Evaluating the Performances of the Agoraphilic Navigation Algorithm under Dead-Lock Situations
- Hewawasam, Hasitha, Ibrahim, Yousef, Kahandawa, Gayan, Choudhury, Tanveer
- Authors: Hewawasam, Hasitha , Ibrahim, Yousef , Kahandawa, Gayan , Choudhury, Tanveer
- Date: 2020
- Type: Text , Conference proceedings , Conference paper
- Relation: 29th IEEE International Symposium on Industrial Electronics, ISIE 2020 Vol. 2020-June, p. 536-542
- Full Text:
- Reviewed:
- Description: This paper presents a summary of the research which was conducted in developing a new free-space based (Agoraphilic) navigation algorithm. This new methodology is capable of maneuvering robots in static as well as dynamically cluttered unknown environments. The new algorithm uses only one force to drive the robot. This force is always an attractive force created by the freespace. This force is focused towards the goal by a force shaping module. Consequently, the robot is motivated to follow free-space directing towards the goal. As this method only based on the attractive forces, the robot always moves towards the goal as long as there is free-space . This method has eradicated many drawbacks of the traditional APF method. Several experimental tests were conducted using Turtlebot3 research platform. These tests were focused on testing the behavior of the new algorithm under dead-lock (local minima) situations for APF method. The test results proved that the proposed algorithm has successfully eliminated the local minima problem of APF method. © 2020 IEEE.
- Authors: Hewawasam, Hasitha , Ibrahim, Yousef , Kahandawa, Gayan , Choudhury, Tanveer
- Date: 2020
- Type: Text , Conference proceedings , Conference paper
- Relation: 29th IEEE International Symposium on Industrial Electronics, ISIE 2020 Vol. 2020-June, p. 536-542
- Full Text:
- Reviewed:
- Description: This paper presents a summary of the research which was conducted in developing a new free-space based (Agoraphilic) navigation algorithm. This new methodology is capable of maneuvering robots in static as well as dynamically cluttered unknown environments. The new algorithm uses only one force to drive the robot. This force is always an attractive force created by the freespace. This force is focused towards the goal by a force shaping module. Consequently, the robot is motivated to follow free-space directing towards the goal. As this method only based on the attractive forces, the robot always moves towards the goal as long as there is free-space . This method has eradicated many drawbacks of the traditional APF method. Several experimental tests were conducted using Turtlebot3 research platform. These tests were focused on testing the behavior of the new algorithm under dead-lock (local minima) situations for APF method. The test results proved that the proposed algorithm has successfully eliminated the local minima problem of APF method. © 2020 IEEE.
Motivational factors of Australian mobile gamers
- Greenwood, Jordan, Achterbosch, Leigh, Meredith, Grant, Vamplew, Peter
- Authors: Greenwood, Jordan , Achterbosch, Leigh , Meredith, Grant , Vamplew, Peter
- Date: 2020
- Type: Text , Conference proceedings , Conference paper
- Relation: Proceedings of the Australasian Computer Science Week Multiconference (ACSW 2020); Melbourne, Australia; 4th-6th February 2020 p. 6
- Full Text:
- Reviewed:
- Description: Mobile games are a fast growing industry, overtaking all other video game platforms with year on year increases in revenue. Many studies have been conducted to explore the motivations of why video games players play their selected games. However very little research has focused on mobile gamers. In addition, Australian studies on the topic are sparse. This paper aimed to discover what motivates a mobile gamer from the perspective of the initial motivational factors attracting them to a mobile game, and the motivational factors that provide interest to continue playing and thereby increase game longevity. A survey was conducted online for Australian participants, which attracted 123 respondents. The survey was formulated by focusing on the 12 key subcomponents as motivational factors of the Gamer Motivational Profile v2 model devised by Quantic Foundry. It was discovered that mobile gamers are a completely different breed of gamer in contrast to the general video gamer. Strategy and challenge which are subcomponents of mastery proved popular among all mobile gamers, while destruction and excitement, subcomponents of action, were often the least motivating factors of all. With the newly discovered data, perhaps mobile game developers can pursue the correct avenues of game design when catering to their target audience.
- Authors: Greenwood, Jordan , Achterbosch, Leigh , Meredith, Grant , Vamplew, Peter
- Date: 2020
- Type: Text , Conference proceedings , Conference paper
- Relation: Proceedings of the Australasian Computer Science Week Multiconference (ACSW 2020); Melbourne, Australia; 4th-6th February 2020 p. 6
- Full Text:
- Reviewed:
- Description: Mobile games are a fast growing industry, overtaking all other video game platforms with year on year increases in revenue. Many studies have been conducted to explore the motivations of why video games players play their selected games. However very little research has focused on mobile gamers. In addition, Australian studies on the topic are sparse. This paper aimed to discover what motivates a mobile gamer from the perspective of the initial motivational factors attracting them to a mobile game, and the motivational factors that provide interest to continue playing and thereby increase game longevity. A survey was conducted online for Australian participants, which attracted 123 respondents. The survey was formulated by focusing on the 12 key subcomponents as motivational factors of the Gamer Motivational Profile v2 model devised by Quantic Foundry. It was discovered that mobile gamers are a completely different breed of gamer in contrast to the general video gamer. Strategy and challenge which are subcomponents of mastery proved popular among all mobile gamers, while destruction and excitement, subcomponents of action, were often the least motivating factors of all. With the newly discovered data, perhaps mobile game developers can pursue the correct avenues of game design when catering to their target audience.
Partial undersampling of imbalanced data for cyber threats detection
- Moniruzzaman, Md, Bagirov, Adil, Gondal, Iqbal
- Authors: Moniruzzaman, Md , Bagirov, Adil , Gondal, Iqbal
- Date: 2020
- Type: Text , Conference proceedings , Conference paper
- Relation: 2020 Australasian Computer Science Week Multiconference, ACSW 2020
- Full Text:
- Reviewed:
- Description: Real-time detection of cyber threats is a challenging task in cyber security. With the advancement of technology and ease of access to the internet, more and more individuals and organizations are becoming the target for various cyber attacks such as malware, ransomware, spyware. The target of these attacks is to steal money or valuable information from the victims. Signature-based detection methods fail to keep up with the constantly evolving new threats. Machine learning based detection has drawn more attention of researchers due to its capability of detecting new and modified attacks based on previous attack's behaviour. The number of malicious activities in a certain domain is significantly low compared to the number of normal activities. Therefore, cyber threats detection data sets are imbalanced. In this paper, we proposed a partial undersampling method to deal with imbalanced data for detecting cyber threats. © 2020 ACM.
