Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 16 of 16

Full-Text Articles in Physical Sciences and Mathematics

The Role Of Cryptography In Security For Electronic Commerce, Ann Murphy, David Murphy Nov 2015

The Role Of Cryptography In Security For Electronic Commerce, Ann Murphy, David Murphy

The ITB Journal

Many businesses and consumers are wary of conducting business over the Internet due to a perceived lack of security. Electronic business is subject to a variety of threats such as unauthorised access, misappropriation, alteration and destruction of both data and systems. This paper explores the major security concerns of businesses and users and describes the cryptographic techniques used to reduce such risks.


Emotional Facial Expressions In Synthesised Sign Language Avatars: A Manual Evaluation., Robert G Smith, Brian Nolan Oct 2015

Emotional Facial Expressions In Synthesised Sign Language Avatars: A Manual Evaluation., Robert G Smith, Brian Nolan

Other Resources

This research explores and evaluates the contribution that facial expressions might have regarding improved comprehension and acceptability in sign language avatars. Focusing specifically on Irish sign language (ISL), the Deaf (the uppercase ‘‘D’’ in the word ‘‘Deaf’’ indicates Deaf as a culture as opposed to ‘‘deaf’’ as a medical condition) community’s responsiveness to sign language avatars is examined. The hypothesis of this is as follows: augmenting an existing avatar with the seven widely accepted universal emotions identified by Ekman (Basic emotions: handbook of cognition and emotion. Wiley, London, 2005) to achieve underlying facial expressions will make that avatar more human-like …


Reformulation Strategies Of Repeated References In The Context Of Robot Perception Errors In Situated Dialogue, Niels Schütte, John D. Kelleher, Brian Mac Namee Sep 2015

Reformulation Strategies Of Repeated References In The Context Of Robot Perception Errors In Situated Dialogue, Niels Schütte, John D. Kelleher, Brian Mac Namee

Conference papers

We performed an experiment in which human participants interacted through a natural language dialogue interface with a simulated robot to fulfil a series of object manipulation tasks. We introduced errors into the robot’s perception, and observed the resulting problems in the dialogues and their resolutions. We then introduced different methods for the user to request information about the robot’s understanding of the environment. In this work, we describe the effects that the robot’s perceptual errors and the information request options available to the participant had on the reformulation of the referring expressions the participants used when resolving a unsuccessful reference.


Mobisurround: An Auditory User Interface For Geo-Service Delivery, Keith Gardiner, Charlie Cullen, James Carswell Sep 2015

Mobisurround: An Auditory User Interface For Geo-Service Delivery, Keith Gardiner, Charlie Cullen, James Carswell

Conference papers

This paper describes original research carried out in the area of Location-Based Services (LBS) with an emphasis on Auditory User Interfaces (AUI) for content delivery. Previous work in this area has focused on accurately determining spatial interactions and informing the user mainly by means of the visual modality. mobiSurround is new research that builds upon these principles with a focus on multimodal content delivery and navigation and in particular the development of an AUI. This AUI enables the delivery of rich media content and natural directions using audio. This novel approach provides a hands free method for navigating a space …


A Defeasible Reasoning Framework For Human Mental Workload Representation And Assessment, Luca Longo Jan 2015

A Defeasible Reasoning Framework For Human Mental Workload Representation And Assessment, Luca Longo

Conference papers

Human mental workload (MWL) has gained importance in the last few decades as an important design concept. It is a multifaceted complex construct mainly applied in cognitive sciences and has been defined in many different ways. Although measuring MWL has potential advantages in interaction and interface design, its formalisation as an operational and computational construct has not sufficiently been addressed. This research contributes to the body of knowledge by providing an extensible framework built upon defeasible reasoning, and implemented with argumentation theory (AT), in which MWL can be better defined, measured, analysed, explained and applied in different human–computer interactive contexts. …


Detection Of Dns Based Covert Channels, Stephen Sheridan, Anthony Keane Jan 2015

Detection Of Dns Based Covert Channels, Stephen Sheridan, Anthony Keane

Conference Papers

Information theft or data exfiltration, whether personal or corporate, is now a lucrative mainstay of cybercrime activity. Recent security reports have suggested that while information, such as credit card data is still a prime target, other data such as corporate secrets, employee files and intellectual property are increasingly sought after on the black market. Malicious actors that are intent on exfiltrating valuable data, usually employ some form of Advanced Persistent Threat (APT) in order to exfiltrate large amounts of data over a long period of time with a high degree of covertness. Botnets are prime examples of APTs that are …


Building A Scalable Global Data Processing Pipeline For Large Astronomical Photometric Datasets, Paul Doyle Jan 2015

Building A Scalable Global Data Processing Pipeline For Large Astronomical Photometric Datasets, Paul Doyle

Other

Astronomical photometry is the science of measuring the flux of a celestial object. Since its introduction, the CCD has been the principle method of measuring flux to calculate the apparent magnitude of an object. Each CCD image taken must go through a process of cleaning and calibration prior to its use. As the number of research telescopes increases the overall computing resources required for image processing also increases. Existing processing techniques are primarily sequential in nature, requiring increasingly powerful servers, faster disks and faster networks to process data. Existing High Performance Computing solutions involving high capacity data centres are complex …


Building A Scalable Global Data Processing Pipeline For Large Astronomical Photometric Datasets, Paul F. Doyle Jan 2015

Building A Scalable Global Data Processing Pipeline For Large Astronomical Photometric Datasets, Paul F. Doyle

Doctoral

Astronomical photometry is the science of measuring the flux of a celestial object. Since its introduction in the 1970s the CCD has been the principle method of measuring flux to calculate the apparent magnitude of an object. Each CCD image taken must go through a process of cleaning and calibration prior to its use. As the number of research telescopes increases the overall computing resources required for image processing also increases. As data archives increase in size to Petabytes, the data processing challenge requires image processing approaches to evolve to continue to exceed the growing data capture rate. Existing processing …


