A biometric based authentication and encryption Framework for Sensor Health Data in Cloud
- Sharma, Surender, Balasubramanian, Venki
- Authors: Sharma, Surender , Balasubramanian, Venki
- Date: 2014
- Type: Text , Conference proceedings
- Full Text:
- Description: Use of remote healthcare monitoring application (HMA) can not only enable healthcare seeker to live a normal life while receiving treatment but also prevent critical healthcare situation through early intervention. For this to happen, the HMA have to provide continuous monitoring through sensors attached to the patient's body or in close proximity to the patient. Owing to elasticity nature of the cloud, recently, the implementation of HMA in cloud is of intense research. Although, cloud-based implementation provides scalability for implementation, the health data of patient is super-sensitive and requires high level of privacy and security for cloud-based shared storage. In addition, protection of real-time arrival of large volume of sensor data from continuous monitoring of patient poses bigger challenge. In this work, we propose a self-protective security framework for our cloud-based HMA. Our framework enable the sensor data in the cloud from (1) unauthorized access and (2) self-protect the data in case of breached access using biometrics. The framework is detailed in the paper using mathematical formulation and algorithms. © 2014 IEEE.
- Authors: Sharma, Surender , Balasubramanian, Venki
- Date: 2014
- Type: Text , Conference proceedings
- Full Text:
- Description: Use of remote healthcare monitoring application (HMA) can not only enable healthcare seeker to live a normal life while receiving treatment but also prevent critical healthcare situation through early intervention. For this to happen, the HMA have to provide continuous monitoring through sensors attached to the patient's body or in close proximity to the patient. Owing to elasticity nature of the cloud, recently, the implementation of HMA in cloud is of intense research. Although, cloud-based implementation provides scalability for implementation, the health data of patient is super-sensitive and requires high level of privacy and security for cloud-based shared storage. In addition, protection of real-time arrival of large volume of sensor data from continuous monitoring of patient poses bigger challenge. In this work, we propose a self-protective security framework for our cloud-based HMA. Our framework enable the sensor data in the cloud from (1) unauthorized access and (2) self-protect the data in case of breached access using biometrics. The framework is detailed in the paper using mathematical formulation and algorithms. © 2014 IEEE.
A functionalist perspective of environmental disclosure and accountability
- Authors: Faux, Jeffrey
- Date: 2013
- Type: Text , Conference proceedings
- Full Text: false
- Description: The purpose of this paper is to provide greater insight into environmental accountability and disclosure from a functionalist perspective. Discussion of the utility of information supplied by corporations to discharge accountability is dependent on societal attitudes to the function of the corporation in society, corporate environmental responsibility and the issue of economic growth. Similarly, the usefulness of environmental information is predicated on perceptions of society as to the importance of environmental issues. The polarisation and politicisation of opinion regarding global warming denies scientific evidence and compounds issues of accountability and disclosure. A postal questionnaire was used to determine societal attitudes to key aspects of corporate functionality, accountability and disclosure. Questionnaire participants were drawn from three categories of society; shareholders, environmentalists and shareholder / environmentalists. Results indicate that the majority of respondents believe the function of the corporation in society is economic and social but there is a significant difference between shareholders and the other user groups. The preferred option of respondents regarding environmental accountability is for companies to be in advance of law and opinion. The sustainable development position, described a continuum, is supported by the shareholder and shareholder/environmentalist groups. The survey research method adopted in this paper suffers from the stated perceptions of respondents rather than attempting to reveal attitudes via alternative approaches. This study demonstrates that there is an attitudinal change towards corporate responsibility that will necessitate re-evaluation of corporate disclosure and accountability.
- Authors: Faux, Jeffrey
- Date: 2013
- Type: Text , Conference proceedings
- Full Text: false
- Description: The purpose of this paper is to provide greater insight into environmental accountability and disclosure from a functionalist perspective. Discussion of the utility of information supplied by corporations to discharge accountability is dependent on societal attitudes to the function of the corporation in society, corporate environmental responsibility and the issue of economic growth. Similarly, the usefulness of environmental information is predicated on perceptions of society as to the importance of environmental issues. The polarisation and politicisation of opinion regarding global warming denies scientific evidence and compounds issues of accountability and disclosure. A postal questionnaire was used to determine societal attitudes to key aspects of corporate functionality, accountability and disclosure. Questionnaire participants were drawn from three categories of society; shareholders, environmentalists and shareholder / environmentalists. Results indicate that the majority of respondents believe the function of the corporation in society is economic and social but there is a significant difference between shareholders and the other user groups. The preferred option of respondents regarding environmental accountability is for companies to be in advance of law and opinion. The sustainable development position, described a continuum, is supported by the shareholder and shareholder/environmentalist groups. The survey research method adopted in this paper suffers from the stated perceptions of respondents rather than attempting to reveal attitudes via alternative approaches. This study demonstrates that there is an attitudinal change towards corporate responsibility that will necessitate re-evaluation of corporate disclosure and accountability.
A method to improve transparency of electronic election process without identification
- Alamuti, Roghayeh, Barjini, Hassan, Khandelwal, Manoj, Jafarabad, Mohammad
- Authors: Alamuti, Roghayeh , Barjini, Hassan , Khandelwal, Manoj , Jafarabad, Mohammad
- Date: 2015
- Type: Text , Conference proceedings
- Full Text:
- Description: Transparency of bank accounts, nowadays, is an undeniable necessity, but no one denies that definite transparency throughout election process is not realized thus far in the world. This calls for fundamental changes in traditional electronic election methods. The new method must close the way for any complaints by the candidate as to the voting process as the public completely trusts in the voting mechanism. Synchronizing voting and votes counting improves the public's trust in the results of election. The proposed secure room-corridor of electronic voting employs election watchers and reports real time results of election along with observance of confidentiality of the votes. © 2015 The Authors.
- Authors: Alamuti, Roghayeh , Barjini, Hassan , Khandelwal, Manoj , Jafarabad, Mohammad
- Date: 2015
- Type: Text , Conference proceedings
- Full Text:
- Description: Transparency of bank accounts, nowadays, is an undeniable necessity, but no one denies that definite transparency throughout election process is not realized thus far in the world. This calls for fundamental changes in traditional electronic election methods. The new method must close the way for any complaints by the candidate as to the voting process as the public completely trusts in the voting mechanism. Synchronizing voting and votes counting improves the public's trust in the results of election. The proposed secure room-corridor of electronic voting employs election watchers and reports real time results of election along with observance of confidentiality of the votes. © 2015 The Authors.