- Description: E1
- Authors: Moniruzzaman, Md , Bagirov, Adil , Gondal, Iqbal
- Date: 2020
- Type: Text , Conference proceedings , Conference paper
- Relation: 2020 Australasian Computer Science Week Multiconference, ACSW 2020
- Full Text:
- Reviewed:
- Description: Real-time detection of cyber threats is a challenging task in cyber security. With the advancement of technology and ease of access to the internet, more and more individuals and organizations are becoming the target for various cyber attacks such as malware, ransomware, spyware. The target of these attacks is to steal money or valuable information from the victims. Signature-based detection methods fail to keep up with the constantly evolving new threats. Machine learning based detection has drawn more attention of researchers due to its capability of detecting new and modified attacks based on previous attack's behaviour. The number of malicious activities in a certain domain is significantly low compared to the number of normal activities. Therefore, cyber threats detection data sets are imbalanced. In this paper, we proposed a partial undersampling method to deal with imbalanced data for detecting cyber threats. © 2020 ACM.
- Description: E1
Agoraphilic navigation algorithm in dynamic environment with and without prediction of moving objects location
- Hewawasam, Hasitha, Ibrahim, Yousef, Kahandawa, Gayan, Choudhury, Tanveer
- Authors: Hewawasam, Hasitha , Ibrahim, Yousef , Kahandawa, Gayan , Choudhury, Tanveer
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 45th Annual Conference of the IEEE Industrial Electronics Society, IECON 2019 Vol. 2019-October, p. 5179-5185
- Full Text:
- Reviewed:
- Description: This paper presents a summary of research conducted in performance improvement of Agoraphilic Navigation Algorithm under Dynamic Environment (ANADE). The ANADE is an optimistic navigation algorithm which is capable of navigating robots in static as well as in unknown dynamic environments. ANADE has been successfully extended the capacity of original Agoraphilic algorithm for static environment. However, it could identify that ANADE takes costly decisions when it is used in complex dynamic environments. The proposed algorithm in this paper has been successfully enhanced the performance of ANADE in terms of safe travel, speed variation, path length and travel time. The proposed algorithm uses a prediction methodology to estimate future growing free space passages which can be used for safe navigation of the robot. With motion prediction of moving objects, new set of future driving forces were developed. These forces has been combined with present driving force for safe and efficient navigation. Furthermore, the performances of proposed algorithm (Agoraphilic algorithm with prediction) was compared and benched-marked with ANADE (Without predication) under similar environment conditions. From the investigation results, it was observed that the proposed algorithm extends the effective decision making ability in a complex navigation environment. Moreover, the proposed algorithm navigated the robot in a shorter and quicker path with smooth speed variations. © 2019 IEEE.
- Description: E1
- Authors: Hewawasam, Hasitha , Ibrahim, Yousef , Kahandawa, Gayan , Choudhury, Tanveer
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 45th Annual Conference of the IEEE Industrial Electronics Society, IECON 2019 Vol. 2019-October, p. 5179-5185
- Full Text:
- Reviewed:
- Description: This paper presents a summary of research conducted in performance improvement of Agoraphilic Navigation Algorithm under Dynamic Environment (ANADE). The ANADE is an optimistic navigation algorithm which is capable of navigating robots in static as well as in unknown dynamic environments. ANADE has been successfully extended the capacity of original Agoraphilic algorithm for static environment. However, it could identify that ANADE takes costly decisions when it is used in complex dynamic environments. The proposed algorithm in this paper has been successfully enhanced the performance of ANADE in terms of safe travel, speed variation, path length and travel time. The proposed algorithm uses a prediction methodology to estimate future growing free space passages which can be used for safe navigation of the robot. With motion prediction of moving objects, new set of future driving forces were developed. These forces has been combined with present driving force for safe and efficient navigation. Furthermore, the performances of proposed algorithm (Agoraphilic algorithm with prediction) was compared and benched-marked with ANADE (Without predication) under similar environment conditions. From the investigation results, it was observed that the proposed algorithm extends the effective decision making ability in a complex navigation environment. Moreover, the proposed algorithm navigated the robot in a shorter and quicker path with smooth speed variations. © 2019 IEEE.
- Description: E1
An efficient selective miner consensus protocol in blockchain oriented iot smart monitoring
- Uddin, Ashraf, Stranieri, Andrew, Gondal, Iqbal, Balasubramanian, Venki
- Authors: Uddin, Ashraf , Stranieri, Andrew , Gondal, Iqbal , Balasubramanian, Venki
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 2019 IEEE International Conference on Industrial Technology, ICIT 2019; Melbourne; Australia; 13th-15th February 2019 Vol. 2019-February, p. 1135-1142
- Full Text:
- Reviewed:
- Description: Blockchains have been widely used in Internet of Things(IoT) applications including smart cities, smart home and smart governance to provide high levels of security and privacy. In this article, we advance a Blockchain based decentralized architecture for the storage of IoT data produced from smart home/cities. The architecture includes a secure communication protocol using a sign-encryption technique between power constrained IoT devices and a Gateway. The sign encryption also preserves privacy. We propose that a Software Agent executing on the Gateway selects a Miner node using performance parameters of Miners. Simulations demonstrate that the recommended Miner selection outperforms Proof of Works selection used in Bitcoin and Random Miner Selection.
- Description: Proceedings of the IEEE International Conference on Industrial Technology
- Authors: Uddin, Ashraf , Stranieri, Andrew , Gondal, Iqbal , Balasubramanian, Venki
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 2019 IEEE International Conference on Industrial Technology, ICIT 2019; Melbourne; Australia; 13th-15th February 2019 Vol. 2019-February, p. 1135-1142
- Full Text:
- Reviewed:
- Description: Blockchains have been widely used in Internet of Things(IoT) applications including smart cities, smart home and smart governance to provide high levels of security and privacy. In this article, we advance a Blockchain based decentralized architecture for the storage of IoT data produced from smart home/cities. The architecture includes a secure communication protocol using a sign-encryption technique between power constrained IoT devices and a Gateway. The sign encryption also preserves privacy. We propose that a Software Agent executing on the Gateway selects a Miner node using performance parameters of Miners. Simulations demonstrate that the recommended Miner selection outperforms Proof of Works selection used in Bitcoin and Random Miner Selection.
