By Topic

Computer Science and Electronic Engineering Conference (CEEC), 2011 3rd

Date 13-14 July 2011

Filter Results

Displaying Results 1 - 25 of 27
  • Author index

    Publication Year: 2011 , Page(s): 1 - 2
    Request Permissions | PDF file iconPDF (166 KB)  
    Freely Available from IEEE
  • [Title page]

    Publication Year: 2011 , Page(s): 1
    Request Permissions | PDF file iconPDF (203 KB)  
    Freely Available from IEEE
  • Frequency analysis of path loss models on WIMAX

    Publication Year: 2011 , Page(s): 1 - 6
    Cited by:  Papers (5)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (287 KB) |  | HTML iconHTML  

    WIMAX signal throughput and area coverage range are the most important factors that will affect the quality of broadband access services in mobile systems. This paper presents a comprehensive study of frequency analysis for path loss on mobile WIMAX presented to achieve large throughput and wide coverage to a big number of users. In this paper we have calculated the path loss values based on the v... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modelling the trading behaviour in high-frequency markets

    Publication Year: 2011 , Page(s): 7 - 12
    Request Permissions | Click to expandAbstract | PDF file iconPDF (533 KB) |  | HTML iconHTML  

    We use an agent-based approach to model trading behaviour in high-frequency markets. This study focuses on the Foreign Exchange (FX) market. The initial part of this study is to observe the micro-behaviour of traders to define the stylized facts of their trading activities. This is performed using a high-frequency dataset of anonymised individual traders' historical transactions on an account leve... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Moving between virtual and real worlds: Second language learning through Massively Multiplayer Online Role Playing Games (MMORPGs)

    Publication Year: 2011 , Page(s): 13 - 18
    Request Permissions | Click to expandAbstract | PDF file iconPDF (315 KB) |  | HTML iconHTML  

    Massively Multiplayer Online Role Playing Games (MMORPGs) bring players together in a large virtual community. This type of online gaming can serve many purposes such as entertainment, social interaction, information exchange and education and is now an integral part of many people's lives particularly the younger generation. This research study investigates the use of openly available MMORPGs to ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A wide linear range OTA-C filter for bionic ears

    Publication Year: 2011 , Page(s): 19 - 22
    Request Permissions | Click to expandAbstract | PDF file iconPDF (1002 KB) |  | HTML iconHTML  

    A programmable OTA-C band-pass filter operating in sub-threshold region for use in bionic ears is presented. Design details together with simulation results are given. The filter has been fabricated using BSIM3v3.2 models from the AMS process for 0.35μm CMOS C35 Technology, and tested experimentally. It operates with ±1.5V supply rails features power consumption of 11.25nW and 546nW ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluation of Classified Cloning Scheme with self-similar traffic

    Publication Year: 2011 , Page(s): 23 - 28
    Request Permissions | Click to expandAbstract | PDF file iconPDF (1502 KB) |  | HTML iconHTML  

    This paper presents the performance of a proposed QoS provisioning scheme - the Classified Cloning Scheme - when incoming traffic to the OBS network is self-similar. Intensive simulations were conducted using ns-2, after developing new modules for evaluation purposes. The self-similarity of the incoming traffic is depicted via cumulative distribution functions of the inter-arrival time for incomin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Involving the user with low or no vision in the design of an audio-haptic learning environment for learning about 3D shapes: The first approach

    Publication Year: 2011 , Page(s): 29 - 34
    Cited by:  Papers (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (265 KB) |  | HTML iconHTML  

    This report summarises the current research that is being carried out into haptic sense technology for assisting visual impairment. Moreover, it presents a framework of mechanisms blind students apply to identify basic 3D objects into free space. People with visual impairments are still excluded from accessing certain types of information - like graphics - that are easily accessible by the general... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Content dependent intra-refresh placement for video streaming

    Publication Year: 2011 , Page(s): 35 - 39
    Request Permissions | Click to expandAbstract | PDF file iconPDF (823 KB) |  | HTML iconHTML  

    Intra-refresh is an efficient error resiliency technique that protects against temporal error propagation resulting from transmission errors. Classic periodic intra-coded frames can add some protection and additionally facilitate random access, but within mobile networks with bandwidth constraints their disadvantages may outweigh their advantages. By analyzing the received video quality across a v... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-document arabic text summarisation

