Now showing items 151-160 of 162
Modeling Users, Context and Devices for Ambient Assisted Living Environments
The participation of users within AAL environments is increasing thanks to the capabilities of the current wearable devices. Furthermore, the significance of considering user’s preferences, context conditions and device’s ...
Automatic Dataset Labelling and Feature Selection for Intrusion Detection Systems
Correctly labelled datasets are commonly required. Three particular scenarios are highlighted, which showcase this need. When using supervised Intrusion Detection Systems (IDSs), these systems need labelled datasets to be ...
Explicit Almost P-Stable Runge-Kutta-Nyström Methods for the Numerical Solution of the Two-Body Problem
In this paper, three families of explicit Runge–Kutta–Nyström methods with three stages and third algebraic order are presented. Each family consists of one method with constant coefficients and one corresponding optimized ...
Why do international research collaborations last? Virtuous circle of feedback loops, continuity and renewal
(Science and Public Policy, 2014-10-13)
It is often argued that the unintended consequences of science policy transformation over the last 50 years—increased role of fixed-term project funding, evaluation and temporary contracts—are short-termism, fragmentation ...
Android Malware Detection Using Parallel Machine Learning Classifiers
Mobile malware has continued to grow at an alarming rate despite on-going mitigation efforts. This has been much more prevalent on Android due to being an open platform that is rapidly overtaking other competing platforms ...
k-strong privacy for radio frequency identification authentication protocols based on physically unclonable functions
(Wiley Online Library, 2014-06-03)
This paper examines Vaudenay’s privacy model, which is one of the first and most complete privacy models that featured the notion of different privacy classes. We enhance this model by introducing two new generic adversary ...
A 6(4) optimized embedded Runge–Kutta–Nyström pair for the numerical solution of periodic problems
In this paper an optimization of the non-FSAL embedded RKN 6(4) pair with six stages of Moawwad El-Mikkawy, El-Desouky Rahmo is presented. The new method is derived after applying phase-fitting and amplification-fitting ...
Models for Computational Emotions from Psychological Theories Using Type-II Fuzzy Logic
Cluster-Based Population Initialization for differential evolution frameworks
Abstract This article proposes a procedure to perform an intelligent initialization for population-based algorithms. The proposed pre-processing procedure, namely Cluster-Based Population Initialization (CBPI) consists of ...