Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

2017

Technological University Dublin

Articles 1 - 30 of 62

Full-Text Articles in Computer Engineering

Tiled Time Delay Estimation In Mobile Cloud Computing Environments, Ruairí De Fréin Dec 2017

Tiled Time Delay Estimation In Mobile Cloud Computing Environments, Ruairí De Fréin

Conference papers

We present a tiled delay estimation technique in the context of Mobile Cloud Computing (MCC) environments. We examine its accuracy in the presence of multiple sources for (1) sub-sample delays and also (2) in the presence of phase-wrap around. Phase wrap-around is prevalent in MCC because the separation of acoustic sources may be large. We show that tiling a histogram of instantaneous phase estimates can improve delay estimates when phase-wrap around is sig- nificantly present and also when multiple sources are present. We report that error in the delay estimator is generally less than 5% of a sample, when the …


K-Bit-Swap: A New Operator For Real-Coded Evolutionary Algorithms, Aram Ter-Sarkisov, Stephen Marsland Oct 2017

K-Bit-Swap: A New Operator For Real-Coded Evolutionary Algorithms, Aram Ter-Sarkisov, Stephen Marsland

Articles

There has been a variety of crossover operators proposed for Real-Coded Genetic Algorithms (RCGAs), which recombine values from the same location in pairs of strings. In this article we present a recombination operator for RC- GAs that selects the locations randomly in both parents, and compare it to mainstream crossover operators in a set of experiments on a range of standard multidimensional optimization problems and a clustering problem. We present two variants of the operator, either selecting both bits uniformly at random in the strings, or sampling the second bit from a normal distribution centered at the selected location in …


Can A Strictly Defined Security Configuration For Iot Devices Mitigate The Risk Of Exploitation By Botnet Malware?, David Kennefick Sep 2017

Can A Strictly Defined Security Configuration For Iot Devices Mitigate The Risk Of Exploitation By Botnet Malware?, David Kennefick

Dissertations

The internet that we know and use every day is the internet of people, a collection of knowledge and data that can be accessed anywhere is the world anytime from many devices. The internet of the future is the Internet of Things. The Internet of Things is a collection of automated technology that is designed to be run autonomously, but on devices designed for humans to use. In 2016 the Mirai malware has shown there are underlying vulnerabilities in devices connected to the internet of things. Mirai is specifically designed to recognise and exploit IoT devices and it has been …


An Analysis Of Predicting Job Titles Using Job Descriptions, John Lynch Sep 2017

An Analysis Of Predicting Job Titles Using Job Descriptions, John Lynch

Dissertations

A job title is an all-encompassing very short form description that conveys all of the pertinent information relating to a job. The job title typically encapsulates - and should encapsulate - the domain, role and level of responsibility of any given job. Significant value is attached to job titles both internally within organisational structures and to individual job holders. Organisations map out all employees in an organogram on the basis of job titles. This has a bearing on issues like salary, level and scale of responsibility, employee selection and so on. Employees draw value from their own job titles as …


Cybercrime: An Investigation Of The Attitudes And Environmental Factors That Make People More Willing To Participate In Online Crime, Dearbhail Kirwan Sep 2017

Cybercrime: An Investigation Of The Attitudes And Environmental Factors That Make People More Willing To Participate In Online Crime, Dearbhail Kirwan

Dissertations

Cybercrime incidence rates are increasing. In order to identify solutions to this problem, the sources of cybercrime need to be identified. This research attempted to identify a potential set of circumstances that create an environment in which people are more likely to engage in cybercrime. There are three aspects to this; (1) Behaviour on the internet – Are people more likely to engage in illicit activities online than in the physical world? (2) Crime Perceptions – Do people perceive cybercrime as being less serious than non-cybercrime? (3) Resources on the Internet – Are people aware of the types of free …


“How Short Is A Piece Of String?”: An Investigation Into The Impact Of Text Length On Short-Text Classification Accuracy, Austin Mccartney Sep 2017

“How Short Is A Piece Of String?”: An Investigation Into The Impact Of Text Length On Short-Text Classification Accuracy, Austin Mccartney

