Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 60

Full-Text Articles in Computer Engineering

Making Tradable White Certificates Trustworthy, Anonymous, And Efficient Using Blockchains, Nouman Ashraf, Sachin Sharma, Sheraz Aslam, Khursheed Aurangzeb Nov 2023

Making Tradable White Certificates Trustworthy, Anonymous, And Efficient Using Blockchains, Nouman Ashraf, Sachin Sharma, Sheraz Aslam, Khursheed Aurangzeb

Articles

Fossil fuel pollution has contributed to dramatic changes in the Earth’s climate, and this trend will continue as fossil fuels are burned at an ever-increasing rate. Many countries around the world are currently making efforts to reduce greenhouse gas emissions, and one of the methods is the Tradable White Certificate (TWC) mechanism. The mechanism allows organizations to reduce their energy consumption to generate energy savings certificates, and those that achieve greater energy savings can sell their certificates to those that fall short. However, there are some challenges to implementing this mechanism, such as the centralized and costly verification and control …


Graph Modeling For Openflow Switch Monitoring, Ali Malik, Ruairí De Fréin Aug 2023

Graph Modeling For Openflow Switch Monitoring, Ali Malik, Ruairí De Fréin

Articles

Network monitoring allows network administrators to facilitate network activities and to resolve issues in a timely fashion. Monitoring techniques in software-defined networks are either (i) active, where probing packets are sent periodically, or (ii) passive, where traffic statistics are collected from the network forwarding elements. The centralized nature of software-defined networking implies the implementation of monitoring techniques imposes additional overhead on the network controller. We propose Graph Modeling for OpenFlow Switch Monitoring (GMSM), which is a lightweight monitoring technique. GMSM constructs a flow-graph overview using two types of asynchronous OpenFlow messages: packet-in and flow-removed, which improve monitoring and decision making. …


Round Trip Time Measurement Over Microgrid Power Network, Yasin Emir Kutlu, Ruairí De Fréin, Malabika Basu, Ali Malik Jun 2023

Round Trip Time Measurement Over Microgrid Power Network, Yasin Emir Kutlu, Ruairí De Fréin, Malabika Basu, Ali Malik

Conference papers

A focus of the Power Systems and Networking communities is the design and deployment of Microgrid (MG) integration systems that ensure that quality of service targets are met for load sharing systems at different endpoints. This paper presents an integrated Microgrid testbed that allows Microgrids endpoints to share their current, voltage and power values using a Network Published Shared Variable (NPSV) approach. We present Round Trip Time (RTT) measurements for time sensitive Microgrid control traffic in the presence of varying background traffic as an example quality of service measurement. Numerical results are presented using a range of different background traffic …


Optimising Electric Vehicle Charging Infrastructure In Dublin Using Geecharge, Alexander Mutua Mutiso, Ruairí De Fréin, Ali Malik, Eliel Kibanza, Marco Sahbane, Maxime Pantel Jan 2023

Optimising Electric Vehicle Charging Infrastructure In Dublin Using Geecharge, Alexander Mutua Mutiso, Ruairí De Fréin, Ali Malik, Eliel Kibanza, Marco Sahbane, Maxime Pantel

Conference papers

Range anxiety poses a hurdle to the adoption of Electric Vehicles (EVs), as drivers worry about running out of charge without timely access to a Charging Point (CP). We present novel methods for optimising the distribution of CPs, namely, EV portacharge and GEECharge. These solutions distribute CPs in Dublin, in this paper, by considering the population density and Points Of Interest (POIs) or road traffic. The object of this paper is to (1) develop and evaluate methods to distribute CPs in Dublin city; (2) optimise CP allocation; (3) visualise paths in the graph network to show the most used roads …


Persuasive Communication Systems: A Machine Learning Approach To Predict The Effect Of Linguistic Styles And Persuasion Techniques, Annye Braca, Pierpaolo Dondio Jan 2023

Persuasive Communication Systems: A Machine Learning Approach To Predict The Effect Of Linguistic Styles And Persuasion Techniques, Annye Braca, Pierpaolo Dondio

Articles

Prediction is a critical task in targeted online advertising, where predictions better than random guessing can translate to real economic return. This study aims to use machine learning (ML) methods to identify individuals who respond well to certain linguistic styles/persuasion techniques based on Aristotle’s means of persuasion, rhetorical devices, cognitive theories and Cialdini’s principles, given their psychometric profile.


