Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Electrical and Computer Engineering (395)
- Physical Sciences and Mathematics (348)
- Computer Sciences (322)
- Data Storage Systems (312)
- Civil and Environmental Engineering (297)
-
- Civil Engineering (295)
- Environmental Engineering (270)
- Other Civil and Environmental Engineering (270)
- Hydraulic Engineering (213)
- Computer and Systems Architecture (82)
- Robotics (76)
- Social and Behavioral Sciences (75)
- Digital Communications and Networking (67)
- Information Security (59)
- Other Computer Engineering (59)
- Electrical and Electronics (53)
- Mechanical Engineering (51)
- Legal Studies (49)
- Forensic Science and Technology (48)
- Law (46)
- Computer Law (42)
- Materials Science and Engineering (28)
- Systems and Communications (28)
- Chemical Engineering (26)
- Ocean Engineering (26)
- Metallurgy (25)
- Structural Engineering (25)
- Hardware Systems (24)
- Institution
-
- Brigham Young University (270)
- TÜBİTAK (121)
- University of Nebraska - Lincoln (84)
- Selected Works (78)
- California Polytechnic State University, San Luis Obispo (55)
-
- Embry-Riddle Aeronautical University (42)
- Purdue University (39)
- University of Texas at El Paso (31)
- Singapore Management University (28)
- Marquette University (25)
- Universitas Indonesia (25)
- SelectedWorks (17)
- University of South Carolina (17)
- Old Dominion University (15)
- Technological University Dublin (15)
- Edith Cowan University (14)
- Santa Clara University (14)
- University of Louisville (14)
- University of Dayton (13)
- Western University (13)
- University of South Florida (11)
- University of Tennessee, Knoxville (11)
- Washington University in St. Louis (11)
- University of Arkansas, Fayetteville (10)
- University of Nevada, Las Vegas (10)
- University of New Haven (10)
- Clemson University (9)
- Western Michigan University (9)
- Portland State University (8)
- University of Massachusetts Amherst (8)
- Keyword
-
- Digital forensics (19)
- Applied sciences (18)
- Cloud computing (14)
- Computer Science and Engineering (14)
- Robotics (13)
-
- Machine learning (12)
- Data mining (11)
- Classification (9)
- Department of Computer Science and Engineering (8)
- Security (8)
- Dependable Systems (7)
- Social media (7)
- Approximate matching (6)
- Computer Engineering (6)
- Computer vision (6)
- Engineering (6)
- Genetic algorithm (6)
- Medical Device Software and Systems (6)
- Modeling (6)
- Mrsh-v2 (6)
- Privacy (6)
- Software (6)
- UAV (6)
- Automation (5)
- Big data (5)
- Calibration (5)
- Control (5)
- Crowdsourcing (5)
- Digital evidence (5)
- GIS (5)
- Publication
-
- International Congress on Environmental Modelling and Software (270)
- Turkish Journal of Electrical Engineering and Computer Sciences (121)
- Department of Electrical and Computer Engineering: Faculty Publications (52)
- Journal of Digital Forensics, Security and Law (38)
- Research Collection School Of Computing and Information Systems (28)
-
- Departmental Technical Reports (CS) (27)
- Electrical and Computer Engineering Faculty Research and Publications (25)
- Makara Journal of Technology (25)
- Computer Engineering (24)
- Electronic Theses and Dissertations (22)
- Open Access Theses (20)
- Theses and Dissertations (19)
- Oleg Sokolsky (17)
- Master's Theses (16)
- Pradeep K Khosla (16)
- Masters Theses (15)
- Dissertations (13)
- Electrical and Computer Engineering Faculty Publications (13)
- Department of Computer Science and Engineering: Dissertations, Theses, and Student Research (12)
- Doctoral Dissertations (12)
- Australian Digital Forensics Conference (11)
- USF Tampa Graduate Theses and Dissertations (11)
- All Computer Science and Engineering Research (10)
- Computer Science and Engineering Senior Theses (10)
- Electrical & Computer Engineering and Computer Science Faculty Publications (10)
- Faculty Publications (9)
- Open Access Dissertations (9)
- UNLV Theses, Dissertations, Professional Papers, and Capstones (9)
- All Theses (8)
- Browse all Theses and Dissertations (8)
- Publication Type
Articles 1051 - 1080 of 1175
Full-Text Articles in Computer Engineering
Measuring And Modelling The Thermal Performance Of The Tamar Suspension Bridge Using A Wireless Sensor Network, Nicholas De Battista, James M. W. Brownjohn, Hwee-Pink Tan, Ki Young Koo
Measuring And Modelling The Thermal Performance Of The Tamar Suspension Bridge Using A Wireless Sensor Network, Nicholas De Battista, James M. W. Brownjohn, Hwee-Pink Tan, Ki Young Koo
