EEL-GA: an evolutionary clustering framework for energy-efficient 3D wireless sensor networks in smart forestry

Article


Batool, F., Ali, K., Lasebae, A., Windridge, D. and Kiyani, A. 2025. EEL-GA: an evolutionary clustering framework for energy-efficient 3D wireless sensor networks in smart forestry. Sensors. 25 (17). https://doi.org/10.3390/s25175250
TypeArticle
TitleEEL-GA: an evolutionary clustering framework for energy-efficient 3D wireless sensor networks in smart forestry
AuthorsBatool, F., Ali, K., Lasebae, A., Windridge, D. and Kiyani, A.
Abstract

Wireless Sensor Networks (WSNs) are very important for monitoring complex 3D environments like forests, where energy efficiency and reliable communication are critical. This paper presents EEL-GA, an Energy Efficient LEACH-based clustering protocol optimized using a Genetic Algorithm. Cluster head (CH) selection is guided by a dual-metric fitness function combining residual energy and intra-cluster distance. EEL-GA is evaluated against EEL variants using Particle Swarm Optimization (PSO), Differential Evolution (DE), and the Artificial Bee Colony (ABC) across key performance metrics, including energy efficiency, packet delivery, and cluster lifetime. Simulations using real environmental data confirm EEL-GA’s superiority in sustaining energy, minimizing delay, and improving network stability, making it ideal for smart forestry and mission-critical WSN deployments. The model also incorporates environmental dynamics, such as temperature and humidity, enhancing its robustness in real-world applications. These findings support EEL-GA as a scalable, adaptive solution for future energy-aware 3D WSN frameworks.

Sustainable Development Goals9 Industry, innovation and infrastructure
Middlesex University ThemeCreativity, Culture & Enterprise
PublisherMDPI
JournalSensors
ISSN
Electronic1424-8220
Publication dates
Online23 Aug 2025
Print23 Aug 2025
Publication process dates
Submitted02 Jul 2025
Accepted20 Aug 2025
Deposited12 Sep 2025
Output statusPublished
Publisher's version
License
File Access Level
Open
Copyright Statement

© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).

Digital Object Identifier (DOI)https://doi.org/10.3390/s25175250
PubMed ID40942680
PubMed Central IDPMC12431118
Web of Science identifierWOS:001570099400001
National Library of Medicine ID101204366
Permalink -

https://repository.mdx.ac.uk/item/2qywz4

Download files


Publisher's version
sensors-25-05250-v2.pdf
License: CC BY 4.0
File access level: Open

  • 625
    total views
  • 32
    total downloads
  • 8
    views this month
  • 1
    downloads this month

Export as

Related outputs

Margin-aware active learning for user-adaptive text classification
Tirunagari, S., Dhami, M. and Windridge, D. 2026. Margin-aware active learning for user-adaptive text classification. 9th International Conference on Natural Language Processing and Information Retrieval. Kyushu University, Fukuoka, Japan 12 - 14 Dec 2025 Springer.
Judges on trial: the future of research on judicial decision-making
Dhami, M., Kajdanowicz, T., Windridge, D. and Boukacem-Zeghmouri, C. 2026. Judges on trial: the future of research on judicial decision-making. in: Shortland, N. and Alison, L. (ed.) Big Ideas in Forensic Psychology: Visions of a Forensic Future From Leading Voices in the Field Wiley.
The application of pre-trained transformer models to UK Court of Appeal legal judgments
Abbas, W., Zia, T., Tirunagari, S., Chennareddy, V., Dhami, M. and Windridge, D. 2025. The application of pre-trained transformer models to UK Court of Appeal legal judgments. Quan, T.T., Sombattheera, C., Pham, H.-A. and Tran, N.T. (ed.) 18th International Conference on Multi-disciplinary Trends in Artificial Intelligence. Ho Chi Minh City, Vietnam 03 - 05 Dec 2025 Singapore Springer. pp. 252-264 https://doi.org/10.1007/978-981-95-4963-4_21
Kernel methods in the age of deep learning: from multimodal fusion to quantum machine learning
Windridge, D. 2025. Kernel methods in the age of deep learning: from multimodal fusion to quantum machine learning. 18th International Conference on Multi-disciplinary Trends in Artificial Intelligence. Ho Chi Minh City, Vietnam 03 - 05 Dec 2025
A novel adaptive AI-based framework for node scheduling algorithm selection in safety-critical wireless sensor networks
Al-Nader, I., Raheem, R. and Lasebae, A. 2025. A novel adaptive AI-based framework for node scheduling algorithm selection in safety-critical wireless sensor networks. Electronics. 14 (21). https://doi.org/10.3390/electronics14214198
Identifying social vulnerability profiles for coastal flood using supervised and unsupervised machine learning: a case study of Lekki peninsula, Lagos, Nigeria
Akindejoye, A., Viavattene, C., Priest, S. and Windridge, D. 2025. Identifying social vulnerability profiles for coastal flood using supervised and unsupervised machine learning: a case study of Lekki peninsula, Lagos, Nigeria. International Journal of Disaster Risk Reduction. 127. https://doi.org/10.1016/j.ijdrr.2025.105693
Classical to quantum knowledge distillation: a study on the impact of hybridization
Piperno, S., Vittori, G., Windridge, D., Rosato, A. and Panella, M. 2025. Classical to quantum knowledge distillation: a study on the impact of hybridization. 2025 International Joint Conference on Neural Networks. Rome, Italy 30 Jun - 05 Jul 2025 IEEE. https://doi.org/10.1109/ijcnn64981.2025.11227730
A novel bio-inspired bird flocking node scheduling algorithm for dependable safety-critical wireless sensor network systems
Al-Nader, I., Raheem, R. and Lasebae, A. 2025. A novel bio-inspired bird flocking node scheduling algorithm for dependable safety-critical wireless sensor network systems. J - Multidisciplinary Scientific Journal. 8 (2). https://doi.org/10.3390/j8020019
A latent diffusion approach to visual attribution in medical imaging
Siddiqui, A.A., Tirunagari, S., Zia, T. and Windridge, D. 2025. A latent diffusion approach to visual attribution in medical imaging. Scientific Reports. 15 (1). https://doi.org/10.1038/s41598-024-81646-x
Accelerating material discovery for CdTe solar cells using knowledge intense word embeddings
Liu, X., Barth, K., Windridge, D. and Xu, K. 2024. Accelerating material discovery for CdTe solar cells using knowledge intense word embeddings. 52nd Photovoltaic Specialist Conference. Seattle, WA, USA 09 - 14 Jun 2024 IEEE. pp. 0281-0283 https://doi.org/10.1109/pvsc57443.2024.10749288
Quantum enhanced knowledge distillation
Simone, P., Lavagna, L., De Falco, F,, Ceschini, A., Rosato, A., Windridge, D. and Panella, M. 2024. Quantum enhanced knowledge distillation. Quantum Techniques in Machine Learning 2024 Conference. Melbourne, Australia 24 - 29 Nov 2024
Analyzing docker vulnerabilities through static and dynamic methods and enhancing IoT security with AWS IoT Core, CloudWatch, and GuardDuty
Ajith, V., Cyriac, T., Chavda, C., Kiyani, A.T., Chennareddy, V. and Ali, K. 2024. Analyzing docker vulnerabilities through static and dynamic methods and enhancing IoT security with AWS IoT Core, CloudWatch, and GuardDuty. IoT. 5 (3), pp. 592-607. https://doi.org/10.3390/iot5030026
Energy efficiency optimisation of joint computational task offloading and resource allocation using particle swarm optimisation approach in vehicular edge networks
Alam, A., Shah, P., Trestian, R., Ali, K. and Mapp, G. 2024. Energy efficiency optimisation of joint computational task offloading and resource allocation using particle swarm optimisation approach in vehicular edge networks. Sensors. 24 (10). https://doi.org/10.3390/s24103001
An evolutionary approach to automated class-specific data augmentation for image classification
Marc, S., Belavkin, R., Windridge, D. and Gao, X. 2024. An evolutionary approach to automated class-specific data augmentation for image classification. Moosaei, H., Hladík, M. and Pardalos, P. (ed.) 6th International Conference on the Dynamics of Information Systems. Prague, Czech Republic 03 - 06 Dec 2023 Springer. pp. 170–185 https://doi.org/10.1007/978-3-031-50320-7_12
Faithful Counterfactual Visual Explanations (FCVE)
Khan, B., Tariq, S., Zia, T., Ahsan, M. and Windridge, D. 2024. Faithful Counterfactual Visual Explanations (FCVE). Knowledge-Based Systems. 294. https://doi.org/10.1016/j.knosys.2024.111668
A novel bio-inspired bat node scheduling algorithm for dependable safety-critical wireless sensor network systems
Al-Nader, I., Lasebae, A., Raheem, R. and Ngondi, G. 2024. A novel bio-inspired bat node scheduling algorithm for dependable safety-critical wireless sensor network systems. Sensors. 24 (6). https://doi.org/10.3390/s24061928
A novel scheduling algorithm for improved performance of multi-objective safety-critical WSN using spatial self-organizing feature map
Al-Nader, I., Lasebae, A. and Raheem, R. 2024. A novel scheduling algorithm for improved performance of multi-objective safety-critical WSN using spatial self-organizing feature map. Electronics. 13 (1). https://doi.org/10.3390/electronics13010019
A new perceptron based neural-network algorithm to enhance the scheduling performance of safety-critical WSNs of increased dependability
