Time filter

Source Type

Ipswich, United Kingdom

Le M.,Bournemouth University | Le M.,BT Research and Technology | Gabrys B.,Bournemouth University | Nauck D.,Bt Inc.
Res. and Dev. in Intelligent Syst. XXIX: Incorporating Applications and Innovations in Intel. Sys. XX - AI 2012, 32nd SGAI Int. Conf. on Innovative Techniques and Applications of Artificial Intel. | Year: 2012

Process event prediction is the prediction of various properties of the remaining path of a process sequence or workflow. The prediction is based on the data extracted from a combination of historical (closed) and/or live (open) workflows (jobs or process instances). In real-world applications, the problem is compounded by the fact that the number of unique workflows (process prototypes) can be enormous, their occurrences can be limited, and a real process may deviate from the designed process when executed in real environment and under realistic constraints. It is necessary for an efficient predictor to be able to cope with the diverse characteristics of the data.We also have to ensure that useful process data is collected to build the appropriate predictive model. In this paper we propose an extension of Markov models for predicting the next step in a process instance.We have shown, via a set of experiments, that our model offers better results when compared to methods based on random guess, Markov models and Hidden Markov models. The data for our experiments comes from a real live process in a major telecommunication company. © Springer-Verlag London 2012. Source

Lesaint D.,BT Research and Technology | Mehta D.,University College Cork | O'Sullivan B.,University College Cork | Quesada L.,University College Cork | Wilson N.,University College Cork
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | Year: 2010

Personalisation and context-awareness are fundamental concerns in Telephony. This paper introduces a rule-based system - 4Crules - which enables context-sensitive call control by the means of feature configuration rules. 4Crules is interoperable with standard context services and compositional feature architectures. It has been designed to resolve feature interactions, manage conflicting preferences, and mitigate the uncertainty affecting context data. This is achieved through a constraint optimisation model that maximises adherence to user requirements and domain constraints. Experiments on a suite of instances confirm the practicality of the approach and highlight performance- and adherence-critical factors. © 2010 Springer-Verlag. Source

Shaghaghi A.R.,University of Essex | Glover T.,BT Research and Technology | Kampouridis M.,University of Essex | Tsang E.,University of Essex
Lecture Notes in Electrical Engineering | Year: 2013

Fibre optic access networks are of increased popularity among network operators. Many types of fibre network are being deployed globally to satisfy the ever increasing users bandwidth requirements. The rate of deployments of such networks is expected to increase in coming years, moreover this requires cost efficient, reliable and robust network designs. Despite the relative complex structure of these networks, designs are mostly done manually, thus design quality is not optimal. In this paper we will introduce and propose a tree based modelling scheme and will show how the metaheuristic search method Guided Local Search can be used to automate the design of FTTP/GPON networks. The design optimisation will mainly focus on reducing the deployment cost i.e finding the optimal location, type and quantity of fibre optic equipment in order to reduce the capital expenditure (CAPEX) of such deployment projects. Our proposed model builds a flexible optimisation framework, and results of the GLS algorithm compared to simple local search and Simulated Annealing show consistent optimal results. © 2013 Springer Science+Business Media. Source

Zhang Y.,Nanyang Technological University | Yu R.,Tsinghua University | Nekovee M.,BT Research and Technology | Liu Y.,South China University of Technology | And 2 more authors.
IEEE Network | Year: 2012

Based upon cognitive radio technology, we propose a new Machine-to-Machine (M2M) communications paradigm, namely Cognitive M2M (CM2M) communication. We first motivate the use of cognitive radio technology in M2M communications from different point of views, including technical, applications, industry support, and standardization perspectives. Then, our CM2M network architecture and cognitive machine model are presented and the CM2M systems coexistence in TV white spaces is discussed. After that, a CM2M communications architecture for the smart grid is presented, for which we also propose an energy-efficiency driven spectrum discovery scheme. Numerical results demonstrate significant energy saving and the reliability in supporting data transmissions in the smart grid. © 2012 IEEE. Source

Nekovee M.,BT Research and Technology | Irnich T.,Ericsson AB | Karlsson J.,Ericsson AB
IEEE Wireless Communications | Year: 2012

We review the state of the art in worldwide regulation of cognitive radio-based secondary access to radio spectrum. Emerging regulatory trends with regards to incumbent protection and detection, operation parameters of cognitive radio, and secondary licensing models in the United States, United Kingdom, Europe, and elsewhere are reviewed and compared. Particular emphasis is given to cognitive radio operation in unused portions of TV bands, the so-called TV white spaces. Initial views on regulatory feasibility of secondary access to civilian radar and military bands are presented. © 2012 IEEE. Source

Discover hidden collaborations