Abry, P, Borgnat, P, Ricciato, F, Scherrer, A & Veitch, D 2010, 'Revisiting an old friend: on the observability of the relation between long range dependence and heavy tail', Telecommunication Systems, vol. 43, no. 3-4, pp. 147-165.
View/Download from: Publisher's site
Al Amri, H, Abolhasan, M & Wysocki, T 2010, 'Scalability of MANET routing protocols for heterogeneous and homogenous networks', COMPUTERS & ELECTRICAL ENGINEERING, vol. 36, no. 4, pp. 752-765.
View/Download from: Publisher's site
View description>>
In Mobile Ad hoc Network (MANET), mobility, traffic and node density are main network conditions that significantly affect performance of routing protocols. Much of the previous research in MANET routing have focused on developing strategies, which suit one specific networking scenario. Therefore, there is no existing protocol that can work well in all different networking scenarios. This paper reviews characteristics of several different classes of routing protocols. Moreover, most of current routing protocols assume homogeneous networking conditions where all nodes have the same capabilities and resources. This paper presents extensive studies simulations for DSR, AODV, LAR1, FSR and WRP in homogenous and heterogeneous networks that consist of different nodes with different resources. The results showed that while all protocols perform reasonably well in homogenous networking conditions, their performance suffer significantly over heterogonous networks.
Cai, Y, Guo, YJ & Weily, AR 2010, 'A Frequency-Reconfigurable Quasi-Yagi Dipole Antenna', IEEE Antennas and Wireless Propagation Letters, vol. 9, pp. 883-886.
View/Download from: Publisher's site
View description>>
A new frequency-reconfigurable quasi-Yagi dipole antenna is presented. It consists of a driven dipole element with two varactors in two arms, a director with an additional varactor, a truncated ground plane reflector, a microstrip-to-coplanar-stripline (CPS) transition, and a novel biasing circuit. The effective electrical length of the director element and that of the driven arms are adjusted together by changing the biasing voltages. A 35% continuously frequency-tuning bandwidth, from 1.80 to 2.45 GHz, is achieved. This covers a number of wireless communication systems, including 3G UMTS, US WCS, and WLAN. The length-adjustable director allows the endfire pattern with relatively high gain to be maintained over the entire tuning bandwidth. Measured results show that the gain varies from 5.6 to 7.6 dBi and the front-to-back ratio is better than 10 dB. The H-plane cross polarization is below -15 dB, and that in the E-plane is below -20 dB. © 2006 IEEE.
Cai, Y, Guo, YJ, Qin, PY, Weily, AR & IEEE 2010, 'Frequency Reconfigurable Quasi-Yagi Dipole Antenna', 2010 IEEE ANTENNAS AND PROPAGATION SOCIETY INTERNATIONAL SYMPOSIUM, vol. 58, pp. 2742-2747.
Chaczko, Z, Aboura, K & Agbinya, J 2010, 'Software Engineering for Mapping Radio Frequency Pollution', International Journal of Electronics and Telecommunications, vol. 56, no. 2, pp. 129-136.
View/Download from: Publisher's site
View description>>
Software Engineering for Mapping Radio Frequency PollutionElectromagnetic fields radiation has raised concerns within several segments of the population in the past three decades. Many studies proved inconclusive, in part due to the scarcity of data. We propose the idea of a geographical model based radiation pollution database. We discuss networked sensing technology for detection and monitoring of electromagnetic fields. We elaborate on software engineering issues for the visualization in real time of electromagnetic field mappings and the dissemination of information through various means and levels of access. We propose the database be complimented by a data algorithmic software solution for the extraction of patterns.
Chiu, C, Chaczko, Z & Moses, P 2010, 'Sensor Actor Network Modeling utilizing the Holonic Architectural Framework', International Journal of Electronics and Telecommunications, vol. 56, no. 1, pp. 49-54.
View/Download from: Publisher's site
View description>>
Sensor Actor Network Modeling utilizing the Holonic Architectural FrameworkThis paper discusses the results of utilizing advanced EKM modeling techniques to manage Sensor-Actor networks (SANETs) based upon the Holonic Architectural Framework. EKMs allow a quantitative analysis of an algorithmic artificial neural network process by using an indirect-mapping EKM to self-organize from a given input space to administer SANET routing and clustering functions with a control parameter space. Results demonstrate that in comparison to linear approximation techniques, indirect mapping with EKMs provide fluid control and feedback mechanisms by operating in a continuous sensory control space - thus enabling interactive detection and optimization of events in real-time environments.
Da Xu, RY & Kemp, M 2010, 'Fitting Multiple Connected Ellipses to an Image Silhouette Hierarchically', IEEE Transactions on Image Processing, vol. 19, no. 7, pp. 1673-1682.
View/Download from: Publisher's site
View description>>
In this paper, we seek to fit a model, specified in terms of connected ellipses, to an image silhouette. Some algorithms that have attempted this problem are sensitive to initial guesses and also may converge to a wrong solution when they attempt to mini
Ding, F, Huang, X, Wen, B & Yan, Z 2010, 'Aliasing radar receiver in FMICW system', IEICE Electronics Express, vol. 7, no. 10, pp. 697-703.
View/Download from: Publisher's site
Ge, Y, Esselle, KP & Bird, TS 2010, 'A METHOD TO DESIGN DUAL-BAND, HIGH-DIRECTIVITY EBG RESONATOR ANTENNAS USING SINGLE-RESONANT, SINGLE-LAYER PARTIALLY REFLECTIVE SURFACES', Progress In Electromagnetics Research C, vol. 13, pp. 245-257.
View/Download from: Publisher's site
View description>>
A new method is presented to design dual-band, high- directivity, EBG-resonator antennas using simple, single-resonant, single-layer partially reflective surfaces (PRS). The large, positive gradient of the reflection phase versus frequency curve of partially reflecting surfaces, observed only close to the resonance frequency of the PRS, is exploited for this purpose. An example single-resonant PRS, based on a frequency-selective surface (FSS) composed of a printed slot array, was designed. Then it is used to design an EBG- resonator antenna to demonstrate the feasibility of achieving dual-band performance. Cavity models are employed, together with the reflection characteristics of the PRS, to understand the operation of the device at critical frequencies such as cavity resonance frequencies and the PRS resonance frequency. Antenna simulations and computed results confirm the dual-band operation of this very simple, single-layer, low- profile EBG-resonator antenna. It resonates in two bands centered at 10.5 GHz and 12.3 GHz. The peak directivity in each band is 18.2 dBi and 20.5 dBi, and the 3 dB directivity bandwidth of each band is 7.5% and 8.7%, respectively.
Geng, X, Smith-Miles, K, Wang, L, Li, M & Wu, Q 2010, 'Context-aware fusion: A case study on fusion of gait and face for human identification in video', Pattern Recognition, vol. 43, no. 10, pp. 3660-3673.
View/Download from: Publisher's site
View description>>
Most work on multi-biometric fusion is based on static fusion rules. One prominent limitation of static fusion is that it cannot respond to the changes of the environment or the individual users. This paper proposes context-aware multi-biometric fusion, which can dynamically adapt the fusion rules to the real-time context. As a typical application, the context-aware fusion of gait and face for human identification in video is investigated. Two significant context factors that may affect the relationship between gait and face in the fusion are considered, i.e., view angle and subject-to-camera distance. Fusion methods adaptable to these two factors based on either prior knowledge or machine learning are proposed and tested. Experimental results show that the context-aware fusion methods perform significantly better than not only the individual biometric traits, but also those widely adopted static fusion rules including SUM, PRODUCT, MIN, and MAX. Moreover, context-aware fusion based on machine learning shows superiority over that based on prior knowledge. © 2010 Elsevier Ltd. All rights reserved.
Hayman, DB, Bird, TS, Esselle, KP & Hall, PJ 2010, 'Experimental Demonstration of Focal Plane Array Beamforming in a Prototype Radiotelescope', IEEE Transactions on Antennas and Propagation, vol. 58, no. 6, pp. 1922-1934.
View/Download from: Publisher's site
Huang, X, Guo, YJ & Bunton, JD 2010, 'A hybrid adaptive antenna array', IEEE Transactions on Wireless Communications, vol. 9, no. 5, pp. 1770-1779.
View/Download from: Publisher's site
View description>>
Owing to the excessive demand on signal processing and space constraint, a full digital implementation of a large adaptive antenna array at millimeter wave frequencies is very challenging. Targeted at long range high data rate point-topoint link in the 70/80 GHz bands, a novel hybrid adaptive antenna array which consists of analogue subarrays followed by a digital beamformer is presented in this paper to overcome the digital implementation difficulty. Two subarray configurations, the interleaved subarray and the side-by-side subarray, are proposed, and two Doppler resilient adaptive angle-of-arrival estimation and beamforming algorithms, the differential beam tracking (DBT) and the differential beam search (DBS), are developed. Simulation results on the DBT and DBS performance are provided using a 64 element hybrid planar array of four 4 by 4 element subarrays with the two subarray configurations, respectively. Recursive mean square error (MSE) bounds of the developed algorithms are also analyzed and compared with simulated MSEs. © 2006 IEEE.