Al-Nader, I, Lasebae, A. and Raheem, R. 2024. A new perceptron based neural-network algorithm to enhance the scheduling performance of safety-critical WSNs of increased dependability. So In, C., Londhe, N.D., Bhatt, N. and Kitsing, M. (ed.) 8th World Conference on Information Systems for Business Management. Bangkok, Thailand 07 - 08 Sep 2023 Springer. pp. 347-366 https://doi.org/10.1007/978-981-99-8612-5_28
Special issue on quantum inspired neural networks for engineering optimization
Pandey, H.M., Layeb, A. and Windridge, D. 2023. Special issue on quantum inspired neural networks for engineering optimization. Neural Processing Letters. 55 (4), pp. 3811-3812. https://doi.org/10.1007/s11063-023-11298-x
Resource saving via ensemble techniques for quantum neural networks
Incudini, M., Grossi, M., Ceschini, A., Mandarino, A., Panella, M., Vallecorsa, S. and Windridge, D. 2023. Resource saving via ensemble techniques for quantum neural networks. Quantum Machine Intelligence. 5 (2). https://doi.org/10.1007/s42484-023-00126-z
Analyzing land cover and land use changes using remote sensing techniques: a temporal analysis of climate change detection with Google Earth engine
Afzal, M., Ali, K., Kasi, M., Rehman, M., Khoshkholghi, A., Haq, B. and Shah, S. 2023. Analyzing land cover and land use changes using remote sensing techniques: a temporal analysis of climate change detection with Google Earth engine. IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications. Exeter, United Kingdom 01 - 03 Nov 2023 IEEE. pp. 2018-2023 https://doi.org/10.1109/TrustCom60117.2023.00277
Joint energy and spectral optimization in Heterogeneous Vehicular Network
Alam, A., Ali, K., Trestian, R., Shah, P. and Mapp, G. 2023. Joint energy and spectral optimization in Heterogeneous Vehicular Network. Computer Networks. 238. https://doi.org/10.1016/j.comnet.2023.110111
A novel scheduling algorithm for improved performance of multi-objective safety-critical wireless sensor networks using long short-term memory
Al-Nader, I., Lasebae, A., Raheem, R. and Khoshkholghi, A. 2023. A novel scheduling algorithm for improved performance of multi-objective safety-critical wireless sensor networks using long short-term memory. Electronics. 12 (23). https://doi.org/10.3390/electronics12234766
A topological features based quantum kernel
Incudini, M., Martini, F., Di Pierro, A. and Windridge, D. 2023. A topological features based quantum kernel. 7th International Conference on Quantum Techniques in Machine Learning. CERN, Geneva 19 - 24 Nov 2023
Interpretable chronic kidney disease risk prediction from clinical data using machine learning
Chennareddy, V., Tirunagari, S., Mohan, S., Windridge, D. and Balla, Y. 2023. Interpretable chronic kidney disease risk prediction from clinical data using machine learning. 16th Multi-Disciplinary International Conference on Artificial Intelligence (MIWAI 2023). Hyderabad, India 21 2023 - 22 Jul 2024 Springer. https://doi.org/10.1007/978-3-031-36402-0_63
Addressing challenges in healthcare big data analytics
Tirunagari, S., Mohan, S., Windridge, D. and Balla, Y. 2023. Addressing challenges in healthcare big data analytics. 16th Multi-Disciplinary International Conference on Artificial Intelligence (MIWAI 2023). Hyderabad, India 21 2023 - 22 Jul 2024 Springer. https://doi.org/10.1007/978-3-031-36402-0_70
Using Hidden Markov Chain for improving the dependability of safety-critical WSNs
Al-Nader, I., Lasebae, A. and Raheem, R. 2023. Using Hidden Markov Chain for improving the dependability of safety-critical WSNs. Barolli, L. (ed.) 37th International Conference on Advanced Information Networking and Applications. Federal University of Juiz de Fora, Brazil 29 - 31 Mar 2023 Cham, Switzerland. Springer. pp. 460–472 https://doi.org/10.1007/978-3-031-29056-5_40
Visual attribution using Adversarial Latent Transformations
Zia, T., Wahab, A., Windridge, D., Tirunagari, S. and Bhatti, N. 2023. Visual attribution using Adversarial Latent Transformations. Computers in Biology and Medicine. 166. https://doi.org/10.1016/j.compbiomed.2023.107521
Deep combination of radar with optical data for gesture recognition: role of attention in fusion architectures
Towakel, P., Windridge, D. and Nguyen, H. 2023. Deep combination of radar with optical data for gesture recognition: role of attention in fusion architectures. IEEE Transactions on Instrumentation and Measurement. 72, pp. 1-15. https://doi.org/10.1109/TIM.2023.3307768
The quantum path kernel: a generalized neural tangent kernel for deep quantum machine learning
Incudini, M., Grossi, M., Mandarino, A., Vallecorsa, S., Di Pierro, A. and Windridge, D. 2023. The quantum path kernel: a generalized neural tangent kernel for deep quantum machine learning. IEEE Transactions on Quantum Engineering. 4. https://doi.org/10.1109/TQE.2023.3287736
Pediatrics in artificial intelligence era: A systematic review on challenges, opportunities, and explainability
Balla, Y., Tirunagari, S. and Windridge, D. 2023. Pediatrics in artificial intelligence era: A systematic review on challenges, opportunities, and explainability. Indian Pediatrics. 60 (7), pp. 561-569. https://doi.org/10.1007/s13312-023-2936-8
Resource saving via ensemble techniques for quantum neural networks
Incudini, M., Grossi, M., Ceschini, A., Mandarino, A., Panella, M., Vallecorsa, S. and Windridge, D. 2023. Resource saving via ensemble techniques for quantum neural networks. https://doi.org/10.48550/arXiv.2303.11283
Efficient design for smart environment using Raspberry Pi with Blockchain and IoT (BRIoT)
Ponugumati, S., Ali, K., Lasebae, A., Zahoor, Z., Kiyani, A., Khoshkholghi, A. and Maddu, L. 2023. Efficient design for smart environment using Raspberry Pi with Blockchain and IoT (BRIoT). CCGridW: 4th Workshop on Secure IoT, Edge and Cloud Systems (SioTEC) 2023. Bangalore, India 01 - 04 May 2023 IEEE. pp. 75-80 https://doi.org/10.1109/CCGridW59191.2023.00026
Information fusion-based cybersecurity threat detection for intelligent transportation system
Chowdhury, A., Naha, R., Kaisar, S., Khoshkholghi, A., Ali, K. and Galletta, A. 2023. Information fusion-based cybersecurity threat detection for intelligent transportation system. CCGridW: 4th Workshop on Secure IoT, Edge and Cloud Systems (SioTEC) 2023. Bangalore, India 01 - 04 May 2023 IEEE. pp. 96-103 https://doi.org/10.1109/CCGridW59191.2023.00029
Reducing the dependency of having prior domain knowledge for effective online information retrieval
Zammit, O., Smith, S., Windridge, D. and De Raffaele, C. 2023. Reducing the dependency of having prior domain knowledge for effective online information retrieval. Expert Systems. 40 (4). https://doi.org/10.1111/exsy.13014
A user-guided personalization methodology to facilitate new smart home occupancy
Ali, S.M.M., Augusto, J., Windridge, D. and Ward, E. 2023. A user-guided personalization methodology to facilitate new smart home occupancy. Universal Access in the Information Society. 22 (3), pp. 869-891. https://doi.org/10.1007/s10209-022-00883-x
Challenges, applications and future of wireless sensors in Internet of Things: a review
Jamshed, M., Ali, K., Abbasi, Q., Imran, M. and Ur-Rehman, M. 2022. Challenges, applications and future of wireless sensors in Internet of Things: a review. IEEE Sensors Journal. https://doi.org/10.1109/JSEN.2022.3148128
The quantum path kernel: A generalized quantum neural tangent kernel for deep quantum machine learning
Incudini, M., Grossi, M., Mandarino, A., Vallecorsa, S., Di Pierro, A. and Windridge, D. 2022. The quantum path kernel: A generalized quantum neural tangent kernel for deep quantum machine learning. https://doi.org/10.48550/arXiv.2212.11826
Discriminator-based adversarial networks for knowledge graph completion
Tubaishat, A., Zia, T., Faiz, R., Al Obediat, F., Shah, B. and Windridge, D. 2022. Discriminator-based adversarial networks for knowledge graph completion. Neural Computing and Applications. https://doi.org/10.1007/s00521-022-07680-w
Novel group handover mechanism for cooperative and coordinated mobile femtocells technology in railway environment
Raheem, R., Lasebae, A. and Raheem, A. 2022. Novel group handover mechanism for cooperative and coordinated mobile femtocells technology in railway environment. Array. 15. https://doi.org/10.1016/j.array.2022.100223
A novel kernel based approach to arbitrary length symbolic data with application to type 2 diabetes risk
Nwegbu, N., Tirunagari, S. and Windridge, D. 2022. A novel kernel based approach to arbitrary length symbolic data with application to type 2 diabetes risk. Scientific Reports. 12 (1), pp. 1-16. https://doi.org/10.1038/s41598-022-08757-1
VANT-GAN: adversarial learning for discrepancy-based visual attribution in medical imaging
Zia, T., Murtaza, S., Bhatti, N., Windridge, D. and Nisar, Z. 2022. VANT-GAN: adversarial learning for discrepancy-based visual attribution in medical imaging. Pattern Recognition Letters. 156, pp. 112-118. https://doi.org/10.1016/j.patrec.2022.02.005
Continuous user authentication featuring behavioural biometrics
Kiyani, A. 2021. Continuous user authentication featuring behavioural biometrics. PhD thesis Middlesex University
Cooperative and coordinated Mobile Femtocells technology in high-speed vehicular environments: mobility and interference management
