Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 19 of 19

Full-Text Articles in Computer Engineering

Towards A Framework For Modelling Multimedia Conferencing Calls In The Next Generation Network, Gavin Byrne, Declan Barber Nov 2015

Towards A Framework For Modelling Multimedia Conferencing Calls In The Next Generation Network, Gavin Byrne, Declan Barber

The ITB Journal

This paper is concerned with the creation of a multiparty multimedia conferencing application which can be used in Next Generation Networks. It begins by suggesting ways in which conferencing can be modeled with a focus on separating signaling and media transfer functionality. Enabling technologies which could support the modeling framework derived and which are compatible with Next Generation Network (NGN) principles are reviewed. Finally, a design and implementation for a simple multimedia conferencing application are described.


Embedded Systems In A Mobile Distributed Ip Network, Conor Gildea, Declan Barber Nov 2015

Embedded Systems In A Mobile Distributed Ip Network, Conor Gildea, Declan Barber

The ITB Journal

This paper describes an approach to the internetworking of mobile IP sensor nodes in a converged network environment. This preliminary investigation of sensory network models is driven by a joint applied research project between ITB and Teagasc (Grange) which seeks to establish the feasibility of the real-time remote monitoring of animal welfare while in transit between Ireland, Europe and the Middle East. The paper examines traditional system architectures, messaging paradigms and protocols with a view to establishing how the trend towards convergence in telecommunications and the emergence of new Internet Protocols could support the creation of new modes of operation …


Pathfinding In Computer Games, Ross Graham, Hugh Mccabe, Stephen Sheridan Nov 2015

Pathfinding In Computer Games, Ross Graham, Hugh Mccabe, Stephen Sheridan

The ITB Journal

One of the greatest challenges in the design of realistic Artificial Intelligence (AI) in computer games is agent movement. Pathfinding strategies are usually employed as the core of any AI movement system. This report will highlight pathfinding algorithms used presently in games and their shortcomings especially when dealing with real-time pathfinding. With the advances being made in other components, such as physics engines, it is AI that is impeding the next generation of computer games. This report will focus on how machine learning techniques such as Artificial Neural Networks and Genetic Algorithms can be used to enhance an agents ability …


Integration Of A Stereo Vision System And Gps Data For Recording The Position Of Feature Points In A Fixed World Coordinate System, S.D. Mcloughlin, C. O’Rourke, J. Mcdonald, C.E. Markham Nov 2015

Integration Of A Stereo Vision System And Gps Data For Recording The Position Of Feature Points In A Fixed World Coordinate System, S.D. Mcloughlin, C. O’Rourke, J. Mcdonald, C.E. Markham

The ITB Journal

This paper describes a laboratory system for recovering the global coordinates of feature points obtained from a moving camera. The prototype includes a stereo vision system combined with an overhead camera, which mimics a GPS receiver. The stereo vision system provides three dimensional feature point coordinates relative to the position of the cameras and the overhead camera provides three-dimensional coordinates of the camera in a “global” coordinate system. The fusion of these data provides three-dimensional feature point coordinates in a fixed origin global coordinate system.


Hardware/Software Codesign, Richard Gallery Nov 2015

Hardware/Software Codesign, Richard Gallery

The ITB Journal

The current state of the art technology in integrated circuits allows the incorporation of multiple processor cores and memory arrays, in addition to application specific hardware, on a single substrate. As silicon technology has become more advanced, allowing the implementation of more complex designs, systems have begun to incorporate considerable amounts of embedded software [3]. Thus it becomes increasingly necessary for the system designers to have knowledge on both hardware and software to make efficient design tradeoffs. This is where hardware/software codesign comes into existence.


