Browsing Cyfrifiadureg / Computer Science by Title

H...............H

Browsing Cyfrifiadureg / Computer Science by Title

Sort by: Order: Results:

  • Tyler, Laurence; Barnes, David Preston (2008-09)
    We describe our work on a study into key instrument deployment requirements for the ESA ExoMars rover Instrument Deployment Arm (IDA). Using the Beagle 2 (B2) arm as a baseline design, we address issues of positional and ...
  • Mungall, Christopher J.; Gkoutos, Georgios; Smith, Cynthia L.; Haendel, Melissa A.; Lewis, Suzanna E.; Ashburner, Michael (2010-01-08)
    Phenotype ontologies are typically constructed to serve the needs of a particular community, such as annotation of genotype-phenotype associations in mouse or human. Here we demonstrate how these ontologies can be improved ...
  • Cangelosi, A.; Metta, G.; Sagerer, G.; Nolfi, S.; Nehaniv, C.; Fischer, K.; Tani, J.; Sandini, G.; Fadiga, L.; Wrede, B.; Rohlfing, K.; Tuci, E.; Dautenhahn, K.; Saunders, J.; Zeschel, A. (2010-09-01)
    This position paper proposes that the study of embodied cognitive agents, such as humanoid robots, can advance our understanding of the cognitive development of complex sensorimotor, linguistic, and social learning skills. ...
  • Hülse, Martin Siegfried; McBride, Sebastian Daryl; Law, James Alexander; Lee, Mark Howard (2010-12-31)
    Inspired by child development and brain research, we introduce a computational framework which integrates robotic active vision and reaching. Essential elements of this framework are sensorimotor mappings that link three ...
  • Clare, Amanda (Wiley, London, 2005)
  • Lee, Mark Howard; Rowland, Jeremy John (World Scientific, 1995-01-11)
    This book deals with a key area of industrial robotics - the automation of small batch assembly. Assembly imparts enormous added value but turns out to be extraordinarily difficult to automate. The work presented here, all ...
  • Boongoen, Tossapon; Shen, Qiang (2009)
    Combating identity fraud is prominent and urgent since false identity has become the common denominator of all serious crime. Among many identified identity attributes, personal names are commonly falsified or aliased by ...
  • Lee, Mark (Halsted Press, 1989-09)
    Intelligent Robotics examines techniques that will enable robots to be more intelligent in the future and considers the main problems and potential barriers to progress. It encourages an engineering approach, relating ...
  • King, Ross Donald; Whelan, Ken (2004-09)
    The automation of laboratory techniques has greatly increased the number of experiments that can be carried out in the chemical and biological sciences. Until recently, this automation has focused primarily on improving ...
  • Shen, Qiang (2009)
    Decision support systems play an important role in many application domains. For instance, in the detection of serious crime, including terrorist activity, an intelligent system which is capable of automated modelling and ...
  • Zwiggelaar, R.; Ugail, H.; Yap, M. H. (2012-10-16)
    this paper proposes a method to detect the facial Action Units (AUs) and introduce an automatic measurement in predicting the intensity scores of each AU in near-to-frontal face image sequences. To our knowledge, this is ...
  • Bell, Jonathan (University of Wales AberystwythComputer Science, 2006)
    This thesis attempts to answer the question "Can we devise a language for interpretation of behavioural simulation of engineered systems (of arbitrary complexity) in terms of the systems’ purpose?" It does so by presenting ...
  • Rowland, Jeremy John (Morgan Kaufmann, 2002)
  • Shen, Qiang; Jensen, Richard (2008)
    One of the many successful applications of rough set theory has been to the area of feature selection. The rough set ideology of using only the supplied data and no other information has many benefits, where most other ...
  • Jensen, Richard; Shen, Qiang (2009)
    One of the many successful applications of rough set theory has been to the area of feature selection. The rough set principle of using only the supplied data and no other information has many benefits, where most other ...
  • Sheldon, Michael (Aberystwyth UniversityComputer Science, 2013)
    This thesis is concerned with the emergence of communication in arti cial agents as an integrated part of a more general developmental progression. We demonstrate how early gestural communication can emerge out of sensorimotor ...
  • Daniele, Caligiore; Das, Gautham; Valerio, Sperati; Varun, Kompella; Vieri, Santucci; Benureau, Fabien; Francesco, Mannella; Mai, Nguyen; Marco, Mirolli; Vincenzo, Fiore; Gianluca, Baldassarre; Robert, Nawrocki (2011-09-26)
    In classical reinforcement learning framework, an external, handcrafted reward typically drives the learning process. Intrinsically motivated systems, on the other hand, can guide their learning process autonomously by ...
  • Ridoux, O.; Ferre, Sebastien (2004)
    Logical Information Systems (LIS) use logic in a uniform way to describe theircontents, to query it, to navigate through it, to analyze it, and to maintain it.They can be given an abstract specification that does not depend ...
  • Timmis, John; Neal, Mark (2000)
    This paper presents a resource limited artificial immune system for data analysis. The work presented here builds upon previous work on artificial immune systems for data analysis. A population control mechanism, inspired ...
  • Lu, Chuan; King, Ross Donald (2009-06-17)
    Motivation: Distribution analysis is one of the most basic forms of statistical analysis. Thanks to improved analytical methods, accurate and extensive quantitative measurements can now be made of the mRNA, protein and ...

Search Cadair


Advanced Search

Browse

My Account