Raheem, R., Lasebae, A., Petridis, M. and Raheem, A. 2021. Cooperative and coordinated Mobile Femtocells technology in high-speed vehicular environments: mobility and interference management. Barolli, L., Woungang, I. and Enokido, T. (ed.) 35th International Conference on Advanced Information Networking and Applications (AINA-2021). Ryerson University, Toronto, Canada (Held Online) 12 - 14 May 2021 Springer. pp. 653-666 https://doi.org/10.1007/978-3-030-75100-5_56
Robust continuous user authentication system using long short term memory network for healthcare
Tanveer, A., Lasebae, A., Ali, K., Alkhayyat, A., Ur-Rehman, M., Haq, B. and Naeem, B. 2021. Robust continuous user authentication system using long short term memory network for healthcare. Ur-Rehman, M. and Zoha, A. (ed.) 16th EAI International Conference on Body Area Networks. Glasgow, UK (Online) 25 - 26 Oct 2021 Cham Springer. pp. 295–307 https://doi.org/10.1007/978-3-030-95593-9_22
Adaptability of automated information systems by the development sector in developing countries: a case study
Ahmed, B., Haq, B., Ali, K. and Iqbal, M. 2021. Adaptability of automated information systems by the development sector in developing countries: a case study. 2021 International Conference on Computing, Electronic and Electrical Engineering (ICE Cube). Quetta, Pakistan 26 - 27 Oct 2021 IEEE. https://doi.org/10.1109/ICECube53880.2021.9628254
A generative adversarial network for single and multi-hop distributional knowledge base completion
Zia, T. and Windridge, D. 2021. A generative adversarial network for single and multi-hop distributional knowledge base completion. Neurocomputing. 461, pp. 543-551. https://doi.org/10.1016/j.neucom.2021.04.128
Generative Adversarial Networks (GANs) in networking: A comprehensive survey & evaluation
Navidan, H., Moshiri, P., Nabati, M., Shahbazian, R., Ghorashi, S., Shah-Mansouri, V. and Windridge, D. 2021. Generative Adversarial Networks (GANs) in networking: A comprehensive survey & evaluation. Computer Networks. 194, pp. 1-21. https://doi.org/10.1016/j.comnet.2021.108149
Multi-view convolutional recurrent neural networks for lung cancer nodule identification
Naeem Abid, M., Zia, T., Ghafoor, M. and Windridge, D. 2021. Multi-view convolutional recurrent neural networks for lung cancer nodule identification. Neurocomputing. 453, pp. 299-311. https://doi.org/10.1016/j.neucom.2020.06.144
Review and implementation of resilient public safety networks: 5G, IoT and emerging technologies
Ali, K., Nguyen, H., Vien, Q., Shah, P., Raza, M., Paranthaman, V., Er-Rahmadi, B., Awais, M., Islam, S. and Rodrigues, J. 2021. Review and implementation of resilient public safety networks: 5G, IoT and emerging technologies. IEEE network. 35 (2), pp. 18-25. https://doi.org/10.1109/MNET.011.2000418
Heuristic edge server placement in Industrial Internet of Things and cellular networks
Kasi, S., Kasi, M., Ali, K., Raza, M., Afzal, H., Lasebae, A., Naeem, B., Islam, S. and Rodrigues, J. 2021. Heuristic edge server placement in Industrial Internet of Things and cellular networks. IEEE Internet of Things Journal. 8 (13), pp. 10308-10317. https://doi.org/10.1109/JIOT.2020.3041805
On the utility of dreaming: a general model for how learning in artificial agents can benefit from data hallucination
Windridge, D., Svensson, H. and Thill, S. 2021. On the utility of dreaming: a general model for how learning in artificial agents can benefit from data hallucination. Adaptive Behavior. 29 (3), pp. 267-280. https://doi.org/10.1177/1059712319896489
A genetic deep learning model for electrophysiological soft robotics
Pandey, H. and Windridge, D. 2021. A genetic deep learning model for electrophysiological soft robotics. Balas, V., Jain, L., Balas, M. and Shahbazova, S. (ed.) 8th International Workshop on Soft Computing Applications. Arad, Romania 13 - 15 Sep 2018 Cham Springer. https://doi.org/10.1007/978-3-030-51992-6_12
Exposing students to new terminologies while collecting browsing search data (best technical paper)
Zammit, O., Smith, S., Windridge, D. and De Raffaele, C. 2020. Exposing students to new terminologies while collecting browsing search data (best technical paper). 40th SGAI International Conference on Artificial Intelligence, AI 2020. Cambridge, UK 15 - 17 Dec 2020 Cham Springer. https://doi.org/10.1007/978-3-030-63799-6_1
Continuous user authentication featuring keystroke dynamics based on robust recurrent confidence model and ensemble learning approach
Kiyani, A., Lasebae, A., Ali, K., Ur-Rehman, M. and Haq, B. 2020. Continuous user authentication featuring keystroke dynamics based on robust recurrent confidence model and ensemble learning approach. IEEE Access. 8, pp. 156177-156189. https://doi.org/10.1109/ACCESS.2020.3019467
Epileptic seizure detection using constrained singular spectrum analysis and 1D-local binary patterns
Ramanna, S., Tirunagari, S. and Windridge, D. 2020. Epileptic seizure detection using constrained singular spectrum analysis and 1D-local binary patterns. Health and Technology. 10 (3), pp. 699-709. https://doi.org/10.1007/s12553-019-00395-4
Editorial to special issue on hybrid artificial intelligence and machine learning technologies in intelligent systems
Pandey, H., Bessis, N., Das, S., Windridge, D. and Chaudhary, A. 2020. Editorial to special issue on hybrid artificial intelligence and machine learning technologies in intelligent systems. Neural Computing and Applications. 32 (12), pp. 7743-7745. https://doi.org/10.1007/s00521-020-04903-w
A low-complexity trajectory privacy preservation approach for indoor fingerprinting positioning systems
Sazdar, A.M., Ghorashi, S.A., Moghtadaiee, V., Khonsari, A. and Windridge, D. 2020. A low-complexity trajectory privacy preservation approach for indoor fingerprinting positioning systems. Journal of Information Security and Applications. 53. https://doi.org/10.1016/j.jisa.2020.102515
Deployment of drone-based small cells for public safety communication system
Ali, K., Nguyen, H., Vien, Q., Shah, P. and Raza, M. 2020. Deployment of drone-based small cells for public safety communication system. IEEE Systems Journal. 14 (2), pp. 2882-2891. https://doi.org/10.1109/JSYST.2019.2959668
Architecture design for disaster resilient management network using D2D technology
Ali, K. 2019. Architecture design for disaster resilient management network using D2D technology. PhD thesis Middlesex University
Revisiting direct neuralisation of first-order logic
Gunn, I. and Windridge, D. 2018. Revisiting direct neuralisation of first-order logic. NeSy 2018 : Thirteenth International Workshop on Neural-Symbolic Learning and Reasoning. Prague, Czech Republic 23 - 24 Aug 2018
A generative adversarial strategy for modeling relation paths in knowledge base representation learning
Zia, T., Zahid, U. and Windridge, D. 2019. A generative adversarial strategy for modeling relation paths in knowledge base representation learning. KR2ML - Knowledge Representation and Reasoning Meets Machine Learning Workshop, NeurIPS 2019, Thirty-third Conference on Neural Information Processing Systems. Vancouver, Canada 09 - 14 Dec 2019
TAEO-A thermal aware & energy optimized routing protocol for wireless body area networks
Javed, M., Ahmed, G., Mahmood, D., Raza, M., Ali, K. and Ur-Rehman, M. 2019. TAEO-A thermal aware & energy optimized routing protocol for wireless body area networks. Sensors. 19 (15), pp. 1-14. https://doi.org/10.3390/s19153275
Fully-automated identification of imaging biomarkers for post-operative cerebellar mutism syndrome using longitudinal paediatric MRI
Spiteri, M., Guillemaut, J., Windridge, D., Avula, S., Kumar, R. and Lewis, E. 2020. Fully-automated identification of imaging biomarkers for post-operative cerebellar mutism syndrome using longitudinal paediatric MRI. Neuroinformatics. 18 (1), pp. 151-162. https://doi.org/10.1007/s12021-019-09427-w
An efficient deep learning model for intrusion classification and prediction in 5G and IoT networks
Rezvy, S., Luo, Y., Petridis, M., Lasebae, A. and Zebin, T. 2019. An efficient deep learning model for intrusion classification and prediction in 5G and IoT networks. 2019 53rd Annual Conference on Information Sciences and Systems (CISS). Baltimore, MD, USA, USA 20 - 22 Mar 2019 IEEE. pp. 1-6 https://doi.org/10.1109/CISS.2019.8693059
The impacts of internal threats towards routing protocol for low power and lossy network performance
Le, A., Loo, J., Luo, Y. and Lasebae, A. 2013. The impacts of internal threats towards routing protocol for low power and lossy network performance. 2013 IEEE Symposium on Computers and Communications (ISCC). https://doi.org/10.1109/ISCC.2013.6755045
An Internet of Things based bed-egress alerting paradigm using wearable sensors in elderly care environment
Awais, M., Raza, M., Ali, K., Ali, Z., Irfan, M., Chughtai, O., Khan, I., Kim, S. and Ur Rehman, M. 2019. An Internet of Things based bed-egress alerting paradigm using wearable sensors in elderly care environment. Sensors. 19 (11), pp. 1-17. https://doi.org/10.3390/s19112498
Automatic delineation of kidney region in DCE-MRI
Tirunagari, S., Poh, N., Wells, K., Bober, M., Gorden, I. and Windridge, D. 2019. Automatic delineation of kidney region in DCE-MRI.
