Browsing School of Computer Science and Informatics by Title
Now showing items 2880-2899 of 2977
-
Using Pattern-of-Life as Contextual Information for Anomaly-based Intrusion Detection Systems
(Article)As the complexity of cyber-attacks keeps increasing, new robust detection mechanisms need to be developed. The next generation of Intrusion Detection Systems (IDSs) should be able to adapt their detection characteristics ... -
Using Personalized Knowledge Portal for Information and Knowledge Integrating and Sharing
(Conference)This paper introduces a personalized knowledge portal based approach to information and knowledge integration and sharing which combines the strengths of the Semantic Web and the advantages of collaborative tagging. The ... -
Using PVS for Interval Temporal Logic proofs, part 1: The syntactic and semantic encoding
(Technical Report)Interval temporal logic (ITL) is a logic that is used to specify and reason about systems. The logic has a powerful proof system but rather than doing proofs by hand, which is tedious and error prone, we want a tool that ... -
Using self organizing map to cluster Arabic crime documents.
(Conference) -
Using SWRL and ontological reasoning for the personalization of context-aware assistive services
(Conference)The prevalence and advancements of existing context-aware applications are limited in their support of personalization for the user. The increase in the use of context-aware technologies has sparked growth in assistive ... -
Using the Pattern-of-Life in Networks to Improve the Effectiveness of Intrusion Detection Systems
(Conference)As the complexity of cyber-attacks keeps increasing, new and more robust detection mechanisms need to be developed. The next generation of Intrusion Detection Systems (IDSs) should be able to adapt their detection ... -
Utilising Task-Patterns in Organisational Process Knowledge Sharing
(Book chapter)Pattern based task management has been proposed as a promising approach to work experience reuse in knowledge intensive work environments. This paper inspects the need of organisational work experience sharing and reuse ... -
Utility Promises of Self-Organising Maps in Privacy Preserving Data Mining
(Conference)Data mining techniques are highly efficient in sifting through big data to extract hidden knowledge and assist evidence-based decisions. However, it poses severe threats to individuals’ privacy because it can be exploited ... -
Utilizing cumulative population distribution information in differential evolution
(Article)Differential evolution (DE) is one of the most popular paradigms of evolutionary algorithms. In general, DE does not exploit distribution information provided by the population and, as a result, its search performance is ... -
Validation of convolutional layers in deep learning models to identify patterns in multispectral images: Identification of palm units
(Preprint)The convolutional neural networks (CNN) are considered as a particular case of the Deep Learning neural networks, and have been widely used for the extraction of features in images, audio files or text recognition. For the ... -
The validity of using non-representative users in gaze communication research.
(Conference)Gaze-based interaction techniques have been investigated for the last two decades, and in many cases the evaluation of these has been based on trials with able-bodied users and conventional usability criteria, mainly ... -
Value of Smart Data for Supply Chain Decisions in a Data Rich, Uncertain World
(Conference)Data-driven decisions are becoming increasingly relevant for supply chains as traditional paradigms are being replaced with concepts and approaches more suited for the advent of big data. However, the prevailing consensus ... -
VANET Coverage Analysis for GPS Augmentation Data in Rural Area
(Conference)Enhanced position accuracy is key for modern navigation systems, location based services and applications based on Inter-Vehicle Communication (IVC). Position data are the foundation for deriving vehicle trajectories ...