Skip to main content

Research Repository

Advanced Search

All Outputs (125)

Reproducing "Show, attend and tell: Neural image caption generation with visual attention" (2023)
Journal Article
Liu, H., & Brailsford, T. (2023). Reproducing "Show, attend and tell: Neural image caption generation with visual attention". Journal of Physics: Conference Series, 2589(1), Article 012012. https://doi.org/10.1088/1742-6596/2589/1/012012

This paper replicates the experiment presented in the work of Xu et al. [1], and examines errors in the generated captions. The analysis of the identified errors aims to provide deeper insight into the underlying causes. This study also encompass... Read More about Reproducing "Show, attend and tell: Neural image caption generation with visual attention".

Static analysis of security issues of the Python packages ecosystem (2023)
Journal Article
Gorine, A., & Spondon, F. (2023). Static analysis of security issues of the Python packages ecosystem. World Academy of Science, Engineering and Technology, 17(3), 33-40

Python is considered the most popular programming language and offers its own ecosystem for archiving and maintaining open-source software packages. This system is called the python package index (PyPI), the repository of this programming language. U... Read More about Static analysis of security issues of the Python packages ecosystem.

Interactive cyber-physical system hacking: Engaging students early using scalextric (2023)
Journal Article
White, J., Legg, P., & Mills, A. (2023). Interactive cyber-physical system hacking: Engaging students early using scalextric. Journal of The Colloquium for Information Systems Security Education, 10(1), 6. https://doi.org/10.53735/cisse.v10i1.163

Cyber Security as an education discipline covers a variety of topics that can be challenging and complex for students who are new to the subject domain. With this in mind, it is crucial that new students are motivated by understanding both the techni... Read More about Interactive cyber-physical system hacking: Engaging students early using scalextric.

Real world prospective evaluation of clinical outcomes in patients with non-metastatic castrate resistant prostate cancer treated with darolutamide (2023)
Journal Article
Challapali, A., Rennison, E., White, P., Elumalai, T., Parikh, O., Vickers, A., …Bahl, A. (2023). Real world prospective evaluation of clinical outcomes in patients with non-metastatic castrate resistant prostate cancer treated with darolutamide. Journal of Clinical Oncology, 41(6_suppl), 335. https://doi.org/10.1200/JCO.2023.41.6_suppl.335

Background: The RECORD Study is a real world data, prospective evaluation of clinical outcomes in patients with nmCRPC treated with Darolutamide. This study will increase the understanding of treatment response and management and in particular inform... Read More about Real world prospective evaluation of clinical outcomes in patients with non-metastatic castrate resistant prostate cancer treated with darolutamide.

Modelling interrelationship between diseases with communicating stream x-machines (2022)
Journal Article
Jayatilake, D., Phung, K., Ogunshile, E., & Aydin, M. (2022). Modelling interrelationship between diseases with communicating stream x-machines. Proceedings of the Institute for System Programming of the RAS, 34(6), 147-164. https://doi.org/10.15514/ispras-2022-34%286%29-11

The world is moving towards alternative medicine and behavioural alteration for treating, managing, and preventing chronical diseases. In the last few decades, diagrammatical models have been extensively used to describe and understand the behaviou... Read More about Modelling interrelationship between diseases with communicating stream x-machines.

Proposing an algorithm for UAVs interoperability: MAVLink to STANAG 4586 for securing communication (2021)
Journal Article
Khan, N. A., Jhanjhi, N. Z., Brohi, S. N., & Almusaylim, Z. A. (2021). Proposing an algorithm for UAVs interoperability: MAVLink to STANAG 4586 for securing communication. Lecture Notes in Networks and Systems, 248, 413-423. https://doi.org/10.1007/978-981-16-3153-5_44

Recently, the use of unmanned aerial vehicles has become increased rapidly in both civilian and military applications. With the increased popularity and wide range of applications, these systems’ global manufacturer market has also been improved. UAV... Read More about Proposing an algorithm for UAVs interoperability: MAVLink to STANAG 4586 for securing communication.

