


default search action
17th UKSim 2015: Cambridge, UK
- David Al-Dabass, Alessandra Orsoni, Richard J. Cant, Zuwairie Ibrahim, Ismail Saad:

UKSim-AMSS 17th International Conference on Computer Modelling and Simulation, UKSim 2015, Cambridge, United Kingdom, March 25-27, 2015. IEEE 2015, ISBN 978-1-4799-8712-2
Plenary Abstracts
- Frank Wang:

Computer Evolution over the Next Decade: Fact or Fiction? 3 - Qiang Shen:

Approximate Feature Selection in Data-Driven Systems Modelling. 4 - Harry G. Barrow:

History of Computing and AI, a Personal Viewpoint. 5 - Janos Sebestyen Janosy:

The Intelligent Electricity Network of the Future: SmartGrid. 6
TRACK: 02.B: Fuzzy Systems
- Prashant K. Gupta

, Manvi Madan:
Per-C Based Student Examination Strategy Evaluation in Mobile Evaluation System Conducted Through a Smartphone. 23-28
TRACK: 03.C: Evolutionary Computation
- Zhenquan Li

, Peter Crowhurst, Robert Wood
:
Error Driven Node Placement as Applied to One Dimensional Shallow Water Equations. 31-38 - Nebojsa Bacanin

, Milan Tuba
, Ivana Strumberger
:
RFID Network Planning by ABC Algorithm Hybridized with Heuristic for Initial Number and Locations of Readers. 39-44
TRACK: 06.F: Bioinformatics and Bioengineering
- Gillian Pearce, Gregorio Romero

, Julian Wong:
An Investigation into Blood Clot Removal with the GP Mechanical Thrombectomy Device (GPTAD) in an Abattoir Porcine Artery Model. 47-49 - Lela Mirtskhulava, Julian Wong, Salah S. Al-Majeed, Gillian Pearce:

Artificial Neural Network Model in Stroke Diagnosis. 50-53 - Adriana Aguilera González

, Holger Voos
, Mohamed Darouach:
Glucose-Insulin System Based on Minimal Model: A Realistic Approach. 55-60 - Gillian Pearce, Julian Wong, Lela Mirtskhulava, Salah S. Al-Majeed, Koba Bakuria, Nana Gulua:

Artificial Neural Network and Mobile Applications in Medical Diagnosis. 61-64 - Safaa S. Omran

, Aqeel A. Al-Hillali
:
Quarter of Iris Region Recognition Using the RED Algorithm. 66-72
TRACK: 08.H: Data and Semantic Mining
- Vibhu Jawa, Varun Hasija:

A Sentiment and Interest Based Approach for Product Recommendation. 75-80 - Levent Koc, Alan D. Carswell:

Network Intrusion Detection Using a HNB Binary Classifier. 81-85 - Amal Alsaad, Maysam Abbod

:
Enhanced Topic Identification Algorithm for Arabic Corpora. 90-94
TRACK: 09.I: Games, VR and Visualization
- Amer Rasheed, Uffe Kock Wiil

:
A Tool for Analysis and Visualization of Criminal Networks. 97-102 - Ayodeji Remi Omosowon

, Richard J. Cant, Caroline S. Langensiepen:
Deriving an Entropy Measure for 2D Container Layouts. 103-108
TRACK: 11.K: Intelligent Systems and Applications
- Dian Yang, Yongxin Zhu, Tian Huang

, Yiliang He, Stéphane Bressan:
A Provenance Scheme for Emerging Water Contaminants. 119-124 - Saleh Alaliyat, Harald Yndestad:

An Agent-Based Model to Simulate Infectious Disease Dynamics in an Aquaculture Facility. 131-136 - Danish Pruthi, Ayush Jain, Krishna Murthy Jatavallabhula

, Ruppesh Nalwaya, Puneet Teja:
Maxxyt: An Autonomous Wearable Device for Real-Time Tracking of a Wide Range of Exercises. 137-141 - Madihah Mohd Saudi

