Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Electrical and Computer Engineering (39)
- Computer and Systems Architecture (33)
- Digital Communications and Networking (26)
- Other Computer Engineering (24)
- Physical Sciences and Mathematics (22)
-
- Data Storage Systems (18)
- Robotics (18)
- Computer Sciences (16)
- Other Electrical and Computer Engineering (16)
- Systems and Communications (15)
- Hardware Systems (14)
- Mechanical Engineering (14)
- Computational Engineering (13)
- VLSI and Circuits, Embedded and Hardware Systems (12)
- Social and Behavioral Sciences (11)
- Library and Information Science (10)
- Operations Research, Systems Engineering and Industrial Engineering (10)
- Business (9)
- Digital Circuits (9)
- Engineering Science and Materials (9)
- Management Information Systems (9)
- E-Commerce (7)
- Management Sciences and Quantitative Methods (7)
- Life Sciences (6)
- Aerospace Engineering (5)
- Controls and Control Theory (5)
- Dynamics and Dynamical Systems (5)
- Electrical and Electronics (5)
- Institution
- Keyword
-
- Ubiquitous Computing (8)
- Context-Aware (6)
- Mobility (5)
- Technology (5)
- Localization (4)
-
- Arrangement detection (3)
- Computer science (3)
- Disaster Management (3)
- Networked devices (3)
- Social media (3)
- Software Metrics (3)
- Stability of Feature Selection (3)
- Student Posters (3)
- Aerial Networks (2)
- Anti-virus (2)
- Anti-virus design (2)
- Anti-virus software (2)
- Computer Anti-Virus (2)
- Computer security (2)
- Computer virus (2)
- Computer vulnerability (2)
- Crop circle (2)
- Crowd sourcing (2)
- Data (2)
- Emergency response (2)
- Enterprise and Investment Development (2)
- Hardware Design (2)
- ICT Asset Management (2)
- Information Security (2)
- Inoculation (2)
- Publication
-
- Martin L Griss (9)
- Zheng Sun (6)
- Bin Xu (5)
- Christopher N. Roman (5)
- Dr. Mutaz M. Al-Debei (4)
-
- Gregory Keith Bartley Jr. (4)
- Ray Bareiss (4)
- Aveek Purohit (3)
- Carol A. Watson (3)
- Dr Deogratias Harorimana (3)
- Dr. Huanjing Wang (3)
- Faith Joel Shimba (3)
- George K. Thiruvathukal (3)
- Heather M Brotherton (3)
- Patrick Tague (3)
- Arcot Desai NARASIMHALU (2)
- Dr. Adel A. Elbaset (2)
- Dr. Mahdiyeh Eslami (مهدیه اسلامی) (2)
- Hong-Ning Dai (2)
- Professor Jennifer Seberry (2)
- Umakant Mishra (2)
- Wayne W. Wakeland (2)
- Cheryl B. Truesdell (1)
- Christine L. Borgman (1)
- Douglas Huber (1)
- James Howard (1)
- Lynn Andrea Stein (1)
- Paul H Miller (1)
- Philadelphia University, Jordan (1)
- Reihaneh Safavi-Naini (1)
Articles 61 - 85 of 85
Full-Text Articles in Computer Engineering
Sensorchestra: Collaborative Sensing For Symbolic Location Recognition, Heng-Tze Cheng, Feng-Tso Sun, Senaka Buthpitiya, Martin L. Griss
Sensorchestra: Collaborative Sensing For Symbolic Location Recognition, Heng-Tze Cheng, Feng-Tso Sun, Senaka Buthpitiya, Martin L. Griss
Martin L Griss
"Symbolic location of a user, like a store name in a mall, is essential for context-based mobile advertising. Existing fingerprint- based localization using only a single phone is susceptible to noise, and has a major limitation in that the phone has to be held in the hand at all times. In this paper, we present SensOrchestra, a col- laborative sensing framework for symbolic location recognition that groups nearby phones to recognize ambient sounds and images of a location collaboratively. We investigated audio and image features, and designed a classifier fusion model to integrate estimates from diff erent phones. We also …
Activity-Aware Mental Stress Detection Using Physiological Sensors, Feng-Tso Sun, Cynthia Kuo, Heng-Tze Cheng, Senaka Buthpitiya, Patricia Collins, Martin Griss
Activity-Aware Mental Stress Detection Using Physiological Sensors, Feng-Tso Sun, Cynthia Kuo, Heng-Tze Cheng, Senaka Buthpitiya, Patricia Collins, Martin Griss
Martin L Griss
"Continuous stress monitoring may help users better understand their stress patterns and provide physicians with more reliable data for interventions. Previously, studies on mental stress detection were limited to a laboratory environment where participants generally rested in a sedentary position. However, it is impractical to exclude the effects of physical activity while developing a pervasive stress monitoring application for everyday use. The physiological responses caused by mental stress can be masked by variations due to physical activity. We present an activity-aware mental stress detection scheme. Electrocardiogram (ECG), galvanic skin response (GSR), and accelerometer data were gathered from 20 participants across …
