Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 48

Full-Text Articles in Computer Engineering

Towards A Framework For Modelling Multimedia Conferencing Calls In The Next Generation Network, Gavin Byrne, Declan Barber Nov 2015

Towards A Framework For Modelling Multimedia Conferencing Calls In The Next Generation Network, Gavin Byrne, Declan Barber

The ITB Journal

This paper is concerned with the creation of a multiparty multimedia conferencing application which can be used in Next Generation Networks. It begins by suggesting ways in which conferencing can be modeled with a focus on separating signaling and media transfer functionality. Enabling technologies which could support the modeling framework derived and which are compatible with Next Generation Network (NGN) principles are reviewed. Finally, a design and implementation for a simple multimedia conferencing application are described.


Embedded Systems In A Mobile Distributed Ip Network, Conor Gildea, Declan Barber Nov 2015

Embedded Systems In A Mobile Distributed Ip Network, Conor Gildea, Declan Barber

The ITB Journal

This paper describes an approach to the internetworking of mobile IP sensor nodes in a converged network environment. This preliminary investigation of sensory network models is driven by a joint applied research project between ITB and Teagasc (Grange) which seeks to establish the feasibility of the real-time remote monitoring of animal welfare while in transit between Ireland, Europe and the Middle East. The paper examines traditional system architectures, messaging paradigms and protocols with a view to establishing how the trend towards convergence in telecommunications and the emergence of new Internet Protocols could support the creation of new modes of operation …


Pathfinding In Computer Games, Ross Graham, Hugh Mccabe, Stephen Sheridan Nov 2015

Pathfinding In Computer Games, Ross Graham, Hugh Mccabe, Stephen Sheridan

The ITB Journal

One of the greatest challenges in the design of realistic Artificial Intelligence (AI) in computer games is agent movement. Pathfinding strategies are usually employed as the core of any AI movement system. This report will highlight pathfinding algorithms used presently in games and their shortcomings especially when dealing with real-time pathfinding. With the advances being made in other components, such as physics engines, it is AI that is impeding the next generation of computer games. This report will focus on how machine learning techniques such as Artificial Neural Networks and Genetic Algorithms can be used to enhance an agents ability …


Integration Of A Stereo Vision System And Gps Data For Recording The Position Of Feature Points In A Fixed World Coordinate System, S.D. Mcloughlin, C. O’Rourke, J. Mcdonald, C.E. Markham Nov 2015

Integration Of A Stereo Vision System And Gps Data For Recording The Position Of Feature Points In A Fixed World Coordinate System, S.D. Mcloughlin, C. O’Rourke, J. Mcdonald, C.E. Markham

The ITB Journal

This paper describes a laboratory system for recovering the global coordinates of feature points obtained from a moving camera. The prototype includes a stereo vision system combined with an overhead camera, which mimics a GPS receiver. The stereo vision system provides three dimensional feature point coordinates relative to the position of the cameras and the overhead camera provides three-dimensional coordinates of the camera in a “global” coordinate system. The fusion of these data provides three-dimensional feature point coordinates in a fixed origin global coordinate system.


Hardware/Software Codesign, Richard Gallery Nov 2015

Hardware/Software Codesign, Richard Gallery

The ITB Journal

The current state of the art technology in integrated circuits allows the incorporation of multiple processor cores and memory arrays, in addition to application specific hardware, on a single substrate. As silicon technology has become more advanced, allowing the implementation of more complex designs, systems have begun to incorporate considerable amounts of embedded software [3]. Thus it becomes increasingly necessary for the system designers to have knowledge on both hardware and software to make efficient design tradeoffs. This is where hardware/software codesign comes into existence.


