@inbook{mitchell:2019a, title = {{BMAR} - blockchain for medication administration records}, author = {I. Mitchell and S. Hara}, crossref = {jahankhani:2019} }
@article{mitchell:2019b, title = {{DappER: Decentralised Application for Exam Reviews}}, author = {I. Mitchell and M. Sheriff and S. Hara}, year = {2019}, journaltitle = {Global Security, Safety and Sustainability \- The Security Challenges of the Connected World}, series = {Communication in Computer and Information Science}, publisher = { Springer} }
@book{jahankhani:2019, title = {{Blockchain and Clinical Trial - Securing Patient Data}}, editor = {Jahankhani, H.}, publisher = {Springer}, year = {2019}, series = {Advanced Sciences and Technologies for Security Applications} }
@conference{hara:2018, author = {S. Hara and I. Mitchell}, title = {{Impact of Commercial Forensic Tools on Teaching: CipherTrace for Blockchain Forensics}}, booktitle = {BCS 14th Annual Teaching Computer Forensics Workshop}, year = {2018} }
@inbook{mitchell:2018, author = {I. Mitchell and T. Cockerton and S. Hara and C. Evans}, chapter = {SMERF: Social Media, Ethics and Risk Framework}, crossref = {jahankhani:2019} }
@inbook{mitchell:2018b, author = {I. Mitchell and J. Ferriera and T. Anandaraja and S. Hara}, chapter = {A Method for the Preservation of Digital Evidence on Solid State Drives}, crossref = {jahankhani:2019} }
@book{jahankhani:2019, title = {Cyber Criminology}, editor = {Jahankhani, H.}, publisher = {Springer}, year = {2018}, series = {Advanced Sciences and Technologies for Security Applications} }
@article{huyck:mitchell:2018, title = {{CABots and Other Neural Agents}}, author = {C. Huyck and I. Mitchell}, journal = {Frontiers in Neurorobotics}, publisher = {Frontiers}, year = {2018} }
@article{mitchell2016icgs3, author = {I. Mitchell and T. Anandaraja and G. Hadzhinenov and S. Hara and D. Neilson}, title = {{Deconstruct and Preserve (DaP)}: A method for the preservation of digital evidence on Solid State Drives (SSD)}, journaltitle = {Global Security, Safety and Sustainability \- The Security Challenges of the Connected World}, series = {Communication in Computer and Information Science}, publisher = {Springer}, issn = {978-3-319-51064-4}, year = {2017}}
@article{neilson2016icgs3, author = {D. Neilson and S. Hara and I. Mitchell }, title = {BitCoin Forensics: A Tutorial}, journaltitle = {Global Security, Safety and Sustainability \- The Security Challenges of the Connected World}, series = {Communication in Computer and Information Science}, publisher = {Springer}, issn = {978-3-319-51064-4}, year = {2017}} }
@article{mitchell2016bica, author = {I. Mitchell and C. R. Huyck and C. Evans}, title = {{PlaNeural}: Spiking Neural Networks that Plan}, journal = {Biological Inspired Cognitive Architectures}, year = {2016} }
@article{evans2016ppig, author = {C. Evans and I. Mitchell and C. R. Huyck}, title = {Programming with Simulated Neurons: a first design pattern}, journal = {Psychology in Programming Interest Group}, year = {2016} }
@article{huyck2015bica, author = "C.R. Huyck and C. Evans and I. Mitchell", title = "A Comparison of Simple Agents Implemented in Simulated Neurons", journal = "Biological Inspired Cognitive Architectures", year = "2015"}
@article{huyck2014bica, author ="C. R. Huyck and I. Mitchell", title ="Building Neuromorphic Embodied Cell Assembly Agents that Learn", journal ="Biologically Inspired Cognitive Architectures", year ="2014"}
@article{huyck2014post, title={Post and pre-compensatory Hebbian learning for categorisation}, author={C. R. Huyck and I. Mitchell}, journal={Cognitive neurodynamics}, volume={8}, number={4}, pages={299--311}, year={2014}, publisher={Springer} }
A. Agrawal and I. Mitchell . Selection enthusiasm. In 6th Int. Conf. on Simulated Evolution and Learning, SEAL'06. Lecture Notes in Computer Science (LNCS) Springer-Verlag, 2006.
A. Agrawal, I. Mitchell, P. Passmore and I. Litovski (2005) "Dynamics in Proportionate Selection" ICANNGA05.
Mitchell, I. A Generic Representation for GAs. in sixth IASTED International Conference Artificial Intelligence & Soft Computing, ASC 2002.
Huyck, C. and Mitchell, I. Cell Assemblies, Self Organising Maps and Hopfield Nets. In sixth International Conference on Cognitive and Neural Systems 2002.
Cairns P. A., Huyck C. R., Mitchell I. and Wu W. X. (2001). A comparison of Categorisation Algorithms for Predicting the Cellular Localization Sites of Proteins. DEXA 2001.
Bavan A.S.and Mitchell I. (2000) A Connectionist Inference Model for Pattern-Directed Knowledge Representation. In Journal on Expert Systems, 17(2), pp165-172, ISBN: 0266-4720.
Mitchell I.,Pocknell P., (2000), A temporal representations for GA and TSP, in Sixth LNCS on Parallel Problem Solving from Nature, PPSN VI, Springer-Verlag, vol. 1917, pp 651-660, ISBN: 3-540-41056-2.
MitchellI., (2000), Pocknell, P., Parallel Dilation Technique for TSP, in International Conference on Artificial Intelligence, ICAI 2000, pp 1413-1418, ISBN:1-892512-58-0.
Bavan A.S.and Mitchell I. (2000) A Connectionist Inference Model for Pattern-Directed Knowledge Representation. in Journal on Expert Systems, 17(2), pp165-172, ISBN: 0266-4720.
Mitchell I., Bevan, A.S., (1999), GSAAM: graph, sets and associative memories, Proc of the International conference on artificial intelligence, IC-AI '99, Las Vegas, USA.
Ian has implemented one representation for a genetic algorithm that finds near optimal solutions for NP-complete problems e.g. Maximal Cliques, Graph Colouring, etc. Briefly, this representation when producing offspring - via traditional genetic operators such as crossover and mutation - has no illegality and therefore requires no repair algorithms. Investigations continue to see if this representation can be exploited further and produce coevolutionary model that can enforce mutualism between two or more populations each trying to find near-optimal solutions for different problem domains.
Ian has implemented a Genetic Program, GP, that instead of using the traditional S-expressions uses an XML application, MathML. Using Koza's quintic and sextic polynomials the GP successfully regressed to produced exact replicas (ignoring bloat). As expected the amount of bloat was significantly reduced when using Langdon's "Size Fair and Homologous" crossover techniques, although there are some significant differences between S-expressions and MathML that require further research. Ian is looking for funding to investigate the use of GPs to generate other XML instances e.g. XSL/T, XSD, ChemML, XHTML, etc.