Omnisense: A Collaborative Sensing Framework For User Context Recognition Using Mobile Phones, Heng-Tze Cheng, Senaka Buthpitiya, Feng-Tso Sun, Martin L. Griss
Omnisense: A Collaborative Sensing Framework For User Context Recognition Using Mobile Phones, Heng-Tze Cheng, Senaka Buthpitiya, Feng-Tso Sun, Martin L. Griss
Martin L Griss
Context information, including a user’s locations and activities, is indispensable for context-aware applications such as targeted advertising and disaster response. Inferring user context from sensor data is intrinsically challenging due to the semantic gap between low-level signals and high-level human activities. When implemented on mobile phones, more challenges on resource limitations are present. While most existing work focuses on context recognition using a single mobile phone, collaboration among multiple phones has received little attention, and the recognition accuracy is susceptible to phone position and ambient changes. Simply putting a phone in one’s pocket can render the microphone muffled and the …
Strategic Assessment Of Information Security Maturity, Arcot Desai Narasimhalu, Dayasindhu Nagarajan, Raghavan Subramanian
Strategic Assessment Of Information Security Maturity, Arcot Desai Narasimhalu, Dayasindhu Nagarajan, Raghavan Subramanian
Arcot Desai NARASIMHALU
CXOs are becoming increasingly interested in the information security maturity of their enterprises. This paper presents a CXO dashboard that will allow better management of the information security resources in an enterprise.
Infosemm: Infosys It Security Maturity Model: A Report, Arcot Desai Narasimhalu, N. Dayasindhu, Raghavan Subramanian
Infosemm: Infosys It Security Maturity Model: A Report, Arcot Desai Narasimhalu, N. Dayasindhu, Raghavan Subramanian
Arcot Desai NARASIMHALU
Businesses are faced with a continuing battle related to cyber security related issues ranging from cyber attacks all the way to cyber (information) war. These issues affect result in information, system, reputation, and revenue related risks. These risks arise because of vulnerabilities introduced in three major parts of the enterprise – infrastructure, intelligence and practices. This report provides a rating system for representing the security health of enterprises.
Simulation Studies On Ecs Application In A Clean Power Distribution System, Dr. Adel A. Elbaset
Simulation Studies On Ecs Application In A Clean Power Distribution System, Dr. Adel A. Elbaset
Dr. Adel A. Elbaset
Dealing with power distribution system became one of the most important arts in the field of power system, especially in the rapid increase of the distributed generation (DG) penetration to the distribution level which is a vital and important part of the entire power system. In this paper, a very special power distribution system with a unique deployment of distributed generation, such as, photovoltaic and wind generation has been studied. Energy storage system is utilized to play the main role to control the system’s power quality and the system frequency, as load following operation (LFO) and automatic generation control (AGC), …
Room-Level Wi-Fi Location Tracking, Joshua Correa, Ed Katz, Patricia Collins, Martin Griss
Room-Level Wi-Fi Location Tracking, Joshua Correa, Ed Katz, Patricia Collins, Martin Griss
Martin L Griss
Context-aware applications for indoor intelligent environments require an appropriately accurate and stable interior positioning system to adapt services to the location of a mobile user or mobile device in a building. Different technologies provide a varying mix of resolution, accuracy, stability and challenges. In this paper we report on our experience using an existing Wi-Fi infrastructure without specialized hardware added to support location tracking. There are several approaches to track the location of Wi-Fi enabled devices within a building such as signal propagation models and signature matching. We found signature matching most effective in our environment. Signature matching is accomplished …
A Systemic Method For Measuring Quality Of Information On Weblog, Mohammad Javad Kargar
A Systemic Method For Measuring Quality Of Information On Weblog, Mohammad Javad Kargar
university of science & culture
The vast amount of information on the World Wide Web is created and published by many different types of providers. Unlike books and journals, most of this information is not subject to editing or peer review by experts. This lack of quality control and the explosion of web sites make the task of finding quality information on the web especially critical. Meanwhile new facilities for producing web pages such as Blogs make this issue more significant because Blogs have simple content management tools enabling non-experts to build easily updatable web diaries or online journals. On the other hand despite a …