Unified Messaging Systems: An Evolutionary Overview, Declan Barber Nov 2015

Unified Messaging Systems: An Evolutionary Overview, Declan Barber

The ITB Journal

Over the last decade, the widespread demand and use of the internet has changed the direction of the telecommunications industry as it was recognised that the internet could be used as an inexpensive way to handle not only data but also voice communications. This convergence of traditional voice and data technologies towards an IP-based open architecture has been paralleled by a convergence of the internet and mobile communications. As a result of these convergences, unified messaging has emerged as a technically viable service. Integrated messaging services that offer partial unification of different message types are already in the marketplace. This …


Hardware And Software Codesign For Multimedia Capable Portable Devices Using Systemc, Richard Gallery, Deepesh Shakya Nov 2015

Hardware And Software Codesign For Multimedia Capable Portable Devices Using Systemc, Richard Gallery, Deepesh Shakya

The ITB Journal

Multimedia capable portable devices such as 3G phones will host a variety of new applications. Although the underlying push for new applications in such devices is driven by the increase in bandwidth offered by 3G, it is clear that many of the “new” applications will require the provision of new and powerful graphics/video technology within the mobile device itself. Within a computing device, high bandwidth and computational cost are associated with anything but the simplest of graphics, and as a result the graphics subsystem is generally one of the most critical elements of a system, requiring particular attention in the …


Non Deterministic Processing In Neural Networks : An Introduction To Multi-Threaded Neural Networks, Stephen Sheridan Nov 2015

Non Deterministic Processing In Neural Networks : An Introduction To Multi-Threaded Neural Networks, Stephen Sheridan

The ITB Journal

Since McCullough and Pitts first published their work on the Binary Decision Neuron much research has been accumulated in the area of neural networks. This work has for the most part centred on network topologies and learning algorithms. The neural networks that have found their way into devices such as handheld PC’s are the fruit of NN research that has spanned 57 years. There is a simplistic beauty in the way that artificial neural networks model the biological foundations of the human thought process, but one piece of the jigsaw puzzle is still missing. We have so far been unable …


Web Services Technology Infrastructure, Geraldine Gray, Kieran O’Connor Nov 2015

Web Services Technology Infrastructure, Geraldine Gray, Kieran O’Connor

The ITB Journal

Web Services using eXtensible Markup Language (XML) based standards are becoming the new archetype for enabling business to business collaborations. This paper describes the conceptual architecture and semantics of constructing and consuming Web Services. It describes how Web Services fit into the enterprise application environment. It discusses Web Services security. Finally, it outlines the flaws of Web Services in their current state.


An Xml Framework For The Structured Data Exchange Between Medical Devices, Ulrich Neuhaus, Paul Walsh Nov 2015

An Xml Framework For The Structured Data Exchange Between Medical Devices, Ulrich Neuhaus, Paul Walsh

The ITB Journal

This paper describes an XML framework for the exchange of data between medical devices and software systems. XML technologies offer an extensible data format, which is easy to both create and process and simplifies the exchange of data. Different XML standards are defined within the framework in order to provide a practical solution for both device manufacturers and software developers. The structure and benefits of XML documents are discussed and an XML framework for ophthalmology is described.


Longer Than A Telephone Wire - Voice Firewalls To Counter Ubiquitous Lie Detection, Carl Reynolds, Matt Smith, Mark Woodman Nov 2015

Longer Than A Telephone Wire - Voice Firewalls To Counter Ubiquitous Lie Detection, Carl Reynolds, Matt Smith, Mark Woodman

The ITB Journal

Mobile computing and communication devices are open to surreptitious privacy attacks using emotion detection techniques; largely utilising work carried out in the area of voice stress analysis (VSA). This paper extends some work in the area of removing emotion cues in the voice, specifically focusing on lie detection and presents the results of a pilot study indicating that the use of mobile phones in situations of stress is common and that awareness of VSA is low. Existing strategies for the removal or modification of emotion cues, based on models of synthesis are considered and weaknesses are identified.


A Java Framework For Computer Vision, Stephen Sheridan Nov 2015

A Java Framework For Computer Vision, Stephen Sheridan

The ITB Journal

This paper outlines a framework implemented entirely in Java that attempts to give students exposure to computer vision systems from a practical standpoint. Various tools and technologies are introduced that will allow a student to acquire an input image through a WebCam, extract useful information from that input image and finally, attempt to make sense of the input.


