c35b06bd311
-1
Maple, Carsten
a4dc0842fb0b0b3b6d15dd203a61bd1f
-1
Jiang, Daming
bbc20470f80486396ba0e4a310dbcc76
-1
Yue, Yong
59d04f0f8e57359fc0492dc893f8df61
-1
2013-02-27T16:20:35Z
2013-02-27T16:20:35Z
2008
Dayou Li; Beisheng Liu; Maple, C.; Daming Jiang; Yong Yue; (2008) Active Robot Learning for Building Up High-Order Beliefs, Fuzzy Systems and Knowledge Discovery, FSKD '08, Fifth International Conference on , vol.3, pp.201-205
9780769533056
10.1109/FSKD.2008.186
http://hdl.handle.net/10547/270600
High-order beliefs of service robots regard the robots' thought about their users' intention and preference. The existing approaches to the development of such beliefs through machine learning rely on particular social cues or specifically defined award functions. Their applications can, therefore, be limited. This paper presents an active robot learning approach to facilitate the robots to develop the beliefs by actively collecting/discovering evidence they need. The emphasis is on active learning. Hence social cues and award functions are not necessary. Simulations show that the presented approach successfully enabled a robot to discover evidences it needs.
en
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=4666240
active learning
cognitive robotics
fuzzy logic
Active robot learning for building up high-order beliefs
Conference papers, meetings and proceedings
High-order beliefs of service robots regard the robots' thought about their users' intention and preference. The existing approaches to the development of such beliefs through machine learning rely on particular social cues or specifically defined award functions. Their applications can, therefore, be limited. This paper presents an active robot learning approach to facilitate the robots to develop the beliefs by actively collecting/discovering evidence they need. The emphasis is on active learning. Hence social cues and award functions are not necessary. Simulations show that the presented approach successfully enabled a robot to discover evidences it needs.
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/270600/1/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
1
false
10547/270600
oai:uobrep.openrepository.com:10547/270600
2020-04-23 07:29:27.729
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
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
oai:uobrep.openrepository.com:10547/2705952020-04-23T07:29:28Zcom_10547_132192col_10547_132230
Maple, Carsten
a4dc0842fb0b0b3b6d15dd203a61bd1f
-1
Williams, Geraint
66891f940a7a42e7affc25d0d847b5e7
-1
Yue, Yong
59d04f0f8e57359fc0492dc893f8df61
-1
2013-02-27T15:54:55Z
2013-02-27T15:54:55Z
2007
Maple, C., Williams, G., Yue, Y. (2007) Reliability, Availability and Security of Wireless Networks in the Community,31 (2):201-208 Informatica
0350-5596
http://hdl.handle.net/10547/270595
Informatica
Wireless networking increases the flexibility in the home, work place and community to connect to the Internet without being tied to a single location. Wireless networking has rapidly increased in popularity over recent years. There has also been a change in the use of the internet by users. Home users have embraced wireless technology and businesses see it as having a great impact on their operational efficiency. Both home users and industry are sending increasingly sensitive information through these wireless networks as online delivery of banking, commercial and governmental services becomes more widespread. However undeniable the benefits of wireless networking are, there are additional risks that do not exist in wired networks. It is imperative that adequate assessment and management of risk is undertaken by businesses and home users. This paper reviews wireless network protocols, investigates issues of reliability, availability and security when using wireless networks. The paper, by use of a case study, illustrates the issues and importance of implementing secured wireless networks, and shows the significance of the issue. The paper presents a discussion of the case study and a set of recommendations to mitigate the threat.
en
he Slovene Society Informatika, Ljubljana
http://www.informatica.si/vol31.htm#No2
security
WEP
WLAN
WPA
risk assessment
risk management
threat analysis
computer security
wireless networks
Reliability, availability and security of wireless networks in the community
Article
Wireless networking increases the flexibility in the home, work place and community to connect to the Internet without being tied to a single location. Wireless networking has rapidly increased in popularity over recent years. There has also been a change in the use of the internet by users. Home users have embraced wireless technology and businesses see it as having a great impact on their operational efficiency. Both home users and industry are sending increasingly sensitive information through these
wireless networks as online delivery of banking, commercial and governmental services becomes more
widespread. However undeniable the benefits of wireless networking are, there are additional risks that do not exist in wired networks. It is imperative that adequate assessment and management of risk is undertaken by businesses and home users. This paper reviews wireless network protocols, investigates issues of reliability, availability and security when using wireless networks. The paper, by use of a case
study, illustrates the issues and importance of implementing secured wireless networks, and shows the significance of the issue. The paper presents a discussion of the case study and a set of
recommendations to mitigate the threat.
ORIGINAL
08_Maple-Reliability, Availability and Security of...pdf
08_Maple-Reliability, Availability and Security of...pdf
Full-text article
application/pdf
110630
https://uobrep.openrepository.com/bitstream/10547/270595/1/08_Maple-Reliability%2c%20Availability%20and%20Security%20of...pdf
05c3748310f138c5fd955a5339a40ede
MD5
1
true
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/270595/2/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
2
false
TEXT
08_Maple-Reliability, Availability and Security of...pdf.txt
08_Maple-Reliability, Availability and Security of...pdf.txt
Extracted Text
text/plain
44453
https://uobrep.openrepository.com/bitstream/10547/270595/8/08_Maple-Reliability%2c%20Availability%20and%20Security%20of...pdf.txt
b20df68c7faf907007e187c4ce0256c5
MD5
8
false
THUMBNAIL
08_Maple-Reliability, Availability and Security of...pdf.jpg
08_Maple-Reliability, Availability and Security of...pdf.jpg
Generated Thumbnail
image/jpeg
2411
https://uobrep.openrepository.com/bitstream/10547/270595/4/08_Maple-Reliability%2c%20Availability%20and%20Security%20of...pdf.jpg
5a75b3ba5160a62a56bf7de25f74074e
MD5
4
false
CC-LICENSE
license_url
license_url
text/plain
49
https://uobrep.openrepository.com/bitstream/10547/270595/5/license_url
fd26723f8d7edacdb29e3f03465c3b03
MD5
5
false
license_text
license_text
application/octet-stream
0
https://uobrep.openrepository.com/bitstream/10547/270595/7/license_text
d41d8cd98f00b204e9800998ecf8427e
MD5
7
false
license_rdf
license_rdf
application/octet-stream
23599
https://uobrep.openrepository.com/bitstream/10547/270595/6/license_rdf
9e2b7f6edbd693264102b96ece20428a
MD5
6
false
10547/270595
oai:uobrep.openrepository.com:10547/270595
2020-04-23 07:29:28.032
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
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
oai:uobrep.openrepository.com:10547/2705742020-04-23T07:29:28Zcom_10547_132192col_10547_132230
Schetinin, Vitaly
138e76ce1f24a43b1907441d43d207cb
-1
Krzanowski, Wojtek
d0d2becbed526ced2e492a3dbd68edd9
-1
Maple, Carsten
a4dc0842fb0b0b3b6d15dd203a61bd1f
-1
2013-02-27T15:49:32Z
2013-02-27T15:49:32Z
2007
Schetinin, V., Krzanowski, W. J., and Maple, C.,(2007) The Bayesian Decision Tree Technique Using an Adaptive Sampling Scheme, The 20th IEEE International Symposium on Computer-Based Medical Systems, CBMS-2007, Maribor, pp. 121-126
1063-7125
10.1109/CBMS.2007.109
http://hdl.handle.net/10547/270574
Decision trees (DTs) provide an attractive classification scheme because clinicians responsible for making reliable decisions can easily interpret them. Bayesian averaging over DTs allows clinicians to evaluate the class posterior distribution and therefore to estimate the risk of making misleading decisions. The use of Markov chain Monte Carlo (MCMC) methodology of stochastic sampling makes the Bayesian DT technique feasible to perform. The Reversible Jump (RJ) extension of MCMC allows sampling from DTs of different sizes. However, the RJ MCMC process may become stuck in a particular DT far away from the region with maximal posterior. This negative effect can be mitigated by averaging the DTs obtained in different starts. In this paper we describe a new approach based on an adaptive sampling scheme. The performances of Bayesian DT techniques with the restarting and adaptive strategies are compared on a synthetic dataset as well as on some medical datasets. By quantitatively evaluating the classification uncertainty, we found that the adaptive strategy is superior to the restarting strategy.
en
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=4262637
Bayesian methods
The Bayesian decision tree technique using an adaptive sampling scheme
Conference papers, meetings and proceedings
Decision trees (DTs) provide an attractive classification scheme because clinicians responsible for making reliable decisions can easily interpret them. Bayesian averaging over DTs allows clinicians to evaluate the class posterior distribution and therefore to estimate the risk of making misleading decisions. The use of Markov chain Monte Carlo (MCMC) methodology of stochastic sampling makes the Bayesian DT technique feasible to perform. The Reversible Jump (RJ) extension of MCMC allows sampling from DTs of different sizes. However, the RJ MCMC process may become stuck in a particular DT far away from the region with maximal posterior. This negative effect can be mitigated by averaging the DTs obtained in different starts. In this paper we describe a new approach based on an adaptive sampling scheme. The performances of Bayesian DT techniques with the restarting and adaptive strategies are compared on a synthetic dataset as well as on some medical datasets. By quantitatively evaluating the classification uncertainty, we found that the adaptive strategy is superior to the restarting strategy.
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/270574/1/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
1
false
10547/270574
oai:uobrep.openrepository.com:10547/270574
2020-04-23 07:29:28.234
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
Tk9OLUVYQ0xVU0lWRSBESVNUUklCVVRJT04gTElDRU5TRQoKQnkgc2lnbmluZyBhbmQgc3VibWl0dGluZyB0aGlzIGxpY2Vuc2UsIHlvdSAodGhlIGF1dGhvcihzKSBvciBjb3B5cmlnaHQKb3duZXIpIGdyYW50cyB0byB0aGUgVW5pdmVyc2l0eSBvZiBCZWRmb3Jkc2hpcmUgUmVwb3NpdG9yeSAgKFVPQlJFUCkgdGhlIG5vbi1leGNsdXNpdmUgcmlnaHQgdG8gcmVwcm9kdWNlLAp0cmFuc2xhdGUgKGFzIGRlZmluZWQgYmVsb3cpLCBhbmQvb3IgZGlzdHJpYnV0ZSB5b3VyIHN1Ym1pc3Npb24gKGluY2x1ZGluZwp0aGUgYWJzdHJhY3QpIHdvcmxkd2lkZSBpbiBwcmludCBhbmQgZWxlY3Ryb25pYyBmb3JtYXQgYW5kIGluIGFueSBtZWRpdW0sCmluY2x1ZGluZyBidXQgbm90IGxpbWl0ZWQgdG8gYXVkaW8gb3IgdmlkZW8uCgpZb3UgYWdyZWUgdGhhdCBVT0JSRVAgbWF5LCB3aXRob3V0IGNoYW5naW5nIHRoZSBjb250ZW50LCB0cmFuc2xhdGUgdGhlCnN1Ym1pc3Npb24gdG8gYW55IG1lZGl1bSBvciBmb3JtYXQgZm9yIHRoZSBwdXJwb3NlIG9mIHByZXNlcnZhdGlvbi4KCllvdSBhbHNvIGFncmVlIHRoYXQgVU9CUkVQIG1heSBrZWVwIG1vcmUgdGhhbiBvbmUgY29weSBvZiB0aGlzIHN1Ym1pc3Npb24gZm9yCnB1cnBvc2VzIG9mIHNlY3VyaXR5LCBiYWNrLXVwIGFuZCBwcmVzZXJ2YXRpb24uCgpZb3UgcmVwcmVzZW50IHRoYXQgdGhlIHN1Ym1pc3Npb24gaXMgeW91ciBvcmlnaW5hbCB3b3JrLCBhbmQgdGhhdCB5b3UgaGF2ZQp0aGUgcmlnaHQgdG8gZ3JhbnQgdGhlIHJpZ2h0cyBjb250YWluZWQgaW4gdGhpcyBsaWNlbnNlLiBZb3UgYWxzbyByZXByZXNlbnQKdGhhdCB5b3VyIHN1Ym1pc3Npb24gZG9lcyBub3QsIHRvIHRoZSBiZXN0IG9mIHlvdXIga25vd2xlZGdlLCBpbmZyaW5nZSB1cG9uCmFueW9uZSdzIGNvcHlyaWdodC4KCklmIHRoZSBzdWJtaXNzaW9uIGNvbnRhaW5zIG1hdGVyaWFsIGZvciB3aGljaCB5b3UgZG8gbm90IGhvbGQgY29weXJpZ2h0LAp5b3UgcmVwcmVzZW50IHRoYXQgeW91IGhhdmUgb2J0YWluZWQgdGhlIHVucmVzdHJpY3RlZCBwZXJtaXNzaW9uIG9mIHRoZQpjb3B5cmlnaHQgb3duZXIgdG8gZ3JhbnQgVU9CUkVQIHRoZSByaWdodHMgcmVxdWlyZWQgYnkgdGhpcyBsaWNlbnNlLCBhbmQgdGhhdApzdWNoIHRoaXJkLXBhcnR5IG93bmVkIG1hdGVyaWFsIGlzIGNsZWFybHkgaWRlbnRpZmllZCBhbmQgYWNrbm93bGVkZ2VkCndpdGhpbiB0aGUgdGV4dCBvciBjb250ZW50IG9mIHRoZSBzdWJtaXNzaW9uLgoKSUYgVEhFIFNVQk1JU1NJT04gSVMgQkFTRUQgVVBPTiBXT1JLIFRIQVQgSEFTIEJFRU4gU1BPTlNPUkVEIE9SIFNVUFBPUlRFRApCWSBBTiBBR0VOQ1kgT1IgT1JHQU5JWkFUSU9OIE9USEVSIFRIQU4gVEVTVE9SLCBZT1UgUkVQUkVTRU5UIFRIQVQgWU9VIEhBVkUKRlVMRklMTEVEIEFOWSBSSUdIVCBPRiBSRVZJRVcgT1IgT1RIRVIgT0JMSUdBVElPTlMgUkVRVUlSRUQgQlkgU1VDSApDT05UUkFDVCBPUiBBR1JFRU1FTlQuCgpVT0JSRVAgd2lsbCBjbGVhcmx5IGlkZW50aWZ5IHlvdXIgbmFtZShzKSBhcyB0aGUgYXV0aG9yKHMpIG9yIG93bmVyKHMpIG9mIHRoZQpzdWJtaXNzaW9uLCBhbmQgd2lsbCBub3QgbWFrZSBhbnkgYWx0ZXJhdGlvbiwgb3RoZXIgdGhhbiBhcyBhbGxvd2VkIGJ5IHRoaXMKbGljZW5zZSwgdG8geW91ciBzdWJtaXNzaW9uLgo=
oai:uobrep.openrepository.com:10547/2706022015-10-21T23:05:18Zcom_10547_132192col_10547_132230
Gleni, Sofia
Petratos, Panagiotis
Maple, Carsten
2013-02-27T16:22:47Z
2013-02-27T16:22:47Z
2009
Maple, C., Petratos, P. and Gleni, S. (2009) Employment opportunities for the future,IEEE GOLD Rush, September issue, 16-17
http://hdl.handle.net/10547/270602
IEEE GOLD Rush
en
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
http://www.ieee.org/membership_services/membership/gold/newsletter_archive.html
Employment opportunities for the future
Article
ORIGINAL
goldrush_sep_2009.pdf
goldrush_sep_2009.pdf
Newsletter
application/pdf
3161606
https://uobrep.openrepository.com/bitstream/10547/270602/1/goldrush_sep_2009.pdf
7a26bd04684a89ec8487bdb94da8420e
MD5
1
true
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/270602/2/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
2
false
TEXT
goldrush_sep_2009.pdf.txt
goldrush_sep_2009.pdf.txt
Extracted Text
text/plain
69896
https://uobrep.openrepository.com/bitstream/10547/270602/5/goldrush_sep_2009.pdf.txt
89f6c85abdb2877787d2ede7004d3911
MD5
5
false
THUMBNAIL
goldrush_sep_2009.pdf.jpg
goldrush_sep_2009.pdf.jpg
Generated Thumbnail
image/jpeg
2553
https://uobrep.openrepository.com/bitstream/10547/270602/4/goldrush_sep_2009.pdf.jpg
32efc4cf5c3bf8de5633f60c6f5b58de
MD5
4
false
10547/270602
oai:uobrep.openrepository.com:10547/270602
2015-10-21 23:05:18.0
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
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
oai:uobrep.openrepository.com:10547/2705982020-04-23T07:29:27Zcom_10547_132192col_10547_132230
Huang, Wei
79e77a152c5bf6b8d75438d4d7bfbf33
-1
Li, Ru
4ae358828d528501b28ca7b3bf1f8a6d
-1
Maple, Carsten
a4dc0842fb0b0b3b6d15dd203a61bd1f
-1
Yang, Hongji
7a3c5942bd61bb7ec3a9ddfbfd510612
-1
Foskett, David
fae82e21c50e808b25cdbd9ed81b844a
-1
Cleaver, Vince
d5ac2a8f4322c822af8a468528095bb8
-1
2013-02-27T16:15:28Z
2013-02-27T16:15:28Z
2008
Huang, W.; Ru Li; Maple, C.; Hongji Yang; Foskett, D.; Cleaver, V.; (2009) Web Application Development Lifecycle for Small Medium-Sized Enterprises (SMEs) (Short Paper), Quality Software, QSIC '08. The Eighth International Conference on , pp.247-252
9780769533124
1550-6002
10.1109/QSIC.2008.43
http://hdl.handle.net/10547/270598
Software engineering has proven to be very important for standard software development. But, can Web applications be engineered as well? Currently, J2EE, Apache/Perl/PDP/MySQL and .NET have been universally accepted as Web application development technology, but there is no universal accepted methodology for Web application development process. Web application needs to be engineered by moving focus from technology to process. In this paper, a novel lifecycle model for Web application development in SMEs has been proposed. It includes two iterative process phases with a pre-iterative sequential process phase. This model has been applied to a real-world project and the result has proved its potential to shape the way on how web applications can be engineered in SMEs.
en
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=4601551
web design
small to medium-sized enterprises
SMEs
Web application development lifecycle for small medium-sized enterprises (SMEs)
Conference papers, meetings and proceedings
Software engineering has proven to be very important for standard software development. But, can Web applications be engineered as well? Currently, J2EE, Apache/Perl/PDP/MySQL and .NET have been universally accepted as Web application development technology, but there is no universal accepted methodology for Web application development process. Web application needs to be engineered by moving focus from technology to process. In this paper, a novel lifecycle model for Web application development in SMEs has been proposed. It includes two iterative process phases with a pre-iterative sequential process phase. This model has been applied to a real-world project and the result has proved its potential to shape the way on how web applications can be engineered in SMEs.