Research Collection School Of Computing and Information Systems
A study on the thermal performance of the Tamar Suspension Bridge deck in Plymouth, UK, is presented in this paper. Ambient air, suspension cable, deck and truss temperatures were acquired using a wired sensor system. Deck extension data were acquired using a two-hop wireless sensor network. Empirical models relating the deck extension to various combinations of temperatures were derived and compared. The most accurate model, which used all the four temperature variables, predicted the deck extension with an accuracy of 99.4%. Time delays ranging from 10 to 66 min were identified between the daily cycles of the air temperature and …
Service And Communication Management In Cooperative Vehicular Networks, Olivia Brickley
Service And Communication Management In Cooperative Vehicular Networks, Olivia Brickley
Theses
The concept of Intelligent Transportation Systems (ITS) presents new R&D challenges for the transportation and ICT sectors and is currently receiving considerable interest from the research community. The primary objective of ITS is the creation of advanced road traffic systems for improved traffic safety, efficiency, and travelling comfort. Basic vehicle and roadside infrastructure collaboration allows for an increase in efficiency and safety and acts as the foundation for an extensive service set to achieve these ITS goals. Applications such as journey planning, automatic tolling and emergency warnings, among others, are envisaged in a system which can potentially reform modern transportation. …
An Efficient Similarity Digests Database Lookup -- A Logarithmic Divide And Conquer Approach, Frank Breitinger, Christian Rathgeb, Harald Baier
An Efficient Similarity Digests Database Lookup -- A Logarithmic Divide And Conquer Approach, Frank Breitinger, Christian Rathgeb, Harald Baier
Electrical & Computer Engineering and Computer Science Faculty Publications
Investigating seized devices within digital forensics represents a challenging task due to the increasing amount of data. Common procedures utilize automated file identification, which reduces the amount of data an investigator has to examine manually. In the past years the research field of approximate matching arises to detect similar data. However, if n denotes the number of similarity digests in a database, then the lookup for a single similarity digest is of complexity of O(n). This paper presents a concept to extend existing approximate matching algorithms, which reduces the lookup complexity from O(n) to O(log(n)). Our proposed approach is based …
Quantifying Relevance Of Mobile Digital Evidence As They Relate To Case Types: A Survey And A Guide For Best Practices, Shahzad Saleem, Ibrahim Baggili, Oliver Popov
Quantifying Relevance Of Mobile Digital Evidence As They Relate To Case Types: A Survey And A Guide For Best Practices, Shahzad Saleem, Ibrahim Baggili, Oliver Popov
Electrical & Computer Engineering and Computer Science Faculty Publications
In this work, a survey was conducted to help quantify the relevance of nineteen types of evidence (such as SMS) to seven types of digital investigations associated with mobile devices (MD) (such as child pornography). 97 % of the respondents agreed that every type of digital evidence has a different level of relevance to further or solve a particular investigation. From 55 serious participants, a data set of 5,772 responses regarding the relevance of nineteen types of digital evidence for all the seven types of digital investigations was obtained. The results showed that (i) SMS belongs to the most relevant …
Finding Evidence Of Wordlists Being Deployed Against Ssh Honeypots – Implications And Impacts, Priya Rabadia, Craig Valli
Finding Evidence Of Wordlists Being Deployed Against Ssh Honeypots – Implications And Impacts, Priya Rabadia, Craig Valli
Australian Digital Forensics Conference
This paper is an investigation focusing on activities detected by three SSH honeypots that utilise Kippo honeypot software. The honeypots were located on the same /24 IPv4 network and configured as identically as possible. The honeypots used the same base software and hardware configurations. The data from the honeypots were collected during the period 17th July 2012 and 26th November 2013, a total of 497 active day periods. The analysis in this paper focuses on the techniques used to attempt to gain access to these systems by attacking entities. Although all three honeypots are have the same configuration settings and …