A family of globally optimal branch-and-bound algorithms for 2D–3D correspondence-free registration
Brown, M., Windridge, D. and Guillemaut, J. 2019. A family of globally optimal branch-and-bound algorithms for 2D–3D correspondence-free registration. Pattern Recognition. 93, pp. 36-54. https://doi.org/10.1016/j.patcog.2019.04.002
An approach to human-machine teaming in legal investigations using anchored narrative visualisation and machine learning
Attfield, S., Fields, B., Windridge, D. and Xu, K. 2019. An approach to human-machine teaming in legal investigations using anchored narrative visualisation and machine learning. Conrad, J., Pickens, J., Jones, A., Baron, J. and Henseler, H. (ed.) First International Workshop on AI and Intelligent Assistance for Legal Professionals in the Digital Workplace (LegalAIIA 2019).. Montreal, Canada 17 Jun 2019 CEUR Workshop Proceedings. pp. 7-11
Improving the adaptation process for a new smart home user
Ali, S., Augusto, J. and Windridge, D. 2019. Improving the adaptation process for a new smart home user. Bramer, M. and Petridis, M. (ed.) AI-2019 Thirty-ninth SGAI International Conference on Artificial Intelligence. Cambridge, United Kingdom 17 - 19 Dec 2019 Springer. https://doi.org/10.1007/978-3-030-34885-4_32
Intrusion detection and classification with autoencoded deep neural network
Rezvy, S., Petridis, M., Lasebae, A. and Zebin, T. 2019. Intrusion detection and classification with autoencoded deep neural network. Lanet, J. and Toma, C. (ed.) SecITC 2018: International Conference on Security for Information Technology and Communications. Bucharest, Romania 08 - 09 Nov 2018 Switzerland Springer. pp. 142-156 https://doi.org/10.1007/978-3-030-12942-2_12
A survey of user-centred approaches for smart home transfer learning and new user home automation adaptation
Ali, M., Augusto, J. and Windridge, D. 2019. A survey of user-centred approaches for smart home transfer learning and new user home automation adaptation. Applied Artificial Intelligence. 33 (8), pp. 747-774. https://doi.org/10.1080/08839514.2019.1603784
A comprehensive classification of deep learning libraries
Pandey, H. and Windridge, D. 2019. A comprehensive classification of deep learning libraries. Yang, X.S., Sherratt, S., Dey, N. and Joshi, A. (ed.) 3rd International Congress on Information and Communication Technology. London, UK 27 - 28 Feb 2018 Singapore Springer. pp. 427-435 https://doi.org/10.1007/978-981-13-1165-9_40
Edit distance Kernelization of NP theorem proving for polynomial-time machine learning of proof heuristics
Windridge, D. and Kammueller, F. 2020. Edit distance Kernelization of NP theorem proving for polynomial-time machine learning of proof heuristics. FICC 2019: Future of Information and Communications Conference. San Francisco, USA 14 - 15 Mar 2019 Springer. pp. 271-283 https://doi.org/10.1007/978-3-030-12385-7_22
Criminal pattern identification based on modified K-means clustering
Aljrees, T., Shi, D., Windridge, D. and Wong, B. 2016. Criminal pattern identification based on modified K-means clustering. 2016 International Conference on Machine Learning and Cybernetics (ICMLC). 2, pp. 799-806. https://doi.org/10.1109/ICMLC.2016.7872990
A progressive approach to design authentication protocols for mobile heterogeneous networks
Kenaza, T., Aiash, M., Loo, J., Lasebae, A. and Whitney, G. 2016. A progressive approach to design authentication protocols for mobile heterogeneous networks. IEEE Trustcom/BigDataSE/I​SPA, 2016. Tianjin, China 23 - 26 Aug 2016 Institute of Electrical and Electronics Engineers (IEEE). pp. 1776-1781 https://doi.org/10.1109/trustcom.2016.0273
A security framework for node-to-node communications based on the LISP architecture
Kallash, M., Loo, J., Lasebae, A. and Aiash, M. 2018. A security framework for node-to-node communications based on the LISP architecture. International Journal of Electronic Security and Digital Forensics. 10 (3), pp. 276-291. https://doi.org/10.1504/IJESDF.2018.093024
On the intrinsic limits to representationally-adaptive machine-learning
Windridge, D. 2015. On the intrinsic limits to representationally-adaptive machine-learning. ArXiv e-prints.
Postoperative paediatric cerebellar mutism syndrome- identifying quantitative biomarkers on longitudinal follow-up MRI
Avula, S., Spiteri, M., Guillemaut, J.-Y., Windridge, D., Kumar, R., Pizer, B., Mallucci, C. and Lewis, E. 2018. Postoperative paediatric cerebellar mutism syndrome- identifying quantitative biomarkers on longitudinal follow-up MRI. Neuro-Oncology. 20 (suppl_2), p. i171. https://doi.org/10.1093/neuonc/noy059.647
Data governance in the health industry: investigating data quality dimensions within a big data context
Juddoo, S., George, C., Duquenoy, P. and Windridge, D. 2018. Data governance in the health industry: investigating data quality dimensions within a big data context. Applied System Innovation. 1 (4), pp. 1-16. https://doi.org/10.3390/asi1040043
Quantum error-correcting output codes
Windridge, D., Mengoni, R. and Nagarajan, R. 2018. Quantum error-correcting output codes. International Journal of Quantum Information. 16 (8). https://doi.org/10.1142/S0219749918400038
Representational fluidity in embodied (artificial) cognition
Windridge, D. and Thill, S. 2018. Representational fluidity in embodied (artificial) cognition. Biosystems. 172, pp. 9-17. https://doi.org/10.1016/j.biosystems.2018.07.007
Disaster management using D2D communication with power transfer and clustering techniques
Ali, K., Nguyen, H., Vien, Q., Shah, P. and Chu, Z. 2018. Disaster management using D2D communication with power transfer and clustering techniques. IEEE Access. 6, pp. 14643-14654. https://doi.org/10.1109/ACCESS.2018.2793532
An improved block matching algorithm for motion estimation in video sequences and application in robotics
Bhattacharjee, K., Kumar, S., Pandey, H., Pant, M., Windridge, D. and Chaudhary, A. 2018. An improved block matching algorithm for motion estimation in video sequences and application in robotics. Computers & Electrical Engineering. 68, pp. 92-106. https://doi.org/10.1016/j.compeleceng.2018.03.045
Proteomic identification and characterization of hepatic glyoxalase 1 dysregulation in non-alcoholic fatty liver disease
Spanos, C., Maldonado, E.M., Fisher, C.P., Leenutaphong, P., Oviedo-Orta, E., Windridge, D., Salguero, F.J., Bermúdez-Fajardo, A., Weeks, M.E., Evans, C., Corfe, B.M., Rabbani, N., Thornalley, P.J., Miller, M.H., Wang, H., Dillon, J.F., Quaglia, A., Dhawan, A., Fitzpatrick, E. and Moore, J.B. 2018. Proteomic identification and characterization of hepatic glyoxalase 1 dysregulation in non-alcoholic fatty liver disease. Proteome Science. 16 (1). https://doi.org/10.1186/s12953-018-0131-y
Addressing VAST 2016 mini challenge 2 with POLAR kermode, classifier, excel on a power wall and data timelines
Attfield, S., Hewitt, D., Xu, K., Passmore, P., Wagstaff, A., Phillips, G., Windridge, D., Dash, G., Chapman, R. and Mason, L. 2016. Addressing VAST 2016 mini challenge 2 with POLAR kermode, classifier, excel on a power wall and data timelines. IEEE VAST Challenge 2016. Baltimore, MD, USA 23 Oct 2016
Quantum Bootstrap Aggregation
Windridge, D. and Nagarajan, R. 2017. Quantum Bootstrap Aggregation. de Barros, J., Coecke, B. and Pothos, E. (ed.) Quantum Interaction. San Francisco, CA, USA 20 - 22 Jul 2016 Springer. pp. 115-121 https://doi.org/10.1007/978-3-319-52289-0_9
A Hybrid Multi-Layer Architecture for Autonomous Vehicles Utilising a Hierarchical Perception-Action Dream Simulation Mechanism
Windridge, D., Gunn, I.A.D., Da Lio, M., Mazzalai, A., Thill, S., Svensson, H., Anderson, S., Blenkinsop, A., Gurney, K., James, S., Math, R., Berghoefer, E., Yueksel, M., Saroldi, A., Andreone, L. and Heich, H.-J. 2017. A Hybrid Multi-Layer Architecture for Autonomous Vehicles Utilising a Hierarchical Perception-Action Dream Simulation Mechanism. EUCognition 2017 Conference. Zürich, Switzerland 23 - 24 Nov 2017
Exploiting dream-like simulation mechanisms to develop safer agents for automated driving: the "Dreams4Cars" EU research and innovation action
Da Lio, M., Mazzalai, A., Windridge, D., Thill, S., Svensson, H., Yueksel, M., Gurney, K., Saroldi, A., Andreone, L., Anderson, S.R. and Heich, H.-J. 2017. Exploiting dream-like simulation mechanisms to develop safer agents for automated driving: the "Dreams4Cars" EU research and innovation action. IEEE 20th International Conference on Intelligent Transportation Systems (ITSC). Yokohama, Japan 16 - 19 Oct 2017 IEEE. pp. 1-6 https://doi.org/10.1109/ITSC.2017.8317649
Interference Management and System Optimisation for Femtocells Technology in LTE and Future 4G/5G Networks
Raheem, R., Lasebae, A., Aiash, M., Loo, J., Colson, R. and Raheem, A. 2017. Interference Management and System Optimisation for Femtocells Technology in LTE and Future 4G/5G Networks. in: Yurish, S. (ed.) Advances in Networks, Security and Communications: Reviews - Volume 1 International Frequency Sensor Association Publishing.
Mobility management for vehicular user equipment in LTE/mobile femtocell networks
Raheem, R., Lasebae, A., Aiash, M. and Loo, J. 2017. Mobility management for vehicular user equipment in LTE/mobile femtocell networks. International Journal of Information Systems in the Service Sector. 9 (4), pp. 60-87. https://doi.org/10.4018/IJISSS.2017100105
Mobile femtocell utilisation in LTE vehicular environment: vehicular penetration loss elimination and performance enhancement
Raheem, R., Lasebae, A., Aiash, M., Loo, J. and Colson, R. 2017. Mobile femtocell utilisation in LTE vehicular environment: vehicular penetration loss elimination and performance enhancement. Vehicular Communications. 9 (12), pp. 31-42. https://doi.org/10.1016/j.vehcom.2017.02.003
Hamming distance kernelisation via topological quantum computation
Di Pierro, A., Mengoni, R., Nagarajan, R. and Windridge, D. 2017. Hamming distance kernelisation via topological quantum computation. Martín-Vide C., Neruda R. and Vega-Rodríguez M. (ed.) 6th International Conference on the Theory and Practice of Natural Computing. Prague, Czech Republic 18 - 20 Dec 2017 Springer. pp. 269-280 https://doi.org/10.1007/978-3-319-71069-3_21
Emergent intentionality in perception-action subsumption hierarchies
Windridge, D. 2017. Emergent intentionality in perception-action subsumption hierarchies. Frontiers in Robotics and AI. 4. https://doi.org/10.3389/frobt.2017.00038
Movement correction in DCE-MRI through windowed and reconstruction dynamic mode decomposition
Tirunagari, S., Poh, N., Wells, K., Bober, M., Gorden, I. and Windridge, D. 2017. Movement correction in DCE-MRI through windowed and reconstruction dynamic mode decomposition. Machine Vision and Applications. 28 (3-4), pp. 393-407. https://doi.org/10.1007/s00138-017-0835-5
A generalised framework for saliency-based point feature detection
Brown, M., Windridge, D. and Guillemaut, J. 2017. A generalised framework for saliency-based point feature detection. Computer Vision and Image Understanding. 157, pp. 117-137. https://doi.org/10.1016/j.cviu.2016.09.008
Architecture for public safety network using D2D communication
Ali, K., Nguyen, H., Shah, P., Vien, Q. and Bhuvanasundaram, N. 2016. Architecture for public safety network using D2D communication. 2016 IEEE Wireless Communications and Networking Conference. Doha, Qatar 03 - 06 Apr 2016 IEEE. pp. 1-6 https://doi.org/10.1109/wcnc.2016.7564671
Performance evaluation of mobile users served by fixed and mobile femtocells in LTE networks
Raheem, R., Lasebae, A., Aiash, M. and Loo, J. 2016. Performance evaluation of mobile users served by fixed and mobile femtocells in LTE networks. Journal of Networking Technology. 7 (1), pp. 16-33.