A model for the introduction of Ayurvedic and Allopathic Electronic Health Records in Sri Lanka
- Stranieri, Andrew, Sahama, Tony, Butler-Henderson, Kerryn, Perera, Kamal
- Authors: Stranieri, Andrew , Sahama, Tony , Butler-Henderson, Kerryn , Perera, Kamal
- Date: 2016
- Type: Text , Conference proceedings
- Relation: 2016 IEEE International Symposium on Technology and Society; Trivandrum, Kerala, India; 20th-22nd October 2016 p. 56-61
- Full Text:
- Reviewed:
- Description: Fully integrated electronic health records (EHR) provide healthcare providers and patients access to records across a health care system and promise efficient and effective provision of health care. However, fully integrated records have proven to be very expensive and difficult to establish. Currently. EHR's have been developed largely to accommodate Western medicine events. These barriers impact on the introduction of EHR's in Sri Lanka, where health budgets are already stretched and Ayurvedic medicine is routinely practiced alongside Allopathic medicine. This article identifies requirements for EHR in the Sri Lankan context and advances a model for the introduction of EHR's that suits that context. The model is justified by drawing on insights and experiences with EHR in Western nations.
- Authors: Stranieri, Andrew , Sahama, Tony , Butler-Henderson, Kerryn , Perera, Kamal
- Date: 2016
- Type: Text , Conference proceedings
- Relation: 2016 IEEE International Symposium on Technology and Society; Trivandrum, Kerala, India; 20th-22nd October 2016 p. 56-61
- Full Text:
- Reviewed:
- Description: Fully integrated electronic health records (EHR) provide healthcare providers and patients access to records across a health care system and promise efficient and effective provision of health care. However, fully integrated records have proven to be very expensive and difficult to establish. Currently. EHR's have been developed largely to accommodate Western medicine events. These barriers impact on the introduction of EHR's in Sri Lanka, where health budgets are already stretched and Ayurvedic medicine is routinely practiced alongside Allopathic medicine. This article identifies requirements for EHR in the Sri Lankan context and advances a model for the introduction of EHR's that suits that context. The model is justified by drawing on insights and experiences with EHR in Western nations.
A new building mask using the gradient of heights for automatic building extraction
- Siddiqui, Fasahat, Awrangjeb, Mohammad, Teng, Shyh, Lu, Guojun
- Authors: Siddiqui, Fasahat , Awrangjeb, Mohammad , Teng, Shyh , Lu, Guojun
- Date: 2016
- Type: Text , Conference proceedings
- Relation: 2016 International Conference on Digital Image Computing: Techniques and Applications (Dicta); Gold Coast, Australia; 30th November-2nd December 2016 p. 288-294
- Full Text:
- Reviewed:
- Description: A number of building detection methods have been proposed in the literature. However, they are not effective in detecting small buildings (typically, 50 m(2)) and buildings with transparent roof due to the way area thresholds and ground points are used. This paper proposes a new building mask to overcome these limitations and enables detection of buildings not only with transparent roof materials but also which are small in size. The proposed building detection method transforms the non-ground height information into an intensity image and then analyses the gradient information in the image. It uses a small area threshold of 1 m2 and, thereby, is able to detect small buildings such as garden sheds. The use of non-ground points allows analyses of the gradient on all types of roof materials and, thus, the method is also able to detect buildings with transparent roofs. Our experimental results show that the proposed method can successfully extract buildings even when their roofs are small and/or transparent, thereby, achieving relatively higher average completeness and quality.
- Authors: Siddiqui, Fasahat , Awrangjeb, Mohammad , Teng, Shyh , Lu, Guojun
- Date: 2016
- Type: Text , Conference proceedings
- Relation: 2016 International Conference on Digital Image Computing: Techniques and Applications (Dicta); Gold Coast, Australia; 30th November-2nd December 2016 p. 288-294
- Full Text:
- Reviewed:
- Description: A number of building detection methods have been proposed in the literature. However, they are not effective in detecting small buildings (typically, 50 m(2)) and buildings with transparent roof due to the way area thresholds and ground points are used. This paper proposes a new building mask to overcome these limitations and enables detection of buildings not only with transparent roof materials but also which are small in size. The proposed building detection method transforms the non-ground height information into an intensity image and then analyses the gradient information in the image. It uses a small area threshold of 1 m2 and, thereby, is able to detect small buildings such as garden sheds. The use of non-ground points allows analyses of the gradient on all types of roof materials and, thus, the method is also able to detect buildings with transparent roofs. Our experimental results show that the proposed method can successfully extract buildings even when their roofs are small and/or transparent, thereby, achieving relatively higher average completeness and quality.
A new hybrid method combining genetic algorithm and coordinate search method
- Authors: Long, Qiang , Huang, Junjian
- Date: 2012
- Type: Text , Conference proceedings
- Full Text:
- Description: This paper proposed a new hybrid method combining genetic algorithm(GA) and coordinate search method (CSM). Genetic algorithm is good at global exploration but bad at accuracy and local search. Whereas, coordinate search method is good at local exploitation, and its accuracy is reliable when searching in a local area. Thus we combine those two methods in this paper to design a hybrid method called genetic algorithm with coordinate search (GACS). Experimental tests shows that this method are good at both global search and local accuracy. © 2012 IEEE.
- Description: 2003010808
- Authors: Long, Qiang , Huang, Junjian
- Date: 2012
- Type: Text , Conference proceedings
- Full Text:
- Description: This paper proposed a new hybrid method combining genetic algorithm(GA) and coordinate search method (CSM). Genetic algorithm is good at global exploration but bad at accuracy and local search. Whereas, coordinate search method is good at local exploitation, and its accuracy is reliable when searching in a local area. Thus we combine those two methods in this paper to design a hybrid method called genetic algorithm with coordinate search (GACS). Experimental tests shows that this method are good at both global search and local accuracy. © 2012 IEEE.