Huang, X, Wen, B & Ding, F 2010, 'Ship detection and tracking using multi-frequency HFSWR', IEICE Electronics Express, vol. 7, no. 6, pp. 410-415.
View/Download from: Publisher's site
Liu, RP, Sutton, GJ & Collings, IB 2010, 'A New Queueing Model for QoS Analysis of IEEE 802.11 DCF with Finite Buffer and Load', IEEE Transactions on Wireless Communications, vol. 9, no. 8, pp. 2664-2675.
View/Download from: Publisher's site
Ma, M, Huang, X & Guo, Y 2010, 'An interference self-cancellation technique for SC-FDMA systems', IEEE Communications Letters, vol. 14, no. 6, pp. 512-514.
View/Download from: Publisher's site
View description>>
A new interference self-cancellation (ISC) method for Single Carrier-FDMA (SC-FDMA) systems is proposed to mitigate the inter-user interference caused by frequency offset or Doppler effect. By transmitting a compensation symbol at the first symbol location in each resource block, the energy leakage can be significantly suppressed. With little bandwidth and power sacrifice, the proposed method can greatly improve the system robustness against frequency offset. Simulation results show that the signal-to-interference ratio (SIR) can be improved by 7 dB on average for the entire system band, and up to 11.7 dB for an individual user. © 2010 IEEE.
Nikodem, J, Klempous, R, Nikodem, M, Woda, M & Chaczko, Z 2010, 'Directed Cooperation in Multihop Wireless Sensors Network', International Journal of Electronics and Telecommunications, vol. 56, no. 1, pp. 7-12.
View/Download from: Publisher's site
View description>>
Directed Cooperation in Multihop Wireless Sensors NetworkThis paper proposes a relational abstraction for Wireless Sensors Network where node can identify its neighbors around it. Because of limited radio link range only some of nodes have a direct contact with the base station and transmission is carried out in a multihop way so information is send from one node to another towards the BS. We propose a relation π that represents cooperation between nodes and takes advantages of topological properties of the network. Based on the hop-distance from the BS any nodekcan determine a setN<(k) that consists of nodes to which/kshould send messages in order to retain a data-flow direction towards the BS.
Paisitkriangkrai, S, Shen, C & Zhang, J 2010, 'Incremental Training of a Detector Using Online Sparse Eigen-decomposition', IEEE Transactions on Image Processing, vol. 20, no. 1, pp. 213-226.
View/Download from: Publisher's site
View description>>
The ability to efficiently and accurately detect objects plays a very crucialrole for many computer vision tasks. Recently, offline object detectors haveshown a tremendous success. However, one major drawback of offline techniquesis that a complete set of training data has to be collected beforehand. Inaddition, once learned, an offline detector can not make use of newly arrivingdata. To alleviate these drawbacks, online learning has been adopted with thefollowing objectives: (1) the technique should be computationally and storageefficient; (2) the updated classifier must maintain its high classificationaccuracy. In this paper, we propose an effective and efficient framework forlearning an adaptive online greedy sparse linear discriminant analysis (GSLDA)model. Unlike many existing online boosting detectors, which usually applyexponential or logistic loss, our online algorithm makes use of LDA's learningcriterion that not only aims to maximize the class-separation criterion butalso incorporates the asymmetrical property of training data distributions. Weprovide a better alternative for online boosting algorithms in the context oftraining a visual object detector. We demonstrate the robustness and efficiencyof our methods on handwriting digit and face data sets. Our results confirmthat object detection tasks benefit significantly when trained in an onlinemanner.
Pin, F, Veitch, D & Kauffmann, B 2010, 'Statistical estimation of delays in a multicast tree using accelerated EM', Queueing Systems, vol. 66, no. 4, pp. 369-412.
View/Download from: Publisher's site
Qin, P-Y, Guo, YJ & Liang, C-H 2010, 'Effect of Antenna Polarization Diversity on MIMO System Capacity', IEEE ANTENNAS AND WIRELESS PROPAGATION LETTERS, vol. 9, pp. 1092-1095.
View/Download from: Publisher's site
Qin, P-Y, Weily, AR, Guo, YJ & Liang, C-H 2010, 'Polarization Reconfigurable U-Slot Patch Antenna', IEEE TRANSACTIONS ON ANTENNAS AND PROPAGATION, vol. 58, no. 10, pp. 3383-3388.
View/Download from: Publisher's site
Qin, P-Y, Weily, AR, Guo, YJ, Bird, TS & Liang, C-H 2010, 'Frequency Reconfigurable Quasi-Yagi Folded Dipole Antenna', IEEE TRANSACTIONS ON ANTENNAS AND PROPAGATION, vol. 58, no. 8, pp. 2742-2747.
View/Download from: Publisher's site
Ridoux, J & Veitch, D 2010, 'Principles of robust timing over the internet', Queue, vol. 8, pp. 30-30.
Ridoux, J & Veitch, D 2010, 'Principles of robust timing over the internet', Communications of the ACM, vol. 53, no. 5, pp. 54-61.
View/Download from: Publisher's site
View description>>
The key to synchronizing clocks over networks is taming delay variability.
Ridoux, J & Veitch, D 2010, 'Principles of Robust Timing over the Internet', Queue, vol. 8, no. 4, pp. 30-43.
View/Download from: Publisher's site
View description>>
Everyone, and most everything, needs a clock, and computers are no exception. Clocks tend to drift off if left to themselves, however, so it is necessary to bring them to heel periodically through synchronizing to some other reference clock of higher accuracy. An inexpensive and convenient way to do this is over a computer network.
Rosberg, Z, Liu, RP, Dinh, TL, Dong, Y & Jha, S 2010, 'Statistical reliability for energy efficient data transport in wireless sensor networks.', Wirel. Networks, vol. 16, no. 7, pp. 1913-1927.
View/Download from: Publisher's site
Shang, F, Xiong, A, Abolhasan, M & Wysocki, T 2010, 'An unequal clustering protocol for wireless sensor networks', Journal of Computational Information Systems, vol. 6, no. 2, pp. 477-486.
View/Download from: Publisher's site
View description>>
In this paper, a Single-Hop Unequal Clustering (SHUC) algorithm is proposed for wireless sensor networks. The SHUC algorithm consists of three different parts. Firstly, an average energy factor is introduced to balance the residual energy of the whole network during the tentative cluster-head selection process, which improves the network energy efficiency. Secondly, a cost function is proposed to balance energy-efficiency of each node. Finally, an unequal clustering algorithm is proposed for single-hop homogeneous networks. Through both theoretical analysis and numerical results, it is shown that SHUC prolongs the network lifetime significantly against other clustering protocols such as LEACH-C and EECS. Under general instance, SHUC may prolong the lifetime by up to 30% against EECS and 70% against LEACH-C. © 2010 Binary Information Press.
Xu, RYD & Kemp, M 2010, 'An iterative approach for fitting multiple connected ellipse structure to silhouette', Pattern Recognition Letters, vol. 31, no. 13, pp. 1860-1867.
View/Download from: Publisher's site
View description>>
In many image processing applications, the structures conveyed in the image contour can often be described by a set of connected ellipses. Previous fitting methods to align the connected ellipse structure with a contour, in general, lack a continuous solution space. In addition, the solution obtain often satisfies only a partial number of ellipses, leaving others with poor fits. In this paper, we address these two problems by presenting an iterative framework for fitting a 2D silhouettte contour to a pre-specified connected ellipses structure with a very coarse initial guess. Under the proposed framework, we first improve the initial guess by modelling the silhouette region as set of disconnected ellipses using mixture of Gaussian densities or the heuristics approaches. Then, an iterative method is applied in a similar fashion to the Iterative Closest Point (ICP) (Alshawa, 2007; Li and Griffiths, 2000; Besl and McKay, 1992) algorithm. Each iteration contains two parts: first part is to assighn all the contour points to the individual unconnected ellipses, which we refer to as the segmentation step and the second part is the non-linear least square approach that minimizes both the sum of the square distance between the countour points and ellipse's edge as well as minimizing the ellipse's vertex pair(s) distances, which we refer to as the minimization step. We illustrate the effectiveness of our menthods through experimental result on several images as well as applying the algorithm to a mini database of human upper-body images.
Yan, Z, Wen, B, Wang, C, Huang, J & Huang, X 2010, 'Phase-coded interrupted continuous waves analysis, parameters design and processor design', IEICE Electronics Express, vol. 7, no. 19, pp. 1441-1446.
View/Download from: Publisher's site
Yang, J, Wen, B, Zhang, C, Huang, X, Yan, Z & Shen, W 2010, 'A bistatic HF radar for surface current mapping', IEICE Electronics Express, vol. 7, no. 19, pp. 1435-1440.