Dissertations

The recent increase in the widespread use of short messages, for example micro-blogs or SMS communications, has created an opportunity to harvest a vast amount of information through machine-based classification. However, traditional classification methods have failed to produce accuracies comparable to those obtained from similar classification of longer texts. Several approaches have been employed to extend traditional methods to overcome this problem, including the enhancement of the original texts through the construction of associations with external data enrichment sources, ranging from thesauri and semantic nets such as Wordnet, to pre-built online taxonomies such as Wikipedia. Other avenues of investigation have …


The Use Of Persistent Explorer Artificial Ants To Solve The Car Sequencing Problem, Kieran O'Sullivan Sep 2017

The Use Of Persistent Explorer Artificial Ants To Solve The Car Sequencing Problem, Kieran O'Sullivan

Dissertations

Ant Colony Optimisation is a widely researched meta-heuristic which uses the behaviour and pheromone laying activities of foraging ants to find paths through graphs. Since the early 1990’s this approach has been applied to problems such as the Travelling Salesman Problem, Quadratic Assignment Problem and Car Sequencing Problem to name a few. The ACO is not without its problems it tends to find good local optima and not good global optima. To solve this problem modifications have been made to the original ACO such as the Max Min ant system. Other solutions involve combining it with Evolutionary Algorithms to improve …


Can Deep Learning Techniques Improve The Risk Adjusted Returns From Enhanced Indexing Investment Strategies, Anthony Grace Sep 2017

Can Deep Learning Techniques Improve The Risk Adjusted Returns From Enhanced Indexing Investment Strategies, Anthony Grace

Dissertations

Deep learning techniques have been widely applied in the field of stock market prediction particularly with respect to the implementation of active trading strategies. However, the area of portfolio management and passive portfolio management in particular has been much less well served by research to date. This research project conducts an investigation into the science underlying the implementation of portfolio management strategies in practice focusing on enhanced indexing strategies. Enhanced indexing is a passive management approach which introduces an element of active management with the aim of achieving a level of active return through small adjustments to the portfolio weights. …


Bim+Blockchain: A Solution To The Trust Problem In Collaboration?, Malachy Mathews, Dan Robles, Brian Bowe Aug 2017

Bim+Blockchain: A Solution To The Trust Problem In Collaboration?, Malachy Mathews, Dan Robles, Brian Bowe

Conference papers

This paper provides an overview of historic and current organizational limitations emerging in the Architecture, Engineering, Construction, Building Owner / Operations (AECOO) Industry. It then provides an overview of new technologies that attempt to mitigate these limitations. However, these technologies, taken together, appear to be converging and creating entirely new organizational structures in the AEC industries. This may be characterized by the emergence of what is called the Network Effect and it’s related calculus. This paper culminates with an introduction to Blockchain Technology (BT) and it’s integration with the emergence of groundbreaking technologies such as Internet of Things (IoT), Artificial …


Key Inference From Irish Traditional Music Scores And Recordings, Pierre Beauguitte, Bryan Duggan, John D. Kelleher Jul 2017

Key Inference From Irish Traditional Music Scores And Recordings, Pierre Beauguitte, Bryan Duggan, John D. Kelleher

Conference papers

The aim of this paper is to present techniques and results for identifying the key of Irish traditional music melodies, or tunes. Several corpora are used, consisting of both symbolic and audio representations. Monophonic and heterophonic recordings are present in the audio datasets. Some particularities of Irish traditional music are discussed, notably its modal nature. New key-profiles are defined, that are better suited to Irish music.


Chaos-Based Cryptography For Cloud Computing, Paul Tobin, Lee Tobin, Michael Mckeever, Jonathan Blackledge Jun 2017

Chaos-Based Cryptography For Cloud Computing, Paul Tobin, Lee Tobin, Michael Mckeever, Jonathan Blackledge

Conference papers

Cloud computing and poor security issues have quadrupled over the last six years and with the alleged presence of backdoors in common encryption ciphers, has created a need for personalising the encryption process by the client. In 2007, two Microsoft employees gave a presentation ``On the Possibility of a backdoor in the NIST SP800-90 Dual Elliptic Curve Pseudo Random Number Generators'' and was linked in 2013 by the New York Times with notes leaked by Edward Snowden. This confirmed backdoors were placed, allegedly, in a number of encryption systems by the National Security Agency, which if true creates an urgent …


One-To-Cloud One-Time Pad Data Encryption: Introducing Virtual Prototyping With Pspice, Paul Tobin, Lee Tobin, Roberto Gandia Blanquer Dr, Michael Mckeever, Jonathan Blackledge Jun 2017

