Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 24 of 24

Full-Text Articles in Computer Engineering

Poster: Optimising Electric Vehicle Charging Infrastructure In Dublin Using Geecharge, Alexander Mutiso Mutua, Ruairí De Fréin, Ali Malik, Kibanza Eliel, Sahbane Marco, Pantel Maxime Nov 2023

Poster: Optimising Electric Vehicle Charging Infrastructure In Dublin Using Geecharge, Alexander Mutiso Mutua, Ruairí De Fréin, Ali Malik, Kibanza Eliel, Sahbane Marco, Pantel Maxime

Conference papers

Range anxiety is a significant challenge affecting electric vehicles use as drivers fear running out of charge without finding a charging point on time. We develop methods to optimise the distribution of charging points. EV portacharge and GEECharge solutions distribute charging points in a city by considering the population density and Points Of Interest (POI) or road traffic. This paper focuses on (1) developing and evaluating methods to distribute Charging Points (CPs) in Dublin city; (2) optimising CP allocation; (3) visualising paths in the graph network to show the most used roads and points of interest; (4) describing a way …


Round Trip Time Measurement Over Microgrid Power Network, Yasin Emir Kutlu, Ruairí De Fréin, Malabika Basu, Ali Malik Jun 2023

Round Trip Time Measurement Over Microgrid Power Network, Yasin Emir Kutlu, Ruairí De Fréin, Malabika Basu, Ali Malik

Conference papers

A focus of the Power Systems and Networking communities is the design and deployment of Microgrid (MG) integration systems that ensure that quality of service targets are met for load sharing systems at different endpoints. This paper presents an integrated Microgrid testbed that allows Microgrids endpoints to share their current, voltage and power values using a Network Published Shared Variable (NPSV) approach. We present Round Trip Time (RTT) measurements for time sensitive Microgrid control traffic in the presence of varying background traffic as an example quality of service measurement. Numerical results are presented using a range of different background traffic …


Energy-Aware Ai-Driven Framework For Edge-Computing-Based Iot Applications, Muhammad Zawish, Nouman Ashraf, Rafay Iqbal Ansari, Steven Davy Jan 2023

Energy-Aware Ai-Driven Framework For Edge-Computing-Based Iot Applications, Muhammad Zawish, Nouman Ashraf, Rafay Iqbal Ansari, Steven Davy

Conference papers

The significant growth in the number of Internet of Things (IoT) devices has given impetus to the idea of edge computing for several applications. In addition, energy harvestable or wireless-powered wearable devices are envisioned to empower the edge intelligence in IoT applications. However, the intermittent energy supply and network connectivity of such devices in scenarios including remote areas and hard-to-reach regions such as in-body applications can limit the performance of edge computing-based IoT applications. Hence, deploying state-of-the-art convolutional neural networks (CNNs) on such energy-constrained devices is not feasible due to their computational cost. Existing model compression methods, such as network …


Optimising Electric Vehicle Charging Infrastructure In Dublin Using Geecharge, Alexander Mutua Mutiso, Ruairí De Fréin, Ali Malik, Eliel Kibanza, Marco Sahbane, Maxime Pantel Jan 2023

Optimising Electric Vehicle Charging Infrastructure In Dublin Using Geecharge, Alexander Mutua Mutiso, Ruairí De Fréin, Ali Malik, Eliel Kibanza, Marco Sahbane, Maxime Pantel

Conference papers

Range anxiety poses a hurdle to the adoption of Electric Vehicles (EVs), as drivers worry about running out of charge without timely access to a Charging Point (CP). We present novel methods for optimising the distribution of CPs, namely, EV portacharge and GEECharge. These solutions distribute CPs in Dublin, in this paper, by considering the population density and Points Of Interest (POIs) or road traffic. The object of this paper is to (1) develop and evaluate methods to distribute CPs in Dublin city; (2) optimise CP allocation; (3) visualise paths in the graph network to show the most used roads …


Work In Progress: A Virtual Educational Robotics Coding Club Framework To Improve K-6 Students Emotional Engagement In Stem, Kate Carmody, Julie Booth, Jospehine Bleach, Pramod Pathak, Paul Styles Jan 2023