View/Download from: Publisher's site
AlAamri, H, Abolhasan, M, Wysocki, T & Lipman, J 1970, 'On Optimising Route Discovery for Multi-interface and Power-Aware Nodes in Heterogeneous MANETs', 2010 6th International Conference on Wireless and Mobile Communications, 2010 6th International Conference on Wireless and Mobile Communications (ICWMC), IEEE, Valencia, pp. 244-249.
View/Download from: Publisher's site
View description>>
This paper presents a new routing discovery strategy for heterogeneous MANETs. Node heterogeneity is modeled in terms of: types and number of different interfaces, power, and transmission ranges. Our proposed route discovery algorithm is implemented on the top of On-demand Tree-based Routing Protocol (OTRP) and hence it is called OTRP Heterogeneity-Aware (OTRP-HA). OTRP-HA utilizes node heterogeneity and optimizes route discovery to reduce overheads and ensures connectivities between different types of nodes with different interfaces. Each node makes its own decision to participate in the route discovery process according to its location, local density, and available resources. Simulation results show that OTRP-HA outperforms OTRP and AODV and it reduces overheads as a number of nodes and traffic increase, while it also further prolongs the lifetime of battery-powered single-interface nodes when compared to AODV. © 2010 IEEE.
Barua, B, Safaei, F, Abolhasan, M & IEEE 1970, 'On the Outage of Multihop Parallel Relay Networks', 2010 IEEE 72ND VEHICULAR TECHNOLOGY CONFERENCE FALL, IEEE Vehicular Technology Conference, IEEE, Ottawa, ON, Canada, pp. 1-5.
View/Download from: Publisher's site
View description>>
In this paper we analyze the outage probability of a cooperative multihop parallel relay network in Nakagami-m fading channels. The general closed form expression of the outage probability is derived both for integer and arbitrary Nakagami parameter m. We present numerical results on the performance of the network. It shows a careful configuration of the network size and power sharing between nodes can ensure optimal outage performance in the network.
Cai, Y & Guo, YJ 1970, 'Dipole uniform circular array backed by a cylindrical reflector', EuCAP 2010 - The 4th European Conference on Antennas and Propagation.
View description>>
A 12-element thin dipole uniform circular array (UCA) is studied using the Method of Moments. The effect of metallic back reflectors on the array performance, in terms of the maximum realized gain, the mutual coupling level, and the synthesized patterns, is investigated. Over the inter-element spacing range, 0.3 λ0 ≤ d ≤ 0.7λ0, simulation results show that the introduction of the cylindrical reflector achieves at least 1.0dB higher the gain than the one without using the reflector. Radial metallic 'partition walls' is proposed to be placed between axially oriented dipoles. The use of the 'partition walls' realizes further gain enhancement and H-plane mutual coupling reduction. At d = 0.4λ0 and d = 0.6λ0, maximum coupling between elements is suppressed to a level below -13dB and -20dB respectively when the height of the 'partition walls', hwall, is greater than 0.175λ0. In the synthesized realized gain pattern, mainlobe to sidelobe ratio better than 15dB and 13dB is obtained.
Cai, Y, Guo, YJ, Qin, PY & Weily, AR 1970, 'Frequency reconfigurable quasi-Yagi dipole antenna', 2010 IEEE Antennas and Propagation Society International Symposium, 2010 IEEE International Symposium Antennas and Propagation and CNC-USNC/URSI Radio Science Meeting, IEEE.
View/Download from: Publisher's site
View description>>
A frequency reconfigurable quasi-Yagi dipole antenna is presented in this paper. Simulation results show that a 35% continuously tuning impedance bandwidth, from 1.85 to 2.5GHz, is obtained. Loaded with varactor diodes, the effective electrical lengths of the driver and director dipoles are varied by changing the biasing voltages. The length adjustable director allows the endfire pattern with relatively high gain being maintained over each tuning sub-band. Across the tuning bandwidth, the predicted gain variation is from 5.8dBi to 7.9dBi. The H-plane cross-polarization level is below -17dB while this value is below -32dB in the E-plane. The front-to-back ratio is better than 12dB. © 2010 IEEE.
Cao, Z, Liu, RP, Yang, X & Xiao, Y 1970, 'Modeling IEEE 802.11 DCF System Dynamics', 2010 IEEE Wireless Communication and Networking Conference, Networking Conference (WCNC), IEEE, Sydney, AUSTRALIA.
View/Download from: Publisher's site
Chaczko, Z & Braun, R 1970, 'Teaching Computer Vision for telemedicine systems using OpenCV', 2010 9th International Conference on Information Technology Based Higher Education and Training (ITHET), 2010 9th International Conference on Information Technology Based Higher Education and Training (ITHET), IEEE, Cappadocia, pp. 17-20.
View/Download from: Publisher's site
View description>>
This paper reports on experiences of teaching Computer Vision for robotic telemedicine cluster system, within the practice based ICTD subject within the undergraduate Software Engineering Program at the Faculty of Engineering, University of Technology Sydney (UTS). Topics described by this paper include shared experiences in designing and implementing Computer Vision subsystem and discusses successes, as well as common problems both experienced and anticipated in adaptation of OpenCV framework for building a robotic system for telemedicine. One of the main objectives of the ICTD is to bridge the gap between the students' theoretical knowledge of design and programming with the practical side of software reuse and modularization when designing and implementing a robotic system for medical applications. ©2010 IEEE.
Chaczko, Z, Chiu, C, Avtar Singh Kohli & Mahadevan, V 1970, 'Smart Hospital Management System: An integration of enterprise level solutions utilising open group architecture framework (TOGAF)', 2010 3rd International Conference on Computer Science and Information Technology, 2010 3rd IEEE International Conference on Computer Science and Information Technology (ICCSIT 2010), IEEE, Chengdu, China, pp. 8-15.
View/Download from: Publisher's site
View description>>
A significant portion of the Hospital Information Systems currently consists of various individual legacy applications that have to be integrated, to deliver a more unified solution. The performance, reliability and other factors of these applications ca
Chaczko, Z, Chiu, C, Klempous, R & Nikodem, J 1970, '3TZ Collaborative Team Environments Incorporating the Hybrid Holonic Architecture.', ECBS, IEEE International Conference and Workshop on the Engineering of Computer Based Systems, IEEE Computer Society, Oxford, England, UK, pp. 300-305.
View/Download from: Publisher's site
View description>>
The paper describes a business reengineering process (BPR) approach to address multi-timezone (3-timezone or 3TZ) collaborative teamwork environments by combining the Holonic architecture with the Zachman Metamodel Framework. While the use of collaborative project systems is not new, the methodology to share time resources from different timezones seeks to address pedagogical and engineering process concerns in team-based project development. The benefits of collaborative project management tools go beyond a uniform platform to deploy project resources, but to also enhance systemic processes and engineering practice. This facilitates team members to dedicate their time towards common work tasks, delineates individual and shared work packages, and improves student/tutor feedback techniques as teachers can actively monitor
Chaczko, Z, Kale, A & Chiu, C 1970, 'Intelligent health care — A Motion Analysis system for health practitioners', 2010 Sixth International Conference on Intelligent Sensors, Sensor Networks and Information Processing, 2010 Sixth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), IEEE, Brisbane, Australia, pp. 303-308.
View/Download from: Publisher's site
View description>>
In the proposed work we present a combination of two paradigms: Wireless Sensor Networks (WSN) and Computer Vision applied for Motion Analysis. In this work the Computer Vision provides high-level behavioural monitoring and analysis, whereas Wireless Sensors capture detailed parameters of a moving object. Fusion of sensory information received from both types of sensors provides micro-level and macro-level details. These combined details can be used in various application areas. In considered applications, one of the areas can be Robotics. In this case this strategy can be used to monitor health of robots under certain actions and situations. Another important application domain is health care and rehabilitation of injured persons. In this application, movement of an injured body portion is measured after its treatment. Apart from the analysis of motion we also propose optimized movement advice to patients. Optimum motion advice is very useful in case of sports injury to recover strength and performance. In this paper we produce experimental work performed by simulating different movements of hands and legs in free space. The experimental simulation provides a broad range of data on motion analysis with visualization. The third area of application that is explored is elderly patient condition monitoring and motion analysis for health monitoring.
Chaczko, Z, Klempous, R & Dubois, DM 1970, 'Anticipatory Biomimetic Middleware', AIP Conference Proceedings, COMPUTING ANTICIPATORY SYSTEMS: CASYS ‘09: Ninth International Conference on Computing Anticipatory Systems, AIP, Leige, Belgium, pp. 379-388.