- Description: Proceedings of the IEEE International Conference on Industrial Technology
Assessing transformer oil quality using deep convolutional networks
- Alam, Mohammad, Karmakar, Gour, Islam, Syed, Kamruzzaman, Joarder, Chetty, Madhu, Lim, Suryani, Appuhamillage, Gayan, Chattopadhyay, Gopi, Wilcox, Steve, Verheyen, Vincent
- Authors: Alam, Mohammad , Karmakar, Gour , Islam, Syed , Kamruzzaman, Joarder , Chetty, Madhu , Lim, Suryani , Appuhamillage, Gayan , Chattopadhyay, Gopi , Wilcox, Steve , Verheyen, Vincent
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 29th Australasian Universities Power Engineering Conference, AUPEC 2019
- Full Text:
- Reviewed:
- Description: Electrical power grids comprise a significantly large number of transformers that interconnect power generation, transmission and distribution. These transformers having different MVA ratings are critical assets that require proper maintenance to provide long and uninterrupted electrical service. The mineral oil, an essential component of any transformer, not only provides cooling but also acts as an insulating medium within the transformer. The quality and the key dissolved properties of insulating mineral oil for the transformer are critical with its proper and reliable operation. However, traditional chemical diagnostic methods are expensive and time-consuming. A transformer oil image analysis approach, based on the entropy value of oil, which is inexpensive, effective and quick. However, the inability of entropy to estimate the vital transformer oil properties such as equivalent age, Neutralization Number (NN), dissipation factor (tanδ) and power factor (PF); and many intuitively derived constants usage limit its estimation accuracy. To address this issue, in this paper, we introduce an innovative transformer oil analysis using two deep convolutional learning techniques such as Convolutional Neural Network (ConvNet) and Residual Neural Network (ResNet). These two deep neural networks are chosen for this project as they have superior performance in computer vision. After estimating the equivalent aging year of transformer oil from its image by our proposed method, NN, tanδ and PF are computed using that estimated age. Our deep learning based techniques can accurately predict the transformer oil equivalent age, leading to calculate NN, tanδ and PF more accurately. The root means square error of estimated equivalent age produced by entropy, ConvNet and ResNet based methods are 0.718, 0.122 and 0.065, respectively. ConvNet and ResNet based methods have reduced the error of the oil age estimation by 83% and 91%, respectively compared to that of the entropy method. Our proposed oil image analysis can calculate the equivalent age that is very close to the actual age for all images used in the experiment. © 2019 IEEE.
- Description: E1
- Authors: Alam, Mohammad , Karmakar, Gour , Islam, Syed , Kamruzzaman, Joarder , Chetty, Madhu , Lim, Suryani , Appuhamillage, Gayan , Chattopadhyay, Gopi , Wilcox, Steve , Verheyen, Vincent
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 29th Australasian Universities Power Engineering Conference, AUPEC 2019
- Full Text:
- Reviewed:
- Description: Electrical power grids comprise a significantly large number of transformers that interconnect power generation, transmission and distribution. These transformers having different MVA ratings are critical assets that require proper maintenance to provide long and uninterrupted electrical service. The mineral oil, an essential component of any transformer, not only provides cooling but also acts as an insulating medium within the transformer. The quality and the key dissolved properties of insulating mineral oil for the transformer are critical with its proper and reliable operation. However, traditional chemical diagnostic methods are expensive and time-consuming. A transformer oil image analysis approach, based on the entropy value of oil, which is inexpensive, effective and quick. However, the inability of entropy to estimate the vital transformer oil properties such as equivalent age, Neutralization Number (NN), dissipation factor (tanδ) and power factor (PF); and many intuitively derived constants usage limit its estimation accuracy. To address this issue, in this paper, we introduce an innovative transformer oil analysis using two deep convolutional learning techniques such as Convolutional Neural Network (ConvNet) and Residual Neural Network (ResNet). These two deep neural networks are chosen for this project as they have superior performance in computer vision. After estimating the equivalent aging year of transformer oil from its image by our proposed method, NN, tanδ and PF are computed using that estimated age. Our deep learning based techniques can accurately predict the transformer oil equivalent age, leading to calculate NN, tanδ and PF more accurately. The root means square error of estimated equivalent age produced by entropy, ConvNet and ResNet based methods are 0.718, 0.122 and 0.065, respectively. ConvNet and ResNet based methods have reduced the error of the oil age estimation by 83% and 91%, respectively compared to that of the entropy method. Our proposed oil image analysis can calculate the equivalent age that is very close to the actual age for all images used in the experiment. © 2019 IEEE.
- Description: E1
Blockchain leveraged task migration in body area sensor networks
- Uddin, Ashraf, Stranieri, Andrew, Gondal, Iqbal, Balasubramanian, Venki
- Authors: Uddin, Ashraf , Stranieri, Andrew , Gondal, Iqbal , Balasubramanian, Venki
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 25th Asia-Pacific Conference on Communications, APCC 2019 p. 177-184
- Full Text:
- Reviewed:
- Description: Blockchain technologies emerging for healthcare support secure health data sharing with greater interoperability among different heterogeneous systems. However, the collection and storage of data generated from Body Area Sensor Net-works(BASN) for migration to high processing power computing services requires an efficient BASN architecture. We present a decentralized BASN architecture that involves devices at three levels; 1) Body Area Sensor Network-medical sensors typically on or in patient's body transmitting data to a Smartphone, 2) Fog/Edge, and 3) Cloud. We propose that a Patient Agent(PA) replicated on the Smartphone, Fog and Cloud servers processes medical data and execute a task offloading algorithm by leveraging a Blockchain. Performance analysis is conducted to demonstrate the feasibility of the proposed Blockchain leveraged, distributed Patient Agent controlled BASN. © 2019 IEEE.
- Description: E1
- Authors: Uddin, Ashraf , Stranieri, Andrew , Gondal, Iqbal , Balasubramanian, Venki
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 25th Asia-Pacific Conference on Communications, APCC 2019 p. 177-184
- Full Text:
- Reviewed:
- Description: Blockchain technologies emerging for healthcare support secure health data sharing with greater interoperability among different heterogeneous systems. However, the collection and storage of data generated from Body Area Sensor Net-works(BASN) for migration to high processing power computing services requires an efficient BASN architecture. We present a decentralized BASN architecture that involves devices at three levels; 1) Body Area Sensor Network-medical sensors typically on or in patient's body transmitting data to a Smartphone, 2) Fog/Edge, and 3) Cloud. We propose that a Patient Agent(PA) replicated on the Smartphone, Fog and Cloud servers processes medical data and execute a task offloading algorithm by leveraging a Blockchain. Performance analysis is conducted to demonstrate the feasibility of the proposed Blockchain leveraged, distributed Patient Agent controlled BASN. © 2019 IEEE.