    Publication Year: 2011 , Page(s): 40 - 44
    Request Permissions | Click to expandAbstract | PDF file iconPDF (401 KB) |  | HTML iconHTML  

    In this paper we present our generic extractive Arabic and English multi-document summarisers. We also describe the use of machine translation for evaluating the generated Arabic multi-document summaries using English extractive gold standards. In this work we first address the lack of Arabic multi-document corpora for summarisation and the absence of automatic and manual Arabic gold-standard summ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A method for moving rules in a network with multiple packet filters

    Publication Year: 2011 , Page(s): 45 - 49
    Request Permissions | Click to expandAbstract | PDF file iconPDF (284 KB) |  | HTML iconHTML  

    In a network where multiple packet filtering firewalls exist, it can be beneficial to distribute the filtering rules in a certain way, for example, move all the rules towards the edge (main gateway) of the network, or to evenly distribute the rules over the firewalls. Configuring firewalls is a complex task and can be very error prone. To move rules between firewalls, many factors need to be consi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A hybrid re-ranking algorithm based on ontological user profiles

    Publication Year: 2011 , Page(s): 50 - 55
    Request Permissions | Click to expandAbstract | PDF file iconPDF (350 KB) |  | HTML iconHTML  

    The rapid expansion of the Internet has caused information overload to such an extent that the process of finding a specific piece of information may often become frustrating and time-consuming for users. In this paper, we present a hybrid personalized search model based on learning ontological user profiles implicitly. The main goal of this paper is to capture interesting and uninteresting web pa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modified twin-core optical tweezer for three-dimensional trapping

    Publication Year: 2011 , Page(s): 56 - 59
    Request Permissions | Click to expandAbstract | PDF file iconPDF (713 KB) |  | HTML iconHTML  

    In this paper a simple and low-cost approach for designing a twin-core optical tweezer, that allows obtaining an all optical 3-D single-fiber tweezers, is presented. In this method that uses fiber-end drilling in a certain angle and coating all-reflective material around the fiber-end with a high refractive index, causes the total reflection of two beam cores at the interface of fiber and medium. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Age estimation based on speech features and support vector machine

    Publication Year: 2011 , Page(s): 60 - 64
    Cited by:  Papers (2)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (344 KB) |  | HTML iconHTML  

    Age estimation based on human's speech features is an interesting subject in Automatic Speech Recognition (ASR) systems. There are some works in literature on speaker age estimation but it needs more new works especially for Persian speakers. In age estimation, like other speech processing systems, we encounter with two main challenges: finding an appropriate procedure for feature extraction, and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive user profiling for deviating user interests

    Publication Year: 2011 , Page(s): 65 - 70
    Request Permissions | Click to expandAbstract | PDF file iconPDF (145 KB) |  | HTML iconHTML  

    Although the World Wide Web has evolved to be an enormous source of information over the last decade, finding the required information poses a significant challenge to users as there is simply too much information available. Therefore systems that enable users to perform personalised information searches are becoming increasingly important. This paper presents a mechanism which provides recommenda... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Individualized low-frequency response manipulation for multiple listeners using chameleon subwoofer arrays

    Publication Year: 2011 , Page(s): 71 - 73
    Request Permissions | Click to expandAbstract | PDF file iconPDF (257 KB) |  | HTML iconHTML  

    Low-frequency acoustical responses are naturally position dependent across wide listening areas. This is predominantly due to room modes in small, closed spaces. Numerous methodologies have been proposed targeting room mode compensation to give an objectively even response across all listening locations. These techniques cannot guarantee, however, that every listener receives an equally pleasing s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Python in Brain-Computer Interfaces (BCI): Development of a BCI based on Motor imagery

    Publication Year: 2011 , Page(s): 74 - 79
    Request Permissions | Click to expandAbstract | PDF file iconPDF (760 KB) |  | HTML iconHTML  

    Brain-Computer Interfaces (BCI) give rise to a communication means between individuals with severe motor disorders, and their external world via the measurement of the electroencephalographic (EEG) activity. BCI users may control this activity by concentrating on a specific mental task. Motor imagery (MI) executions have become the most used mental task by BCI-groups. Despite a large number of ref... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The complexities involved in the analysis of Fourier Transform Infrared Spectroscopy of breast cancer data with clustering algorithms