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/270598/1/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
1
false
10547/270598
oai:uobrep.openrepository.com:10547/270598
2020-04-23 07:29:27.809
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
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
oai:uobrep.openrepository.com:10547/2705972020-04-23T07:29:27Zcom_10547_132192col_10547_132230
Schetinin, Vitaly
138e76ce1f24a43b1907441d43d207cb
-1
Li, Dayou
6295afce2b3b8447f935ff4664ecd492
-1
Maple, Carsten
a4dc0842fb0b0b3b6d15dd203a61bd1f
-1
2013-02-27T16:13:49Z
2013-02-27T16:13:49Z
2008
Schetinin, V., Li, D., Maple, C. (2008) An Evolutionary-Based Approach to Learning Multiple Decision Models from Underrepresented Data, The 4th International Conference on Natural Computation (ICNC'08), 1, pp.40-44
9780769533049
10.1109/ICNC.2008.409
http://hdl.handle.net/10547/270597
The use of multiple Decision Models (DMs) enables to enhance the accuracy in decisions and at the same time allows users to evaluate the confidence in decision making. In this paper we explore the ability of multiple DMs to learn from a small amount of verified data. This becomes important when data samples are difficult to collect and verify. We propose an evolutionary-based approach to solving this problem. The proposed technique is examined on a few clinical problems presented by a small amount of data.
en
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=4666807
An evolutionary-based approach to learning multiple decision models from underrepresented data
Conference papers, meetings and proceedings
The use of multiple Decision Models (DMs) enables to enhance the accuracy in decisions and at the same time allows users to evaluate the confidence in decision making. In this paper we explore the ability of multiple DMs to learn from a small amount of verified data. This becomes important when data samples are difficult to collect and verify. We propose an evolutionary-based approach to solving this problem. The proposed technique is examined on a few clinical problems presented by a small amount of data.
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/270597/1/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
1
false
10547/270597
oai:uobrep.openrepository.com:10547/270597
2020-04-23 07:29:27.88
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
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
oai:uobrep.openrepository.com:10547/2705752020-04-23T07:29:27Zcom_10547_132192col_10547_132230
Han, Ching-Chih
70c1ea7d2c47890b289609838c54546f
-1
Shin, K.G.
ec14990c9028a095a28b0dcff620e66b
-1
Hou, Chao-Ju
ba3268ef190631f8a31955e529d13483
-1
2013-02-27T16:12:41Z
2013-02-27T16:12:41Z
2008
Han, C., Shin, K.G. and Hou, C. (2001) Synchronous bandwidth allocation for real-time communications with the timed-token MAC protocol 2001, 50 (5):414-431 IEEE Transactions on Computers
00189340
10.1109/12.926157
http://hdl.handle.net/10547/270575
IEEE Transactions on Computers
One of the key issues in tailoring the timed-token MAC protocol for real-time applications is synchronous bandwidth allocation (SBA), whose objective is to meet both the protocol and deadline constraints. The former constraint requires that the total time allocated to all nodes for transmitting synchronous messages should not exceed the target token rotation time. The latter constraint requires that the minimum time available for a node to transmit its synchronous messages before their deadlines should be no less than the maximum message transmission time. Several nonoptimal local SEA schemes and an optimal global SBA scheme have been proposed. Local SBA schemes use only information available locally to each node and are thus preferred to global schemes because of their lower network-management overhead. If optimal local SBA schemes, if any, can be devised, they will be superior to their global counterparts both in performance and in ease of network management. In this paper, we formally prove that there does not exist any optimal local SBA scheme. We also propose an optimal global SBA scheme which has an O(nM) polynomial-time worst-case complexity, where n is the number of synchronous message streams in the system and M is the time complexity for solving a linear programming problem with 3n constraints and n variables
en
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=926157
Archived with thanks to IEEE Transactions on Computers
Synchronous bandwidth allocation for real-time communications with the timed-token MAC protocol
Article
One of the key issues in tailoring the timed-token MAC protocol for real-time applications is synchronous bandwidth allocation (SBA), whose objective is to meet both the protocol and deadline constraints. The former constraint requires that the total time allocated to all nodes for transmitting synchronous messages should not exceed the target token rotation time. The latter constraint requires that the minimum time available for a node to transmit its synchronous messages before their deadlines should be no less than the maximum message transmission time. Several nonoptimal local SEA schemes and an optimal global SBA scheme have been proposed. Local SBA schemes use only information available locally to each node and are thus preferred to global schemes because of their lower network-management overhead. If optimal local SBA schemes, if any, can be devised, they will be superior to their global counterparts both in performance and in ease of network management. In this paper, we formally prove that there does not exist any optimal local SBA scheme. We also propose an optimal global SBA scheme which has an O(nM) polynomial-time worst-case complexity, where n is the number of synchronous message streams in the system and M is the time complexity for solving a linear programming problem with 3n constraints and n variables
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/270575/1/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
1
false
10547/270575
oai:uobrep.openrepository.com:10547/270575
2020-04-23 07:29:27.963
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
Tk9OLUVYQ0xVU0lWRSBESVNUUklCVVRJT04gTElDRU5TRQoKQnkgc2lnbmluZyBhbmQgc3VibWl0dGluZyB0aGlzIGxpY2Vuc2UsIHlvdSAodGhlIGF1dGhvcihzKSBvciBjb3B5cmlnaHQKb3duZXIpIGdyYW50cyB0byB0aGUgVW5pdmVyc2l0eSBvZiBCZWRmb3Jkc2hpcmUgUmVwb3NpdG9yeSAgKFVPQlJFUCkgdGhlIG5vbi1leGNsdXNpdmUgcmlnaHQgdG8gcmVwcm9kdWNlLAp0cmFuc2xhdGUgKGFzIGRlZmluZWQgYmVsb3cpLCBhbmQvb3IgZGlzdHJpYnV0ZSB5b3VyIHN1Ym1pc3Npb24gKGluY2x1ZGluZwp0aGUgYWJzdHJhY3QpIHdvcmxkd2lkZSBpbiBwcmludCBhbmQgZWxlY3Ryb25pYyBmb3JtYXQgYW5kIGluIGFueSBtZWRpdW0sCmluY2x1ZGluZyBidXQgbm90IGxpbWl0ZWQgdG8gYXVkaW8gb3IgdmlkZW8uCgpZb3UgYWdyZWUgdGhhdCBVT0JSRVAgbWF5LCB3aXRob3V0IGNoYW5naW5nIHRoZSBjb250ZW50LCB0cmFuc2xhdGUgdGhlCnN1Ym1pc3Npb24gdG8gYW55IG1lZGl1bSBvciBmb3JtYXQgZm9yIHRoZSBwdXJwb3NlIG9mIHByZXNlcnZhdGlvbi4KCllvdSBhbHNvIGFncmVlIHRoYXQgVU9CUkVQIG1heSBrZWVwIG1vcmUgdGhhbiBvbmUgY29weSBvZiB0aGlzIHN1Ym1pc3Npb24gZm9yCnB1cnBvc2VzIG9mIHNlY3VyaXR5LCBiYWNrLXVwIGFuZCBwcmVzZXJ2YXRpb24uCgpZb3UgcmVwcmVzZW50IHRoYXQgdGhlIHN1Ym1pc3Npb24gaXMgeW91ciBvcmlnaW5hbCB3b3JrLCBhbmQgdGhhdCB5b3UgaGF2ZQp0aGUgcmlnaHQgdG8gZ3JhbnQgdGhlIHJpZ2h0cyBjb250YWluZWQgaW4gdGhpcyBsaWNlbnNlLiBZb3UgYWxzbyByZXByZXNlbnQKdGhhdCB5b3VyIHN1Ym1pc3Npb24gZG9lcyBub3QsIHRvIHRoZSBiZXN0IG9mIHlvdXIga25vd2xlZGdlLCBpbmZyaW5nZSB1cG9uCmFueW9uZSdzIGNvcHlyaWdodC4KCklmIHRoZSBzdWJtaXNzaW9uIGNvbnRhaW5zIG1hdGVyaWFsIGZvciB3aGljaCB5b3UgZG8gbm90IGhvbGQgY29weXJpZ2h0LAp5b3UgcmVwcmVzZW50IHRoYXQgeW91IGhhdmUgb2J0YWluZWQgdGhlIHVucmVzdHJpY3RlZCBwZXJtaXNzaW9uIG9mIHRoZQpjb3B5cmlnaHQgb3duZXIgdG8gZ3JhbnQgVU9CUkVQIHRoZSByaWdodHMgcmVxdWlyZWQgYnkgdGhpcyBsaWNlbnNlLCBhbmQgdGhhdApzdWNoIHRoaXJkLXBhcnR5IG93bmVkIG1hdGVyaWFsIGlzIGNsZWFybHkgaWRlbnRpZmllZCBhbmQgYWNrbm93bGVkZ2VkCndpdGhpbiB0aGUgdGV4dCBvciBjb250ZW50IG9mIHRoZSBzdWJtaXNzaW9uLgoKSUYgVEhFIFNVQk1JU1NJT04gSVMgQkFTRUQgVVBPTiBXT1JLIFRIQVQgSEFTIEJFRU4gU1BPTlNPUkVEIE9SIFNVUFBPUlRFRApCWSBBTiBBR0VOQ1kgT1IgT1JHQU5JWkFUSU9OIE9USEVSIFRIQU4gVEVTVE9SLCBZT1UgUkVQUkVTRU5UIFRIQVQgWU9VIEhBVkUKRlVMRklMTEVEIEFOWSBSSUdIVCBPRiBSRVZJRVcgT1IgT1RIRVIgT0JMSUdBVElPTlMgUkVRVUlSRUQgQlkgU1VDSApDT05UUkFDVCBPUiBBR1JFRU1FTlQuCgpVT0JSRVAgd2lsbCBjbGVhcmx5IGlkZW50aWZ5IHlvdXIgbmFtZShzKSBhcyB0aGUgYXV0aG9yKHMpIG9yIG93bmVyKHMpIG9mIHRoZQpzdWJtaXNzaW9uLCBhbmQgd2lsbCBub3QgbWFrZSBhbnkgYWx0ZXJhdGlvbiwgb3RoZXIgdGhhbiBhcyBhbGxvd2VkIGJ5IHRoaXMKbGljZW5zZSwgdG8geW91ciBzdWJtaXNzaW9uLgo=
oai:uobrep.openrepository.com:10547/2705942020-04-23T07:29:28Zcom_10547_132192col_10547_132230
Schetinin, Vitaly
138e76ce1f24a43b1907441d43d207cb
-1
Maple, Carsten
a4dc0842fb0b0b3b6d15dd203a61bd1f
-1
2013-02-27T15:54:19Z
2013-02-27T15:54:19Z
2007
Schetinin, V.; Maple, C.; (2007) A Bayesian Model Averaging Methodology for Detecting EEG Artifacts, Digital Signal Processing, 15th International Conference on , pp.499-502
1424408822
10.1109/ICDSP.2007.4288628
http://hdl.handle.net/10547/270594
In this paper we describe a Bayesian Model Averaging (BMA) methodology developed for detecting artifacts in electroencephalograms (EEGs). The EEGs can be heavily corrupted by cardiac, eye movement, muscle and noise artifacts, so that EEG experts need to automatically detect them with a given level of confidence. In theory, the BMA methodology allows experts to evaluate the confidence in decision making most accurately. However, the non- stationary nature of EEGs makes the use of this methodology difficult. In our experiments with the sleep EEGs, the proposed BMA technique is shown to provide a better performance in terms of predictive accuracy.
en
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=4288628
artifact detection
electroencephalogram
machine learning
uncertainty estimation
A Bayesian model averaging methodology for detecting EEG artifacts
Conference papers, meetings and proceedings
In this paper we describe a Bayesian Model Averaging (BMA) methodology developed for detecting artifacts in electroencephalograms (EEGs). The EEGs can be heavily corrupted by cardiac, eye movement, muscle and noise artifacts, so that EEG experts need to automatically detect them with a given level of confidence. In theory, the BMA methodology allows experts to evaluate the confidence in decision making most accurately. However, the non- stationary nature of EEGs makes the use of this methodology difficult. In our experiments with the sleep EEGs, the proposed BMA technique is shown to provide a better performance in terms of predictive accuracy.
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/270594/1/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
1
false
10547/270594
oai:uobrep.openrepository.com:10547/270594
2020-04-23 07:29:28.162
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
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
oai:uobrep.openrepository.com:10547/2706372020-04-23T07:36:18Zcom_10547_132192col_10547_132230
Conrad, Marc
c6d205a5c2149a7b0af55b805ff88a6c
600
French, Tim
c94a03e2298573a8e2e93bd5fc65b42a
-1
Huchard, Marianne
83a0a744fca143ca140cb21bf2be913c
-1
Maple, Carsten
a4dc0842fb0b0b3b6d15dd203a61bd1f
-1
Pott, Sandra
14a3c5a9d63e12f36b627b509cca5d4a
-1
2013-02-28T13:49:32Z
2013-02-28T13:49:32Z
2006
Conrad, M., French, T., Huchard, M., Maple, C., and Pott, S. (2006) Enriching the Object-Oriented Paradigm via Shadows in the Context of Mathematics, 5(6): 107-126 Journal of Object Technology
1660-1769
http://hdl.handle.net/10547/270637
Journal of Object Technology
It is well-known that few object-oriented programming languages allow objects to change their nature at run-time. In this paper we discuss the need for object-oriented programming languages to reflect the dynamic nature of problems, particularly those arising in a mathematical context. It is from this context that we present a framework, together with a Java-like implementation of that framework, that realistically represents the dynamic and evolving characteristic of problems and algorithms.
en
ETH Zurich, Chair of Software Engineering
http://hal-lirmm.ccsd.cnrs.fr/lirmm-00120306/en/
http://www.jot.fm/issues/issue_2006_07/article4/
object oriented programming
shadows
Enriching the object-oriented paradigm via shadows in the context of mathematics
Article
It is well-known that few object-oriented programming languages allow objects to change their nature at run-time. In this paper we discuss the need for object-oriented programming languages to reflect the dynamic nature of problems, particularly those arising in a mathematical context. It is from this context that we present a framework, together with a Java-like implementation of that framework, that realistically represents the dynamic and evolving characteristic of problems and algorithms.
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/270637/1/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
1
false
10547/270637
oai:uobrep.openrepository.com:10547/270637
2020-04-23 07:36:18.401
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
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
oai:uobrep.openrepository.com:10547/2706452020-04-23T07:29:28Zcom_10547_132192col_10547_132230
Pollonais, Sean
8d3a60c07a49f3c7c3c9f865704dee8f
-1
Maple, Carsten
a4dc0842fb0b0b3b6d15dd203a61bd1f
-1
2013-02-28T14:57:33Z
2013-02-28T14:57:33Z
2006
Maple, C., and Pollonais, S. (2006) 'An Integrated Approach to Web Application Development', in IADIS International Conference e-Society 2006, 13-16 July, Dublin, Ireland
972892416X
http://hdl.handle.net/10547/270645
Software systems are prone to attack regardless of their deployment environment. Securing the applications that are part of these systems should be a first consideration of the architects. This paper discusses the dangers and costs of treating security as a post-deployment notion and proposes an integrated methodology that stresses the importance of designing in the security features of an application and of writing code that passes tests designed to ensure correct and focused functionality. This amalgamated methodology is meant to produce applications that minimal and secure across all trust boundaries.
en
IADIS
http://www.iadis.net/dl/Search_list_open.asp?code=2802
web security
software development
security design
An integrated approach to web application development
Conference papers, meetings and proceedings
Software systems are prone to attack regardless of their deployment environment. Securing the applications that are part of these systems should be a first consideration of the architects. This paper discusses the dangers and costs of treating security as a post-deployment notion and proposes an integrated methodology that stresses the importance of designing in the security features of an application and of writing code that passes tests designed to ensure correct and focused functionality. This amalgamated methodology is meant to produce applications that minimal and secure across all trust boundaries.
