Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

2017

Institution
Keyword
Publication
Publication Type

Articles 31 - 60 of 654

Full-Text Articles in Computer Engineering

An Example Of Atomic Requirements - Login Screen, William L. Honig Oct 2017

An Example Of Atomic Requirements - Login Screen, William L. Honig

William L Honig

A simple example of what an atomic or individual or singular requirement statement should be. Using the example of the familiar login screen, shows the evolution from a low quality initial attempt at requirements to a complete atomic requirement statement. Introduces the idea of a system glossary to support the atomic requirement.


Requirements Metrics - Definitions Of A Working List Of Possible Metrics For Requirements Quality, William L. Honig Oct 2017

Requirements Metrics - Definitions Of A Working List Of Possible Metrics For Requirements Quality, William L. Honig

William L Honig

A work in progress to define a metrics set for requirements. Metrics are defined that apply to either the entire requirements set (requirements document as a whole) or individual atomic (or singular, individual) requirements statements. Requirements are identified with standard names and a identification scheme and include both subjective and objective measures. An example metric for the full set of requirements: Rd2 - Requirements Consistency, Is the set of atomic requirements internally consistent, with no contradictions, no duplication between individual requirements? An example of a metric for a single requirement: Ra4 - Requirement Verifiability, How adequately can this requirement be …


Atomic Requirements Quick Notes, William L. Honig, Shingo Takada Oct 2017

Atomic Requirements Quick Notes, William L. Honig, Shingo Takada

William L Honig

Working paper on atomic requirements for systems development and the importance of singular, cohesive, individual requirements statements. Covers possible definitions of atomic requirements, and their characteristics. Atomic requirements improve many parts of the development process from requirements to testing and contracting.


Computer Science: Application Of Technology/Iot In Hydropower Dams, Orjola Jaupi Oct 2017

Computer Science: Application Of Technology/Iot In Hydropower Dams, Orjola Jaupi

UBT International Conference

As time passes by, we barely see how much time it costs people to stay at work, fixing problems that happen every day. As people we should do more about humanity and technology is the door that opens opportunities for us to do this. Technology today is transforming every human daily life routine and it’s only the beginning of what technology can bring. By 2020 we know that technology will connect the unconnected by introducing the real idea of Internet of Things. Every little, tiny thing all over the world will be connected, but also big and important projects like …


Characteristics And Temporal Behavior Of Internet Backbone Traffic, Artan Salihu, Muharrem Shefkiu, Arianit Maraj Oct 2017

Characteristics And Temporal Behavior Of Internet Backbone Traffic, Artan Salihu, Muharrem Shefkiu, Arianit Maraj

UBT International Conference

With the rapid increase demand for data usage, Internet has become complex and harder to analyze. Characterizing the Internet traffic might reveal information that are important for Network Operators to formulate policy decisions, develop techniques to detect network anomalies, help better provision network resources (capacity, buffers) and use workload characteristics for simulations (typical packet sizes, flow durations, common protocols).

In this paper, using passive monitoring and measurements, we show collected data traffic at Internet backbone routers. First, we reveal main observations on patterns and characteristics of this dataset including packet sizes, traffic volume for inter and intra domain and protocol …


Review Of Artificial Intelligence Development, Its Impact And Its Challenges, Litvane Spahija, Festim Halili Oct 2017

Review Of Artificial Intelligence Development, Its Impact And Its Challenges, Litvane Spahija, Festim Halili

UBT International Conference

The field of Artificial Intelligence, which started roughly half a century ago, has a turbulent history. In the 1980s there has been a major paradigm shift towards embodiment. While embodied artificial intelligence is still highly diverse, changing, and far from “theoretically stable”, a certain consensus about the important issues and methods has been achieved or is rapidly emerging. In this paper we briefly characterize the field, summarize its achievements, and identify important issues for future research.

