Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Selected Works

2011

Discipline
Institution
Keyword
Publication
File Type

Articles 61 - 85 of 85

Full-Text Articles in Computer Engineering

Sensorchestra: Collaborative Sensing For Symbolic Location Recognition, Heng-Tze Cheng, Feng-Tso Sun, Senaka Buthpitiya, Martin L. Griss Jan 2011

Sensorchestra: Collaborative Sensing For Symbolic Location Recognition, Heng-Tze Cheng, Feng-Tso Sun, Senaka Buthpitiya, Martin L. Griss

Martin L Griss

"Symbolic location of a user, like a store name in a mall, is essential for context-based mobile advertising. Existing fingerprint- based localization using only a single phone is susceptible to noise, and has a major limitation in that the phone has to be held in the hand at all times. In this paper, we present SensOrchestra, a col- laborative sensing framework for symbolic location recognition that groups nearby phones to recognize ambient sounds and images of a location collaboratively. We investigated audio and image features, and designed a classifier fusion model to integrate estimates from diff erent phones. We also …


Activity-Aware Mental Stress Detection Using Physiological Sensors, Feng-Tso Sun, Cynthia Kuo, Heng-Tze Cheng, Senaka Buthpitiya, Patricia Collins, Martin Griss Jan 2011

Activity-Aware Mental Stress Detection Using Physiological Sensors, Feng-Tso Sun, Cynthia Kuo, Heng-Tze Cheng, Senaka Buthpitiya, Patricia Collins, Martin Griss

Martin L Griss

"Continuous stress monitoring may help users better understand their stress patterns and provide physicians with more reliable data for interventions. Previously, studies on mental stress detection were limited to a laboratory environment where participants generally rested in a sedentary position. However, it is impractical to exclude the effects of physical activity while developing a pervasive stress monitoring application for everyday use. The physiological responses caused by mental stress can be masked by variations due to physical activity. We present an activity-aware mental stress detection scheme. Electrocardiogram (ECG), galvanic skin response (GSR), and accelerometer data were gathered from 20 participants across …


Omnisense: A Collaborative Sensing Framework For User Context Recognition Using Mobile Phones, Heng-Tze Cheng, Senaka Buthpitiya, Feng-Tso Sun, Martin L. Griss Jan 2011

Omnisense: A Collaborative Sensing Framework For User Context Recognition Using Mobile Phones, Heng-Tze Cheng, Senaka Buthpitiya, Feng-Tso Sun, Martin L. Griss

Martin L Griss

Context information, including a user’s locations and activities, is indispensable for context-aware applications such as targeted advertising and disaster response. Inferring user context from sensor data is intrinsically challenging due to the semantic gap between low-level signals and high-level human activities. When implemented on mobile phones, more challenges on resource limitations are present. While most existing work focuses on context recognition using a single mobile phone, collaboration among multiple phones has received little attention, and the recognition accuracy is susceptible to phone position and ambient changes. Simply putting a phone in one’s pocket can render the microphone muffled and the …


Strategic Assessment Of Information Security Maturity, Arcot Desai Narasimhalu, Dayasindhu Nagarajan, Raghavan Subramanian Jan 2011

Strategic Assessment Of Information Security Maturity, Arcot Desai Narasimhalu, Dayasindhu Nagarajan, Raghavan Subramanian

Arcot Desai NARASIMHALU

CXOs are becoming increasingly interested in the information security maturity of their enterprises. This paper presents a CXO dashboard that will allow better management of the information security resources in an enterprise.


Infosemm: Infosys It Security Maturity Model: A Report, Arcot Desai Narasimhalu, N. Dayasindhu, Raghavan Subramanian Jan 2011

Infosemm: Infosys It Security Maturity Model: A Report, Arcot Desai Narasimhalu, N. Dayasindhu, Raghavan Subramanian

Arcot Desai NARASIMHALU

Businesses are faced with a continuing battle related to cyber security related issues ranging from cyber attacks all the way to cyber (information) war. These issues affect result in information, system, reputation, and revenue related risks. These risks arise because of vulnerabilities introduced in three major parts of the enterprise – infrastructure, intelligence and practices. This report provides a rating system for representing the security health of enterprises.