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/270645/1/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
1
false
10547/270645
oai:uobrep.openrepository.com:10547/270645
2020-04-23 07:29:28.657
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
Tk9OLUVYQ0xVU0lWRSBESVNUUklCVVRJT04gTElDRU5TRQoKQnkgc2lnbmluZyBhbmQgc3VibWl0dGluZyB0aGlzIGxpY2Vuc2UsIHlvdSAodGhlIGF1dGhvcihzKSBvciBjb3B5cmlnaHQKb3duZXIpIGdyYW50cyB0byB0aGUgVW5pdmVyc2l0eSBvZiBCZWRmb3Jkc2hpcmUgUmVwb3NpdG9yeSAgKFVPQlJFUCkgdGhlIG5vbi1leGNsdXNpdmUgcmlnaHQgdG8gcmVwcm9kdWNlLAp0cmFuc2xhdGUgKGFzIGRlZmluZWQgYmVsb3cpLCBhbmQvb3IgZGlzdHJpYnV0ZSB5b3VyIHN1Ym1pc3Npb24gKGluY2x1ZGluZwp0aGUgYWJzdHJhY3QpIHdvcmxkd2lkZSBpbiBwcmludCBhbmQgZWxlY3Ryb25pYyBmb3JtYXQgYW5kIGluIGFueSBtZWRpdW0sCmluY2x1ZGluZyBidXQgbm90IGxpbWl0ZWQgdG8gYXVkaW8gb3IgdmlkZW8uCgpZb3UgYWdyZWUgdGhhdCBVT0JSRVAgbWF5LCB3aXRob3V0IGNoYW5naW5nIHRoZSBjb250ZW50LCB0cmFuc2xhdGUgdGhlCnN1Ym1pc3Npb24gdG8gYW55IG1lZGl1bSBvciBmb3JtYXQgZm9yIHRoZSBwdXJwb3NlIG9mIHByZXNlcnZhdGlvbi4KCllvdSBhbHNvIGFncmVlIHRoYXQgVU9CUkVQIG1heSBrZWVwIG1vcmUgdGhhbiBvbmUgY29weSBvZiB0aGlzIHN1Ym1pc3Npb24gZm9yCnB1cnBvc2VzIG9mIHNlY3VyaXR5LCBiYWNrLXVwIGFuZCBwcmVzZXJ2YXRpb24uCgpZb3UgcmVwcmVzZW50IHRoYXQgdGhlIHN1Ym1pc3Npb24gaXMgeW91ciBvcmlnaW5hbCB3b3JrLCBhbmQgdGhhdCB5b3UgaGF2ZQp0aGUgcmlnaHQgdG8gZ3JhbnQgdGhlIHJpZ2h0cyBjb250YWluZWQgaW4gdGhpcyBsaWNlbnNlLiBZb3UgYWxzbyByZXByZXNlbnQKdGhhdCB5b3VyIHN1Ym1pc3Npb24gZG9lcyBub3QsIHRvIHRoZSBiZXN0IG9mIHlvdXIga25vd2xlZGdlLCBpbmZyaW5nZSB1cG9uCmFueW9uZSdzIGNvcHlyaWdodC4KCklmIHRoZSBzdWJtaXNzaW9uIGNvbnRhaW5zIG1hdGVyaWFsIGZvciB3aGljaCB5b3UgZG8gbm90IGhvbGQgY29weXJpZ2h0LAp5b3UgcmVwcmVzZW50IHRoYXQgeW91IGhhdmUgb2J0YWluZWQgdGhlIHVucmVzdHJpY3RlZCBwZXJtaXNzaW9uIG9mIHRoZQpjb3B5cmlnaHQgb3duZXIgdG8gZ3JhbnQgVU9CUkVQIHRoZSByaWdodHMgcmVxdWlyZWQgYnkgdGhpcyBsaWNlbnNlLCBhbmQgdGhhdApzdWNoIHRoaXJkLXBhcnR5IG93bmVkIG1hdGVyaWFsIGlzIGNsZWFybHkgaWRlbnRpZmllZCBhbmQgYWNrbm93bGVkZ2VkCndpdGhpbiB0aGUgdGV4dCBvciBjb250ZW50IG9mIHRoZSBzdWJtaXNzaW9uLgoKSUYgVEhFIFNVQk1JU1NJT04gSVMgQkFTRUQgVVBPTiBXT1JLIFRIQVQgSEFTIEJFRU4gU1BPTlNPUkVEIE9SIFNVUFBPUlRFRApCWSBBTiBBR0VOQ1kgT1IgT1JHQU5JWkFUSU9OIE9USEVSIFRIQU4gVEVTVE9SLCBZT1UgUkVQUkVTRU5UIFRIQVQgWU9VIEhBVkUKRlVMRklMTEVEIEFOWSBSSUdIVCBPRiBSRVZJRVcgT1IgT1RIRVIgT0JMSUdBVElPTlMgUkVRVUlSRUQgQlkgU1VDSApDT05UUkFDVCBPUiBBR1JFRU1FTlQuCgpVT0JSRVAgd2lsbCBjbGVhcmx5IGlkZW50aWZ5IHlvdXIgbmFtZShzKSBhcyB0aGUgYXV0aG9yKHMpIG9yIG93bmVyKHMpIG9mIHRoZQpzdWJtaXNzaW9uLCBhbmQgd2lsbCBub3QgbWFrZSBhbnkgYWx0ZXJhdGlvbiwgb3RoZXIgdGhhbiBhcyBhbGxvd2VkIGJ5IHRoaXMKbGljZW5zZSwgdG8geW91ciBzdWJtaXNzaW9uLgo=
oai:uobrep.openrepository.com:10547/2706432020-04-23T07:36:18Zcom_10547_132192col_10547_132230
Conrad, Marc
c6d205a5c2149a7b0af55b805ff88a6c
600
French, Tim
c94a03e2298573a8e2e93bd5fc65b42a
-1
Huang, Wei
79e77a152c5bf6b8d75438d4d7bfbf33
-1
Maple, Carsten
a4dc0842fb0b0b3b6d15dd203a61bd1f
-1
2013-02-28T14:47:13Z
2013-02-28T14:47:13Z
2006
Conrad, M.; French, T.; Huang, W.; Maple, C.; (2006) A lightweight model of trust propagation in a multi-client network environment: to what extent does experience matter?, Availability, Reliability and Security, ARES 2006, The First International Conference on , pp. 6
0769525679
10.1109/ARES.2006.8
http://hdl.handle.net/10547/270643
The increasing growth in the application of global computing and pervasive systems has necessitated careful consideration of security issues. In particular, there has been a growth in the use of electronic communities, in which there exist many relationships between different entities. Such relationships require establishing trust between entities and a great deal of effort has been expended in developing accurate and reliable models of trust in such multi-client environments. Many of these models are complex and not necessarily guaranteed to give accurate trust predictions. In this paper we present a review of some of these models before proposing a simple, lightweight model for trust. The proposed model does not require the estimation of a large parameter set, nor make great assumptions about the parameters that affect trust.
en
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=1625346
experimentation
multi-client systems
security
A lightweight model of trust propagation in a multi-client network environment: to what extent does experience matter?
Conference papers, meetings and proceedings
The increasing growth in the application of global computing and pervasive systems has necessitated careful consideration of security issues. In particular, there has been a growth in the use of electronic communities, in which there exist many relationships between different entities. Such relationships require establishing trust between entities and a great deal of effort has been expended in developing accurate and reliable models of trust in such multi-client environments. Many of these models are complex and not necessarily guaranteed to give accurate trust predictions. In this paper we present a review of some of these models before proposing a simple, lightweight model for trust. The proposed model does not require the estimation of a large parameter set, nor make great assumptions about the parameters that affect trust.
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/270643/1/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
1
false
10547/270643
oai:uobrep.openrepository.com:10547/270643
2020-04-23 07:36:18.314
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
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
oai:uobrep.openrepository.com:10547/2706442020-04-23T07:29:28Zcom_10547_132192col_10547_132230
Manton, Rob
06ba4ccb4ba9ccf9b3d266251d128240
-1
Maple, Carsten
a4dc0842fb0b0b3b6d15dd203a61bd1f
-1
2013-02-28T14:56:08Z
2013-02-28T14:56:08Z
2006
Manton, R., and Maple, C. (2006) 'A Networked Multi-player Game to Facilitate Pupil to Pupil Contact within the Context of a School Twinning Scheme', in IADIS International Conference e-Society 2006, 13-16 July, Dublin, Ireland
972-8924-16-X
http://hdl.handle.net/10547/270644
There has been a large amount of interest in the potential of computer games in education. While there has been much done on experimental prototypes, there is lit tle work on the application of games to facilitate contact between students in remote schools. Likewise there is little work on the particular constraints caused by the highly controlled school IT environment which make commercial multip layer games unworkable in this context. This paper addresses the nature of these constraints and proposes a prototype solution which will work within that environment.
en
IADIS
http://www.iadis.net/dl/final_uploads/200604S081.pdf
collaborative virtual environment
A networked multi-player game to facilitate pupil to pupil contact within the context of a school twinning scheme
Conference papers, meetings and proceedings
There has been a large amount of interest in the potential of computer games in education. While there has been much done on experimental prototypes, there is lit tle work on the application of games to facilitate contact between students in remote schools. Likewise there is little work on the particular constraints caused by the highly controlled school IT environment which make commercial multip
layer games unworkable in this context.
This paper addresses the nature of these constraints and proposes a prototype solution which will work within that environment.
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/270644/1/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
1
false
10547/270644
oai:uobrep.openrepository.com:10547/270644
2020-04-23 07:29:28.59
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
Tk9OLUVYQ0xVU0lWRSBESVNUUklCVVRJT04gTElDRU5TRQoKQnkgc2lnbmluZyBhbmQgc3VibWl0dGluZyB0aGlzIGxpY2Vuc2UsIHlvdSAodGhlIGF1dGhvcihzKSBvciBjb3B5cmlnaHQKb3duZXIpIGdyYW50cyB0byB0aGUgVW5pdmVyc2l0eSBvZiBCZWRmb3Jkc2hpcmUgUmVwb3NpdG9yeSAgKFVPQlJFUCkgdGhlIG5vbi1leGNsdXNpdmUgcmlnaHQgdG8gcmVwcm9kdWNlLAp0cmFuc2xhdGUgKGFzIGRlZmluZWQgYmVsb3cpLCBhbmQvb3IgZGlzdHJpYnV0ZSB5b3VyIHN1Ym1pc3Npb24gKGluY2x1ZGluZwp0aGUgYWJzdHJhY3QpIHdvcmxkd2lkZSBpbiBwcmludCBhbmQgZWxlY3Ryb25pYyBmb3JtYXQgYW5kIGluIGFueSBtZWRpdW0sCmluY2x1ZGluZyBidXQgbm90IGxpbWl0ZWQgdG8gYXVkaW8gb3IgdmlkZW8uCgpZb3UgYWdyZWUgdGhhdCBVT0JSRVAgbWF5LCB3aXRob3V0IGNoYW5naW5nIHRoZSBjb250ZW50LCB0cmFuc2xhdGUgdGhlCnN1Ym1pc3Npb24gdG8gYW55IG1lZGl1bSBvciBmb3JtYXQgZm9yIHRoZSBwdXJwb3NlIG9mIHByZXNlcnZhdGlvbi4KCllvdSBhbHNvIGFncmVlIHRoYXQgVU9CUkVQIG1heSBrZWVwIG1vcmUgdGhhbiBvbmUgY29weSBvZiB0aGlzIHN1Ym1pc3Npb24gZm9yCnB1cnBvc2VzIG9mIHNlY3VyaXR5LCBiYWNrLXVwIGFuZCBwcmVzZXJ2YXRpb24uCgpZb3UgcmVwcmVzZW50IHRoYXQgdGhlIHN1Ym1pc3Npb24gaXMgeW91ciBvcmlnaW5hbCB3b3JrLCBhbmQgdGhhdCB5b3UgaGF2ZQp0aGUgcmlnaHQgdG8gZ3JhbnQgdGhlIHJpZ2h0cyBjb250YWluZWQgaW4gdGhpcyBsaWNlbnNlLiBZb3UgYWxzbyByZXByZXNlbnQKdGhhdCB5b3VyIHN1Ym1pc3Npb24gZG9lcyBub3QsIHRvIHRoZSBiZXN0IG9mIHlvdXIga25vd2xlZGdlLCBpbmZyaW5nZSB1cG9uCmFueW9uZSdzIGNvcHlyaWdodC4KCklmIHRoZSBzdWJtaXNzaW9uIGNvbnRhaW5zIG1hdGVyaWFsIGZvciB3aGljaCB5b3UgZG8gbm90IGhvbGQgY29weXJpZ2h0LAp5b3UgcmVwcmVzZW50IHRoYXQgeW91IGhhdmUgb2J0YWluZWQgdGhlIHVucmVzdHJpY3RlZCBwZXJtaXNzaW9uIG9mIHRoZQpjb3B5cmlnaHQgb3duZXIgdG8gZ3JhbnQgVU9CUkVQIHRoZSByaWdodHMgcmVxdWlyZWQgYnkgdGhpcyBsaWNlbnNlLCBhbmQgdGhhdApzdWNoIHRoaXJkLXBhcnR5IG93bmVkIG1hdGVyaWFsIGlzIGNsZWFybHkgaWRlbnRpZmllZCBhbmQgYWNrbm93bGVkZ2VkCndpdGhpbiB0aGUgdGV4dCBvciBjb250ZW50IG9mIHRoZSBzdWJtaXNzaW9uLgoKSUYgVEhFIFNVQk1JU1NJT04gSVMgQkFTRUQgVVBPTiBXT1JLIFRIQVQgSEFTIEJFRU4gU1BPTlNPUkVEIE9SIFNVUFBPUlRFRApCWSBBTiBBR0VOQ1kgT1IgT1JHQU5JWkFUSU9OIE9USEVSIFRIQU4gVEVTVE9SLCBZT1UgUkVQUkVTRU5UIFRIQVQgWU9VIEhBVkUKRlVMRklMTEVEIEFOWSBSSUdIVCBPRiBSRVZJRVcgT1IgT1RIRVIgT0JMSUdBVElPTlMgUkVRVUlSRUQgQlkgU1VDSApDT05UUkFDVCBPUiBBR1JFRU1FTlQuCgpVT0JSRVAgd2lsbCBjbGVhcmx5IGlkZW50aWZ5IHlvdXIgbmFtZShzKSBhcyB0aGUgYXV0aG9yKHMpIG9yIG93bmVyKHMpIG9mIHRoZQpzdWJtaXNzaW9uLCBhbmQgd2lsbCBub3QgbWFrZSBhbnkgYWx0ZXJhdGlvbiwgb3RoZXIgdGhhbiBhcyBhbGxvd2VkIGJ5IHRoaXMKbGljZW5zZSwgdG8geW91ciBzdWJtaXNzaW9uLgo=
oai:uobrep.openrepository.com:10547/2707982020-04-23T07:29:28Zcom_10547_132192col_10547_132230
Huang, Wei
79e77a152c5bf6b8d75438d4d7bfbf33
-1
French, Tim
c94a03e2298573a8e2e93bd5fc65b42a
-1
Maple, Carsten
a4dc0842fb0b0b3b6d15dd203a61bd1f
-1
Bessis, Nik
c068e2871d34808e59514ab170e6bb1d
-1
2013-03-01T10:55:36Z
2013-03-01T10:55:36Z
2006
Maple, C., Huang, W., French, T., and Bessis, N. (2006) 'Can intelligent optimisation techniques improve computing job scheduling in a Grid environment? Review, problem and proposal.' Proceedings of the UK e-Science all hand meeting, pp. 328-331
0955398800
http://hdl.handle.net/10547/270798
In the existing Grid scheduling literature, the reported methods and strategies are mostly related to high-level schedulers such as global schedulers, external schedulers, data schedulers, and cluster schedulers. Although a number of these have previously considered job scheduling, thus far only relatively simple queue-based policies such as First In First Out (FIFO) have been considered for local job scheduling within Grid contexts. Our initial research shows that it is worth investigating the potential impact on the performance of the Grid when intelligent optimisation techniques are applied to local scheduling policies. The research problem is defined, and a basic research methodology with a detailed roadmap is presented. This paper forms a proposal with the intention of exchanging ideas and seeking potential collaborators.
en
NeSC
http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.128.3273
http://www.allhands.org.uk/2006/proceedings/
intelligent optimisation
Grid scheduling
Can intelligent optimisation techniques improve computing job scheduling in a Grid environment? review, problem and proposal
Conference papers, meetings and proceedings
In the existing Grid scheduling literature, the reported methods and strategies are mostly related to high-level schedulers such as global schedulers, external schedulers, data schedulers, and cluster schedulers. Although a number of these have previously considered job scheduling, thus far only relatively simple queue-based policies such as First In First Out (FIFO) have been considered for local job scheduling within Grid contexts. Our initial research shows that it is worth investigating the potential impact on the performance of the Grid when intelligent optimisation techniques are applied to local scheduling policies. The research problem is defined, and a basic research methodology with a detailed roadmap is presented. This paper forms a proposal with the intention of exchanging ideas and seeking potential collaborators.
ORIGINAL
596.pdf
596.pdf
Full-text paper
application/pdf
35637
https://uobrep.openrepository.com/bitstream/10547/270798/1/596.pdf
dad84da2484201433fb4c1d675015e7e
MD5
1
true
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/270798/2/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
2
false
CC-LICENSE
license_url
license_url
text/plain
49
https://uobrep.openrepository.com/bitstream/10547/270798/3/license_url
fd26723f8d7edacdb29e3f03465c3b03
MD5
3
false
license_text
license_text
application/octet-stream
0
https://uobrep.openrepository.com/bitstream/10547/270798/5/license_text
d41d8cd98f00b204e9800998ecf8427e
MD5
5
false
license_rdf
license_rdf
application/octet-stream
23599
https://uobrep.openrepository.com/bitstream/10547/270798/4/license_rdf
9e2b7f6edbd693264102b96ece20428a
MD5
4
false
TEXT
596.pdf.txt
596.pdf.txt
Extracted Text
text/plain
17147
https://uobrep.openrepository.com/bitstream/10547/270798/8/596.pdf.txt
5e9930cbcf65fcef5874d8876d0b7157
MD5
8
false
THUMBNAIL
596.pdf.jpg
596.pdf.jpg
Generated Thumbnail
image/jpeg
1950
https://uobrep.openrepository.com/bitstream/10547/270798/7/596.pdf.jpg
cc77fd5e5a98cbe0664d6acfde5e7ab9
MD5
7
false
10547/270798
oai:uobrep.openrepository.com:10547/270798
2020-04-23 07:29:28.719
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
Tk9OLUVYQ0xVU0lWRSBESVNUUklCVVRJT04gTElDRU5TRQoKQnkgc2lnbmluZyBhbmQgc3VibWl0dGluZyB0aGlzIGxpY2Vuc2UsIHlvdSAodGhlIGF1dGhvcihzKSBvciBjb3B5cmlnaHQKb3duZXIpIGdyYW50cyB0byB0aGUgVW5pdmVyc2l0eSBvZiBCZWRmb3Jkc2hpcmUgUmVwb3NpdG9yeSAgKFVPQlJFUCkgdGhlIG5vbi1leGNsdXNpdmUgcmlnaHQgdG8gcmVwcm9kdWNlLAp0cmFuc2xhdGUgKGFzIGRlZmluZWQgYmVsb3cpLCBhbmQvb3IgZGlzdHJpYnV0ZSB5b3VyIHN1Ym1pc3Npb24gKGluY2x1ZGluZwp0aGUgYWJzdHJhY3QpIHdvcmxkd2lkZSBpbiBwcmludCBhbmQgZWxlY3Ryb25pYyBmb3JtYXQgYW5kIGluIGFueSBtZWRpdW0sCmluY2x1ZGluZyBidXQgbm90IGxpbWl0ZWQgdG8gYXVkaW8gb3IgdmlkZW8uCgpZb3UgYWdyZWUgdGhhdCBVT0JSRVAgbWF5LCB3aXRob3V0IGNoYW5naW5nIHRoZSBjb250ZW50LCB0cmFuc2xhdGUgdGhlCnN1Ym1pc3Npb24gdG8gYW55IG1lZGl1bSBvciBmb3JtYXQgZm9yIHRoZSBwdXJwb3NlIG9mIHByZXNlcnZhdGlvbi4KCllvdSBhbHNvIGFncmVlIHRoYXQgVU9CUkVQIG1heSBrZWVwIG1vcmUgdGhhbiBvbmUgY29weSBvZiB0aGlzIHN1Ym1pc3Npb24gZm9yCnB1cnBvc2VzIG9mIHNlY3VyaXR5LCBiYWNrLXVwIGFuZCBwcmVzZXJ2YXRpb24uCgpZb3UgcmVwcmVzZW50IHRoYXQgdGhlIHN1Ym1pc3Npb24gaXMgeW91ciBvcmlnaW5hbCB3b3JrLCBhbmQgdGhhdCB5b3UgaGF2ZQp0aGUgcmlnaHQgdG8gZ3JhbnQgdGhlIHJpZ2h0cyBjb250YWluZWQgaW4gdGhpcyBsaWNlbnNlLiBZb3UgYWxzbyByZXByZXNlbnQKdGhhdCB5b3VyIHN1Ym1pc3Npb24gZG9lcyBub3QsIHRvIHRoZSBiZXN0IG9mIHlvdXIga25vd2xlZGdlLCBpbmZyaW5nZSB1cG9uCmFueW9uZSdzIGNvcHlyaWdodC4KCklmIHRoZSBzdWJtaXNzaW9uIGNvbnRhaW5zIG1hdGVyaWFsIGZvciB3aGljaCB5b3UgZG8gbm90IGhvbGQgY29weXJpZ2h0LAp5b3UgcmVwcmVzZW50IHRoYXQgeW91IGhhdmUgb2J0YWluZWQgdGhlIHVucmVzdHJpY3RlZCBwZXJtaXNzaW9uIG9mIHRoZQpjb3B5cmlnaHQgb3duZXIgdG8gZ3JhbnQgVU9CUkVQIHRoZSByaWdodHMgcmVxdWlyZWQgYnkgdGhpcyBsaWNlbnNlLCBhbmQgdGhhdApzdWNoIHRoaXJkLXBhcnR5IG93bmVkIG1hdGVyaWFsIGlzIGNsZWFybHkgaWRlbnRpZmllZCBhbmQgYWNrbm93bGVkZ2VkCndpdGhpbiB0aGUgdGV4dCBvciBjb250ZW50IG9mIHRoZSBzdWJtaXNzaW9uLgoKSUYgVEhFIFNVQk1JU1NJT04gSVMgQkFTRUQgVVBPTiBXT1JLIFRIQVQgSEFTIEJFRU4gU1BPTlNPUkVEIE9SIFNVUFBPUlRFRApCWSBBTiBBR0VOQ1kgT1IgT1JHQU5JWkFUSU9OIE9USEVSIFRIQU4gVEVTVE9SLCBZT1UgUkVQUkVTRU5UIFRIQVQgWU9VIEhBVkUKRlVMRklMTEVEIEFOWSBSSUdIVCBPRiBSRVZJRVcgT1IgT1RIRVIgT0JMSUdBVElPTlMgUkVRVUlSRUQgQlkgU1VDSApDT05UUkFDVCBPUiBBR1JFRU1FTlQuCgpVT0JSRVAgd2lsbCBjbGVhcmx5IGlkZW50aWZ5IHlvdXIgbmFtZShzKSBhcyB0aGUgYXV0aG9yKHMpIG9yIG93bmVyKHMpIG9mIHRoZQpzdWJtaXNzaW9uLCBhbmQgd2lsbCBub3QgbWFrZSBhbnkgYWx0ZXJhdGlvbiwgb3RoZXIgdGhhbiBhcyBhbGxvd2VkIGJ5IHRoaXMKbGljZW5zZSwgdG8geW91ciBzdWJtaXNzaW9uLgo=
oai:uobrep.openrepository.com:10547/2709142020-04-23T07:35:30Zcom_10547_132192col_10547_132230
Maple, Carsten
a4dc0842fb0b0b3b6d15dd203a61bd1f
-1
Norrington, Peter
7ce7c420f60a4d00ea0ea558e4950764
600
2013-03-04T12:07:29Z
2013-03-04T12:07:29Z
2006
Maple, C., and Norrington, P. (2006) “The Usability and Practicality of Biometric Authentication in the Workplace”, in First International Conference on Availability, Reliability and Security (ARES06), Vienna University of Technology, pp. 958-964.