- Description: 2003010808
A novel no-reference subjective quality metric for free viewpoint video using human eye movement
- Podder, Pallab, Paul, Manoranjan, Murshed, Manzur
- Authors: Podder, Pallab , Paul, Manoranjan , Murshed, Manzur
- Date: 2018
- Type: Text , Conference proceedings
- Relation: 8th Pacific-Rim Symposium on Image and Video Technology, PSIVT 2017; Wuhan, China; 20th-24th November 2017; published in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 10749 LNCS, p. 237-251
- Full Text:
- Reviewed:
- Description: The free viewpoint video (FVV) allows users to interactively control the viewpoint and generate new views of a dynamic scene from any 3D position for better 3D visual experience with depth perception. Multiview video coding exploits both texture and depth video information from various angles to encode a number of views to facilitate FVV. The usual practice for the single view or multiview quality assessment is characterized by evolving the objective quality assessment metrics due to their simplicity and real time applications such as the peak signal-to-noise ratio (PSNR) or the structural similarity index (SSIM). However, the PSNR or SSIM requires reference image for quality evaluation and could not be successfully employed in FVV as the new view in FVV does not have any reference view to compare with. Conversely, the widely used subjective estimator- mean opinion score (MOS) is often biased by the testing environment, viewers mode, domain knowledge, and many other factors that may actively influence on actual assessment. To address this limitation, in this work, we devise a no-reference subjective quality assessment metric by simply exploiting the pattern of human eye browsing on FVV. Over different quality contents of FVV, the participants eye-tracker recorded spatio-temporal gaze-data indicate more concentrated eye-traversing approach for relatively better quality. Thus, we calculate the Length, Angle, Pupil-size, and Gaze-duration features from the recorded gaze trajectory. The content and resolution invariant operation is carried out prior to synthesizing them using an adaptive weighted function to develop a new quality metric using eye traversal (QMET). Tested results reveal that the proposed QMET performs better than the SSIM and MOS in terms of assessing different aspects of coded video quality for a wide range of FVV contents.
- Description: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
- Authors: Podder, Pallab , Paul, Manoranjan , Murshed, Manzur
- Date: 2018
- Type: Text , Conference proceedings
- Relation: 8th Pacific-Rim Symposium on Image and Video Technology, PSIVT 2017; Wuhan, China; 20th-24th November 2017; published in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 10749 LNCS, p. 237-251
- Full Text:
- Reviewed:
- Description: The free viewpoint video (FVV) allows users to interactively control the viewpoint and generate new views of a dynamic scene from any 3D position for better 3D visual experience with depth perception. Multiview video coding exploits both texture and depth video information from various angles to encode a number of views to facilitate FVV. The usual practice for the single view or multiview quality assessment is characterized by evolving the objective quality assessment metrics due to their simplicity and real time applications such as the peak signal-to-noise ratio (PSNR) or the structural similarity index (SSIM). However, the PSNR or SSIM requires reference image for quality evaluation and could not be successfully employed in FVV as the new view in FVV does not have any reference view to compare with. Conversely, the widely used subjective estimator- mean opinion score (MOS) is often biased by the testing environment, viewers mode, domain knowledge, and many other factors that may actively influence on actual assessment. To address this limitation, in this work, we devise a no-reference subjective quality assessment metric by simply exploiting the pattern of human eye browsing on FVV. Over different quality contents of FVV, the participants eye-tracker recorded spatio-temporal gaze-data indicate more concentrated eye-traversing approach for relatively better quality. Thus, we calculate the Length, Angle, Pupil-size, and Gaze-duration features from the recorded gaze trajectory. The content and resolution invariant operation is carried out prior to synthesizing them using an adaptive weighted function to develop a new quality metric using eye traversal (QMET). Tested results reveal that the proposed QMET performs better than the SSIM and MOS in terms of assessing different aspects of coded video quality for a wide range of FVV contents.
- Description: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
A novel quality metric using spatiotemporal correlational data of human eye maneuver
- Podder, Pallab, Paul, Manoranjan, Murshed, Manzur
- Authors: Podder, Pallab , Paul, Manoranjan , Murshed, Manzur
- Date: 2017
- Type: Text , Conference proceedings
- Relation: 2017 International Conference on Digital Image Computing : Techniques and Applications, DICTA 2017; Sydney, Australia; 29th November-1st December 2017 Vol. 2017-December, p. 1-8
- Full Text:
- Reviewed:
- Description: The popularly used subjective estimator- mean opinion score (MOS) is often biased by the testing environment, viewers mode, domain expertise, and many other factors that may actively influence on actual assessment. We therefore, devise a no- reference subjective quality assessment metric by exploiting the nature of human eye browsing on videos. The participants' eye-tracker recorded gaze-data indicate more concentrated eye- traversing approach for relatively better quality. We calculate the Length, Angle, Pupil-size, and Gaze-duration features from the recorded gaze trajectory. The content and resolution invariant operation is carried out prior to synthesizing them using an adaptive weighted function to develop a new quality metric using eye traversal (QMET). Tested results reveal that the quality evaluation carried out by QMET demonstrates a strong correlation with the most widely used peak signal-to-noise ratio (PSNR), structural similarity index (SSIM), and the MOS.
- Description: DICTA 2017 - 2017 International Conference on Digital Image Computing: Techniques and Applications
- Authors: Podder, Pallab , Paul, Manoranjan , Murshed, Manzur
- Date: 2017
- Type: Text , Conference proceedings
- Relation: 2017 International Conference on Digital Image Computing : Techniques and Applications, DICTA 2017; Sydney, Australia; 29th November-1st December 2017 Vol. 2017-December, p. 1-8
- Full Text:
- Reviewed:
- Description: The popularly used subjective estimator- mean opinion score (MOS) is often biased by the testing environment, viewers mode, domain expertise, and many other factors that may actively influence on actual assessment. We therefore, devise a no- reference subjective quality assessment metric by exploiting the nature of human eye browsing on videos. The participants' eye-tracker recorded gaze-data indicate more concentrated eye- traversing approach for relatively better quality. We calculate the Length, Angle, Pupil-size, and Gaze-duration features from the recorded gaze trajectory. The content and resolution invariant operation is carried out prior to synthesizing them using an adaptive weighted function to develop a new quality metric using eye traversal (QMET). Tested results reveal that the quality evaluation carried out by QMET demonstrates a strong correlation with the most widely used peak signal-to-noise ratio (PSNR), structural similarity index (SSIM), and the MOS.
