default search action
17th UKSim 2015: Cambridge, UK
- David Al-Dabass, Alessandra Orsoni, Richard J. Cant, Zuwairie Ibrahim, Ismail Saad:
UKSim-AMSS 17th International Conference on Computer Modelling and Simulation, UKSim 2015, Cambridge, United Kingdom, March 25-27, 2015. IEEE 2015, ISBN 978-1-4799-8712-2
Plenary Abstracts
- Frank Wang:
Computer Evolution over the Next Decade: Fact or Fiction? 3 - Qiang Shen:
Approximate Feature Selection in Data-Driven Systems Modelling. 4 - Harry G. Barrow:
History of Computing and AI, a Personal Viewpoint. 5 - Janos Sebestyen Janosy:
The Intelligent Electricity Network of the Future: SmartGrid. 6
TRACK: 02.B: Fuzzy Systems
- Prashant K. Gupta, Manvi Madan:
Per-C Based Student Examination Strategy Evaluation in Mobile Evaluation System Conducted Through a Smartphone. 23-28
TRACK: 03.C: Evolutionary Computation
- Zhenquan Li, Peter Crowhurst, Robert Wood:
Error Driven Node Placement as Applied to One Dimensional Shallow Water Equations. 31-38 - Nebojsa Bacanin, Milan Tuba, Ivana Strumberger:
RFID Network Planning by ABC Algorithm Hybridized with Heuristic for Initial Number and Locations of Readers. 39-44
TRACK: 06.F: Bioinformatics and Bioengineering
- Gillian Pearce, Gregorio Romero, Julian Wong:
An Investigation into Blood Clot Removal with the GP Mechanical Thrombectomy Device (GPTAD) in an Abattoir Porcine Artery Model. 47-49 - Lela Mirtskhulava, Julian Wong, Salah S. Al-Majeed, Gillian Pearce:
Artificial Neural Network Model in Stroke Diagnosis. 50-53 - Adriana Aguilera González, Holger Voos, Mohamed Darouach:
Glucose-Insulin System Based on Minimal Model: A Realistic Approach. 55-60 - Gillian Pearce, Julian Wong, Lela Mirtskhulava, Salah S. Al-Majeed, Koba Bakuria, Nana Gulua:
Artificial Neural Network and Mobile Applications in Medical Diagnosis. 61-64 - Safaa S. Omran, Aqeel A. Al-Hillali:
Quarter of Iris Region Recognition Using the RED Algorithm. 66-72
TRACK: 08.H: Data and Semantic Mining
- Vibhu Jawa, Varun Hasija:
A Sentiment and Interest Based Approach for Product Recommendation. 75-80 - Levent Koc, Alan D. Carswell:
Network Intrusion Detection Using a HNB Binary Classifier. 81-85 - Amal Alsaad, Maysam Abbod:
Enhanced Topic Identification Algorithm for Arabic Corpora. 90-94
TRACK: 09.I: Games, VR and Visualization
- Amer Rasheed, Uffe Kock Wiil:
A Tool for Analysis and Visualization of Criminal Networks. 97-102 - Ayodeji Remi Omosowon, Richard J. Cant, Caroline S. Langensiepen:
Deriving an Entropy Measure for 2D Container Layouts. 103-108
TRACK: 11.K: Intelligent Systems and Applications
- Dian Yang, Yongxin Zhu, Tian Huang, Yiliang He, Stéphane Bressan:
A Provenance Scheme for Emerging Water Contaminants. 119-124 - Saleh Alaliyat, Harald Yndestad:
An Agent-Based Model to Simulate Infectious Disease Dynamics in an Aquaculture Facility. 131-136 - Danish Pruthi, Ayush Jain, Krishna Murthy Jatavallabhula, Ruppesh Nalwaya, Puneet Teja:
Maxxyt: An Autonomous Wearable Device for Real-Time Tracking of a Wide Range of Exercises. 137-141 - Madihah Mohd Saudi, Nurlida Basir, Nur Fatin Nabila, Farida Ridzuan, Sakinah Ali Pitchay:
