All Stories

  1. ShapeFormer: Shapelet Transformer for Multivariate Time Series Classification
  2. A Comprehensive Survey on Imputation of Missing Data in Internet of Things
  3. Engineering Blockchain-based Software Systems: Foundations, Survey, and Future Directions
  4. On the Importance of Diversity in Re-Sampling for Imbalanced Data and Rare Events in Mortality Risk Models
  5. Handling uncertainty using features from pathology: opportunities in primary care data for developing high risk cancer survival methods
  6. Modelling cyber-security experts' decision making processes using aggregation operators
  7. Simulating user learning in authoritative technology adoption: An agent based model for council-led smart meter deployment planning in the UK
  8. Supervised Anomaly Detection in Uncertain Pseudoperiodic Data Streams
  9. Refining adverse drug reaction signals by incorporating interaction variables identified using emergent pattern mining
  10. CRNN: A Joint Neural Network for Redundancy Detection
  11. Applying Interval Type-2 Fuzzy Rule Based Classifiers Through a Cluster-Based Class Representation
  12. An ensemble of machine learning and anti-learning methods for predicting tumour patient survival rates
  13. A supervised adverse drug reaction signalling framework imitating Bradford Hill’s causality considerations
  14. Adaptive Data Communication Interface: A User-Centric Visual Data Interpretation Framework
  15. Juxtaposition of System Dynamics and Agent-Based Simulation for a Case Study in Immunosenescence
  16. Indebted Households Profiling: A Knowledge Discovery from Database Approach
  17. Feature Selection in Detection of Adverse Drug Reactions from the Health Improvement Network (THIN) Database
  18. Health Information Science
  19. Identifying Candidate Risk Factors for Prescription Drug Side Effects Using Causal Contrast Set Mining
  20. An Improved System For Sentence-Level Novelty Detection In Textual Streams
  21. A Data Mining Framework to Model Consumer Indebtedness with Psychological Factors
  22. Personalising Mobile Advertising Based on Users' Installed Apps
  23. Incorporating Spontaneous Reporting System Data to Aid Causal Inference in Longitudinal Healthcare Data
  24. Refining Adverse Drug Reactions Using Association Rule Mining for Electronic Healthcare Data
  25. Analysing fuzzy sets through combining measures of similarity and distance
  26. Augmented Neural Networks for modelling consumer indebtness
  27. Tuning a multiple classifier system for side effect discovery using genetic algorithms
  28. Comparison of Distance metrics for hierarchical data in medical databases
  29. A fuzzy directional distance measure
  30. Comparing Stochastic Differential Equations and Agent-Based Modelling and Simulation for Early-Stage Cancer
  31. A Novel Semisupervised Algorithm for Rare Prescription Side Effect Discovery
  32. Data classification using the Dempster–Shafer method
  33. Signalling Paediatric Side Effects using an Ensemble of Simple Study Designs
  34. Variability of Behaviour in Electricity Load Profile Clustering; Who Does Things at the Same Time Each Day?
  35. Towards the development of a simulator for investigating the impact of people management practices on retail performance
  36. On the Role of the AIS Practitioner
  37. The use of Agent-based Simulation to Discover Extreme Cases in Immune-Interactions with Early-Stage Cancer Scenarios
  38. Measuring the directional distance between fuzzy sets
  39. Comparison of algorithms that detect drug side effects using electronic healthcare databases
  40. Artificial Immune Systems
  41. Interval type-2 fuzzy logic based robotic sailing
  42. Ensemble learning of colorectal cancer survival rates
  43. Extending similarity measures of interval type-2 fuzzy sets to general type-2 fuzzy sets
  44. Attributes for causal inference in electronic healthcare databases
  45. Theoretical formulation and analysis of the deterministic dendritic cell algorithm
  46. Towards a More Systematic Approach to Secure Systems Design and Analysis
  47. Wavelet feature extraction and genetic algorithm for biomarker detection in colorectal cancer data
  48. Investigating mathematical models of immuno-interactions with early-stage cancer under an agent-based modelling perspective
  49. Detect Adverse Drug Reactions for Drug Simvastatin
  50. Modelling Electrical Car Diffusion Based on Agent
  51. Detect adverse drug reactions for drug Pioglitazone
  52. Detect Adverse Drug Reactions for Drug Alendronate
  53. Detect Adverse Drug Reactions for Drug Atorvastatin
  54. Detect Adverse drug reactions for drug Aspirin
  55. Detect adverse drug reactions for the drug Pravastatin
  56. Supervised learning and anti-learning of colorectal cancer classes and survival rates from cellular biology parameters
  57. Comparing data-mining algorithms developed for longitudinal observational databases
  58. A three-dimensional model of residential energy consumer archetypes for local energy policy design in the UK
  59. Evaluating Different Cost-Benefit Analysis Methods for Port Security Operations
  60. Privileged information for data clustering
  61. An investigation into the relationship between type-2 FOU size and environmental uncertainty in robotic control
  62. Variance In System Dynamics And Agent Based Modelling Using The SIR Model Of Infectious Disease
  63. Investigating the Effectiveness of Variance Reduction Techniques in Manufacturing, Call Center and Cross-Docking Discrete Event Simulation Models
