• Home
  • Patricia Ryser-Welch
Patricia Ryser-Welch

Patricia Ryser-Welch
Newscastle University · PHI

Doctor of Philosophy

About

28
Publications
269,373
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
71
Citations
Citations since 2016
16 Research Items
63 Citations
2016201720182019202020212022024681012
2016201720182019202020212022024681012
2016201720182019202020212022024681012
2016201720182019202020212022024681012
Introduction
In the last five years I have research gen-HH solves some real-life-inspired and NP-hard problems. I have also contributed in moving forward some research in anti-poaching and prediction of future illegal activities. Integrating R and Java to extend the capabilities of SMART should contribute in improved patrol planning. I am currently researching how ML and non-parametric statistic can be successfully computed within federated system with some extensive privacy-preserving features.
Additional affiliations
October 2013 - present
The Open University (UK)
Position
  • Lecturer
Description
  • T174 - Introduction to engineer M364 - Human Computer Interaction M250 - Introduction to Java Programming
October 2013 - September 2017
The University of York
Position
  • PhD Student

Publications

Publications (28)
Preprint
Full-text available
An increasing demand and dependence of analyzing a data has been driven by “Big Data” and “Internet of Things (IoT)”. Scientific reproducibility, robustness and the cost of capturing new data has been improved through findable, accessible, interoperable, and reusable data sharing. Ethical and legal restrictions impose the use of privacy preservatio...
Presentation
Full-text available
A short presentation to a non-academic audience in Newcastle University. Panel discussion alongside AWS specialist and legal experts in cyber-security to use health data to support research ethically and legally.
Article
Full-text available
Motivation In multi-cohort machine learning studies, it is critical to differentiate between effects that are reproducible across cohorts and those that are cohort-specific. Multi-task learning (MTL) is a machine learning approach that facilitates this differentiation through the simultaneous learning of prediction tasks across cohorts. Since multi...
Presentation
Full-text available
Explain the challenges and way forward to support medical research
Presentation
Full-text available
This presentation summarises some of my research in automated design of solvers for NP-hard problems.
Research
Full-text available
This unpublished paper needs some feedback from the community. it focuses on reviewing solutions to today's challenges
Article
Full-text available
Combined analysis of multiple, large datasets is a common objective in the health- and biosciences. Existing methods tend to require researchers to physically bring data together in one place or follow an analysis plan and share results. Developed over the last 10 years, the DataSHIELD platform is a collection of R packages that reduce the challeng...
Presentation
Full-text available
Introduce the ideas and complexity of testing distributed algorithms.
Method
Full-text available
This document illustrates how inference and lack of privacy protection can lead to the disclosure of datasets. It demonstrates how some mechanisms can be implemented within computer architectures, development techniques and frameworks to prevent to disclosure of individual level of data.
Conference Paper
Full-text available
PPSN 2016 hosts a total number of 16 tutorials covering a broad range of current research in evolutionary computation. The tutorials range from introductory to advanced and specialized but can all be attended without prior requirements. All PPSN attendees are cordially invited to take this opportunity to learn about ongoing research activities in o...
Presentation
Full-text available
Genetic Programming is often associated with a tree representation for encoding expressions and algorithms. However, graphs are also very useful and flexible program representations which can be applied to many domains (e.g. electronic circuits, neural networks, algorithms). Over the years a variety of representations of graphs have been explored s...
Chapter
Full-text available
Evolutionary algorithms have been widely used to optimise or design search algorithms, however, very few have considered evolving iterative algorithms. In this paper, we introduce a novel extension to Cartesian Genetic Programming that allows it to encode iterative algorithms. We apply this technique to the Traveling Salesman Problem to produce hum...
Conference Paper
Evolutionary algorithms have been widely used to optimise or design search algorithms, however, very few have considered evolving iterative algorithms. In this paper, we introduce a novel extension to Cartesian Genetic Programming that allows it to encode iterative algorithms. We apply this technique to the Traveling Salesman Problem to produce hum...
Research
Full-text available
The design of effective algorithms for computationally intractable search problems has long been an intensive field of study in computer science. Although evolutionary algorithms have been widely used to optimise or design search algorithms, very few have considered evolving sequential and iterative algorithms. In this workshop, we discuss how Cart...
Conference Paper
Full-text available
Hyper-heuristics search the space of heuristics and meta-heuristics, so that it can generate high-quality algorithms. It is a growing area of interest in the research community. Algorithms have been constructed iteratively using " templates of operations " based on well-known heuristic and metaheuris-tic methods (i.e. Iterated Local Search and Meme...
Data
Full-text available
This presentation discusses and argues why generating human-readable algorithms could move forward research in unsupervised machine learning.
Conference Paper
Hyper-heuristics is a very active field that is developing all the time. Defined as "heuristics to choose heuristics" [1], this area of bio-inspired intelligent systems covers a wide range of algorithms selection techniques. Most Hyper-heuristic frameworks focus on improving the quality of the solutions of the problems,but they retain very little k...
Conference Paper
Full-text available
l u g -a n d -P l a y h y p e r -h e u r i s t i c s : a n e x t e n d e d f o r m u l a t i o n Our motivations: improving the design of algorithms and understanding their behaviour. Proposed extended formulation We are suggesting to merge the elements of the "Algorithm Selection Problem" and the "Two-level model" together to form a more explicit...
Conference Paper
Full-text available
Hyper-heuristic frameworks have emerged out of the shadows of meta-heuristic techniques. In this very active field, new frameworks are developed all the time. Shared common features that help to classify them in different types of hyper-heuristic. Similarly to an iceberg, this large subfield of artificial intelligence hide a sub-stantial amount of...