Unified Messaging Systems: An Evolutionary Overview, Declan Barber Nov 2015

Unified Messaging Systems: An Evolutionary Overview, Declan Barber

The ITB Journal

Over the last decade, the widespread demand and use of the internet has changed the direction of the telecommunications industry as it was recognised that the internet could be used as an inexpensive way to handle not only data but also voice communications. This convergence of traditional voice and data technologies towards an IP-based open architecture has been paralleled by a convergence of the internet and mobile communications. As a result of these convergences, unified messaging has emerged as a technically viable service. Integrated messaging services that offer partial unification of different message types are already in the marketplace. This …


Hardware And Software Codesign For Multimedia Capable Portable Devices Using Systemc, Richard Gallery, Deepesh Shakya Nov 2015

Hardware And Software Codesign For Multimedia Capable Portable Devices Using Systemc, Richard Gallery, Deepesh Shakya

The ITB Journal

Multimedia capable portable devices such as 3G phones will host a variety of new applications. Although the underlying push for new applications in such devices is driven by the increase in bandwidth offered by 3G, it is clear that many of the “new” applications will require the provision of new and powerful graphics/video technology within the mobile device itself. Within a computing device, high bandwidth and computational cost are associated with anything but the simplest of graphics, and as a result the graphics subsystem is generally one of the most critical elements of a system, requiring particular attention in the …


Non Deterministic Processing In Neural Networks : An Introduction To Multi-Threaded Neural Networks, Stephen Sheridan Nov 2015

Non Deterministic Processing In Neural Networks : An Introduction To Multi-Threaded Neural Networks, Stephen Sheridan

The ITB Journal

Since McCullough and Pitts first published their work on the Binary Decision Neuron much research has been accumulated in the area of neural networks. This work has for the most part centred on network topologies and learning algorithms. The neural networks that have found their way into devices such as handheld PC’s are the fruit of NN research that has spanned 57 years. There is a simplistic beauty in the way that artificial neural networks model the biological foundations of the human thought process, but one piece of the jigsaw puzzle is still missing. We have so far been unable …


Web Services Technology Infrastructure, Geraldine Gray, Kieran O’Connor Nov 2015

Web Services Technology Infrastructure, Geraldine Gray, Kieran O’Connor

The ITB Journal

Web Services using eXtensible Markup Language (XML) based standards are becoming the new archetype for enabling business to business collaborations. This paper describes the conceptual architecture and semantics of constructing and consuming Web Services. It describes how Web Services fit into the enterprise application environment. It discusses Web Services security. Finally, it outlines the flaws of Web Services in their current state.


An Xml Framework For The Structured Data Exchange Between Medical Devices, Ulrich Neuhaus, Paul Walsh Nov 2015

An Xml Framework For The Structured Data Exchange Between Medical Devices, Ulrich Neuhaus, Paul Walsh

The ITB Journal

This paper describes an XML framework for the exchange of data between medical devices and software systems. XML technologies offer an extensible data format, which is easy to both create and process and simplifies the exchange of data. Different XML standards are defined within the framework in order to provide a practical solution for both device manufacturers and software developers. The structure and benefits of XML documents are discussed and an XML framework for ophthalmology is described.


Longer Than A Telephone Wire - Voice Firewalls To Counter Ubiquitous Lie Detection, Carl Reynolds, Matt Smith, Mark Woodman Nov 2015

Longer Than A Telephone Wire - Voice Firewalls To Counter Ubiquitous Lie Detection, Carl Reynolds, Matt Smith, Mark Woodman

The ITB Journal

Mobile computing and communication devices are open to surreptitious privacy attacks using emotion detection techniques; largely utilising work carried out in the area of voice stress analysis (VSA). This paper extends some work in the area of removing emotion cues in the voice, specifically focusing on lie detection and presents the results of a pilot study indicating that the use of mobile phones in situations of stress is common and that awareness of VSA is low. Existing strategies for the removal or modification of emotion cues, based on models of synthesis are considered and weaknesses are identified.


A Java Framework For Computer Vision, Stephen Sheridan Nov 2015

A Java Framework For Computer Vision, Stephen Sheridan

The ITB Journal

This paper outlines a framework implemented entirely in Java that attempts to give students exposure to computer vision systems from a practical standpoint. Various tools and technologies are introduced that will allow a student to acquire an input image through a WebCam, extract useful information from that input image and finally, attempt to make sense of the input.