Interference management for co-channel mobile femtocells technology in LTE networks
Raheem, R., Lasebae, A., Aiash, M. and Loo, J. 2016. Interference management for co-channel mobile femtocells technology in LTE networks. 12th International Conference on Intelligent Environments (IE). London, United Kingdom 14 - 16 Sep 2016 IEEE. pp. 80-87 https://doi.org/10.1109/IE.2016.21
Post-operative pediatric cerebellar mutism syndrome and its association with hypertrophic olivary degeneration
Avula, S., Spiteri, M., Kumar, R., Lewis, E., Harave, S., Windridge, D., Ong, C. and Pizer, B. 2016. Post-operative pediatric cerebellar mutism syndrome and its association with hypertrophic olivary degeneration. Quantitative Imaging in Medicine and Surgery. 6 (5), pp. 535-544. https://doi.org/10.21037/qims.2016.10.11
Criminal pattern identification based on modified K-means clustering
Aljrees, T., Shi, D., Windridge, D. and Wong, B. 2016. Criminal pattern identification based on modified K-means clustering. 2016 International Conference on Machine Learning and Cybernetics. Jeju, South Korea 10 - 13 Jul 2016 IEEE. pp. 799-806 https://doi.org/10.1109/ICMLC.2016.7872990
Can DMD obtain a scene background in color?
Tirunagari, S., Poh, N., Bober, M. and Windridge, D. 2016. Can DMD obtain a scene background in color? 2016 International Conference on Image, Vision and Computing (ICIVC). Portsmouth, UK 03 - 05 Aug 2016 pp. 46-50 https://doi.org/10.1109/ICIVC.2016.7571272
Architecture for public safety network using D2D communication [Workshop paper]
Ali, K., Nguyen, H., Shah, P., Vien, Q. and Bhuvanasundaram, N. 2016. Architecture for public safety network using D2D communication [Workshop paper]. 2016 IEEE Wireless Communications and Networking Conference Workshops (WCNCW). Doha, Qatar 03 - 06 Apr 2016 IEEE. pp. 206-211 https://doi.org/10.1109/WCNCW.2016.7552700
Classification of fibroglandular tissue distribution in the breast based on radiotherapy planning CT
Juneja, P., Evans, P., Windridge, D. and Harris, E. 2016. Classification of fibroglandular tissue distribution in the breast based on radiotherapy planning CT. BMC Medical Imaging. 16 (1). https://doi.org/10.1186/s12880-016-0107-2
Kernel combination via debiased object correspondence analysis
Windridge, D. and Yan, F. 2016. Kernel combination via debiased object correspondence analysis. Information Fusion. 27, pp. 228-239. https://doi.org/10.1016/j.inffus.2015.02.002
Performance evaluation of wireless IEEE 802.11(b) used for ad-hoc networks in an e-learning classroom network
Ghosh, A., Lasebae, A. and Ever, E. 2009. Performance evaluation of wireless IEEE 802.11(b) used for ad-hoc networks in an e-learning classroom network. 3rd IT Student Conference for the Next Generation. University of East London, London, UK 21 - 22 Nov 2009
A secure authentication protocol for IP-based wireless sensor communications using the location/ID split protocol (LISP)
Raheem, A., Lasebae, A. and Loo, J. 2014. A secure authentication protocol for IP-based wireless sensor communications using the location/ID split protocol (LISP). 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). Beijing, China Institute of Electrical and Electronics Engineers (IEEE). pp. 840-845 https://doi.org/10.1109/TrustCom.2014.135
Supporting communications in the IOTs using the location/ID split protocol: a security analysis
Lasebae, A., Loo, J., Aiash, M. and Raheem, A. 2013. Supporting communications in the IOTs using the location/ID split protocol: a security analysis. Future Generation Communication Technology (FGCT) 4- date of conference in full: 12-14 Nov. 2013. London, UK 12 - 14 Nov 2013 pp. 1-5
System capacity Improvement by on request channel allocation in LTE cellular network
Lasebae, A., Rahman, S. and Rezvy, S. 2014. System capacity Improvement by on request channel allocation in LTE cellular network. The 15th IEEE International Conference on a World of Wireless, Mobile and Multimedia Networks. Sydney, Australia 16 - 19 Jun 2014
Instant channel allocation technique to improve system throughput in joint LTE network
Rezvy, S., Rahman, S., Lasebae, A. and Loo, J. 2014. Instant channel allocation technique to improve system throughput in joint LTE network. The 28th IEEE International Conference on Advanced Information Networking and Applications. Victoria, BC, Canada 03 - 16 May 2014 IEEE. pp. 900-904 https://doi.org/10.1109/WAINA.2014.198
System capacity improvement by on request channel allocation in LTE cellular network
Rezvy, S., Rahman, S., Lasebae, A. and Loo, J. 2014. System capacity improvement by on request channel allocation in LTE cellular network. 48th Annual Conference on Information Sciences and Systems (CISS-2014). Princeton, New Jersey, USA 19 - 21 Mar 2014 Institute of Electrical and Electronics Engineers (IEEE). https://doi.org/10.1109/CISS.2014.6814105
On demand based frequency allocation to mitigate interference in femto-macro LTE cellular network
Rezvy, S., Rahman, S., Lasebae, A. and Loo, J. 2013. On demand based frequency allocation to mitigate interference in femto-macro LTE cellular network. Second International Conference on Future Generation Communication Technologies (FGCT- 2013). London, UK 12 - 14 Nov 2013 Institute of Electrical and Electronics Engineers (IEEE). pp. 213-218
Downlink femto-macro ICI cancellation by on request channel allocation in LTE network
Rezvy, S., Rahman, S., Lasebae, A. and Loo, J. 2014. Downlink femto-macro ICI cancellation by on request channel allocation in LTE network. 48th Annual Conference on Information Sciences and Systems (CISS-2014). Princeton University, New Jersey, USA 19 - 21 Mar 2014
Mobility management in LTE/mobile femtocell networks: outage probability and drop/block calls probability
Raheem, R., Lasebae, A. and Loo, J. 2015. Mobility management in LTE/mobile femtocell networks: outage probability and drop/block calls probability. 3rd International Conference on Emerging Research Paradigms in Business and Social Sciences. Dubai, UAE 24 - 26 Nov 2015
Identifying similar patients using self-organising maps: a case study on type-1 diabetes self-care survey responses
Tirunagari, S., Poh, N., Hu, G. and Windridge, D. 2015. Identifying similar patients using self-organising maps: a case study on type-1 diabetes self-care survey responses. https://doi.org/10.48550/arXiv.1503.06316
Longitudinal MRI assessment: the identification of relevant features in the development of posterior fossa syndrome in children
Spiteri, M., Lewis, E., Windridge, D. and Avula, S. 2015. Longitudinal MRI assessment: the identification of relevant features in the development of posterior fossa syndrome in children. Medical imaging 2015: Computer-Aided Diagnosis. Orlando, Florida, United States 21 Feb 2015 Society of Photo-Optical Instrumentation Engineers. https://doi.org/10.1117/12.2081591
Windowed DMD as a microtexture descriptor for finger vein counter-spoofing in biometrics
Tirunagari, S., Poh, N., Bober, M. and Windridge, D. 2015. Windowed DMD as a microtexture descriptor for finger vein counter-spoofing in biometrics. 2015 IEEE International Workshop on Information Forensics and Security (WIFS). Rome, Italy 16 - 19 Nov 2015 Institute of Electrical and Electronics Engineers (IEEE). pp. 1-6 https://doi.org/10.1109/WIFS.2015.7368599
Globally optimal 2D-3D registration from points or lines without correspondences
Brown, M., Windridge, D. and Guillemaut, J. 2015. Globally optimal 2D-3D registration from points or lines without correspondences. 2015 IEEE International Conference on Computer Vision (ICCV). Santiago, Chile 07 - 13 Dec 2015 Institute of Electrical and Electronics Engineers (IEEE). pp. 2111-2119 https://doi.org/10.1109/ICCV.2015.244
A generalisable framework for saliency-based line segment detection
Brown, M., Windridge, D. and Guillemaut, J. 2015. A generalisable framework for saliency-based line segment detection. Pattern Recognition. 48 (12), pp. 3993-4011. https://doi.org/10.1016/j.patcog.2015.06.015
Identifying quantitative imaging features of posterior fossa syndrome in longitudinal MRI
Spiteri, M., Windridge, D., Avula, S., Kumar, R. and Lewis, E. 2015. Identifying quantitative imaging features of posterior fossa syndrome in longitudinal MRI. Journal of Medical Imaging. 2 (4), p. 044502. https://doi.org/10.1117/1.JMI.2.4.044502
A novel Markov logic rule induction strategy for characterizing sports video footage
Windridge, D., Kittler, J., De Campos, T., Yan, F., Christmas, W. and Khan, A. 2015. A novel Markov logic rule induction strategy for characterizing sports video footage. IEEE MultiMedia. 22 (2), pp. 24-35. https://doi.org/10.1109/MMUL.2014.36
Artificial co-drivers as a universal enabling technology for future intelligent vehicles and transportation systems
Da Lio, M., Biral, F., Bertolazzi, E., Galvani, M., Bosetti, P., Windridge, D., Saroldi, A. and Tango, F. 2015. Artificial co-drivers as a universal enabling technology for future intelligent vehicles and transportation systems. IEEE Transactions on Intelligent Transportation Systems. 16 (1), pp. 244-263. https://doi.org/10.1109/TITS.2014.2330199
Breast cancer data analytics with missing values: a study on ethnic, age and income groups