With the popularization of the Internet, permeation of sensor networks, emergence of big data, increase in size of the information community, and interlinking and …


Study Of The Power Consumption Of Pseudo Random Bit Generator Circuits Implemented On Fpga, Galia Marinova Oct 2017

Study Of The Power Consumption Of Pseudo Random Bit Generator Circuits Implemented On Fpga, Galia Marinova

UBT International Conference

Pseudo Random Bit and Number Generator (PRB/NG) circuits being very widely used for security, compressive sensing and diverse other applications in telecommunications are studies in different aspects in the laboratory of Computer-aided Design in Telecommunications in Technical University-Sofia. Some results of this study are published in [1] where tests for randomness from the National Institute of Standards and Technology (NIST) suit are applied on commonly used PRB/NGs. Other aspects of the PRB/NG circuits study is their power consumption in the aim of green communications as noticed in [2,3] and the concern about low power consuming devices for Internet of Things’ …


A Critical Overview Of Data Mining For Business Applications, George Telonis, Peter P. Groumpos Oct 2017

A Critical Overview Of Data Mining For Business Applications, George Telonis, Peter P. Groumpos

UBT International Conference

Everybody looks to a world that does not remain the same. Furthermore no one can deny that the world is changing, and changing very fast.

Technology, education, science, environment, health, communicating habits, entertainment, eating habits, dress - there is hardly anything in life that is not changing. Some changes we like, while others create fear and anxiety around us. Everywhere there is a feeling of insecurity.

What will happen to us tomorrow, or what will happen to our children, are questions we keep frequently asking. One thing, however, is clear.

It is no more possible to live in the way …


Decision Making Based On Data Analyses Using Data Warehouses, Valdrin Haxhiu Oct 2017

Decision Making Based On Data Analyses Using Data Warehouses, Valdrin Haxhiu

UBT International Conference

Data warehouses are a collection of several databases, whose goal is to help different companies and corporations make important decisions about their activities. These decisions are taken from the analyses that are made to the data within the data warehouse. These data are taken from data that companies and corporations collect on daily basis from their branches that may be located in different cities, regions, states and continents. Data that are entered to data warehouses are historical data and they represent that part of data that is important for making decisions. These data go under a transformation process in order …


Mobile Cloud Computing: A New Way Of Cloud Computing, Festim Halili, Verda Misimi, Rilinda Iseini, Mirije Salihi Oct 2017

Mobile Cloud Computing: A New Way Of Cloud Computing, Festim Halili, Verda Misimi, Rilinda Iseini, Mirije Salihi

UBT International Conference

Cloud Computing seems to be the most promising technology of the century we are living. It provides a new manner of sharing distributed resources and services that may be part of different organizations, geographically located in different places and different time zones. Mobile Cloud Computing offers partially the same functionality, with the only additional requirement that, at least, some of the devices are mobile. In this paper, we will try to provide a detailed explanation of Mobile Cloud Computing concept by providing different examples, figures and charts showing usage, accessibility, pros and cons and comparison of different cloud platforms.


Permission-Based Privacy Analysis For Android Applications, Erza Gashi, Zhilbert Tafa Oct 2017

Permission-Based Privacy Analysis For Android Applications, Erza Gashi, Zhilbert Tafa

UBT International Conference

While Information and Communication Technology (ICT) trends are moving towards the Internet of Things (IoT), mobile applications are becoming more and more popular. Mostly due to their pervasiveness and the level of interaction with the users, along with the great number of advantages, the mobile applications bring up a great number of privacy related issues as well. These platforms can gather our very sensitive private data by only granting them a list of permissions during the installation process. Additionally, most of the users can find it difficult, or even useless, to analyze system permissions. Thus, their guess of app’s safety …


Analysis Of Central Banks Platforms On Social Networks, Goran Bjelobaba, Ana Savic, Hana Stefanovic Oct 2017

Analysis Of Central Banks Platforms On Social Networks, Goran Bjelobaba, Ana Savic, Hana Stefanovic

UBT International Conference

The paper describes the advantages of using technical and technological achievements through the social networks and their implementation in Central Banks communication. A study of some Central Banks on their use of social media and some of the most popular social networks are given, showing that social media is becoming an important medium of communication for Central Banks around the world. The study shows that a majority of Central Banks use Twitter to send alerts for information already disseminated through the website, even as they are not very active in responding to public tweets, and also shows an increasing number …


Development And Improvement Of The Quality Of The Mobile Services At The Mobile Market In Macedonia, Arsov Boris, Trajkovski Vasko, Sherifi Vergim Oct 2017

Development And Improvement Of The Quality Of The Mobile Services At The Mobile Market In Macedonia, Arsov Boris, Trajkovski Vasko, Sherifi Vergim

UBT International Conference

To determine the strategic direction for the development of electronic communications market in the part of mobile telecommunication services in Republic of Macedonia, the Agency for electronic communication has made an assessment of the regulatory progress and that has been made in recent years. The needs are in order to obtain a clear strategy for the development of the mobile telecommunication market in Macedonia, and primarily will create a clear picture in the: technical, financial, operational and competitive segments. Republic of Macedonia at this moment has 2 mobile operators with own network and the third mobile virtual operator. They are …