0769525679
10.1109/ARES.2006.133
http://hdl.handle.net/10547/270914
This paper discusses usability and practicality issues for authentication systems based on biometrics. The effectiveness of a system incorporating an authentication method depends not only on theoretical and technological issues, but also on user interaction with and practical implementation of the system by an organisation. It is becoming increasingly common that IT and physical security are converging, especially in the workplace. This has significant ramifications for the workforce and operational matters. In this paper we pay particular attention to the potential issues that arise when companies introduce biometrics for IT or physical security and provide recommendations that help ensure a usable and practical implementation of the technology.
en
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=1625410
authentication
biometrics
computer security
The usability and practicality of biometric authentication in the workplace
Conference papers, meetings and proceedings
This paper discusses usability and practicality issues for authentication systems based on biometrics. The effectiveness of a system incorporating an authentication method depends not only on theoretical and technological issues, but also on user interaction with and practical implementation of the system by an organisation. It is becoming increasingly common that IT and physical security are converging, especially in the workplace. This has significant ramifications for the workforce and operational matters. In this paper we pay particular attention to the potential issues that arise when companies introduce biometrics for IT or physical security and provide recommendations that help ensure a usable and practical implementation of the technology.
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/270914/1/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
1
false
10547/270914
oai:uobrep.openrepository.com:10547/270914
2020-04-23 07:35:30.537
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
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
oai:uobrep.openrepository.com:10547/2708952020-04-23T07:29:29Zcom_10547_132192col_10547_132230
Sant, Paul
4d523c3c21b077623d507fc78147194c
-1
Maple, Carsten
a4dc0842fb0b0b3b6d15dd203a61bd1f
-1
2013-03-04T12:12:42Z
2013-03-04T12:12:42Z
2006
Sant, P., and Maple, C. (2006) “A Graph Theoretic Framework for Trust - From Local to Global”, in 10th International Conference on Information Visualisation, London (IV06), UK; pp. 497-503
1550-6037
10.1109/IV.2006.9
http://hdl.handle.net/10547/270895
Traditional approaches to trust, be it in agent-based societies, or within a more theoretical framework often consider trust to be a local phenomenon. Here we propose that trust should be viewed from a global perspective. Our motivation is the area of pervasive computing although we believe that our formal framework applies in many domains. Here we present our framework and formalize it in the form of graph theory. We present some open problems and discuss the wider application of our work.
en
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=1648305
graph theory
trust management
trust
A graph theoretic framework for trust - from local to global
Conference papers, meetings and proceedings
Traditional approaches to trust, be it in agent-based societies, or within a more theoretical framework often consider trust to be a local phenomenon. Here we propose that trust should be viewed from a global perspective. Our motivation is the area of pervasive computing although we believe that our formal framework applies in many domains. Here we present our framework and formalize it in the form of graph theory. We present some open problems and discuss the wider application of our work.
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/270895/1/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
1
false
10547/270895
oai:uobrep.openrepository.com:10547/270895
2020-04-23 07:29:29.212
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
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
oai:uobrep.openrepository.com:10547/2707992020-04-23T07:29:28Zcom_10547_132192col_10547_132230
Maple, Carsten
a4dc0842fb0b0b3b6d15dd203a61bd1f
-1
Schetinin, Vitaly
138e76ce1f24a43b1907441d43d207cb
-1
2013-03-01T11:02:23Z
2013-03-01T11:02:23Z
2006
Maple, C. and Schetinin, V.; (2006) 'Using a Bayesian averaging model for estimating the reliability of decisions in multimodal biometrics', Availability, Reliability and Security, ARES 2006. The First International Conference on , pp. 7
0769525679
10.1109/ARES.2006.141
http://hdl.handle.net/10547/270799
The issue of reliable authentication is of increasing importance in modern society. Corporations, businesses and individuals often wish to restrict access to logical or physical resources to those with relevant privileges. A popular method for authentication is the use of biometric data, but the uncertainty that arises due to the lack of uniqueness in biometrics has lead there to be a great deal of effort invested into multimodal biometrics. These multimodal biometric systems can give rise to large, distributed data sets that are used to decide the authenticity of a user. Bayesian model averaging (BMA) methodology has been used to allow experts to evaluate the reliability of decisions made in data mining applications. The use of decision tree (DT) models within the BMA methodology gives experts additional information on how decisions are made. In this paper we discuss how DT models within the BMA methodology can be used for authentication in multimodal biometric systems.
en
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=1625407
Bayes procedure
multimodal biometrics
biometrics
Using a Bayesian averaging model for estimating the reliability of decisions in multimodal biometrics
Conference papers, meetings and proceedings
The issue of reliable authentication is of increasing importance in modern society. Corporations, businesses and individuals often wish to restrict access to logical or physical resources to those with relevant privileges. A popular method for authentication is the use of biometric data, but the uncertainty that arises due to the lack of uniqueness in biometrics has lead there to be a great deal of effort invested into multimodal biometrics. These multimodal biometric systems can give rise to large, distributed data sets that are used to decide the authenticity of a user. Bayesian model averaging (BMA) methodology has been used to allow experts to evaluate the reliability of decisions made in data mining applications. The use of decision tree (DT) models within the BMA methodology gives experts additional information on how decisions are made. In this paper we discuss how DT models within the BMA methodology can be used for authentication in multimodal biometric systems.
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/270799/1/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
1
false
ORIGINAL
01625407.pdf
01625407.pdf
application/pdf
202258
https://uobrep.openrepository.com/bitstream/10547/270799/2/01625407.pdf
ee029be834ee36aab4812f685723a169
MD5
2
true
CC-LICENSE
license_url
license_url
text/plain
49
https://uobrep.openrepository.com/bitstream/10547/270799/3/license_url
fd26723f8d7edacdb29e3f03465c3b03
MD5
3
false
license_text
license_text
application/octet-stream
0
https://uobrep.openrepository.com/bitstream/10547/270799/5/license_text
d41d8cd98f00b204e9800998ecf8427e
MD5
5
false
license_rdf
license_rdf
application/octet-stream
23599
https://uobrep.openrepository.com/bitstream/10547/270799/4/license_rdf
9e2b7f6edbd693264102b96ece20428a
MD5
4
false
TEXT
01625407.pdf.txt
01625407.pdf.txt
Extracted Text
text/plain
37221
https://uobrep.openrepository.com/bitstream/10547/270799/8/01625407.pdf.txt
bf424f1e8fab161e29301dcc6c1146c1
MD5
8
false
THUMBNAIL
01625407.pdf.jpg
01625407.pdf.jpg
Generated Thumbnail
image/jpeg
2412
https://uobrep.openrepository.com/bitstream/10547/270799/7/01625407.pdf.jpg
b9fbaf164c675e970198673322aadc3a
MD5
7
false
10547/270799
oai:uobrep.openrepository.com:10547/270799
2020-04-23 07:29:28.825
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
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
oai:uobrep.openrepository.com:10547/2708932020-04-23T07:29:28Zcom_10547_132192col_10547_132230
Maple, Carsten
a4dc0842fb0b0b3b6d15dd203a61bd1f
-1
Jacobs, Helen
43377247f0f0a484c608a22f3841eb15
-1
Reeve, Matthew
50c174deaf0223f9e80ef19030a587a5
-1
2013-03-04T12:02:57Z
2013-03-04T12:02:57Z
2006
Maple, C., Jacobs, H., and Reeve, M.(2006) “Awareness of Wireless Security by Home and Business Users”, in IADIS International Conference e-Society, pp 468-476
972892416X
http://hdl.handle.net/10547/270893
There has been rapid increase in the popularity of wireless networks in both the home and the small office environment. However, with the convenience wireless networking brings there is also an added risk in terms of security. From surveys conducted in a number of countries, it appears there is still lack of awareness of the need for securing wireless networks and the level of security provided by the different wire less encryption protocols. With increasing quantities of e-Government services being available online, such as income tax returns, car registration and health-related services, it is important that the public are aware of the risks of submitting personal information on unsecured or weakly secured networks. This paper highlights the types of wireless encryption protocols available,the cost of using these protocols and provides recommendation for home and business users when us ing e-Government services.
en
IADIS
http://www.iadis.net/dl/final_uploads/200604F060.pdf
WLAN
WEP
security
WPA
wireless networks
computer security
Awareness of wireless security by home and business users
Conference papers, meetings and proceedings
There has been rapid increase in the popularity of wireless networks in both the home and
the small office environment. However, with the convenience wireless networking brings there is also an added risk in terms of security. From surveys conducted in a number of countries, it appears there is still lack of awareness of the need for securing wireless networks and the level of security provided by the different wire
less encryption protocols. With increasing quantities of e-Government services being available online, such as income tax returns, car registration and health-related services, it is
important that the public are aware of the risks of submitting personal information on unsecured or weakly secured networks. This paper highlights the types of wireless encryption protocols available,the cost of using these protocols and
provides recommendation for home and business users when us ing e-Government services.
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/270893/1/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
1
false
10547/270893
oai:uobrep.openrepository.com:10547/270893
2020-04-23 07:29:28.937
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
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
oai:uobrep.openrepository.com:10547/2708942020-04-23T07:29:29Zcom_10547_132192col_10547_132230
Maple, Carsten
a4dc0842fb0b0b3b6d15dd203a61bd1f
-1
Jacobs, Helen
43377247f0f0a484c608a22f3841eb15
-1
Reeve, Matthew
50c174deaf0223f9e80ef19030a587a5
-1
2013-03-04T12:08:43Z
2013-03-04T12:08:43Z
2006
Maple, C., Jacobs, H., and Reeve, M. (2006) “Choosing the Right Wireless LAN Security Protocol for the Home and Business User”, in First International Conference on Availability, Reliability and Security (ARES06), Vienna University of Technology, pp. 1025-1032.
0769525679
10.1109/ARES.2006.42
http://hdl.handle.net/10547/270894
The introduction and evolution of security standards for wireless networking has been a problematic process. Flaws in the initial security standard resulted in quick-fix solutions and interoperability issues. As wireless networks are not confined to a building, there is an added security risk that radio signals can be detected externally. Wireless networking has rapidly increased in popularity over the last few years due to the flexibility it provides. Given the simultaneous growth of e-government services there is particular risk to the citizen of identity theft. This article discusses the progression of wireless security protocols since their introduction and the effect this has had on home and business users. The risks of using wireless networks are outlined in the paper and recommendations for securing wireless networks are reviewed.
en
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=1625420
TKIP
WEP
WLAN
computer security
wireless networks
Choosing the right wireless LAN security protocol for the home and business user
Conference papers, meetings and proceedings
The introduction and evolution of security standards for wireless networking has been a problematic process. Flaws in the initial security standard resulted in quick-fix solutions and interoperability issues. As wireless networks are not confined to a building, there is an added security risk that radio signals can be detected externally. Wireless networking has rapidly increased in popularity over the last few years due to the flexibility it provides. Given the simultaneous growth of e-government services there is particular risk to the citizen of identity theft. This article discusses the progression of wireless security protocols since their introduction and the effect this has had on home and business users. The risks of using wireless networks are outlined in the paper and recommendations for securing wireless networks are reviewed.
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/270894/1/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
1
false
10547/270894
oai:uobrep.openrepository.com:10547/270894
2020-04-23 07:29:29.112
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
Tk9OLUVYQ0xVU0lWRSBESVNUUklCVVRJT04gTElDRU5TRQoKQnkgc2lnbmluZyBhbmQgc3VibWl0dGluZyB0aGlzIGxpY2Vuc2UsIHlvdSAodGhlIGF1dGhvcihzKSBvciBjb3B5cmlnaHQKb3duZXIpIGdyYW50cyB0byB0aGUgVW5pdmVyc2l0eSBvZiBCZWRmb3Jkc2hpcmUgUmVwb3NpdG9yeSAgKFVPQlJFUCkgdGhlIG5vbi1leGNsdXNpdmUgcmlnaHQgdG8gcmVwcm9kdWNlLAp0cmFuc2xhdGUgKGFzIGRlZmluZWQgYmVsb3cpLCBhbmQvb3IgZGlzdHJpYnV0ZSB5b3VyIHN1Ym1pc3Npb24gKGluY2x1ZGluZwp0aGUgYWJzdHJhY3QpIHdvcmxkd2lkZSBpbiBwcmludCBhbmQgZWxlY3Ryb25pYyBmb3JtYXQgYW5kIGluIGFueSBtZWRpdW0sCmluY2x1ZGluZyBidXQgbm90IGxpbWl0ZWQgdG8gYXVkaW8gb3IgdmlkZW8uCgpZb3UgYWdyZWUgdGhhdCBVT0JSRVAgbWF5LCB3aXRob3V0IGNoYW5naW5nIHRoZSBjb250ZW50LCB0cmFuc2xhdGUgdGhlCnN1Ym1pc3Npb24gdG8gYW55IG1lZGl1bSBvciBmb3JtYXQgZm9yIHRoZSBwdXJwb3NlIG9mIHByZXNlcnZhdGlvbi4KCllvdSBhbHNvIGFncmVlIHRoYXQgVU9CUkVQIG1heSBrZWVwIG1vcmUgdGhhbiBvbmUgY29weSBvZiB0aGlzIHN1Ym1pc3Npb24gZm9yCnB1cnBvc2VzIG9mIHNlY3VyaXR5LCBiYWNrLXVwIGFuZCBwcmVzZXJ2YXRpb24uCgpZb3UgcmVwcmVzZW50IHRoYXQgdGhlIHN1Ym1pc3Npb24gaXMgeW91ciBvcmlnaW5hbCB3b3JrLCBhbmQgdGhhdCB5b3UgaGF2ZQp0aGUgcmlnaHQgdG8gZ3JhbnQgdGhlIHJpZ2h0cyBjb250YWluZWQgaW4gdGhpcyBsaWNlbnNlLiBZb3UgYWxzbyByZXByZXNlbnQKdGhhdCB5b3VyIHN1Ym1pc3Npb24gZG9lcyBub3QsIHRvIHRoZSBiZXN0IG9mIHlvdXIga25vd2xlZGdlLCBpbmZyaW5nZSB1cG9uCmFueW9uZSdzIGNvcHlyaWdodC4KCklmIHRoZSBzdWJtaXNzaW9uIGNvbnRhaW5zIG1hdGVyaWFsIGZvciB3aGljaCB5b3UgZG8gbm90IGhvbGQgY29weXJpZ2h0LAp5b3UgcmVwcmVzZW50IHRoYXQgeW91IGhhdmUgb2J0YWluZWQgdGhlIHVucmVzdHJpY3RlZCBwZXJtaXNzaW9uIG9mIHRoZQpjb3B5cmlnaHQgb3duZXIgdG8gZ3JhbnQgVU9CUkVQIHRoZSByaWdodHMgcmVxdWlyZWQgYnkgdGhpcyBsaWNlbnNlLCBhbmQgdGhhdApzdWNoIHRoaXJkLXBhcnR5IG93bmVkIG1hdGVyaWFsIGlzIGNsZWFybHkgaWRlbnRpZmllZCBhbmQgYWNrbm93bGVkZ2VkCndpdGhpbiB0aGUgdGV4dCBvciBjb250ZW50IG9mIHRoZSBzdWJtaXNzaW9uLgoKSUYgVEhFIFNVQk1JU1NJT04gSVMgQkFTRUQgVVBPTiBXT1JLIFRIQVQgSEFTIEJFRU4gU1BPTlNPUkVEIE9SIFNVUFBPUlRFRApCWSBBTiBBR0VOQ1kgT1IgT1JHQU5JWkFUSU9OIE9USEVSIFRIQU4gVEVTVE9SLCBZT1UgUkVQUkVTRU5UIFRIQVQgWU9VIEhBVkUKRlVMRklMTEVEIEFOWSBSSUdIVCBPRiBSRVZJRVcgT1IgT1RIRVIgT0JMSUdBVElPTlMgUkVRVUlSRUQgQlkgU1VDSApDT05UUkFDVCBPUiBBR1JFRU1FTlQuCgpVT0JSRVAgd2lsbCBjbGVhcmx5IGlkZW50aWZ5IHlvdXIgbmFtZShzKSBhcyB0aGUgYXV0aG9yKHMpIG9yIG93bmVyKHMpIG9mIHRoZQpzdWJtaXNzaW9uLCBhbmQgd2lsbCBub3QgbWFrZSBhbnkgYWx0ZXJhdGlvbiwgb3RoZXIgdGhhbiBhcyBhbGxvd2VkIGJ5IHRoaXMKbGljZW5zZSwgdG8geW91ciBzdWJtaXNzaW9uLgo=
oai:uobrep.openrepository.com:10547/2709152020-04-23T07:35:30Zcom_10547_132192col_10547_132230
Norrington, Peter
7ce7c420f60a4d00ea0ea558e4950764
600
Maple, Carsten
a4dc0842fb0b0b3b6d15dd203a61bd1f
-1
2013-03-04T12:10:42Z
2013-03-04T12:10:42Z
2006
Norrington, P., and Maple, C. (2006) “Extending e-Government to e-Society: Usability Lessons from the UK ID Card Trial”, in IADIS International Conference e-Society, Dublin, Ireland, pp.296-304
972892416X
http://hdl.handle.net/10547/270915
The United Kingdom’s Government is embarking on an ambitious project to issue 60 million citizens with a biometric identity card. The card is intended not only to provide identity checking for access to public sector services but also for private sector ones, creating a gold standard identity document for both physical and online authentication. Whilst the many technological, legal and social issues of biometric systems are widely covered, little direct evaluation of usability issues appears in academic literature. We present unique first-hand evidence concerning the usability difficulties of biometric systems, evaluating this and making recommendations on the impact usability should have on the design, implementation and accreditation of biometric identity systems which employ the Identity Card Scheme in the private sector.
en
IADIS
http://www.iadis.net/dl/final_uploads/200604F038.pdf
identity cards
biometrics
authentication
Extending e-government to e-society: usability lessons from the UK ID Card Trial
Conference papers, meetings and proceedings
The United Kingdom’s Government is embarking on an ambitious project to issue 60 million citizens with a biometric identity card. The card is intended not only to provide identity checking for access to public sector services but also for
private sector ones, creating a gold standard identity document for both physical and online authentication. Whilst the many technological, legal and social issues of biometric systems are widely covered, little direct evaluation of usability
issues appears in academic literature. We present unique first-hand evidence concerning the usability difficulties of biometric systems, evaluating this and making recommendations on the impact usability should have on the design, implementation and accreditation of biometric identity systems which employ the Identity Card Scheme in the private sector.