Work In Progress: A Virtual Educational Robotics Coding Club Framework To Improve K-6 Students Emotional Engagement In Stem, Kate Carmody, Julie Booth, Jospehine Bleach, Pramod Pathak, Paul Styles

Conference papers

The growing popularity and deployment of Internet of Things (IoT) devices has led to serious security concerns. The integration of a security operations center (SOC) becomes increasingly important in this situation to ensure the security of IoT devices. In this article, we will present a summary of IoT device security issues, their vulnerabilities, a review of current challenges to keep these devices secure, and discuss the role that SOC can bring in protecting IoT devices while considering the challenges encountered and the directions to consider when implementing a reliable SOC for IoT monitoring.


Bayesian Adaptive Path Allocation Techniques For Intra-Datacenter Workloads, Ali Malik, Ruairí De Fréin, Chih-Heng Ke, Hasanen Alyasiri, Obinna Izima Jul 2021

Bayesian Adaptive Path Allocation Techniques For Intra-Datacenter Workloads, Ali Malik, Ruairí De Fréin, Chih-Heng Ke, Hasanen Alyasiri, Obinna Izima

Conference papers

Data center networks (DCNs) are the backbone of many cloud and Internet services. They are vulnerable to link failures, that occur on a daily basis, with a high frequency. Service disruption due to link failure may incur financial losses, compliance breaches and reputation damage. Performance metrics such as packet loss and routing flaps are negatively affected by these failure events. We propose a new Bayesian learning approach towards adaptive path allocation that aims to improve DCN performance by reducing both packet loss and routing flaps ratios. The proposed approach incorporates historical information about link failure and usage probabilities into its …


A Proactive-Restoration Technique For Sdns, Ali Malik, Ruairí De Fréin Jun 2020

A Proactive-Restoration Technique For Sdns, Ali Malik, Ruairí De Fréin

Conference papers

Failure incidents result in temporarily preventing the network from delivering services properly. Such a deterioration in services called service unavailability. The traditional fault management techniques, i.e. protection and restoration, are inevitably concerned with service unavailability due to the convergence time that is required to achieve the recovery when a failure occurs. However, with the global view feature of software-defined networking a failure prediction is becoming attainable, which in turn reduces the service interruptions that originated by failures. In this paper, we propose a proactive restoration technique that reconfigure the vulnerable routes which are likely to be affected if the …


Distance-Based Cluster Head Election For Mobile Sensing, Ruairí De Fréin, Liam O'Farrell Dec 2018

Distance-Based Cluster Head Election For Mobile Sensing, Ruairí De Fréin, Liam O'Farrell

Conference papers

Energy-efficient, fair, stochastic leader-selection algorithms are designed for mobile sensing scenarios which adapt the sensing strategy depending on the mobile sensing topology. Methods for electing a cluster head are crucially important when optimizing the trade-off between the number of peer-to- peer interactions between mobiles and client-server interactions with a cloud-hosted application server. The battery-life of mobile devices is a crucial constraint facing application developers who are looking to use the convergence of mobile computing and cloud computing to perform environmental sensing. We exploit the mobile network topology, specifically the location of mobiles with respect to the gateway device, to stochastically …


State Acquisition In Computer Networks, Ruairí De Fréin May 2018

State Acquisition In Computer Networks, Ruairí De Fréin

Conference papers

We establish that State Acquisition should be per- formed in networks at a rate which is consistent with the rate-of-change of the element or service being observed. We demonstrate that many existing monitoring and service-level prediction tools do not acquire network state in an appropriate manner. To address this challenge: (1) we define the rate-of- change of different applications; (2) we use methods for analysis of unevenly spaced time series, specifically, time series arising from video and voice applications, to estimate the rate-of-change of these services; and finally, (3) we demonstrate how to acquire network state accurately for a number …


Review Of The Effectiveness Of Impulse Testing For The Evaluation Of Cable Insulation Quality And Recommendations For Quality Testing, Adrian Coughlan, Joseph Kearney, Tom Looby Jan 2018

Review Of The Effectiveness Of Impulse Testing For The Evaluation Of Cable Insulation Quality And Recommendations For Quality Testing, Adrian Coughlan, Joseph Kearney, Tom Looby