A Need For An Integrative Security Model For Semantic Stream Reasoning Systems, Admirim Aliti, Edmond Jajaga, Kozeta Sevrani Oct 2017

A Need For An Integrative Security Model For Semantic Stream Reasoning Systems, Admirim Aliti, Edmond Jajaga, Kozeta Sevrani

UBT International Conference

State-of-the-art security frameworks have been extensively addressing security issues for web resources, agents and services in the Semantic Web. The provision of Stream Reasoning as a new area spanning Semantic Web and Data Stream Management Systems has eventually opened up new challenges. Namely, their decentralized nature, the metadata descriptions, the number of users, agents, and services, make securing Stream Reasoning systems difficult to handle. Thus, there is an inherent need of developing new security models which will handle security and automate security mechanisms to a more autonomous system that supports complex and dynamic relationships between data, clients and service providers. …


Improving Hpc Communication Library Performance On Modern Architectures, Matthew G. F. Dosanjh Oct 2017

Improving Hpc Communication Library Performance On Modern Architectures, Matthew G. F. Dosanjh

Computer Science ETDs

As high-performance computing (HPC) systems advance towards exascale (10^18 operations per second), they must leverage increasing levels of parallelism to achieve their performance goals. In addition to increased parallelism, machines of that scale will have strict power limitations placed on them. One direction currently being explored to alleviate those issues are many-core processors such as Intel’s Xeon Phi line. Many-core processors sacrifice clock speed and core complexity, such as out of order pipelining, to increase the number of cores on a die. While this increases floating point throughput, it can reduce the performance of serialized, synchronized, and latency sensitive code …


Resource Efficient Design Of Quantum Circuits For Quantum Algorithms, Himanshu Thapliyal Oct 2017

Resource Efficient Design Of Quantum Circuits For Quantum Algorithms, Himanshu Thapliyal

Commonwealth Computational Summit

No abstract provided.


Using Explainability For Constrained Matrix Factorization, Behnoush Abdollahi, Olfa Nasraoui Oct 2017

Using Explainability For Constrained Matrix Factorization, Behnoush Abdollahi, Olfa Nasraoui

Commonwealth Computational Summit

Explainable Model

  • Black Box (opaque) predictors such as Deep learning and Matrix Factorization are accurate,
  • ... but lack interpretability and ability to give explanations.
  • White Box models such as rules and decision trees are interpretable (explainable),
  • ... but lack accuracy.


Software Metrics And Dashboard, Shilpika Shilpika, George K. Thiruvathukal, Saulo Aguiar, Konstantin Läufer, Nicholas J. Hayward Oct 2017

Software Metrics And Dashboard, Shilpika Shilpika, George K. Thiruvathukal, Saulo Aguiar, Konstantin Läufer, Nicholas J. Hayward

Konstantin Läufer

Software metrics are a critical tool which provide continuous insight to products and processes and help build reliable software in mission critical environments. Using software metrics we can perform calculations that help assess the effectiveness of the underlying software or process. The two types of metrics relevant to our work is complexity metrics and in-process metrics. Complexity metrics tend to focus on intrinsic code properties like code complexity. In-process metrics focus on a higher-level view of software quality, measuring information that can provide insight into the underlying software development process.

Our aim is to develop and evaluate a metrics dashboard …


Deep Learning In R, Troy Hernandez Oct 2017

Deep Learning In R, Troy Hernandez

Annual Symposium on Biomathematics and Ecology Education and Research

No abstract provided.


Formal Performance Guarantees For An Approach To Human In The Loop Robot Missions, Damian Lyons, Ron Arkin, Shu Jiang, Matt O'Brien, Feng Tang, Peng Tang Oct 2017

Formal Performance Guarantees For An Approach To Human In The Loop Robot Missions, Damian Lyons, Ron Arkin, Shu Jiang, Matt O'Brien, Feng Tang, Peng Tang

Faculty Publications

Abstract— A key challenge in the automatic verification of robot mission software, especially critical mission software, is to be able to effectively model the performance of a human operator and factor that into the formal performance guarantees for the mission. We present a novel approach to modelling the skill level of the operator and integrating it into automatic verification using a linear Gaussians model parameterized by experimental calibration. Our approach allows us to model different skill levels directly in terms of the behavior of the lumped, robot plus operator, system.