Cloudpowercap: Integrating Power Budget And Resource Management Across A Virtualized Server Cluster, Yong Fu, Anne Holler, Chenyang Lu
Cloudpowercap: Integrating Power Budget And Resource Management Across A Virtualized Server Cluster, Yong Fu, Anne Holler, Chenyang Lu
All Computer Science and Engineering Research
In many datacenters, server racks are highly underutilized. Rack slots are left empty to keep the sum of the server nameplate maximum power below the power provisioned to the rack. And the servers that are placed in the rack cannot make full use of available rack power. The root cause of this rack underutilization is that the server nameplate power is often much higher than can be reached in practice. To address rack underutilization, server vendors are shipping support for per-host power caps, which provide a server-enforced limit on the amount of power that the server can draw. Using this …
Performance Modeling Of Virtualized Custom Logic Computations, Michael J. Hall, Roger D. Chamberlain
Performance Modeling Of Virtualized Custom Logic Computations, Michael J. Hall, Roger D. Chamberlain
All Computer Science and Engineering Research
Virtualization of custom logic computations (i.e., by sharing a fixed function across distinct data streams) provides a means of reusing hardware resources, particularly when resources are limited. This is common practice in traditional processors where more than one user can share processor resources. In this paper, we virtualize a custom logic block using C-slow techniques to support fine-grain context-switching. We then develop and present an analytic model for several performance measures (throughput, latency, input queue occupancy) for both fine-grained and coarse-grained context switching (to a secondary memory). Next, we calibrate the analytic performance model with empirical measurements. We then validate …
Inferring Memory Map Instructions, Paul T. Scheid, Ari J. Spilo, Ron K. Cytron
Inferring Memory Map Instructions, Paul T. Scheid, Ari J. Spilo, Ron K. Cytron
All Computer Science and Engineering Research
We describe the problem of inferring a set of memory map instructions from a reference trace, with the goal of minimizing the number of such instructions as well as the number of unreferenced but mapped storage locations. We prove the related decision problem NP-complete. We then present and compare the results of two heuristic approaches on some actual traces.
Development And Human Performance Evaluation Of Control Modes Of An Exo-Skeletal Assistive Robotic Arm (Esara), Umer Khalid
Development And Human Performance Evaluation Of Control Modes Of An Exo-Skeletal Assistive Robotic Arm (Esara), Umer Khalid
Wayne State University Dissertations
This research was conducted to assist with functional tasks for a targeted group of individuals with spinal cord injury (SCI); with C5 to C7 level of injury relating to upper extremity movement. The specific population was selected as the existing technology was either too expensive, too bulky or was unable to address their needs in regards to upper extremity mobility. In addition, no platforms allowed multimodal control options for customization or provided a methodology for this crucial evaluation. The motivation of this research was to provide a methodology for selecting the appropriate control of an assistive device based on the …
Communication Protocol Design Considerations For Highway Vehicle Platoons And Enhanced Networked Robustness By Stochastic Dithers, Lijian Xu
Wayne State University Dissertations
Highway platooning of vehicles has been identified as a promising framework in
developing intelligent transportation systems. By autonomous or semi-autonomous
vehicle control and inter-vehicle coordination, an appropriately managed platoon can
potentially offer enhanced safety, improved highway utility, increased fuel economy,
and reduced emission. This thesis is focused on quantitative characterization of impact
of communication information structures and contents on platoon safety. By
comparing different information structures which combine front sensors, rear sensors,
and wireless communication channels, and different information contents such
as distances, speeds, and drivers' actions, we reveal a number of intrinsic relationships
between vehicle coordination and communications in …
A New Approach Of Nonblind Watermarking Methods Based On Dwt And Svd Via Lu Decomposition, Onur Jane, Ersi̇n Elbaşi