Context-Based Access For Infrequent Requests In Tanzania's Health Care System, Zanifa Omary Jan 2015

Context-Based Access For Infrequent Requests In Tanzania's Health Care System, Zanifa Omary

Doctoral

Access control is an important aspect of any information system. It is a way of ensuring that users can only access what they are authorised to and no more. This can be achieved by granting users access to resources based on pre-defined organisational and legislative rules. Although access control has been extensively studied, and as a result, a wide range of access control models, mechanisms and systems have been proposed, specific access control requirements for healthcare systems that needs to support the continuity of care in an accountable manner have not been addressed. This results in a gap between what …


A Phenomenological Study Of Computer Science Lecturers: Lived Experiences Of Curriculum Design, Arthur Sloan Jan 2015

A Phenomenological Study Of Computer Science Lecturers: Lived Experiences Of Curriculum Design, Arthur Sloan

Doctoral

This hermeneutic phenomenological study presents a description of computer science lecturers’ experiences of curriculum design of degree programmes during a time of transition in curriculum design policy, specifically in the context of Technological University Dublin (DIT). It examines the lived experiences of computer science lecturers to highlight the issues and problems relating to lecturers’ lived experiences of curriculum design, and it describes how it is to be a computer science lecturer in a time of policy change for curriculum design. The findings are that lecturers have been, and are, struggling to cope with the transition from year-long to semesterised courses, …


Disambiguating Company Names In Microblog Text Using Clustering For Online Reputation Management, Fernando Perez-Tellez, John Cardiff, Paolo Rosso, David Pinto Jan 2015

Disambiguating Company Names In Microblog Text Using Clustering For Online Reputation Management, Fernando Perez-Tellez, John Cardiff, Paolo Rosso, David Pinto

Articles

Twitter is used by millions of users to publish brief messages (tweets) with the purpose of sharing experiences and/or opinions about a product or service. There is a clear need for systems that can mine these messages in order to derive information about the collective thinking of twitterers (e.g. for opinion or sentiment analysis). Tweet analysis is a very important task because comments, opinions, suggestions, complaints etc. can be used for marketing strategies or for determining information on a company’s reputation. For this purpose, it is necessary to automatically establish whether a tweet refers to a company or not, when …


Eye-Tracktive: Measuring Attention To Body Parts When Judging Human Emotions, Cathy Ennis, Ludovic Hoyet, Carol O'Sullivan Jan 2015

Eye-Tracktive: Measuring Attention To Body Parts When Judging Human Emotions, Cathy Ennis, Ludovic Hoyet, Carol O'Sullivan

Conference papers

Virtual humans are often endowed with human-like characteristics to make them more appealing and engaging. Motion capture is a reliable way to represent natural motion on such characters, thereby allowing a wide range of animations to be automatically created and replicated. However, interpersonal differences in actors’ performances can be subtle and complex, yet have a strong effect on the human observer. Such effects can be very difficult to express quantitatively or indeed even qualitatively. We investigate two subjective human motion characteristics: attractiveness and distinctiveness. We conduct a perceptual experiment, where participants’ eye movements are tracked while they rate the motions …


Drive-Based Utility-Maximizing Computer Game Non-Player Characters, Colm Sloan Jan 2015

Drive-Based Utility-Maximizing Computer Game Non-Player Characters, Colm Sloan

Doctoral

This research examines the emergence of the five-string fiddle in contemporary North American fiddle culture within the past ten years. By interacting with leading artistlevel practitioners, the research documents the evolution and impact of the instrument to date in exploring the possibilities the five-string fiddle presents for musical performance and innovation. North American vernacular music and, in particular, the contemporary fiddle playing landscape, exemplifies virtousic and innovative idiomatic technique and improvisation as central to an overarching musical explosion, evidenced in the music of many high level, multi-stylistic contemporary practitioners. Within contemporary American fiddle performance, it is compelling to observe how …


On The Relationship Between Perception Of Usability And Subjective Mental Workload Of Web Interfaces, Luca Longo, Pierpaolo Dondio Jan 2015

On The Relationship Between Perception Of Usability And Subjective Mental Workload Of Web Interfaces, Luca Longo, Pierpaolo Dondio

Conference papers

Inspection methods and cheap self-reporting procedures have been significantly employed in the field of Human- Computer Interaction for assessing the usability of interfaces, systems and technologies. However, there is a tendency to overlook aspects related to the context and features of the users during the usability assessment process. This research introduces the concept of mental workload as an aid to enhance usability measurement. A user-study has been designed and executed in the context of human-web interaction. The aim was to investigate the relationship between the perception of usability of three popular web-sites, and the mental workload imposed by a set …


Monitoring Student Engagement And Improving Performance, Brian Keegan, Bianca Schoen-Phelan Jan 2015

Monitoring Student Engagement And Improving Performance, Brian Keegan, Bianca Schoen-Phelan

Conference papers

No abstract provided.


Designing Medical Interactive Systems Via Assessment Of Human Mental Workload, Luca Longo Jan 2015

Designing Medical Interactive Systems Via Assessment Of Human Mental Workload, Luca Longo

Conference papers

In clinical settings, Human-computer systems need to be designed in a way that medical errors are reduced and patient care is enhanced. Inspection methods are usually employed in HCI to assess usability of interactive systems. However, they do not consider the state of the operator while executing a task, the surrounding environment and the task demands. It is argued that assessing performance of operators is fundamental for designing optimal systems with which healthcare can be effectively delivered. The aim of our solution is to assess performance of operators employing the notion of Mental Workload (MWL) this being a construct believed …