View/Download from: Publisher's site
View description>>
Anticipatory, multi-agents based and biology inspired middleware for resource constrained systems such as the sensornets is able to provide infrastructure oriented services with anticipatory system properties such as: (1) selforganization, (2) selfâshaping, (3) self-monitoring and self-healing. The paper aim is to explain how these fundamental properties, if imprinted on executing agents, can help in the construction of robust, cooperative and sustainable information services for infrastructure oriented software. This can occur through the application of the selected immune-computing and allometric paradigms.
Chaczko, Z, Kohli, AS, Klempous, R & Nikodem, J 1970, 'Middleware integration model for Smart Hospital System using the open group architecture framework (TOGAF)', 2010 IEEE 14th International Conference on Intelligent Engineering Systems, 2010 IEEE 14th International Conference on Intelligent Engineering Systems (INES 2010), IEEE, Canary Islands, Spain, pp. 215-220.
View/Download from: Publisher's site
View description>>
A significant portion of the Hospital Information Systems currently consists of various individual legacy applications that have to be integrated, to deliver a more unified solution. The performance, reliability and other factors of these applications can alter the performance, reliability and other characteristics of integrated Solution, the Smart Hospital Management System (SHS). The actual evaluation of these parameters of these applications is outside the scope of this document. The SHS being an infrastructure component relies heavily on the actual resources made available to it for its proper functioning, operation and maintenance. This article aims to deliver an approach in architecting solutions which can be utilised as framework to address common issues in integration of enterprise level solutions. The methodologies discussed in TOGAF version 9 are utilised to demonstrate the feasibility of proposed solution. This paper introduces the problem space/scenarios, constraints, requirements, enablers, risks, sample legacy application architectures and proposed integration solution presented with TOGAF components. The growing number of waiting lists, rising pressure on medical professionals and accountability for medical negligence are only part of the motivation to take initiative towards holds a core model integration strategy in various legacy infrastructure systems.
Chaczko, Z, Wickramasooriya, R, Klempous, R & Nikodem, J 1970, 'Security threats in Cognitive Radio applications', 2010 IEEE 14th International Conference on Intelligent Engineering Systems, 2010 IEEE 14th International Conference on Intelligent Engineering Systems, IEEE, Canary Islands, Spain, pp. 209-214.
View/Download from: Publisher's site
View description>>
In this paper we shall consider security aspects of Cognitive Radio (CR) and its applications. We shall cover design of a security simulation model for cognitive radio and discuss results of conducted experiments using Omnet++ simulation tool in the .Net environment. The aim of this paper is to provide an overview of various applications of CR as well as the security threats faced when applying this technology. The functions, benefits and applications of CR are analyzed, along with the challenges faced by the technology. We shall discuss in detail a several security threats faced by CR and carry out selected research on techniques used to mitigate such malicious attacks and provide examples of simulation experiments in Omnet++.
Chaczko, Z, Yeoh, LA & Mahadevan, V 1970, 'A Preliminary Investigation on Computer Vision for Telemedicine Systems Using OpenCV', 2010 Second International Conference on Machine Learning and Computing, 2010 Second International Conference on Machine Learning and Computing, IEEE, Bangalore, India, pp. 42-46.
View/Download from: Publisher's site
View description>>
OpenCV is typically, an open source vision library suitable for computer vision programs. In this paper, we present some of our preliminary investigation experiences of developing Computer Vision programs using OpenCV for robotic telemedicine cluster system, within the practice based ICTD subject within the undergraduate Software Engineering Program at the Faculty of Engineering, University of Technology Sydney (UTS). Firstly, it discusses our shared experiences in designing and implementing Computer Vision subsystem and discusses successes, as well as common problems both experienced and anticipated in adaptation of OpenCV framework and then justifies its purpose building a robotic system for telemedicine. Finally, it attempts to bridge the gap between the theoretical knowledge of design and programming with the practical side of software reuse and modularization when designing and implementing a robotic system for medical applications.
Chen, K, Huang, X & Xi, J 1970, 'A novel approach for interference suppression in multi-subband convolutional coded OFDM system', 2010 10th International Symposium on Communications and Information Technologies, 2010 10th International Symposium on Communications and Information Technologies (ISCIT), IEEE, pp. 667-671.
View/Download from: Publisher's site
View description>>
This paper proposes a novel approach of suppressing narrowband interference from a multi - subband convolutional coded orthogonal frequency division multiplexing (OFDM) system. In this system, the convolutional coded data symbols using different coding generators are transmitted in different subbands. By identifying and discarding the interfered subband(s), the interference level can be greatly reduced and the system performance of the OFDM system can be improved. The interference thresholds for discarding the interfered subband(s) are determined through simulations over additive white Gaussian noise (AWGN) channel for demonstration purpose. The principle can also be applied to multipath fading channel. ©2010 IEEE.
Chen, X, Yang, J, Wu, Q & Zhao, J 1970, 'Motion blur detection based on lowest directional high-frequency energy', 2010 IEEE International Conference on Image Processing, 2010 17th IEEE International Conference on Image Processing (ICIP 2010), IEEE, Hongkong, pp. 2533-2536.
View/Download from: Publisher's site
View description>>
Motion blur detection and the relevant blurring parameter estimation are important for many computer vision tasks. The contribution of this paper is in two folds. First, we propose a closed-form solution for motion direction estimation on blurred image. Secondly, a novel method is proposed for motion blurred region detection. The proposed direction estimation is based on measurement of lowest directional high-frequency energy. Compared with traditional methods, it will improve accuracy with less computational cost. Moreover, the proposed motion blurred region detection can efficiently estimate blurred regions without Point Spread Function estimation. Encouraging results are shown by experiments. © 2010 IEEE.
Concha, OP, Xu, RYD & Piccardi, M 1970, 'Compressive Sensing of Time Series for Human Action Recognition', 2010 International Conference on Digital Image Computing: Techniques and Applications, 2010 International Conference on Digital Image Computing: Techniques and Applications (DICTA), IEEE, Sydney, Australia, pp. 454-461.
View/Download from: Publisher's site
View description>>
Compressive Sensing (CS) is an emerging signal processing technique where a sparse signal is reconstructed from a small set of random projections. In the recent literature, CS techniques have demonstrated promising results for signal compression and reconstruction [9, 8, 1]. However, their potential as dimensionality reduction techniques for time series has not been significantly explored to date. To this aim, this work investigates the suitability of compressive-sensed time series in an application of human action recognition. In the paper, results from several experiments are presented: (1) in a first set of experiments, the time series are transformed into the CS domain and fed into a hidden Markov model (HMM) for action recognition; (2) in a second set of experiments, the time series are explicitly reconstructed after CS compression and then used for recognition; (3) in the third set of experiments, the time series are compressed by a hybrid CS-Haar basis prior to input into HMM; (4) in the fourth set, the time series are reconstructed from the hybrid CS-Haar basis and used for recognition. We further compare these approaches with alternative techniques such as sub-sampling and filtering. Results from our experiments show unequivocally that the application of CS does not degrade the recognition accuracy; rather, it often increases it. This proves that CS can provide a desirable form of dimensionality reduction in pattern recognition over time series. © 2010 Crown Copyright.
Concha, OP, Xu, RYD & Piccardi, M 1970, 'Robust Dimensionality Reduction for Human Action Recognition', 2010 International Conference on Digital Image Computing: Techniques and Applications, 2010 International Conference on Digital Image Computing: Techniques and Applications (DICTA), IEEE, Sydney, Australia, pp. 349-356.
View/Download from: Publisher's site
View description>>
Human action recognition can be approached by combining an action-discriminative feature set with a classifier. However, the dimensionality of typical feature sets joint with that of the time dimension often leads to a curse-of-dimensionality situation. Moreover, the measurement of the feature set is subject to sometime severe errors. This paper presents an approach to human action recognition based on robust dimensionality reduction. The observation probabilities of hidden Markov models (HMM) are modelled by mixtures of probabilistic principal components analyzers and mixtures of t-distribution sub-spaces, and compared with conventional Gaussian mixture models. Experimental results on two datasets show that dimensionality reduction helps improve the classification accuracy and that the heavier-tailed t-distribution can help reduce the impact of outliers generated by segmentation errors. © 2010 Crown Copyright.
Cui, Y, Jin, JS, Park, M, Luo, S, Xu, M, Yu Peng, Wong, WSF & Santos, LD 1970, 'Computer aided abnormality detection for microscopy images of cervical tissue', IEEE/ICME International Conference on Complex Medical Engineering, 2010 IEEE/ICME International Conference on Complex Medical Engineering - CME 2010, IEEE, Gold Coast Australia, pp. 63-68.