A New Approach Of Nonblind Watermarking Methods Based On Dwt And Svd Via Lu Decomposition, Onur Jane, Ersi̇n Elbaşi
Turkish Journal of Electrical Engineering and Computer Sciences
Multimedia security has been the focal point of considerable research activity in the last decade, mainly because of its wide application area. Watermarking, in particular, is identified as a major technology to achieve copyright protection and multimedia security. Therefore, recent studies in the literature include some evident approaches for embedding data into a multimedia element. Because of its useful frequency component separation, the discrete wavelet transform (DWT) is commonly used in watermarking schemes. Moreover, singular value decomposition (SVD) and lower-and-upper (LU) decomposition have little effect on the perception of the watermark. Therefore, in this study, a combination of DWT and …
A Novel Hybrid Recurrent Wavelet Neural Network Control Of Permanent Magnet Synchronous Motor Drive For Electric Scooter, Chih Hong Lin
A Novel Hybrid Recurrent Wavelet Neural Network Control Of Permanent Magnet Synchronous Motor Drive For Electric Scooter, Chih Hong Lin
Turkish Journal of Electrical Engineering and Computer Sciences
Due to the electric scooter with nonlinear uncertainties, e.g., nonlinear friction force of the transmission belt, the linear controller was made to disable speed tracking control. In order to overcome this problem, a novel hybrid recurrent wavelet neural network (NHRWNN) control system is proposed to control for a permanent-magnet synchronous motor-driven electric scooter in this study. The NHRWNN control system consists of a supervised control, a recurrent wavelet neural network (RWNN), and a compensated control with adaptive law. According to the Lyapunov stability theorem and the gradient descent method, the on-line parameter training methodology of the RWNN can be derived …
Numerical Investigation Of Impact Of Relative Humidity On Droplet Accumulation And Film Cooling, Luz Irene Bugarin
Numerical Investigation Of Impact Of Relative Humidity On Droplet Accumulation And Film Cooling, Luz Irene Bugarin
Open Access Theses & Dissertations
During the summer, high inlet temperatures affect the power output of gas turbine systems. Evaporative coolers have gained popularity as an inlet cooling method for these systems. Wet compression has been one of the common evaporative cooling methods implemented to increase power output of gas turbine systems due to its simple installation and low cost. This process involves injection of water droplets into the continuous phase of compressor to reduce the temperature of the flow entering the compressor and in turn increase the power output of the whole gas turbine system. This study focused on a single stage rotor-stator compressor …
Semiactive Virtual Control Method For Robots With Regenerative Energy-Storing Joints, Hanz Richter, Daniel J. Simon, Antonie J. Van Den Bogert
Semiactive Virtual Control Method For Robots With Regenerative Energy-Storing Joints, Hanz Richter, Daniel J. Simon, Antonie J. Van Den Bogert
Mechanical Engineering Faculty Publications
A framework for modeling and control is introduced for robotic manipulators with a number of energetically self-contained semiactive joints. The control approach consists of three steps. First, a virtual control design is conducted by any suitable means, assuming a fully-actuated system. Then, virtual control inputs are matched by a parameter modulation law. Finally, the storage dynamics are shaped using design parameters. Storage dynamics coincide with the system's internal dynamics under exact virtual control matching. An internal energy balance equation and associated self-powered operation condition are given for the semiactive joints. This condition is a structural characteristic of the system and …
Building A Database Of Political Speech Does Culture Matter In Charisma Annotations?, Andrew Hines, Ailbhe Cullen, Naomi Harte
Building A Database Of Political Speech Does Culture Matter In Charisma Annotations?, Andrew Hines, Ailbhe Cullen, Naomi Harte
Conference papers
For both individual politicians and political parties the in- ternet has become a vital tool for self-promotion and the distribution of ideas. The rise of streaming has enabled po- litical debates and speeches to reach global audiences. In this paper, we explore the nature of charisma in political speech, with a view to automatic detection. To this end, we have collected a new database of political speech from YouTube and other on-line resources. Annotation is per- formed both by native listeners, and Amazon Mechanical Turk (AMT) workers. Detailed analysis shows that both la- bel sets are equally reliable. The results …