- Description: E1
Detection and compensation of covert service-degrading intrusions in cyber physical systems through intelligent adaptive control
- Farivar, Faezeh, Haghighi, Mohammad, Barchinezhad, Soheila, Jolfaei, Alireza
- Authors: Farivar, Faezeh , Haghighi, Mohammad , Barchinezhad, Soheila , Jolfaei, Alireza
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 2019 IEEE International Conference on Industrial Technology, ICIT 2019; Melbourne, Australia; 13th-15th February 2019 Vol. 2019-February, p. 1143-1148
- Full Text:
- Reviewed:
- Description: Cyber-Physical Systems (CPS) are playing important roles in the critical infrastructure now. A prominent family of CPSs are networked control systems in which the control and feedback signals are carried over computer networks like the Internet. Communication over insecure networks make system vulnerable to cyber attacks. In this article, we design an intrusion detection and compensation framework based on system/plant identification to fight covert attacks. We collect error statistics of the output estimation during the learning phase of system operation and after that, monitor the system behavior to see if it significantly deviates from the expected outputs. A compensating controller is further designed to intervene and replace the classic controller once the attack is detected. The proposed model is tested on a DC motor as the plant and is put against a deception signal amplification attack over the forward link. Simulation results show that the detection algorithm well detects the intrusion and the compensator is also successful in alleviating the attack effects.
- Authors: Farivar, Faezeh , Haghighi, Mohammad , Barchinezhad, Soheila , Jolfaei, Alireza
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 2019 IEEE International Conference on Industrial Technology, ICIT 2019; Melbourne, Australia; 13th-15th February 2019 Vol. 2019-February, p. 1143-1148
- Full Text:
- Reviewed:
- Description: Cyber-Physical Systems (CPS) are playing important roles in the critical infrastructure now. A prominent family of CPSs are networked control systems in which the control and feedback signals are carried over computer networks like the Internet. Communication over insecure networks make system vulnerable to cyber attacks. In this article, we design an intrusion detection and compensation framework based on system/plant identification to fight covert attacks. We collect error statistics of the output estimation during the learning phase of system operation and after that, monitor the system behavior to see if it significantly deviates from the expected outputs. A compensating controller is further designed to intervene and replace the classic controller once the attack is detected. The proposed model is tested on a DC motor as the plant and is put against a deception signal amplification attack over the forward link. Simulation results show that the detection algorithm well detects the intrusion and the compensator is also successful in alleviating the attack effects.
Generating linked data repositories using UML artifacts
- Authors: Khan, Aqsa , Malik, Saleem
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 1st Intelligent Technologies and Applications, Intap 2018; Bahawalpur, Pakistan; 23rd-25th October 2018; published in Communications in Computer and Information Science book Series Vol. 932, p. 142-152
- Full Text:
- Reviewed:
- Description: The usability of diagrams and models is increasing day by day, because of this we experience problem in searching and accessing from large size repositories of diagrams and models of software systems. This research might be helpful to search and access the diagrams and models in bigger repositories. For this purpose, this research developed linked data repositories which contain UML (Unified Modeling Language) artifacts, these artifacts are being organized with using UML class model. In particular, UML is being broadly applied to data modeling in many application domains, and generating linked data repositories from the UML class model is becoming a challenging task in the context of semantic web. This paper proposes an approach, in which we will build a construction tool by joining the characteristics of RDF (Resource Description Framework) and UML. Firstly we will formally define design artifacts and linked data repositories. After that we will propose a construction tool in which we will extract UML artifacts, these UML class model further transforms into the corresponding RDFs. The generated RDF linked data then will be verified by using W3C RDF, this is a validating service used to generate and verify the RDF triples and graphs. Finally, the proposed construction tool will be implemented with few experiments and research is validated using W3C RDF validating service. The proposed approach aims to give such a design that may facilitate the users to customize linked data repositories so that diagrams and models could be examined from large size data.
- Authors: Khan, Aqsa , Malik, Saleem
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 1st Intelligent Technologies and Applications, Intap 2018; Bahawalpur, Pakistan; 23rd-25th October 2018; published in Communications in Computer and Information Science book Series Vol. 932, p. 142-152
- Full Text:
- Reviewed:
- Description: The usability of diagrams and models is increasing day by day, because of this we experience problem in searching and accessing from large size repositories of diagrams and models of software systems. This research might be helpful to search and access the diagrams and models in bigger repositories. For this purpose, this research developed linked data repositories which contain UML (Unified Modeling Language) artifacts, these artifacts are being organized with using UML class model. In particular, UML is being broadly applied to data modeling in many application domains, and generating linked data repositories from the UML class model is becoming a challenging task in the context of semantic web. This paper proposes an approach, in which we will build a construction tool by joining the characteristics of RDF (Resource Description Framework) and UML. Firstly we will formally define design artifacts and linked data repositories. After that we will propose a construction tool in which we will extract UML artifacts, these UML class model further transforms into the corresponding RDFs. The generated RDF linked data then will be verified by using W3C RDF, this is a validating service used to generate and verify the RDF triples and graphs. Finally, the proposed construction tool will be implemented with few experiments and research is validated using W3C RDF validating service. The proposed approach aims to give such a design that may facilitate the users to customize linked data repositories so that diagrams and models could be examined from large size data.
Improved image analysis methodology for detecting changes in evidence positioning at crime scenes
- Petty, Mark, Teng, Shyh, Murshed, Manzur
- Authors: Petty, Mark , Teng, Shyh , Murshed, Manzur
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 2019 International Conference on Digital Image Computing: Techniques and Applications, DICTA 2019
- Full Text:
- Reviewed:
- Description: This paper proposed an improved methodology to assist forensic investigators in detecting positional change of objects due to crime scene contamination. Either intentionally or by accident, crime scene contamination can occur during the investigation and documentation process. This new proposed methodology utilises an ASIFT-based feature detection algorithm that compares pre- and post-contaminated images of the same scene, taken from different viewpoints. The contention is that the ASIFT registration technique is better suited to real world crime scene photography, being more robust to affine distortion that occurs when capturing images from different viewpoints. The proposed methodology was tested with both the SIFT and ASIFT registration techniques to show that (1) it could identify missing, planted and displaced objects using both SIFT and ASIFT and (2) ASIFT is superior to SIFT in terms of error in displacement estimation, especially for larger viewpoint discrepancies between the pre- and post-contamination images. This supports the contention that our proposed methodology in combination with ASIFT is better suited to handle real world crime scene photography. © 2019 IEEE.