View/Download from: Publisher's site
View description>>
Cervical cancer is the second most common malignancy among women worldwide, if it is detected in early stage, cure rate is relatively high. Computer aided abnormality detection for cervical smear is developed to assist medical experts to handle the microscopy images, examine cell abnormalities and diagnose dyskaryosis. The microscopy images of cells in cervix uteri are stained by the tumor marker Ki-67, so that the abnormal nuclei present brown while normal ones are bluish. Segmentation is the most important and difficult task to calculate the ratio of abnormal nuclei to all nuclei. In order to achieve accurate segmentation of nuclei, we propose a multi-level segmentation approach for abnormality identification in microscopy images. First level segmentation aims to partition abnormal (stained) nuclei regions and all nuclei regions. Because of under-segmentation after first level segmentation, second level segmentation is applied to further partition the clustered nuclei. In order to classify touching regions of clustered nuclei and separate regions of single nucleus, relevant meaningful features are extracted from regions of interest. Consequently all the nuclei regions are separated and in conjunction with the abnormal nuclei regions in the first level segmentation, the abnormality i.e. ratio of abnormal nuclei to all nuclei is obtained. Experimental results indicate that our method achieved an accuracy of 93.55% and 95.8% in term of abnormal nuclei and all nuclei respectively for identification of abnormalities. Our proposed method produces a satisfactory segmentation. © 2010 IEEE.
Du, R, Wang, S, Wu, Q & He, X 1970, 'Learn Concepts in Multiple-Instance Learning with Diverse Density Framework Using Supervised Mean Shift', 2010 International Conference on Digital Image Computing: Techniques and Applications, 2010 International Conference on Digital Image Computing: Techniques and Applications (DICTA), IEEE, Sydney, Australia, pp. 643-648.
View/Download from: Publisher's site
View description>>
Many machine learning tasks can be achieved by using Multiple-instance learning (MIL) when the target features are ambiguous. As a general MIL framework, Diverse Density (DD) provides a way to learn those ambiguous features by maxmising the DD estimator, and the maximum of DD estimator is called a concept. However, modeling and finding multiple concepts is often difficult especially without prior knowledge of concept number, i.e., every positive bag may contain multiple coexistent and heterogeneous concepts but we do not know how many concepts exist. In this work, we present a new approach to find multiple concepts of DD by using an supervised mean shift algorithm. Unlike classic mean shift (an unsupervised clustering algorithm), our approach for the first time introduces the class label to feature point and each point differently contributes the mean shift iterations according to its label and position. A feature point derives from an MIL instance and takes corresponding bag label. Our supervised mean shift starts from positive points and converges to the local maxima that are close to the positive points and far away from the negative points. Experiments qualitatively indicate that our approach has better properties than other DD methods. © 2010 IEEE.
Dyadyuk, V, Huang, X, Stokes, L & Pathikulangara, J 1970, 'Implementation of wideband digital beam forming in the E-band: Towards a hybrid array', European Microwave Week 2010, EuMW2010: Connecting the World, Conference Proceedings - European Microwave Conference, EuMC 2010, 40th European Microwave Conference, IEEE, Paris, FRANCE, pp. 914-917.
View description>>
This paper reports the test results of a small-scale prototype that implements a digitally beam-formed phased antenna array in the E-band. A four-channel dual-conversion receive RF module for 71-76 GHz frequency band has been developed and integrated with a linear end-fire antenna array. Wideband frequency-domain angle-of-arrival estimation and beam forming algorithms were developed and implemented using 1 Gbps OFDM QPSK symbols. Measured performance is very close to the simulated results and experimental data for an analogue-beam-formed array. This work is a stepping stone towards practical realization of larger hybrid arrays in the E-band. © 2010 EuMA.
Fang, G, Dutkiewicz, E, Yu, K, Vesilo, R & Yu, Y 1970, 'Distributed Inter-Network Interference Coordination for Wireless Body Area Networks', 2010 IEEE Global Telecommunications Conference GLOBECOM 2010, GLOBECOM 2010 - 2010 IEEE Global Communications Conference, IEEE.
View/Download from: Publisher's site
View description>>
In this paper we consider the inter-network interference problem in Wireless Body Area Networks (WBANs). We propose a distributed inter-network interference aware power control algorithm motivated by game theory. A power control game is formulated considering both interference between nearby networks and energy efficiency of WBANs. We derive a distributed power control algorithm called ProActive Power Update (PAPU), which can efficiently find the Nash Equilibrium representing the best tradeoff between energy and network utility. A realistic power control procedure is proposed assuming limited cooperation between WBANs. We compare our algorithm with the ADP algorithm where users are punished for interfering with others and we show that our solution can utilize energy much more efficiently by only sacrificing a small amount of network utility. In addition, we show that by adjusting the energy price, PAPU provides a methodology for application scenarios where WBANs have different energy constraints and quality of service requirements. ©2010 IEEE.
Fookes, C, Denman, S, Lakemond, R, Ryan, D, Sridharan, S & Piccardi, M 1970, 'Semi-supervised intelligent surveillance system for secure environments', 2010 IEEE International Symposium on Industrial Electronics, 2010 IEEE International Symposium on Industrial Electronics (ISIE 2010), IEEE, Bari, Italy, pp. 2815-2820.
View/Download from: Publisher's site
View description>>
This paper proposes a semi-supervised intelligent visual surveillance system to exploit the information from multi-camera networks for the monitoring of people and vehicles. Modules are proposed to perform critical surveillance tasks including: the manag
Ge, Y, Esselle, KP & Bird, TS 1970, 'Compact broadband dielectric resonator antennas', 2010 International Conference on Electromagnetics in Advanced Applications, 2010 International Conference on Electromagnetics in Advanced Applications (ICEAA), IEEE, pp. 213-215.
View/Download from: Publisher's site
View description>>
A method to design ultra-wideband dielectric resonator antennas is described. The volume of the antenna is further reduced by employing the standard conducting mirror wall technique. The effectiveness of the method is demonstrated using HFSS simulations. ©2010 IEEE.
Guo, W, Xu, C, Ma, S & Xu, M 1970, 'Visual Attention Based Motion Object Detection and Trajectory Tracking', 11th Pacific Rim Conference on Multimedia, Springer, Shanghai China, pp. 462-470.
View/Download from: Publisher's site
View description>>
A motion trajectory tracking method using a novel visual attention model and kernel density estimation is proposed in this paper. As a crucial step, moving objects detection is based on visual attention. The visual attention model is built by combination of the static and motion feature attention map and a Karhunen-Loeve transform (KLT) distribution map. Since the visual attention analysis is conducted on object level instead of pixel level, the proposed method can detect any kinds of motion objects provided saliency without the affection of objects appearance and surrounding circumstance. After locating the region of moving object, the kernel density is estimated for trajectory tracking. The experimental results show that the proposed method is promising for moving objects detection and trajectory tracking.
Guo, W, Xu, C, Ma, S & Xu, M 1970, 'Visual attention based small object segmentation in natual images', 2010 IEEE International Conference on Image Processing, 2010 17th IEEE International Conference on Image Processing (ICIP 2010), IEEE, Hongkong, pp. 1565-1568.
View/Download from: Publisher's site
View description>>
Small object segmentation is a challenging task in image processing and computer vision. In this paper we propose a visual attention based segmentation approach to segment interesting objects with small size in natural images. Different from traditional methods which use the single feature vectors, visual attention analysis is used on local and global features to extract the region of interesting objects. Within the region selected by visual attention analysis, Gaussian Mixture Model (GMM) is applied to further locate the object region. By incorporation of visual attention analysis into object segmentation, the proposed approach is able to narrow the searching region for object segmentation so as to increase the segmentation accuracy and reduce the computational complex. Experimental results demonstrate that the proposed approach is efficient for object segmentation in natural images, especially for small objects. The proposed method outperforms traditional GMM based segmentation significantly. © 2010 IEEE.
Hagelstein, B, Abolhasan, M, Franklin, DR & Safaei, F 1970, 'An efficient opportunistic cooperative diversity protocol for IEEE 802.11 networks.', IWCMC, International Wireless Communications and Mobile Computing Conference, ACM, Caen, France, pp. 417-421.
View/Download from: Publisher's site
View description>>
Opportunistic cooperation promises to enhance the user experience when streaming media over wireless devices by improving wireless network reliability at the link level. This paper presents DAFMAC, an efficient cooperative diversity partner selection algorithm for IEEE 802.11 devices. Simulation results show DAFMAC provides a significantly higher transmission reliability in poor channel conditions than traditional ARQ techniques without modifying the device hardware. Further analysis shows the low overhead of DAFMAC makes it highly competitive with other proposed cooperative retransmission mechanisms in an ad-hoc network.
He, X, Wei, D, Lam, K-M, Li, J, Wang, L, Jia, W & Wu, Q 1970, 'Canny Edge Detection Using Bilateral Filter on Real Hexagonal Structure', Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Advanced Concepts for Intelligent Vision System, Springer Berlin Heidelberg, Sydney, Australia, pp. 233-244.