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/270915/1/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
1
false
10547/270915
oai:uobrep.openrepository.com:10547/270915
2020-04-23 07:35:30.422
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
Tk9OLUVYQ0xVU0lWRSBESVNUUklCVVRJT04gTElDRU5TRQoKQnkgc2lnbmluZyBhbmQgc3VibWl0dGluZyB0aGlzIGxpY2Vuc2UsIHlvdSAodGhlIGF1dGhvcihzKSBvciBjb3B5cmlnaHQKb3duZXIpIGdyYW50cyB0byB0aGUgVW5pdmVyc2l0eSBvZiBCZWRmb3Jkc2hpcmUgUmVwb3NpdG9yeSAgKFVPQlJFUCkgdGhlIG5vbi1leGNsdXNpdmUgcmlnaHQgdG8gcmVwcm9kdWNlLAp0cmFuc2xhdGUgKGFzIGRlZmluZWQgYmVsb3cpLCBhbmQvb3IgZGlzdHJpYnV0ZSB5b3VyIHN1Ym1pc3Npb24gKGluY2x1ZGluZwp0aGUgYWJzdHJhY3QpIHdvcmxkd2lkZSBpbiBwcmludCBhbmQgZWxlY3Ryb25pYyBmb3JtYXQgYW5kIGluIGFueSBtZWRpdW0sCmluY2x1ZGluZyBidXQgbm90IGxpbWl0ZWQgdG8gYXVkaW8gb3IgdmlkZW8uCgpZb3UgYWdyZWUgdGhhdCBVT0JSRVAgbWF5LCB3aXRob3V0IGNoYW5naW5nIHRoZSBjb250ZW50LCB0cmFuc2xhdGUgdGhlCnN1Ym1pc3Npb24gdG8gYW55IG1lZGl1bSBvciBmb3JtYXQgZm9yIHRoZSBwdXJwb3NlIG9mIHByZXNlcnZhdGlvbi4KCllvdSBhbHNvIGFncmVlIHRoYXQgVU9CUkVQIG1heSBrZWVwIG1vcmUgdGhhbiBvbmUgY29weSBvZiB0aGlzIHN1Ym1pc3Npb24gZm9yCnB1cnBvc2VzIG9mIHNlY3VyaXR5LCBiYWNrLXVwIGFuZCBwcmVzZXJ2YXRpb24uCgpZb3UgcmVwcmVzZW50IHRoYXQgdGhlIHN1Ym1pc3Npb24gaXMgeW91ciBvcmlnaW5hbCB3b3JrLCBhbmQgdGhhdCB5b3UgaGF2ZQp0aGUgcmlnaHQgdG8gZ3JhbnQgdGhlIHJpZ2h0cyBjb250YWluZWQgaW4gdGhpcyBsaWNlbnNlLiBZb3UgYWxzbyByZXByZXNlbnQKdGhhdCB5b3VyIHN1Ym1pc3Npb24gZG9lcyBub3QsIHRvIHRoZSBiZXN0IG9mIHlvdXIga25vd2xlZGdlLCBpbmZyaW5nZSB1cG9uCmFueW9uZSdzIGNvcHlyaWdodC4KCklmIHRoZSBzdWJtaXNzaW9uIGNvbnRhaW5zIG1hdGVyaWFsIGZvciB3aGljaCB5b3UgZG8gbm90IGhvbGQgY29weXJpZ2h0LAp5b3UgcmVwcmVzZW50IHRoYXQgeW91IGhhdmUgb2J0YWluZWQgdGhlIHVucmVzdHJpY3RlZCBwZXJtaXNzaW9uIG9mIHRoZQpjb3B5cmlnaHQgb3duZXIgdG8gZ3JhbnQgVU9CUkVQIHRoZSByaWdodHMgcmVxdWlyZWQgYnkgdGhpcyBsaWNlbnNlLCBhbmQgdGhhdApzdWNoIHRoaXJkLXBhcnR5IG93bmVkIG1hdGVyaWFsIGlzIGNsZWFybHkgaWRlbnRpZmllZCBhbmQgYWNrbm93bGVkZ2VkCndpdGhpbiB0aGUgdGV4dCBvciBjb250ZW50IG9mIHRoZSBzdWJtaXNzaW9uLgoKSUYgVEhFIFNVQk1JU1NJT04gSVMgQkFTRUQgVVBPTiBXT1JLIFRIQVQgSEFTIEJFRU4gU1BPTlNPUkVEIE9SIFNVUFBPUlRFRApCWSBBTiBBR0VOQ1kgT1IgT1JHQU5JWkFUSU9OIE9USEVSIFRIQU4gVEVTVE9SLCBZT1UgUkVQUkVTRU5UIFRIQVQgWU9VIEhBVkUKRlVMRklMTEVEIEFOWSBSSUdIVCBPRiBSRVZJRVcgT1IgT1RIRVIgT0JMSUdBVElPTlMgUkVRVUlSRUQgQlkgU1VDSApDT05UUkFDVCBPUiBBR1JFRU1FTlQuCgpVT0JSRVAgd2lsbCBjbGVhcmx5IGlkZW50aWZ5IHlvdXIgbmFtZShzKSBhcyB0aGUgYXV0aG9yKHMpIG9yIG93bmVyKHMpIG9mIHRoZQpzdWJtaXNzaW9uLCBhbmQgd2lsbCBub3QgbWFrZSBhbnkgYWx0ZXJhdGlvbiwgb3RoZXIgdGhhbiBhcyBhbGxvd2VkIGJ5IHRoaXMKbGljZW5zZSwgdG8geW91ciBzdWJtaXNzaW9uLgo=
oai:uobrep.openrepository.com:10547/2709162020-04-23T07:29:29Zcom_10547_132192col_10547_132230
Vinod, Prasad
4fa6fbe09d36e58881faeefc8c16ece7
-1
Pushpa, Suri
65e4c6b3f501d72c1eeeb09648ca8852
-1
Maple, Carsten
a4dc0842fb0b0b3b6d15dd203a61bd1f
-1
2013-03-04T12:26:03Z
2013-03-04T12:26:03Z
2006
Vinod, P., Pushpa, S., and Maple, C. “Maintaining a Random Binary Search Tree Dynamically”, in 10th International Conference on Information Visualisation, London (IV06), UK; pp. 483-488
1550-6037
10.1109/IV.2006.72
http://hdl.handle.net/10547/270916
Binary tree is a graph, without cycle, that is frequently used in computer science for fast data access and retrieval. To ensure faster insertion and deletion, the tree height has to be kept to a minimum. A random tree starts losing its randomness after a series of insertions and deletions and, in the worst case, a tree with n nodes, could grow up to the height of n - 1. In this paper, we present modified insertion and deletion algorithms to maintain the tree in better shape dynamically. Without applying any complex rebalancing technique, or using considerable amount of space, both algorithms maintain the tree in such a way that even a series of insertions and asymmetric deletions do not cause the tree to grow beyond n/2. A comparative study of traditional and modified insert algorithms shows that for random input, the modified insert algorithm produces a tree with 20% to 30% reduction in height, forcing the average number of comparisons required for a successful search to go down by 15% to 20%.
en
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=1648303
graph theory
Maintaining a random binary search tree dynamically
Conference papers, meetings and proceedings
Binary tree is a graph, without cycle, that is frequently used in computer science for fast data access and retrieval. To ensure faster insertion and deletion, the tree height has to be kept to a minimum. A random tree starts losing its randomness after a series of insertions and deletions and, in the worst case, a tree with n nodes, could grow up to the height of n - 1. In this paper, we present modified insertion and deletion algorithms to maintain the tree in better shape dynamically. Without applying any complex rebalancing technique, or using considerable amount of space, both algorithms maintain the tree in such a way that even a series of insertions and asymmetric deletions do not cause the tree to grow beyond n/2. A comparative study of traditional and modified insert algorithms shows that for random input, the modified insert algorithm produces a tree with 20% to 30% reduction in height, forcing the average number of comparisons required for a successful search to go down by 15% to 20%.
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/270916/1/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
1
false
10547/270916
oai:uobrep.openrepository.com:10547/270916
2020-04-23 07:29:29.301
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
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
oai:uobrep.openrepository.com:10547/2791782020-04-23T08:42:55Zcom_10547_132192col_10547_132230
Chernov, Alexey
743c83d2a78e4fdbcffc55fb8709dc02
-1
Kalnishkan, Yuri
a7f27d56b334cea851a638e398b48d5d
-1
Zhdanov, Fedor
c22ddfbfd3ef62ce1d516a0bc7d3a637
-1
Vovk, Vladimir
cdd2842a701f4e755cc4ae1961a38520
-1
2013-04-07T16:46:49Z
2013-04-07T16:46:49Z
2010
Chernov, A., Kalnishkan, Y., Zhdanov, F. and Vovk, V., (2010) 'Supermartingales in prediction with expert advice' 411 (29-30):2647-2669 Theoretical Computer Science
0304-3975
10.1016/j.tcs.2010.04.003
http://hdl.handle.net/10547/279178
Theoretical Computer Science
The paper applies the method of defensive forecasting, based on the use of game-theoretic supermartingales, to prediction with expert advice. In the traditional setting of a countable number of experts and a finite number of outcomes, the Defensive Forecasting Algorithm is very close to the well-known Aggregating Algorithm. Not only the performance guarantees but also the predictions are the same for these two methods of fundamentally different nature. The paper also discusses a new setting where the experts can give advice conditional on the learner's future decision. Both the algorithms can be adapted to the new setting and give the same performance guarantees as in the traditional setting. Finally, an application of defensive forecasting to a setting with several loss functions is outlined.
en
Elsevier
http://linkinghub.elsevier.com/retrieve/pii/S0304397510001982
Archived with thanks to Theoretical Computer Science
Supermartingales in prediction with expert advice
Article
The paper applies the method of defensive forecasting, based on the use of game-theoretic supermartingales, to prediction with expert advice. In the traditional setting of a countable number of experts and a finite number of outcomes, the Defensive Forecasting Algorithm is very close to the well-known Aggregating Algorithm. Not only the performance guarantees but also the predictions are the same for these two methods of fundamentally different nature. The paper also discusses a new setting where the experts can give advice conditional on the learner's future decision. Both the algorithms can be adapted to the new setting and give the same performance guarantees as in the traditional setting. Finally, an application of defensive forecasting to a setting with several loss functions is outlined.
THUMBNAIL
elsevier-thumbnail.png
application/octet-stream
119225
https://uobrep.openrepository.com/bitstream/10547/279178/2/elsevier-thumbnail.png
0c7be26a5547d172d6afa7dfe0bbd324
MD5
2
false
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/279178/1/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
1
false
10547/279178
oai:uobrep.openrepository.com:10547/279178
2020-04-23 08:42:55.03
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
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
oai:uobrep.openrepository.com:10547/2791772020-04-23T07:29:33Zcom_10547_132192col_10547_132230
Chernov, Alexey
743c83d2a78e4fdbcffc55fb8709dc02
-1
Vovk, Vladimir
cdd2842a701f4e755cc4ae1961a38520
-1
2013-04-07T16:46:12Z
2013-04-07T16:46:12Z
2010
Chernov, A. and Vovk, V. (2010) Prediction with Advice of Unknown Number of Experts.
http://hdl.handle.net/10547/279177
In the framework of prediction with expert advice, we consider a recently introduced kind of regret bounds: the bounds that depend on the effective instead of nominal number of experts. In contrast to the NormalHedge bound, which mainly depends on the effective number of experts and also weakly depends on the nominal one, we obtain a bound that does not contain the nominal number of experts at all. We use the defensive forecasting method and introduce an application of defensive forecasting to multivalued supermartingales.
en
http://event.cwi.nl/uai2010/papers/UAI2010_0203.pdf
Prediction with advice of unknown number of experts
Working Paper
In the framework of prediction with expert advice, we consider a recently introduced kind of regret bounds: the bounds that depend on the effective instead of nominal number of experts. In contrast to the NormalHedge bound, which mainly depends on the effective number of experts and also weakly depends on the nominal one, we obtain a bound that does not contain the nominal number of experts at all. We use the defensive forecasting method and introduce an application of defensive forecasting to multivalued supermartingales.
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/279177/1/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
1
false
10547/279177
oai:uobrep.openrepository.com:10547/279177
2020-04-23 07:29:33.405
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
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
oai:uobrep.openrepository.com:10547/2791792020-04-23T07:29:33Zcom_10547_132192col_10547_132230
Chernov, Alexey
743c83d2a78e4fdbcffc55fb8709dc02
-1
Zhdanov, Fedor
c22ddfbfd3ef62ce1d516a0bc7d3a637
-1
2013-04-07T16:47:36Z
2013-04-07T16:47:36Z
2010
Chernov, A. and Zhdanov. F. (2010) ' Prediction with Expert Advice under Discounted Loss' in Algorithmic Learning Theory, proceeding of the 21st International Conference, ALT 2010, vol. 6331: 255-269
978-3-642-16107-0
0302-9743
10.1007/978-3-642-16108-7_22
http://hdl.handle.net/10547/279179
Algorithmic Learning Theory
We study prediction with expert advice in the setting where the losses are accumulated with some discounting and the impact of old losses can gradually vanish. We generalize the Aggregating Algorithm and the Aggregating Algorithm for Regression, propose a new variant of exponentially weighted average algorithm, and prove bounds on the cumulative discounted loss
en
Springer
http://link.springer.com/chapter/10.1007%2F978-3-642-16108-7_22
Prediction with expert advice under discounted loss
Conference papers, meetings and proceedings
We study prediction with expert advice in the setting where the losses are accumulated with some discounting and the impact of old losses can gradually vanish. We generalize the Aggregating Algorithm and the Aggregating Algorithm for Regression, propose a new variant of exponentially weighted average algorithm, and prove bounds on the cumulative discounted loss
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/279179/1/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
1
false
10547/279179
oai:uobrep.openrepository.com:10547/279179
2020-04-23 07:29:33.508
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
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
oai:uobrep.openrepository.com:10547/2791802020-04-23T07:29:33Zcom_10547_132192col_10547_132230
Chernov, Alexey
743c83d2a78e4fdbcffc55fb8709dc02
-1
Vovk, Vladimir
cdd2842a701f4e755cc4ae1961a38520
-1
2013-04-07T16:48:40Z
2013-04-07T16:48:40Z
2009
Chernov. A. and Vovk, V., (2009) 'Prediction with Expert Evaluators’ Advice' in Algorithmic Learning Theory, proceedings of the 20th International Conference, ALT 2009, vol. 5809: 8-22
9783642044137
10.1007/978-3-642-04414-4_6
http://hdl.handle.net/10547/279180
Algorithmic Learning Theory
We introduce a new protocol for prediction with expert advice in which each expert evaluates the learner’s and his own performance using a loss function that may change over time and may be different from the loss functions used by the other experts. The learner’s goal is to perform better or not much worse than each expert, as evaluated by that expert, for all experts simultaneously. If the loss functions used by the experts are all proper scoring rules and all mixable, we show that the defensive forecasting algorithm enjoys the same performance guarantee as that attainable by the Aggregating Algorithm in the standard setting and known to be optimal. This result is also applied to the case of “specialist” experts. In this case, the defensive forecasting algorithm reduces to a simple modification of the Aggregating Algorithm.
en
Springer
http://link.springer.com/chapter/10.1007%2F978-3-642-04414-4_6?LI=true
Prediction with expert evaluators’ advice
Conference papers, meetings and proceedings
We introduce a new protocol for prediction with expert advice in which each expert evaluates the learner’s and his own performance using a loss function that may change over time and may be different from the loss functions used by the other experts. The learner’s goal is to perform better or not much worse than each expert, as evaluated by that expert, for all experts simultaneously. If the loss functions used by the experts are all proper scoring rules and all mixable, we show that the defensive forecasting algorithm enjoys the same performance guarantee as that attainable by the Aggregating Algorithm in the standard setting and known to be optimal. This result is also applied to the case of “specialist” experts. In this case, the defensive forecasting algorithm reduces to a simple modification of the Aggregating Algorithm.