- Description: E1
- Authors: Petty, Mark , Teng, Shyh , Murshed, Manzur
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 2019 International Conference on Digital Image Computing: Techniques and Applications, DICTA 2019
- Full Text:
- Reviewed:
- Description: This paper proposed an improved methodology to assist forensic investigators in detecting positional change of objects due to crime scene contamination. Either intentionally or by accident, crime scene contamination can occur during the investigation and documentation process. This new proposed methodology utilises an ASIFT-based feature detection algorithm that compares pre- and post-contaminated images of the same scene, taken from different viewpoints. The contention is that the ASIFT registration technique is better suited to real world crime scene photography, being more robust to affine distortion that occurs when capturing images from different viewpoints. The proposed methodology was tested with both the SIFT and ASIFT registration techniques to show that (1) it could identify missing, planted and displaced objects using both SIFT and ASIFT and (2) ASIFT is superior to SIFT in terms of error in displacement estimation, especially for larger viewpoint discrepancies between the pre- and post-contamination images. This supports the contention that our proposed methodology in combination with ASIFT is better suited to handle real world crime scene photography. © 2019 IEEE.
- Description: E1
Measuring soil strain using fibre optic sensors
- Costa, Susanga, Kahandawa, Gayan, Chen, Jian, Xue, Jianfeng
- Authors: Costa, Susanga , Kahandawa, Gayan , Chen, Jian , Xue, Jianfeng
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 8th International Congress on Environmental Geotechnics, ICEG 2018; Hangzhou, China; 28th October-1st November 2018; part of the Environmental Science and Engineering book series p. 43-50
- Full Text:
- Reviewed:
- Description: Monitoring subsurface soil movement is important in many geotechnical engineering applications such as stability of slopes, road embankments and settlement in foundations. Soil displacement measurement is also helpful in understanding the formation of shrinkage cracks. Clay soils undergo shrinkage during drying and experience substantial stresses and strains, which results in shrinkage cracks. This paper presents a novel approach to measure soil strain using Fibre Bragg grating (FBG) sensors. In the experiments described, FBG sensors have been used to investigate the strain development in clay during drying. FBG sensors are fabricated in the core region of specially fabricated single mode low-loss germanium doped silicate optical fibres. The grating is the laser-inscribed region with a periodically varying refractive index, which reflects a specific light wavelength. Due to the applied strain, ε, there is a change in the wavelength which can be measured and is directly proposal to strain. Kaolin clay, mixed with water close to the liquid limit, was allowed to dry under room temperature. The specimens were prepared in thin, long linear shrinkage moulds. FBG sensors were placed inside soil at the centre of the specimen. The strain development during drying underwent four phases moving from compression to tension. An oscillating nature of strain was also observed throughout the drying process. Results obtained are useful to develop analytical solutions to describe stress-strain behavior of drying soil. © Springer Nature Singapore Pte Ltd. 2019.
- Authors: Costa, Susanga , Kahandawa, Gayan , Chen, Jian , Xue, Jianfeng
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 8th International Congress on Environmental Geotechnics, ICEG 2018; Hangzhou, China; 28th October-1st November 2018; part of the Environmental Science and Engineering book series p. 43-50
- Full Text:
- Reviewed:
- Description: Monitoring subsurface soil movement is important in many geotechnical engineering applications such as stability of slopes, road embankments and settlement in foundations. Soil displacement measurement is also helpful in understanding the formation of shrinkage cracks. Clay soils undergo shrinkage during drying and experience substantial stresses and strains, which results in shrinkage cracks. This paper presents a novel approach to measure soil strain using Fibre Bragg grating (FBG) sensors. In the experiments described, FBG sensors have been used to investigate the strain development in clay during drying. FBG sensors are fabricated in the core region of specially fabricated single mode low-loss germanium doped silicate optical fibres. The grating is the laser-inscribed region with a periodically varying refractive index, which reflects a specific light wavelength. Due to the applied strain, ε, there is a change in the wavelength which can be measured and is directly proposal to strain. Kaolin clay, mixed with water close to the liquid limit, was allowed to dry under room temperature. The specimens were prepared in thin, long linear shrinkage moulds. FBG sensors were placed inside soil at the centre of the specimen. The strain development during drying underwent four phases moving from compression to tension. An oscillating nature of strain was also observed throughout the drying process. Results obtained are useful to develop analytical solutions to describe stress-strain behavior of drying soil. © Springer Nature Singapore Pte Ltd. 2019.
Multi-source cyber-attacks detection using machine learning
- Taheri, Sona, Gondal, Iqbal, Bagirov, Adil, Harkness, Greg, Brown, Simon, Chi, Chihung
- Authors: Taheri, Sona , Gondal, Iqbal , Bagirov, Adil , Harkness, Greg , Brown, Simon , Chi, Chihung
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 2019 IEEE International Conference on Industrial Technology, ICIT 2019; Melbourne, Australia; 13th-15th February 2019 Vol. 2019-February, p. 1167-1172
- Full Text:
- Reviewed:
- Description: The Internet of Things (IoT) has significantly increased the number of devices connected to the Internet ranging from sensors to multi-source data information. As the IoT continues to evolve with new technologies number of threats and attacks against IoT devices are on the increase. Analyzing and detecting these attacks originating from different sources needs machine learning models. These models provide proactive solutions for detecting attacks and their sources. In this paper, we propose to apply a supervised machine learning classification technique to identify cyber-attacks from each source. More precisely, we apply the incremental piecewise linear classifier that constructs boundary between sources/classes incrementally starting with one hyperplane and adding more hyperplanes at each iteration. The algorithm terminates when no further significant improvement of the separation of sources/classes is possible. The construction and usage of piecewise linear boundaries allows us to avoid any possible overfitting. We apply the incremental piecewise linear classifier on the multi-source real world cyber security data set to identify cyber-attacks and their sources.
- Description: Proceedings of the IEEE International Conference on Industrial Technology
- Authors: Taheri, Sona , Gondal, Iqbal , Bagirov, Adil , Harkness, Greg , Brown, Simon , Chi, Chihung
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 2019 IEEE International Conference on Industrial Technology, ICIT 2019; Melbourne, Australia; 13th-15th February 2019 Vol. 2019-February, p. 1167-1172
- Full Text:
- Reviewed:
- Description: The Internet of Things (IoT) has significantly increased the number of devices connected to the Internet ranging from sensors to multi-source data information. As the IoT continues to evolve with new technologies number of threats and attacks against IoT devices are on the increase. Analyzing and detecting these attacks originating from different sources needs machine learning models. These models provide proactive solutions for detecting attacks and their sources. In this paper, we propose to apply a supervised machine learning classification technique to identify cyber-attacks from each source. More precisely, we apply the incremental piecewise linear classifier that constructs boundary between sources/classes incrementally starting with one hyperplane and adding more hyperplanes at each iteration. The algorithm terminates when no further significant improvement of the separation of sources/classes is possible. The construction and usage of piecewise linear boundaries allows us to avoid any possible overfitting. We apply the incremental piecewise linear classifier on the multi-source real world cyber security data set to identify cyber-attacks and their sources.