View/Download from: Publisher's site
View description>>
Edge detection plays an important role in image processing area. This paper presents a Canny edge detection method based on bilateral filtering which achieves better performance than single Gaussian filtering. In this form of filtering, both spatial closeness and intensity similarity of pixels are considered in order to preserve important visual cues provided by edges and reduce the sharpness of transitions in intensity values as well. In addition, the edge detection method proposed in this paper is achieved on sampled images represented on a real hexagonal structure. Due to the compact and circular nature of the hexagonal lattice, a better quality edge map is obtained on the hexagonal structure than common edge detection on square structure. Experimental results using proposed methods exhibit also the faster speed of detection on hexagonal structure. © 2010 Springer-Verlag.
Huan, X & Guo, YJ 1970, 'Block Spread OFDMA with STC MIMO for Improved Frequency and Spatial Diversity over Broadband Wireless Access Uplink', 2010 IEEE Wireless Communication and Networking Conference, Networking Conference (WCNC), IEEE.
View/Download from: Publisher's site
View description>>
A novel combination of block spread orthogonal frequency division multiple access (BS-OFDMA) with space-time coded multiple input multiple output (STC MIMO) scheme is proposed for broadband wireless access uplink transmission. Using complex exponential spreading sequences, the block spreading technique can efficiently generate precoded OFDMA signal to exploit frequency diversity. An Alamouti STC MIMO encoding technique is incorporated with the block spreading to achieve further spatial diversity. The performance of the proposed STC-BS-OFDMA system using minimum mean squared error equalization is analyzed, and a closed-form asymptotical bit error rate expression is derived. Simulation results are also given to demonstrate the improved diversity performance as compared with other OFDMA schemes. The proposed techniques are well suited for future broadband wireless access systems such as 3G LTE and 4G. ©2010 IEEE.
Huang, X & Guo, YJ 1970, 'MSE lower bounds for phase estimation based on overlapped Gaussian distribution', 2010 10th International Symposium on Communications and Information Technologies, 2010 10th International Symposium on Communications and Information Technologies (ISCIT), IEEE, pp. 655-660.
View/Download from: Publisher's site
View description>>
The Cramér-Rao bound (CRB) has been widely used as a mean square error (MSE) lower bound for unbiased parameter estimations. For phase estimation, however, the CRB is not valid at low signal-to-noise ratio (SNR) due to the effect of phase wrapping. In this paper, closed-form approximations of the MSE lower bounds for the phase estimation are derived under both Gaussian and Rayleigh fading channels, which are particularly useful at low SNR. The derivation is based on an overlapped Gaussian distribution which is used to approximate the true posterior phase distribution. Analytical and simulation results show that the derived closed-form MSE lower bounds provide more meaningful indications to the phase estimation performance than the CRB. ©2010 IEEE.
Huang, X, Dyadyuk, V, Guo, YJ, Stokes, L & Pathikulangara, J 1970, 'Frequency-Domain Digital Calibration and Beamforming with Wideband Antenna Array', 2010 IEEE Global Telecommunications Conference GLOBECOM 2010, GLOBECOM 2010 - 2010 IEEE Global Communications Conference, IEEE.
View/Download from: Publisher's site
View description>>
This paper presents a joint channel and mutual coupling estimation technique for wideband antenna array to achieve high speed wireless communications in the millimetrewave frequency bands. The estimated channel frequency responses and mutual coupling matrix can be used to digitally calibrate a wideband antenna array in the frequency-domain, followed by digital beamforming. Experiments are carried out using a four-element receive array prototype in the E-band (71-76 GHz) to demonstrate the frequency-domain digital calibration and beamforming performance. The results show that both the mutual coupling and wideband effects are effectively mitigated by the proposed technique and a 11.5 dBi array gain is achieved which is very close to that of an ideal four-element antenna array. ©2010 IEEE.
Huang, Y, Qian, M, Yuan, Y, Shi, J, Tian, L & Huang, X 1970, 'Call Admission Control Scheme for Multicast Service Enabled Cellular Networks', 2010 IEEE 72nd Vehicular Technology Conference - Fall, 2010 IEEE Vehicular Technology Conference (VTC 2010-Fall), IEEE, Ottawa, CANADA.
View/Download from: Publisher's site
Hung, NT, Nguyen, H-T, Nam, NG, Lan, TN & Hoang, DT 1970, 'IMS IPTV: An Experimental Approach.', TRIDENTCOM, Springer, pp. 573-576.
View/Download from: Publisher's site
View description>>
IMS has been widely recognized as the control and signaling framework for delivering of the rich communication & multimedia services to broadband users. Amongst others, it's deploying as the service (middleware) platform for interactive and personalized IPTV services. The goal of this paper is to provide a short description and analysis of the (IPTV) use cases that have been selected for design and implementation at Hanoi University of Technology (HUT) in scope of its initiatives for NGN researching program. Major use cases, or we called intelligent features, are the advanced electronic service guide, video on demand (VoD), (IPTV) session continuity, and parental control. Development results for each of the use case are depicted. © Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2011.
Jamdagni, A, Tan, T, Liu, R, Nanda, P & He, S 1970, 'Pattern Recognition Approach for Anomaly Detection of Web-based Attacks', The Seventh Annual CSIRO ICT Centre Science and Engineering Conference, Annual CSIRO ICT Centre Science and Engineering Conference, CSIRO, Australian Technology Park, Eveleigh, NSW, Australia, pp. 1-2.
View description>>
The universal use of the Internet has made it more difficult to achieve high security. Attackers target web applications instead of Telnet ports. Cyber-attacks and breaches of information security are increasing in frequency. The goal of Intrusion Detection Systems (IDSs) is to monitor network traffic and detect web-based attacks. Common IDSs are either signature based or anomaly based. Signature based IDS is unable to detect novel attack (Le., zero-day) or polymorphic attacks, until the signature database is updated. On the other hand, an anomaly-based IDS can detect new attacks and polymorphic attacks. However, anomaly based system has a relatively high number of false positives.
Jamdagni, A, Tan, Z, Nanda, P, He, X & Liu, RP 1970, 'Intrusion detection using GSAD model for HTTP traffic on web services', Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, IWCMC '10: 2010 International Wireless Communications and Mobile Computing Conference, ACM, Caen, France, pp. 1193-1197.
View/Download from: Publisher's site
View description>>
Intrusion detection systems are widely used security tools to detect cyber-attacks and malicious activities in computer systems and networks. Hypertext Transport Protocol (HTTP) is used for new applications without much interference. In this paper, we focus on intrusion detection of HTTP traffic by applying pattern recognition techniques using our Geometrical Structure Anomaly Detection (GSAD) model. Experimental results reveal that features extracted from HTTP request using GSAD model can be used to distinguish anomalous traffic from normal traffic, and attacks carried out over HTTP traffic can be identified. We evaluate and compare our results with the results of PAYL intrusion detection systems for the test of DARPA 1999 IDS data set. The results show GSAD has high detection rates and low false positive rates. Copyright © 2010 ACM.
Jamdagni, A, Tan, Z, Nanda, P, He, X & Liu, RP 1970, 'Mahalanobis Distance Map approach for Anomaly Detection of web-based attacks', Proceedings of the 8th Australian Information Security Management Conference, Australian Information Security Management Conference, SECAU - Security Research Centre, Perth, Western Australia, pp. 8-17.
View description>>
Web servers and web-based applications are commonly used as attack targets. The main issues are how to prevent unauthorised access and to protect web servers from the attack. Intrusion Detection Systems (IDSs) are widely used security tools to detect cyber-attacks and malicious activities in computer systems and networks. In this paper, we focus on the detection of various web-based attacks using Geometrical Structure Anomaly Detection (GSAD) model and we also propose a novel algorithm for the selection of most discriminating features to improve the computational complexity of payload-based GSAD model. Linear Discriminant method (LDA) is used for the feature reduction and classification of the incoming network traffic. GSAD model is based on a pattern recognition technique used in image processing. It analyses the correlations between various payload features and uses Mahalanobis Distance Map (MDM) to calculate the difference between normal and abnormal network traffic. We focus on the detection of generic attacks, shell code attacks, polymorphic attacks and polymorphic blending attacks. We evaluate accuracy of GSAD model experimentally on the real-world attacks dataset created at Georgia Institute of Technology. We conducted preliminary experiments on the DARPA 99 dataset to evaluate the accuracy of feature reduction.
Jia, W, He, X & Wu, Q 1970, 'ECCH: A novel color coocurrence histogram', 2010 IEEE International Conference on Acoustics, Speech and Signal Processing, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing, IEEE, Dallas, USA, pp. 1258-1261.
View/Download from: Publisher's site
View description>>
In this paper, a novel color cooccurrence histogram method, named eCCH which stands for color cooccurrence histogram at edge points, is proposed to describe the spatial-color joint distribution of images. Unlike all existing ideas, we only investigate the color distribution of pixels located at the two sides of edge points on gradient direction lines. When measuring the similarity of two eCCHs, the Gaussian weighted histogram intersection method is adopted, where both identical and similar color pairs are considered to compensate color variations. Comparative experimental results demonstrate the performance of the proposed eCCH in terms of robustness to color variance and small computational complexity. ©2010 IEEE.