- Description: DICTA 2017 - 2017 International Conference on Digital Image Computing: Techniques and Applications
A review on chemical diagnosis techniques for transformer paper insulation degradation
- Abu Bakar, Norazhar, Abu Siada, Ahmed, Islam, Syed
- Authors: Abu Bakar, Norazhar , Abu Siada, Ahmed , Islam, Syed
- Date: 2013
- Type: Text , Conference proceedings , Conference paper
- Relation: 2013 Australasian Universities Power Engineering Conference, AUPEC 2013; Hobart, Australia; 29th September-3rd October 2013 p. 1-6
- Full Text:
- Reviewed:
- Description: Energized parts within power transformer are isolated using paper insulation and are immersed in insulating oil. Hence, transformer oil and paper insulation are essential sources to detect incipient and fast developing power transformer faults. Several chemical diagnoses techniques are developed to examine the condition of paper insulation such as degree of polymerization, carbon oxides, furanic compounds and methanol. The principle and limitation of these diagnoses are discussed and compared in this paper.
- Authors: Abu Bakar, Norazhar , Abu Siada, Ahmed , Islam, Syed
- Date: 2013
- Type: Text , Conference proceedings , Conference paper
- Relation: 2013 Australasian Universities Power Engineering Conference, AUPEC 2013; Hobart, Australia; 29th September-3rd October 2013 p. 1-6
- Full Text:
- Reviewed:
- Description: Energized parts within power transformer are isolated using paper insulation and are immersed in insulating oil. Hence, transformer oil and paper insulation are essential sources to detect incipient and fast developing power transformer faults. Several chemical diagnoses techniques are developed to examine the condition of paper insulation such as degree of polymerization, carbon oxides, furanic compounds and methanol. The principle and limitation of these diagnoses are discussed and compared in this paper.
A surrogate model for evaluation of maximum normalized dynamic load factor in moving load model for pipeline spanning due to slug flow
- Sultan, Ibrahim, Reda, Ahmed, Forbes, Gareth
- Authors: Sultan, Ibrahim , Reda, Ahmed , Forbes, Gareth
- Date: 2012
- Type: Text , Conference proceedings
- Full Text:
- Description: Understanding the problem of slug-flow-induced fatigue damage is of particular importance to the reliable operation of pipelines. Slug flow, across unsupported pipeline spans, produces dynamic vibrations in the pipeline resulting in cyclical fatigue stresses. These dynamic effects will cause the pipeline to fail at a point of stress concentration if proper design procedure is not followed. The response of a pipeline span, under the passage of slug flow, can be represented by dynamic load factors that are functions of the speed ratio and damping characteristics of the span. The aspects of these functional relationships are investigated, in this paper by conducting multiple simulations at different speed ratios and damping factors. The data obtained from the steady state Fourier expansion will, consequently, be used to produce a surrogate model with a level of accuracy that adequately qualifies it for use in determining dynamic loading of pipelines. The closed-form surrogate model can be used to eliminate the need to employ costly mathematical procedures or finite element packages for the analysis. The model will also provide a solid ground for optimization studies and help designers gain an insight into how various model parameters impact the system response. This paper will demonstrate the aspects of a proposed surrogate model and endeavor to obtain parameter domains within which the model's reliability is ensured. A numerical example will be demonstrated to prove the concepts presented in the paper and confirm the validity of the proposed model. Copyright © 2012 by ASME.
- Description: C1
- Authors: Sultan, Ibrahim , Reda, Ahmed , Forbes, Gareth
- Date: 2012
- Type: Text , Conference proceedings
- Full Text:
- Description: Understanding the problem of slug-flow-induced fatigue damage is of particular importance to the reliable operation of pipelines. Slug flow, across unsupported pipeline spans, produces dynamic vibrations in the pipeline resulting in cyclical fatigue stresses. These dynamic effects will cause the pipeline to fail at a point of stress concentration if proper design procedure is not followed. The response of a pipeline span, under the passage of slug flow, can be represented by dynamic load factors that are functions of the speed ratio and damping characteristics of the span. The aspects of these functional relationships are investigated, in this paper by conducting multiple simulations at different speed ratios and damping factors. The data obtained from the steady state Fourier expansion will, consequently, be used to produce a surrogate model with a level of accuracy that adequately qualifies it for use in determining dynamic loading of pipelines. The closed-form surrogate model can be used to eliminate the need to employ costly mathematical procedures or finite element packages for the analysis. The model will also provide a solid ground for optimization studies and help designers gain an insight into how various model parameters impact the system response. This paper will demonstrate the aspects of a proposed surrogate model and endeavor to obtain parameter domains within which the model's reliability is ensured. A numerical example will be demonstrated to prove the concepts presented in the paper and confirm the validity of the proposed model. Copyright © 2012 by ASME.
- Description: C1
Adaptive clustering with feature ranking for DDoS attacks detection
- Zi, Lifang, Yearwood, John, Wu, Xin
- Authors: Zi, Lifang , Yearwood, John , Wu, Xin
- Date: 2010
- Type: Text , Conference proceedings
- Full Text:
- Description: Distributed Denial of Service (DDoS) attacks pose an increasing threat to the current internet. The detection of such attacks plays an important role in maintaining the security of networks. In this paper, we propose a novel adaptive clustering method combined with feature ranking for DDoS attacks detection. First, based on the analysis of network traffic, preliminary variables are selected. Second, the Modified Global K-means algorithm (MGKM) is used as the basic incremental clustering algorithm to identify the cluster structure of the target data. Third, the linear correlation coefficient is used for feature ranking. Lastly, the feature ranking result is used to inform and recalculate the clusters. This adaptive process can make worthwhile adjustments to the working feature vector according to different patterns of DDoS attacks, and can improve the quality of the clusters and the effectiveness of the clustering algorithm. The experimental results demonstrate that our method is effective and adaptive in detecting the separate phases of DDoS attacks. © 2010 IEEE.
