By Topic

2016 UKSim-AMSS 18th International Conference on Computer Modelling and Simulation (UKSim)

6-8 April 2016

Filter Results

Displaying Results 1 - 25 of 73
  • [Front cover]

    Publication Year: 2016, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (5077 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2016, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (42 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2016, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (109 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2016, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (118 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2016, Page(s):v - xi
    Request permission for commercial reuse | PDF file iconPDF (153 KB)
    Freely Available from IEEE
  • Message from Chairs

    Publication Year: 2016, Page(s):xii - xiii
    Request permission for commercial reuse | PDF file iconPDF (253 KB)
    Freely Available from IEEE
  • Conference Organization

    Publication Year: 2016, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (87 KB)
    Freely Available from IEEE
  • International Technical Program Committee

    Publication Year: 2016, Page(s):xv - xvi
    Request permission for commercial reuse | PDF file iconPDF (98 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2016, Page(s): xvii
    Request permission for commercial reuse | PDF file iconPDF (97 KB)
    Freely Available from IEEE
  • Keynote Speaker I: Computing for Big Science: Gravitational Wave Detection

    Publication Year: 2016, Page(s): 3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (127 KB)

    Summary form only given. Computing has been playing an important role in the recent LIGO Gravitational Waves (GWs) detection. A graphics processing unit (GPU)-accelerated algorithm developed by Tsinghua University to search for GWs will be introduced. The aim is to facilitate fast detection of GWs with a minimum delay to allow prompt electromagnetic follow-up observations. To maximize the GPU acce... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keynote Speaker II: Modelling and Formalizing Weak Emergence

    Publication Year: 2016, Page(s):4 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (165 KB)

    “The whole is greater than the sum of its parts” is attributed to the Greek philosopher Aristotle. It is well known that entity interactions in a system give rise to new behavior of the whole or emergent properties that may not be reducible to the behavior of the individual entities. As system complexity grows in terms of size and scale, advancing our understanding of emergent proper... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keynote Speaker III: Analysing Large-Scale Data

    Publication Year: 2016, Page(s): 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (223 KB)

    Scientific communities have to cope with steadily increasing data rates. Even smaller communities recognize that their traditional "best-practice solutions" are no longer sufficient anymore. The project "Large-Scale Data Management and Analysis (LSDMA)" of the German Helmholtz Association supports their research centres since 2012 in analyzing their data. The activities include developments of com... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • S. A. V. I. O. R: Security Analytics on Asset Vulnerability for Information Abstraction and Risk Analysis

    Publication Year: 2016, Page(s):9 - 15
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (297 KB) | HTML iconHTML

    Protecting intellectual property and confidential customer details from network based attacks is becoming increasingly difficult in modern times due to a dramatic increase in online based attacks. For companies such as The NPD Group, protecting this confidential information is key in keeping a positive perceived image while also doing its utmost to protect vital I. P. This paper proposes an archit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using Fuzzy Logic for Accessories Ordering in Conversion Services

    Publication Year: 2016, Page(s):19 - 23
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (404 KB) | HTML iconHTML

    Inventory is carrying high risk and high benefit as a supply chain management system. A shortage or lack of supplying sufficient inventory can disrupt manufacturing plan. Inventory management plays an important role to avoid shortage or ending up with overstock. The most important task of inventory management is making trade-off between the minimization of the total cost and maximization of the cu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computational Performance of State-Value Function Approximators Based on RLS-HDP Estimators for Online DLQR Control System Design

    Publication Year: 2016, Page(s):27 - 34
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (601 KB) | HTML iconHTML

    The Adaptive/Approximate Dynamic Programming (ADP) is an online design approach proposed to make possible the implementations in real time of optimal controllers based on Hamilton-Jacobi-Bellman (HJB) equation solution. In this paper, ADP schemes are presented in a Heuristic Dynamic Programming (HDP) framework, where Policy Iteration (PI) strategies in conjunction with Recursive Least Squares (RLS... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Six Prosthetic Arm Movements Using Electromyogram Signals: A Prototype

    Publication Year: 2016, Page(s):37 - 42
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB) | HTML iconHTML

    Electromyogram signal is a biomedical signal that measures electrical activity produced in a muscle during its contraction. This work presents a prototype system for moving a prosthetic lower arm, without prior operation intervention, using electrodes that measure electromyogram (EMG) signals placed on two muscles only. The signals are then read by sensors connected to Arduino microcontroller, pro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Solving NP-complete Problems Using Genetic Algorithms