Tirunagari, S., Poh, N., Abdulrahman, H., Nemmour, N. and Windridge, D. 2015. Breast cancer data analytics with missing values: a study on ethnic, age and income groups. ArXiv e-prints: Quantitative Biology > Quantitative Methods. https://doi.org/10.48550/arXiv.1503.03680
Disaster management communication networks: challenges and architecture design
Ali, K., Nguyen, H., Vien, Q. and Shah, P. 2015. Disaster management communication networks: challenges and architecture design. 2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops 2015). St. Louis, Missouri, USA 23 - 27 Mar 2015 IEEE. pp. 537-542 https://doi.org/10.1109/PERCOMW.2015.7134094
Detection of face spoofing using visual dynamics
Tirunagari, S., Poh, N., Windridge, D., Iorliam, A., Suki, N. and Ho, A. 2015. Detection of face spoofing using visual dynamics. IEEE Transactions on Information Forensics and Security. 10 (4), pp. 762-777. https://doi.org/10.1109/TIFS.2015.2406533
A secure framework for communications in heterogeneous networks
Aiash, M., Mapp, G., Lasebae, A. and Loo, J. 2014. A secure framework for communications in heterogeneous networks. WAINA 2014 28th International Conference on Advanced Information Networking and Applications Workshops. Victoria, BC 13 - 16 May 2014 pp. 841-846
Multilevel Chinese takeaway process and label-based processes for rule induction in the context of automated sports video annotation
Khan, A., Windridge, D. and Kittler, J. 2014. Multilevel Chinese takeaway process and label-based processes for rule induction in the context of automated sports video annotation. IEEE Transactions on Cybernetics. 44 (10), pp. 1910-1923. https://doi.org/10.1109/TCYB.2014.2299955
Comparison between resource reservation protocol and next steps in signalling in mobile IP networks
Mirzamany, E., Lasebae, A. and Gemikonakli, O. 2014. Comparison between resource reservation protocol and next steps in signalling in mobile IP networks. IET Networks. https://doi.org/10.1049/iet-net.2013.0028
SLA based MT-routing for future internet
Mirzamany, E., Lasebae, A. and Gemikonakli, O. 2014. SLA based MT-routing for future internet. Wireless World Research Forum Meeting 32. Marrakech, Morocco 18 - 22 May 2014
An efficient traffic engineering based on multi-topology routing for future internet
Mirzamany, E., Lasebae, A. and Gemikonakli, O. 2014. An efficient traffic engineering based on multi-topology routing for future internet. Computer Networks. https://doi.org/10.1016/j.comnet.2014.05.008
Domain anomaly detection in machine perception: a system architecture and taxonomy
Kittler, J., Christmas, W., De Campos, T., Windridge, D., Yan, F., Illingworth, J. and Osman, M. 2014. Domain anomaly detection in machine perception: a system architecture and taxonomy. IEEE Transactions on Pattern Analysis and Machine Intelligence. 36 (5), pp. 845-859. https://doi.org/10.1109/TPAMI.2013.209
A saliency-based framework for 2D-3D registration
Brown, M., Guillemaut, J. and Windridge, D. 2014. A saliency-based framework for 2D-3D registration. 9th International Conference on Computer Vision Theory and Applications (VISAPP 2014). Lisbon, Portugal 05 - 08 Jan 2014 SCITEPRESS - Science and Technology Publications. pp. 265-273 https://doi.org/10.5220/0004675402650273
Supervised selective kernel fusion for membrane protein prediction
Tatarchuk, A., Sulimova, V., Torshin, I., Mottl, V. and Windridge, D. 2014. Supervised selective kernel fusion for membrane protein prediction. Comin, M., Käll, L., Marchiori, E., Ngom, A. and Rajapakse, J. (ed.) 9th IAPR International Conference Pattern Recognition in Bioinformatics (PRIB 2014). Stockholm, Sweden 21 - 23 Aug 2014 Springer. pp. 98-109 https://doi.org/10.1007/978-3-319-09192-1_9
Challenges in designing an online healthcare platform for personalised patient analytics
Poh, N., Tirunagari, S. and Windridge, D. 2014. Challenges in designing an online healthcare platform for personalised patient analytics. 2014 IEEE Symposium on Computational Intelligence in Big Data (CIBD). Orlando, FL., USA 09 - 12 Dec 2014 IEEE. pp. 1-6 https://doi.org/10.1109/CIBD.2014.7011526
Patient level analytics using self-organising maps: a case study on type-1 diabetes self-care survey responses
Tirunagari, S., Poh, N., Aliabadi, K., Windridge, D. and Cooke, D. 2014. Patient level analytics using self-organising maps: a case study on type-1 diabetes self-care survey responses. 2014 IEEE Symposium on Computational Intelligence and Data Mining (CIDM). Orlando, FL., USA 09 - 12 Dec 2014 Institute of Electrical and Electronics Engineers (IEEE). pp. 304-309 https://doi.org/10.1109/CIDM.2014.7008682
Non-enumerative cross validation for the determination of structural parameters in feature-selective SVMs
Chernousova, E., Levdik, P., Tatarchuk, A., Mottl, V. and Windridge, D. 2014. Non-enumerative cross validation for the determination of structural parameters in feature-selective SVMs. 22nd International Conference on Pattern Recognition ICPR 2014. Stockholm, Sweden 24 - 28 Aug 2014 Institute of Electrical and Electronics Engineers (IEEE). pp. 3654-3659 https://doi.org/10.1109/ICPR.2014.628
Linear regression via elastic net: non-enumerative leave-one-out verification of feature selection
Chernousova, E., Razin, N., Krasotkina, O., Mottl, V. and Windridge, D. 2014. Linear regression via elastic net: non-enumerative leave-one-out verification of feature selection. in: Aleskerov, F., Goldengorin, B. and Pardalos, P. (ed.) Clusters, Orders, and Trees: Methods and Applications: In Honor of Boris Mirkin's 70th Birthday New York Springer.
Automatic annotation of tennis games: an integration of audio, vision, and learning
Yan, F., Kittler, J., Windridge, D., Christmas, W., Mikolajczyk, K., Cox, S. and Huang, Q. 2014. Automatic annotation of tennis games: an integration of audio, vision, and learning. Image and Vision Computing. 32 (11), pp. 896-903. https://doi.org/10.1016/j.imavis.2014.08.004
A kernel-based framework for medical big-data analytics
Windridge, D. and Bober, M. 2014. A kernel-based framework for medical big-data analytics. in: Interactive Knowledge Discovery and Data Mining in Biomedical Informatics: State-of-the-Art and Future Challenges Springer. pp. 197-208
LOC algorithm: location-aware opportunistic forwarding by using node's approximate location
Khan, S., Loo, J., Lasebae, A., Azam, M., Adeel, M., Kausar, R. and Sardar, H. 2014. LOC algorithm: location-aware opportunistic forwarding by using node's approximate location. International Journal of Pervasive Computing and Communications. 10 (4), pp. 481-496. https://doi.org/10.1108/IJPCC-02-2014-0017
Performance evaluation of LTE network via using fixed/mobile femtocells
Raheem, R., Lasebae, A. and Loo, J. 2014. Performance evaluation of LTE network via using fixed/mobile femtocells. Advanced Information Networking and Applications Workshops (WAINA), 2014 28th International Conference. Victoria, BC, Canada 13 - 16 May 2014 Institute of Electrical and Electronics Engineers (IEEE). pp. 255-260 https://doi.org/10.1109/WAINA.2014.51
Instant channel allocation technique to improve system throughput in joint LTE cellular network
Rezvy, S., Rahman, S., Lasebae, A. and Loo, J. 2014. Instant channel allocation technique to improve system throughput in joint LTE cellular network. Advanced Information Networking and Applications Workshops (WAINA 2014). Victoria, Canada 13 - 16 May 2014 Institute of Electrical and Electronics Engineers (IEEE). pp. 900-904 https://doi.org/10.1109/WAINA.2014.198
LOC algorithm: location-aware opportunistic forwarding by using node's approximate location
Kashif Ashraf Khan, S., Loo, J., Lasebae, A., Awais Azam, M., Adeel, M., Kausar, R. and Sardar, H. 2014. LOC algorithm: location-aware opportunistic forwarding by using node's approximate location. International Journal of Pervasive Computing and Communications. 10 (4), pp. 481-496. https://doi.org/10.1108/IJPCC-02-2014-0017
Concern level assessment: building domain knowledge into a visual system to support network-security situation awareness
Kodagoda, N., Attfield, S., Choudhury, S., Rooney, C., Mapp, G., Nguyen, P., Slabbert, L., Wong, B., Aiash, M., Zheng, Y., Xu, K. and Lasebae, A. 2014. Concern level assessment: building domain knowledge into a visual system to support network-security situation awareness. Information Visualization. 13 (4), pp. 346-360. https://doi.org/10.1177/1473871613490291
Specification-based IDS for securing RPL from topology attacks
Le, A., Loo, J., Luo, Y. and Lasebae, A. 2011. Specification-based IDS for securing RPL from topology attacks. Wireless Days (WD), 2011 IFIP. https://doi.org/10.1109/WD.2011.6098218
Introducing mobile home agents into the distributed authentication protocol to achieve location privacy in mobile IPv6
Georgiades, A., Luo, Y., Lasebae, A. and Comley, R. 2008. Introducing mobile home agents into the distributed authentication protocol to achieve location privacy in mobile IPv6. International Journal of Communications. 2 (3), pp. 185-194.
Integrating mobility, quality-of-service and security in future mobile networks
Aiash, M., Mapp, G., Lasebae, A., Phan, R. and Loo, J. 2013. Integrating mobility, quality-of-service and security in future mobile networks. in: Ao, S. and Gelman, L. (ed.) Electrical Engineering and Intelligent Systems New York Springer.