- Authors: Zi, Lifang , Yearwood, John , Wu, Xin
- Date: 2010
- Type: Text , Conference proceedings
- Full Text:
- Description: Distributed Denial of Service (DDoS) attacks pose an increasing threat to the current internet. The detection of such attacks plays an important role in maintaining the security of networks. In this paper, we propose a novel adaptive clustering method combined with feature ranking for DDoS attacks detection. First, based on the analysis of network traffic, preliminary variables are selected. Second, the Modified Global K-means algorithm (MGKM) is used as the basic incremental clustering algorithm to identify the cluster structure of the target data. Third, the linear correlation coefficient is used for feature ranking. Lastly, the feature ranking result is used to inform and recalculate the clusters. This adaptive process can make worthwhile adjustments to the working feature vector according to different patterns of DDoS attacks, and can improve the quality of the clusters and the effectiveness of the clustering algorithm. The experimental results demonstrate that our method is effective and adaptive in detecting the separate phases of DDoS attacks. © 2010 IEEE.
Agoraphilic navigation algorithm in dynamic environment with and without prediction of moving objects location
- Hewawasam, Hasitha, Ibrahim, Yousef, Kahandawa, Gayan, Choudhury, Tanveer
- Authors: Hewawasam, Hasitha , Ibrahim, Yousef , Kahandawa, Gayan , Choudhury, Tanveer
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 45th Annual Conference of the IEEE Industrial Electronics Society, IECON 2019 Vol. 2019-October, p. 5179-5185
- Full Text:
- Reviewed:
- Description: This paper presents a summary of research conducted in performance improvement of Agoraphilic Navigation Algorithm under Dynamic Environment (ANADE). The ANADE is an optimistic navigation algorithm which is capable of navigating robots in static as well as in unknown dynamic environments. ANADE has been successfully extended the capacity of original Agoraphilic algorithm for static environment. However, it could identify that ANADE takes costly decisions when it is used in complex dynamic environments. The proposed algorithm in this paper has been successfully enhanced the performance of ANADE in terms of safe travel, speed variation, path length and travel time. The proposed algorithm uses a prediction methodology to estimate future growing free space passages which can be used for safe navigation of the robot. With motion prediction of moving objects, new set of future driving forces were developed. These forces has been combined with present driving force for safe and efficient navigation. Furthermore, the performances of proposed algorithm (Agoraphilic algorithm with prediction) was compared and benched-marked with ANADE (Without predication) under similar environment conditions. From the investigation results, it was observed that the proposed algorithm extends the effective decision making ability in a complex navigation environment. Moreover, the proposed algorithm navigated the robot in a shorter and quicker path with smooth speed variations. © 2019 IEEE.
- Description: E1
- Authors: Hewawasam, Hasitha , Ibrahim, Yousef , Kahandawa, Gayan , Choudhury, Tanveer
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 45th Annual Conference of the IEEE Industrial Electronics Society, IECON 2019 Vol. 2019-October, p. 5179-5185
- Full Text:
- Reviewed:
- Description: This paper presents a summary of research conducted in performance improvement of Agoraphilic Navigation Algorithm under Dynamic Environment (ANADE). The ANADE is an optimistic navigation algorithm which is capable of navigating robots in static as well as in unknown dynamic environments. ANADE has been successfully extended the capacity of original Agoraphilic algorithm for static environment. However, it could identify that ANADE takes costly decisions when it is used in complex dynamic environments. The proposed algorithm in this paper has been successfully enhanced the performance of ANADE in terms of safe travel, speed variation, path length and travel time. The proposed algorithm uses a prediction methodology to estimate future growing free space passages which can be used for safe navigation of the robot. With motion prediction of moving objects, new set of future driving forces were developed. These forces has been combined with present driving force for safe and efficient navigation. Furthermore, the performances of proposed algorithm (Agoraphilic algorithm with prediction) was compared and benched-marked with ANADE (Without predication) under similar environment conditions. From the investigation results, it was observed that the proposed algorithm extends the effective decision making ability in a complex navigation environment. Moreover, the proposed algorithm navigated the robot in a shorter and quicker path with smooth speed variations. © 2019 IEEE.
- Description: E1
An adaptive approach to opportunistic data forwarding in underwater acoustic sensor networks
- Nowsheen, Nusrat, Karmakar, Gour, Kamruzzaman, Joarder
- Authors: Nowsheen, Nusrat , Karmakar, Gour , Kamruzzaman, Joarder
- Date: 2014
- Type: Text , Conference proceedings
- Full Text:
- Description: Reliable data transfer for underwater acoustic sensor networks (UASNs) is a major research challenge in applications such as pollution monitoring, oceanic data collection, and surveillance due to the long propagation delay and high error rate of the acoustic channel. To address this issue, an opportunistic data forwarding protocol was proposed which achieves high packet delivery success ratio with less routing overhead and energy consumption by selecting the next hop forwarder among a set of candidates based on its link reliability and data transfer reach ability. However, the protocol relies on fixed data hold time approach, i.e., Each node holds data packets for a fixed amount of time before a forwarder discovery process is initiated. Depending on the value of the fixed hold time and deployment contextual scenario, this may incur large end-to-end delay. Moreover, lack of consideration of network condition in hold time limits its performance. In this paper, we propose an adaptive technique to improve its performance. The adaptive approach calculates data hold time at each node dynamically considering a number of 'node and network' metrics including current buffer occupancy, delay experienced by stored data packets, arrival and service rate, neighbors' data transmissions and reach ability. Simulation results show that compared with fixed hold time approach, our adaptive technique reduces end-to-end delay significantly, achieves considerably higher data delivery and less energy consumption per successful packet delivery.
