12-13 Sept. 2012
Filter Results
-
[Front matter]
Publication Year: 2012, Page(s):1 - 2|
PDF (31 KB)
-
Table of contents
Publication Year: 2012, Page(s):1 - 4|
PDF (65 KB)
-
Author index
Publication Year: 2012, Page(s):1 - 6|
PDF (58 KB)
-
Power option pricing via Fast Fourier Transform
Publication Year: 2012, Page(s):1 - 6The basis of the option universe has been the European option, and much literature has been devoted to the extension of this option to create many new exotic options, including some with nonlinear payoffs. In this work, we study a European-style power option pricing, under a constant volatility dynamics, using the risk-neutral valuation within the Black-Scholes framework. Apart from applying the c... View full abstract»
-
Diagnosing learning disabilities in a special education by an intelligent agent based system
Publication Year: 2012, Page(s):7 - 12Evaluation of Special education students is always done, manually, by specialists. The presented paper provides an intelligent agent based classification system for diagnosing and evaluation of learning disabilities with special education students. It provides pedagogy psychology profiles for those students and offer solution strategies with the best educational activities. It provides tools that ... View full abstract»
-
Uncompressed quad-1080p wireless video streaming
Publication Year: 2012, Page(s):13 - 16
Cited by: Papers (2)Ultra-high definition video content is available in some areas such as the movie industry and scientific research. Streaming of uncompressed video is currently being done at full-high definition (1080p). In this paper we discuss the options for system which streams uncompressed ultra-high definition video content over a wireless network. View full abstract»
-
On the control of generic abelian group codes
Publication Year: 2012, Page(s):17 - 22Group Codes are a generalization of the well known Binary Convolutional Codes. For this reason Group Codes are also called Generalized Convolutional Codes. A classical binary convolutional encoder with rate k/n <; 1 and m memory registers can be described as a Finite State Machine (FSM) in terms of the binary groups Zk2, Zn2and Zm2 View full abstract»
-
IMU/GPS based pedestrian localization
Publication Year: 2012, Page(s):23 - 28
Cited by: Papers (5)The low cost Inertial Measurement Unit(IMU) can be used to provide accurate position information of a pedestrian when it is combined with Global Positioning System(GPS). This paper investigates how the integration of IMU anf GPS can be effectively used in pedestrian localization. The position calculation is achieved in sequence by three different strategies, namely basic double integration of IMU ... View full abstract»
-
Adaptive time slotted channel hopping for wireless sensor networks
Publication Year: 2012, Page(s):29 - 34
Cited by: Papers (26) | Patents (1)The performance of wireless sensor networks (WSN) is prone to adverse influences from a number of factors such as the interference from co-located wireless systems utilising the same spectral space. Channel hopping technique was proposed to mitigate the problem via periodic change of the operating frequency, and has been adopted in the form of time slotted channel hopping (TSCH) by IEEE 802.15.4e ... View full abstract»
-
A novel design flow for fault-tolerant computing
Publication Year: 2012, Page(s):35 - 40
Cited by: Papers (1)This paper presents a new hardware synthesis flow, which generates an output verifiable in a field-programmable gate array. It demonstrates the relevance of fault-tolerant synthesis as required by demanding, sustainable, safety-critical applications. Although general-purpose in capability, the technique is particularly applicable for modern processor implementations, where the consequences for und... View full abstract»
-
Scraping global threats in Facebook through movement patterns generated by random walks
Publication Year: 2012, Page(s):41 - 46Predicting the occurrence of emerging global threats through Open Social Networks has become a paramount task for national security agencies. We study a set of four foraging strategies to provide an automated searching across the Facebook social network. Our work shows how movement patterns generated by random walks can be developed and applied as novel choices for facing a complex environment, e.... View full abstract»
-
Assigning the characteristics of an ATR dove prism for use with terahertz frequencies: Supplemented with molecular dynamic simulations
Publication Year: 2012, Page(s):47 - 52In this paper we characterize an in house attenuated total reflection (ATR) sample cell unit, for use with a table top Terahertz-Time domain system (THz-TDS) spectrometer. The custom designed ATR unit offers several key advantages compared to conventional transmission spectrometry. Solid, liquid and powdered samples can easily be prepared for analysis and are easily removed and accessed without th... View full abstract»
-
On the application of Genetic Programming to the envelope reduction problem
Publication Year: 2012, Page(s):53 - 58Large sparse matrices characterise the linear systems found in various scientific and engineering domains such as fluid mechanics, structural engineering, finite element analysis and network analysis. The ordering of the rows and columns of a matrix determines how close to the main diagonal its non-zero elements are, which in turn greatly influences the performance of solvers for the associated li... View full abstract»
-
Autonomic cooperative communications for emergency networks
Publication Year: 2012, Page(s):59 - 64
Cited by: Papers (1)Emergency networks formed by First Responders are characterised by dynamic topology changes. It makes them a very relevant area of interest for the application of the concept of cooperative communications supported with the rationale behind the autonomic system design. This is so mostly due to the ad hoc like nature of such a networking environment where the deployment of Relay Nodes, represented ... View full abstract»