Globalcom, Declan Barber, Conor Gildea, Gavin Byrne Nov 2015

Globalcom, Declan Barber, Conor Gildea, Gavin Byrne

The ITB Journal

The objective of this developed application is to provide a company with a means of communicating with its employees no matter where they are physically located and what communication resources they may have at any particular time. The core focus of this application is to provide a Unified Messaging System using synchronous and asynchronous forms.


Identification Protocols In Cryptography, Michael O’Donnell Nov 2015

Identification Protocols In Cryptography, Michael O’Donnell

The ITB Journal

In this paper we examine the role of Identification Protocols in the field of Cryptography. Firstly, the rationale behind the need for Identification Protocols is discussed. Secondly, we examine, in detail, challenge-response protocols, based upon zero-knowledge proofs, that form a subset of Identification Protocols in general. Thirdly, the mathematical tools necessary for the understanding of how these protocols work is given. Finally, we discuss four main Identification Protocols: Fiat-Shamir, Feige-Fiat-Shamir, Schnorr and Guillou- Quisquater. This discussion includes the theory, practical examples and the security aspects of each protocol.


Internet Applications Development Issues And Strategic Considerations, Róisín Faherty Nov 2015

Internet Applications Development Issues And Strategic Considerations, Róisín Faherty

The ITB Journal

This paper examines the development issues and strategic considerations involved in Internet Applications Development. The prevalent development environments are discussed highlighting their advantages and disadvantages. Issues regarding the development of Internet applications are viewed under the headings of human resource, organizational, technological, investment and Legal Issues. Lastly the paper gives an overview of the strategic implications for an organization considering the development of Internet Applications. These include security, quality and the look & feel of the application. This paper is not intended as a definitive resource on the area of Internet Applications Development, its aim is to highlight the areas …


Mental Spaces: Processes For Establishing And Linking Spaces, Brian Nolan Nov 2015

Mental Spaces: Processes For Establishing And Linking Spaces, Brian Nolan

The ITB Journal

This paper reviews the theory of mental spaces as expounded by Fauconnier (1994). In this work he posits a theory in which reference has a structural dimension. Within the theory, this structure is represented using spaces, connectors across the spaces and some general principles that are found to apply. The complexity lies in the interaction between the principles and in the contextual structures that feed into the principles for interpretation. Brugman, in her 1996 paper, makes use of insights from mental spaces theory to conduct an analysis of HAVE-constructions. She notes that Fauconnier has “elaborated a theory of partial possible …


A Review Of Parallel Mappings For Feed Forward Neural Networks Using The Backpropagation Learning Algorithm, Stephen Sheridan Nov 2015

A Review Of Parallel Mappings For Feed Forward Neural Networks Using The Backpropagation Learning Algorithm, Stephen Sheridan

The ITB Journal

The Back-Propagation (BP) Neural Network (NN) is probably the most well known of all neural networks. Many mappings of the BP NN have been implemented for both special purpose and general-purpose computers. This mapping process can fall into one of two categories: heuristic mapping and algorithmic mapping. Heuristic mapping concentrates on the architecture and behaviour of the network as it trains whereas algorithmic mapping concentrates on the parallelization of the learning algorithm. Mappings in the heuristic category tend to take a trial and error approach based on the understanding of the network and of the target machine. In comparison mappings …


The Role Of Cryptography In Security For Electronic Commerce, Ann Murphy, David Murphy Nov 2015

The Role Of Cryptography In Security For Electronic Commerce, Ann Murphy, David Murphy

The ITB Journal

Many businesses and consumers are wary of conducting business over the Internet due to a perceived lack of security. Electronic business is subject to a variety of threats such as unauthorised access, misappropriation, alteration and destruction of both data and systems. This paper explores the major security concerns of businesses and users and describes the cryptographic techniques used to reduce such risks.