Robustness And Prediction Accuracy Of Machine Learning For Objective Visual Quality Assessment, Andrew Hines, Paul Kendrick, Adriaan Barri, Manish Narwaria, Judith A. Redi
Robustness And Prediction Accuracy Of Machine Learning For Objective Visual Quality Assessment, Andrew Hines, Paul Kendrick, Adriaan Barri, Manish Narwaria, Judith A. Redi
Conference papers
Machine Learning (ML) is a powerful tool to support the development of objective visual quality assessment metrics, serving as a substitute model for the perceptual mechanisms acting in visual quality appreciation. Nevertheless, the reliability of ML-based techniques within objective quality assessment metrics is often questioned. In this study, the robustness of ML in supporting objective quality assessment is investigated, specifically when the feature set adopted for prediction is suboptimal. A Principal Component Regression based algorithm and a Feed Forward Neural Network are compared when pooling the Structural Similarity Index (SSIM) features perturbed with noise. The neural network adapts better with …
Perceived Audio Quality For Streaming Stereo Music, Andrew Hines, Eoin Gillen, Naomi Harte, Damien Kelly, Jan Skoglund, Anil Kokaram
Perceived Audio Quality For Streaming Stereo Music, Andrew Hines, Eoin Gillen, Naomi Harte, Damien Kelly, Jan Skoglund, Anil Kokaram
Conference papers
Users of audio-visual streaming services expect an ever increasing quality of experience. Channel bandwidth remains a bottleneck commonly addressed with lossy compression schemes for both the video and audio streams. Anecdotal evidence suggests a strongly perceived link between bit rate and quality. This paper presents three audio quality listening experiments using the ITU MUSHRA methodology to assess a number of audio codecs typically used by streaming services. They were assessed for a range of bit rates using three presentation modes: consumer and studio qual- ity headphones and loudspeakers. Our results indicate that with consumer quality headphones, listeners were not differentiating …
Clarification Dialogues For Perception-Based Errors In Situated Human-Computer Dialogues, Niels Schütte, John D. Kelleher, Brian Mac Namee
Clarification Dialogues For Perception-Based Errors In Situated Human-Computer Dialogues, Niels Schütte, John D. Kelleher, Brian Mac Namee
Conference papers
We present an experiment about situated human-computer interaction. Participants interacted with a simulated robot system to complete a series of tasks in a situated environment. Errors were introduced into the robot's perception to produce misunderstandings. We recorded the interactions and attempt to identify strategies the participants used to solve the arising problems.
Streaming Computations With Precise Control, Peng Li, Kunal Agrawal, Jeremy Buhler, Roger Chamberlain
Streaming Computations With Precise Control, Peng Li, Kunal Agrawal, Jeremy Buhler, Roger Chamberlain
All Computer Science and Engineering Research
No abstract provided.
A Brief Overview Of The Nebula Future Internet Architecture, Tom Anderson, Ken Birman, Robert Broberg, Matthew Caesar, Douglas Comer, Chase Cotton, Michael J. Freedman, Andreas Haeberlen, Zachary G. Ives, Arvind Krishnamurthy, William Lehr, Boon Thau Loo, David Mazieres, Antonio Nicolosi, Jonathan M. Smith, Ion Stoica, Robbert Van Renesse, Michael Walfish, Hakim Weatherspoon, Christopher S. Yoo
A Brief Overview Of The Nebula Future Internet Architecture, Tom Anderson, Ken Birman, Robert Broberg, Matthew Caesar, Douglas Comer, Chase Cotton, Michael J. Freedman, Andreas Haeberlen, Zachary G. Ives, Arvind Krishnamurthy, William Lehr, Boon Thau Loo, David Mazieres, Antonio Nicolosi, Jonathan M. Smith, Ion Stoica, Robbert Van Renesse, Michael Walfish, Hakim Weatherspoon, Christopher S. Yoo
All Faculty Scholarship
NEBULA is a proposal for a Future Internet Architecture. It is based on the assumptions that: (1) cloud computing will comprise an increasing fraction of the application workload offered to an Internet, and (2) that access to cloud computing resources will demand new architectural features from a network. Features that we have identified include dependability, security, flexibility and extensibility, the entirety of which constitute resilience.