Data Warehouse As A Backbone For Business Intelligence: Issues And Challenges, Mutaz M. Al-Debei
Data Warehouse As A Backbone For Business Intelligence: Issues And Challenges, Mutaz M. Al-Debei
Dr. Mutaz M. Al-Debei
The aim of this research is to identify and classify the main issues and challenges facing different business organizations when implementing Data Warehouse (DW) technologies. This is highly significant given the theoretical and practical implications and importance of such technologies. It is also important to highlight these challenges given the scarcity of research in this domain despite its value. To determine DW issues and challenges, a qualitative research methodology was followed. A semi-structured interview protocol was used with 17 DW project managers and seniors’ members. The gathered data were analyzed by utilizing a bottom-up content analysis technique where content is …
Nested Circles Boundary Algorithm For Rotated Texture Classification, Mutaz M. Al-Debei, Suzan Awienat, Rana Abu-Laila
Nested Circles Boundary Algorithm For Rotated Texture Classification, Mutaz M. Al-Debei, Suzan Awienat, Rana Abu-Laila
Dr. Mutaz M. Al-Debei
A new simple yet efficient classification algorithm named as Nested Circle Boundary (NCB) is proposed in this study. This algorithm provides features from measuring the average of the sum of boundary pixels for a number of nested circles inside the texture image. It was tested on different 91 rotated texture images for 13 texture classes using Brodatz texture database. The proposed algorithm achieves 100% accuracy when it comes to rotated texture classification. The methodology of NCB algorithm is based on two phases. Phase one mainly measures the features of the 13 texture classes and the original texture images. Then, the …
Business Model Requirements And Challenges In The Mobile Telecommunication Sector, Mutaz M. Al-Debei, David Avison
Business Model Requirements And Challenges In The Mobile Telecommunication Sector, Mutaz M. Al-Debei, David Avison
Dr. Mutaz M. Al-Debei
The telecommunications business is undergoing a critical revolution, driven by innovative technologies, globalization and deregulation. Cellular networks and telecommunications bring radical changes to the way telecom businesses are conducted. Globalization, on the other hand, is tearing down legacy barriers and forcing monopolistic national carriers to compete internationally. Moreover, the noticeable progress of many countries towards deregulation coupled with liberalization is significantly increasing telecom market power and allowing severe competition. The implications of this transition have changed the business rules of the telecom industry. In addition, entrants into the cellular industry have had severe difficulties due to inexistent or weak business …
A Semi-Automatic Ontology Extension Method For Semantic Web Services, Mutaz M. Al-Debei, Mohammad Mourhaf Al Asswad
A Semi-Automatic Ontology Extension Method For Semantic Web Services, Mutaz M. Al-Debei, Mohammad Mourhaf Al Asswad
Dr. Mutaz M. Al-Debei
this paper provides a novel semi-automatic ontology extension method for Semantic Web Services (SWS). This is significant since ontology extension methods those existing in literature mostly deal with semantic description of static Web resources such as text documents. Hence, there is a need for methods that can serve dynamic Web resources such as SWS. The developed method in this paper avoids redundancy and respects consistency so as to assure high quality of the resulting shared ontologies.
Particle Swarm Optimization For Simultaneous Tuning Of Static Var Compensator And Power System Stabilizer, Mahdiyeh Eslami, Hussain Shareef, Azah Mohamed, Mohammad Khajehzadeh
Particle Swarm Optimization For Simultaneous Tuning Of Static Var Compensator And Power System Stabilizer, Mahdiyeh Eslami, Hussain Shareef, Azah Mohamed, Mohammad Khajehzadeh
Dr. Mahdiyeh Eslami (مهدیه اسلامی)
No abstract provided.
Economic Design Of Foundation Using Harmony Search Algorithm, Mohammad Khajehzadeh, Mohd R. Taha, Ahmed El-Shafie, Mahdiyeh Eslami
Economic Design Of Foundation Using Harmony Search Algorithm, Mohammad Khajehzadeh, Mohd R. Taha, Ahmed El-Shafie, Mahdiyeh Eslami
Dr. Mahdiyeh Eslami (مهدیه اسلامی)
No abstract provided.