Xml For Business To Business Data Exchange, Geraldine Gray, David Kerwick Nov 2015

Xml For Business To Business Data Exchange, Geraldine Gray, David Kerwick

The ITB Journal

This paper examines to use of XML for business to business data exchange. Starting with creating an XML document from an existing data source and transmitting that document, we explain some of the supporting standards for XML which facilitate automated processing and transformation of an XML document. Finally we look at the advantages of using XML, and why it is expected to revolutionise electronic data interchange.


An Exploration Of The Effects Of Enhanced Compiler Error Messages For Computer Programming Novices, Brett A. Becker Nov 2015

An Exploration Of The Effects Of Enhanced Compiler Error Messages For Computer Programming Novices, Brett A. Becker

Theses

Computer programming is an essential skill that all computing students must master and is increasingly important in many diverse disciplines. It is also difficult to learn. One of the many challenges novice programmers face from the start are notoriously cryptic compiler error messages. These report details on errors made by students and are essential as the primary source of information used to rectify those errors. However these difficult to understand messages are often a barrier to progress and a source of discouragement. A high number of student errors, and in particular a high frequency of repeated errors – when a …


Ant Colony Clustering Routing Protocol For Optimization Of Large Scale Wireless Sensor Networks, Li Xinlu, Brian Keegan, Fredrick Japhet Oct 2015

Ant Colony Clustering Routing Protocol For Optimization Of Large Scale Wireless Sensor Networks, Li Xinlu, Brian Keegan, Fredrick Japhet

Conference papers

No abstract provided.


Semantic Models As Knowledge Repositories For Data Modellers In The Financial Industry, Gary Thompson Sep 2015

Semantic Models As Knowledge Repositories For Data Modellers In The Financial Industry, Gary Thompson

Dissertations

Data modellers working in the financial industry are expected to use both technical and business knowledge to transform data into the information required to meet regulatory reporting requirements. This dissertation explores the role that semantic models such as ontologies and concept maps can play in the acquisition of financial and regulatory concepts by data modellers. While there is widespread use of semantic models in the financial industry to specify how information is exchanged between IT systems, there is limited use of these models as knowledge repositories. The objective of this research is to evaluate the use of a semantic model …


Evaluating The Usability Of The Laboratory Information System (Lis) In Coombe Hospital And Hail Hospital, Fahad Alanazi Sep 2015

Evaluating The Usability Of The Laboratory Information System (Lis) In Coombe Hospital And Hail Hospital, Fahad Alanazi

Dissertations

Today, with the rapid evolution of technology, there has also been a rapid development of medical software and systems in hospitals. These systems and software are now being used globally in many hospitals by users of different languages and cultures. Governments and private hospitals pay large sums of money to utilise highly efficient technology. When systems are changed or updated, employees often find it difficult to deal with the characteristics of the new systems. Also, behavioral factors, such as the fear of committing simple errors, might affect system performance and prevent the full utilization of the staff potential. In this …


A Novel And Domain-Specific Document Clustering And Topic Aggregation Toolset For A News Organisation, Claire Mcmahon Sep 2015

A Novel And Domain-Specific Document Clustering And Topic Aggregation Toolset For A News Organisation, Claire Mcmahon

Dissertations

Large collections of documents are becoming increasingly common in the news gathering industry. A review of the literature shows there is a growing interest in datadriven journalism and specifically that the journalism profession needs better tools to understand and develop actionable knowledge from large document sets. On a daily basis, journalists are tasked with searching a diverse range of document sets including news gathering services, emails, freedom of information requests, court records, government reports, press releases and many other types of generally unstructured documents. Document clustering techniques can help address problems of understanding the ever expanding quantities of documents available …


An Exploration Of The Use Of Gamification In Agile Software Development, Alan Mcclean Sep 2015

An Exploration Of The Use Of Gamification In Agile Software Development, Alan Mcclean