Using MissionLab and VIPARS (a behavior-based robot mission verification …


A Framework For Recommendation Of Highly Popular News Lacking Social Feedback, Nuno Moniz, Luís Torgo, Magdalini Eirinaki, Paula Branco Oct 2017

A Framework For Recommendation Of Highly Popular News Lacking Social Feedback, Nuno Moniz, Luís Torgo, Magdalini Eirinaki, Paula Branco

Faculty Publications

Social media is rapidly becoming the main source of news consumption for users, raising significant challenges to news aggregation and recommendation tasks. One of these challenges concerns the recommendation of very recent news. To tackle this problem, approaches to the prediction of news popularity have been proposed. In this paper, we study the task of predicting news popularity upon their publication, when social feedback is unavailable or scarce, and to use such predictions to produce news rankings. Unlike previous work, we focus on accurately predicting highly popular news. Such cases are rare, causing known issues for standard prediction models and …


Power-Efficient And Highly Scalable Parallel Graph Sampling Using Fpgas, Usman Tariq, Umer Cheema, Fahad Saeed Oct 2017

Power-Efficient And Highly Scalable Parallel Graph Sampling Using Fpgas, Usman Tariq, Umer Cheema, Fahad Saeed

Parallel Computing and Data Science Lab Technical Reports

Energy efficiency is a crucial problem in data centers where big data is generally represented by directed or undirected graphs. Analysis of this big data graph is challenging due to volume and velocity of the data as well as irregular memory access patterns. Graph sampling is one of the most effective ways to reduce the size of graph while maintaining crucial characteristics. In this paper we present design and implementation of an FPGA based graph sampling method which is both time- and energy-efficient. This is in contrast to existing parallel approaches which include memory-distributed clusters, multicore and GPUs. Our …


Simple Implementation Of An Elgamal Digital Signature And A Brute Force Attack On It, Valeriia Laryoshyna Oct 2017

Simple Implementation Of An Elgamal Digital Signature And A Brute Force Attack On It, Valeriia Laryoshyna

Student Works

This study is an attempt to show a basic mathematical usage of the concepts behind digital signatures and to provide a simple approach and understanding to cracking basic digital signatures. The approach takes on simple C programming of the ElGamal digital signature to identify some limits that can be encountered and provide considerations for making more complex code. Additionally, there is a literature review of the ElGamal digital signature and the brute force attack.

The research component of this project provides a list of possible ways to crack the basic implementations and classifies the different approaches that could be taken …


Cross-Modal Recipe Retrieval With Rich Food Attributes, Jingjing Chen, Chong-Wah Ngo, Tat-Seng Chua Oct 2017

Cross-Modal Recipe Retrieval With Rich Food Attributes, Jingjing Chen, Chong-Wah Ngo, Tat-Seng Chua

Research Collection School Of Computing and Information Systems

Food is rich of visible (e.g., colour, shape) and procedural (e.g., cutting, cooking) attributes. Proper leveraging of these attributes, particularly the interplay among ingredients, cutting and cooking methods, for health-related applications has not been previously explored. This paper investigates cross-modal retrieval of recipes, specifically to retrieve a text-based recipe given a food picture as query. As similar ingredient composition can end up with wildly different dishes depending on the cooking and cutting procedures, the difficulty of retrieval originates from fine-grained recognition of rich attributes from pictures. With a multi-task deep learning model, this paper provides insights on the feasibility of …


Modeling Energy Consumption Of High-Performance Applications On Heterogeneous Computing Platforms, Gary D. Lawson Jr. Oct 2017

Modeling Energy Consumption Of High-Performance Applications On Heterogeneous Computing Platforms, Gary D. Lawson Jr.

Computational Modeling & Simulation Engineering Theses & Dissertations

Achieving Exascale computing is one of the current leading challenges in High Performance Computing (HPC). Obtaining this next level of performance will allow more complex simulations to be run on larger datasets and offer researchers better tools for data processing and analysis. In the dawn of Big Data, the need for supercomputers will only increase. However, these systems are costly to maintain because power is expensive. Thus, a better understanding of power and energy consumption is required such that future hardware can benefit.