Survey Of Routing Techniques-Based Optimization Of Energy Consumption In Sd-Dcn, Mohammed Nsaif, Gergely Kovásznai, Ali Malik, Ruairí De Fréin Jan 2023

Survey Of Routing Techniques-Based Optimization Of Energy Consumption In Sd-Dcn, Mohammed Nsaif, Gergely Kovásznai, Ali Malik, Ruairí De Fréin

Articles

The increasing power consumption of Data Center Networks (DCN) is becoming a major concern for network operators. The object of this paper is to provide a survey of state-of-the-art methods for reducing energy consumption via (1) enhanced scheduling and (2) enhanced aggregation of traffic flows using Software-Defined Networks (SDN), focusing on the advantages and disadvantages of these approaches. We tackle a gap in the literature for a review of SDN-based energy saving techniques and discuss the limitations of multi-controller solutions in terms of constraints on their performance. The main finding of this survey paper is that the two classes of …


Demonstrating Configuration Of Software Defined Networking In Real Wireless Testbeds, Saish Urumkar, Gianluca Fontanesi, Avishek Nag, Sachin Sharma Jul 2022

Demonstrating Configuration Of Software Defined Networking In Real Wireless Testbeds, Saish Urumkar, Gianluca Fontanesi, Avishek Nag, Sachin Sharma

Conference papers

Currently, several wireless testbeds are available to test networking solutions including Fed4Fire testbeds such as w-ilab. t and CityLab in the EU, and POWDER and COSMOS in the US. In this demonstration, we use the w-ilab.t testbed to set up a wireless ad-hoc Software-Defined Network (SDN). OpenFlow is used as an SDN protocol and is deployed using a grid wireless ad-hoc topology in w-ilab.t. In this paper, we demonstrate: (1) the configuration of a wireless ad-hoc network based on w-ilab.t and (2) the automatic deployment of OpenFlow in an ad-hoc wireless network where some wireless nodes are not directly connected …


Experimenting An Edge-Cloud Computing Model On The Gpulab Fed4fire Testbed, Vikas Tomer, Sachin Sharma Jul 2022

Experimenting An Edge-Cloud Computing Model On The Gpulab Fed4fire Testbed, Vikas Tomer, Sachin Sharma

Conference papers

There are various open testbeds available for testing algorithms and prototypes, including the Fed4Fire testbeds. This demo paper illustrates how the GPULAB Fed4Fire testbed can be used to test an edge-cloud model that employs an ensemble machine learning algorithm for detecting attacks on the Internet of Things (IoT). We compare experimentation times and other performance metrics of our model based on different characteristics of the testbed, such as GPU model, CPU speed, and memory. Our goal is to demonstrate how an edge-computing model can be run on the GPULab testbed. Results indicate that this use case can be deployed seamlessly …


Cross-Atlantic Experiments On Eu-Us Test-Beds, Sachin Sharma, Avishek Nag, Byrav Ramamurthy May 2022

Cross-Atlantic Experiments On Eu-Us Test-Beds, Sachin Sharma, Avishek Nag, Byrav Ramamurthy

Articles

Today, there are a number of real testbeds worldwide among which Fed4Fire testbeds are prominent in the EU, while POWDER and COSMOS are prominent in the US. This paper aims to validate inter-testbed experiments between the EU and the US by connecting a number of Fed4Fire and US testbeds as part of an NGIAtlantic project. The goal is to compare the hop count, the topology formed, the maximum bandwidth permitted, and the loss and jitter that occurred between different testbeds. Additionally, Software Defined Networking (SDN) experiments between EU and US testbeds are conducted, and an edge-computing use case is developed …


Graph-Based Heuristic Solution For Placing Distributed Video Processing Applications On Moving Vehicle Clusters, Kanika Sharma, Bernard Butler, Brendan Jennings May 2022

Graph-Based Heuristic Solution For Placing Distributed Video Processing Applications On Moving Vehicle Clusters, Kanika Sharma, Bernard Butler, Brendan Jennings