Adaptive Discrete-Time Controller Design With Neural Network For Hypersonic Flight Vehicle Via Back-Stepping, Bin Xu
Bin Xu
In this article, the adaptive neural controller in discrete time is investigated for the longitudinal dynamics of a generic hypersonic flight vehicle. The dynamics are decomposed into the altitude subsystem and the velocity subsystem. The altitude subsystem is transformed into the strict-feedback form from which the discrete-time model is derived by the first-order Taylor expansion. The virtual control is designed with nominal feedback and neural network (NN) approximation via back-stepping. Meanwhile, one adaptive NN controller is designed for the velocity subsystem. To avoid the circular construction problem in the practical control, the design of coefficients adopts the upper bound instead …
Adaptive Neural Control Based On Hgo For Hypersonic Flight Vehicles, Bin Xu
Adaptive Neural Control Based On Hgo For Hypersonic Flight Vehicles, Bin Xu
Bin Xu
This paper describes the design of adaptive neural controller for the longitudinal dynamics of a generic hypersonic flight vehicle (HFV) which are decomposed into two functional systems, namely the altitude subsystem and the velocity subsystem. For each subsystem, one adaptive neural controller is investigated based on the normal output-feedback formulation. For the altitude subsystem, the high gain observer (HGO) is taken to estimate the unknown newly defined states. Only one neural network (NN) is employed to approximate the lumped uncertain system nonlinearity during the controller design which is considerably simpler than the ones based on back-stepping scheme with the strict-feedback …
Task Allocation For Multi-Spacecraft Cooperation Based On Estimation Of Distribution Algorithm, Bin Xu
Task Allocation For Multi-Spacecraft Cooperation Based On Estimation Of Distribution Algorithm, Bin Xu
Bin Xu
One two-stage task allocation strategy is proposed for multi-spacecraft cooperation during the long-range orbit transfer with two impulses. This paper focuses on the task value maximum and cost minimum optimization by assigning spacecraft to different task. At the first stage time and energy cost are considered based on the spacecraft dynamics. The optimization result is together with the target value as the factor for the task allocation model at the second stage. The optimization is processed separately in continuous and discrete time domain with estimation of distribution algorithm (EDA). Different task allocation mode is formulated and the strategy is verified …
Composite Control Based On Optimal Torque Control And Adaptive Kriging Control For The Crab Rover, Bin Xu
Composite Control Based On Optimal Torque Control And Adaptive Kriging Control For The Crab Rover, Bin Xu
Bin Xu
Terrainability is mostly dependant on the suspension mechanism and the control of a space rover. For the six wheeled CRAB rover, this paper presents the composite control design with torque control and adaptive Kriging control to improve the terrainability, somewhat related to minimizing heel slip. As CRAB is moving slowly, the torque control is processed by minimizing the variance of the required friction coefficient based on the static model. Adaptive Kriging control is used to track the commanded velocity. The system uncertainty is compensated by Kriging estimation based on the velocity dynamics. Experiment results with two different tires show the …
Adaptive Hypersonic Flight Control Via Back-Stepping And Kriging Estimation, Bin Xu
Adaptive Hypersonic Flight Control Via Back-Stepping And Kriging Estimation, Bin Xu
Bin Xu
This paper investigates the adaptive Kriging controller for the longitudinal dynamics of a generic hypersonic flight vehicle (HFV). For the altitude subsystem, the dynamics are transformed into the strict-feedback form where the backstepping scheme is employed. Considering the nonlinearity of the dynamics, the nominal feedback is included in the controller while Kriging system is designed to estimate the uncertainty. With the proposed controller, the almost surely bounded stability is guaranteed. The simulation study is presented to show the effectiveness of the proposed control approach.
Comparing Extreme Programming And Waterfall Project Results, Feng Ji, Todd Sedano
Comparing Extreme Programming And Waterfall Project Results, Feng Ji, Todd Sedano
Todd Sedano
Waterfall and Extreme Programming are two software project methods used for project management. Although there are a number of opinions comparing the two methods regarding how they should be applied, none have used project data to clearly conclude which one is better. In this paper, we present the results of a controlled empirical study conducted at Carnegie Mellon University in Silicon Valley to learn about the effective transition from traditional development to agile development. We conducted a comparison research against these two approaches. Multiple teams were assigned a project; some used Waterfall development, others used Extreme Programming. The purpose of …
Contextualized Mobile Support For Learning By Doing In The Real World, Ray Bareiss, Natalie Linnell, Martin Griss
Contextualized Mobile Support For Learning By Doing In The Real World, Ray Bareiss, Natalie Linnell, Martin Griss
Ray Bareiss
This research addresses the use of mobile devices with both embedded and external sensors to provide contextualized help, advice, and remediation to learners engaged in real-world learn-by-doing tasks. This work is situated within the context of learning a complex procedure, in particular emergency responders learning to conduct urban search and rescue operations. Research issues include the design and delivery of contextualized performance support and the inferring of learner actions and intentions from sensor data to ensure that the right support is delivered just in time, as it is relevant to what the learner is doing.