Globalcom, Declan Barber, Conor Gildea, Gavin Byrne Nov 2015

Globalcom, Declan Barber, Conor Gildea, Gavin Byrne

The ITB Journal

The objective of this developed application is to provide a company with a means of communicating with its employees no matter where they are physically located and what communication resources they may have at any particular time. The core focus of this application is to provide a Unified Messaging System using synchronous and asynchronous forms.


Identification Protocols In Cryptography, Michael O’Donnell Nov 2015

Identification Protocols In Cryptography, Michael O’Donnell

The ITB Journal

In this paper we examine the role of Identification Protocols in the field of Cryptography. Firstly, the rationale behind the need for Identification Protocols is discussed. Secondly, we examine, in detail, challenge-response protocols, based upon zero-knowledge proofs, that form a subset of Identification Protocols in general. Thirdly, the mathematical tools necessary for the understanding of how these protocols work is given. Finally, we discuss four main Identification Protocols: Fiat-Shamir, Feige-Fiat-Shamir, Schnorr and Guillou- Quisquater. This discussion includes the theory, practical examples and the security aspects of each protocol.


Internet Applications Development Issues And Strategic Considerations, Róisín Faherty Nov 2015

Internet Applications Development Issues And Strategic Considerations, Róisín Faherty

The ITB Journal

This paper examines the development issues and strategic considerations involved in Internet Applications Development. The prevalent development environments are discussed highlighting their advantages and disadvantages. Issues regarding the development of Internet applications are viewed under the headings of human resource, organizational, technological, investment and Legal Issues. Lastly the paper gives an overview of the strategic implications for an organization considering the development of Internet Applications. These include security, quality and the look & feel of the application. This paper is not intended as a definitive resource on the area of Internet Applications Development, its aim is to highlight the areas …


Mental Spaces: Processes For Establishing And Linking Spaces, Brian Nolan Nov 2015

Mental Spaces: Processes For Establishing And Linking Spaces, Brian Nolan

The ITB Journal

This paper reviews the theory of mental spaces as expounded by Fauconnier (1994). In this work he posits a theory in which reference has a structural dimension. Within the theory, this structure is represented using spaces, connectors across the spaces and some general principles that are found to apply. The complexity lies in the interaction between the principles and in the contextual structures that feed into the principles for interpretation. Brugman, in her 1996 paper, makes use of insights from mental spaces theory to conduct an analysis of HAVE-constructions. She notes that Fauconnier has “elaborated a theory of partial possible …


A Review Of Parallel Mappings For Feed Forward Neural Networks Using The Backpropagation Learning Algorithm, Stephen Sheridan Nov 2015

A Review Of Parallel Mappings For Feed Forward Neural Networks Using The Backpropagation Learning Algorithm, Stephen Sheridan

The ITB Journal

The Back-Propagation (BP) Neural Network (NN) is probably the most well known of all neural networks. Many mappings of the BP NN have been implemented for both special purpose and general-purpose computers. This mapping process can fall into one of two categories: heuristic mapping and algorithmic mapping. Heuristic mapping concentrates on the architecture and behaviour of the network as it trains whereas algorithmic mapping concentrates on the parallelization of the learning algorithm. Mappings in the heuristic category tend to take a trial and error approach based on the understanding of the network and of the target machine. In comparison mappings …


The Role Of Cryptography In Security For Electronic Commerce, Ann Murphy, David Murphy Nov 2015

The Role Of Cryptography In Security For Electronic Commerce, Ann Murphy, David Murphy

The ITB Journal

Many businesses and consumers are wary of conducting business over the Internet due to a perceived lack of security. Electronic business is subject to a variety of threats such as unauthorised access, misappropriation, alteration and destruction of both data and systems. This paper explores the major security concerns of businesses and users and describes the cryptographic techniques used to reduce such risks.


Xml For Business To Business Data Exchange, Geraldine Gray, David Kerwick Nov 2015

Xml For Business To Business Data Exchange, Geraldine Gray, David Kerwick

The ITB Journal

This paper examines to use of XML for business to business data exchange. Starting with creating an XML document from an existing data source and transmitting that document, we explain some of the supporting standards for XML which facilitate automated processing and transformation of an XML document. Finally we look at the advantages of using XML, and why it is expected to revolutionise electronic data interchange.