Conference papers

Abstract— This project investigates impulse breakdown testing as a means of determining the as constructed standard of MV power cable. A literature survey is undertaken to elucidate the place of this test in an overall cable test regime and to determine the factors that impact on the performance of the test method. Testing was undertaken on ESB Networks cables to establish if a merit order ranking was feasible based on this test and to determine if the test could detect defects in the inner semiconducting layer. Based on this, conclusions and recommendations are made regarding the overall applicability and usefulness …


Ambiqual – A Full Reference Objective Quality Metric For Ambisonic Spatial Audio, Miroslaw Narbutt, Andrew Allen, Jan Skoglund, Michael Chinen, Andrew Hines Jan 2018

Ambiqual – A Full Reference Objective Quality Metric For Ambisonic Spatial Audio, Miroslaw Narbutt, Andrew Allen, Jan Skoglund, Michael Chinen, Andrew Hines

Conference papers

Streaming spatial audio over networks requires efficient encoding techniques that compress the raw audio content without compromising quality of experience. Streaming service providers such as YouTube need a perceptually relevant objective audio quality metric to monitor users’ perceived quality and spatial localization accuracy. In this paper we introduce a full reference objective spatial audio quality metric, AMBIQUAL, which assesses both Listening Quality and Localization Accuracy. In our solution both metrics are derived directly from the B-format Ambisonic audio. The metric extends and adapts the algorithm used in ViSQOLAudio, a full reference objective metric designed for assessing speech and audio quality. …


Tiled Time Delay Estimation In Mobile Cloud Computing Environments, Ruairí De Fréin Dec 2017

Tiled Time Delay Estimation In Mobile Cloud Computing Environments, Ruairí De Fréin

Conference papers

We present a tiled delay estimation technique in the context of Mobile Cloud Computing (MCC) environments. We examine its accuracy in the presence of multiple sources for (1) sub-sample delays and also (2) in the presence of phase-wrap around. Phase wrap-around is prevalent in MCC because the separation of acoustic sources may be large. We show that tiling a histogram of instantaneous phase estimates can improve delay estimates when phase-wrap around is sig- nificantly present and also when multiple sources are present. We report that error in the delay estimator is generally less than 5% of a sample, when the …


Chaos-Based Cryptography For Cloud Computing, Paul Tobin, Lee Tobin, Michael Mckeever, Jonathan Blackledge Jun 2017

Chaos-Based Cryptography For Cloud Computing, Paul Tobin, Lee Tobin, Michael Mckeever, Jonathan Blackledge

Conference papers

Cloud computing and poor security issues have quadrupled over the last six years and with the alleged presence of backdoors in common encryption ciphers, has created a need for personalising the encryption process by the client. In 2007, two Microsoft employees gave a presentation ``On the Possibility of a backdoor in the NIST SP800-90 Dual Elliptic Curve Pseudo Random Number Generators'' and was linked in 2013 by the New York Times with notes leaked by Edward Snowden. This confirmed backdoors were placed, allegedly, in a number of encryption systems by the National Security Agency, which if true creates an urgent …


One-To-Cloud One-Time Pad Data Encryption: Introducing Virtual Prototyping With Pspice, Paul Tobin, Lee Tobin, Roberto Gandia Blanquer Dr, Michael Mckeever, Jonathan Blackledge Jun 2017

One-To-Cloud One-Time Pad Data Encryption: Introducing Virtual Prototyping With Pspice, Paul Tobin, Lee Tobin, Roberto Gandia Blanquer Dr, Michael Mckeever, Jonathan Blackledge

Conference papers

In this paper, we examine the design and application of a one-time pad encryption system for protecting data stored in the Cloud. Personalising security using a one-time pad generator at the client-end protects data from break-ins, side-channel attacks and backdoors in public encryption algorithms. The one-time pad binary sequences were obtained from modified analogue chaos oscillators initiated by noise and encoded client data locally. Specific ``one-to-Cloud'' storage applications returned control back to the end user but without the key distribution problem normally associated with one-time pad encryption. Development of the prototype was aided by ``Virtual Prototyping'' in the latest version …