Questions

Questions (38)
Question
I am working on a project that is likely to predict and analysis humungous rasters and datasets. The largest I have worked with are 15 times smaller. So, it would help if anybody could suggests any studies or publications who done analysis with such large raster. It would be great, if you could share your experience too and how you may have overcome the size of the rasters in your analysis.
Question
I am exploring generalised inverse computation and their computational complexity. Could anybody suggests the algorithms that may have been used to approximate the generalised inverse. Perhaps some AI techniques can find those too. Thank you for your help.

Network

Cited By

Projects

Projects (4)
Project
This project aims at completing some non-parametric statistical analysis with some virtually-joined datasets. The methodologies will simulate the transfer of data through some computations to preserve privacy of individuals. No data is transferred between datasets. The application of the methods can be quite wide. However, it can promote research where the large size of data and the sensitivity prevents researchers to collaborate. The aims is to allow too the analysis of large datasets.
Project
The goal of this project is to integrate some statistical model developed by Dr Colin Beale and Dr Rob Critchlow with the software SMART. This project involves the seamless integration between Java and R programming environment. It requires extracting information from any large SMART database so that it can be processed in a reasonable time. We hope to continue reducing animal poaching in Africa, Asian and North Russia.
Project
(Invitation): I would like to invite you to a ‘crowd-authoring’ project that I and other academics from around the world have been working on. We have been composing a book entitled ‘130 Ideas with no History of Application in Education and Technology’. We have finished 50% of the book, which can be found via the following link: https://newideasforeducationblog.wordpress.com/. This project is inspired by a previous project wherein I and other 98 academics ‘crowd-authored’ an article entitled ‘Academic Domains as Political Battlegrounds’ and published in Information Development Journal (Impact Factor 1.691). Contributors to the book are not expected to come up with a new theory, but rather to highlight a theory that already exists in a different field and argue for its possible benefit to the field of education and technology. Contributors from outside the field of education and technology are welcome. Each contributor is supposed to address the following: 1. Name the theory 2. List the fields the theory belongs to 3. List those who coined the theory 4. Define the theory (90 words) 5. Argue for the value and implications of the theory (110 words) 6. Argue for the benefit or risk this theory holds for the field of education and technology (100 words) 7. Argue for the risks or losses of not considering this theory in the field of education and technology (50 words) 8. Argue for the challenges that might be faced when applying this theory to education and technology (50 words) If interested, please email me via aallily@kfu.edu.sa. Deadline is 01/01/2020. Best, Abdul Abdulrahman Al Lily, DPhil (Oxon) Visiting Academic, University of Waikato Associate Professor, King of Saudi Arabia Common Room Member, University of Oxford Personal Website: https://abdulallily.wordpress.com/