Open Access. Powered by Scholars. Published by Universities.®

Electrical and Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Electrical and Computer Engineering

Deep Learning Towards Intelligent Vehicle Fault Diagnosis, Mohammed Al-Zeyadi, Javier Andreu-Perez, Hani Hagras, Chris Royce, Darren Smith, Piotr Rzonsowski, Ali Malik Jan 2020

Deep Learning Towards Intelligent Vehicle Fault Diagnosis, Mohammed Al-Zeyadi, Javier Andreu-Perez, Hani Hagras, Chris Royce, Darren Smith, Piotr Rzonsowski, Ali Malik

Conference papers

Recently, the rapid development of automotive industries has given rise to large multidimensional datasets both in the production sites and after-sale services. Fault diagnostic systems are one of the services that the automotive industries provide. As a consequence of the rapid development of cars features, traditional rule-based diagnostic systems became very limited. Therefore, more sophisticated AI approaches need to be investigated towards more efficient solutions. In this paper, we focus on utilising deep learning so as to build a diagnostic system that is able to estimate the required services in an efficient and effective way. We propose a new model, …


A Hardware One-Time Pad Prototype Generator For Localising Cloud Security, Paul Tobin, Lee Tobin, Michael Mckeever, Jonathan Blackledge Jun 2017

A Hardware One-Time Pad Prototype Generator For Localising Cloud Security, Paul Tobin, Lee Tobin, Michael Mckeever, Jonathan Blackledge

Conference papers

In this paper, we examine a system for encrypting data before storing in the Cloud. Adopting this system gives excellent security to stored data and complete control for accessing data by the client at different locations. The motivation for developing this personal encryption came about because of poor Cloud security and doubts over the safety of public encryption algorithms which might contain backdoors. However, side-channel attacks and other unwanted third-party interventions in Cloud security, probably contribute more to the poor security record history. These factors led to the development of a prototype for personalising security locally which defeats cryptanalysis. The …


Chaos-Based Cryptography For Cloud Computing, Paul Tobin, Lee Tobin, Michael Mckeever, Jonathan Blackledge Jun 2017

Chaos-Based Cryptography For Cloud Computing, Paul Tobin, Lee Tobin, Michael Mckeever, Jonathan Blackledge

Conference papers

Cloud computing and poor security issues have quadrupled over the last six years and with the alleged presence of backdoors in common encryption ciphers, has created a need for personalising the encryption process by the client. In 2007, two Microsoft employees gave a presentation ``On the Possibility of a backdoor in the NIST SP800-90 Dual Elliptic Curve Pseudo Random Number Generators'' and was linked in 2013 by the New York Times with notes leaked by Edward Snowden. This confirmed backdoors were placed, allegedly, in a number of encryption systems by the National Security Agency, which if true creates an urgent …


Advances In The Quantification Of Turbulence: A Wind Resource Characteristic, Thomas Woolmington, Keith Sunderland, Jonathan Blackledge, Michael Conlon Aug 2013

Advances In The Quantification Of Turbulence: A Wind Resource Characteristic, Thomas Woolmington, Keith Sunderland, Jonathan Blackledge, Michael Conlon

Conference papers

Wind resource assessment is a critical parameter in a diverse range of considerations within the built environment. Engineers and scientists, engaging in building design, energy conservation/application and air-quality/air-pollution control measures, need to be cognisant of how the associated wind resource imposes increased complexities in their design and modelling processes. In this regard, the topographical heterogeneities within these environments, present significant challenges to quantifying the resource and its turbulent characteristics. Indeed, from the perspective of assessing the wind resource within the built environment, topographical heterogeneity is the primary proponent of turbulence and the main inhibitor to acquiring meaningful measurements.

This paper …


Mobispatial: Open Source For Mobile Spatial Interaction, Junjun Yin, James Carswell Jan 2012

Mobispatial: Open Source For Mobile Spatial Interaction, Junjun Yin, James Carswell

Conference papers

This paper describes our Mobile Spatial Interaction (MSI) prototype MobiSpatial, which benefits from location and orientation aware smartphones and existing open source spatial data initiatives to facilitate user interaction with the geospatial query process. We utilize today’s ubiquitous mobile device as the central computing platform to calculate a mobile user’s visibility shape at his/her current location. MobiSpatial uses this shape as a query “window” in a spatial database to perform line-of-sight, field-of-view and 360º Isovist visibility searches. These visibility based spatial queries reduce the risk of “information overload” by exploiting “hidden query removal” functionality to retrieve only those objects that …