- Description: Proceedings of the IEEE International Conference on Industrial Technology
Privacy and Security of Connected Vehicles in Intelligent Transportation System
- Jolfaei, Alireza, Kant, Krishna
- Authors: Jolfaei, Alireza , Kant, Krishna
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume, DSN-S 2019, Portland, United States; 24-27 June 2019. p. 9-10
- Full Text:
- Reviewed:
- Description: The paper considers data security and privacy issues in intelligent transportation systems which involve data streams coming out from individual vehicles to road side units. In this environment, there are issues in regards to the scalability of key management and computation limitations at the edge of the network. To address these issues, we suggest the formation of groups in the vehicular layer, where a group leader is assigned to communicate with group members and the road side unit. We propose a lightweight permutation mechanism for preserving the confidentiality and privacy of sensory data. © 2019 IEEE.
- Description: E1
- Authors: Jolfaei, Alireza , Kant, Krishna
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume, DSN-S 2019, Portland, United States; 24-27 June 2019. p. 9-10
- Full Text:
- Reviewed:
- Description: The paper considers data security and privacy issues in intelligent transportation systems which involve data streams coming out from individual vehicles to road side units. In this environment, there are issues in regards to the scalability of key management and computation limitations at the edge of the network. To address these issues, we suggest the formation of groups in the vehicular layer, where a group leader is assigned to communicate with group members and the road side unit. We propose a lightweight permutation mechanism for preserving the confidentiality and privacy of sensory data. © 2019 IEEE.
- Description: E1
PU-shapelets : Towards pattern-based positive unlabeled classification of time series
- Liang, Shen, Zhang, Yanchun, Ma, Jiangang
- Authors: Liang, Shen , Zhang, Yanchun , Ma, Jiangang
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 24th International Conference on Database Systems for Advanced Applications, DASFAA 2019; Chiang Mai, Thailand; 22nd-25th April 2019; part of the Lecture Notes in Computer Science book series, also part of the Information Systems and Applications, incl. Internet/Web and HCI sub series Vol. 11446 LNCS, p. 87-103
- Full Text:
- Reviewed:
- Description: Real-world time series classification applications often involve positive unlabeled (PU) training data, where there are only a small set PL of positive labeled examples and a large set U of unlabeled ones. Most existing time series PU classification methods utilize all readings in the time series, making them sensitive to non-characteristic readings. Characteristic patterns named shapelets present a promising solution to this problem, yet discovering shapelets under PU settings is not easy. In this paper, we take on the challenging task of shapelet discovery with PU data. We propose a novel pattern ensemble technique utilizing both characteristic and non-characteristic patterns to rank U examples by their possibilities of being positive. We also present a novel stopping criterion to estimate the number of positive examples in U. These enable us to effectively label all U training examples and conduct supervised shapelet discovery. The shapelets are then used to build a one-nearest-neighbor classifier for online classification. Extensive experiments demonstrate the effectiveness of our method.
- Description: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
- Authors: Liang, Shen , Zhang, Yanchun , Ma, Jiangang
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 24th International Conference on Database Systems for Advanced Applications, DASFAA 2019; Chiang Mai, Thailand; 22nd-25th April 2019; part of the Lecture Notes in Computer Science book series, also part of the Information Systems and Applications, incl. Internet/Web and HCI sub series Vol. 11446 LNCS, p. 87-103
- Full Text:
- Reviewed:
- Description: Real-world time series classification applications often involve positive unlabeled (PU) training data, where there are only a small set PL of positive labeled examples and a large set U of unlabeled ones. Most existing time series PU classification methods utilize all readings in the time series, making them sensitive to non-characteristic readings. Characteristic patterns named shapelets present a promising solution to this problem, yet discovering shapelets under PU settings is not easy. In this paper, we take on the challenging task of shapelet discovery with PU data. We propose a novel pattern ensemble technique utilizing both characteristic and non-characteristic patterns to rank U examples by their possibilities of being positive. We also present a novel stopping criterion to estimate the number of positive examples in U. These enable us to effectively label all U training examples and conduct supervised shapelet discovery. The shapelets are then used to build a one-nearest-neighbor classifier for online classification. Extensive experiments demonstrate the effectiveness of our method.
- Description: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Security hardening of implantable cardioverter defibrillators
- Jaffar, Iram, Usman, Muhammad, Jolfaei, Alireza
- Authors: Jaffar, Iram , Usman, Muhammad , Jolfaei, Alireza
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 2019 IEEE International Conference on Industrial Technology, ICIT 2019; Melbourne, Australia; 13th-15th February 2019 Vol. 2019-February, p. 1173-1178
- Full Text:
- Reviewed:
- Description: Contemporary healthcare has witnessed a wide deployment of Implantable Cardioverter Defibrillators (ICDs), which have the capability to be controlled remotely, making them equally accessible from both home and hospitals. The therapeutic benefits of ICDs seem to outweigh potential security concerns, yet overlooking the presence of malicious attacks cannot be justified. This study investigates the scenario where an adversary falsifies a controller command and sends instructions to issue high electric shocks in succession. We propose a novel security hardening mechanism to protect data communications between ICD and controller from malicious data manipulations. Our proposed method verifies the correctness of an external command with respect to the history of heart rhythms. The proposed method is evaluated using real data. Multi-aspect analyses show the effectiveness of the proposed scheme.
- Description: Proceedings of the IEEE International Conference on Industrial Technology
- Authors: Jaffar, Iram , Usman, Muhammad , Jolfaei, Alireza
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 2019 IEEE International Conference on Industrial Technology, ICIT 2019; Melbourne, Australia; 13th-15th February 2019 Vol. 2019-February, p. 1173-1178
- Full Text:
- Reviewed:
- Description: Contemporary healthcare has witnessed a wide deployment of Implantable Cardioverter Defibrillators (ICDs), which have the capability to be controlled remotely, making them equally accessible from both home and hospitals. The therapeutic benefits of ICDs seem to outweigh potential security concerns, yet overlooking the presence of malicious attacks cannot be justified. This study investigates the scenario where an adversary falsifies a controller command and sends instructions to issue high electric shocks in succession. We propose a novel security hardening mechanism to protect data communications between ICD and controller from malicious data manipulations. Our proposed method verifies the correctness of an external command with respect to the history of heart rhythms. The proposed method is evaluated using real data. Multi-aspect analyses show the effectiveness of the proposed scheme.