Jia, W, He, X & Wu, Q 1970, 'Segmenting Characters from License Plate Images with Little Prior Knowledge', 2010 International Conference on Digital Image Computing: Techniques and Applications, 2010 International Conference on Digital Image Computing: Techniques and Applications (DICTA), IEEE, Sydney, Australia, pp. 220-226.
View/Download from: Publisher's site
View description>>
In this paper, to enable a fast and robust system for automatically recognizing license plates with various appearances, new and simple but efficient algorithms are developed to segment characters from extracted license plate images. Our goal is to segment characters properly from a license plate image region. Different from existing methods for segmenting degraded machine-printed characters, our algorithms are based on very weak assumptions and use no prior knowledge about the format of the plates, in order for them to be applicable to wider applications. Experimental results demonstrate promising efficiency and flexibility of the proposed scheme. © 2010 IEEE.
Kazemi, R, Vesilo, R, Dutkiewicz, E & Fang, G 1970, 'Inter-network interference mitigation in Wireless Body Area Networks using power control games', 2010 10th International Symposium on Communications and Information Technologies, 2010 10th International Symposium on Communications and Information Technologies (ISCIT), IEEE, pp. 81-86.
View/Download from: Publisher's site
View description>>
In this paper, we propose a non-cooperative power control game to mitigate inter-network interference in Wireless Body Area Networks (WBANs), which use emerging short-range wireless communication technology inside, on or around the human body for healthcare, entertainment and ubiquitous computing purposes. Interference endangers the reliability of WBANs especially in critical medical applications and also leads to more power consumption in very energy-constrained WBANs. Coordinating transmission power levels, we increase the system total throughput in the presence of interference using as little power as possible. We utilize non-linear and adaptive power pricing functions to penalize high power users and increase capacity in better channels. We investigate the Nash equilibrium existence and uniqueness and propose the best response strategy in the game to reach the Nash equilibrium. ©2010 IEEE.
Khan, A, Zhang, J & Wang, Y 1970, 'Appearance-Based Re-identification of People in Video', 2010 International Conference on Digital Image Computing: Techniques and Applications, 2010 International Conference on Digital Image Computing: Techniques and Applications (DICTA), IEEE, pp. 357-362.
View/Download from: Publisher's site
View description>>
This paper introduces the topic of appearance-based reidentification of people in video. This work is based on colour information of people's clothing. Most of the work described in the literature uses full body histogram. This paper evaluates the histogram method and describes ways of including spatial colour information. The paper proposes a colour-based appearance descriptor called Colour Context People Descriptor. All the methods are evaluated extensively. The results are reported in the experiments. It is concluded at the end that adding spatial colour information greatly improves the re-identification results. © 2010 IEEE.
Kusakunniran, W, Wu, Q, Zhang, J & Li, H 1970, 'Multi-view Gait Recognition Based on Motion Regression Using Multilayer Perceptron', 2010 20th International Conference on Pattern Recognition, 2010 20th International Conference on Pattern Recognition (ICPR), IEEE, Istanbul Turkey, pp. 2186-2189.
View/Download from: Publisher's site
View description>>
It has been shown that gait is an efficient biometric feature for identifying a person at a distance. However, it is a challenging problem to obtain reliable gait feature when viewing angle changes because the body appearance can be different under the various viewing angles. In this paper, the problem above is formulated as a regression problem where a novel View Transformation Model (VTM) is constructed by adopting Multilayer Perceptron (MLP) as regression tool. It smoothly estimates gait feature under an unknown viewing angle based on motion information in a well selected Region of Interest (ROI) under other existing viewing angles. Thus, this proposal can normalize gait features under various viewing angles into a common viewing angle before gait similarity measurement is carried out. Encouraging experimental results have been obtained based on widely adopted benchmark database. © 2010 IEEE.
Kusakunniran, W, Wu, Q, Zhang, J & Li, H 1970, 'Support vector regression for multi-view gait recognition based on local motion feature selection', 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2010 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), IEEE, San Francisco CA, USA, pp. 974-981.
View/Download from: Publisher's site
View description>>
Gait is a well recognized biometric feature that is used to identify a human at a distance. However, in real environment, appearance changes of individuals due to viewing angle changes cause many difficulties for gait recognition. This paper re-formulates this problem as a regression problem. A novel solution is proposed to create a View Transformation Model (VTM) from the different point of view using Support Vector Regression (SVR). To facilitate the process of regression, a new method is proposed to seek local Region of Interest (ROI) under one viewing angle for predicting the corresponding motion information under another viewing angle. Thus, the well constructed VTM is able to transfer gait information under one viewing angle into another viewing angle. This proposal can achieve view-independent gait recognition. It normalizes gait features under various viewing angles into a common viewing angle before similarity measurement is carried out. The extensive experimental results based on widely adopted benchmark dataset demonstrate that the proposed algorithm can achieve significantly better performance than the existing methods in literature. ©2010 IEEE.
Li, Z, Zhang, J, Wu, Q & Geers, G 1970, 'Feature Enhancement Using Gradient Salience on Thermal Image', 2010 International Conference on Digital Image Computing: Techniques and Applications, 2010 International Conference on Digital Image Computing: Techniques and Applications (DICTA), IEEE, Sydney, Australia, pp. 556-562.
View/Download from: Publisher's site
View description>>
Feature enhancement in an image is to reinforce some exacted features so that it can be used for object classification and detection. As the thermal image is lack of texture and colorful information, the techniques for visual image feature enhancement is insufficient to apply to thermal images. In this paper, we propose a new gradient-based approach for feature enhancement in thermal image. We use the statistical properties of gradient of foreground object profiles, and formulate object features with gradient saliency. Empirical evaluation of the proposed approach shows significant performance improved on human contours which can be used for detection and classification. © 2010 IEEE.
Lin Luo, Jian Zhang & Davis, LM 1970, 'On performance limits of coded asymmetric OFDM systems over multipath fading channels', 2010 Australian Communications Theory Workshop (AusCTW), 2010 Australian Communications Theory Workshop (AusCTW), IEEE, IEEE, pp. 19-23.
View/Download from: Publisher's site
Liu, H, Xu, M, Huang, Q, Jin, JS, Jiang, S & Xu, C 1970, 'A close-up detection method for movies', 2010 IEEE International Conference on Image Processing, 2010 17th IEEE International Conference on Image Processing (ICIP 2010), IEEE, Hongkong, pp. 1505-1508.
View/Download from: Publisher's site
View description>>
Close-up (CU) is a photographic technique which tightly frames a person or an object. In movies, it is applied to guide audience attention and to evoke audience emotion. In this paper, we detect face CU, object CU, and lean of movies, which are widely used to romance emotions. A lean consists of shots in a sequence, with a close-up shot as focus. A set of features are extracted by considering movie making techniques and human attention for CU detection. The features are average saliency, color entropy, color variance, face height, skin area, and texture scales. These features are tested through statistical hypothesis test to be significantly discriminating for CUs. Then, Support Vector Machine (SVM) is applied on these features to detect face CU and object CU. Based on the face CU and object CU detection result, lean is further detected by investigating the changing of the face/object size. Lean detection is of challenge due to the technique of montage. We solve this problem through color similarity estimation and SIFT point matching. Experimental results on four full length movies verify the effectiveness of the proposed method. © 2010 IEEE.
Lu, S, Sun, Y, Ge, Y, Dutkiewicz, E & Zhou, J 1970, 'Joint Power and Rate Control in Ad Hoc Networks Using a Supermodular Game Approach', 2010 IEEE Wireless Communication and Networking Conference, Networking Conference (WCNC), IEEE.
View/Download from: Publisher's site
View description>>
In ad hoc networks, reducing energy consumption and improving throughput are both important for high network performance. This paper presents a joint power and rate control adaptive algorithm to optimize the trade-off between power consumption and throughput in ad hoc networks. Each node chooses its own transmission power and rate based on limited environment information in order to achieve optimal transmission efficiency. In a fictitious game framework with strategy space transformation, our joint power and rate control adaptive algorithm can be viewed as a supermodular game. By interpreting the supermodular game using myopic best response updates, this algorithm can converge to the unique optimal transmission efficiency. Finally, the simulation results show that this supermodular game approach improves the average transmission efficiency by about 33%. ©2010 IEEE.
Moghaddam, Z & Piccardi, M 1970, 'Histogram-Based Training Initialisation of Hidden Markov Models for Human Action Recognition', 2010 7th IEEE International Conference on Advanced Video and Signal Based Surveillance, 2010 7th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS), IEEE, Boston, Massachusetts, USA, pp. 256-261.