An efficient resource reservation for domain based mobile IP networks: analytical approach
Mirzamany, E., Lasebae, A. and Gemikonakli, O. 2013. An efficient resource reservation for domain based mobile IP networks: analytical approach. IEEE 77th Vehicular Technology Conference (VTC2013-Spring). Dresden, Germany 02 - 05 Jun 2013
Characterizing driver intention via hierarchical perception-action modeling
Windridge, D., Shaukat, A. and Hollnagel, E. 2013. Characterizing driver intention via hierarchical perception-action modeling. IEEE Transactions on Human-Machine Systems. 43 (1), pp. 17-31. https://doi.org/10.1109/TSMCA.2012.2216868
A framework for hierarchical perception-action learning utilizing fuzzy reasoning
Windridge, D., Felsberg, M. and Shaukat, A. 2013. A framework for hierarchical perception-action learning utilizing fuzzy reasoning. IEEE Transactions on Cybernetics. 43 (1), pp. 155-169. https://doi.org/10.1109/tsmcb.2012.2202109
Trained eyes: experience promotes adaptive gaze control in dynamic and uncertain visual environments
Taya, S., Windridge, D. and Osman, M. 2013. Trained eyes: experience promotes adaptive gaze control in dynamic and uncertain visual environments. PLoS ONE. 8 (8). https://doi.org/10.1371/journal.pone.0071371
High throughput screening for mammography using a human-computer interface with rapid serial visual presentation (RSVP)
Abbey, C., Hope, C., Sterr, A., Elangovan, P., Geades, N., Windridge, D., Young, K., Wells, K. and Mello-Thoms, C. 2013. High throughput screening for mammography using a human-computer interface with rapid serial visual presentation (RSVP). SPIE Proceedings Vol. 8673. https://doi.org/10.1117/12.2007557
From fixed to mobile femtocells in LTE systems: issues and challenges
Raheem, R., Lasebae, A., Aiash, M. and Loo, J. 2013. From fixed to mobile femtocells in LTE systems: issues and challenges. 2013 Second International Conference on Future Generation Communication Technology (FGCT). London, United Kingdom 12 - 14 Nov 2013 Institute of Electrical and Electronics Engineers (IEEE). pp. 207-212 https://doi.org/10.1109/FGCT.2013.6767218
Efficient NSIS mobility support for mobile networks
Mirzamany, E., Lasebae, A. and Gemikonakli, O. 2013. Efficient NSIS mobility support for mobile networks. IEEE 24th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC). London, UK 08 - 11 Sep 2013 IEEE. pp. 3354-3359 https://doi.org/10.1109/PIMRC.2013.6666727
Using aggregated RSVP in nested HMIPv6
Mirzamany, E., Lasebae, A. and Gemikonakli, O. 2012. Using aggregated RSVP in nested HMIPv6. Wireless Communications and Mobile Computing Conference (IWCMC), 2012 8th International. IEEE. pp. 716 -721 https://doi.org/10.1109/IWCMC.2012.6314292
Looking to score: the dissociation of goal influence on eye movement and meta-attentional allocation in a complex dynamic natural scene
Taya, S., Windridge, D. and Osman, M. 2012. Looking to score: the dissociation of goal influence on eye movement and meta-attentional allocation in a complex dynamic natural scene. PLoS ONE. 7 (6). https://doi.org/10.1371/journal.pone.0039060
A formally verified device authentication protocol using Casper/FDR
Aiash, M., Mapp, G., Phan, R., Lasebae, A. and Loo, J. 2012. A formally verified device authentication protocol using Casper/FDR. Min, G., Wu, Y., Liu, L., Jin, X., Jarvis, S. and Al-Dubai, A. (ed.) 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-2012). Liverpool, UK 25 - 27 Jun 2012 IEEE. pp. 1293-1298 https://doi.org/10.1109/TrustCom.2012.27
A survey of potential architectures for communication in heterogeneous networks
Aiash, M., Mapp, G., Lasebae, A., Loo, J., Sardis, F., Phan, R., Augusto, M., Moreira, E. and Vanni, R. 2012. A survey of potential architectures for communication in heterogeneous networks. IEEE Wireless Telecommunications Symposium (WTS 2012). London 18 - 20 Apr 2012 IEEE. pp. 1-6 https://doi.org/10.1109/WTS.2012.6266121
Evaluation of wireless IEEE 802.11(b) used for ad-hoc networks in an e-learning classroom network
Ghosh, A., Lasebae, A. and Ever, E. 2009. Evaluation of wireless IEEE 802.11(b) used for ad-hoc networks in an e-learning classroom network. Kaspersky IT Security Conference for the Next Generation.
Security and QoS integration for protecting service providers in hterogeneous environments
Aiash, M., Mapp, G. and Lasebae, A. 2011. Security and QoS integration for protecting service providers in hterogeneous environments. International Journal of Computer Science. 38 (4), pp. 384-393.
Automatic annotation of court games with structured output learning
Yan, F., Kittler, J., Mikolajczyk, K. and Windridge, D. 2012. Automatic annotation of court games with structured output learning. 21st International Conference on Pattern Recognition. Tsukuba, Japan 11 - 15 Nov 2012 IEEE. pp. 3577-3580 https://doi.org/https://ieeexplore.ieee.org/document/6460938
Application of the multi-modal relevance vector machine to the problem of protein secondary structure prediction
Razin, N., Sungurov, D., Mottl, V., Torshin, I., Sulimova, V., Seredin, O. and Windridge, D. 2012. Application of the multi-modal relevance vector machine to the problem of protein secondary structure prediction. 7th IAPR International Conference on Pattern Recognition in Bioinformatics. Tokyo, Japan 08 - 10 Nov 2012 Springer. pp. 153-165 https://doi.org/10.1007/978-3-642-34123-6_14
On-line spatio-temporal independent component analysis for motion correction in renal DCE-MRI
Kiani, S., Gordon, I., Windridge, D. and Wells, K. 2012. On-line spatio-temporal independent component analysis for motion correction in renal DCE-MRI. 2012 IEEE Nuclear Science Symposium and Medical Imaging Conference Record (NSS/MIC). Anaheim, CA, USA 27 Oct - 03 Nov 2012 IEEE. https://doi.org/10.1109/nssmic.2012.6551664
6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach
Le, A., Loo, J., Lasebae, A., Aiash, M. and Luo, Y. 2012. 6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach. International Journal of Communication Systems. 25 (9), pp. 1189-1212. https://doi.org/10.1002/dac.2356
M-Sieve: a visualisation tool for supporting network security analysts
Choudhury, S., Kodagoda, N., Nguyen, P., Rooney, C., Attfield, S., Xu, K., Zheng, Y., Wong, B., Chen, R., Mapp, G., Slabbert, L., Aiash, M. and Lasebae, A. 2012. M-Sieve: a visualisation tool for supporting network security analysts. VisWeek 2012. Seattle, WA, USA 14 - 19 Oct 2012
A formally verified AKA protocol for vertical handover inheterogeneous environments using Casper/FDR
Aiash, M., Mapp, G., Lasebae, A., Phan, R. and Loo, J. 2012. A formally verified AKA protocol for vertical handover inheterogeneous environments using Casper/FDR. EURASIP Journal on Wireless Communications and Networking. 2012 (57). https://doi.org/10.1186/1687-1499-2012-57
Stream bundle management layer for optimum management of co-existing telemedicine traffic streams under varying channel conditions in heterogeneous networks.
Shaikh, F., Lasebae, A., Mapp, G. and Middlesex University 2005. Stream bundle management layer for optimum management of co-existing telemedicine traffic streams under varying channel conditions in heterogeneous networks. MIT 2005. China
Proactive policy management for heterogeneous networks
Shaikh, F., Lasebae, A., Mapp, G. and Middlesex University 2008. Proactive policy management for heterogeneous networks. 3rd International Conference on Information and Communication Technologies: from Theory to Applications (ICTTA 2008). Umayyad Palace, Damascus, Syria 07 - 11 Apr 2008
Client-based SBM layer for predictive management of traffic flows in heterogeneous networks
Shaikh, F., Lasebae, A., Mapp, G. and Middlesex University 2006. Client-based SBM layer for predictive management of traffic flows in heterogeneous networks. 2nd IEEE International Conference on Information and Communication Technologies: from Theory to Applications (ICTTA 2006). Damascus, Syria 24 - 28 Apr 2006
A survey of network coverage prediction mechanisms in 4G heterogeneous wireless networks.
Shaikh, F., Mapp, G., Lasebae, A., British Institute of Technology and e-Commerce and Middlesex University 2011. A survey of network coverage prediction mechanisms in 4G heterogeneous wireless networks. First Global Conference on Communication, Science and Information Engineering (CCSIE 2011). Middlesex University 25 - 27 Jul 2011
Exploring the concept of scope to provide better security for internet services.
Aiash, M., Mapp, G., Lasebae, A., Phan, R., Middlesex University and Loughborough University 2011. Exploring the concept of scope to provide better security for internet services. First Global Conference on Communication, Science and Engineering (CCSIE 2011). Middlesex University 25 - 27 Jul 2011
Enhancing naming and location services to support multi-homed devices in heterogeneous environments
Aiash, M., Mapp, G., Lasebae, A., Phan, R., Augusto, M., Vanni, R., Moreira, E., Middlesex University, Loughborough University and University of Sao Paulo 2011. Enhancing naming and location services to support multi-homed devices in heterogeneous environments. First Conference on Communication, Science and Information Enginneering (CCSIE 2011). Middlesex University 25 - 27 Jul 2011
Proactive policy management using TBVH mechanism in heterogeneous networks.
Shaikh, F., Mapp, G., Lasebae, A. and Middlesex University 2007. Proactive policy management using TBVH mechanism in heterogeneous networks. Proceedings of the International Conference and Exhibition on 'Next Generation Mobile Application, Services and Technologies' (NGMAST 2007). Cardiff, Wales 12 - 14 Sep 2007
Anomaly detection and knowledge transfer in automatic sports video annotation
Almajai, I., Yan, F., De Campos, T., Khan, A., Christmas, W., Windridge, D. and Kittler, J. 2011. Anomaly detection and knowledge transfer in automatic sports video annotation. in: Weinshall, D., Anemüller, J. and Gool, L. (ed.) Detection and Identification of Rare Audio-visual Cues Springer. pp. 109-117
An evaluation of bags-of-words and spatio-temporal shapes for action recognition
de Campos, T., Barnard, M., Mikolajczyk, K., Kittler, J., Yan, F., Christmas, W. and Windridge, D. 2011. An evaluation of bags-of-words and spatio-temporal shapes for action recognition. 2011 IEEE Workshop on Applications of Computer Vision (WACV). Kona, HI, USA 05 - 07 Jan 2011 IEEE. https://doi.org/10.1109/WACV.2011.5711524
A modified neutral point method for kernel-based fusion of pattern-recognition modalities with incomplete data sets
Panov, M., Tatarchuk, A., Mottl, V. and Windridge, D. 2011. A modified neutral point method for kernel-based fusion of pattern-recognition modalities with incomplete data sets. 10th International Workshop on Multiple Classifier Systems. Naples, Italy 15 - 17 Jun 2011 Springer. https://doi.org/10.1007/978-3-642-21557-5_15
A QoS framework for heterogeneous networking
Aiash, M., Mapp, G., Lasebae, A., Augusto, M., Vanni, R. and Moreira, E. 2011. A QoS framework for heterogeneous networking. ICWN'11: The 2011 International Conference of Wireless Networks (held as part of WCE 2011). London, UK 06 - 08 Jul 2011 pp. 1765-1789
Investigation of a mechatronic device for the remedial treatment of brain injured children.
