School of Computer Science and Informatics
Permanent URI for this collection
Browse
Browsing School of Computer Science and Informatics by Type "Book"
Now showing 1 - 20 of 66
Results Per Page
Sort Options
Item Metadata only Activity Recognition in Pervasive Intelligent Environments(Atlantis Press, 2011) Chen, Liming; Nugent, Chris; Biswas, J.; Hoey, J.This book consists of a number of chapters addressing different aspects of activity recognition, roughly in three main categories of topics. The first topic will be focused on activity modeling, representation and reasoning using mathematical models, knowledge representation formalisms and AI techniques. The second topic will concentrate on activity recognition methods and algorithms. Apart from traditional methods based on data mining and machine learning, we are particularly interested in novel approaches, such as the ontology-based approach, that facilitate data integration, sharing and automatic/automated processing. In the third topic we intend to cover novel architectures and frameworks for activity recognition, which are scalable and applicable to large scale distributed dynamic environments. In addition, this topic will also include the underpinning technological infrastructure, i.e. tools and APIs, that supports function/capability sharing and reuse, and rapid development and deployment of technological solutions. The fourth category of topic will be dedicated to representative applications of activity recognition in intelligent environments, which address the life cycle of activity recognition and their use for novel functions of the end-user systems with comprehensive implementation, prototyping and evaluation. This will include a wide range of application scenarios, such as smart homes, intelligent conference venues and cars.Item Metadata only Advances in Mobile Computing and Multimedia, Special Issue of the International Journal of Pervasive computing and Communications(Emerald Group Publishing Limited, 2014-02) Chen, Liming; Mayrhofer, Rene; Steinbauer, M.This is the first issue of Volume 10 of the International Journal of Pervasive Computing and Communication, which commences the tenth year of this journal which has served a large community of researchers and academics around the world with the highest quality articles reporting on the state-of-the-art research results and scientific findings in the field of pervasive computing and communication. This issue consists of a collection of selected high-quality papers from MoMM2013 conference. The International Conference on Advances in Mobile Computing and Multimedia (MoMM) is one of the flagship conferences organised by the International Organization for Information Integration and Web-based Applications & Services (iiWAS) which aims at fostering collaborations and exchanges of ideas and information among students, professionals and researchers interested in the field of information integration and web applications and services. MoMM conferences have particular focuses on underlying models, protocols, algorithms, mechanisms and technology infrastructure which enable mobile platforms and interaction for various multimedia services. The selected papers represent and reflect the latest state of the art of research and development in these related areas which help identify opportunities and challenges for interested researchers and technology and system developers and inspire and provoke follow-up research in the time to come. The paper "Integrating the audience into a theatre performance using mobile devices" describes the Theatre Engine project which explores the integration of mobile devices such as smart phones and tablet computers as user interaction mechanisms for live theatrical performances. The platform used in the project consists of a network of mobile Android-based devices that communicate with a server managing a live theatrical performance and additional systems that provide projected graphics within the performance space, dynamic instructions to live musicians and control of theatrical equipment including robotic lighting. The system is under the live control of a stage managers and show runner. This paper describes the technical details of the approach and system platform including the classification of the roles of users and their activities. It also explores the concept of blurring the distinction between real and virtual performance. The paper "A scalable clustering scheme and its performance evaluation" addresses one of the key fundamental problems in Mobile Ad hoc Networks (MANETs), namely scalability. The paper introduces a new, efficient and scalable, clustering scheme for MANETs, and further conducts performance evaluation by simulating a MANETs of a large number of mobile nodes. Comparison between the performance of the proposed scheme with a number of existing clustering schemes such as lowest ID, highest degree and WCA, based on a number of performance metrics has shown that the proposed scheme outperforms other clustering schemes. The paper "Exploring network selection techniques for multicast groups in heterogeneous wireless environments" aims to address the challenging problem of coexistence of various wireless access networks and the ability of mobile terminals to make an optimal selection of serving networks for multicast groups by switching dynamically among different networks. The study analyzes the operation of the wireless heterogeneous network, including the decision-making process and the data that needs to be sent between different network components. Based on this analysis it built a mathematical model of the network and defined a minimization algorithm of multicast streams in the system. It has been proved that the proposed heuristic solutions substantially reduce usage of bandwidth in mobile networks and exchange of information between the network components. The paper "Modelling users, context and devices for adaptive