Comparing agent-based control architectures for next generation telecommunication network infrastructures (2020)
Journal Article
Perez Hernandez, M., McFarlane, D., Herrera, M., Jain, A. K., & Parlikad, A. K. (2020). Comparing agent-based control architectures for next generation telecommunication network infrastructures. IFAC-PapersOnLine, 53(2), 11062-11067. https://doi.org/10.1016/j.ifacol.2020.12.238

Multi-agent systems have been an effective choice for designing control systems that are flexible and agile. However, few attention has been given to the evaluation of the architectures of such systems. This becomes critical with the emerging require... Read More about Comparing agent-based control architectures for next generation telecommunication network infrastructures.

Detecting ransomware using process behavior analysis (2020)
Journal Article
Arabo, A., Dijoux, R., Poulain, T., & Chevalier, G. (2020). Detecting ransomware using process behavior analysis. Procedia Computer Science, 168, 289-296. https://doi.org/10.1016/j.procs.2020.02.249

Ransomware attacks are one of the biggest and attractive threats in cyber security today. Anti-virus software's are often inefficient against zero-day malware and ransomware attacks, important network infections could result in a large amount of data... Read More about Detecting ransomware using process behavior analysis.

Blockchain and edge computing–based architecture for participatory smart city applications (2019)
Journal Article
Khan, Z., Abbasi, A. G., & Pervez, Z. (2020). Blockchain and edge computing–based architecture for participatory smart city applications. Concurrency and Computation: Practice and Experience, 32(12), Article e5566. https://doi.org/10.1002/cpe.5566

© 2019 John Wiley & Sons, Ltd. Smart cities aim to provide smart governance with the emphasis on gaining high transparency and trust in public services and enabling citizen participation in decision making processes. This means on the one hand data... Read More about Blockchain and edge computing–based architecture for participatory smart city applications.

A switching multi-level method for the long tail recommendation problem (2019)
Journal Article
Alshammari, G., Jorro-Aragoneses, J. L., Polatidis, N., Kapetanakis, S., Pimenidis, E., & Petridis, M. (2019). A switching multi-level method for the long tail recommendation problem. Journal of Intelligent and Fuzzy Systems, 37(6), 7189-7198. https://doi.org/10.3233/JIFS-179331

© 2019 - IOS Press and the authors. All rights reserved. Recommender systems are decision support systems that play an important part in generating a list of product or service recommendations for users based on the past experiences and interactions.... Read More about A switching multi-level method for the long tail recommendation problem.

Accuracy comparison of machine learning algorithms for predictive analytics in higher education (2019)
Journal Article
Brohi, S. N., Pillai, T. R., Kaur, S., Kaur, H., Sukumaran, S., & Asirvatham, D. (2019). Accuracy comparison of machine learning algorithms for predictive analytics in higher education. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 285, 254-261. https://doi.org/10.1007/978-3-030-23943-5_19

In this research, we compared the accuracy of machine learning algorithms that could be used for predictive analytics in higher education. The proposed experiment is based on a combination of classic machine learning algorithms such as Naive Bayes an... Read More about Accuracy comparison of machine learning algorithms for predictive analytics in higher education.

A review and survey on smartphones: The closest enemy to privacy (2019)
Journal Article
Jayakumar, P., Lawrence, L., Chean, R. L. W., & Brohi, S. N. (2019). A review and survey on smartphones: The closest enemy to privacy. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 285, 106-118. https://doi.org/10.1007/978-3-030-23943-5_8

Smartphones have changed the world from a primitive to a high-tech standpoint. However, there have been many incidents where third parties have used confidential data of the users without their consent. Thus, it causes people to be paranoid and distr... Read More about A review and survey on smartphones: The closest enemy to privacy.

Mapping wildlife species distribution with social media: Augmenting text classification with species names (2018)
Journal Article
Jeawak, S. S., Jones, C. B., & Schockaert, S. (2018). Mapping wildlife species distribution with social media: Augmenting text classification with species names. LIPIcs, 114, https://doi.org/10.4230/LIPIcs.GIScience.2018.34

© Shelan S. Jeawak, Christopher B. Jones, and Steven Schockaert. Social media has considerable potential as a source of passive citizen science observations of the natural environment, including wildlife monitoring. Here we compare and combine two ma... Read More about Mapping wildlife species distribution with social media: Augmenting text classification with species names.