- Description: Proceedings of the IEEE International Conference on Industrial Technology
Vulnerability modelling for hybrid IT systems
- Ur-Rehman, Attiq, Gondal, Iqbal, Kamruzzuman, Joarder, Jolfaei, Alireza
- Authors: Ur-Rehman, Attiq , Gondal, Iqbal , Kamruzzuman, Joarder , Jolfaei, Alireza
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 2019 IEEE International Conference on Industrial Technology, ICIT 2019; Melbourne, Australia; 13th-15th February 2019 Vol. 2019-February, p. 1186-1191
- Full Text:
- Reviewed:
- Description: Common vulnerability scoring system (CVSS) is an industry standard that can assess the vulnerability of nodes in traditional computer systems. The metrics computed by CVSS would determine critical nodes and attack paths. However, traditional IT security models would not fit IoT embedded networks due to distinct nature and unique characteristics of IoT systems. This paper analyses the application of CVSS for IoT embedded systems and proposes an improved vulnerability scoring system based on CVSS v3 framework. The proposed framework, named CVSSIoT, is applied to a realistic IT supply chain system and the results are compared with the actual vulnerabilities from the national vulnerability database. The comparison result validates the proposed model. CVSSIoT is not only effective, simple and capable of vulnerability evaluation for traditional IT system, but also exploits unique characteristics of IoT devices.
- Description: Proceedings of the IEEE International Conference on Industrial Technology
- Authors: Ur-Rehman, Attiq , Gondal, Iqbal , Kamruzzuman, Joarder , Jolfaei, Alireza
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 2019 IEEE International Conference on Industrial Technology, ICIT 2019; Melbourne, Australia; 13th-15th February 2019 Vol. 2019-February, p. 1186-1191
- Full Text:
- Reviewed:
- Description: Common vulnerability scoring system (CVSS) is an industry standard that can assess the vulnerability of nodes in traditional computer systems. The metrics computed by CVSS would determine critical nodes and attack paths. However, traditional IT security models would not fit IoT embedded networks due to distinct nature and unique characteristics of IoT systems. This paper analyses the application of CVSS for IoT embedded systems and proposes an improved vulnerability scoring system based on CVSS v3 framework. The proposed framework, named CVSSIoT, is applied to a realistic IT supply chain system and the results are compared with the actual vulnerabilities from the national vulnerability database. The comparison result validates the proposed model. CVSSIoT is not only effective, simple and capable of vulnerability evaluation for traditional IT system, but also exploits unique characteristics of IoT devices.
- Description: Proceedings of the IEEE International Conference on Industrial Technology
An Attention-Based Approach for Single Image Super Resolution
- Liu, Yuan, Wang, Yuancheng, Li, Nan, Cheng, Xu, Zhang, Yifeng, Huang, Yongming, Lu, Guojun
- Authors: Liu, Yuan , Wang, Yuancheng , Li, Nan , Cheng, Xu , Zhang, Yifeng , Huang, Yongming , Lu, Guojun
- Date: 2018
- Type: Text , Conference proceedings , Conference paper
- Relation: 2018 24th International Conference on Pattern Recognition, ICPR 2018; Beijing, China; 20th-24th August 2018 Vol. 2018, p. 2777-2784
- Full Text:
- Reviewed:
- Description: The main challenge of single image super resolution (SISR) is the recovery of high frequency details such as tiny textures. However, most of the state-of-the-art methods lack specific modules to identify high frequency areas, causing the output image to be blurred. We propose an attention-based approach to give a discrimination between texture areas and smooth areas. After the positions of high frequency details are located, high frequency compensation is carried out. This approach can incorporate with previously proposed SISR networks. By providing high frequency enhancement, better performance and visual effect are achieved. We also propose our own SISR network composed of DenseRes blocks. The block provides an effective way to combine the low level features and high level features. Extensive benchmark evaluation shows that our proposed method achieves significant improvement over the state-of-the-art works in SISR.
- Authors: Liu, Yuan , Wang, Yuancheng , Li, Nan , Cheng, Xu , Zhang, Yifeng , Huang, Yongming , Lu, Guojun
- Date: 2018
- Type: Text , Conference proceedings , Conference paper
- Relation: 2018 24th International Conference on Pattern Recognition, ICPR 2018; Beijing, China; 20th-24th August 2018 Vol. 2018, p. 2777-2784
- Full Text:
- Reviewed:
- Description: The main challenge of single image super resolution (SISR) is the recovery of high frequency details such as tiny textures. However, most of the state-of-the-art methods lack specific modules to identify high frequency areas, causing the output image to be blurred. We propose an attention-based approach to give a discrimination between texture areas and smooth areas. After the positions of high frequency details are located, high frequency compensation is carried out. This approach can incorporate with previously proposed SISR networks. By providing high frequency enhancement, better performance and visual effect are achieved. We also propose our own SISR network composed of DenseRes blocks. The block provides an effective way to combine the low level features and high level features. Extensive benchmark evaluation shows that our proposed method achieves significant improvement over the state-of-the-art works in SISR.
Analysis of Classifiers for Prediction of Type II Diabetes Mellitus
- Barhate, Rahul, Kulkarni, Pradnya
- Authors: Barhate, Rahul , Kulkarni, Pradnya
- Date: 2018
- Type: Text , Conference proceedings , Conference paper
- Relation: 4th International Conference on Computing, Communication Control and Automation, ICCUBEA 2018
- Full Text:
- Reviewed:
- Description: Diabetes mellitus is a chronic disease and a health challenge worldwide. According to the International Diabetes Federation, 451 million people across the globe have diabetes, with this number anticipated to rise up to 693 million people by 2045. It has been shown that 80% of the complications arising from type II diabetes can be prevented or delayed by early identification of the people who are at risk. Diabetes is difficult to diagnose in the early stages as its symptoms grow subtly and gradually. In a majority of the cases, the patients remain undiagnosed until they are admitted for a heart attack or begin to lose their sight. This paper analyzes the different classification algorithms based on a patient's health history to aid doctors identify the presence of as well as promote early diagnosis and treatment. The experiments were conducted on Pima Indian Diabetes data set. Various classifiers used include K Nearest Neighbors, Logistic Regression, Decision Trees, Random Forest, Gradient Boosting, Support Vector Machine and Neural Network. Results demonstrate that Random Forests performed well on the data set giving an accuracy of 79.7%. © 2018 IEEE.
- Description: E1
- Authors: Barhate, Rahul , Kulkarni, Pradnya
- Date: 2018
- Type: Text , Conference proceedings , Conference paper
- Relation: 4th International Conference on Computing, Communication Control and Automation, ICCUBEA 2018
- Full Text:
- Reviewed:
- Description: Diabetes mellitus is a chronic disease and a health challenge worldwide. According to the International Diabetes Federation, 451 million people across the globe have diabetes, with this number anticipated to rise up to 693 million people by 2045. It has been shown that 80% of the complications arising from type II diabetes can be prevented or delayed by early identification of the people who are at risk. Diabetes is difficult to diagnose in the early stages as its symptoms grow subtly and gradually. In a majority of the cases, the patients remain undiagnosed until they are admitted for a heart attack or begin to lose their sight. This paper analyzes the different classification algorithms based on a patient's health history to aid doctors identify the presence of as well as promote early diagnosis and treatment. The experiments were conducted on Pima Indian Diabetes data set. Various classifiers used include K Nearest Neighbors, Logistic Regression, Decision Trees, Random Forest, Gradient Boosting, Support Vector Machine and Neural Network. Results demonstrate that Random Forests performed well on the data set giving an accuracy of 79.7%. © 2018 IEEE.