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/279180/1/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
1
false
10547/279180
oai:uobrep.openrepository.com:10547/279180
2020-04-23 07:29:33.569
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
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
oai:uobrep.openrepository.com:10547/2791812020-04-23T07:29:33Zcom_10547_132192col_10547_132230
Chernov, Alexey
743c83d2a78e4fdbcffc55fb8709dc02
-1
Shen, Alexander
48bfa657fec89facf3371db7b47b4085
-1
Vereshchagin, Nikolai
d868e33cc7b33aa0aae60ddd411f30c5
-1
Vovk, Vladimir
cdd2842a701f4e755cc4ae1961a38520
-1
2013-04-07T16:51:53Z
2013-04-07T16:51:53Z
2008
Chernov, A., Shen, A., Vereshchagin, N. and Vovk , V., (2008) 'On-Line Probability, Complexity and Randomness' in Algorithmic Learning Theory, proceedings on the 19th International Conference, ALT 2008, vol. 5254: 138-153
9783540879862
10.1007/978-3-540-87987-9_15
http://hdl.handle.net/10547/279181
Algorithmic Learning Theory
Classical probability theory considers probability distributions that assign probabilities to all events (at least in the finite case). However, there are natural situations where only part of the process is controlled by some probability distribution while for the other part we know only the set of possibilities without any probabilities assigned. We adapt the notions of algorithmic information theory (complexity, algorithmic randomness, martingales, a priori probability) to this framework and show that many classical results are still valid.
en
Springer
http://link.springer.com/chapter/10.1007/978-3-540-87987-9_15
On-line probability, complexity and randomness
Conference papers, meetings and proceedings
Classical probability theory considers probability distributions that assign probabilities to all events (at least in the finite case). However, there are natural situations where only part of the process is controlled by some probability distribution while for the other part we know only the set of possibilities without any probabilities assigned.
We adapt the notions of algorithmic information theory (complexity, algorithmic randomness, martingales, a priori probability) to this framework and show that many classical results are still valid.
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/279181/1/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
1
false
10547/279181
oai:uobrep.openrepository.com:10547/279181
2020-04-23 07:29:33.639
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
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
oai:uobrep.openrepository.com:10547/2720382020-04-23T07:29:33Zcom_10547_132192col_10547_132230
Kustner, Tilman
2c606721ff718d88266f6ceae2fdba6d
-1
Weidendorfer, Josef
606e5270239bfdeb523552f3cfd92164
-1
Schirmer, Jasmine
65b429967ea108131ede3bf82f76363e
-1
Klug, Tobias
529530aa2c4e4eda3259a17eb9f6d0fc
-1
Trinitis, Carsten
6a34947dfac48fd0c1891c400a06e265
-1
Ziegler, Sybille
53b3c56b7c4c2991a5d7b62d15964997
-1
Technische Universität München
2013-03-13T12:52:05Z
2013-03-13T12:52:05Z
2009
Küstner, T., Weidendorfer, J., Schirmer, J., Klug, T., Trinitis, C., Ziegler, S. (2009) 'Parallel MLEM on Multicore Architectures' in ICCS '09 Proceedings of the 9th International Conference on Computational Science: Part I: 491-500
978-3-642-01969-2
10.1007/978-3-642-01970-8_48
http://hdl.handle.net/10547/272038
The efficient use of multicore architectures for sparse matrix-vector multiplication (SpMV) is currently an open challenge. One algorithm which makes use of SpMV is the maximum likelihood expectation maximization (MLEM) algorithm. When using MLEM for positron emission tomography (PET) image reconstruction, one requires a particularly large matrix. We present a new storage scheme for this type of matrix which cuts the memory requirements by half, compared to the widely-used compressed sparse row format. For parallelization we combine the two partitioning techniques recursive bisection and striping. Our results show good load balancing and cache behavior. We also give speedup measurements on various modern multicore systems.
en
Springer
http://dl.acm.org/citation.cfm?id=1561015.1560813
sparse matrix-vector multiplication
maximum likelihood expectation maximization
Parallel MLEM on multicore architectures
Conference papers, meetings and proceedings
The efficient use of multicore architectures for sparse matrix-vector multiplication (SpMV) is currently an open challenge. One algorithm which makes use of SpMV is the maximum likelihood expectation maximization (MLEM) algorithm. When using MLEM for positron emission tomography (PET) image reconstruction, one requires a particularly large matrix. We present a new storage scheme for this type of matrix which cuts the memory requirements by half, compared to the widely-used compressed sparse row format. For parallelization we combine the two partitioning techniques recursive bisection and striping. Our results show good load balancing and cache behavior. We also give speedup measurements on various modern multicore systems.
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/272038/1/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
1
false
10547/272038
oai:uobrep.openrepository.com:10547/272038
2020-04-23 07:29:33.705
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
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
oai:uobrep.openrepository.com:10547/2791822020-04-23T07:29:33Zcom_10547_132192col_10547_132230
Sun, Heqing
84405a59eaa04387d32d84132671a2dc
-1
Hou, Zhongsheng
563a258605ad70fb2a8b9c6768d3649d
-1
Li, Dayou
6295afce2b3b8447f935ff4664ecd492
-1
2013-04-07T16:55:57Z
2013-04-07T16:55:57Z
2012
Sun, H.; Hou, Z. and Li, D., (2012) 'Coordinated Iterative Learning Control Schemes for Train Trajectory Tracking With Overspeed Protection,' vol.PP (99):1 IEEE Transactions on Automation Science and Engineering
1545-5955
10.1109/TASE.2012.2216261
http://hdl.handle.net/10547/279182
IEEE Transactions on Automation Science and Engineering
This work embodies the overspeed protection and safe headway control into an iterative learning control (ILC) based train trajectory tracking algorithm to satisfy the high safety requirement of high-speed railways. First, a D-type ILC scheme with overspeed protection is proposed. Then, a corresponding coordinated ILC scheme with multiple trains is studied to keep the safe headway. Finally, the control scheme under traction/braking force constraint is also considered for this proposed ILC-based train trajectory tracking strategy. Rigorous theoretical analysis has shown that the proposed control schemes can guarantee the asymptotic convergence of train speed and position to its desired profiles without requirement of the physical model aside from some mild assumptions on the system. Effectiveness is further evaluated through simulations.
en
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
https://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6338304&contentType=Early+Access+Articles&sortType%3Dasc_p_Sequence%26filter%3DAND%28p_IS_Number%3A4358066%29
input constraint
iterative learning control
ILC
Coordinated iterative learning control schemes for train trajectory tracking with overspeed protection
Article
This work embodies the overspeed protection and safe headway control into an iterative learning control (ILC) based train trajectory tracking algorithm to satisfy the high safety requirement of high-speed railways. First, a D-type ILC scheme with overspeed protection is proposed. Then, a corresponding coordinated ILC scheme with multiple trains is studied to keep the safe headway. Finally, the control scheme under traction/braking force constraint is also considered for this proposed ILC-based train trajectory tracking strategy. Rigorous theoretical analysis has shown that the proposed control schemes can guarantee the asymptotic convergence of train speed and position to its desired profiles without requirement of the physical model aside from some mild assumptions on the system. Effectiveness is further evaluated through simulations.
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/279182/1/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
1
false
10547/279182
oai:uobrep.openrepository.com:10547/279182
2020-04-23 07:29:33.776
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
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
oai:uobrep.openrepository.com:10547/2791832020-04-23T07:29:33Zcom_10547_132192col_10547_132230
Qiu, Renxi
c2878327e497918ac94d317d184846f2
-1
Noyvirt, Alexandre
93b48ed32f77089f5a78c02e5369347b
-1
Ji, Ze
b2059209ce722b41966344d9a7a687ae
-1
Soroka, Anthony
442dbcd254e47f9400bfec6391ad4e5d
-1
Li, Dayou
6295afce2b3b8447f935ff4664ecd492
-1
Liu, Beisheng
f51f42a3f46e7e2d07193c35b06bd311
-1
Arbeiter, Georg
d3a371ca9995607ce9bd094b1afea1dd
-1
Weisshardt, Florian
02ff4c3b4d10ea9cc3734954b9bb4757
-1
Xu, Shuo
ee4d03998c89bfcd2e69add4399443c4
-1
2013-04-07T16:59:38Z
2013-04-07T16:59:38Z
2012
Qiu, R.; Noyvirt, A.; Ji, Z.; Soroka, A.; Li, D.; Liu, B.; Arbeiter, G.; Weisshardt, F.; and Xu, S. (2012) 'Integration of Symbolic Task Planning into Operations within an Unstructured Environment', 2 (3):38-57 International Journal of Intelligent Mechatronics and Robotics
2156-1664
2156-1656
10.4018/ijimr.2012070104
http://hdl.handle.net/10547/279183
International Journal of Intelligent Mechatronics and Robotics
To ensure a robot capable of robust task execution in unstructured environments, task planners need to have a high-level understanding of the nature of the world, reasoning for deliberate actions, and reacting to environment changes. Proposed is a practical task planning approach that seamlessly integrating deeper domain knowledge, real time perception and symbolic planning for robot operation. A higher degree of autonomy under unstructured environment will be endowed to the robot with the proposed approach.
en
IGI Global
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/ijimr.2012070104
Archived with thanks to International Journal of Intelligent Mechatronics and Robotics
robot operation system
Integration of symbolic task planning into operations within an unstructured environment
Article
To ensure a robot capable of robust task execution in unstructured environments, task planners need to have a high-level understanding of the nature of the world, reasoning for deliberate actions, and reacting to environment changes. Proposed is a practical task planning approach that seamlessly integrating deeper domain knowledge, real time perception and symbolic planning for robot operation. A higher degree of autonomy under unstructured environment will be endowed to the robot with the proposed approach.
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/279183/1/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
1
false
10547/279183
oai:uobrep.openrepository.com:10547/279183
2020-04-23 07:29:33.863
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
Tk9OLUVYQ0xVU0lWRSBESVNUUklCVVRJT04gTElDRU5TRQoKQnkgc2lnbmluZyBhbmQgc3VibWl0dGluZyB0aGlzIGxpY2Vuc2UsIHlvdSAodGhlIGF1dGhvcihzKSBvciBjb3B5cmlnaHQKb3duZXIpIGdyYW50cyB0byB0aGUgVW5pdmVyc2l0eSBvZiBCZWRmb3Jkc2hpcmUgUmVwb3NpdG9yeSAgKFVPQlJFUCkgdGhlIG5vbi1leGNsdXNpdmUgcmlnaHQgdG8gcmVwcm9kdWNlLAp0cmFuc2xhdGUgKGFzIGRlZmluZWQgYmVsb3cpLCBhbmQvb3IgZGlzdHJpYnV0ZSB5b3VyIHN1Ym1pc3Npb24gKGluY2x1ZGluZwp0aGUgYWJzdHJhY3QpIHdvcmxkd2lkZSBpbiBwcmludCBhbmQgZWxlY3Ryb25pYyBmb3JtYXQgYW5kIGluIGFueSBtZWRpdW0sCmluY2x1ZGluZyBidXQgbm90IGxpbWl0ZWQgdG8gYXVkaW8gb3IgdmlkZW8uCgpZb3UgYWdyZWUgdGhhdCBVT0JSRVAgbWF5LCB3aXRob3V0IGNoYW5naW5nIHRoZSBjb250ZW50LCB0cmFuc2xhdGUgdGhlCnN1Ym1pc3Npb24gdG8gYW55IG1lZGl1bSBvciBmb3JtYXQgZm9yIHRoZSBwdXJwb3NlIG9mIHByZXNlcnZhdGlvbi4KCllvdSBhbHNvIGFncmVlIHRoYXQgVU9CUkVQIG1heSBrZWVwIG1vcmUgdGhhbiBvbmUgY29weSBvZiB0aGlzIHN1Ym1pc3Npb24gZm9yCnB1cnBvc2VzIG9mIHNlY3VyaXR5LCBiYWNrLXVwIGFuZCBwcmVzZXJ2YXRpb24uCgpZb3UgcmVwcmVzZW50IHRoYXQgdGhlIHN1Ym1pc3Npb24gaXMgeW91ciBvcmlnaW5hbCB3b3JrLCBhbmQgdGhhdCB5b3UgaGF2ZQp0aGUgcmlnaHQgdG8gZ3JhbnQgdGhlIHJpZ2h0cyBjb250YWluZWQgaW4gdGhpcyBsaWNlbnNlLiBZb3UgYWxzbyByZXByZXNlbnQKdGhhdCB5b3VyIHN1Ym1pc3Npb24gZG9lcyBub3QsIHRvIHRoZSBiZXN0IG9mIHlvdXIga25vd2xlZGdlLCBpbmZyaW5nZSB1cG9uCmFueW9uZSdzIGNvcHlyaWdodC4KCklmIHRoZSBzdWJtaXNzaW9uIGNvbnRhaW5zIG1hdGVyaWFsIGZvciB3aGljaCB5b3UgZG8gbm90IGhvbGQgY29weXJpZ2h0LAp5b3UgcmVwcmVzZW50IHRoYXQgeW91IGhhdmUgb2J0YWluZWQgdGhlIHVucmVzdHJpY3RlZCBwZXJtaXNzaW9uIG9mIHRoZQpjb3B5cmlnaHQgb3duZXIgdG8gZ3JhbnQgVU9CUkVQIHRoZSByaWdodHMgcmVxdWlyZWQgYnkgdGhpcyBsaWNlbnNlLCBhbmQgdGhhdApzdWNoIHRoaXJkLXBhcnR5IG93bmVkIG1hdGVyaWFsIGlzIGNsZWFybHkgaWRlbnRpZmllZCBhbmQgYWNrbm93bGVkZ2VkCndpdGhpbiB0aGUgdGV4dCBvciBjb250ZW50IG9mIHRoZSBzdWJtaXNzaW9uLgoKSUYgVEhFIFNVQk1JU1NJT04gSVMgQkFTRUQgVVBPTiBXT1JLIFRIQVQgSEFTIEJFRU4gU1BPTlNPUkVEIE9SIFNVUFBPUlRFRApCWSBBTiBBR0VOQ1kgT1IgT1JHQU5JWkFUSU9OIE9USEVSIFRIQU4gVEVTVE9SLCBZT1UgUkVQUkVTRU5UIFRIQVQgWU9VIEhBVkUKRlVMRklMTEVEIEFOWSBSSUdIVCBPRiBSRVZJRVcgT1IgT1RIRVIgT0JMSUdBVElPTlMgUkVRVUlSRUQgQlkgU1VDSApDT05UUkFDVCBPUiBBR1JFRU1FTlQuCgpVT0JSRVAgd2lsbCBjbGVhcmx5IGlkZW50aWZ5IHlvdXIgbmFtZShzKSBhcyB0aGUgYXV0aG9yKHMpIG9yIG93bmVyKHMpIG9mIHRoZQpzdWJtaXNzaW9uLCBhbmQgd2lsbCBub3QgbWFrZSBhbnkgYWx0ZXJhdGlvbiwgb3RoZXIgdGhhbiBhcyBhbGxvd2VkIGJ5IHRoaXMKbGljZW5zZSwgdG8geW91ciBzdWJtaXNzaW9uLgo=
oai:uobrep.openrepository.com:10547/2791842020-04-23T08:39:57Zcom_10547_132192col_10547_132230
Patterson, Cameron
78bbf238d198725b82930430b653421f
-1
Garside, Jim D.
c3b8b1201c5a9a0f79d38db39909edfa
-1
Painkras, Eustace
e72067a93c692b5883f3c1c2e98d615e
-1
Temple, Steve
43de6c4f68ed8938b8d49897b4dd8037
-1
Plana, Luis A.
bdfa8c5080aa518711a71032f5af582c
-1
Navaridas, Javier
dc1b52dc87c0ab79c3aa1b5bdcfd6ef6
-1
Sharp, Thomas
439f6e3de0585190434bcb41a45cc6d8
-1
Furber, Steve B.
3f4f1ad0a5119565236770d09e3792ff
-1
2013-04-07T17:04:34Z
2013-04-07T17:04:34Z
2012
Patterson, C.; Garside, J.; Painkras, E.; Temple, S., Plana, L., Navaridas, J., Sharp, T. and Furber, S. (2012) 'Scalable communications for a million-core neural processing architecture' 72 (11):1507-1520 Journal of Parallel and Distributed Computing
07437315
10.1016/j.jpdc.2012.01.016
http://hdl.handle.net/10547/279184
Journal of Parallel and Distributed Computing
The design of a new high-performance computing platform to model biological neural networks requires scalable, layered communications in both hardware and software. SpiNNaker's hardware is based upon Multi-Processor System-on-Chips (MPSoCs) with flexible, power-efficient, custom communication between processors and chips. The architecture scales from a single 18-processor chip to over 1 million processors and to simulations of billion-neuron, trillion-synapse models, with tens of trillions of neural spike-event packets conveyed each second. The communication networks and overlying protocols are key to the successful operation of the SpiNNaker architecture, designed together to maximise performance and minimise the power demands of the platform. SpiNNaker is a work in progress, having recently reached a major milestone with the delivery of the first MPSoCs. This paper presents the architectural justification, which is now supported by preliminary measured results of silicon performance, indicating that it is indeed scalable to a million-plus processor system.
en
Elsevier
http://linkinghub.elsevier.com/retrieve/pii/S0743731512000287
GALS
HPC
network-on-chip
Scalable communications for a million-core neural processing architecture
Article
The design of a new high-performance computing platform to model biological neural networks requires scalable, layered communications in both hardware and software. SpiNNaker's hardware is based upon Multi-Processor System-on-Chips (MPSoCs) with flexible, power-efficient, custom communication between processors and chips. The architecture scales from a single 18-processor chip to over 1 million processors and to simulations of billion-neuron, trillion-synapse models, with tens of trillions of neural spike-event packets conveyed each second. The communication networks and overlying protocols are key to the successful operation of the SpiNNaker architecture, designed together to maximise performance and minimise the power demands of the platform. SpiNNaker is a work in progress, having recently reached a major milestone with the delivery of the first MPSoCs. This paper presents the architectural justification, which is now supported by preliminary measured results of silicon performance, indicating that it is indeed scalable to a million-plus processor system.
THUMBNAIL
elsevier-thumbnail.png
application/octet-stream
134502
https://uobrep.openrepository.com/bitstream/10547/279184/2/elsevier-thumbnail.png
f38e2be329ace8e0222479c330f83be8
MD5
2
false
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/279184/1/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
1
false
10547/279184
oai:uobrep.openrepository.com:10547/279184
2020-04-23 08:39:57.526
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
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
oai:uobrep.openrepository.com:10547/2791642020-04-23T07:29:26Zcom_10547_132192col_10547_132230
Furber, Steve B.
3f4f1ad0a5119565236770d09e3792ff
-1
Lester, David R.
63de4d2dd622b7b6841c09ea2ac84c39
-1
Plana, Luis A.
bdfa8c5080aa518711a71032f5af582c
-1
Garside, Jim D.
c3b8b1201c5a9a0f79d38db39909edfa
-1
Painkras, Eustace
e72067a93c692b5883f3c1c2e98d615e
-1
Temple, Steve
43de6c4f68ed8938b8d49897b4dd8037
-1
Brown, Andrew D.