, Nurlida Basir, Nur Fatin Nabila
, Farida Ridzuan
, Sakinah Ali Pitchay:
An Efficient Easy Computer Emergency Response Team Malware Reservoir System(eZCERT). 142-146 - Ahmad Faisal Abidin, Mario Kolberg:

Towards Improved Vehicle Arrival Time Prediction in Public Transportation: Integrating SUMO and Kalman Filter Models. 147-152 - Achim Kuwertz, Cornelius Goldbeck, Ronny Hug, Jürgen Beyerer:

Towards Web-Based Semantic Knowledge Completion for Adaptive World Modeling in Cognitive Systems. 165-170 - Eric Ferreri, Jean Marc Salotti, Pierre-Alexandre Favier:

Simulation of Habits and Planned Activities Related to Electrical Domestic Consumption. 171-175 - Madihah Mohd Saudi

, Farida Ridzuan
, Nurlida Basir, Nur Fatin Nabila
, Sakinah Ali Pitchay, Intan Nurfarahin Ahmad:
Android Mobile Malware Surveillance Exploitation via Call Logs: Proof of Concept. 176-181 - Mian-Guan Lim, Frank Wang, Nan Jiang:

Automating Management of Resources on Desktop Machines. 188-191
TRACK: 13.M: Systems Intelligence and Intelligence Systems
- Catalina Spataru, Mark Barrett

:
DEAM: A Scalable Dynamic Energy Agents Model for Demand and Supply. 195-200 - Sakinah Ali Pitchay, Wail Abdo Ali Alhiagem, Farida Ridzuan

, Madihah Mohd Saudi
:
A Proposed System Concept on Enhancing the Encryption and Decryption Method for Cloud Computing. 201-205
TRACK: 16.P: Robotics, Cybernetics, Engineering, Manufacturing and Control
- Victoria Wumi Oguntosin, Slawomir Jaroslaw Nasuto

, Yoshikatsu Hayashi
:
A Compact Low-Cost Electronic Hardware Design for Actuating Soft Robots. 242-247 - Ali Hosseinpour Najarkolaei, Wada Hosny, Jaswinder Lota:

Bit Error Rate Performance in Power Line Communication Channels with Impulsive Noise. 248-251
TRACK: 17.Q: Methodologies, Tools and Operations Research
- Mark Barrett

, Catalina Spataru:
DynEMo: A Dynamic Energy Model for the Exploration of Energy, Society and Environment. 255-260
TRACK: 18.R: Discrete Event and Real Time Systems
- Angelo Furfaro

, Giovanna Malena, Lorena Molina Valdiviezo
, Andrea Parise:
A Simulation Model for the Analysis of DDoS Amplification Attacks. 267-272
TRACK: 19.S: Image, Speech and Signal Processing Heuristic Based Labeling Using Edgelet Based Contour Detection for Low
- Solomon A. Tesfamicael, Bruhtesfa E. Godana:

Compressed Sensing Performance Analysis via Replica Method Using Bayesian Framework. 281-289 - Daniel Becker, Achim Streit

:
Localization of Signal Peaks in Photon Science Imaging. 296-301 - Solomon Tesfamicael, Faraz Barzideh:

Clustered Compressed Sensing via Bayesian Framework. 302-309 - Sohailah Makhmasi, Fatma Taher

, Hussain Al-Ahmad
, Tim McGloughlin
:
A Novel Multiple Watermarking Algorithm for Patient Identification and Integrity Control. 310-315 - Arwa Al-Khatatneh, Sakinah Ali Pitchay, Musab Kasim AlQudah:

A Review of Skew Detection Techniques for Document. 316-321 - Quist-Aphetsi Kester

, Laurent Nana, Anca Christine Pascu, Sophie Gire, Jojo Moses Eghan, Nii Narku Quaynor:
A Hybrid Image Cryptographic and Spatial Digital Watermarking Encryption Technique for Security and Authentication of Digital Images. 322-326 - Quist-Aphetsi Kester

