Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Computer Engineering

Round Trip Time Measurement Over Microgrid Power Network, Yasin Emir Kutlu, Ruairí De Fréin, Malabika Basu, Ali Malik Jun 2023

Round Trip Time Measurement Over Microgrid Power Network, Yasin Emir Kutlu, Ruairí De Fréin, Malabika Basu, Ali Malik

Conference papers

A focus of the Power Systems and Networking communities is the design and deployment of Microgrid (MG) integration systems that ensure that quality of service targets are met for load sharing systems at different endpoints. This paper presents an integrated Microgrid testbed that allows Microgrids endpoints to share their current, voltage and power values using a Network Published Shared Variable (NPSV) approach. We present Round Trip Time (RTT) measurements for time sensitive Microgrid control traffic in the presence of varying background traffic as an example quality of service measurement. Numerical results are presented using a range of different background traffic …


Energy-Aware Ai-Driven Framework For Edge-Computing-Based Iot Applications, Muhammad Zawish, Nouman Ashraf, Rafay Iqbal Ansari, Steven Davy Jan 2023

Energy-Aware Ai-Driven Framework For Edge-Computing-Based Iot Applications, Muhammad Zawish, Nouman Ashraf, Rafay Iqbal Ansari, Steven Davy

Conference papers

The significant growth in the number of Internet of Things (IoT) devices has given impetus to the idea of edge computing for several applications. In addition, energy harvestable or wireless-powered wearable devices are envisioned to empower the edge intelligence in IoT applications. However, the intermittent energy supply and network connectivity of such devices in scenarios including remote areas and hard-to-reach regions such as in-body applications can limit the performance of edge computing-based IoT applications. Hence, deploying state-of-the-art convolutional neural networks (CNNs) on such energy-constrained devices is not feasible due to their computational cost. Existing model compression methods, such as network …


Optimising Electric Vehicle Charging Infrastructure In Dublin Using Geecharge, Alexander Mutua Mutiso, Ruairí De Fréin, Ali Malik, Eliel Kibanza, Marco Sahbane, Maxime Pantel Jan 2023

Optimising Electric Vehicle Charging Infrastructure In Dublin Using Geecharge, Alexander Mutua Mutiso, Ruairí De Fréin, Ali Malik, Eliel Kibanza, Marco Sahbane, Maxime Pantel

Conference papers

Range anxiety poses a hurdle to the adoption of Electric Vehicles (EVs), as drivers worry about running out of charge without timely access to a Charging Point (CP). We present novel methods for optimising the distribution of CPs, namely, EV portacharge and GEECharge. These solutions distribute CPs in Dublin, in this paper, by considering the population density and Points Of Interest (POIs) or road traffic. The object of this paper is to (1) develop and evaluate methods to distribute CPs in Dublin city; (2) optimise CP allocation; (3) visualise paths in the graph network to show the most used roads …


Distance-Based Cluster Head Election For Mobile Sensing, Ruairí De Fréin, Liam O'Farrell Dec 2018

Distance-Based Cluster Head Election For Mobile Sensing, Ruairí De Fréin, Liam O'Farrell

Conference papers

Energy-efficient, fair, stochastic leader-selection algorithms are designed for mobile sensing scenarios which adapt the sensing strategy depending on the mobile sensing topology. Methods for electing a cluster head are crucially important when optimizing the trade-off between the number of peer-to- peer interactions between mobiles and client-server interactions with a cloud-hosted application server. The battery-life of mobile devices is a crucial constraint facing application developers who are looking to use the convergence of mobile computing and cloud computing to perform environmental sensing. We exploit the mobile network topology, specifically the location of mobiles with respect to the gateway device, to stochastically …


Chaos-Based Cryptography For Cloud Computing, Paul Tobin, Lee Tobin, Michael Mckeever, Jonathan Blackledge Jun 2017

Chaos-Based Cryptography For Cloud Computing, Paul Tobin, Lee Tobin, Michael Mckeever, Jonathan Blackledge

Conference papers

Cloud computing and poor security issues have quadrupled over the last six years and with the alleged presence of backdoors in common encryption ciphers, has created a need for personalising the encryption process by the client. In 2007, two Microsoft employees gave a presentation ``On the Possibility of a backdoor in the NIST SP800-90 Dual Elliptic Curve Pseudo Random Number Generators'' and was linked in 2013 by the New York Times with notes leaked by Edward Snowden. This confirmed backdoors were placed, allegedly, in a number of encryption systems by the National Security Agency, which if true creates an urgent …


On The Development Of A One-Time Pad Generator For Personalising Cloud Security, Paul Tobin, Lee Tobin, Michael Mckeever, Jonathan Blackledge Feb 2017

On The Development Of A One-Time Pad Generator For Personalising Cloud Security, Paul Tobin, Lee Tobin, Michael Mckeever, Jonathan Blackledge

Conference papers

Cloud computing security issues are being reported in newspapers, television, and on the Internet, on a daily basis. Furthermore, in 2013, Edward Snowden alleged backdoors were placed in a number of encryption systems by the National Security Agency causing confidence in public encryption to drop even further. Our solution allows the end-user to add a layer of unbreakable security by encrypting the data locally with a random number generator prior to uploading data to the Cloud. The prototype one-time pad generator is impervious to cryptanalysis because it generates unbreakable random binary sequences from chaos sources initiated from a natural noise. …


Bitrate Classification Of Twice-Encoded Audio Using Objective Quality Features, Colm Sloan, Damien Kelly, Naomi Harte, Anil C. Kokaram, Andrew Hines Jun 2016

Bitrate Classification Of Twice-Encoded Audio Using Objective Quality Features, Colm Sloan, Damien Kelly, Naomi Harte, Anil C. Kokaram, Andrew Hines

Conference papers

When a user uploads audio files to a music stream- ing service, these files are subsequently re-encoded to lower bitrates to target different devices, e.g. low bitrate for mobile. To save time and bandwidth uploading files, some users encode their original files using a lossy codec. The metadata for these files cannot always be trusted as users might have encoded their files more than once. Determining the lowest bitrate of the files allows the streaming service to skip the process of encoding the files to bitrates higher than that of the uploaded files, saving on processing and storage space. This …


Optimisation Of Multicast Routing In Wireless Mesh Networks, Brian Keegan, Karol Kowalik, Mark Davis Oct 2008

Optimisation Of Multicast Routing In Wireless Mesh Networks, Brian Keegan, Karol Kowalik, Mark Davis

Conference papers

In recent years Wireless Mesh Networks have been deployed and grown in popularity in many metropolitan areas. The deployment of such networks has allowed clients to gain access to publicly available broadband networks. The implementation of wireless mesh networks requires that backhaul services (traditionally carried by wired networks) be maintained via wireless mesh points. Because of their structure, wireless mesh networks provide an excellent means for targeting a large group of end users or simply to relay data. This may be achieved by means of broadcasting or more specifically multicasting. The lack of standards and support for multicasting over wireless …