An Efficient Easy Computer Emergency Response Team Malware Reservoir System(eZCERT). 142-146 - Ahmad Faisal Abidin, Mario Kolberg:
Towards Improved Vehicle Arrival Time Prediction in Public Transportation: Integrating SUMO and Kalman Filter Models. 147-152 - Achim Kuwertz, Cornelius Goldbeck, Ronny Hug, Jürgen Beyerer:
Towards Web-Based Semantic Knowledge Completion for Adaptive World Modeling in Cognitive Systems. 165-170 - Eric Ferreri, Jean Marc Salotti, Pierre-Alexandre Favier:
Simulation of Habits and Planned Activities Related to Electrical Domestic Consumption. 171-175 - Madihah Mohd Saudi, Farida Ridzuan, Nurlida Basir, Nur Fatin Nabila, Sakinah Ali Pitchay, Intan Nurfarahin Ahmad:
Android Mobile Malware Surveillance Exploitation via Call Logs: Proof of Concept. 176-181 - Mian-Guan Lim, Frank Wang, Nan Jiang:
Automating Management of Resources on Desktop Machines. 188-191
TRACK: 13.M: Systems Intelligence and Intelligence Systems
- Catalina Spataru, Mark Barrett:
DEAM: A Scalable Dynamic Energy Agents Model for Demand and Supply. 195-200 - Sakinah Ali Pitchay, Wail Abdo Ali Alhiagem, Farida Ridzuan, Madihah Mohd Saudi:
A Proposed System Concept on Enhancing the Encryption and Decryption Method for Cloud Computing. 201-205
TRACK: 16.P: Robotics, Cybernetics, Engineering, Manufacturing and Control
- Victoria Wumi Oguntosin, Slawomir Jaroslaw Nasuto, Yoshikatsu Hayashi:
A Compact Low-Cost Electronic Hardware Design for Actuating Soft Robots. 242-247 - Ali Hosseinpour Najarkolaei, Wada Hosny, Jaswinder Lota:
Bit Error Rate Performance in Power Line Communication Channels with Impulsive Noise. 248-251
TRACK: 17.Q: Methodologies, Tools and Operations Research
- Mark Barrett, Catalina Spataru:
DynEMo: A Dynamic Energy Model for the Exploration of Energy, Society and Environment. 255-260
TRACK: 18.R: Discrete Event and Real Time Systems
- Angelo Furfaro, Giovanna Malena, Lorena Molina Valdiviezo, Andrea Parise:
A Simulation Model for the Analysis of DDoS Amplification Attacks. 267-272
TRACK: 19.S: Image, Speech and Signal Processing Heuristic Based Labeling Using Edgelet Based Contour Detection for Low
- Solomon A. Tesfamicael, Bruhtesfa E. Godana:
Compressed Sensing Performance Analysis via Replica Method Using Bayesian Framework. 281-289 - Daniel Becker, Achim Streit:
Localization of Signal Peaks in Photon Science Imaging. 296-301 - Solomon Tesfamicael, Faraz Barzideh:
Clustered Compressed Sensing via Bayesian Framework. 302-309 - Sohailah Makhmasi, Fatma Taher, Hussain Al-Ahmad, Tim McGloughlin:
A Novel Multiple Watermarking Algorithm for Patient Identification and Integrity Control. 310-315 - Arwa Al-Khatatneh, Sakinah Ali Pitchay, Musab Kasim AlQudah:
A Review of Skew Detection Techniques for Document. 316-321 - Quist-Aphetsi Kester, Laurent Nana, Anca Christine Pascu, Sophie Gire, Jojo Moses Eghan, Nii Narku Quaynor:
A Hybrid Image Cryptographic and Spatial Digital Watermarking Encryption Technique for Security and Authentication of Digital Images. 322-326 - Quist-Aphetsi Kester, Laurent Nana, Anca Christine Pascu, Sophie Gire, Jojo Moses Eghan, Nii Narku Quaynor:
A Novel Hybrid Discrete Cosine Transformation and Visual Cryptographic Technique for Securing Digital Images. 327-332
TRACK: 20.T: Industry, Business, Management, Human Factors, and Social Issues
- Michael N. Moeti, Khuliso Sigama:
Information Security Management Issues in a Cloud-based environment. 349-354 - Mikel Zuzuarregui, Enda Fallon, MingXue Wang, John Keeney, Paul Jacob:
PRISENIT - A Probabilistic Search Recommendation Algorithm to Improve Search Efficiency for Network Intelligence and Troubleshooting. 355-360 - Dari Trendafilov, Daniel Polani, Roderick Murray-Smith:
Model of Coordination Flow in Remote Collaborative Interaction. 361-366
TRACK: 21.U: Energy, Power, Transport, Logistics, Harbour, Shipping, and Marine Simulation
- Amit G. Bhat, Kaushik Roy, Prajesh P. Anchalia, H. M. Jeevith:
Design and Implementation of a Dynamic Intelligent Traffic Control System. 369-373 - Gad A. Mohamed, Medhat El-Geneidy, Nabil H. Abbasy:
A WT Based DSP Algorithm to Calculate SAPC Compensating Current in Accordance to IEEE STD 1459-2010. 374-379 - Francesco Muzi, Mario Gimenez De Lorenzo, Giovanni De Gasperis:
A Predictive Model for the Automated Management of Conditioning Systems in Smart Buildings. 380-385 - Muhyaddin Jamal H. Rawa, David W. P. Thomas, Mark Sumner:
Mathematical Modeling of the Harmonic Distortion Caused by a Group of PCs Using Curve Fitting Technique. 386-390 - Karthik Srinivasan, Gaurav Roy:
A System Design for the Regulated Distribution of Automotive Fuel Using RFID. 391-395 - Junbo Sun, Haoxiang Chu, Da Xie:
A Rotor Speed Based Time-varying Window for Harmonic Analysis of DFIG. 402-407 - Kshitij Chopra, Kritika Nigam, Sujata Pandey:
Modelling and Simulation of Piezoelectric Cantilevers in RF MEMS Devices for Energy Harvesting Applications. 414-419 - Ahmed Al Ameri, Cristian Nichita, Hilal Abbood, Ali Al-Ataby:
Fast Estimation Method for Selection of Optimal Distributed Generation Size Using Kalman Filter and Graph Theory. 420-425 - Khadidja Chaib Draa, Holger Voos, Mohamed Darouach, Marouane Alma:
A Formal Modeling Framework for Anaerobic Digestion Systems. 426-431 - Ruoyang Du, Paul A. Robertson:
Modelling of Dynamic Magnetic Hysteresis Loops and Power Losses in Laminated Steel. 432-437 - Oluleke Babayomi, Adeola Balogun, Charles Osheku:
Loss Minimizing Control of PMSM for Electric Power Steering. 438-443 - Syed Murtaza Ali Shah Bukhari, Junaid Maqsood, Mirza Qutab Baig, Suhail Ashraf, Tamim Ahmed Khan:
Comparison of Characteristics - Lead Acid, Nickel Based, Lead Crystal and Lithium Based Batteries. 444-450 - Meraj Hasan, Junaid Maqsood, Mirza Qutab Baig, Syed Murtaza Ali Shah Bukhari, Salman Ahmed:
Design and Implementation of Single Phase Pure Sine Wave Inverter Using Multivibrator IC. 451-455
TRACK: 22.V: Parallel, Distributed and Software Architectures and Systems
- Prajesh P. Anchalia, Kaushik Roy, Kunal Roy:
Two Class Fisher's Linear Discriminant Analysis Using MapReduce. 463-469 - Norhazlina Hamid, Robert John Walters, Gary B. Wills:
Simulation and Mathematical Analysis of Multi-core Cluster Architecture. 476-481
TRACK: 23.W: Internet Modelling, Semantic Web and Ontologies
- Arooj Fatima, Cristina Luca, George B. Wilson, Mohamed Salah Kettouch:
Result Optimisation for Federated SPARQL Queries. 491-496 - Nur Fatin Nabila, Nurlida Basir, Madihah Mohd Saudi, S. A. Pitchay, Farida Ridzuan, Ali Mamat, Mustafa Mat Deris:
Using Probability Theory to Identify the Unsure Value of an Incomplete Sentence. 497-501 - Nur Fatin Nabila, Nurlida Basir, Madihah Mohd Saudi, Ali Mamat, Masrah Azrifah Azmi Murad, Norwati Mustapha, Mustafa Mat Deris:
Domain-Specific Inter-textual Non-taxonomic Extraction (DSINTE). 502-506
TRACK: 24.X: Mobile/Ad Hoc Wireless Networks, Mobicast, Sensor Placement, Target Tracking
- Xin Yang, Zhili Sun, Ye Miao, Ning Wang, Shaoli Kang, Yingmin Wang, Yu Yang:
Performance Optimisation for DSDV in VANETs. 514-519 - Trust Tshepo Mapoka, Simon J. Shepherd, Raed A. Abd-Alhameed, Kelvin O. O. Anoh:
Handover Optimised Authentication Scheme for High Mobility Wireless Multicast. 526-531 - Hani Alharbi, Amir Hussain:
An Agent-Based Approach for Modelling Peer to Peer Networks. 532-537 - Ahmed Ben Saleh, Martin J. N. Sibley, Peter Mather:
QoS Aware Inter-Cluster Routing Protocol for IEEE 802.15.4 Networks. 538-543 - Mabrouka Abuhmida, Kapilan Radhakrishnan, Ian Wells:
Performance Evaluation of Mobile Ad Hoc Routing Protocols on Wireless Sensor Networks for Environmental Monitoring. 544-548
TRACK: 25.Y: Performance Engineering of Computer and Communication Systems
- Joshua A. Adeleke, Mqhele E. Dlodlo, Clement E. Onime:
Video Traffic Prioritization in WLANs Using Single Queue Priority Scheduler. 557-562
TRACK: 26.Z: Circuits, Sensors and Devices
- Huei Chaeng Chin, Michael Loong Peng Tan:
Non-ballistic Modeling Transport of Phonon Scattering in Carbon Nanotube and Silicon Nanowire Field-Effect Transistors. 565-570 - Xiaojun Zhai, Fadi Jaber, Faycal Bensaali, Arti Mishra:
Hardware Acceleration of an Image Processing System for Dielectrophoretic Loading of Single Neurons Inside Micro-Wells of Microelectrode Arrays. 571-576 - Montserrat Fortes, Enrique Comesaña, Guillermo Indalecio Fernández, José Rodríguez, Pablo Otero, Antonio J. García-Loureiro, Michael Vetter:
Design and Monte Carlo Simulation of a LED-Based Optic Coupler. 577-581 - Neha Verma, Parveen, Jyotika Jogi:
Quantum Simulation of a Double Gate Double Heterostructure in AlAs/InGaAs HEMT to Analyze Temperature Effects. 582-587 - Darko Kova Evi, Mijo Zuji, Asja Kova Evi:
Min Max Control over Transfer Characteristics in Models of Technical and Non Technical Systems. 588-593 - Wanlong Chen, Xiao Yang, Frank Zhigang Wang:
An Omnipotent Memristor Model with Controllable Window Functions. 600-605 - Adam Crha, Richard Ruzicka, Václav Simek:
Synthesis Methodology of Polymorphic Circuits Using Polymorphic NAND/NOR Gates. 612-617
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.