NEBULA provides resilient networking services using ultrareliable routers, an extensible control plane and use of multiple paths upon which arbitrary policies may be enforced. We report on a prototype system, Zodiac, that incorporates these latter …
Review Of Development Stages In The Conceptual Design Of An Electro Hydrostatic Actuator For Robotics, Velibor Karanović, Mitar Jocanović, Vukica Jovanović
Review Of Development Stages In The Conceptual Design Of An Electro Hydrostatic Actuator For Robotics, Velibor Karanović, Mitar Jocanović, Vukica Jovanović
Engineering Technology Faculty Publications
The design of modern robotic devices faces numerous requirements and limitations which are related to optimization and robustness. Consequently, these stringent requirements have caused improvements in many engineering areas and lead to development of new optimization methods which better handle new complex products designed for application in industrial robots. One of the newly developed methods used in industrial robotics is the concept of a self-contained power device, an Electro-Hydrostatic Actuator (EHA). EHA devices were designed with a central idea, to avoid the possible drawbacks which were present in other types of actuators that are currently used in robotic systems. This …
Implementing Mechatronics Design Methodology In Mechanical Engineering Technology Senior Design Projects At The Old Dominion University, Vukica M. Jovanovic, Jennifer G. Michaeli, Otilia Popescu, Moustafa R. Moustafa, Mileta Tomovic, Alok K. Verma, Cheng Y. Lin
Implementing Mechatronics Design Methodology In Mechanical Engineering Technology Senior Design Projects At The Old Dominion University, Vukica M. Jovanovic, Jennifer G. Michaeli, Otilia Popescu, Moustafa R. Moustafa, Mileta Tomovic, Alok K. Verma, Cheng Y. Lin
Engineering Technology Faculty Publications
In recent years, the nature of engineering design has changed due to advances in embedded system design and computer technologies. It is rare to engineer a purely mechanical design that does not incorporate electrical and electronic components. Mechanical engineers and mechanical engineering technologists must possess a multi-disciplinary knowledge with the understanding of both mechanical and electrical systems. For this purpose, undergraduate programs in engineering technology have added mechatronics courses to their curriculum. Mechatronics is a design process that is multi-disciplinary in nature and integrates principles of many engineering disciplines including, but not limited to, mechanical engineering, electrical engineering, and controls …
Effective Resource And Workload Management In Data Centers, Lei Lu
Effective Resource And Workload Management In Data Centers, Lei Lu
Dissertations, Theses, and Masters Projects
The increasing demand for storage, computation, and business continuity has driven the growth of data centers. Managing data centers efficiently is a difficult task because of the wide variety of datacenter applications, their ever-changing intensities, and the fact that application performance targets may differ widely. Server virtualization has been a game-changing technology for IT, providing the possibility to support multiple virtual machines (VMs) simultaneously. This dissertation focuses on how virtualization technologies can be utilized to develop new tools for maintaining high resource utilization, for achieving high application performance, and for reducing the cost of data center management.;For multi-tiered applications, bursty …
A Proof-Theoretic Semantic Analysis Of Dynamic Epistemic Logic, Sabine Frittella, Giuseppe Greco, Alexander Kurz, Alessandra Palmigiano, Vlasta Sikimić
A Proof-Theoretic Semantic Analysis Of Dynamic Epistemic Logic, Sabine Frittella, Giuseppe Greco, Alexander Kurz, Alessandra Palmigiano, Vlasta Sikimić
Engineering Faculty Articles and Research
The present paper provides an analysis of the existing proof systems for dynamic epistemic logic from the viewpoint of proof-theoretic semantics. Dynamic epistemic logic is one of the best known members of a family of logical systems which have been successfully applied to diverse scientific disciplines, but the proof theoretic treatment of which presents many difficulties. After an illustration of the proof-theoretic semantic principles most relevant to the treatment of logical connectives, we turn to illustrating the main features of display calculi, a proof-theoretic paradigm which has been successfully employed to give a proof-theoretic semantic account of modal and substructural …
Use Of Pattern Classification Algorithms To Interpret Passive And Active Data Streams From A Walking-Speed Robotic Sensor Platform, Eric Allen Dieckman
Use Of Pattern Classification Algorithms To Interpret Passive And Active Data Streams From A Walking-Speed Robotic Sensor Platform, Eric Allen Dieckman
Dissertations, Theses, and Masters Projects