    Publication Year: 2016, Page(s):43 - 48
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (890 KB) | HTML iconHTML

    Genetic Algorithms are designed to find the accuracy of approximated solutions in order to perform as effectively as possible. This paper present a new way for genetic algorithm to solve NP-Complete problem. We study genetic algorithm to find an optimal solution for instances of the Traveling Salesman Problem. To overcome this solution, we have to see what is the shortest path that satisfies all o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Rigid Map Neural Network for Anatomical Joint Constraint Modelling

    Publication Year: 2016, Page(s):49 - 54
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (371 KB) | HTML iconHTML

    Accurate individual anatomical joint models are becoming increasingly important for both realistic animation and diagnostic medical applications. A number of recent approaches have exploited unit quaternions to eliminate singularities when modelling orientations between limbs at a joint. This has resulted in the development of unit quaternion based joint constraint validation and correction method... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mathematically Modelling hCG in Women with Gestational Trophoblastic Disease Using Logarithmic Transformations

    Publication Year: 2016, Page(s):55 - 59
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (335 KB) | HTML iconHTML

    Transformations are a common technique used to linearize data so that simple linear regression can be applied. A common transformation used is the logarithmic transformation. This transforms data that follows an exponential pattern so that a straight line can be fit to it. In this study human chorionic gonadotropin (hCG) levels in women with gestational trophoblastic disease (GTD), which are known... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Pose Invariant Thermal Face Recognition Using AMI Moments

    Publication Year: 2016, Page(s):60 - 64
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (693 KB) | HTML iconHTML

    Imaging in the visible spectrum demonstrates difficulties in recognizing the faces in conditions of varying illumination, especially under total darkness conditions. Further, the pose variations in such images add extra burden and heavy challenge on successful performance. As such, thermal face recognition has laid itself as a successful alternative solution and eventually has become an area of gr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cluster Rule Based Algorithm for Detecting Incorrect Data Records

    Publication Year: 2016, Page(s):67 - 71
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (359 KB) | HTML iconHTML

    Software applications have become an indispensable integral part of this world. In all areas of everyday life they are used to store information. Users of software applications rely on the data correctness. Incorrect data within the data set can cause a reduced user acceptance. To avoid incorrect data sets the process of knowledge discovery in databases (KDD) is a powerful instrument. The applicat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Proposed Framework for Simulation Based Learning of Inheritance

    Publication Year: 2016, Page(s):75 - 78
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (233 KB) | HTML iconHTML

    Different types of serious games have been used in elucidating computer science areas such as computer games, mobile games, Lego-based games, virtual worlds and webbased games. Different evaluation techniques have been conducted like questionnaires, interviews, discussions and tests. Simulation have been widely used in computer science as a motivational and interactive learning tool. This paper ai... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Applying Gamification Principles to a Container Loading System in a Warehouse Environment

    Publication Year: 2016, Page(s):79 - 84
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2259 KB) | HTML iconHTML

    Gamification is a recent phenomenon that emphasizes the process of incorporating game elements, for a specific purpose, into an existing system in order to maximise a user's experience and increase engagement with the system. In this paper, we discuss the effects of the introduction of the principles of gamification to a system for solving real-world container loading problems in a warehouse envir... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simulation and Analysis of BDT Molecule with Au Electrodes as a Molecular Switch

    Publication Year: 2016, Page(s):87 - 92
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (215 KB) | HTML iconHTML

    Molecular electronics has the potential to miniaturize devices to atomic and molecular scales. This is significant given that CMOS devices are reaching fundamental limitations. The molecular orbital energies have been previously computed for a number of Benzene derivatives. The current flow in 1,4-Benzene Dithiol with Au electrodes has been analyzed using Hamiltonian and self-energies. The single ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Study of Single Layer and Bilayer GNRFET

    Publication Year: 2016, Page(s):93 - 96
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (344 KB) | HTML iconHTML

    Graphene Nano ribbons are among the recently discovered carbon nanostructures, with unique characteristics for novel applications. One of the most important features of graphene Nano ribbons, from both basic science and application points of view, is their electrical band gap. In this research, we study the tunability of band gap in single and double layer Graphene nano ribbons (GNRs) of specified... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.