user interface systems" provides a comprehensive review on the state-of-the-art of adaptive user interface systems. It studies and compares adaptive user interface systems over the past 20 years. Based on this analysis the authors detail the most significant models from which a specific novel model incorporating three main entities, i.e. users, context and devices have been proposed and elaborated. The paper "SmartCopter – enabling autonomous flight in indoor environments with a smartphone as on-board processing unit" introduces a low-cost unmanned aerial vehicle (UAV) for autonomous flight and navigation in GPS-denied environments using an off-the-shelf smartphone as its core on-board processing unit. The research adopts an algorithmic approach for mapping and localization that does not require GPS coverage of the target area, therefore autonomous indoor navigation is made possible. The approach is independent from additional ground hardware and the UAV core unit can be easily replaced with more powerful hardware that simplifies set-up updates as well as maintenance. The study opens up future research on 3D self-localization and dense mapping using mobile hardware as the only on-board processing unit. The paper "An investigation into the usability of touch-based interaction" aims to investigate the usability of touch-based user interfaces with the ultimate purpose of providing guidance for user interface designers and developers. The study adopts an empirical approach using an experiment to test the effectiveness and user satisfaction of touch-based interaction compared with equivalent mouse-based interaction. Two abstract type tasks and one contextualised task using the two methods of interaction have been designed for the study. The experimental data have been measured and analysed based on errors, task time and user satisfaction, which has shown that overall the mouse-based interaction was faster, caused fewer errors and was preferred by the participants. I would like to take this opportunity to thank all authors for their valuable contributions and also the EIC Ismail Khalil and the journal editorial board for providing this opportunity to publish these articles in this special issue. We would like to also thank the publishers Wendy Lynch and Kieran Booluck for their continuous support, advice and hard work.Item Metadata only Ambient Assisted Living and Daily Activities(Springer, 2014-12) Pecchia, Leandro; Chen, Liming; Nugent, Chris; Bravo, JoseThis book constitutes the refereed proceedings of the 6th International Workshop on Ambient Assisted Living, IWAAL 2014, held in Belfast, UK, in December 2014. The 42 full papers presented with 12 papers of the workshop WAGER 2014 and 10 papers of a special session HTA were carefully reviewed and selected from numerous submissions. The focus of the papers is on following topics: ADL detection, recognition, classification; behavioural changes, coaching and education; AAL design and technical evaluation; expression, mood and speech recognition; health monitoring, risk prediction and assessment; localization; and user preferences, usability, AAL acceptance and adoption.Item Metadata only Animated Human-like Affective Agent Design for Virtual Environments(Lambert Academic Publishing, 2012-09-25) Chen, LimingThis book describes the architecture and methodology of building animated human-like interface agents that act as and interact with human users to accomplish tasks in dynamic, inhabited virtual worlds. By animated human-like interface agents we mean intelligent autonomous agents with human embodiment and human-level intelligence from low-level reflective action to high-level motivational and emotional behaviour. The book presents a cognitively inspired affective control architecture that marries the traditional deliberative paradigm with the currently prevailing behaviour-based approaches. The distinguishing features of the architecture are that it adopts a cognitive modelling approach based on a highly developed logical formalism and incorporates an explicit computational model for motivations and emotions. To help implement cognitive and affective models, a declarative programming language for knowledge representation, planning and affective computation has been developed, and an animation engine based on the layered animation methodology has been designed, which provides the agent with believable appearance and realistic motions.Item Metadata only An Anthropology of Robots and AI: Annihilation Anxiety and Machines(Routledge, 2015-02-14) Richardson, KathleenThis book explores the making of robots in labs at the Massachusetts Institute of Technology (MIT). It examines the cultural ideas that go into the making of robots, and the role of fiction in co-constructing the technological practices of the robotic scientists. The book engages with debates in anthropological theorizing regarding the way that robots are reimagined as intelligent, autonomous and social and weaved into lived social realities. Richardson charts the move away from the “worker” robot of the 1920s to the “social” one of the 2000s, as robots are reimagined as companions, friends and therapeutic agents.Item Open Access Applications of Evolutionary Computing, EvoWorkshops 2007: EvoCoMnet, EvoFIN, EvoIASP,EvoINTERACTION, EvoMUSART, EvoSTOC and EvoTransLog, Proceedings(Springer, 2007-04) Giacobini, Marco; Yang, ShengxiangItem Metadata only Applications of evolutionary computing: EvoWorkshops 2008: EvoCOMNET, EvoFIN, EvoHOT, EvoIASP, EvoMUSART, EvoNUM, EvoSTOC, and EvoTransLog, Naples, Italy, March 26-28, 2008. Proceedings.(Springer-Verlag., 2008) Giacobini, Marco; Yang, ShengxiangItem Metadata only Applications of evolutionary computing: EvoWorkshops 2009: EvoCOMNET, EvoENVIRONMENT, EvoFIN, EvoGAMES, EvoHOT, EvoIASP, EvoINTERACTION, EvoMUSART, EvoNUM, EvoSTOC, EvoTRANSLOG, Tübingen, Germany, April 15-17, 2009. Proceedings.