In order to perform useful tasks for us, robots must have the ability to notice, recognize, and respond to objects and events in their environment. This requires the acquisition and synthesis of information from a variety of sensors. Here we investigate the performance of a number of sensor modalities in an unstructured outdoor environment, including the Microsoft Kinect, thermal infrared camera, and coffee can radar. Special attention is given to acoustic echolocation measurements of approaching vehicles, where an acoustic parametric array propagates an audible signal to the oncoming target and the Kinect microphone array records the reflected backscattered signal. Although …
Website Accessibility In Australia And The National Transition Strategy: Outcomes And Findings, Vivienne Conway
Website Accessibility In Australia And The National Transition Strategy: Outcomes And Findings, Vivienne Conway
Theses: Doctorates and Masters
In the most recent statistics, published by the Australian Bureau of Statistics in 2012, it was reported that slightly under one in five people stated they had a disability. A further twenty-one percent of the population (4.7 million people) reported that they had a long-term health condition that did not restrict their everyday activities. This total group of people who suffer either a disability or a long-term health condition numbers 8.9 million people, or over thirty-nine percent of the Australian population. Of the people reporting a disability, 3.7 million or eighty-eight percent of that group experienced limitations in the activities …
Increasing Key Space At Little Extra Cost In Rfid Authentications, Gökhan Dalkiliç, Mehmet Hi̇lal Özcanhan, Hafi̇ze Şen Çakir
Increasing Key Space At Little Extra Cost In Rfid Authentications, Gökhan Dalkiliç, Mehmet Hi̇lal Özcanhan, Hafi̇ze Şen Çakir
Turkish Journal of Electrical Engineering and Computer Sciences
Traditional authentication and key establishment protocols utilize nonce parameters as a means for message freshness, recent aliveness, and key derivation. Improving identity verification, increasing key space, or making secret updates more complex through nonces are not goals. Generating random numbers as nonces and not making the most out of them can be considered as a loss in resource stricken radio frequency identification (RFID) tags. By increasing the shared secrets slightly, a new functionality for the nonces is introduced, which makes the authentication and key establishment protocols of RFID systems more secure, in general. The proposed method contributes to the security …
Analysis Of A Rule-Based Curriculum Plan Optimization System With Spearman Rank Correlation, Di̇dem Abi̇di̇n, Hafi̇ze Şen Çakir
Analysis Of A Rule-Based Curriculum Plan Optimization System With Spearman Rank Correlation, Di̇dem Abi̇di̇n, Hafi̇ze Şen Çakir
Turkish Journal of Electrical Engineering and Computer Sciences
In corporations, accurate planning should be applied to manage the in-service training task within an optimum time period and without hindering the working tempo of the employees. For this reason, it is better to consider the curriculum planning task as a timetabling problem. However, when the timetables are prepared manually, it may turn out to be a complicated and time-consuming problem. In this study, it is aimed to evaluate the results of software introduced previously, which seeks to find a solution to the curriculum planning problem of in-service training programs in corporations using a rule-based genetic algorithm (GA). The input …
Effects Of A Current Transformer's Magnetizing Current On The Driving Voltage In Self-Oscillating Converters, Güngör Bal, Seli̇m Öncü
Effects Of A Current Transformer's Magnetizing Current On The Driving Voltage In Self-Oscillating Converters, Güngör Bal, Seli̇m Öncü
Turkish Journal of Electrical Engineering and Computer Sciences
Magnetizing inductance is one of the parameters that affect the phase and amplitude error of the output current of current transformers (CTs). In this study, the linear circuit model of a CT is developed to be used for driving purposes in power electronics applications. A simulation of the CT and its linear model is achieved. In the model circuit, the effect of the magnetizing inductance on the driving voltage can be examined. The equivalent circuit simulation results and the linear model simulation results along with the calculated results show agreement with each other. These results are compared with experimental results.
A Low-Memory Intensive Decoding Architecture For Double-Binary Convolutional Turbo Code, Ming Zhan, Liang Zhou, Jun Wu
A Low-Memory Intensive Decoding Architecture For Double-Binary Convolutional Turbo Code, Ming Zhan, Liang Zhou, Jun Wu
Turkish Journal of Electrical Engineering and Computer Sciences
Memory accesses take a large part of the power consumption in the iterative decoding of double-binary convolutional turbo code (DB-CTC). To deal with this, a low-memory intensive decoding architecture is proposed for DB-CTC in this paper. The new scheme is based on an improved maximum a posteriori probability algorithm, where instead of storing all of the state metrics, only a part of these state metrics is stored in the state metrics cache (SMC), and the memory size of the SMC is thus reduced by 25%. Owing to a compare-select--recalculate processing (CSRP) module in the proposed decoding architecture, the unstored state …