, Laurent Nana, Anca Christine Pascu, Sophie Gire, Jojo Moses Eghan, Nii Narku Quaynor:
A Novel Hybrid Discrete Cosine Transformation and Visual Cryptographic Technique for Securing Digital Images. 327-332
TRACK: 20.T: Industry, Business, Management, Human Factors, and Social Issues
- Michael N. Moeti, Khuliso Sigama:

Information Security Management Issues in a Cloud-based environment. 349-354 - Mikel Zuzuarregui, Enda Fallon

, MingXue Wang, John Keeney, Paul Jacob:
PRISENIT - A Probabilistic Search Recommendation Algorithm to Improve Search Efficiency for Network Intelligence and Troubleshooting. 355-360 - Dari Trendafilov

, Daniel Polani, Roderick Murray-Smith
:
Model of Coordination Flow in Remote Collaborative Interaction. 361-366
TRACK: 21.U: Energy, Power, Transport, Logistics, Harbour, Shipping, and Marine Simulation
- Amit G. Bhat, Kaushik Roy, Prajesh P. Anchalia, H. M. Jeevith:

Design and Implementation of a Dynamic Intelligent Traffic Control System. 369-373 - Gad A. Mohamed, Medhat El-Geneidy, Nabil H. Abbasy

:
A WT Based DSP Algorithm to Calculate SAPC Compensating Current in Accordance to IEEE STD 1459-2010. 374-379 - Francesco Muzi, Mario Gimenez De Lorenzo, Giovanni De Gasperis:

A Predictive Model for the Automated Management of Conditioning Systems in Smart Buildings. 380-385 - Muhyaddin Jamal H. Rawa

, David W. P. Thomas, Mark Sumner
:
Mathematical Modeling of the Harmonic Distortion Caused by a Group of PCs Using Curve Fitting Technique. 386-390 - Karthik Srinivasan, Gaurav Roy:

A System Design for the Regulated Distribution of Automotive Fuel Using RFID. 391-395 - Junbo Sun, Haoxiang Chu, Da Xie

:
A Rotor Speed Based Time-varying Window for Harmonic Analysis of DFIG. 402-407 - Kshitij Chopra, Kritika Nigam, Sujata Pandey

:
Modelling and Simulation of Piezoelectric Cantilevers in RF MEMS Devices for Energy Harvesting Applications. 414-419 - Ahmed Al Ameri, Cristian Nichita, Hilal Abbood, Ali Al-Ataby

:
Fast Estimation Method for Selection of Optimal Distributed Generation Size Using Kalman Filter and Graph Theory. 420-425 - Khadidja Chaib Draa, Holger Voos

, Mohamed Darouach, Marouane Alma:
A Formal Modeling Framework for Anaerobic Digestion Systems. 426-431 - Ruoyang Du, Paul A. Robertson:

Modelling of Dynamic Magnetic Hysteresis Loops and Power Losses in Laminated Steel. 432-437 - Oluleke Babayomi

, Adeola Balogun, Charles Osheku:
Loss Minimizing Control of PMSM for Electric Power Steering. 438-443 - Syed Murtaza Ali Shah Bukhari, Junaid Maqsood, Mirza Qutab Baig, Suhail Ashraf, Tamim Ahmed Khan:

Comparison of Characteristics - Lead Acid, Nickel Based, Lead Crystal and Lithium Based Batteries. 444-450 - Meraj Hasan, Junaid Maqsood, Mirza Qutab Baig, Syed Murtaza Ali Shah Bukhari, Salman Ahmed

:
Design and Implementation of Single Phase Pure Sine Wave Inverter Using Multivibrator IC. 451-455
TRACK: 22.V: Parallel, Distributed and Software Architectures and Systems
- Prajesh P. Anchalia, Kaushik Roy, Kunal Roy:

Two Class Fisher's Linear Discriminant Analysis Using MapReduce. 463-469 - Norhazlina Hamid, Robert John Walters, Gary B. Wills:

Simulation and Mathematical Analysis of Multi-core Cluster Architecture. 476-481
TRACK: 23.W: Internet Modelling, Semantic Web and Ontologies
- Arooj Fatima

, Cristina Luca, George B. Wilson
, Mohamed Salah Kettouch:
Result Optimisation for Federated SPARQL Queries. 491-496 - Nur Fatin Nabila

, Nurlida Basir, Madihah Mohd Saudi
, S. A. Pitchay, Farida Ridzuan
, Ali Mamat, Mustafa Mat Deris:
Using Probability Theory to Identify the Unsure Value of an Incomplete Sentence. 497-501 - Nur Fatin Nabila

, Nurlida Basir, Madihah Mohd Saudi
, Ali Mamat, Masrah Azrifah Azmi Murad
, Norwati Mustapha, Mustafa Mat Deris:
Domain-Specific Inter-textual Non-taxonomic Extraction (DSINTE). 502-506
TRACK: 24.X: Mobile/Ad Hoc Wireless Networks, Mobicast, Sensor Placement, Target Tracking
- Xin Yang

, Zhili Sun
, Ye Miao, Ning Wang, Shaoli Kang, Yingmin Wang, Yu Yang:
Performance Optimisation for DSDV in VANETs. 514-519 - Trust Tshepo Mapoka, Simon J. Shepherd, Raed A. Abd-Alhameed, Kelvin O. O. Anoh:

Handover Optimised Authentication Scheme for High Mobility Wireless Multicast. 526-531 - Hani Alharbi, Amir Hussain

:
An Agent-Based Approach for Modelling Peer to Peer Networks. 532-537 - Ahmed Ben Saleh, Martin J. N. Sibley

, Peter Mather
:
QoS Aware Inter-Cluster Routing Protocol for IEEE 802.15.4 Networks. 538-543 - Mabrouka Abuhmida

, Kapilan Radhakrishnan, Ian Wells:
Performance Evaluation of Mobile Ad Hoc Routing Protocols on Wireless Sensor Networks for Environmental Monitoring. 544-548
TRACK: 25.Y: Performance Engineering of Computer and Communication Systems
- Joshua A. Adeleke, Mqhele E. Dlodlo

, Clement E. Onime
:
Video Traffic Prioritization in WLANs Using Single Queue Priority Scheduler. 557-562
TRACK: 26.Z: Circuits, Sensors and Devices
- Huei Chaeng Chin, Michael Loong Peng Tan:

Non-ballistic Modeling Transport of Phonon Scattering in Carbon Nanotube and Silicon Nanowire Field-Effect Transistors. 565-570 - Xiaojun Zhai, Fadi Jaber

, Faycal Bensaali
, Arti Mishra:
Hardware Acceleration of an Image Processing System for Dielectrophoretic Loading of Single Neurons Inside Micro-Wells of Microelectrode Arrays. 571-576 - Montserrat Fortes, Enrique Comesaña

, Guillermo Indalecio Fernández, José Rodríguez, Pablo Otero, Antonio J. García-Loureiro
, Michael Vetter:
Design and Monte Carlo Simulation of a LED-Based Optic Coupler. 577-581 - Neha Verma, Parveen, Jyotika Jogi:

Quantum Simulation of a Double Gate Double Heterostructure in AlAs/InGaAs HEMT to Analyze Temperature Effects. 582-587 - Darko Kova Evi, Mijo Zuji, Asja Kova Evi:

Min Max Control over Transfer Characteristics in Models of Technical and Non Technical Systems. 588-593 - Wanlong Chen, Xiao Yang, Frank Zhigang Wang:

An Omnipotent Memristor Model with Controllable Window Functions. 600-605 - Adam Crha, Richard Ruzicka, Václav Simek

:
Synthesis Methodology of Polymorphic Circuits Using Polymorphic NAND/NOR Gates. 612-617

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