On The Development Of A One-Time Pad Generator For Personalising Cloud Security, Paul Tobin, Lee Tobin, Michael Mckeever, Jonathan Blackledge Feb 2017

On The Development Of A One-Time Pad Generator For Personalising Cloud Security, Paul Tobin, Lee Tobin, Michael Mckeever, Jonathan Blackledge

Conference papers

Cloud computing security issues are being reported in newspapers, television, and on the Internet, on a daily basis. Furthermore, in 2013, Edward Snowden alleged backdoors were placed in a number of encryption systems by the National Security Agency causing confidence in public encryption to drop even further. Our solution allows the end-user to add a layer of unbreakable security by encrypting the data locally with a random number generator prior to uploading data to the Cloud. The prototype one-time pad generator is impervious to cryptanalysis because it generates unbreakable random binary sequences from chaos sources initiated from a natural noise. …


Clustering Opportunistic Ant-Based Routing Protocol For Wireless Sensor Networks, Xinlu Li, Brian Keegan, Fredrick Mtenzi Jan 2017

Clustering Opportunistic Ant-Based Routing Protocol For Wireless Sensor Networks, Xinlu Li, Brian Keegan, Fredrick Mtenzi

Conference papers

The wireless Sensor Networks (WSNs) have a wide range of applications in many ereas, including many kinds of uses such as environmental monitoring and chemical detection. Due to the restriction of energy supply, the improvement of routing performance is the major motivation in WSNs. We present a Clustering Opportunistic Ant-based Routing protocol (COAR), which comprises the following main contributions to achieve high energy efficient and well load-balance: (i) in the clustering algorithm, we caculate the theoretical value of energy dissipation, which will make the number of clusters fluctuate around the expected value, (ii) define novel heuristic function and pheromone update …


Bitrate Classification Of Twice-Encoded Audio Using Objective Quality Features, Colm Sloan, Damien Kelly, Naomi Harte, Anil C. Kokaram, Andrew Hines Jun 2016

Bitrate Classification Of Twice-Encoded Audio Using Objective Quality Features, Colm Sloan, Damien Kelly, Naomi Harte, Anil C. Kokaram, Andrew Hines

Conference papers

When a user uploads audio files to a music stream- ing service, these files are subsequently re-encoded to lower bitrates to target different devices, e.g. low bitrate for mobile. To save time and bandwidth uploading files, some users encode their original files using a lossy codec. The metadata for these files cannot always be trusted as users might have encoded their files more than once. Determining the lowest bitrate of the files allows the streaming service to skip the process of encoding the files to bitrates higher than that of the uploaded files, saving on processing and storage space. This …


Kicm: A Knowledge-Intensive Context Model, Fredrick Mtenzi, Denis Lupiana Jan 2016

Kicm: A Knowledge-Intensive Context Model, Fredrick Mtenzi, Denis Lupiana

Conference papers

A context model plays a significant role in developing context-aware architectures and consequently on realizing context-awareness, which is important in today's dynamic computing environments. These architectures monitor and analyse their environments to enable context-aware applications to effortlessly and appropriately respond to users' computing needs. These applications make the use of computing devices intuitive and less intrusive. A context model is an abstract and simplified representation of the real world, where the users and their computing devices interact. It is through a context model that knowledge about the real world can be represented in and reasoned by a context-aware architecture. This …


Measuring And Monitoring Speech Quality For Voice Over Ip With Polqa, Visqol And P.563, Andrew Hines, Eoin Gillen, Naomi Harte Jan 2015

Measuring And Monitoring Speech Quality For Voice Over Ip With Polqa, Visqol And P.563, Andrew Hines, Eoin Gillen, Naomi Harte

Conference papers

There are many types of degradation which can occur in Voice over IP (VoIP) calls. Of interest in this work are degradations which occur independently of the codec, hardware or network in use. Specifically, their effect on the subjective and objec- tive quality of the speech is examined. Since no dataset suit- able for this purpose exists, a new dataset (TCD-VoIP) has been created and has been made publicly available. The dataset con- tains speech clips suffering from a range of common call qual- ity degradations, as well as a set of subjective opinion scores on the clips from 24 …