Managing Congestion in Vehicular Networks Using Tabu Search (2018)
Journal Article
Ishaq, M., Malik, M. H., & Aydin, M. E. (2018). Managing Congestion in Vehicular Networks Using Tabu Search. Communications in Computer and Information Science, 893, 118-129. https://doi.org/10.1007/978-3-319-98204-5_10

© 2018, Springer Nature Switzerland AG. In this era of communication, exponentially growing networks bring a lot of challenges to address for smoother network functionalities. Among them is efficiency in handling packet traffic to avoid and control c... Read More about Managing Congestion in Vehicular Networks Using Tabu Search.

A systematic review of interaction in search-based software engineering (2018)
Journal Article
Ramirez, A., Romero, J. R., & Simons, C. (2019). A systematic review of interaction in search-based software engineering. IEEE Transactions on Software Engineering, 45(8), 760-781. https://doi.org/10.1109/TSE.2018.2803055

IEEE Search-Based Software Engineering (SBSE) has been successfully applied to automate a wide range of software development activities. Nevertheless, in those software engineering problems where human evaluation and preference are crucial, such insi... Read More about A systematic review of interaction in search-based software engineering.

A resource-aware preference model for context-aware systems (2018)
Journal Article
Uddin, I., & Rakib, A. (2018). A resource-aware preference model for context-aware systems. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 217, 3-13. https://doi.org/10.1007/978-3-319-77818-1_1

© 2018, ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. In mobile computing, context-awareness has recently emerged as an effective approach for building adaptive pervasive computing applications. Many of... Read More about A resource-aware preference model for context-aware systems.

Reproducibility of experiments in recommender systems evaluation (2018)
Journal Article
Polatidis, N., Kapetanakis, S., Pimenidis, E., & Kosmidis, K. (2018). Reproducibility of experiments in recommender systems evaluation. IFIP Advances in Information and Communication Technology, 519, 401-409. https://doi.org/10.1007/978-3-319-92007-8_34

© IFIP International Federation for Information Processing 2018 Published by Springer International Publishing AG 2018. All Rights Reserved. Recommender systems evaluation is usually based on predictive accuracy metrics with better scores meaning rec... Read More about Reproducibility of experiments in recommender systems evaluation.

Selecting Display Products for Furniture Stores Using Fuzzy Multi-criteria Decision Making Techniques (2018)
Journal Article
Uygun, Ö., Güven, İ., Şimşir, F., & Aydin, M. E. (2018). Selecting Display Products for Furniture Stores Using Fuzzy Multi-criteria Decision Making Techniques. Communications in Computer and Information Science, 893, 181-193. https://doi.org/10.1007/978-3-319-98204-5_15

© 2018, Springer Nature Switzerland AG. Efficient marketing in which the right products are supplied to the right consumer plays a crucial role for a profitable business in the age of highly accessible and competitive global market. This fact enforce... Read More about Selecting Display Products for Furniture Stores Using Fuzzy Multi-criteria Decision Making Techniques.

Feature and performance comparison of the V-REP, Gazebo and ARGoS robot simulators (2018)
Journal Article
Pitonakova, L., Giuliani, M., Pipe, A., & Winfield, A. (2018). Feature and performance comparison of the V-REP, Gazebo and ARGoS robot simulators. Lecture Notes in Artificial Intelligence, 10965 LNAI, 357-368. https://doi.org/10.1007/978-3-319-96728-8_30

© Springer International Publishing AG, part of Springer Nature 2018. In this paper, the characteristics and performance of three open-source simulators for robotics, V-REP, Gazebo and ARGoS, are thoroughly analysed and compared. While they all allow... Read More about Feature and performance comparison of the V-REP, Gazebo and ARGoS robot simulators.

Diversifying search in bee algorithms for numerical optimisation (2018)
Journal Article
Düg̃enci, M., & Aydin, M. E. (2018). Diversifying search in bee algorithms for numerical optimisation. Lecture Notes in Artificial Intelligence, 11056 LNAI, 132-144. https://doi.org/10.1007/978-3-319-98446-9_13

© Springer Nature Switzerland AG 2018. Swarm intelligence offers useful instruments for developing collective behaviours to solve complex, ill-structured and large-scale problems. Efficiency in collective behaviours depends on how to harmonise the in... Read More about Diversifying search in bee algorithms for numerical optimisation.