Lasebae, A. 1999. Investigation of a mechatronic device for the remedial treatment of brain injured children. PhD thesis Middlesex University
Providing security in 4G systems: unveiling the challenges
Aiash, M., Mapp, G., Lasebae, A., Phan, R., Middlesex University and Loughborough University 2010. Providing security in 4G systems: unveiling the challenges. Atmaca, T., Palicot, J., Amor, N., Tsiatsos, T., Marot, M. and Dini, O. (ed.) IEEE. pp. 439-444 https://doi.org/10.1109/AICT.2010.24
Ball event recognition using HMM for automatic tennis annotation
Almajai, I., Kittler, J., De Campos, T., Christmas, W., Yan, F., Windridge, D. and Khan, A. 2010. Ball event recognition using HMM for automatic tennis annotation. 2010 IEEE International Conference on Image Processing. Hong Kong, China 26 - 29 Sep 2010 IEEE. https://doi.org/10.1109/ICIP.2010.5652415
Adaptive, perception-action-based cognitive modelling of human driving behaviour using control, gaze and signal inputs
Shaukat, A., Windridge, D., Hollnagel, E., Macchi, L. and Kittler, J. 2010. Adaptive, perception-action-based cognitive modelling of human driving behaviour using control, gaze and signal inputs. Brain Inspired Cognitive Systems - BICS 2010. Madrid, Spain 14 - 16 Jul 2010
A support kernel machine for supervised selective combining of diverse pattern-recognition modalities
Tatarchuk, A., Urlov, E., Mottl, V. and Windridge, D. 2010. A support kernel machine for supervised selective combining of diverse pattern-recognition modalities. 9th International Workshop on Multiple Classifier Systems. Cairo, Egypt 07 - 09 Apr 2010 Springer. https://doi.org/10.1007/978-3-642-12127-2_17
Addressing missing values in kernel-based multimodal biometric fusion using neutral point substitution
Poh, N., Windridge, D., Mottl, V., Tatarchuk, A. and Eliseyev, A. 2010. Addressing missing values in kernel-based multimodal biometric fusion using neutral point substitution. IEEE Transactions on Information Forensics and Security. 5 (3), pp. 461-469. https://doi.org/10.1109/TIFS.2010.2053535
Security models for heterogeneous networking
Mapp, G., Aiash, M., Lasebae, A. and Phan, R. 2010. Security models for heterogeneous networking. Katsikas, S. (ed.) 4th International Conference on Security and Cryptography. Athens, Greece 26 - 28 Jul 2010 IEEE. pp. 1-4
A linear-complexity reparameterisation strategy for the hierarchical bootstrapping of capabilities within perception-action architectures
Shevchenko, M., Windridge, D. and Kittler, J. 2009. A linear-complexity reparameterisation strategy for the hierarchical bootstrapping of capabilities within perception-action architectures. Image and Vision Computing. 27 (11), pp. 1702-1714. https://doi.org/10.1016/j.imavis.2008.12.002
Perception-action learning as an epistemologically-consistent model for self-updating cognitive representation
Windridge, D. 2009. Perception-action learning as an epistemologically-consistent model for self-updating cognitive representation. Hussain, A., Aleksander, I., Smith, L., Barros, A., Chrisley, R. and Cutsuridis, V. (ed.) Brain Inspired Cognitive Systems 2008. São Luís, Brazil 24 - 27 Jul 2008 Springer. pp. 95-134 https://doi.org/10.1007/978-0-387-79100-5_6
Location privacy in mobile IPv6 distributed authentication protocol using mobile home agents
Georgiades, A., Luo, Y., Lasebae, A. and Comley, R. 2009. Location privacy in mobile IPv6 distributed authentication protocol using mobile home agents. Trilling, L., Perkins, D., Dionysios, D., Perlovsky, L., Davey, K., Landgrebe, D., Marino, M., Russell, D., Collicott, S., Ceccarelli, M. and Lund, J. (ed.) The 8th WSEAS International Conference on Electronics, Hardware, Wireless and Optical Communications (EHAC '09). Cambridge, UK 21 - 23 Feb 2009 World Scientific and Engineering Academy and Society (WSEAS). pp. 51-56
An entropy-based approach to the hierarchical acquisition of perception-action capabilities
Windridge, D., Shevchenko, M. and Kittler, J. 2008. An entropy-based approach to the hierarchical acquisition of perception-action capabilities. 4th International Workshop on Cognitive Vision. Santorini, Greece 12 May 2008 Springer. https://doi.org/10.1007/978-3-540-92781-5_7
Cognitive learning with automatic goal acquisition
Kittler, J., Shevchenko, M. and Windridge, D. 2006. Cognitive learning with automatic goal acquisition. 3rd European Starting AI Researcher Symposium. Riva del Garda, Italy 28 - 29 Aug 2006 IOS Press. https://doi.org/10.5555/1565192.1565195
Dual identity return routability for the security of mobile IPv6 binding updates within the distributed authentication protocol.
Georgiades, A., Luo, Y., Lasebae, A. and Comley, R. 2006. Dual identity return routability for the security of mobile IPv6 binding updates within the distributed authentication protocol. Lazakidou, A. and Siassiakos, K. (ed.) 6th WSEAS International Conference on Applied Informatics and Communications. Elounda, Greece 18 - 20 Aug 2006 World Scientific and Engineering Academy and Society (WSEAS). pp. 406-411
Distributed authentication protocol utilizing dual identity return routability for the security of binding updates within mobile IPv6
Luo, Y., Lasebae, A., Comley, R. and Georgiades, A. 2006. Distributed authentication protocol utilizing dual identity return routability for the security of binding updates within mobile IPv6. WSEAS Transactions on Communications. 5 (10), pp. 1109-2742.
A memory architecture and contextual reasoning framework for cognitive vision
Kittler, J., Christmas, W.J., Kostin, A., Yan, F., Kolonias, I. and Windridge, D. 2005. A memory architecture and contextual reasoning framework for cognitive vision. 14th Scandinavian Conference on Image Analysis. Joensuu, Finland 19 - 22 Jun 2005 Springer. https://doi.org/10.1007/11499145_36
Distributed authentication protocol for the security of binding updates in mobile IPv6
Luo, Y., Lasebae, A., Comley, R. and Georgiades, A. 2005. Distributed authentication protocol for the security of binding updates in mobile IPv6. Kartalopoulos, S. (ed.) 9th WSEAS International Conference on Communications. Athens, Greece 14 - 16 Jul 2005 World Scientific and Engineering Academy and Society (WSEAS).
Binding update security for mobile IPv6 using a distributed authentication protocol
Luo, Y., Lasebae, A., Comley, R. and Georgiades, A. 2005. Binding update security for mobile IPv6 using a distributed authentication protocol. WSEAS Transactions on Communications. 4 (9), pp. 1109-2742.
A linguistic feature vector for the visual interpretation of sign language
Bowden, R., Windridge, D., Kadir, T., Zisserman, A. and Brady, M. 2004. A linguistic feature vector for the visual interpretation of sign language. 8th European Conference on Computer Vision. Prague, Czech Republic 11 - 14 May 2004 Springer. https://doi.org/10.1007/978-3-540-24670-1_30
A general strategy for hidden markov chain parameterisation in composite feature-spaces
Windridge, D., Bowden, R. and Kittler, J. 2004. A general strategy for hidden markov chain parameterisation in composite feature-spaces. Joint IAPR International Workshops, SSPR 2004 and SPR 2004. Lisbon, Portugal 18 - 20 Aug 2004 Springer. pp. 1069-1077 https://doi.org/10.1007/978-3-540-27868-9_118
Critical analysis of high speed wireless standards for transferring telementoring information
Shaikh, F., Lasebae, A. and Whitney, G. 2004. Critical analysis of high speed wireless standards for transferring telementoring information. in: ICTTA'04: 2004 International conference on information & communication technologies: from theory to applications. IEEE.
Trinity protocol for authentication of binding updates in mobile IPv6
Luo, Y., Comley, R., Lasebae, A. and Georgiades, A. 2004. Trinity protocol for authentication of binding updates in mobile IPv6. WSEAS Transactions on Communications. 3 (3), pp. 872-877.
A morphologically optimal strategy for classifier combination: Multiple expert fusion as a tomographic process
Windridge, D. and Kittler, J. 2003. A morphologically optimal strategy for classifier combination: Multiple expert fusion as a tomographic process. IEEE Transactions on Pattern Analysis and Machine Intelligence. 25 (3), pp. 343-353. https://doi.org/10.1109/TPAMI.2003.1182097
Classifier combination as a tomographic process
Windridge, D. and Kittler, J. 2001. Classifier combination as a tomographic process. 2nd International Workshop on Multiple Classifier Systems. Cambridge, UK 02 - 04 Jul 2001 Springer. pp. 248-258 https://doi.org/10.1007/3-540-48219-9_25
Boosting multiple experts by joint optimization of decision thresholds
Kittler, J., Yusoff, Y., Christmas, W., Windeatt, T. and Windridge, D. 2001. Boosting multiple experts by joint optimization of decision thresholds. Pattern Recognition and Image Analysis. 11 (3), pp. 529-541.
An optimal solution to the problem of multiple expert fusion
Windridge, D. 2000. An optimal solution to the problem of multiple expert fusion. University of Surrey.
A fluctuation analysis for optical cluster galaxies - I. Theory
Windridge, D. and Phillipps, S. 2000. A fluctuation analysis for optical cluster galaxies - I. Theory. Monthly Notices of the Royal Astronomical Society (MNRAS). 319 (2), pp. 591-605. https://doi.org/10.1046/j.1365-8711.2000.03908.x