Articles

Vehicular fog computing (VFC) is envisioned as an extension of cloud and mobile edge computing to utilize the rich sensing and processing resources available in vehicles. We focus on slow-moving cars that spend a significant time in urban traffic congestion as a potential pool of onboard sensors, video cameras, and processing capacity. For leveraging the dynamic network and processing resources, we utilize a stochastic mobility model to select nodes with similar mobility patterns. We then design two distributed applications that are scaled in real-time and placed as multiple instances on selected vehicular fog nodes. We handle the unstable vehicular environment …


Scaling And Placing Distributed Services On Vehicle Clusters In Urban Environments, Kanika Sharma, Bernard Butler, Brendan Jennings May 2022

Scaling And Placing Distributed Services On Vehicle Clusters In Urban Environments, Kanika Sharma, Bernard Butler, Brendan Jennings

Articles

Many vehicles spend a significant amount of time in urban traffic congestion. Due to the evolution of autonomous vehicles, driver assistance systems, and in-vehicle entertainment, these vehicles have plentiful computational and communication capacity. How can we deploy data collection and processing tasks on these (slowly) moving vehicles to productively use any spare resources? To answer this question, we study the efficient placement of distributed services on a moving vehicle cluster. We present a macroscopic flow model for an intersection in Dublin, Ireland, using real vehicle density data. We show that such aggregate flows are highly predictable (even though the paths …


Ml-Based Online Traffic Classification For Sdns, Mohammed Nsaif, Gergely Kovasznai, Mohammed Abboosh, Ali Malik, Ruairí De Fréin May 2022

Ml-Based Online Traffic Classification For Sdns, Mohammed Nsaif, Gergely Kovasznai, Mohammed Abboosh, Ali Malik, Ruairí De Fréin

Articles

Traffic classification is a crucial aspect for Software-Defined Networking functionalities. This paper is a part of an on-going project aiming at optimizing power consumption in the environment of software-defined datacenter networks. We have developed a novel routing strategy that can blindly balance between the power consumption and the quality of service for the incoming traffic flows. In this paper, we demonstrate how to classify the network traffic flows so that the quality of service of each flow-class can be guaranteed efficiently. This is achieved by creating a dataset that encompasses different types of network traffic such as video, VoIP, game …


Are We In The Digital Dark Times? How The Philosophy Of Hannah Arendt Can Illuminate Some Of The Ethical Dilemmas Posed By Modern Digital Technologies, Damian Gordon, Anna Becevel Jan 2021

Are We In The Digital Dark Times? How The Philosophy Of Hannah Arendt Can Illuminate Some Of The Ethical Dilemmas Posed By Modern Digital Technologies, Damian Gordon, Anna Becevel

Conference Papers

Philosophers are not generally credited with being clairvoyant, and yet because they recognise, record and reflect on trends in their society, their observations can often appear prescient. In the field of the ethics of technology, there is, perhaps, no philosopher whose perspective on these issues is worth examining in detail more than that of Hannah Arendt, who can offer real perspective on the challenges we are facing with technologies in the twenty-first century. Arendt, a thinker of Jewish-German origin, student of Martin Heidegger and Karl Jaspers, encountered her life turning point when she was forced into becoming a refugee as …


Detecting Interlocutor Confusion In Situated Human-Avatar Dialogue: A Pilot Study, Na Li, John D. Kelleher, Robert J. Ross Jan 2021

Detecting Interlocutor Confusion In Situated Human-Avatar Dialogue: A Pilot Study, Na Li, John D. Kelleher, Robert J. Ross

Conference papers

In order to enhance levels of engagement with conversational systems, our long term research goal seeks to monitor the confusion state of a user and adapt dialogue policies in response to such user confusion states. To this end, in this paper, we present our initial research centred on a user-avatar dialogue scenario that we have developed to study the manifestation of confusion and in the long term its mitigation. We present a new definition of confusion that is particularly tailored to the requirements of intelligent conversational system development for task-oriented dialogue. We also present the details of our Wizard-of-Oz based …


Intelligent Sdn Traffic Classification Using Deep Learning: Deep-Sdn, Ali Malik, Ruairí De Fréin, Mohammed Al-Zeyadi, Javier Andreu-Perez Jun 2020

Intelligent Sdn Traffic Classification Using Deep Learning: Deep-Sdn, Ali Malik, Ruairí De Fréin, Mohammed Al-Zeyadi, Javier Andreu-Perez