(Springer-Verlag, 2009) Giacobini, Mario; Yang, ShengxiangItem Metadata only Artificial Intelligence for a Better Future(Springer, 2021) Stahl, Bernd Carsten, 1968-This open access book proposes a novel approach to Artificial Intelligence (AI) ethics. AI offers many advantages: better and faster medical diagnoses, improved business processes and efficiency, and the automation of boring work. But undesirable and ethically problematic consequences are possible too: biases and discrimination, breaches of privacy and security, and societal distortions such as unemployment, economic exploitation and weakened democratic processes. There is even a prospect, ultimately, of super-intelligent machines replacing humans. The key question, then, is: how can we benefit from AI while addressing its ethical problems? This book presents an innovative answer to the question by presenting a different perspective on AI and its ethical consequences. Instead of looking at individual AI techniques, applications or ethical issues, we can understand AI as a system of ecosystems, consisting of numerous interdependent technologies, applications and stakeholders. Developing this idea, the book explores how AI ecosystems can be shaped to foster human flourishing. Drawing on rich empirical insights and detailed conceptual analysis, it suggests practical measures to ensure that AI is used to make the world a better place.Item Embargo Artificial Intelligence in Healthcare: Recent Applications and Developments(Springer, 2022-10-27) Khuman, A. S.; Chen, Tianhua; Carter, Jenny; Mufti, MahmudRecent advances in artificial intelligence (AI) and machine learning have witnessed many successes in various disciplines including the healthcare sector. Innovations in intelligent medical systems have revolutionized the way in which healthcare services are provided, ranging from making clinical diagnosis, developing personalized treatment and drugs, assisting patient monitoring, to automating administrative tasks and reducing operational costs. In this book, the authors present key applications in the general area of health care, where AI has made significant successes. From the individual chapters, the readers will be provided with a range of examples to illustrate the wide plethora of application domains utilizing state-of-the-art AI techniques, proving credence to the versatility and effectiveness of an AI approach in health care and medicine. We envisage that this book is ideal for individuals new to the notion of AI in health care, equally, early career academics who wish to further expand on their knowledge in AI in medicine. What will be presented is in no means an exhaustive list of applications, but most definitely a varied one.Item Metadata only CAT 2010: Ideas Before Their Time: Connecting the Past and Present in Computer Art (eWIC)(BCS, 2010) Franco, Francesca; Lambert, N.; Gardiner, J.Item Metadata only A comparative study of the INTEL 8086, ZILOG Z8000 and MOTOROLA MC68000(Sira Ltd, 1982-03) Goodyer, E. N.; Neylan, P.An comparative study of the Motorola 68000, Zilog Z8000 and Intel 8086Item Metadata only Constructive neural network.(Springer, 2009-11) Franco, Leonardo; Elizondo, David; Jerez, JoseItem Metadata only Context-Aware and Adaptive Usage Control Model(Scholars' Press, 2016-03-22) Almutairi, Abdulgader; Siewe, FrancoisProducing an adaptive usage control model that is compatible with UbiComp environments is a challenging task. A ubicomp system must be able to adapt its behavior based on its environment. Thus, it must respond to change in current context if it is to deliver an adaptive service. The security system that is utilized in an ubicomp environment (in order to control access in adaptive services) must accordingly be context-aware. CA-UCON model enables adaptation to environmental changes in the aim of preserving continuity of access and enhances the quality of services, striving to keep explicit interactions with the user at a minimum.Item Metadata only Cybersecurity Education for Awareness and Compliance(IGI Global, 2019-03) Vasileiou, Ismini; Furnell, StevenItem Embargo Cybersecurity Issues in Emerging Technologies(CRC press, 2021-10) Maglaras, Leandros; Kantzavelou, IoannaThe threat landscape is evolving with tremendous speed. We are facing an extremely fast-growing attack surface with a diversity of attack vectors, a clear asymmetry between attackers and defenders, billions of connected IoT devices, mostly reactive detection and mitigation approaches, and finally big data challenges. The clear asymmetry of attacks and the enormous amount of data are additional arguments to make it necessary to rethink cybersecurity approaches in terms of reducing the attack surface, to make the attack surface dynamic, to automate the detection, risk assessment, and mitigation, and to investigate the prediction and prevention of attacks with the utilization of emerging technologies like blockchain, artificial intelligence and machine learning. This book contains eleven chapters dealing with different Cybersecurity Issues in Emerging Technologies. The issues that are discussed and analyzed include smart connected cars, unmanned ships, 5G/6G connectivity, blockchain, agile incident response, hardware assisted security, ransomware attacks, hybrid threats and cyber skills gap. Both theoretical analysis and experimental evaluation of state-of-the-art techniques are presented and discussed. Prospective readers can be benefitted in understanding the future implications of novel technologies and proposed security solutions and techniques. Graduate and postgraduate students, research scholars, academics, cybersecurity professionals, and business leaders will find this book useful, which is planned to enlighten both beginners and experienced readers.Item Metadata only Data Mining in Pervasive Environments(Elsevier, 2015-02) Roy, N.; Holder, L.; Chen, Liming; Rashidi, P.this is a special issue describing the latest development of data