2015 17th UKSim-AMSS International Conference on Modelling and Simulation (UKSim)

25-27 March 2015

Filter Results

Displaying Results 1 - 25 of 85
  • [Front cover]

    Publication Year: 2015, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (1227 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2015, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (83 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2015, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (147 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2015, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (123 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2015, Page(s):v - xiv
    Request permission for commercial reuse | PDF file iconPDF (155 KB)
    Freely Available from IEEE
  • Welcome Message from the Chairs

    Publication Year: 2015, Page(s): xv
    Request permission for commercial reuse | PDF file iconPDF (116 KB)
    Freely Available from IEEE
  • Conference Organization

    Publication Year: 2015, Page(s): xvi
    Request permission for commercial reuse | PDF file iconPDF (133 KB)
    Freely Available from IEEE
  • International/Technical Program Committee

    Publication Year: 2015, Page(s): xvii
    Request permission for commercial reuse | PDF file iconPDF (80 KB)
    Freely Available from IEEE
  • International Reviewers

    Publication Year: 2015, Page(s):xviii - xix
    Request permission for commercial reuse | PDF file iconPDF (160 KB)
    Freely Available from IEEE
  • Sponsors, Patrons, Promoters, and Supporters

    Publication Year: 2015, Page(s): xx
    Request permission for commercial reuse | PDF file iconPDF (164 KB)
    Freely Available from IEEE
  • Keynote Speaker-1: Computer Evolution over the Next Decade: Fact or Fiction?

    Publication Year: 2015, Page(s): 3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (159 KB)

    Summary form only given. Computers evolve fast and the processing power doubles every two years by Moore's Law. That would mean computers 10 years from now would be 32 times more powerful than the current models. In 2005, Moore said that as transistors reach the atomic scale we may encounter fundamental barrier we can't cross. We may get around that barrier by building a computer that works simila... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keynote Speaker-2: Approximate Feature Selection in Data-Driven Systems Modelling

    Publication Year: 2015, Page(s): 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (161 KB)

    Summary form only given. Feature selection (FS) addresses the problem of selecting those system descriptors that are most predictive of a given outcome. Unlike other dimensionality reduction methods, with FS the original meaning of the features is preserved. This has found application in tasks that involve datasets containing very large numbers of features that might otherwise be impractical to mo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keynote Speaker-3: History of Computing and AI, a Personal Viewpoint

    Publication Year: 2015, Page(s): 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (162 KB)

    Summary form only given. The label that most people might attach to me is “Computer Scientist”. Ever since secondary school, I have been fascinated by computers, their power and their potential, and I have enjoyed trying to program them to behave with some artificial intelligence. During my long career, I have witnessed first-hand the astonishingly rapid progress of computing hardwar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keynote Speaker-4: The Intelligent Electricity Network of the Future: SmartGrid

    Publication Year: 2015, Page(s): 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (197 KB)

    We live surrounded by networks. The first such network was probably the postal services, and now the young generation are already using 4G mobile Internet. Megawatts and gigawatts are not as easy to handle as megabytes and gigabytes. Transferring huge amounts of electrical energy requires big investments. The story started at the end of the 19th century with steam engines, generating power first f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Per-C Based Student Examination Strategy Evaluation in Mobile Evaluation System Conducted Through a Smartphone

    Publication Year: 2015, Page(s):23 - 28
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (483 KB) | HTML iconHTML

    Smart phones" are the new age devices today. They are being employed at a number of places such as health monitoring, teaching aids, etc. Recent works have shown that they can also be used to conduct the examination. Examinations are generally conducted to test the theoretical knowledge of a student. Any student who is able solve the question is awarded complete marks and the one who fails is not ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Error Driven Node Placement as Applied to One Dimensional Shallow Water Equations

    Publication Year: 2015, Page(s):31 - 38
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2836 KB) | HTML iconHTML

    This paper investigates the technique of localised mesh refinement to solve the Shallow Water Equations (SWE), by adding nodes only where needed. The discretization process linearizes the nonlinear equations for solving as a linear system. The nonlinear error values at specific nodes are used to indicate which node will have additional nodes added either side. The process of adding nodes is repeat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RFID Network Planning by ABC Algorithm Hybridized with Heuristic for Initial Number and Locations of Readers