One-To-Cloud One-Time Pad Data Encryption: Introducing Virtual Prototyping With Pspice, Paul Tobin, Lee Tobin, Roberto Gandia Blanquer Dr, Michael Mckeever, Jonathan Blackledge

Conference papers

In this paper, we examine the design and application of a one-time pad encryption system for protecting data stored in the Cloud. Personalising security using a one-time pad generator at the client-end protects data from break-ins, side-channel attacks and backdoors in public encryption algorithms. The one-time pad binary sequences were obtained from modified analogue chaos oscillators initiated by noise and encoded client data locally. Specific ``one-to-Cloud'' storage applications returned control back to the end user but without the key distribution problem normally associated with one-time pad encryption. Development of the prototype was aided by ``Virtual Prototyping'' in the latest version …


Auto Generation Of Xliff Translation Documents From Proprietary File Formats, Kieran O'Connor, Geraldine Gray Jun 2017

Auto Generation Of Xliff Translation Documents From Proprietary File Formats, Kieran O'Connor, Geraldine Gray

The ITB Journal

The handling of proprietary documents by localisation vendors is time consuming and error prone, and represents a significant challenge to localisation projects. Vendors with many customers, each with its own set of document formats, must potentially support a document format set numbering in the hundreds or thousands. This paper describes an approach to automating the extraction of translatable text from a variety of file formats. The solution is based on XLIFF, language parsers, and XML transformations.


Developing Real-Time Multimedia Conferencing Services Using Java And Sip, Gavin Byrne, Declan Barber Jun 2017

Developing Real-Time Multimedia Conferencing Services Using Java And Sip, Gavin Byrne, Declan Barber

The ITB Journal

This paper examines Java's suitability in creating real-time multimedia communications-based applications in Next Generation Networks (NGNs). We investigate some of the current enabling technologies provided by the Java plaiform which are concerned with the rapid development of realtime communications-based products and services. In particular, we look at creating a multiparty conferencing and collaboration service using the Session Initiation Protocol (SIP) and the JAIN Framework and present an approach which models multiparty conferencing applications by separating signaling and media transfer functionality. We map our model through the design stage to an implementation in Java. This paper is based on real experiences …


Web Enabled Embedded Devices, Anthony Keane, Brian Myler Jun 2017

Web Enabled Embedded Devices, Anthony Keane, Brian Myler

The ITB Journal

The trend in manufacturing of computerised control systems has been to miniaturise the components while increasing the functionality of the systems. This has led to the development of small inexpensive hand-held computer devices coupled with the availability of a user friendly application development language, Java and public cost-effect communication networks has given the developer a programmable web-enabled embedded device. This paper investigates the steps involved in programming the Tiny InterNet Interface platform and analyses the limitations imposed by miniaturisation on this device.


Soft, Vertical Handover Of Streamed Multimedia In A 4g Network, Ger Cunningham, Philip Perry, Liam Murphy Jun 2017

Soft, Vertical Handover Of Streamed Multimedia In A 4g Network, Ger Cunningham, Philip Perry, Liam Murphy

The ITB Journal

In this paper the soft, vertical handover of streamed multimedia in a 4G network is considered. We propose a soft handover solution in which the mobile client controls the handover. This solution requires no modifications to existing wireless networks. The second stream required for the soft handover is duplicated just above the transport layer, rather than requiring the server to play out a second stream that needs to be synchronised with the existing stream. Such a scheme is outlined, and the results are presented that show how the scheme functioned in an emulated environment.


Modelling A Mechatronic System Using "Matlab/Simulink" And "Dyanst", Paul Dillon Jun 2017

Modelling A Mechatronic System Using "Matlab/Simulink" And "Dyanst", Paul Dillon

The ITB Journal

This paper presents the process of modelling a mechatronic system using two modelling methods. One the well known Matlab/Simulation package the other, Dynast, uses a novel energy based approach. The system modelled is a single axis positioning system driven via an armature controlled DC motor. The model consists of the main items in the system; pulse width modulated amplifier, DC motor, pulley and belt drive, and ball screw thread. Effects of inertia of parts and also frictional effects are also accoU;nted for in the models. The problems of combing different disciplines within each method are shown. Simulation results are presented …