Simulation Studies On Ecs Application In A Clean Power Distribution System, Dr. Adel A. Elbaset Jan 2011

Simulation Studies On Ecs Application In A Clean Power Distribution System, Dr. Adel A. Elbaset

Dr. Adel A. Elbaset

Dealing with power distribution system became one of the most important arts in the field of power system, especially in the rapid increase of the distributed generation (DG) penetration to the distribution level which is a vital and important part of the entire power system. In this paper, a very special power distribution system with a unique deployment of distributed generation, such as, photovoltaic and wind generation has been studied. Energy storage system is utilized to play the main role to control the system’s power quality and the system frequency, as load following operation (LFO) and automatic generation control (AGC), …


Room-Level Wi-Fi Location Tracking, Joshua Correa, Ed Katz, Patricia Collins, Martin Griss Jan 2011

Room-Level Wi-Fi Location Tracking, Joshua Correa, Ed Katz, Patricia Collins, Martin Griss

Martin L Griss

Context-aware applications for indoor intelligent environments require an appropriately accurate and stable interior positioning system to adapt services to the location of a mobile user or mobile device in a building. Different technologies provide a varying mix of resolution, accuracy, stability and challenges. In this paper we report on our experience using an existing Wi-Fi infrastructure without specialized hardware added to support location tracking. There are several approaches to track the location of Wi-Fi enabled devices within a building such as signal propagation models and signature matching. We found signature matching most effective in our environment. Signature matching is accomplished …


A Systemic Method For Measuring Quality Of Information On Weblog, Mohammad Javad Kargar Jan 2011

A Systemic Method For Measuring Quality Of Information On Weblog, Mohammad Javad Kargar

university of science & culture

The vast amount of information on the World Wide Web is created and published by many different types of providers. Unlike books and journals, most of this information is not subject to editing or peer review by experts. This lack of quality control and the explosion of web sites make the task of finding quality information on the web especially critical. Meanwhile new facilities for producing web pages such as Blogs make this issue more significant because Blogs have simple content management tools enabling non-experts to build easily updatable web diaries or online journals. On the other hand despite a …


Data Warehouse As A Backbone For Business Intelligence: Issues And Challenges, Mutaz M. Al-Debei Jan 2011

Data Warehouse As A Backbone For Business Intelligence: Issues And Challenges, Mutaz M. Al-Debei

Dr. Mutaz M. Al-Debei

The aim of this research is to identify and classify the main issues and challenges facing different business organizations when implementing Data Warehouse (DW) technologies. This is highly significant given the theoretical and practical implications and importance of such technologies. It is also important to highlight these challenges given the scarcity of research in this domain despite its value. To determine DW issues and challenges, a qualitative research methodology was followed. A semi-structured interview protocol was used with 17 DW project managers and seniors’ members. The gathered data were analyzed by utilizing a bottom-up content analysis technique where content is …


Nested Circles Boundary Algorithm For Rotated Texture Classification, Mutaz M. Al-Debei, Suzan Awienat, Rana Abu-Laila Jan 2011

Nested Circles Boundary Algorithm For Rotated Texture Classification, Mutaz M. Al-Debei, Suzan Awienat, Rana Abu-Laila

Dr. Mutaz M. Al-Debei

A new simple yet efficient classification algorithm named as Nested Circle Boundary (NCB) is proposed in this study. This algorithm provides features from measuring the average of the sum of boundary pixels for a number of nested circles inside the texture image. It was tested on different 91 rotated texture images for 13 texture classes using Brodatz texture database. The proposed algorithm achieves 100% accuracy when it comes to rotated texture classification. The methodology of NCB algorithm is based on two phases. Phase one mainly measures the features of the 13 texture classes and the original texture images. Then, the …