    Publication Year: 2011 , Page(s): 80 - 85
    Request Permissions | Click to expandAbstract | PDF file iconPDF (436 KB) |  | HTML iconHTML  

    Fourier Transform Infrared Spectroscopy (FTIR) is a relatively new technique that has been frequently applied now a days in cancer pathology including breast cancer. The long term aim of this work is to develop novel techniques using machine learning methods for the analysis of FTIR data sets. This paper presents the preliminary work with a case study of a FTIR data set of breast cancer with two c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cross-layer scheme for WiMAX video streaming

    Publication Year: 2011 , Page(s): 86 - 91
    Request Permissions | Click to expandAbstract | PDF file iconPDF (1147 KB) |  | HTML iconHTML  

    A cross-layer approach is applicable to wireless systems and demanding video streaming applications. Sharing the channel state from the physical layer with the application layer allows an adaptive protection scheme to be deployed. Flexible error correction is made possible by rateless coding. To protect against outright packet drops, unequal protection of more important compressed data occurs. The... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using CFD in robotic simulators for pollution monitoring

    Publication Year: 2011 , Page(s): 92 - 97
    Request Permissions | Click to expandAbstract | PDF file iconPDF (1047 KB) |  | HTML iconHTML  

    This paper presents the RoboShoalSim, a robot simulator that was developed for the EU Robotic fish shoal project to monitor pollution levels in sea ports around the world. The simulator is different from those in use in that it incorporates not only pollution models of the pollutant in the simulated port but uses computational fluid dynamics of the sea port to generate closer to reality pollutant ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IP traceback methodologies

    Publication Year: 2011 , Page(s): 98 - 102
    Request Permissions | Click to expandAbstract | PDF file iconPDF (471 KB) |  | HTML iconHTML  

    Denial of Service (DoS) is a significant security threat in the internet. The availability of different forms of DoS makes devising solutions hard. The attackers could hide their identity behind legitimate users or spoof the source address of the packets. Therefore, differentiating between legitimate packets and attacker packets becomes difficult. The traceback of the origin of the attack plays a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Free objects of a band arising from graphs

    Publication Year: 2011 , Page(s): 103 - 108
    Request Permissions | Click to expandAbstract | PDF file iconPDF (302 KB) |  | HTML iconHTML  

    The purpose of this paper is to present in contemporary terminology, a new approach to introduce free objects of a band, like free normal bands, free rectangular bands and free bands through graphs. The cardinalities of the free objects are also calculated, first for complete graphs. After removing of edges the resulting graphs become incomplete and regular. Green's relations for free objects are ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simulating market clearance dynamics under a simple event calculus market model

    Publication Year: 2011 , Page(s): 109 - 114
    Request Permissions | Click to expandAbstract | PDF file iconPDF (2698 KB) |  | HTML iconHTML  

    Event Calculus is a new approach in defining and formalizing market mechanisms in a scientific way. The usage of formal logic reduces ambiguity and allows for accurate reasoning and studying of micro-behaviour. Using a simple event-calculus based market model, we simulate the clearance dynamics of a double-auction market. In this paper, we demonstrate the power of event calculus in defining and ex... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Centroid-based Initialized JADE for global optimization

    Publication Year: 2011 , Page(s): 115 - 120
    Cited by:  Papers (2)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (159 KB) |  | HTML iconHTML  

    JADE is a recent adaptive version of nature inspired algorithm, Differential Evolution (DE). It has shown considerable performance improvement on a set of well studied benchmark functions. This paper studies whether the performance of JADE can be improved further by changing its random population initialization with centroid based population initialization. The new algorithm is known as Centroid-b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A qualitative method to optimise false positive occurrences for the in-packet Bloom filter forwarding mechanism

    Publication Year: 2011 , Page(s): 121 - 126
    Cited by:  Papers (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (321 KB) |  | HTML iconHTML  

    Bloom filters have been recently proposed as an efficient multicast forwarding mechanism for the information centric topic-based publish/subscribe network proposed within the framework of the PSIRP project. Although such mechanism presents several advantages, as for instance very simple forwarding decisions and small forwarding tables, one of the limitations is the possibility of false positive oc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.