Developing A Distributed Java-Based Speech Recognition Engine, Tony Ayers, Brian Nolan Jun 2017

Developing A Distributed Java-Based Speech Recognition Engine, Tony Ayers, Brian Nolan

The ITB Journal

The development of speech recognition engines has traditionally been the territory of low-level development languages such as C. Until recently Java may not have been considered a candidate language for the development of such a speech engine, due to its security restrictions which limited its sound processing features. The release of the Java Sound API as part of the Java Media Framework and the subsequent integration of the Sound API into the standard Java development kit provides the necessary sound processing tools to Java to perform speech recognition. This paper documents our development of a speech recognition engine using the …


Design And Implementation Of An Archetype Based Interoperable Knowledge Eco-System For Data Buoys, Paul Stacey, Damon Berry Jun 2017

Design And Implementation Of An Archetype Based Interoperable Knowledge Eco-System For Data Buoys, Paul Stacey, Damon Berry

Conference papers

This paper describes the ongoing work of the authors in translating two-level system design techniques used in Health Informatics to the Earth Systems Science domain. Health informaticians have developed a sophisticated two-level systems design approach for electronic health documentation over many years, and with the use of archetypes, have shown how knowledge interoperability among heterogeneous systems can be achieved. Translating two-level modelling techniques to a new domain is a complex task. A proof-of-concept archetype enabled data buoy eco-system is presented. The concept of operational templates-as-a service is proposed. Design recommendations and implementation experiences of re-working the proposed architecture to run …


Adaptive Screen Generation For Mobile Devices, Caoimhín O’Nualláin, Sam Redfern May 2017

Adaptive Screen Generation For Mobile Devices, Caoimhín O’Nualláin, Sam Redfern

The ITB Journal

When one looks at any learning software - eLearning based or not - one cannot sometims help but think why the authors could not have organized the screens (or the means of navigation) in a way similar to some other piece of software which the user has used or come accustomed to using. In this paper it is hoped to be able to achieve just that. That is, to accommodate the adaptive screen design by building up a profile about the user which can capture the learning styles of the user and personal preferences, and to be able to have …


Voice Activated Command And Control With Speech Recognition Over Wireless Networks, Tony Ayres, Brian Nolan May 2017

Voice Activated Command And Control With Speech Recognition Over Wireless Networks, Tony Ayres, Brian Nolan

The ITB Journal

This paper presents work conducted to date on the development of a voice activated command and control framework specifically for the control of remote devices in a ubiquitous computing environment. The prototype device is a Java controlled Lego Mindstorm robot. The research considers three different scenario configurations. A recognition grammar for command and control of the robot has been created and implemented in Java, in part in the recognition engine and in part on the robot. The physical topology involves Java at each node endpoint, that is, at the handheld PC (iPaq), the PC workstation, the Linux server and onboard …


Statistical Language Models For Graphical Object Recognition, Laura Keyes, Andrew O'Sullivan, Adam Winstanley May 2017

Statistical Language Models For Graphical Object Recognition, Laura Keyes, Andrew O'Sullivan, Adam Winstanley

The ITB Journal

This paper explores automatic recognition and semantic capture in vector graphics for graphical information systems. The low-level graphical content of graphical documents, such as a map or architectural drawing, are often captured manually and the encoding of the semantic content seen as an extension of this. The large quantity of new and archived graphical data available on paper makes automatic structuring of such graphical data desirable. A successful method for recognising text data uses statistical language models. This work will investigate and evaluate similar and adapted statistical models (Statistical Graphical Langauge Models, SGLM) to graphical languages based on the associations …


Interactive 2d And 3d Graphics Over The World-Wide Web With Actionscript, Hugh Mccabe May 2017

Interactive 2d And 3d Graphics Over The World-Wide Web With Actionscript, Hugh Mccabe

The ITB Journal

Many efforts have been made to provide a mechanism for delivering interactive 3D content over the World-Wide Web. The majority of the solutions put forward require the use of a proprietary plug-in on the client browser and none of these required plug-ins have so far become part of the standard browser installation package. The Macromedia Flash player has however achieved near ubiquitous status as the standard plug-in for displaying interactive multimedia and graphics content. Flash does not provide native support for 3D graphics but the recent addition of the Shape Drawing API opens up the possibility of developers using ActionScript …


Voice Enabled Indoor Localisation, Kieran Harkin, Kevin Curran, Eoghan Furey May 2017