Business Model Requirements And Challenges In The Mobile Telecommunication Sector, Mutaz M. Al-Debei, David Avison Jan 2011

Business Model Requirements And Challenges In The Mobile Telecommunication Sector, Mutaz M. Al-Debei, David Avison

Dr. Mutaz M. Al-Debei

The telecommunications business is undergoing a critical revolution, driven by innovative technologies, globalization and deregulation. Cellular networks and telecommunications bring radical changes to the way telecom businesses are conducted. Globalization, on the other hand, is tearing down legacy barriers and forcing monopolistic national carriers to compete internationally. Moreover, the noticeable progress of many countries towards deregulation coupled with liberalization is significantly increasing telecom market power and allowing severe competition. The implications of this transition have changed the business rules of the telecom industry. In addition, entrants into the cellular industry have had severe difficulties due to inexistent or weak business …


A Semi-Automatic Ontology Extension Method For Semantic Web Services, Mutaz M. Al-Debei, Mohammad Mourhaf Al Asswad Jan 2011

A Semi-Automatic Ontology Extension Method For Semantic Web Services, Mutaz M. Al-Debei, Mohammad Mourhaf Al Asswad

Dr. Mutaz M. Al-Debei

this paper provides a novel semi-automatic ontology extension method for Semantic Web Services (SWS). This is significant since ontology extension methods those existing in literature mostly deal with semantic description of static Web resources such as text documents. Hence, there is a need for methods that can serve dynamic Web resources such as SWS. The developed method in this paper avoids redundancy and respects consistency so as to assure high quality of the resulting shared ontologies.


Particle Swarm Optimization For Simultaneous Tuning Of Static Var Compensator And Power System Stabilizer, Mahdiyeh Eslami, Hussain Shareef, Azah Mohamed, Mohammad Khajehzadeh Jan 2011

Particle Swarm Optimization For Simultaneous Tuning Of Static Var Compensator And Power System Stabilizer, Mahdiyeh Eslami, Hussain Shareef, Azah Mohamed, Mohammad Khajehzadeh

Dr. Mahdiyeh Eslami (مهدیه اسلامی)

No abstract provided.


Economic Design Of Foundation Using Harmony Search Algorithm, Mohammad Khajehzadeh, Mohd R. Taha, Ahmed El-Shafie, Mahdiyeh Eslami Jan 2011

Economic Design Of Foundation Using Harmony Search Algorithm, Mohammad Khajehzadeh, Mohd R. Taha, Ahmed El-Shafie, Mahdiyeh Eslami

Dr. Mahdiyeh Eslami (مهدیه اسلامی)

No abstract provided.


Adaptive Discrete-Time Controller Design With Neural Network For Hypersonic Flight Vehicle Via Back-Stepping, Bin Xu Jan 2011

Adaptive Discrete-Time Controller Design With Neural Network For Hypersonic Flight Vehicle Via Back-Stepping, Bin Xu

Bin Xu

In this article, the adaptive neural controller in discrete time is investigated for the longitudinal dynamics of a generic hypersonic flight vehicle. The dynamics are decomposed into the altitude subsystem and the velocity subsystem. The altitude subsystem is transformed into the strict-feedback form from which the discrete-time model is derived by the first-order Taylor expansion. The virtual control is designed with nominal feedback and neural network (NN) approximation via back-stepping. Meanwhile, one adaptive NN controller is designed for the velocity subsystem. To avoid the circular construction problem in the practical control, the design of coefficients adopts the upper bound instead …


Adaptive Neural Control Based On Hgo For Hypersonic Flight Vehicles, Bin Xu Jan 2011