Conference papers

Accurate traffic classification is fundamentally important for various network activities such as fine-grained network management and resource utilisation. Port-based approaches, deep packet inspection and machine learning are widely used techniques to classify and analyze network traffic flows. However, over the past several years, the growth of Internet traffic has been explosive due to the greatly increased number of Internet users. Therefore, both port-based and deep packet inspection approaches have become inefficient due to the exponential growth of the Internet applications that incurs high computational cost. The emerging paradigm of software-defined networking has reshaped the network architecture by detaching the control …


A Proactive-Restoration Technique For Sdns, Ali Malik, Ruairí De Fréin Jun 2020

A Proactive-Restoration Technique For Sdns, Ali Malik, Ruairí De Fréin

Conference papers

Failure incidents result in temporarily preventing the network from delivering services properly. Such a deterioration in services called service unavailability. The traditional fault management techniques, i.e. protection and restoration, are inevitably concerned with service unavailability due to the convergence time that is required to achieve the recovery when a failure occurs. However, with the global view feature of software-defined networking a failure prediction is becoming attainable, which in turn reduces the service interruptions that originated by failures. In this paper, we propose a proactive restoration technique that reconfigure the vulnerable routes which are likely to be affected if the …


Rapid Restoration Techniques For Software-Defined Networks, Ali Malik, Ruairí De Fréin, Benjamin Aziz May 2020

Rapid Restoration Techniques For Software-Defined Networks, Ali Malik, Ruairí De Fréin, Benjamin Aziz

Articles

There is increasing demand in modern day business applications for communication networks to be robust and reliable due to the complexity and critical nature of such applications. As such, data delivery is expected to be reliable and secure even in the harshest of environments. Software-Defined Networking (SDN) is gaining traction as a promising approach for designing network architectures which are robust and flexible. One reason for this is that separating the data plane from the control plane, increases the controller’s ability to configure the network rapidly. When network failure events occur, the network manager may trade-off the optimality of the …


Sla-Aware Routing Strategy For Multi-Tenant Software-Defined Networks, Ali Malik, Ruairí De Fréin Jan 2020

Sla-Aware Routing Strategy For Multi-Tenant Software-Defined Networks, Ali Malik, Ruairí De Fréin

Conference papers

A crucial requirement for the network service provider is to satisfy the Service Level Agreements (SLA) that it has made with its customers. Coexisting network tenants may have agreed different SLAs, and thus, the service provider must be able to provide QoS differentiation in order to meet his contractual commitments. Current one-size-fits-all routing models are not appropriate for all network tenants if their individual SLA requirements are to be efficiently met. We propose a SDN-based multi-cost routing approach which allocates network resources based on a portfolio of tenant SLA, which achieves the goal of accommodating multiple tenants, given their SLAs. …


Ambiqual: Towards A Quality Metric For Headphone Rendered Compressed Ambisonic Spatial Audio, Miroslaw Narbutt, Jan Skoglund, Andrew Allen, Michael Chinen, Dan Barry, Andrew Hines Jan 2020

Ambiqual: Towards A Quality Metric For Headphone Rendered Compressed Ambisonic Spatial Audio, Miroslaw Narbutt, Jan Skoglund, Andrew Allen, Michael Chinen, Dan Barry, Andrew Hines

Articles

Spatial audio is essential for creating a sense of immersion in virtual environments. Efficient encoding methods are required to deliver spatial audio over networks without compromising Quality of Service (QoS). Streaming service providers such as YouTube typically transcode content into various bit rates and need a perceptually relevant audio quality metric to monitor users’ perceived quality and spatial localization accuracy. The aim of the paper is two-fold. First, it is to investigate the effect of Opus codec compression on the quality of spatial audio as perceived by listeners using subjective listening tests. Secondly, it is to introduce AMBIQUAL, a full …


Distance-Based Cluster Head Election For Mobile Sensing, Ruairí De Fréin, Liam O'Farrell Dec 2018

Distance-Based Cluster Head Election For Mobile Sensing, Ruairí De Fréin, Liam O'Farrell