- Authors: Nowsheen, Nusrat , Karmakar, Gour , Kamruzzaman, Joarder
- Date: 2014
- Type: Text , Conference proceedings
- Full Text:
- Description: Reliable data transfer for underwater acoustic sensor networks (UASNs) is a major research challenge in applications such as pollution monitoring, oceanic data collection, and surveillance due to the long propagation delay and high error rate of the acoustic channel. To address this issue, an opportunistic data forwarding protocol was proposed which achieves high packet delivery success ratio with less routing overhead and energy consumption by selecting the next hop forwarder among a set of candidates based on its link reliability and data transfer reach ability. However, the protocol relies on fixed data hold time approach, i.e., Each node holds data packets for a fixed amount of time before a forwarder discovery process is initiated. Depending on the value of the fixed hold time and deployment contextual scenario, this may incur large end-to-end delay. Moreover, lack of consideration of network condition in hold time limits its performance. In this paper, we propose an adaptive technique to improve its performance. The adaptive approach calculates data hold time at each node dynamically considering a number of 'node and network' metrics including current buffer occupancy, delay experienced by stored data packets, arrival and service rate, neighbors' data transmissions and reach ability. Simulation results show that compared with fixed hold time approach, our adaptive technique reduces end-to-end delay significantly, achieves considerably higher data delivery and less energy consumption per successful packet delivery.
An application of consensus clustering for DDoS attacks detection
- Zi, Lifang, Yearwood, John, Kelarev, Andrei
- Authors: Zi, Lifang , Yearwood, John , Kelarev, Andrei
- Date: 2010
- Type: Text , Conference proceedings
- Full Text:
- Description: The detection of Distributed Denial of Service (DDos) attacks is very important for maintaining the security of networks and the Internet. This paper introduces a novel iterative consensus process based on Hybrid Bipartite Graph Formulation (HGBF) consensus function for DDos attacks detection. First, the features are extracted during feature extraction process based on the analysis of network traffic. Second, several clustering algorithms are applied in combination with the silhouette index to obtain a collection of independent initial clusterings. Third, the HGBF consensus function and silhouette index are used to find an appropriate consensus clustering of the initial clusterings. Fourth, this new consensus clustering is added to the pool of initial clusterings replacing another clustering with the worst Silhouette index. Fifth, the process continues iteratively until the Silhouette index of the resulting consensus clusterings stabilizes. This iterative consensus clustering process can improve the quality of the clusters. The experimental results demonstrate that our iterative consensus process is effective and can be used in practice for detecting the separate phased of DDos attacks.
- Authors: Zi, Lifang , Yearwood, John , Kelarev, Andrei
- Date: 2010
- Type: Text , Conference proceedings
- Full Text:
- Description: The detection of Distributed Denial of Service (DDos) attacks is very important for maintaining the security of networks and the Internet. This paper introduces a novel iterative consensus process based on Hybrid Bipartite Graph Formulation (HGBF) consensus function for DDos attacks detection. First, the features are extracted during feature extraction process based on the analysis of network traffic. Second, several clustering algorithms are applied in combination with the silhouette index to obtain a collection of independent initial clusterings. Third, the HGBF consensus function and silhouette index are used to find an appropriate consensus clustering of the initial clusterings. Fourth, this new consensus clustering is added to the pool of initial clusterings replacing another clustering with the worst Silhouette index. Fifth, the process continues iteratively until the Silhouette index of the resulting consensus clusterings stabilizes. This iterative consensus clustering process can improve the quality of the clusters. The experimental results demonstrate that our iterative consensus process is effective and can be used in practice for detecting the separate phased of DDos attacks.
An argument structure abstraction for Bayesian belief networks: Just outcomes in on-line dispute resolution
- Muecke, Nial, Stranieri, Andrew
- Authors: Muecke, Nial , Stranieri, Andrew
- Date: 2008
- Type: Text , Conference proceedings
- Full Text:
- Description: There are many different approaches for settling disputes on-line, such as simple email systems, fixed bid systems and intelligent systems. However, to date there have been no attempts to integrate decision support methods into the dispute resolution process for the purpose of supporting outcomes that are consistent with judicial reasoning. This paper describes how a model of judicial reasoning can be used to assist divorcees with the resolution of property issues online, in a manner that is consistent with decisions a judge would make if the matter was heard in Court. The approach uses an argument based model of the discretionary nature of decisions made by judges in Australian Family Law. This is integrated with a protocol for online dispute dialogue. Predictions of the likelihood of alternates outcomes is achieved with a series of Bayesian Belief Networks
- Authors: Muecke, Nial , Stranieri, Andrew
- Date: 2008
- Type: Text , Conference proceedings
- Full Text:
- Description: There are many different approaches for settling disputes on-line, such as simple email systems, fixed bid systems and intelligent systems. However, to date there have been no attempts to integrate decision support methods into the dispute resolution process for the purpose of supporting outcomes that are consistent with judicial reasoning. This paper describes how a model of judicial reasoning can be used to assist divorcees with the resolution of property issues online, in a manner that is consistent with decisions a judge would make if the matter was heard in Court. The approach uses an argument based model of the discretionary nature of decisions made by judges in Australian Family Law. This is integrated with a protocol for online dispute dialogue. Predictions of the likelihood of alternates outcomes is achieved with a series of Bayesian Belief Networks
An Attention-Based Approach for Single Image Super Resolution
- Liu, Yuan, Wang, Yuancheng, Li, Nan, Cheng, Xu, Zhang, Yifeng, Huang, Yongming, Lu, Guojun
- Authors: Liu, Yuan , Wang, Yuancheng , Li, Nan , Cheng, Xu , Zhang, Yifeng , Huang, Yongming , Lu, Guojun
- Date: 2018
- Type: Text , Conference proceedings , Conference paper
- Relation: 2018 24th International Conference on Pattern Recognition, ICPR 2018; Beijing, China; 20th-24th August 2018 Vol. 2018, p. 2777-2784
- Full Text:
- Reviewed:
- Description: The main challenge of single image super resolution (SISR) is the recovery of high frequency details such as tiny textures. However, most of the state-of-the-art methods lack specific modules to identify high frequency areas, causing the output image to be blurred. We propose an attention-based approach to give a discrimination between texture areas and smooth areas. After the positions of high frequency details are located, high frequency compensation is carried out. This approach can incorporate with previously proposed SISR networks. By providing high frequency enhancement, better performance and visual effect are achieved. We also propose our own SISR network composed of DenseRes blocks. The block provides an effective way to combine the low level features and high level features. Extensive benchmark evaluation shows that our proposed method achieves significant improvement over the state-of-the-art works in SISR.