Adaptive Neural Control Based On Hgo For Hypersonic Flight Vehicles, Bin Xu

Bin Xu

This paper describes the design of adaptive neural controller for the longitudinal dynamics of a generic hypersonic flight vehicle (HFV) which are decomposed into two functional systems, namely the altitude subsystem and the velocity subsystem. For each subsystem, one adaptive neural controller is investigated based on the normal output-feedback formulation. For the altitude subsystem, the high gain observer (HGO) is taken to estimate the unknown newly defined states. Only one neural network (NN) is employed to approximate the lumped uncertain system nonlinearity during the controller design which is considerably simpler than the ones based on back-stepping scheme with the strict-feedback …


Task Allocation For Multi-Spacecraft Cooperation Based On Estimation Of Distribution Algorithm, Bin Xu Jan 2011

Task Allocation For Multi-Spacecraft Cooperation Based On Estimation Of Distribution Algorithm, Bin Xu

Bin Xu

One two-stage task allocation strategy is proposed for multi-spacecraft cooperation during the long-range orbit transfer with two impulses. This paper focuses on the task value maximum and cost minimum optimization by assigning spacecraft to different task. At the first stage time and energy cost are considered based on the spacecraft dynamics. The optimization result is together with the target value as the factor for the task allocation model at the second stage. The optimization is processed separately in continuous and discrete time domain with estimation of distribution algorithm (EDA). Different task allocation mode is formulated and the strategy is verified …


Composite Control Based On Optimal Torque Control And Adaptive Kriging Control For The Crab Rover, Bin Xu Jan 2011

Composite Control Based On Optimal Torque Control And Adaptive Kriging Control For The Crab Rover, Bin Xu

Bin Xu

Terrainability is mostly dependant on the suspension mechanism and the control of a space rover. For the six wheeled CRAB rover, this paper presents the composite control design with torque control and adaptive Kriging control to improve the terrainability, somewhat related to minimizing heel slip. As CRAB is moving slowly, the torque control is processed by minimizing the variance of the required friction coefficient based on the static model. Adaptive Kriging control is used to track the commanded velocity. The system uncertainty is compensated by Kriging estimation based on the velocity dynamics. Experiment results with two different tires show the …


Adaptive Hypersonic Flight Control Via Back-Stepping And Kriging Estimation, Bin Xu Jan 2011

Adaptive Hypersonic Flight Control Via Back-Stepping And Kriging Estimation, Bin Xu

Bin Xu

This paper investigates the adaptive Kriging controller for the longitudinal dynamics of a generic hypersonic flight vehicle (HFV). For the altitude subsystem, the dynamics are transformed into the strict-feedback form where the backstepping scheme is employed. Considering the nonlinearity of the dynamics, the nominal feedback is included in the controller while Kriging system is designed to estimate the uncertainty. With the proposed controller, the almost surely bounded stability is guaranteed. The simulation study is presented to show the effectiveness of the proposed control approach.


Comparing Extreme Programming And Waterfall Project Results, Feng Ji, Todd Sedano Dec 2010

Comparing Extreme Programming And Waterfall Project Results, Feng Ji, Todd Sedano

Todd Sedano

Waterfall and Extreme Programming are two software project methods used for project management. Although there are a number of opinions comparing the two methods regarding how they should be applied, none have used project data to clearly conclude which one is better. In this paper, we present the results of a controlled empirical study conducted at Carnegie Mellon University in Silicon Valley to learn about the effective transition from traditional development to agile development. We conducted a comparison research against these two approaches. Multiple teams were assigned a project; some used Waterfall development, others used Extreme Programming. The purpose of …


Contextualized Mobile Support For Learning By Doing In The Real World, Ray Bareiss, Natalie Linnell, Martin Griss Dec 2010

Contextualized Mobile Support For Learning By Doing In The Real World, Ray Bareiss, Natalie Linnell, Martin Griss

Ray Bareiss

This research addresses the use of mobile devices with both embedded and external sensors to provide contextualized help, advice, and remediation to learners engaged in real-world learn-by-doing tasks. This work is situated within the context of learning a complex procedure, in particular emergency responders learning to conduct urban search and rescue operations. Research issues include the design and delivery of contextualized performance support and the inferring of learner actions and intentions from sensor data to ensure that the right support is delivered just in time, as it is relevant to what the learner is doing.


