Open Access. Powered by Scholars. Published by Universities.®
- Keyword
- Publication
Articles 1 - 4 of 4
Full-Text Articles in Engineering
Egoviz – A Mobile Based Spatial Interaction System, Keith Gardiner, Junjun Yin, James Carswell
Egoviz – A Mobile Based Spatial Interaction System, Keith Gardiner, Junjun Yin, James Carswell
Articles
This paper describes research carried out in the area of mobile spatial interaction and the development of a mobile (i.e. on-device) version of a simulated web-based 2D directional query processor. The TellMe application integrates location (from GPS, GSM, WiFi) and orientation (from digital compass/tilt sensors) sensing technologies into an enhanced spatial query processing module capable of exploiting a mobile device’s position and orientation for querying real-world 3D spatial datasets. This paper outlines the technique used to combine these technologies and the architecture needed to deploy them on a sensor enabled smartphone (i.e. Nokia 6210 Navigator). With all these sensor technologies …
A Bandwidth Aware Modification To The Dsr Routing Protocol For Wireless Mesh Networks, Mustafa Ramadhan, Mark Davis
A Bandwidth Aware Modification To The Dsr Routing Protocol For Wireless Mesh Networks, Mustafa Ramadhan, Mark Davis
Conference papers
This work proposes a bandwidth aware cross-layer modification to the DSR routing protocol. We include the Access Efficiency Factor (AEF) parameter in addition to the hop-count in the routing discovery mechanism. AEF is a measure to the local availability of bandwidth at a node. Employing the AEF as a metric in the routing discovery mechanism attempts to avoid routing through a congested area in the network. In this modification, we impose a limit on the hop-count in order to control the delay time in the network. The path selection procedure operates by finding a path with the highest minimum AEF …
Self-Authentication Of Audio Signals By Chirp Coding, Jonathan Blackledge, Eugene Coyle
Self-Authentication Of Audio Signals By Chirp Coding, Jonathan Blackledge, Eugene Coyle
Conference papers
This paper discusses a new approach to ‘watermarking’ digital signals using linear frequency modulated or ‘chirp’ coding. The principles underlying this approach are based on the use of a matched filter to provide a reconstruction of a chirped code that is uniquely robust in the case of signals with very low signal-to-noise ratios. Chirp coding for authenticating data is generic in the sense that it can be used for a range of data types and applications (the authentication of speech and audio signals, for example). The theoretical and computational aspects of the matched filter and the properties of a chirp …
A Covert Encryption Method For Applications In Electronic Data Interchange, Jonathan Blackledge, Dmitry Dubovitskiy
A Covert Encryption Method For Applications In Electronic Data Interchange, Jonathan Blackledge, Dmitry Dubovitskiy
Articles
A principal weakness of all encryption systems is that the output data can be ‘seen’ to be encrypted. In other words, encrypted data provides a ‘flag’ on the potential value of the information that has been encrypted. In this paper, we provide a new approach to ‘hiding’ encrypted data in a digital image.
In conventional (symmetric) encryption, the plaintext is usually represented as a binary stream and encrypted using an XOR type operation with a binary cipher. The algorithm used is ideally designed to: (i) generate a maximum entropy cipher so that there is no bias with regard to any …