- Authors: Liu, Yuan , Wang, Yuancheng , Li, Nan , Cheng, Xu , Zhang, Yifeng , Huang, Yongming , Lu, Guojun
- Date: 2018
- Type: Text , Conference proceedings , Conference paper
- Relation: 2018 24th International Conference on Pattern Recognition, ICPR 2018; Beijing, China; 20th-24th August 2018 Vol. 2018, p. 2777-2784
- Full Text:
- Reviewed:
- Description: The main challenge of single image super resolution (SISR) is the recovery of high frequency details such as tiny textures. However, most of the state-of-the-art methods lack specific modules to identify high frequency areas, causing the output image to be blurred. We propose an attention-based approach to give a discrimination between texture areas and smooth areas. After the positions of high frequency details are located, high frequency compensation is carried out. This approach can incorporate with previously proposed SISR networks. By providing high frequency enhancement, better performance and visual effect are achieved. We also propose our own SISR network composed of DenseRes blocks. The block provides an effective way to combine the low level features and high level features. Extensive benchmark evaluation shows that our proposed method achieves significant improvement over the state-of-the-art works in SISR.
An efficient selective miner consensus protocol in blockchain oriented iot smart monitoring
- Uddin, Ashraf, Stranieri, Andrew, Gondal, Iqbal, Balasubramanian, Venki
- Authors: Uddin, Ashraf , Stranieri, Andrew , Gondal, Iqbal , Balasubramanian, Venki
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 2019 IEEE International Conference on Industrial Technology, ICIT 2019; Melbourne; Australia; 13th-15th February 2019 Vol. 2019-February, p. 1135-1142
- Full Text:
- Reviewed:
- Description: Blockchains have been widely used in Internet of Things(IoT) applications including smart cities, smart home and smart governance to provide high levels of security and privacy. In this article, we advance a Blockchain based decentralized architecture for the storage of IoT data produced from smart home/cities. The architecture includes a secure communication protocol using a sign-encryption technique between power constrained IoT devices and a Gateway. The sign encryption also preserves privacy. We propose that a Software Agent executing on the Gateway selects a Miner node using performance parameters of Miners. Simulations demonstrate that the recommended Miner selection outperforms Proof of Works selection used in Bitcoin and Random Miner Selection.
- Description: Proceedings of the IEEE International Conference on Industrial Technology
- Authors: Uddin, Ashraf , Stranieri, Andrew , Gondal, Iqbal , Balasubramanian, Venki
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 2019 IEEE International Conference on Industrial Technology, ICIT 2019; Melbourne; Australia; 13th-15th February 2019 Vol. 2019-February, p. 1135-1142
- Full Text:
- Reviewed:
- Description: Blockchains have been widely used in Internet of Things(IoT) applications including smart cities, smart home and smart governance to provide high levels of security and privacy. In this article, we advance a Blockchain based decentralized architecture for the storage of IoT data produced from smart home/cities. The architecture includes a secure communication protocol using a sign-encryption technique between power constrained IoT devices and a Gateway. The sign encryption also preserves privacy. We propose that a Software Agent executing on the Gateway selects a Miner node using performance parameters of Miners. Simulations demonstrate that the recommended Miner selection outperforms Proof of Works selection used in Bitcoin and Random Miner Selection.
- Description: Proceedings of the IEEE International Conference on Industrial Technology
An efficient video coding technique using a novel non-parametric background model
- Chakraborty, Subrata, Paul, Manoranjan, Murshed, Manzur, Ali, Mortuza
- Authors: Chakraborty, Subrata , Paul, Manoranjan , Murshed, Manzur , Ali, Mortuza
- Date: 2014
- Type: Text , Conference proceedings
- Relation: 2014 IEEE International Conference on Multimedia and Expo Workshops, ICMEW 2014; Chengdu; China; 14th-18th July 2014 p. 1-6
- Full Text:
- Reviewed:
- Description: Video coding technique with a background frame, extracted from mixture of Gaussian (MoG) based background modeling, provides better rate distortion performance by exploiting coding efficiency in uncovered background areas compared to the latest video coding standard. However, it suffers from high computation time, low coding efficiency for dynamic videos, and prior knowledge requirement of video content. In this paper, we present a novel adaptive weighted non-parametric (WNP) background modeling technique and successfully embed it into HEVC video coding standard. Being non-parametric (NP), the proposed technique naturally exhibits superior performance in dynamic background scenarios compared to MoG-based technique without a priori knowledge of video data distribution. In addition, the WNP technique significantly reduces noise-related drawbacks of existing NP techniques to provide better quality video coding with much lower computation time as demonstrated through extensive comparative studies against NP, MoG and HEVC techniques.
- Authors: Chakraborty, Subrata , Paul, Manoranjan , Murshed, Manzur , Ali, Mortuza
- Date: 2014
- Type: Text , Conference proceedings
- Relation: 2014 IEEE International Conference on Multimedia and Expo Workshops, ICMEW 2014; Chengdu; China; 14th-18th July 2014 p. 1-6
- Full Text:
- Reviewed:
- Description: Video coding technique with a background frame, extracted from mixture of Gaussian (MoG) based background modeling, provides better rate distortion performance by exploiting coding efficiency in uncovered background areas compared to the latest video coding standard. However, it suffers from high computation time, low coding efficiency for dynamic videos, and prior knowledge requirement of video content. In this paper, we present a novel adaptive weighted non-parametric (WNP) background modeling technique and successfully embed it into HEVC video coding standard. Being non-parametric (NP), the proposed technique naturally exhibits superior performance in dynamic background scenarios compared to MoG-based technique without a priori knowledge of video data distribution. In addition, the WNP technique significantly reduces noise-related drawbacks of existing NP techniques to provide better quality video coding with much lower computation time as demonstrated through extensive comparative studies against NP, MoG and HEVC techniques.