Link Scheduling In Multi-Transmit-Receive Wireless Networks, Hong-Ning Dai, Soung Chang Liew, Liqun Fu Dec 2010

Link Scheduling In Multi-Transmit-Receive Wireless Networks, Hong-Ning Dai, Soung Chang Liew, Liqun Fu

Hong-Ning Dai

This paper investigates the problem of link scheduling to meet traffic demands with minimum airtime in a multitransmit-receive (MTR) wireless network. MTR networks are a new class of networks, in which each node can simultaneously transmit to a number of other nodes, or simultaneously receive from a number of other nodes. The MTR capability can be enabled by the use of multiple directional antennas or multiple channels. Potentially, MTR can boost the network capacity significantly. However, link scheduling that makes full use of the MTR capability must be in place before this can happen. We show that optimal link scheduling …


Exploring Security Improvement Of Wireless Networks With Directional Antennas, Hong-Ning Dai, Dong Li, Raymond Chi-Wing Wong Dec 2010

Exploring Security Improvement Of Wireless Networks With Directional Antennas, Hong-Ning Dai, Dong Li, Raymond Chi-Wing Wong

Hong-Ning Dai

There are a number of studies on using directional antennas in wireless networks. Many of them concentrate on analyzing the theoretical capacity improvement by using directional antennas. Other studies focus on designing proper Medium Access Control (MAC) protocols to improve the practical network throughput. There are few works on the security improvement using directional antennas. In this paper, we explore the benefits of directional antennas in security improvements on both singlehop and multi-hop wireless networks. In particular, we found that using directional antennas in wireless networks can significantly reduce the eavesdropping probabilities of both single-hop transmissions as well as multi-hop …


Challenges Associated With Ict Asset Disposal In Tanzania, Faith J. Shimba, Daniel Koloseni Dec 2010

Challenges Associated With Ict Asset Disposal In Tanzania, Faith J. Shimba, Daniel Koloseni

Faith Joel Shimba

Government and non–Government institutions are heavily investing in Information and Communication Technologies (ICT) to enhance their businesses and operational activities. This trend has partially been inspired by the lift of computer ban in 1980s where millions of ICT assets had been imported. Subsequently, there is a rapid increase of Internet Service Providers (ISPs), Mobile Service Providers (MSP), and ICT asset vendors’ country-wide. This implies a massive increase in imported ICT assets as well as the number of ICT assets that are going out of the ICT asset life cycle. In order to study challenges facing Tanzania in disposing end of …


Computing Without Borders? Adapting An Irish Programme For The Tanzanian Ict Market, Faraja Igira, Herman Mandari, Bosi Masamila, Salehe Mwachaka, Zanifa Omar, Jafari Said, Faith J. Shimba, Rose Tinabo, June Barret, Damian Gordon, Paul Kelly, Fredick Mtenzi, Oliver O'Connor, Patricia O'Byrne, Ciaran O'Leary Dec 2010

Computing Without Borders? Adapting An Irish Programme For The Tanzanian Ict Market, Faraja Igira, Herman Mandari, Bosi Masamila, Salehe Mwachaka, Zanifa Omar, Jafari Said, Faith J. Shimba, Rose Tinabo, June Barret, Damian Gordon, Paul Kelly, Fredick Mtenzi, Oliver O'Connor, Patricia O'Byrne, Ciaran O'Leary

Faith Joel Shimba

A Tanzanian higher education institution (Institute of Finance Management) and an Irish higher education institutio (Dublin Institute of Technology) have worked in partnership to develop the final stage of a Computer Science programme to meet the specific needs of the Tanzanian Information and Communication Technology (ICT) sector. The designed stage sits above three stages of a programme designed for the Irish ICT sector which was transplanted to the Tanzanian context. The final stage is crucial as it represents the final bridge between the employment market and the programme, which is informed by the best practice, needs and requirements of both …