    Publication Year: 2015, Page(s):39 - 44
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (277 KB) | HTML iconHTML

    In the presented paper we show artificial bee colony (ABC) algorithm adjusted for the radio frequency identification (RFID) network planning problem and hybridized with heuristic for estimating the initial number and locations of RFID readers. The RFID network planning problem (RNP) belongs to the group of multi-objective NP-hard optimization problems hence it is an excellent candidate for swarm i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Investigation into Blood Clot Removal with the GP Mechanical Thrombectomy Device (GPTAD) in an Abattoir Porcine Artery Model

    Publication Year: 2015, Page(s):47 - 49
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (421 KB) | HTML iconHTML

    In this pilot study we investigate the effectiveness of blood clot in an abattoir porcine artery, using a novel thrombectomy device. We show using histological staining wall, that when suction pressures of up to 70 KPa are applied, there appears to be no damage to the artery wall. We conclude that this device may potentially be very useful as a blood clot removal device in human arteries. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Artificial Neural Network Model in Stroke Diagnosis

    Publication Year: 2015, Page(s):50 - 53
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (233 KB) | HTML iconHTML

    We present a model of Artificial Neural Network (ANN) applied to stroke diagnosis. We use input data related to stroke that serves as inputs for the ANN. These data include clinical symptoms together with stroke risk factors. Each type of data provides input that is evaluated and used during the ANN processing. The adaptive learning algorithm can be used with a plethora of types of medical data an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Glucose-Insulin System Based on Minimal Model: A Realistic Approach

    Publication Year: 2015, Page(s):55 - 60
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (669 KB) | HTML iconHTML

    This paper presents a new approach to represent the glucose and insulin levels on patients with diabetes type 1 based on the well-known minimal model. In this work a new mathematical model is proposed which attempts modeling properly the malfunction of the pancreas. The model takes into account both: the description of the glucose level in the subcutaneous layer and a meal disturbance term. Furthe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Artificial Neural Network and Mobile Applications in Medical Diagnosis

    Publication Year: 2015, Page(s):61 - 64
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (175 KB) | HTML iconHTML

    The aim of this paper is to present a pilot study regarding the application of an ANN to stroke recognition and diagnosis. Our system makes use of a (i) a neural network that can be trained to recognize normal limb movements (for individual patients), which may then be coupled to (ii) a physical grid mattress that can be used in the patient's home. Any changes in the patient's movement could poten... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Quarter of Iris Region Recognition Using the RED Algorithm

    Publication Year: 2015, Page(s):66 - 72
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (709 KB) | HTML iconHTML

    Iris recognition system provides automatic identification of an individual based on a unique feature that located inside the iris. Iris recognition becomes one of the most accurate and secure biometric methods that used today. However, the execution time of the iris recognition algorithm on general purpose sequential system such as central processing units is too high so it can't work in the real ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Sentiment and Interest Based Approach for Product Recommendation

    Publication Year: 2015, Page(s):75 - 80
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (500 KB) | HTML iconHTML

    The growing popularity of social networks has led to abundant availability of user sentiments, making them a crucial factor in buying decisions, public opinions, and brand reputations. Rise of real-time web has provided an opportunity to utilise time-sensitive data which is available in the form of tweets on public and private Twitter streams, as the basis for product recommendation based on Senti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Network Intrusion Detection Using a HNB Binary Classifier

    Publication Year: 2015, Page(s):81 - 85
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (294 KB) | HTML iconHTML

    Utilization of the data mining techniques in intrusion detection systems is common for the classification of the network events as either normal events or attack events. Naïve Bayes (NB) method is a simple, efficient and popular data mining method that is built on conditional independence of attributes assumption. Hidden Naïve Bayes (HNB) is an extended form of NB that keeps the NB... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhanced Topic Identification Algorithm for Arabic Corpora

    Publication Year: 2015, Page(s):90 - 94
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (882 KB) | HTML iconHTML

    During the past few years, the construction of digitalized content is rapidly increasing, raising the demand of information retrieval, data mining and automatic data tagging applications. There are few researches in this field for Arabic data due to the complex nature of Arabic language and the lack of standard corpora. In addition, most work focuses on improving Arabic stemming algorithms, or top... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.