Now showing items 21-40 of 1210

    • Addressing Mechanisms for VLIW and Superscalar Processors 

      Steven, F.L.; Adams, R.G.; Steven, G.B.; Wang, L.; Whale, D. (1993)
      RISC processors employ simple addressing modes which allow memory addresses to be calculated in a single processor cycle. This paper demonstrates that VLIW and Superscalar processor performance can be improved by further ...
    • Advanced PON topologies with wireless connectivity 

      Milosavljevic, M.; Kourtessis, P.; Gliwan, A.; Senior, J.M. (Institute of Electrical and Electronics Engineers (IEEE), 2009)
      The interoperability of wireless and PON networking solutions is investigated to reduce deployment expenditure by means of centralised network management while providing ubiquitous access connections and mobility. Network ...
    • Affordable robot mapping using omnidirectional vision 

      Bamorovat Abadi, Mohammad; Shahabian Alashti, Mohamad Reza; Holthaus, Patrick; Menon, Catherine; Amirabdollahian, Farshid (EPSRC UK-RAS Network, 2021-07-15)
      Mapping is a fundamental requirement for robot navigation.In this paper, we introduce a novel visual mapping method that relies solely on a single omnidirectional camera.We present a metric that allows us to generate a map ...
    • The Agent-Based Perspective on Imitation 

      Dautenhahn, K.; Nehaniv, C.L. (MIT Press, 2002)
      This chapter presents the agent-based perspective on imitation. In this perspective, imitation is best considered as the behaviour of an autonomous agent in relation to its environment, including other autonomous agents. ...
    • The AI Settlement Generation Challenge in Minecraft : First Year Report 

      Salge, Christoph; Green, Michael Cerny; Canaan, Rodrigo; Skwarski, Filip; Fritsch, Rafael; Brightmoore, Adrian; Ye, Shaofang; Cao, Changxing; Togelius, Julian (2020-03-01)
      This article outlines what we learned from the first year of the AI Settlement Generation Competition in Minecraft, a competition about producing AI programs that can generate interesting settlements in Minecraft for an ...
    • Algebraic analysis of the computation in the Belousov-Zhabotinsky reaction 

      Dini, P.; Nehaniv, C.L.; Egri-Nagy, A.; Schilstra, M. (Springer Nature, 2012)
      We analyse two very simple Petri nets inspired by the Oregonator model of the Belousov-Zhabotinsky reaction using our stochastic Petri net simulator. We then perform the Krohn-Rhodes holonomy decomposition of the automata ...
    • Algebraic connectivity 

      Nehaniv, C.L. (1991)
    • All Else Being Equal Be Empowered 

      Klyubin, A.S.; Polani, D.; Nehaniv, C.L. (2005)
      The classical approach to using utility functions suffers from the drawback of having to design and tweak the functions on a case by case basis. Inspired by examples from the animal kingdom, social sciences and games we ...
    • Analysing Hierarchical Data Using a Stochastic Evolutionary Neural Tree 

      Adams, R.G.; Davey, N.; George, S. (1998)
      SCENT is simple competitive neural network model that evolves a tree structured set of nodes in response to being presented with an unlabelled data set. The resulting set of weight vectors and their relationship can be ...
    • Analysing psychological data by evolving computational models 

      Lane, Peter; Gobet, Fernand; Addis, Mark; Sozou, Peter (Springer Nature, 2016)
    • Analysis and implementation of semi-automatic model for vulnerability exploitations of threat agents in NIST databases 

      Sharma, Gaurav; Vidalis, Stilianos; Menon, Catherine; Anand, Niharika (2023-05-30)
      Proactive security plays a vital role in preventing the attack before entering active mode. In the modern information environment, it depends on the vulnerability management practitioners of an organization in which the ...
    • Analysis and Implementation of Threat Agents Profiles in Semi-Automated Manner for a Network Traffic in Real-Time Information Environment 

      Gaurav, Gaurav Sharma; Vidalis, Stilianos; Menon, Catherine; Anand, Niharika; Kumar, Somesh (2021-07-31)
      Threat assessment is the continuous process of monitoring the threats identified in the network of the real-time informational environment of an organisation and the business of the companies. The sagacity and security ...
    • The analysis of animate object motion using neural networks and snakes 

      Tabb, Ken; George, S.; Davey, N.; Adams, R.G. (2000)
      This paper presents a mechanism for analysing the deformable shape of an object as it moves across the visual field. An object’s outline is detected using active contour models, and is then re-represented as shape, location ...
    • Analysis of DoS Attacks at MAC Layer in Mobile Adhoc Networks 

      Alocious, Chaminda; Xiao, Hannan; Christianson, B. (Institute of Electrical and Electronics Engineers (IEEE), 2015-10-05)
      —Wireless network security has received tremendous attention due to the vulnerabilities exposed in the open communication medium. The most common wireless Medium Access Control (MAC) protocol is IEEE 802.11, which assumes ...
    • Analysis of EEG Microstates During Execution of a Nine Hole Peg Test 

      Alingal Meethal, Shadiya; Steuber, Volker; Amirabdollahian, Farshid (2023-04-28)
      Abstract—EEG microstates are brief periods of time during which the brain’s electrical activity remains stable. The analysis of EEG microstates can help to identify the background neuronal activity at the millisecond level. ...
    • Analysis of human motion using snakes and neural networks 

      Tabb, Ken; George, S.; Davey, N.; Adams, R.G. (2000)
      A novel technique is described for analysing human movement in outdoor scenes. Following initial detection of the humans using active contour models, the contours are then re-represented as normalised axis crossover vectors. ...
    • Analysis of RF power optimisation for SCM-based free space optical systems for IM3 

      Lim, W.; Ghassemlooy, Z.; Kim, K. (2011-09-15)
      The focus of this reported research is on the optimisation of input RF power in SCM-based free space optical (FSO) systems to minimise the average BER because higher input RF power does not always provide FSO systems with ...
    • Analysis of the adapted inclusive haptic rigs for non-sighted people using duration and collision metrics 

      Bowers, Lisa; Amirabdollahian, Farshid (Springer Nature, 2014)
      In this demonstration we present a haptic digital rig, which offers an inclusive adapted version ofWade’s Nine Hole Peg Test (NHPT) [3]. After a manual NHPT, practice participantswill be requested to complete a nine hole ...
    • The Analysis of the addition of Stochasticity to a Neural Tree Classifier 

      Pensuwon, W.; Adams, R.G.; Davey, N. (2001)
      This paper describes various mechanisms for adding stochasticity to a dynamic hierarchical neural clusterer. Such a network grows a tree-structured neural classifier dynamically in response to the unlabelled data with which ...
    • The analysis of the error statistics in a 5 x 40 Gbit/s fibre link with hybrid amplification 

      Skidin, A.; Redyuk, A.; Shtyrina, O.; Fedoruk, M.; Shafarenko, Alex (2011-09)
      We quantify the error statistics and patterning effects in a 5 × 40 Gbit/s WDM RZ-OOK SMF/DCF fibre link using hybrid Raman/EDFA amplification. By extensive use of a numerical model, we determine how the error statistics ...