-
A study of multi agent based resource search algorithms
Publication Year: 2012, Page(s):65 - 70Resource sharing in a networked environment has been an evolved field of research in both industry and academia. In a dynamic, resource constrained environment, resource discovery plays a vital role in the resource sharing process. A distributed multi agent model for a dynamic, heterogeneous network has been proposed in this paper. Furthermore, three resource search algorithms have been investigat... View full abstract»
-
The story of our lives: From sensors to stories in self-monitoring systems
Publication Year: 2012, Page(s):71 - 76
Cited by: Papers (2)Lifestyle management is a growing area aimed at giving individuals support for an increased self-awareness; self-monitoring technologies are essential in providing an objective account of our daily events. However, most self-monitoring technological solutions largely focus on physical health and ignore other aspects. Our goal is to utilise context aware technologies in order to support people in u... View full abstract»
-
Performance comparison of communication models for Service Oriented Architectures
Publication Year: 2012, Page(s):77 - 82When designing distributed applications for a Service Oriented Architecture (SOA), the method chosen for service implementation is crucial. This paper determines a rule for choosing the best implementation method through performance comparison of two important communication implementation paradigms - blocking (“synchronous”) and non-blocking (“asynchronous brokered communication”). The service, se... View full abstract»
-
Attack graphs representations
Publication Year: 2012, Page(s):83 - 88
Cited by: Papers (4)Attack graphs have been widely used to represent and analyze security attacks. More specifically, they show all ways of how an attacker violets a security policy. Most attack graphs are constructed from nodes (vertices) and edges (arcs). Since there are so many research papers, each has a different representation of attack graphs. This paper discuses attack graph representations in terms of its no... View full abstract»
-
Adaptive raptor coded video streaming for a WiMAX channel
Publication Year: 2012, Page(s):89 - 93This paper proposes an adaptive channel coding scheme for data-partitioned video streaming over a mobile access network, namely IEEE 802.16e (WiMAX). Raptor coding, for reduced latency, is applied at the byte-level rather than the block level. Adaptation is achieved by a single retransmission, when necessary, of extra redundant data to reconstruct corrupted packets. Packet drops are responded to t... View full abstract»
-
Identifying named entities on a University intranet
Publication Year: 2012, Page(s):94 - 99Named entities (NEs) are textual references via proper names, such aspeople names, company names, places and so on. The importance of NEs has been observed in intranet search engines, including university web sites. In this paper, a mechanism is built exclusively to recognize the three named entities, which are constantly referenced in the University of Essex domain: names, course codes, and room ... View full abstract»
-
Enabling z-Filter updates for self-routing denial-of-service resistant capabilities
Publication Year: 2012, Page(s):100 - 105
Cited by: Papers (3)Secure in-packet Bloom filters is an approach used to securely forward source routing packets with small forwarding tables making the forwarding fabric resistant to unauthorized traffic. This resistance can be achieved by dynamically computing the link identifiers on the base of the packet content such as path in-out interfaces and keys of forwarding nodes using a cryptographic function. In this p... View full abstract»
-
Adaptive VBR video for congested wireless home networks
Publication Year: 2012, Page(s):106 - 110As the era of media-player applications seems to be receding, native streaming is being reconsidered in commercial environments. Ease of deployment is important to such developers and in that respect this paper proposes quality-adaptive variable bitrate (VBR) video streaming for home wireless networks. The main intention of the scheme is to adapt to congestion, taking advantage of simple buffer mo... View full abstract»
-
Extracting planar features from Kinect sensor
Publication Year: 2012, Page(s):111 - 116
Cited by: Papers (2)An algorithm for finding planar features from a 3D point cloud by Kinect's depth sensor is described in this paper. The algorithm uses the explicit definition of a plane which allows storing only four parameters per plane rather than storing thousands of points. Extraction of multiple planes from the same set of points is prevented using a rejection mechanism. Parallelism is used for an average sp... View full abstract»
-
Applying Bayesian decision theory to peak detection of stochastic signals
Publication Year: 2012, Page(s):117 - 122Peak detection is a general problem in a wide range of applications. In many advanced signal processing systems, peak detection is used as a pre-processing step, and hence its accuracy for validation of output is crucial. The problem of peak detection can be divided into two stages, peak detection and peak selection and validation. Peak detection can be used in finding peaks in signals and extract... View full abstract»
-
Magnetic field effect on current oscillations observed in p-i-n GaInNAs/GaAs multiple quantum wells structures
Publication Year: 2012, Page(s):123 - 126The photoconductivity (PC) of two p-i-n GaInNAs/GaAs multiple quantum well (MQW) mesa structures is investigated. When illuminated with photons at energy greater than the GaAs bandgap, at low temperature a number of oscillations are observed in the current-voltage (I-V) characteristics. We found that the position of these oscillations depend upon on the temperature and the magnetic field. Due to t... View full abstract»