Browsing School of Computer Science and Informatics by Title
Now showing items 1285-1304 of 2966
-
Hacking Technological Practices and the Vulnerability of the Modern Hero
(Article)This reply to Gunkel and Zwart further reflects on, and responds to, the following main points: the Heideggerian character of my view and the potential link to Kafka (Gunkel), the suggestion that we should become hackers ... -
Handbook of Memetic Algorithms
(Book) -
Handling constrained many-objective optimization problems via problem transformation
(Article)Objectives optimization and constraints satisfaction are two equally important goals to solve constrained many-objective optimization problems (CMaOPs). However, most existing studies for CMaOPs can be classified as ... -
Handling Non-Separability in Three Stage Memetic Exploration
(Conference) -
Head tracked 3D displays
(Article) -
Head tracked auto-stereoscopic displays.
(Book chapter) -
The health behaviour and wellbeing of older seafarers on Merseyside — indicated changes through brief interventions
(Article)Background: There is significant evidence of the poor health of seafarers that arises both from the rigours of their trade and, for many, the associated lifestyles. Such poor health can continue in later life. The objective ... -
Healthcare Facility Coverage for Malaria and Sickle Cell Disease Treatment: A Spatial Analysis of Ikorodu Local Government Area of Lagos State
(Article)The escalating population growth in Nigeria calls for urgent attention to malaria control and the provision of accessible public health care for treatment of the disease (appropriate malaria treatment and intervention ... -
Healthcare in the Smart Home: A Study of Past, Present and Future
(Article)Ubiquitous or Pervasive Computing is an increasingly used term throughout the technology industry and is beginning to enter the consumer electronics space in its most recent form under the umbrella term: “Internet of ... -
HEART-IS: A Novel Technique for Evaluating Human Error-Related Information Security Incidents
(Article)Organisations continue to suffer information security incidents and breaches as a result of human error even though humans are recognised as the weakest link with regard to information security. Despite this level of ... -
Heavy Duty Vehicle Fuel Consumption Modelling Using Artificial Neural Networks.
(Conference)In this paper an artificial neural network (ANN) approach to modelling fuel consumption of heavy duty vehicles is presented. The proposed method uses easy accessible data collected via CAN bus of the truck. As a benchmark ... -
Helium3D: A laser-based 3D display with '3D+' capability.
(Conference) -
HELIUM3D: A laser‐scanning head‐tracked autostereoscopic display
(Article)A multi-user aurostereoscopic display based on laser scanning is described in this paper. It does not require the wearing of special glasses; it can provide 3D to several viewers who have a large degree of freedom of ... -
Heterogeneous System-on-Chip based Lattice-Boltzmann Visual Simulation System
(Article)Cerebral aneurysm is a cerebrovascular disorder caused by a weakness in the wall of an artery or vein, that causes a localised dilation or ballooning of the blood vessel. It is life-threatening, hence an early and accurate ... -
Hidden Markov Models and Alert Correlations for the Prediction of Advanced Persistent Threats
(Article)Cyber security has become a matter of a global interest and several attacks target industrial companies and governmental organisations. The Advanced Persistent Threats (APTs) have emerged as a new and complex version of ...