Dissertations

Although Project Management has existed for many millennia, software project management is relatively new. As a discipline, software project management is considered difficult. The reasons for this include that software development is non-deterministic; opaque and delivered under ever-increasing time pressure in a volatile environment. Evolving from Incremental and Iterative Development (IID), Agile methodologies have attempted to address these issues by focusing on frequent delivery; working closely with the customer; being responsive to change and preferring working software to extensive documentation. This focus on delivery rather than documentation has sometimes been misrepresented as no documentation, which has led to a shortfall …


An Understanding Of Student Satisfaction, Lorraine Sweeney Sep 2015

An Understanding Of Student Satisfaction, Lorraine Sweeney

Dissertations

Retention is a challenge for all third level institutions and retention rates remain higher than colleges would like them to be, this has intensified in recent years as participants in higher education has increased and diversified. Third level institutions which would not only benefit from increased fees but also through low cost word of mouth promotion and an enhanced reputation. As such, an important concern for colleges is retaining students and understanding the reasons why students may choose to leave a program. While student satisfaction and retention is a well researched topic there remains questions to be answered in terms …


An Evaluation Of Selection Strategies For Active Learning With Regression, Jack O'Neill Sep 2015

An Evaluation Of Selection Strategies For Active Learning With Regression, Jack O'Neill

Dissertations

While active learning for classification problems has received considerable attention in recent years, studies on problems of regression are rare. This paper provides a systematic review of the most commonly used selection strategies for active learning within the context of linear regression. The recently developed Exploration Guided Active Learning (EGAL) algorithm, previously deployed within a classification context, is explored as a selection strategy for regression problems. Active learning is demonstrated to significantly improve the learning rate of linear regression models. Experimental results show that a purely diversity-based approach to


Decrypting Financial Markets Through E-Joint Attention Efforts: On-Line Adaptive Networks Of Investors In Periods Of Market Uncertainty, Niccolò Casnici, Pierpaolo Dondio, Roberto Casarin, Flaminio Squazzoni Aug 2015

Decrypting Financial Markets Through E-Joint Attention Efforts: On-Line Adaptive Networks Of Investors In Periods Of Market Uncertainty, Niccolò Casnici, Pierpaolo Dondio, Roberto Casarin, Flaminio Squazzoni

Articles

No abstract provided.


Design And Development Of Personal Geoservices For Universities, James Carswell, Andrea Ballatore, Thoa Pham, Junjun Yin, Linh Truonghong May 2015

Design And Development Of Personal Geoservices For Universities, James Carswell, Andrea Ballatore, Thoa Pham, Junjun Yin, Linh Truonghong

Books/Book chapters

Personal GeoServices are emerging as an interaction paradigm linking users to information rich environments like a university campus or to Big Data sources like the Internet of Things by delivering spatially intelligent web-services. OpenStreetMap (OSM) constitutes a valuable source of spatial base-data that can be extracted, integrated, and utilised with such heterogeneous data sources for free. In this paper, we present a Personal GeoServices application built on OSM spatial data and university-specific business data for staff, faculty, and students. While generic products such as Google Maps and Google Earth enable basic forms of spatial exploration, the domain of a university …


Eliciting Knowledge Bases With Defeasible Reasoning: A Comparative Analysis With Machine Learning, Peter Keogh May 2015

Eliciting Knowledge Bases With Defeasible Reasoning: A Comparative Analysis With Machine Learning, Peter Keogh

Dissertations

This thesis compares the ability of an implementation of Defeasible Reasoning (via Argumentation Theory) to model a construct (mental workload) with Machine Learning. In order to perform this comparison a defeasible reasoning system was designed and implemented in software. This software was used to elicit a knowledge base from an expert in an experiment which was then compared with machine learning. The central findings of this thesis were that the knowledge based approach was better at predicting an objective performance measure, time, than machine learning. However, machine learning was better equiped to identify another object measure task membership. The knowledge …