7a610c58057e63acf7e2ba8ef817f9cc
-1
2013-04-07T17:21:47Z
2013-04-07T17:21:47Z
2012
Furber, S.; Lester, D.; Plana, L.; Garside, J.; Painkras, E.; Temple, S. and Brown, A. (2012) 'Overview of the SpiNNaker System Architecture',1 IEEE Transactions on Computers, 99 pp. 1-14
0018-9340
10.1109/TC.2012.142
http://hdl.handle.net/10547/279164
IEEE Transactions on Computers
SpiNNaker (a contraction of Spiking Neural Network Architecture) is a million-core computing engine whose flagship goal is to be able to simulate the behaviour of aggregates of up to a billion neurons in real time. It consists of an array of ARM9 cores, communicating via packets carried by a custom interconnect fabric. The packets are small (40 or 72 bits), and their transmission is brokered entirely by hardware, giving the overall engine an extremely high bisection bandwidth of over 5 billion packets/s. Three of the principle axioms of parallel machine design -- memory coherence, synchronicity and determinism -- have been discarded in the design without, surprisingly, compromising the ability to perform meaningful computations. A further attribute of the system is the acknowledgement, from the initial design stages, that the sheer size of the implementation will make component failures an inevitable aspect of day-to-day operation, and fault detection and recovery mechanisms have been built into the system at many levels of abstraction. This paper describes the architecture of the machine and outlines the underlying design philosophy; software and applications are to be described in detail elsewhere, and only introduced in passing here as necessary to illuminate the description
en
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6226357
interconnection architectures
Overview of the SpiNNaker system architecture
Article
SpiNNaker (a contraction of Spiking Neural Network Architecture) is a million-core computing engine whose flagship goal is to be able to simulate the behaviour of aggregates of up to a billion neurons in real time. It consists of an array of ARM9 cores, communicating via packets carried by a custom interconnect fabric. The packets are small (40 or 72 bits), and their transmission is brokered entirely by hardware, giving the overall engine an extremely high bisection bandwidth of over 5 billion packets/s. Three of the principle axioms of parallel machine design -- memory coherence, synchronicity and determinism -- have been discarded in the design without, surprisingly, compromising the ability to perform meaningful computations. A further attribute of the system is the acknowledgement, from the initial design stages, that the sheer size of the implementation will make component failures an inevitable aspect of day-to-day operation, and fault detection and recovery mechanisms have been built into the system at many levels of abstraction. This paper describes the architecture of the machine and outlines the underlying design philosophy; software and applications are to be described in detail elsewhere, and only introduced in passing here as necessary to illuminate the description
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/279164/1/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
1
false
10547/279164
oai:uobrep.openrepository.com:10547/279164
2020-04-23 07:29:26.412
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
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
oai:uobrep.openrepository.com:10547/2791652020-04-23T07:29:37Zcom_10547_132192col_10547_132230
Plana, Luis A.
bdfa8c5080aa518711a71032f5af582c
-1
Clark, David
36b3dc048b847259b5a28d00d9c63176
-1
Davidson, Simon
2a2bcdaa216935d7e43a746af37fd75d
-1
Furber, Steve B.
3f4f1ad0a5119565236770d09e3792ff
-1
Garside, Jim D.
c3b8b1201c5a9a0f79d38db39909edfa
-1
Painkras, Eustace
e72067a93c692b5883f3c1c2e98d615e
-1
Pepper, Jeffrey
6089a4bb8b4a46b4f757cd99941b8df4
-1
Temple, Steve
43de6c4f68ed8938b8d49897b4dd8037
-1
Bainbridge, John
1f72ba9b070e54dc5dd285547b552f50
-1
2013-04-07T17:28:50Z
2013-04-07T17:28:50Z
2011
Plana, L.; Clark, D.; Davidson, S.; Furber, S.; Garside, J.; Painkras, E.; Pepper, E.; Temple, S. and Bainbridge, J. (2011) 'SpiNNaker: Design and Implementation of a GALS Multi-Core System-on-Chip' 7 (4), article 17:1-17 ACM Journal on Emerging Technologies in Computing Systems
15504832
10.1145/2043643.2043647
http://hdl.handle.net/10547/279165
ACM Journal on Emerging Technologies in Computing Systems
The design and implementation of Globally Asynchronous Locally Synchronous Systems-on-Chip is a challenging activity. The large size and complexity of the systems require the use of Computer-Aided Design (CAD) tools but, unfortunately, most tools do not work adequately with asynchronous circuits. This paper describes the successful design and implementation of SpiNNaker, a GALS multi-core system-on-chip. The processes was completed using commercial CAD tools from synthesis to layout. A hierarchical methodology was devised to deal with the asynchronous sections of the system, encapsulating and validating timing assumptions at each level. The crossbar topology combined with a pipelined asynchronous fabric implementation allows the on-chip network to meet the stringent requirements of the system. The implementation methodology constrains the design in a way which allows the tools to complete their tasks successfully. A first test chip, with reduced resources and complexity was taped-out using the proposed methodology. Test chips were received in December 2009 and were fully functional. The methodology had to be modified to cope with the increased complexity of the SpiNNaker SoC. SpiNNaker chips were delivered in May 2011 and were also fully operational, and the interconnect requirements were met.
en
ACM
http://dl.acm.org/citation.cfm?doid=2043643.2043647
asynchronous system
network-on-chip
SpiNNaker: design and implementation of a GALS multicore system-on-chip
Article
The design and implementation of Globally Asynchronous Locally Synchronous Systems-on-Chip is a challenging activity. The large size and complexity of the systems require the use of Computer-Aided Design (CAD) tools but, unfortunately, most tools do not work adequately with asynchronous circuits. This paper describes the successful design and implementation of SpiNNaker, a GALS multi-core system-on-chip. The processes was completed using commercial CAD tools from synthesis to layout. A hierarchical methodology was devised to deal with the asynchronous sections of the system, encapsulating and validating timing assumptions at each level. The crossbar topology combined with a pipelined asynchronous fabric implementation allows the on-chip network to meet the stringent requirements of the system. The implementation methodology constrains the design in a way which allows the tools to complete their tasks successfully. A first test chip, with reduced resources and complexity was taped-out using the proposed methodology. Test chips were received in December 2009 and were fully functional. The methodology had to be modified to cope with the increased complexity of the SpiNNaker SoC. SpiNNaker chips were delivered in May 2011 and were also fully operational, and the interconnect requirements were met.
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/279165/1/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
1
false
10547/279165
oai:uobrep.openrepository.com:10547/279165
2020-04-23 07:29:37.004
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
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
oai:uobrep.openrepository.com:10547/2791662020-04-23T07:37:46Zcom_10547_132192col_10547_132230
Safdar, Ghazanfar Ali
1f739524cf4ea6e5418976a09d95b50d
-1
Sant, Paul
4d523c3c21b077623d507fc78147194c
-1
Epiphaniou, Gregory
f3c3485a5bcef868a65c7a622295c3e3
600
Maple, Carsten
a4dc0842fb0b0b3b6d15dd203a61bd1f
-1
2013-04-07T17:35:52Z
2013-04-07T17:35:52Z
2012
Epiphaniou, G.; Maple, C.; Sant, P. and Safdar, G.A., (2012) 'Effects of iterative block ciphers on quality of experience for Internet Protocol Security enabled voice over IP calls' 6 (3):141-148 IET Information Security
1751-8709
1751-8717
10.1049/iet-ifs.2011.0213
http://hdl.handle.net/10547/279166
IET Information Security
Voice over IP (VoIP) is the technology used to transport real-time voice over a packet-switched network. This study analyses the effects of encrypted VoIP streams on perceived Quality of Experience (QoE) from a user's perspective. An in-depth analysis on how the transparent nature of encryption can influence the way users perceive the quality of a VoIP call have been investigated by using the E model. A series of experiments have been conducted using a representative sample of modern codecs currently employed for digitising voice, as well as three of the most commonly used iterative block ciphers for encryption (DES, 3DES, AES). It has been found that the Internet Protocol Security encryption of VoIP strongly relates to the payload sizes and choice of codecs and this relationship has different effects on the overall QoE as measured by the E model, in terms of the way that users perceive the quality of a VoIP call. The main result of this paper is that the default payload shipped with the codecs is not the optimal selection for an increased number of VoIP calls, when encryption is applied and a minimum level of QoE has to be maintained, per call.
en
IET
http://digital-library.theiet.org/content/journals/10.1049/iet-ifs.2011.0213
Archived with thanks to IET Information Security
IP networks
Internet telephony
Effects of iterative block ciphers on quality of experience for Internet Protocol Security enabled voice over IP calls
Article
Voice over IP (VoIP) is the technology used to transport real-time voice over a packet-switched network. This study analyses the effects of encrypted VoIP streams on perceived Quality of Experience (QoE) from a user's perspective. An in-depth analysis on how the transparent nature of encryption can influence the way users perceive the quality of a VoIP call have been investigated by using the E model. A series of experiments have been conducted using a representative sample of modern codecs currently employed for digitising voice, as well as three of the most commonly used iterative block ciphers for encryption (DES, 3DES, AES). It has been found that the Internet Protocol Security encryption of VoIP strongly relates to the payload sizes and choice of codecs and this relationship has different effects on the overall QoE as measured by the E model, in terms of the way that users perceive the quality of a VoIP call. The main result of this paper is that the default payload shipped with the codecs is not the optimal selection for an increased number of VoIP calls, when encryption is applied and a minimum level of QoE has to be maintained, per call.
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/279166/1/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
1
false
10547/279166
oai:uobrep.openrepository.com:10547/279166
2020-04-23 07:37:46.378
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
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
oai:uobrep.openrepository.com:10547/2760192020-04-23T07:29:37Zcom_10547_132192col_10547_132230
Lu, Bowen
24509e4b003cdc7ad429c115922b1e83
-1
Oyekan, John O.
33da02f4b53182fd3a2f907a18e71c4b
-1
Gu, Dongbing
ee7ca1b7ef8781deddf7c726da8f6a99
-1
Hu, Huosheng
a1c8dadb5e49038d54d5cd4252bc44e6
-1
Nia, Hossein Farid Ghassem
c6ae5f542c1a4bebc5f6d21a2d65ccea
-1
University of Essex
2013-03-26T14:02:39Z
2013-03-26T14:02:39Z
2011
Lu, B., Oyekan, J., Gu, D., Hu, H. and Nia, H.F.G.(2011) 'Mobile sensor networks for modelling environmental pollutant distribution' International Journal of Systems Science 42 (9):1491-1505
0020-7721
1464-5319
10.1080/00207721.2011.572198
http://hdl.handle.net/10547/276019
International Journal of Systems Science
This article proposes to deploy a group of mobile sensor agents to cover a polluted region so that they are able to retrieve the pollutant distribution. The deployed mobile sensor agents are capable of making point observation in the natural environment. There are two approaches to modelling the pollutant distribution proposed in this article. One is a model-based approach where the sensor agents sample environmental pollutant, build up an environmental pollutant model and move towards the region where high density pollutant exists. The modelling technique used is a distributed support vector regression and the motion control technique used is a distributed locational optimising algorithm (centroidal Voronoi tessellation). The other is a model-free approach where the sensor agents sample environmental pollutant and directly move towards the region where high density pollutant exists without building up a model. The motion control technique used is a bacteria chemotaxis behaviour. By combining this behaviour with a flocking behaviour, it is possible to form a spatial distribution matched to the underlying pollutant distribution. Both approaches are simulated and tested with a group of real robots.
en
Taylor and Francis
http://www.tandfonline.com/doi/abs/10.1080/00207721.2011.572198
Mobile sensor networks for modelling environmental pollutant distribution
Article
This article proposes to deploy a group of mobile sensor agents to cover a polluted region so that they are able to retrieve the pollutant distribution. The deployed mobile sensor agents are capable of making point observation in the natural environment. There are two approaches to modelling the pollutant distribution proposed in this article. One is a model-based approach where the sensor agents sample environmental pollutant, build up an environmental pollutant model and move towards the region where high density pollutant exists. The modelling technique used is a distributed support vector regression and the motion control technique used is a distributed locational optimising algorithm (centroidal Voronoi tessellation). The other is a model-free approach where the sensor agents sample environmental pollutant and directly move towards the region where high density pollutant exists without building up a model. The motion control technique used is a bacteria chemotaxis behaviour. By combining this behaviour with a flocking behaviour, it is possible to form a spatial distribution matched to the underlying pollutant distribution. Both approaches are simulated and tested with a group of real robots.
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/276019/1/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
1
false
10547/276019
oai:uobrep.openrepository.com:10547/276019
2020-04-23 07:29:37.21
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
Tk9OLUVYQ0xVU0lWRSBESVNUUklCVVRJT04gTElDRU5TRQoKQnkgc2lnbmluZyBhbmQgc3VibWl0dGluZyB0aGlzIGxpY2Vuc2UsIHlvdSAodGhlIGF1dGhvcihzKSBvciBjb3B5cmlnaHQKb3duZXIpIGdyYW50cyB0byB0aGUgVW5pdmVyc2l0eSBvZiBCZWRmb3Jkc2hpcmUgUmVwb3NpdG9yeSAgKFVPQlJFUCkgdGhlIG5vbi1leGNsdXNpdmUgcmlnaHQgdG8gcmVwcm9kdWNlLAp0cmFuc2xhdGUgKGFzIGRlZmluZWQgYmVsb3cpLCBhbmQvb3IgZGlzdHJpYnV0ZSB5b3VyIHN1Ym1pc3Npb24gKGluY2x1ZGluZwp0aGUgYWJzdHJhY3QpIHdvcmxkd2lkZSBpbiBwcmludCBhbmQgZWxlY3Ryb25pYyBmb3JtYXQgYW5kIGluIGFueSBtZWRpdW0sCmluY2x1ZGluZyBidXQgbm90IGxpbWl0ZWQgdG8gYXVkaW8gb3IgdmlkZW8uCgpZb3UgYWdyZWUgdGhhdCBVT0JSRVAgbWF5LCB3aXRob3V0IGNoYW5naW5nIHRoZSBjb250ZW50LCB0cmFuc2xhdGUgdGhlCnN1Ym1pc3Npb24gdG8gYW55IG1lZGl1bSBvciBmb3JtYXQgZm9yIHRoZSBwdXJwb3NlIG9mIHByZXNlcnZhdGlvbi4KCllvdSBhbHNvIGFncmVlIHRoYXQgVU9CUkVQIG1heSBrZWVwIG1vcmUgdGhhbiBvbmUgY29weSBvZiB0aGlzIHN1Ym1pc3Npb24gZm9yCnB1cnBvc2VzIG9mIHNlY3VyaXR5LCBiYWNrLXVwIGFuZCBwcmVzZXJ2YXRpb24uCgpZb3UgcmVwcmVzZW50IHRoYXQgdGhlIHN1Ym1pc3Npb24gaXMgeW91ciBvcmlnaW5hbCB3b3JrLCBhbmQgdGhhdCB5b3UgaGF2ZQp0aGUgcmlnaHQgdG8gZ3JhbnQgdGhlIHJpZ2h0cyBjb250YWluZWQgaW4gdGhpcyBsaWNlbnNlLiBZb3UgYWxzbyByZXByZXNlbnQKdGhhdCB5b3VyIHN1Ym1pc3Npb24gZG9lcyBub3QsIHRvIHRoZSBiZXN0IG9mIHlvdXIga25vd2xlZGdlLCBpbmZyaW5nZSB1cG9uCmFueW9uZSdzIGNvcHlyaWdodC4KCklmIHRoZSBzdWJtaXNzaW9uIGNvbnRhaW5zIG1hdGVyaWFsIGZvciB3aGljaCB5b3UgZG8gbm90IGhvbGQgY29weXJpZ2h0LAp5b3UgcmVwcmVzZW50IHRoYXQgeW91IGhhdmUgb2J0YWluZWQgdGhlIHVucmVzdHJpY3RlZCBwZXJtaXNzaW9uIG9mIHRoZQpjb3B5cmlnaHQgb3duZXIgdG8gZ3JhbnQgVU9CUkVQIHRoZSByaWdodHMgcmVxdWlyZWQgYnkgdGhpcyBsaWNlbnNlLCBhbmQgdGhhdApzdWNoIHRoaXJkLXBhcnR5IG93bmVkIG1hdGVyaWFsIGlzIGNsZWFybHkgaWRlbnRpZmllZCBhbmQgYWNrbm93bGVkZ2VkCndpdGhpbiB0aGUgdGV4dCBvciBjb250ZW50IG9mIHRoZSBzdWJtaXNzaW9uLgoKSUYgVEhFIFNVQk1JU1NJT04gSVMgQkFTRUQgVVBPTiBXT1JLIFRIQVQgSEFTIEJFRU4gU1BPTlNPUkVEIE9SIFNVUFBPUlRFRApCWSBBTiBBR0VOQ1kgT1IgT1JHQU5JWkFUSU9OIE9USEVSIFRIQU4gVEVTVE9SLCBZT1UgUkVQUkVTRU5UIFRIQVQgWU9VIEhBVkUKRlVMRklMTEVEIEFOWSBSSUdIVCBPRiBSRVZJRVcgT1IgT1RIRVIgT0JMSUdBVElPTlMgUkVRVUlSRUQgQlkgU1VDSApDT05UUkFDVCBPUiBBR1JFRU1FTlQuCgpVT0JSRVAgd2lsbCBjbGVhcmx5IGlkZW50aWZ5IHlvdXIgbmFtZShzKSBhcyB0aGUgYXV0aG9yKHMpIG9yIG93bmVyKHMpIG9mIHRoZQpzdWJtaXNzaW9uLCBhbmQgd2lsbCBub3QgbWFrZSBhbnkgYWx0ZXJhdGlvbiwgb3RoZXIgdGhhbiBhcyBhbGxvd2VkIGJ5IHRoaXMKbGljZW5zZSwgdG8geW91ciBzdWJtaXNzaW9uLgo=
oai:uobrep.openrepository.com:10547/2760182020-04-23T07:29:37Zcom_10547_132192col_10547_132230
Oyekan, John O.