Voice Enabled Indoor Localisation, Kieran Harkin, Kevin Curran, Eoghan Furey

The ITB Journal

The ability to track objects in real time offers a wide range of beneficial applications that include safety, security and the supply chain. The problem with location based systems is that they can be inconvenient and time-consuming to locate an object. A user has to access a computer and log onto a location system to locate an object. There are several problems with current location determination interfaces. Firstly a user has to log on to a computer; this can be inconvenient and time consuming as the user may have to locate a computer (which may be in another area of …


Mobile Phone Game Localisation, Leonie Troy, Matt Smith, Richard Gallery May 2017

Mobile Phone Game Localisation, Leonie Troy, Matt Smith, Richard Gallery

The ITB Journal

Often, mobile phone games are developed over a short time span. Because of the additional work and complexity that localisation requires, such games are frequently produced without localisation in mind. In recent years automation and standardisation of localisation has been developed and promoted by the Localisation Industry Standard Association (LISA) and Oasis. Mobile phone game localisation involves various types of language transfer on a small scale, which challenges the localisation process carried out on a game. Our work investigated the workflow for the localisation of a mobile phone game into Spanish and German using a LISA Standard TMX (Term Base …


Development Of An Enhanced Generic Data Mining Life Cycle (Dmlc), Markus Hofmann, Brendan Tierney May 2017

Development Of An Enhanced Generic Data Mining Life Cycle (Dmlc), Markus Hofmann, Brendan Tierney

The ITB Journal

Data mining projects are complex and have a high failure rate. In order to improve project management and success rates of such projects a life cycle is vital to the overall success of the project. This paper reports on a research project that was concerned with the life cycle development for large scale data mining projects. The paper provides a detailed view of the design and development of a generic data mining life cycle called DMLC. The life cycle aims to support all members of data mining project teams as well as IT managers and academic researchers and may improve …


Is Your Wireless Network Being Hacked?, Paul King, Ivan Smyth, Anthony Keane May 2017

Is Your Wireless Network Being Hacked?, Paul King, Ivan Smyth, Anthony Keane

The ITB Journal

Wireless networks provide vulnerable gateways for unauthorised entry to networks or even a standalone wireless computer. The independent radio signals that constitute wireless communications have no physical boundary to keep them in check. This allows a third party to easily eavesdrop on communications sessions and by capturing the data packets, they can break the encryption keys and access the data within the network. The public awareness of the insecurity of wireless networks is surprisingly poor despite frequent news media reports of the vulnerabilities of the equipment and the activities of the criminals prepare to exploit it. In this paper we …


Towards Arabic To English Machine Translation, Yasser Salem, Arnold Hensman, Brian Nolan May 2017

Towards Arabic To English Machine Translation, Yasser Salem, Arnold Hensman, Brian Nolan

The ITB Journal

This paper explores how the characteristics of the Arabic language will effect the development of a Machine Translation (MT) tool from Arabic to English. Several distinguishing features of Arabic pertinent to MT will be explored in detail with reference to some potential difficulties that they might present. The paper will conclude with a proposed model incorporating the Role and Reference Grammar (RRG) technique to achieve this end.


Vertical Search Engines, Kevin Curran, Jude Mc Glinchey May 2017

Vertical Search Engines, Kevin Curran, Jude Mc Glinchey

The ITB Journal

This paper outlines the growth in popularity of vertical search engines, their origins, the differences between them and well-known broad based search engines such as Google and Yahoo. We also discuss their use in business-to-business, their marketing and advertising costs, what the revenue streams are and who uses them.


Be Aware With A Honeypot, Stephen Meyer, Ivan Smyth, Mark Cummins, Anthony Keane May 2017

Be Aware With A Honeypot, Stephen Meyer, Ivan Smyth, Mark Cummins, Anthony Keane

The ITB Journal

The Internet has already become a hostile environment for computers, especially when they are directly connected with a public IP address. We have experienced this hostile activity where on an average day; the ITB Honeypot recorded over a thousand reconnaissance attacks seeking unauthorised entry onto our private network. Our Honeypot is a basic PC running Windows XP with no services offered and no activity from users that would generate traffic. The Honeypot is running in a passive state on a stub-network where all inbound and outbound traffic is recorded at the bridging computer to the WAN. We report on the …