Link Scheduling In Multi-Transmit-Receive Wireless Networks, Hong-Ning Dai, Soung Chang Liew, Liqun Fu
Link Scheduling In Multi-Transmit-Receive Wireless Networks, Hong-Ning Dai, Soung Chang Liew, Liqun Fu
Hong-Ning Dai
This paper investigates the problem of link scheduling to meet traffic demands with minimum airtime in a multitransmit-receive (MTR) wireless network. MTR networks are a new class of networks, in which each node can simultaneously transmit to a number of other nodes, or simultaneously receive from a number of other nodes. The MTR capability can be enabled by the use of multiple directional antennas or multiple channels. Potentially, MTR can boost the network capacity significantly. However, link scheduling that makes full use of the MTR capability must be in place before this can happen. We show that optimal link scheduling …
Exploring Security Improvement Of Wireless Networks With Directional Antennas, Hong-Ning Dai, Dong Li, Raymond Chi-Wing Wong
Exploring Security Improvement Of Wireless Networks With Directional Antennas, Hong-Ning Dai, Dong Li, Raymond Chi-Wing Wong
Hong-Ning Dai
There are a number of studies on using directional antennas in wireless networks. Many of them concentrate on analyzing the theoretical capacity improvement by using directional antennas. Other studies focus on designing proper Medium Access Control (MAC) protocols to improve the practical network throughput. There are few works on the security improvement using directional antennas. In this paper, we explore the benefits of directional antennas in security improvements on both singlehop and multi-hop wireless networks. In particular, we found that using directional antennas in wireless networks can significantly reduce the eavesdropping probabilities of both single-hop transmissions as well as multi-hop …
Challenges Associated With Ict Asset Disposal In Tanzania, Faith J. Shimba, Daniel Koloseni
Challenges Associated With Ict Asset Disposal In Tanzania, Faith J. Shimba, Daniel Koloseni
Faith Joel Shimba
Government and non–Government institutions are heavily investing in Information and Communication Technologies (ICT) to enhance their businesses and operational activities. This trend has partially been inspired by the lift of computer ban in 1980s where millions of ICT assets had been imported. Subsequently, there is a rapid increase of Internet Service Providers (ISPs), Mobile Service Providers (MSP), and ICT asset vendors’ country-wide. This implies a massive increase in imported ICT assets as well as the number of ICT assets that are going out of the ICT asset life cycle. In order to study challenges facing Tanzania in disposing end of …
Computing Without Borders? Adapting An Irish Programme For The Tanzanian Ict Market, Faraja Igira, Herman Mandari, Bosi Masamila, Salehe Mwachaka, Zanifa Omar, Jafari Said, Faith J. Shimba, Rose Tinabo, June Barret, Damian Gordon, Paul Kelly, Fredick Mtenzi, Oliver O'Connor, Patricia O'Byrne, Ciaran O'Leary
Computing Without Borders? Adapting An Irish Programme For The Tanzanian Ict Market, Faraja Igira, Herman Mandari, Bosi Masamila, Salehe Mwachaka, Zanifa Omar, Jafari Said, Faith J. Shimba, Rose Tinabo, June Barret, Damian Gordon, Paul Kelly, Fredick Mtenzi, Oliver O'Connor, Patricia O'Byrne, Ciaran O'Leary
Faith Joel Shimba
A Tanzanian higher education institution (Institute of Finance Management) and an Irish higher education institutio (Dublin Institute of Technology) have worked in partnership to develop the final stage of a Computer Science programme to meet the specific needs of the Tanzanian Information and Communication Technology (ICT) sector. The designed stage sits above three stages of a programme designed for the Irish ICT sector which was transplanted to the Tanzanian context. The final stage is crucial as it represents the final bridge between the employment market and the programme, which is informed by the best practice, needs and requirements of both …