Distributed Formal Concept Analysis Algorithms Based On An Iterative Mapreduce Framework, Ruairí De Fréin, Biao Xu, Eric Robson, Mícheál Ó Fóghlú Jan 2012

Distributed Formal Concept Analysis Algorithms Based On An Iterative Mapreduce Framework, Ruairí De Fréin, Biao Xu, Eric Robson, Mícheál Ó Fóghlú

Conference papers

While many existing formal concept analysis algorithms are efficient, they are typically unsuitable for distributed implementation. Taking the MapReduce (MR) framework as our inspiration we introduce a distributed approach for performing formal concept mining. Our method has its novelty in that we use a light-weight MapReduce runtime called Twister which is better suited to iterative algorithms than recent distributed approaches. First, we describe the theoretical foundations underpinning our distributed formal concept analysis approach. Second, we provide a representative exemplar of how a classic centralized algorithm can be implemented in a distributed fashion using our methodology: we modify Ganter’s classic algorithm …


E-Fraud Prevention Based On The Self-Authentication Of E-Documents, Jonathan Blackledge, Eugene Coyle Jan 2010

E-Fraud Prevention Based On The Self-Authentication Of E-Documents, Jonathan Blackledge, Eugene Coyle

Conference papers

We consider a method for preventing e-Fraud in which a binary image is encrypted with a floating point cipher using a convolution operation and the output quantized into a 1-bit array generating a binary image ciphertext. The output is then ‘embedded’ in a host image to hide the encrypted information. Embedding is undertaken either in the lowest 1-bit layer or multiple 1-bit layers. Decryption is accomplished by: (i) extracting the binary image from the host image; (ii) correlating the result with the original cipher. In principle, any cipher generator can be used for this purpose and the method has been …


Optimisation Of Multicast Routing In Wireless Mesh Networks, Brian Keegan, Karol Kowalik, Mark Davis Oct 2008

Optimisation Of Multicast Routing In Wireless Mesh Networks, Brian Keegan, Karol Kowalik, Mark Davis

Conference papers

In recent years Wireless Mesh Networks have been deployed and grown in popularity in many metropolitan areas. The deployment of such networks has allowed clients to gain access to publicly available broadband networks. The implementation of wireless mesh networks requires that backhaul services (traditionally carried by wired networks) be maintained via wireless mesh points. Because of their structure, wireless mesh networks provide an excellent means for targeting a large group of end users or simply to relay data. This may be achieved by means of broadcasting or more specifically multicasting. The lack of standards and support for multicasting over wireless …


The Effects Of Contention Among Stations On Video Streaming Applications Over Wireless Local Area Networks: An Experimental Approach, Nicola Cranley, Tanmoy Debnath Oct 2007

The Effects Of Contention Among Stations On Video Streaming Applications Over Wireless Local Area Networks: An Experimental Approach, Nicola Cranley, Tanmoy Debnath

Conference papers

Multimedia streaming applications have a large impact on the resource requirements of the WLAN. There are many variables involved in video streaming, such as the video content being streamed, how the video is encoded and how it is sent. This makes the role of radio resource management and the provision of QoS guarantees extremely difficult. For video streaming applications, packet loss and packets dropped due to excessive delay are the primary factors that affect the received video quality. In this paper, we experimentally analyse the effects of contention on the performance of video streaming applications with a given delay constraint …


An Experimental Analysis Of The Call Capacity Of Ieee 802.11b Wireless Local Area Networks For Voip Telephony, Brian Keegan, Mark Davis Jun 2006

An Experimental Analysis Of The Call Capacity Of Ieee 802.11b Wireless Local Area Networks For Voip Telephony, Brian Keegan, Mark Davis

Conference papers

In this paper we present the results from an experimental study of the call capacity of an IEEE 802.11b network when using VoIP telephony. Experiments include increasing the number of VoIP users in a wireless test-bed and increasing the level of background traffic until network saturation occurs. The experiments allow us to perform an analysis of the access point (AP) buffer dynamics. Results show that the network is capable of supporting up to 16 VoIP stations (STAs). Due to the operation of the IEEE 802.11 medium access control (MAC) mechanism, the AP acts as a bottleneck for all traffic destined …