  64. A Beginner’s Guide to Systems Simulation in Immunology
  65. Validation of a microsimulation of the Port of Dover
  66. Discovering sequential patterns in a UK general practice database
  67. Modelling electricity consumption in office buildings: An agent based approach
  68. A comparison of non-stationary, type-2 and dual surface fuzzy control
  69. A First Approach on Modelling Staff Proactiveness in Retail Simulation Models
  70. Simulating the Dynamics of T Cell Subsets throughout the Lifetime
  71. Quiet in Class: Classification, Noise and the Dendritic Cell Algorithm
  72. Systems Dynamics or Agent-Based Modelling for Immune Simulation?
  73. Heuristic optimisation
  74. A New Graphical Password Scheme Resistant to Shoulder-Surfing
  75. Towards the development of a simulator for investigating the impact of people management practices on retail performance
  76. Motif detection inspired by immune memory
  77. Real-world transfer of evolved artificial immune system behaviours between small and large scale robotic platforms
  78. An Audio CAPTCHA to Distinguish Humans from Computers
  79. Two-timescale learning using idiotypic behaviour mediation for a navigating mobile robot
  80. Behavioural Correlation for Detecting P2P Bots
  81. Artificial Immune Systems
  82. Defining a Simulation Strategy for Cancer Immunocompetence
  83. Information fusion in the immune system
  84. Information fusion for anomaly detection with the dendritic cell algorithm
  85. The Transfer of Evolved Artificial Immune System Behaviours between Small and Large Scale Robotic Platforms
  86. Can Background Baroque Music Help to Improve the Memorability of Graphical Passwords?
  87. Against Spyware Using CAPTCHA in Graphical Password Scheme
  88. The effect of baroque music on the PassPoints graphical password
  89. Tailored RF pulse for magnetization inversion at ultrahigh field
  90. Simulating Customer Experience and Word-Of-Mouth in Retail — A Case Study
  91. A Component-Based Heuristic Search Method with Evolutionary Eliminations for Hospital Personnel Scheduling
  92. An Evolutionary Squeaky Wheel Optimization Approach to Personnel Scheduling
  93. Artificial Immune Systems
  94. Exploration of the Dendritic Cell Algorithm Using the Duration Calculus
  95. Modelling and simulating retail management practices: a first approach
  96. Parcellation of fMRI Datasets with ICA and PLS-A Data Driven Approach
  97. STORM - A Novel Information Fusion and Cluster Interpretation Technique
  98. Cheating for problem solving
  99. Integrating real-time analysis with the dendritic cell algorithm through segmentation
  100. Modelling and simulating retail management practices: a first approach
  101. ToLeRating UR-STD
  102. DCA for bot detection
  103. The DCA: SOMe comparison
  104. Special issue on artificial immune systems
  105. Detecting Bots Based on Keylogging Activities
  106. Detecting Danger: The Dendritic Cell Algorithm
  107. The motif tracking algorithm
  108. Using intelligent agents to understand management practices and retail productivity
  109. Idiotypic Immune Networks in Mobile-Robot Control
  110. An estimation of distribution algorithm for nurse scheduling
  111. Immune system approaches to intrusion detection – a review
  112. Sensing danger: Innate immunology for intrusion detection
  113. Biological Inspiration for Artificial Immune Systems
  114. Motif Detection Inspired by Immune Memory
  115. Dendritic cells for SYN scan detection
  116. Detecting Motifs in System Call Sequences
  117. Rule generalisation in intrusion detection systems using SNORT
  118. The Application of a Dendritic Cell Algorithm to a Robotic Classifier
  119. An estimation of distribution algorithm with intelligent local search for rule-based nurse rostering
  120. Book Selection
  121. Book Selection
  122. Book Selection
  123. Book Selection
  124. Price Trackers Inspired by Immune Memory
  125. Integrating Innate and Adaptive Immunity for Intrusion Detection
  126. Articulation and Clarification of the Dendritic Cell Algorithm
  127. BOA for Nurse Scheduling
  128. Improved Squeaky Wheel Optimisation for Driver Scheduling
  129. Book Selection
  130. Book Selection
  131. A Recommender System based on Idiotypic Artificial Immune Networks
  132. Book Selection
  133. Book Selection
  134. Book Selection
  135. Towards a Conceptual Framework for Innate Immunity
  136. Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection
  137. Cooperative Automated Worm Response and Detection ImmuNe ALgorithm(CARDINAL) Inspired by T-Cell Immunity and Tolerance
  138. An indirect Genetic Algorithm for a nurse-scheduling problem
  139. Building Better Nurse Scheduling Algorithms
  140. Immune System Approaches to Intrusion Detection – A Review
  141. The Application of Bayesian Optimization and Classifier Systems in Nurse Scheduling
  142. Danger Theory: The Link between AIS and IDS?
  143. An indirect genetic algorithm for set covering problems
  144. Exploiting problem structure in a genetic algorithm approach to a nurse rostering problem
  145. Ueber 5-Oxy-1.2.3-triazole
  146. Modelling Immunological Memory
  147. Investigating a Hybrid Metaheuristic for Job Shop Rescheduling
  148. Artificial Immune Systems
  149. Introduction to Multi-Agent Simulation
  150. The Deterministic Dendritic Cell Algorithm
  151. Introduction to Multi-Agent Simulation
  152. Multi-Agent Simulation and Management Practices
  153. Further Exploration of the Dendritic Cell Algorithm: Antigen Multiplier and Time Windows
  154. Artificial Dendritic Cells: Multi-faceted Perspectives
  155. Real-Time Alert Correlation with Type Graphs
  156. Multi-Agent Simulation and Management Practices
  157. An Idiotypic Immune Network as a Short-Term Learning Architecture for Mobile Robots
  158. Enhancing Productivity: The Role of Management Practices
  159. libtissue - implementing innate immunity
  160. Dendritic Cells for Anomaly Detection
  161. A Bayesian optimization algorithm for the nurse scheduling problem
  162. A recommender system based on the immune network
  163. Towards the development of a simulator for investigating the impact of people management practices on retail performance