Conference papers

Energy-efficient, fair, stochastic leader-selection algorithms are designed for mobile sensing scenarios which adapt the sensing strategy depending on the mobile sensing topology. Methods for electing a cluster head are crucially important when optimizing the trade-off between the number of peer-to- peer interactions between mobiles and client-server interactions with a cloud-hosted application server. The battery-life of mobile devices is a crucial constraint facing application developers who are looking to use the convergence of mobile computing and cloud computing to perform environmental sensing. We exploit the mobile network topology, specifically the location of mobiles with respect to the gateway device, to stochastically …


Evaluating Load Adjusted Learning Strategies For Client Service Levels Prediction From Cloud-Hosted Video Servers, Ruairí De Fréin, Obinna Izima, Mark Davis Dec 2018

Evaluating Load Adjusted Learning Strategies For Client Service Levels Prediction From Cloud-Hosted Video Servers, Ruairí De Fréin, Obinna Izima, Mark Davis

Conference papers

Network managers that succeed in improving the accuracy of client video service level predictions, where the video is deployed in a cloud infrastructure, will have the ability to deliver responsive, SLA-compliant service to their customers. Meeting up-time guarantees, achieving rapid first-call resolution, and minimizing time-to-recovery af- ter video service outages will maintain customer loyalty.

To date, regression-based models have been applied to generate these predictions for client machines using the kernel metrics of a server clus- ter. The effect of time-varying loads on cloud-hosted video servers, which arise due to dynamic user requests have not been leveraged to improve prediction …


State Acquisition In Computer Networks, Ruairí De Fréin May 2018

State Acquisition In Computer Networks, Ruairí De Fréin

Conference papers

We establish that State Acquisition should be per- formed in networks at a rate which is consistent with the rate-of-change of the element or service being observed. We demonstrate that many existing monitoring and service-level prediction tools do not acquire network state in an appropriate manner. To address this challenge: (1) we define the rate-of- change of different applications; (2) we use methods for analysis of unevenly spaced time series, specifically, time series arising from video and voice applications, to estimate the rate-of-change of these services; and finally, (3) we demonstrate how to acquire network state accurately for a number …


Bespoke Mobile Application Development: Facilitating Transition Of Foundation Students To Higher Education, Nevan Bermingham, Mark Prendergast Jan 2018

Bespoke Mobile Application Development: Facilitating Transition Of Foundation Students To Higher Education, Nevan Bermingham, Mark Prendergast

Books/Book Chapters

Smartphone usage by students has increased rapidly over the last number of years, and it is expected that the utilisation of mobile applications in educational environments will continue to increase. This chapter focuses on a bespoke mobile application which aims to facilitate the transition of Foundation students to Higher Education in an Irish setting. Foundation students comprise of Access and International Students participating on pre-degree foundation courses. These students experience a major life change in making this transition and it is important that efforts are made to ensure a successful adjustment experience. Research suggests that mobile technologies can play a …


Ambiqual – A Full Reference Objective Quality Metric For Ambisonic Spatial Audio, Miroslaw Narbutt, Andrew Allen, Jan Skoglund, Michael Chinen, Andrew Hines Jan 2018

Ambiqual – A Full Reference Objective Quality Metric For Ambisonic Spatial Audio, Miroslaw Narbutt, Andrew Allen, Jan Skoglund, Michael Chinen, Andrew Hines

Conference papers

Streaming spatial audio over networks requires efficient encoding techniques that compress the raw audio content without compromising quality of experience. Streaming service providers such as YouTube need a perceptually relevant objective audio quality metric to monitor users’ perceived quality and spatial localization accuracy. In this paper we introduce a full reference objective spatial audio quality metric, AMBIQUAL, which assesses both Listening Quality and Localization Accuracy. In our solution both metrics are derived directly from the B-format Ambisonic audio. The metric extends and adapts the algorithm used in ViSQOLAudio, a full reference objective metric designed for assessing speech and audio quality. …


Bim+Blockchain: A Solution To The Trust Problem In Collaboration?, Malachy Mathews, Dan Robles, Brian Bowe Aug 2017

Bim+Blockchain: A Solution To The Trust Problem In Collaboration?, Malachy Mathews, Dan Robles, Brian Bowe