mining techniques in pervasive computing.Item Metadata only Development of Secure Systems: A Compositional Approach(VDM Verlag, 2010-11-19) Siewe, FrancoisInformation security is critical to economies, communities, governments, social networking and safety of citizens. With the advent of the Internet and the rapid development of Internet-based application such as e-commerce, e-government and social network systems, it is paramount that mechanisms are put in place to ensure the security of information stored and exchanged in such a worldwide and open distributed system. This book presents a unified compositional formal framework for the specification of the functional, temporal and security requirements of systems. This provides an effective way of integrating security concerns into the system requirements and to address them early in the system development life cycle so that security holes can be detected and fixed timely. The book contains a great deal of material for students, lecturers, researchers and practitioners in the field of information security.Item Metadata only Developments in soft computing(Physica Verlag, 2001) John, Robert, 1955-; Birkenhead, Ralph, 1955-Item Metadata only Emerging studies and applications of grey systems(Springer, 2023-02-06) Yang, Yingjie; Liu, SifengAt a time when most researchers and businesses are talking about Big Data, small and incomplete data are never far away from us. In fact, most of our decisions are made under incomplete and small data. There are many areas where small and incomplete data are inevitable, such as health care, traffic management, economic analysis, etc. The theory of grey systems emerged as a novel solution to deal with small and incomplete data, and it is attracting more and more attention from researchers and professionals in different disciplines. It has the ability to establish models from extremely limited data under uncertainty, which is usually difficult for other models. Although grey systems provide powerful capability in data analysis, its impacts in applications have mainly materialized in China. I have frequently received questions regarding the differences between Grey systems and other related models, and to provide examples of their real world use. To promote grey systems and its applications, an international research network was formed under the support of the Leverhulme Trust in 2015. The leading experts from UK, China, Canada, Romania and Spain formed the core of the network. A number of activities were conducted to foster the collaboration between members of the network. As a result, the international association of grey systems and uncertainty analysis was established in 2016. Through our discussion in the network and the association, it was deemed necessary to assemble the latest advance in this field to clarify confusions between grey systems and grey sets with other models, and provide a collection of successful application cases as guidance for people interested in applying grey systems to their problems. Therefore, a collection of contributions from our network partners and leading experts in the field is put together to form this book. The contributors include world leading experts as well as a new generation of research leaders from both Europe and China. The application covers many different disciplines, ranging from social economics to engineering, energy and management. The book focuses mainly on two themes: 1. The connection between grey systems and other related models, such as fuzzy sets and rough sets (chapter 3-5). 2. Successful real world applications in different disciplines (chapter 6-12). To introduce to the readers who have no background in grey systems, a brief introduction is also included (chapter 1-2). Chapter 1 is a general overview of the whole field of grey systems and its recent development. It helps the readers to see the development and the state of the art of this field. Chapter 2 then gives a brief introduction to the fundamental concepts in grey systems, especially grey models so as to enable the readers to understand other chapters. These two chapters lay the essential backgrounds for the contents in other chapters. Chapter 3 then moves into the connection between grey systems, especially grey sets with various fuzzy sets and rough sets. It helps to clarify the confusions between grey systems and fuzzy sets and rough sets. Chapter 4 focuses on the hybridization of grey systems with neural-fuzzy systems and illustrates how they can be integrated together. Chapter 5 puts grey systems into a more general level and puts forward the novel concept of grey knowledge. These three chapters demonstrate the distinctive and collaborative features of grey systems in uncertainty modelling. Starting from Chapter 6, the remaining chapters cover various real world application studies. Chapter 6 reveals how to apply grey systems in economic studies using agent-based systems. Chapter 7 demonstrates how grey systems help with the short term forecasting of traffic flow. Chapter 8 illustrates how grey models are applied to predict and manage Yellow River ice disasters in China. Chapter 9 showcases the application of grey systems to social network data analysis. Chapter 10 gives some case studies in applying grey systems into the energy-economic system. Chapter 11 explains how to select business strategy using grey stratified decisions model. Finally, Chapter 12 illustrates a cost level analysis for the components of the smartphones using greyness based quality function deployment. The cases studies in Chapter 6-12 covers a wider range of disciplines, geographical areas and different culture backgrounds, and it can serve as a useful reference for practitioners challenged by small and incomplete data. Combined with the connections covered in Chapter 3-5 and the basics in Chapter 1-2, this book will provide a convenient handbook for the practical application of grey systems.