All Stories

  1. A Comprehensive Survey on Imputation of Missing Data in Internet of Things
  2. Engineering Blockchain-based Software Systems: Foundations, Survey, and Future Directions
  3. On the Importance of Diversity in Re-Sampling for Imbalanced Data and Rare Events in Mortality Risk Models
  4. Handling uncertainty using features from pathology: opportunities in primary care data for developing high risk cancer survival methods
  5. Modelling cyber-security experts' decision making processes using aggregation operators
  6. Simulating user learning in authoritative technology adoption: An agent based model for council-led smart meter deployment planning in the UK
  7. Supervised Anomaly Detection in Uncertain Pseudoperiodic Data Streams
  8. Refining adverse drug reaction signals by incorporating interaction variables identified using emergent pattern mining
  9. CRNN: A Joint Neural Network for Redundancy Detection
  10. Applying Interval Type-2 Fuzzy Rule Based Classifiers Through a Cluster-Based Class Representation
  11. An ensemble of machine learning and anti-learning methods for predicting tumour patient survival rates
  12. A supervised adverse drug reaction signalling framework imitating Bradford Hill’s causality considerations
  13. Adaptive Data Communication Interface: A User-Centric Visual Data Interpretation Framework
  14. Juxtaposition of System Dynamics and Agent-Based Simulation for a Case Study in Immunosenescence
  15. Indebted Households Profiling: A Knowledge Discovery from Database Approach
  16. Feature Selection in Detection of Adverse Drug Reactions from the Health Improvement Network (THIN) Database
  17. Health Information Science
  18. Identifying Candidate Risk Factors for Prescription Drug Side Effects Using Causal Contrast Set Mining
  19. An Improved System For Sentence-Level Novelty Detection In Textual Streams
  20. A Data Mining Framework to Model Consumer Indebtedness with Psychological Factors
  21. Personalising Mobile Advertising Based on Users' Installed Apps
  22. Incorporating Spontaneous Reporting System Data to Aid Causal Inference in Longitudinal Healthcare Data
  23. Refining Adverse Drug Reactions Using Association Rule Mining for Electronic Healthcare Data
  24. Analysing fuzzy sets through combining measures of similarity and distance
  25. Augmented Neural Networks for modelling consumer indebtness
  26. Tuning a multiple classifier system for side effect discovery using genetic algorithms
  27. Comparison of Distance metrics for hierarchical data in medical databases
  28. A fuzzy directional distance measure
  29. Comparing Stochastic Differential Equations and Agent-Based Modelling and Simulation for Early-Stage Cancer
  30. A Novel Semisupervised Algorithm for Rare Prescription Side Effect Discovery
  31. Data classification using the Dempster–Shafer method
  32. Signalling Paediatric Side Effects using an Ensemble of Simple Study Designs
  33. Variability of Behaviour in Electricity Load Profile Clustering; Who Does Things at the Same Time Each Day?
  34. Towards the development of a simulator for investigating the impact of people management practices on retail performance
  35. On the Role of the AIS Practitioner
  36. The use of Agent-based Simulation to Discover Extreme Cases in Immune-Interactions with Early-Stage Cancer Scenarios
  37. Measuring the directional distance between fuzzy sets
  38. Comparison of algorithms that detect drug side effects using electronic healthcare databases
  39. Artificial Immune Systems
  40. Interval type-2 fuzzy logic based robotic sailing
  41. Ensemble learning of colorectal cancer survival rates
  42. Extending similarity measures of interval type-2 fuzzy sets to general type-2 fuzzy sets
  43. Attributes for causal inference in electronic healthcare databases
  44. Theoretical formulation and analysis of the deterministic dendritic cell algorithm
  45. Towards a More Systematic Approach to Secure Systems Design and Analysis
  46. Wavelet feature extraction and genetic algorithm for biomarker detection in colorectal cancer data
  47. Investigating mathematical models of immuno-interactions with early-stage cancer under an agent-based modelling perspective
  48. Detect Adverse Drug Reactions for Drug Simvastatin
  49. Modelling Electrical Car Diffusion Based on Agent
  50. Detect adverse drug reactions for drug Pioglitazone
  51. Detect Adverse Drug Reactions for Drug Alendronate
  52. Detect Adverse Drug Reactions for Drug Atorvastatin
  53. Detect Adverse drug reactions for drug Aspirin
  54. Detect adverse drug reactions for the drug Pravastatin
  55. Supervised learning and anti-learning of colorectal cancer classes and survival rates from cellular biology parameters
  56. Comparing data-mining algorithms developed for longitudinal observational databases
  57. A three-dimensional model of residential energy consumer archetypes for local energy policy design in the UK
  58. Evaluating Different Cost-Benefit Analysis Methods for Port Security Operations
  59. Privileged information for data clustering
  60. An investigation into the relationship between type-2 FOU size and environmental uncertainty in robotic control
  61. Variance In System Dynamics And Agent Based Modelling Using The SIR Model Of Infectious Disease
  62. Investigating the Effectiveness of Variance Reduction Techniques in Manufacturing, Call Center and Cross-Docking Discrete Event Simulation Models