Conference papers

This paper provides an overview of historic and current organizational limitations emerging in the Architecture, Engineering, Construction, Building Owner / Operations (AECOO) Industry. It then provides an overview of new technologies that attempt to mitigate these limitations. However, these technologies, taken together, appear to be converging and creating entirely new organizational structures in the AEC industries. This may be characterized by the emergence of what is called the Network Effect and it’s related calculus. This paper culminates with an introduction to Blockchain Technology (BT) and it’s integration with the emergence of groundbreaking technologies such as Internet of Things (IoT), Artificial …


One-To-Cloud One-Time Pad Data Encryption: Introducing Virtual Prototyping With Pspice, Paul Tobin, Lee Tobin, Roberto Gandia Blanquer Dr, Michael Mckeever, Jonathan Blackledge Jun 2017

One-To-Cloud One-Time Pad Data Encryption: Introducing Virtual Prototyping With Pspice, Paul Tobin, Lee Tobin, Roberto Gandia Blanquer Dr, Michael Mckeever, Jonathan Blackledge

Conference papers

In this paper, we examine the design and application of a one-time pad encryption system for protecting data stored in the Cloud. Personalising security using a one-time pad generator at the client-end protects data from break-ins, side-channel attacks and backdoors in public encryption algorithms. The one-time pad binary sequences were obtained from modified analogue chaos oscillators initiated by noise and encoded client data locally. Specific ``one-to-Cloud'' storage applications returned control back to the end user but without the key distribution problem normally associated with one-time pad encryption. Development of the prototype was aided by ``Virtual Prototyping'' in the latest version …


Vertical Search Engines, Kevin Curran, Jude Mc Glinchey May 2017

Vertical Search Engines, Kevin Curran, Jude Mc Glinchey

The ITB Journal

This paper outlines the growth in popularity of vertical search engines, their origins, the differences between them and well-known broad based search engines such as Google and Yahoo. We also discuss their use in business-to-business, their marketing and advertising costs, what the revenue streams are and who uses them.


Be Aware With A Honeypot, Stephen Meyer, Ivan Smyth, Mark Cummins, Anthony Keane May 2017

Be Aware With A Honeypot, Stephen Meyer, Ivan Smyth, Mark Cummins, Anthony Keane

The ITB Journal

The Internet has already become a hostile environment for computers, especially when they are directly connected with a public IP address. We have experienced this hostile activity where on an average day; the ITB Honeypot recorded over a thousand reconnaissance attacks seeking unauthorised entry onto our private network. Our Honeypot is a basic PC running Windows XP with no services offered and no activity from users that would generate traffic. The Honeypot is running in a passive state on a stub-network where all inbound and outbound traffic is recorded at the bridging computer to the WAN. We report on the …


On The Development Of A One-Time Pad Generator For Personalising Cloud Security, Paul Tobin, Lee Tobin, Michael Mckeever, Jonathan Blackledge Feb 2017

On The Development Of A One-Time Pad Generator For Personalising Cloud Security, Paul Tobin, Lee Tobin, Michael Mckeever, Jonathan Blackledge

Conference papers

Cloud computing security issues are being reported in newspapers, television, and on the Internet, on a daily basis. Furthermore, in 2013, Edward Snowden alleged backdoors were placed in a number of encryption systems by the National Security Agency causing confidence in public encryption to drop even further. Our solution allows the end-user to add a layer of unbreakable security by encrypting the data locally with a random number generator prior to uploading data to the Cloud. The prototype one-time pad generator is impervious to cryptanalysis because it generates unbreakable random binary sequences from chaos sources initiated from a natural noise. …


Analysing The Behaviour Of Online Investors In Times Of Geopolitical Distress: A Case Study On War Stocks, James Usher, Pierpaolo Dondio Jan 2017

Analysing The Behaviour Of Online Investors In Times Of Geopolitical Distress: A Case Study On War Stocks, James Usher, Pierpaolo Dondio

Conference papers

In this paper we analyse how the behavior of an online financial community in time of geopolitical crises. In particular, we studied the behaviour, composition and communication patterns of online investors before and after a military geopolitical event. We selected a set of 23 key-events belonging to the 2003 US-led invasion of Iraq, the Arab Spring and the first period of the Ukraine crisis. We restricted our study to a set of eight so called military stocks, which are US-manufacturing companies active in the defence sector. We studied the resilience of the community to information shocks by comparing the community …