33da02f4b53182fd3a2f907a18e71c4b
-1
Hu, Huosheng
a1c8dadb5e49038d54d5cd4252bc44e6
-1
Gu, Dongbing
ee7ca1b7ef8781deddf7c726da8f6a99
-1
University of Essex
2013-03-26T13:59:25Z
2013-03-26T13:59:25Z
2010
Oyekan, J., Hu, H. and Gu, D. (2010) 'Bio-Inspired Coverage of Invisible Hazardous Substances in the Environment', International Journal of Information Acquisition 07 (03): 193-204
0219-8789
1793-6985
10.1142/S0219878910002154
http://hdl.handle.net/10547/276018
International Journal of Information Acquisition
Inspired by the simplicity of how nature solves its problems, a controller based upon the bacteria chemotaxis behavior and flocking of starlings in nature is developed and presented. It would enable the localization and subsequent mapping of pollutants in the environment. The pollutants could range from chemical leaks to invisible air borne hazardous materials. Simulation is used to explore the feasibility of the proposed controller and then a brief discussion on how to implement it onto a real robotic platform is presented. By using the advantages offered by swarm robotics, it is possible to achieve a collective mapping of an invisible pollutant spread over a large area. The approach presented is very simple, computational efficient, easily tuned and yet highly effective (desirable characteristics of biological systems) in generating a representation of an invisible pollutant.
en
World Scientific Publishing Company
http://www.worldscientific.com/doi/abs/10.1142/S0219878910002154
bacterium inspired algorithm
environmental monitoring
invisible hazardous substances
Bio-inspired coverage of invisible hazardous substances in the environment
Article
Inspired by the simplicity of how nature solves its problems, a controller based upon the bacteria chemotaxis behavior and flocking of starlings in nature is developed and presented. It would enable the localization and subsequent mapping of pollutants in the environment. The pollutants could range from chemical leaks to invisible air borne hazardous materials. Simulation is used to explore the feasibility of the proposed controller and then a brief discussion on how to implement it onto a real robotic platform is presented. By using the advantages offered by swarm robotics, it is possible to achieve a collective mapping of an invisible pollutant spread over a large area. The approach presented is very simple, computational efficient, easily tuned and yet highly effective (desirable characteristics of biological systems) in generating a representation of an invisible pollutant.
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/276018/1/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
1
false
10547/276018
oai:uobrep.openrepository.com:10547/276018
2020-04-23 07:29:37.307
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
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
oai:uobrep.openrepository.com:10547/2760402020-04-23T07:29:36Zcom_10547_132192col_10547_132230
Conrad, Marc
c6d205a5c2149a7b0af55b805ff88a6c
600
University of Bedfordshire
2013-03-26T13:52:45Z
2013-03-26T13:52:45Z
2011
Conrad, M. (2011) 'Teaching Project Management with Second Life' in 'Multi-User Virtual Environments for the Classroom: Practical Approaches to Teaching in Virtual Worlds', Giovanni Vincenti and James Braman (eds.), IGI Global : 302-315
9781609605452
10.4018/978-1-60960-545-2.ch019
http://hdl.handle.net/10547/276040
Project Management is a field of intellectual and pragmatic enquiry that is inherently inter-disciplinary. It typically involves the integration of areas such as: project scoping, time, cost, and human resource management, whilst the management of effective inter-team communication, project risk, and procurement aspects are all central to the discipline. To try to cover all of these areas within a single university assignment presents somewhat of a challenge. This chapter demonstrates that the deployment of a Multi User Virtual Environment can indeed encompass these areas in an effective manner, both from learning objectives, realism, and assessment points of view. The chapter has emerged from the experience of three years deployment of Second Life as an integral part of a unit on Project Management, offered as part of both undergraduate and postgraduate courses within the Department of Computer Science and Technology at the University of Bedfordshire. Examples illustrate the work that has been produced by the students of these courses.
en
IGI Global
http://www.igi-global.com/chapter/teaching-project-management-second-life/53505
Second Life
project management
Teaching project management with Second Life
Multi-User Virtual Environments for the Classroom: Practical Approaches to Teaching in Virtual Worlds
Book chapter
Project Management is a field of intellectual and pragmatic enquiry that is inherently inter-disciplinary. It typically involves the integration of areas such as: project scoping, time, cost, and human resource management, whilst the management of effective inter-team communication, project risk, and procurement aspects are all central to the discipline. To try to cover all of these areas within a single university assignment presents somewhat of a challenge. This chapter demonstrates that the deployment of a Multi User Virtual Environment can indeed encompass these areas in an effective manner, both from learning objectives, realism, and assessment points of view. The chapter has emerged from the experience of three years deployment of Second Life as an integral part of a unit on Project Management, offered as part of both undergraduate and postgraduate courses within the Department of Computer Science and Technology at the University of Bedfordshire. Examples illustrate the work that has been produced by the students of these courses.
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/276040/1/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
1
false
10547/276040
oai:uobrep.openrepository.com:10547/276040
2020-04-23 07:29:36.696
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
Tk9OLUVYQ0xVU0lWRSBESVNUUklCVVRJT04gTElDRU5TRQoKQnkgc2lnbmluZyBhbmQgc3VibWl0dGluZyB0aGlzIGxpY2Vuc2UsIHlvdSAodGhlIGF1dGhvcihzKSBvciBjb3B5cmlnaHQKb3duZXIpIGdyYW50cyB0byB0aGUgVW5pdmVyc2l0eSBvZiBCZWRmb3Jkc2hpcmUgUmVwb3NpdG9yeSAgKFVPQlJFUCkgdGhlIG5vbi1leGNsdXNpdmUgcmlnaHQgdG8gcmVwcm9kdWNlLAp0cmFuc2xhdGUgKGFzIGRlZmluZWQgYmVsb3cpLCBhbmQvb3IgZGlzdHJpYnV0ZSB5b3VyIHN1Ym1pc3Npb24gKGluY2x1ZGluZwp0aGUgYWJzdHJhY3QpIHdvcmxkd2lkZSBpbiBwcmludCBhbmQgZWxlY3Ryb25pYyBmb3JtYXQgYW5kIGluIGFueSBtZWRpdW0sCmluY2x1ZGluZyBidXQgbm90IGxpbWl0ZWQgdG8gYXVkaW8gb3IgdmlkZW8uCgpZb3UgYWdyZWUgdGhhdCBVT0JSRVAgbWF5LCB3aXRob3V0IGNoYW5naW5nIHRoZSBjb250ZW50LCB0cmFuc2xhdGUgdGhlCnN1Ym1pc3Npb24gdG8gYW55IG1lZGl1bSBvciBmb3JtYXQgZm9yIHRoZSBwdXJwb3NlIG9mIHByZXNlcnZhdGlvbi4KCllvdSBhbHNvIGFncmVlIHRoYXQgVU9CUkVQIG1heSBrZWVwIG1vcmUgdGhhbiBvbmUgY29weSBvZiB0aGlzIHN1Ym1pc3Npb24gZm9yCnB1cnBvc2VzIG9mIHNlY3VyaXR5LCBiYWNrLXVwIGFuZCBwcmVzZXJ2YXRpb24uCgpZb3UgcmVwcmVzZW50IHRoYXQgdGhlIHN1Ym1pc3Npb24gaXMgeW91ciBvcmlnaW5hbCB3b3JrLCBhbmQgdGhhdCB5b3UgaGF2ZQp0aGUgcmlnaHQgdG8gZ3JhbnQgdGhlIHJpZ2h0cyBjb250YWluZWQgaW4gdGhpcyBsaWNlbnNlLiBZb3UgYWxzbyByZXByZXNlbnQKdGhhdCB5b3VyIHN1Ym1pc3Npb24gZG9lcyBub3QsIHRvIHRoZSBiZXN0IG9mIHlvdXIga25vd2xlZGdlLCBpbmZyaW5nZSB1cG9uCmFueW9uZSdzIGNvcHlyaWdodC4KCklmIHRoZSBzdWJtaXNzaW9uIGNvbnRhaW5zIG1hdGVyaWFsIGZvciB3aGljaCB5b3UgZG8gbm90IGhvbGQgY29weXJpZ2h0LAp5b3UgcmVwcmVzZW50IHRoYXQgeW91IGhhdmUgb2J0YWluZWQgdGhlIHVucmVzdHJpY3RlZCBwZXJtaXNzaW9uIG9mIHRoZQpjb3B5cmlnaHQgb3duZXIgdG8gZ3JhbnQgVU9CUkVQIHRoZSByaWdodHMgcmVxdWlyZWQgYnkgdGhpcyBsaWNlbnNlLCBhbmQgdGhhdApzdWNoIHRoaXJkLXBhcnR5IG93bmVkIG1hdGVyaWFsIGlzIGNsZWFybHkgaWRlbnRpZmllZCBhbmQgYWNrbm93bGVkZ2VkCndpdGhpbiB0aGUgdGV4dCBvciBjb250ZW50IG9mIHRoZSBzdWJtaXNzaW9uLgoKSUYgVEhFIFNVQk1JU1NJT04gSVMgQkFTRUQgVVBPTiBXT1JLIFRIQVQgSEFTIEJFRU4gU1BPTlNPUkVEIE9SIFNVUFBPUlRFRApCWSBBTiBBR0VOQ1kgT1IgT1JHQU5JWkFUSU9OIE9USEVSIFRIQU4gVEVTVE9SLCBZT1UgUkVQUkVTRU5UIFRIQVQgWU9VIEhBVkUKRlVMRklMTEVEIEFOWSBSSUdIVCBPRiBSRVZJRVcgT1IgT1RIRVIgT0JMSUdBVElPTlMgUkVRVUlSRUQgQlkgU1VDSApDT05UUkFDVCBPUiBBR1JFRU1FTlQuCgpVT0JSRVAgd2lsbCBjbGVhcmx5IGlkZW50aWZ5IHlvdXIgbmFtZShzKSBhcyB0aGUgYXV0aG9yKHMpIG9yIG93bmVyKHMpIG9mIHRoZQpzdWJtaXNzaW9uLCBhbmQgd2lsbCBub3QgbWFrZSBhbnkgYWx0ZXJhdGlvbiwgb3RoZXIgdGhhbiBhcyBhbGxvd2VkIGJ5IHRoaXMKbGljZW5zZSwgdG8geW91ciBzdWJtaXNzaW9uLgo=
oai:uobrep.openrepository.com:10547/2791562019-09-23T09:32:02Zcom_10547_132192col_10547_132230
Conrad, Marc
0000-0003-1796-209X
600
Charles, Alec
Neale, Jo
0000-0002-0755-8088
600
2013-04-07T16:18:15Z
2013-04-07T16:18:15Z
2011
Conrad, M., Charles, A. and Neale, J. (2011) 'What Is My Avatar? Who Is My Avatar? The Avatar as a Device to Achieve a Goal: Perceptions and Implications' in A. Peachey and M. Childs (eds.), Reinventing Ourselves: Contemporary Concepts of Identity in Virtual Worlds, chapter 13, Springer Series in Immersive Environments
9780857293619
10.1007/978-0-85729-361-9_13
http://hdl.handle.net/10547/279156
en
Springer
http://www.springer.com/computer/hci/book/978-0-85729-360-2
What is my avatar? who is my avatar? the avatar as a device to achieve a goal: perceptions and implications
Book chapter
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/279156/1/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
1
false
10547/279156
oai:uobrep.openrepository.com:10547/279156
2019-09-23 09:32:02.789
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
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
oai:uobrep.openrepository.com:10547/2791532020-04-23T07:29:37Zcom_10547_132192col_10547_132230
Hamid, Thaier K.A.
1ecd345495e297f346d943290ed35f7f
-1
Maple, Carsten
a4dc0842fb0b0b3b6d15dd203a61bd1f
-1
Sant, Paul
4d523c3c21b077623d507fc78147194c
-1
2013-04-07T16:07:35Z
2013-04-07T16:07:35Z
2012
Thaier Hamid, Carsten Maple and Paul Sant, (2012) 'Methodologies to Develop Quantitative Risk Evaluation Metrics' 48 (14):17-24 International Journal of Computer Applications
0975-8887
10.5120/7416-0413
http://hdl.handle.net/10547/279153
International Journal of Computer Applications
The goal of this work is to advance a new methodology to measure a severity cost for each host using the Common Vulnerability Scoring System (CVSS) based on base, temporal and environmental metrics by combining related sub-scores to produce a unique severity cost by modeling the problem's parameters in to a mathematical framework. We build our own CVSS Calculator using our equations to simplify the calculations of the vulnerabilities scores and to benchmark with other models. We design and develop a new approach to represent the cost assigned to each host by dividing the scores of the vulnerabilities to two main levels of privileges, user and root, and we classify these levels into operational levels to identify and calculate the severity cost of multi steps vulnerabilities. Finally we implement our framework on a simple network, using Nessus scanner as tool to discover known vulnerabilities and to implement the results to build and represent our cost centric attack graph.
en
FCS - Foundation of Computer Science, USA
http://research.ijcaonline.org/volume48/number14/pxc3880413.pdf
Archived with thanks to International Journal of Computer Applications
quantifying security
Cvssv2
Methodologies to develop quantitative risk evaluation metrics
Article
The goal of this work is to advance a new methodology to measure a severity cost for each host using the Common Vulnerability Scoring System (CVSS) based on base, temporal and environmental metrics by combining related sub-scores to produce a unique severity cost by modeling the problem's parameters in to a mathematical framework. We build our own CVSS Calculator using our equations to simplify the calculations of the vulnerabilities scores and to benchmark with other models. We design and develop a new approach to represent the cost assigned to each host by dividing the scores of the vulnerabilities to two main levels of privileges, user and root, and we classify these levels into operational levels to identify and calculate the severity cost of multi steps vulnerabilities. Finally we implement our framework on a simple network, using Nessus scanner as tool to discover known vulnerabilities and to implement the results to build and represent our cost centric attack graph.
ORIGINAL
pxc3880413.pdf
pxc3880413.pdf
Full-text article
application/pdf
611719
https://uobrep.openrepository.com/bitstream/10547/279153/1/pxc3880413.pdf
d6b1740405ab76e97bb4b007fd0cda53
MD5
1
true
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/279153/2/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
2
false
TEXT
pxc3880413.pdf.txt
pxc3880413.pdf.txt
Extracted Text
text/plain
32109
https://uobrep.openrepository.com/bitstream/10547/279153/5/pxc3880413.pdf.txt
c24f0c7cb758359e34f1f2552a44d7b0
MD5
5
false
THUMBNAIL
pxc3880413.pdf.jpg
pxc3880413.pdf.jpg
Generated Thumbnail
image/jpeg
2440
https://uobrep.openrepository.com/bitstream/10547/279153/4/pxc3880413.pdf.jpg
7e69157d242512142bf73ae251f80833
MD5
4
false
CC-LICENSE
license_url
license_url
text/plain
49
https://uobrep.openrepository.com/bitstream/10547/279153/6/license_url
fd26723f8d7edacdb29e3f03465c3b03
MD5
6
false
license_text
license_text
application/octet-stream
0
https://uobrep.openrepository.com/bitstream/10547/279153/8/license_text
d41d8cd98f00b204e9800998ecf8427e
MD5
8
false
license_rdf
license_rdf
application/octet-stream
23599
https://uobrep.openrepository.com/bitstream/10547/279153/7/license_rdf
9e2b7f6edbd693264102b96ece20428a
MD5
7
false
10547/279153
oai:uobrep.openrepository.com:10547/279153
2020-04-23 07:29:37.08
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
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
oai:uobrep.openrepository.com:10547/2791582020-04-23T07:29:34Zcom_10547_132192col_10547_132230
Schetinin, Vitaly
138e76ce1f24a43b1907441d43d207cb
-1
Jakaite, Livija
1eb7bc86f96c6cb363c7ba54510a717b
-1
Schult, Joachim
46951dfc2d216e5bd0a7222f4614ce84
-1
2013-04-07T16:28:18Z
2013-04-07T16:28:18Z
2011
Schetinin, V.; Jakaite, L.; Schult, J., (2011) 'Informativeness of sleep cycle features in Bayesian assessment of newborn electroencephalographic maturation,' Computer-Based Medical Systems (CBMS), 2011 24th International Symposium on: 1-6
9781457711893
10.1109/CBMS.2011.5999111
http://hdl.handle.net/10547/279158
Clinical experts assess the newborn brain development by analyzing and interpreting maturity-related features in sleep EEGs. Typically, these features widely vary during the sleep hours, and their informativeness can be different in different sleep stages. Normally, the level of muscle and electrode artifacts during the active sleep stage is higher than that during the quiet sleep that could reduce the informative-ness of features extracted from the active stage. In this paper, we use the methodology of Bayesian averaging over Decision Trees (DTs) to assess the newborn brain maturity and explore the informativeness of EEG features extracted from different sleep stages. This methodology has been shown providing the most accurate inference and estimates of uncertainty, while the use of DT models enables to find the EEG features most important for the brain maturity assessment.
en
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5999111
brain models
electroencephalography
Bayesian methods
newborn brain maturity
Informativeness of sleep cycle features in Bayesian assessment of newborn electroencephalographic maturation
Conference papers, meetings and proceedings
Clinical experts assess the newborn brain development by analyzing and interpreting maturity-related features in sleep EEGs. Typically, these features widely vary during the sleep hours, and their informativeness can be different in different sleep stages. Normally, the level of muscle and electrode artifacts during the active sleep stage is higher than that during the quiet sleep that could reduce the informative-ness of features extracted from the active stage. In this paper, we use the methodology of Bayesian averaging over Decision Trees (DTs) to assess the newborn brain maturity and explore the informativeness of EEG features extracted from different sleep stages. This methodology has been shown providing the most accurate inference and estimates of uncertainty, while the use of DT models enables to find the EEG features most important for the brain maturity assessment.
ORIGINAL
Informativeness of Sleep Cycle .pdf
Informativeness of Sleep Cycle .pdf
Full-text paper
application/pdf
825501
https://uobrep.openrepository.com/bitstream/10547/279158/1/Informativeness%20of%20Sleep%20Cycle%20.pdf
0d7f01d9595ce49630417f4838e98a7e
MD5
1
true
LICENSE
license.txt
license.txt
text/plain
1691
https://uobrep.openrepository.com/bitstream/10547/279158/2/license.txt
b79a1529374c8d02a5b1f30b27d2425e
MD5
2
false
TEXT
Informativeness of Sleep Cycle .pdf.txt
Informativeness of Sleep Cycle .pdf.txt
Extracted Text
text/plain
25573
https://uobrep.openrepository.com/bitstream/10547/279158/8/Informativeness%20of%20Sleep%20Cycle%20.pdf.txt
965580390c82c9692caad6c97bb9b005
MD5
8
false
THUMBNAIL
Informativeness of Sleep Cycle .pdf.jpg
Informativeness of Sleep Cycle .pdf.jpg
Generated Thumbnail
image/jpeg
2565
https://uobrep.openrepository.com/bitstream/10547/279158/4/Informativeness%20of%20Sleep%20Cycle%20.pdf.jpg
56eca1fab42bc8b1b214032c531335a1
MD5
4
false
CC-LICENSE
license_url
license_url
text/plain
49
https://uobrep.openrepository.com/bitstream/10547/279158/5/license_url
fd26723f8d7edacdb29e3f03465c3b03
MD5
5
false
license_text
license_text
application/octet-stream
0
https://uobrep.openrepository.com/bitstream/10547/279158/7/license_text
d41d8cd98f00b204e9800998ecf8427e
MD5
7
false
license_rdf
license_rdf
application/octet-stream
23599
https://uobrep.openrepository.com/bitstream/10547/279158/6/license_rdf
9e2b7f6edbd693264102b96ece20428a
MD5
6
false
10547/279158
oai:uobrep.openrepository.com:10547/279158
2020-04-23 07:29:34.182
University of Bedfordshire Repository
marcus.woolley@beds.ac.uk
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
xoai///col_10547_132230/100