- Description: E1
Enhanced colour image retrieval with cuboid segmentation
- Murshed, Manzur, Karmakar, Priyabrata, Teng, Shyh, Lu, Guojun
- Authors: Murshed, Manzur , Karmakar, Priyabrata , Teng, Shyh , Lu, Guojun
- Date: 2018
- Type: Text , Conference proceedings , Conference paper
- Relation: 2018 International Conference on Digital Image Computing: Techniques and Applications, DICTA 2018; Canberra, Australia; 10th-13th December 2018
- Full Text:
- Reviewed:
- Description: In this paper, we further investigate our recently proposed cuboid image segmentation algorithm for effective image retrieval. Instead of using all cuboids (i.e. segments), we have proposed two approaches to choose different subsets of cuboids appropriately. With the experimental results on eBay dataset, we have shown that our proposals outperform retrieval performance of the existing technique. In addition, we have investigated how many segments are required for the most effective image retrieval and provide a quick method to determine the suitable number of cuboids.
- Description: 2018 International Conference on Digital Image Computing: Techniques and Applications, DICTA 2018
- Authors: Murshed, Manzur , Karmakar, Priyabrata , Teng, Shyh , Lu, Guojun
- Date: 2018
- Type: Text , Conference proceedings , Conference paper
- Relation: 2018 International Conference on Digital Image Computing: Techniques and Applications, DICTA 2018; Canberra, Australia; 10th-13th December 2018
- Full Text:
- Reviewed:
- Description: In this paper, we further investigate our recently proposed cuboid image segmentation algorithm for effective image retrieval. Instead of using all cuboids (i.e. segments), we have proposed two approaches to choose different subsets of cuboids appropriately. With the experimental results on eBay dataset, we have shown that our proposals outperform retrieval performance of the existing technique. In addition, we have investigated how many segments are required for the most effective image retrieval and provide a quick method to determine the suitable number of cuboids.
- Description: 2018 International Conference on Digital Image Computing: Techniques and Applications, DICTA 2018
Experimental evaluation of methods for reclaiming sulfur loaded amine absorbents
- Garg, Bharti, Pearson, Pauline, Cousins, Ashleigh, Verheyen, Vincent, Puxty, Graeme, Feron, Paul
- Authors: Garg, Bharti , Pearson, Pauline , Cousins, Ashleigh , Verheyen, Vincent , Puxty, Graeme , Feron, Paul
- Date: 2018
- Type: Text , Conference proceedings , Conference paper
- Relation: 14th Greenhouse Gas Control Technologies Conference (GHGT-14); Melbourne, Australia; 21st-26th October 2018 p. 1-8
- Full Text:
- Reviewed:
- Description: Sulfur dioxide (SO2) is a major flue gas contaminant that has a direct effect on the performance of amine-based carbon dioxide capture units operating on power plant flue gases. In many countries, flue gas desulfurisation (FGD) is an essential upstream requirement to CO2 capture systems, thereby increasing the overall operational and capital cost of the capture system. In Australia, the efficacy of CO2 capture may be compromised by the accumulation of SO2 in the absorption solvent. CSIRO’s CS-Cap process is designed to capture of both these acidic gases in one absorption column, thereby eliminating the need for a separate FGD unit which could potentially save millions of dollars. Previous research at CSIRO’s post-combustion capture pilot plant at Loy Yang power station has shown that mono-ethanolamine (MEA) solvent absorbs both CO2 and SO2, resulting in a spent amine absorbent rich in sulfates. Further development of the CS-Cap concept requires a deeper understanding of the properties of the sulfate-rich absorbent and the conditions under which it can be effectively regenerated. In the present study, thermal reclamation and reactive crystallisation processes were investigated, allowing the parameters affecting the regeneration of sulfate-loaded amine to be identified. It was found that amine losses were considerably higher in thermal reclamation than in reactive precipitation. During thermal reclamation, vacuum conditions were more effective than atmospheric, and pH of the initial solution played a significant role in recovery of MEA from the sulfate-rich absorbent. Reactive crystallisation could be effectively accomplished with the addition of KOH. An advantage of this process was that high purity K2SO4 crystals (~99%) were formed, despite the presence of degradation products in the solvent.
- Authors: Garg, Bharti , Pearson, Pauline , Cousins, Ashleigh , Verheyen, Vincent , Puxty, Graeme , Feron, Paul
- Date: 2018
- Type: Text , Conference proceedings , Conference paper
- Relation: 14th Greenhouse Gas Control Technologies Conference (GHGT-14); Melbourne, Australia; 21st-26th October 2018 p. 1-8
- Full Text:
- Reviewed:
- Description: Sulfur dioxide (SO2) is a major flue gas contaminant that has a direct effect on the performance of amine-based carbon dioxide capture units operating on power plant flue gases. In many countries, flue gas desulfurisation (FGD) is an essential upstream requirement to CO2 capture systems, thereby increasing the overall operational and capital cost of the capture system. In Australia, the efficacy of CO2 capture may be compromised by the accumulation of SO2 in the absorption solvent. CSIRO’s CS-Cap process is designed to capture of both these acidic gases in one absorption column, thereby eliminating the need for a separate FGD unit which could potentially save millions of dollars. Previous research at CSIRO’s post-combustion capture pilot plant at Loy Yang power station has shown that mono-ethanolamine (MEA) solvent absorbs both CO2 and SO2, resulting in a spent amine absorbent rich in sulfates. Further development of the CS-Cap concept requires a deeper understanding of the properties of the sulfate-rich absorbent and the conditions under which it can be effectively regenerated. In the present study, thermal reclamation and reactive crystallisation processes were investigated, allowing the parameters affecting the regeneration of sulfate-loaded amine to be identified. It was found that amine losses were considerably higher in thermal reclamation than in reactive precipitation. During thermal reclamation, vacuum conditions were more effective than atmospheric, and pH of the initial solution played a significant role in recovery of MEA from the sulfate-rich absorbent. Reactive crystallisation could be effectively accomplished with the addition of KOH. An advantage of this process was that high purity K2SO4 crystals (~99%) were formed, despite the presence of degradation products in the solvent.