  63. A Beginner’s Guide to Systems Simulation in Immunology
  64. Validation of a microsimulation of the Port of Dover
  65. Discovering sequential patterns in a UK general practice database
  66. Modelling electricity consumption in office buildings: An agent based approach
  67. A comparison of non-stationary, type-2 and dual surface fuzzy control
  68. A First Approach on Modelling Staff Proactiveness in Retail Simulation Models
  69. Simulating the Dynamics of T Cell Subsets throughout the Lifetime
  70. Quiet in Class: Classification, Noise and the Dendritic Cell Algorithm
  71. Systems Dynamics or Agent-Based Modelling for Immune Simulation?
  72. Heuristic optimisation
  73. A New Graphical Password Scheme Resistant to Shoulder-Surfing
  74. Towards the development of a simulator for investigating the impact of people management practices on retail performance
  75. Motif detection inspired by immune memory
  76. Real-world transfer of evolved artificial immune system behaviours between small and large scale robotic platforms
  77. An Audio CAPTCHA to Distinguish Humans from Computers
  78. Two-timescale learning using idiotypic behaviour mediation for a navigating mobile robot
  79. Behavioural Correlation for Detecting P2P Bots
  80. Artificial Immune Systems
  81. Defining a Simulation Strategy for Cancer Immunocompetence
  82. Information fusion in the immune system
  83. Information fusion for anomaly detection with the dendritic cell algorithm
  84. The Transfer of Evolved Artificial Immune System Behaviours between Small and Large Scale Robotic Platforms
  85. Can Background Baroque Music Help to Improve the Memorability of Graphical Passwords?
  86. Against Spyware Using CAPTCHA in Graphical Password Scheme
  87. The effect of baroque music on the PassPoints graphical password
  88. Tailored RF pulse for magnetization inversion at ultrahigh field
  89. Simulating Customer Experience and Word-Of-Mouth in Retail — A Case Study
  90. A Component-Based Heuristic Search Method with Evolutionary Eliminations for Hospital Personnel Scheduling
  91. An Evolutionary Squeaky Wheel Optimization Approach to Personnel Scheduling
  92. Artificial Immune Systems
  93. Exploration of the Dendritic Cell Algorithm Using the Duration Calculus
  94. Modelling and simulating retail management practices: a first approach
  95. Parcellation of fMRI Datasets with ICA and PLS-A Data Driven Approach
  96. STORM - A Novel Information Fusion and Cluster Interpretation Technique
  97. Cheating for problem solving
  98. Integrating real-time analysis with the dendritic cell algorithm through segmentation
  99. Modelling and simulating retail management practices: a first approach
  100. ToLeRating UR-STD
  101. DCA for bot detection
  102. The DCA: SOMe comparison
  103. Special issue on artificial immune systems
  104. Detecting Bots Based on Keylogging Activities
  105. Detecting Danger: The Dendritic Cell Algorithm
  106. The motif tracking algorithm
  107. Using intelligent agents to understand management practices and retail productivity
  108. Idiotypic Immune Networks in Mobile-Robot Control
  109. An estimation of distribution algorithm for nurse scheduling
  110. Immune system approaches to intrusion detection – a review
  111. Sensing danger: Innate immunology for intrusion detection
  112. Biological Inspiration for Artificial Immune Systems
  113. Motif Detection Inspired by Immune Memory
  114. Dendritic cells for SYN scan detection
  115. Detecting Motifs in System Call Sequences
  116. Rule generalisation in intrusion detection systems using SNORT
  117. The Application of a Dendritic Cell Algorithm to a Robotic Classifier
  118. An estimation of distribution algorithm with intelligent local search for rule-based nurse rostering
  119. Book Selection
  120. Book Selection
  121. Book Selection
  122. Book Selection
  123. Price Trackers Inspired by Immune Memory
  124. Integrating Innate and Adaptive Immunity for Intrusion Detection
  125. Articulation and Clarification of the Dendritic Cell Algorithm
  126. BOA for Nurse Scheduling
  127. Improved Squeaky Wheel Optimisation for Driver Scheduling
  128. Book Selection
  129. Book Selection
  130. A Recommender System based on Idiotypic Artificial Immune Networks
  131. Book Selection
  132. Book Selection
  133. Book Selection
  134. Towards a Conceptual Framework for Innate Immunity
  135. Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection
  136. Cooperative Automated Worm Response and Detection ImmuNe ALgorithm(CARDINAL) Inspired by T-Cell Immunity and Tolerance
  137. An indirect Genetic Algorithm for a nurse-scheduling problem
  138. Building Better Nurse Scheduling Algorithms
  139. Immune System Approaches to Intrusion Detection – A Review
  140. The Application of Bayesian Optimization and Classifier Systems in Nurse Scheduling
  141. Danger Theory: The Link between AIS and IDS?
  142. An indirect genetic algorithm for set covering problems
  143. Exploiting problem structure in a genetic algorithm approach to a nurse rostering problem
  144. Ueber 5-Oxy-1.2.3-triazole
  145. Modelling Immunological Memory
  146. Investigating a Hybrid Metaheuristic for Job Shop Rescheduling
  147. Artificial Immune Systems
  148. Introduction to Multi-Agent Simulation
  149. The Deterministic Dendritic Cell Algorithm
  150. Introduction to Multi-Agent Simulation
  151. Multi-Agent Simulation and Management Practices
  152. Further Exploration of the Dendritic Cell Algorithm: Antigen Multiplier and Time Windows
  153. Artificial Dendritic Cells: Multi-faceted Perspectives
  154. Real-Time Alert Correlation with Type Graphs
  155. Multi-Agent Simulation and Management Practices
  156. An Idiotypic Immune Network as a Short-Term Learning Architecture for Mobile Robots
  157. Enhancing Productivity: The Role of Management Practices
  158. libtissue - implementing innate immunity
  159. Dendritic Cells for Anomaly Detection
  160. A Bayesian optimization algorithm for the nurse scheduling problem
  161. A recommender system based on the immune network
  162. Towards the development of a simulator for investigating the impact of people management practices on retail performance