Available power models accurately capture the relationship to the number of cores and clock-rate, however the relationship …


Spatio-Temporal Analysis And Prediction Of Cellular Traffic In Metropolis, Xu Wang, Zimu Zhou, Zheng Yang, Yunhao Liu, Chunyi Peng Oct 2017

Spatio-Temporal Analysis And Prediction Of Cellular Traffic In Metropolis, Xu Wang, Zimu Zhou, Zheng Yang, Yunhao Liu, Chunyi Peng

Research Collection School Of Computing and Information Systems

Understanding and predicting cellular traffic at large-scale and fine-granularity is beneficial and valuable to mobile users, wireless carriers and city authorities. Predicting cellular traffic in modern metropolis is particularly challenging because of the tremendous temporal and spatial dynamics introduced by diverse user Internet behaviours and frequent user mobility citywide. In this paper, we characterize and investigate the root causes of such dynamics in cellular traffic through a big cellular usage dataset covering 1.5 million users and 5,929 cell towers in a major city of China. We reveal intensive spatio-temporal dependency even among distant cell towers, which is largely overlooked in …


Semantic Reasoning In Zero Example Video Event Retrieval, M. H. T. De Boer, Yi-Jie Lu, Hao Zhang, Klamer Schutte, Chong-Wah Ngo, Wessel Kraaij Oct 2017

Semantic Reasoning In Zero Example Video Event Retrieval, M. H. T. De Boer, Yi-Jie Lu, Hao Zhang, Klamer Schutte, Chong-Wah Ngo, Wessel Kraaij

Research Collection School Of Computing and Information Systems

Searching in digital video data for high-level events, such as a parade or a car accident, is challenging when the query is textual and lacks visual example images or videos. Current research in deep neural networks is highly beneficial for the retrieval of high-level events using visual examples, but without examples it is still hard to (1) determine which concepts are useful to pre-train (Vocabulary challenge) and (2) which pre-trained concept detectors are relevant for a certain unseen high-level event (Concept Selection challenge). In our article, we present our Semantic Event Retrieval Systemwhich (1) shows the importance of high-level concepts …


Improvement Of Phylogenetic Method To Analyze Compositional Heterogeneity, Zehua Zhang, Kecheng Guo, Gaofeng Pan, Jijun Tang, Fei Guo Sep 2017

Improvement Of Phylogenetic Method To Analyze Compositional Heterogeneity, Zehua Zhang, Kecheng Guo, Gaofeng Pan, Jijun Tang, Fei Guo

Faculty Publications

Background: Phylogenetic analysis is a key way to understand current research in the biological processes and detect theory in evolution of natural selection. The evolutionary relationship between species is generally reflected in the form of phylogenetic trees. Many methods for constructing phylogenetic trees, are based on the optimization criteria. We extract the biological data via modeling features, and then compare these characteristics to study the biological evolution between species.

Results: Here, we use maximum likelihood and Bayesian inference method to establish phylogenetic trees; multi-chain Markov chain Monte Carlo sampling method can be used to select optimal phylogenetic tree, resolving local …


Developing Grounded Goals Through Instant Replay Learning, Lisa Meeden, Douglas S. Blank Sep 2017

Developing Grounded Goals Through Instant Replay Learning, Lisa Meeden, Douglas S. Blank

Computer Science Faculty Research and Scholarship

This paper describes and tests a developmental architecture that enables a robot to explore its world, to find and remember interesting states, to associate these states with grounded goal representations, and to generate action sequences so that it can re-visit these states of interest. The model is composed of feed-forward neural networks that learn to make predictions at two levels through a dual mechanism of motor babbling for discovering the interesting goal states and instant replay learning for developing the grounded goal representations. We compare the performance of the model with grounded goal representations versus random goal representations, and find …


A Novel Privacy Preserving User Identification Approach For Network Traffic, Nathan Clarke, Fudong Li, Steven Furnell Sep 2017

A Novel Privacy Preserving User Identification Approach For Network Traffic, Nathan Clarke, Fudong Li, Steven Furnell

Research outputs 2014 to 2021

The prevalence of the Internet and cloud-based applications, alongside the technological evolution of smartphones, tablets and smartwatches, has resulted in users relying upon network connectivity more than ever before. This results in an increasingly voluminous footprint with respect to the network traffic that is created as a consequence. For network forensic examiners, this traffic represents a vital source of independent evidence in an environment where anti-forensics is increasingly challenging the validity of computer-based forensics. Performing network forensics today largely focuses upon an analysis based upon the Internet Protocol (IP) address – as this is the only characteristic available. More typically, …