An evaluation of emergency plans and procedures in fitness facilities in Australia: Implications for policy and practice
- Sekendiz, Betul, Norton, Kevin, Keyzer, Patrick, Dietrich, Joachim, Coyle, Ian, Jones, Veronica, Finch, Caroline
- Authors: Sekendiz, Betul , Norton, Kevin , Keyzer, Patrick , Dietrich, Joachim , Coyle, Ian , Jones, Veronica , Finch, Caroline
- Date: 2014
- Type: Text , Conference proceedings
- Full Text:
- Description: In 2007-08, fitness facilities contributed $872.9 million to the Australian economy and provided savings in direct health care costs estimated up to $107.9 million through their positive impact on physical inactivity and associated diseases (1). In 2011-12, more than 4.3 million Australians participated in sport and physical recreation at indoor sports or fitness facilities (2). However, research across Queensland (3) and in Victoria (4) showed low compliance with emergency plans and safety practices in fitness facilities. The aim of this study was to analyse emergency plans and procedures in fitness facilities in Australia. A nationwide online risk management survey of fitness professionals (n=1178, mean age=39.9), and observational audits at randomly selected regional and metropolitan fitness facilities (n=11) in New South Wales, South Australia, Victoria and Queensland were conducted. The findings indicated that most of the fitness professionals (68.1%) rated the emergency evacuation plans and other emergency procedures in their facilities as extremely/very good (n=640). Yet, more than one fourth (27.4%) of fitness professionals were somewhat aware (n=152), or very unaware/not at all aware (n=49) of the emergency evacuation plans and other emergency procedures in their facilities. The observational audits showed that most of the fitness facilities did not clearly display their emergency response plans (73%, n=8), emergency evacuation procedures (55%, n=6) or emergency telephone numbers (91%, n=10). Many fitness facilities (36.4%, n=4) did not have an appropriate first aid kit accessible by all staff. Our study shows a lack of emergency preparedness in many fitness facilities in Australia. Emergency response capability is crucial for fitness facility managers to satisfy their duty of care to manage risks of medical emergencies and disasters such as fire, explosion, and floods. Our study has implications for policy development and education of fitness facility managers to improve emergency plans and procedures in fitness facilities in Australia.
- Authors: Sekendiz, Betul , Norton, Kevin , Keyzer, Patrick , Dietrich, Joachim , Coyle, Ian , Jones, Veronica , Finch, Caroline
- Date: 2014
- Type: Text , Conference proceedings
- Full Text:
- Description: In 2007-08, fitness facilities contributed $872.9 million to the Australian economy and provided savings in direct health care costs estimated up to $107.9 million through their positive impact on physical inactivity and associated diseases (1). In 2011-12, more than 4.3 million Australians participated in sport and physical recreation at indoor sports or fitness facilities (2). However, research across Queensland (3) and in Victoria (4) showed low compliance with emergency plans and safety practices in fitness facilities. The aim of this study was to analyse emergency plans and procedures in fitness facilities in Australia. A nationwide online risk management survey of fitness professionals (n=1178, mean age=39.9), and observational audits at randomly selected regional and metropolitan fitness facilities (n=11) in New South Wales, South Australia, Victoria and Queensland were conducted. The findings indicated that most of the fitness professionals (68.1%) rated the emergency evacuation plans and other emergency procedures in their facilities as extremely/very good (n=640). Yet, more than one fourth (27.4%) of fitness professionals were somewhat aware (n=152), or very unaware/not at all aware (n=49) of the emergency evacuation plans and other emergency procedures in their facilities. The observational audits showed that most of the fitness facilities did not clearly display their emergency response plans (73%, n=8), emergency evacuation procedures (55%, n=6) or emergency telephone numbers (91%, n=10). Many fitness facilities (36.4%, n=4) did not have an appropriate first aid kit accessible by all staff. Our study shows a lack of emergency preparedness in many fitness facilities in Australia. Emergency response capability is crucial for fitness facility managers to satisfy their duty of care to manage risks of medical emergencies and disasters such as fire, explosion, and floods. Our study has implications for policy development and education of fitness facility managers to improve emergency plans and procedures in fitness facilities in Australia.
An improved building detection in complex sites using the LIDAR height variation and point density
- Siddiqui, Fasahat, Teng, Shyh, Lu, Guojun, Awrangjeb, Mohammad
- Authors: Siddiqui, Fasahat , Teng, Shyh , Lu, Guojun , Awrangjeb, Mohammad
- Date: 2013
- Type: Text , Conference proceedings
- Relation: 2013 28th International Conference on Image and Vision Computing New Zealand, IVCNZ 2013; Wellington; New Zealand; 27th-29th November 2013; published in International Conference Image and Vision Computing New Zealand p. 471-476
- Full Text:
- Reviewed:
- Description: In this paper, the height variation in LIDAR (Light Detection And Ranging) point cloud data and point density are analyzed to remove the false building detection in highly vegetation and hilly sites. In general, the LIDAR points in a tree area have higher height variations than those in a building area. Moreover, the density of points having similar height values is lower in a tree area than in a building area. The proposed method uses such information as an improvement to a current state-of-the-art building detection method. The qualitative and object-based quantitative analyzes have been performed to verify the effectiveness of the proposed building detection method as compared with a current method. The analysis shows that proposed building detection method successfully reduces false building detection (i.e. trees in high complex sites of Australia and Germany), and the average correctness and quality have been improved by 6.36% and 6.16% respectively.
- Authors: Siddiqui, Fasahat , Teng, Shyh , Lu, Guojun , Awrangjeb, Mohammad
- Date: 2013
- Type: Text , Conference proceedings
- Relation: 2013 28th International Conference on Image and Vision Computing New Zealand, IVCNZ 2013; Wellington; New Zealand; 27th-29th November 2013; published in International Conference Image and Vision Computing New Zealand p. 471-476
- Full Text:
- Reviewed:
- Description: In this paper, the height variation in LIDAR (Light Detection And Ranging) point cloud data and point density are analyzed to remove the false building detection in highly vegetation and hilly sites. In general, the LIDAR points in a tree area have higher height variations than those in a building area. Moreover, the density of points having similar height values is lower in a tree area than in a building area. The proposed method uses such information as an improvement to a current state-of-the-art building detection method. The qualitative and object-based quantitative analyzes have been performed to verify the effectiveness of the proposed building detection method as compared with a current method. The analysis shows that proposed building detection method successfully reduces false building detection (i.e. trees in high complex sites of Australia and Germany), and the average correctness and quality have been improved by 6.36% and 6.16% respectively.