View/Download from: Publisher's site
View description>>
Human action recognition is often addressed by use of latent-state models such as the hidden Markov model and similar graphical models. As such models require Expectation-Maximisation training, arbitrary choices must be made for training initialisation, with major impact on the final recognition accuracy. In this paper, we propose a histogram-based deterministic initialisation and compare it with both random and a time-based deterministic initialisations. Experiments on a human action dataset show that the accuracy of the proposed method proved higher than that of the other tested methods.
Moghaddam, Z & Piccardi, M 1970, 'Human action recognition with MPEG-7 descriptors and architectures', Proceedings of the first ACM international workshop on Analysis and retrieval of tracked events and motion in imagery streams, MM '10: ACM Multimedia Conference, ACM, Florence, Italy, pp. 63-68.
View/Download from: Publisher's site
View description>>
Modern video surveillance requires addressing high-level concepts such as humans' actions and activities. In addition, surveillance applications need to be portable over a variety of platforms, from servers to mobile devices. In this paper, we explore the potential of the MPEG-7 standard to provide interfaces, descriptors, and architectures for human action recognition from surveillance cameras. Two novel MPEG-7 descriptors, symbolic and feature-based, are presented alongside two different architectures, server-intensive and client-intensive. The descriptors and architectures are evaluated in the paper by way of a scenario analysis.
Mu, Y, Xu, M & Yan, S 1970, 'Learning From Very-Few Labeled Examples with Soft Labels', 2010 IEEE International Conference on Image Processing ICIP 2010 - Proceedings, IEEE International Conference on Image Processing, IEEE Computer Society, Hongkong, pp. 3869-3872.
View description>>
In this paper we propose Softboost, a novel Boosting al-gorithm which combines the merits of transductive and inductive learning approaches to attack the problem of learning from very few labeled training examples. In the transductive stage, soft labels of both the labeled and unlabeled samples are estimated based on a Markovian propagating procedure. While in the subsequent inductive stage, to efficiently handle out-of-sample data, we learn a weighted combination of simple rules in Boosting style, each of which maximizes confidence-weighted inter-class Kullback-Leibler (KL) divergence under current data distribution. Finally, experiments on toy dataset and USPS handwritten digits are presented to demonstrate its effectiveness.
Mudugamuwa, DJ, Jia, W & He, X 1970, 'Asymmetric, Non-unimodal Kernel Regression for Image Processing', 2010 International Conference on Digital Image Computing: Techniques and Applications, 2010 International Conference on Digital Image Computing: Techniques and Applications (DICTA), IEEE, Sydney, Australia, pp. 141-145.
View/Download from: Publisher's site
View description>>
Kernel regression has been previously proposed as a robust estimator for a wide range of image processing tasks, including image denoising, interpolation and super-resolution. In this article we propose a kernel formulation that relaxes the usual symmetric and unimodal properties to effectively exploit the smoothness characteristics of natural images. The proposed method extends the kernel support along similar image characteristics to further increase the robustness of the estimates. Application of the proposed method to image denoising yields significant improvement over the previously reported regression methods and produces results comparable to the state-of-the-art denoising techniques. © 2010 IEEE.
Nikodem, J, Klempous, R, Nikodem, M, Woda, M & Chaczko, Z 1970, 'Wireless sensors network simulator for modeling relation based communication activity', 2010 Fifth International Conference on Broadband and Biomedical Communications, 2010 Fifth International Conference on Broadband and Biomedical Communications (IB2Com), IEEE, Malaga, Spain, pp. 1-6.
View/Download from: Publisher's site
View description>>
The paper presents a simulator that models routing paths and energy distribution in a WSN as a function of the algorithm executed by each node of the network. Simulator was prepared to investigate whether globally defined goals can be achieved through the decisions and actions taken locally by each node that has restricted information about the whole network. Therefore, simulator models each node independently defining three basic relations for each of them - subordination, tolerance and restriction. We have implemented several novel, non-clustered routing protocols that describe behavior of each node of the network - so that we are able to verify how decisions taken locally affect the whole network.
Nikolic, N, Weily, AR, James, GL, Greene, K, Barker, S & Guo, YJ 1970, 'Reduction of the grating lobes in Luneburg lens arrays', 2010 IEEE Antennas and Propagation Society International Symposium, 2010 IEEE International Symposium Antennas and Propagation and CNC-USNC/URSI Radio Science Meeting, IEEE.
View/Download from: Publisher's site
View description>>
Mobile satellite communication systems suitable for installation on moving vehicles are increasingly in demand [1]-[3] . One of the main requirements for such systems is low-profile in order to prevent intolerable drag and air-stream turbulence. A low profile Ku-band antenna system based on a four-element Luneburg lens array (LLA) was presented in [3] where the reduction in height is achieved by using a ground plane and by increasing the number of elements at the expense of increased diameter of the array. However, using an array of elements has an inherent problem of grating lobes [4] . This problem is particularly difficult in an array of lenses since the minimum array spacing is limited by the lens size and generally it is of the order of several wavelengths. High grating lobes in the radiation pattern limit the usefulness of the lens array and their reduction is critical. So far, the results for the expected grating lobes in an array of Luneburg lenses have not been reported in the literature. Our aim is to study the grating lobes in a LLA as a function of the number of lenses in the array and also as a function of the spacing between the lenses. We present simulated results for the radiation patterns of two arrays using three and four Luneburg lenses, respectively, and show how removing part of the outer shells of the Luneburg lens and decreasing the element spacing can reduce the grating lobe level. © 2010 IEEE.
Odeh, N, Abolhasan, M, Safaei, F & IEEE 1970, 'Low Complexity Interference Aware Distributed Resource Allocation for Multi-cell OFDMA Cooperative Relay Networks', 2010 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC 2010), Wireless Communications and Networking Conference, IEEEXplore, Sydney, Australia, pp. 1-6.
View/Download from: Publisher's site
View description>>
In this paper we focus on the subcarrier allocation for the uplink OFDMA based cooperative relay networks. Multiple cells were considered, each composed of a single base station (destination), multiple amplify and forward (AF) relay stations and multiple subscriber stations (sources). The effects of inter-cell interference (ICI) have been considered to optimize the subcarrier allocation with low complexity. The optimization problem aims to maximize the sum rate of all sources and at the same time maintain the fairness among them. Full channel state information (CSI) is assumed to be available at the base station. In the proposed algorithm the subcarrier allocation is performed in three steps; firstly the subcarriers are allocated to the Relay Stations (RSs) by which the received ICI on each RS is minimized. Then, the pre-allocated subcarriers are allocated to subscribers to achieve their individual rate requirements. Finally the remaining subcarriers are allocated to subscribers with the best channel condition to maximize the total sum of their data rates. The results show that the proposed algorithm significantly reduces the complexity with almost the same achievable rate of the optimal allocation in a single cell case. In case of multi-cell, the proposed algorithm outperforms the conventional algorithm in terms of total network achievable data rate and overall network complexity. ©2010 IEEE.
Otoom, AF, Concha, OP & Piccardi, M 1970, 'Mixtures of Gaussian distributions under linear dimensionality reduction', VISAPP 2010 - Proceedings of the International Conference on Computer Vision Theory and Applications, VISAPP, Institute for Systems and Technologies of Information, Control and Communication, Angers, France, pp. 511-518.
View description>>
High dimensional spaces pose a serious challenge to the learning process. It is a combination of limited number of samples and high dimensions that positions many problems under the 'curse of dimensionality', which restricts severely the practical application of density estimation. Many techniques have been proposed in the past to discover embedded, locally-linear manifolds of lower dimensionality, including the mixture of Principal Component Analyzers, the mixture of Probabilistic Principal Component Analyzers and the mixture of Factor Analyzers. In this paper, we present a mixture model for reducing dimensionality based on a linear transformation which is not restricted to be orthogonal. Two methods are proposed for the learning of all the transformations and mixture parameters: the first method is based on an iterative maximum-likelihood approach and the second is based on random transformations and fixed (non iterative) probability functions. For experimental validation, we have used the proposed model for maximum-likelihood classification of five 'hard' data sets including data sets from the UCI repository and the authors' own. Moreover, we compared the classification performance of the proposed method with that of other popular classifiers including the mixture of Probabilistic Principal Component Analyzers and the Gaussian mixture model. In all cases but one, the accuracy achieved by the proposed method proved the highest, with increases with respect to the runner-up ranging from 0.2% to 5.2%.
Paisitkriangkrai, S, Mei, T, Zhang, J & Hua, X-S 1970, 'Scalable clip-based near-duplicate video detection with ordinal measure', Proceedings of the ACM International Conference on Image and Video Retrieval, CIVR' 10: International Conference on Image and Video Retrieval, ACM, Xi'an, pp. 121-128.
View/Download from: Publisher's site
View description>>
Detection of duplicate or near-duplicate videos on large-scale database plays an important role in video search. In this paper, we analyze the problem of near-duplicates detection and propose a practical and effective solution for real-time large-scale v
Paisitkriangkrai, S, Shen, C & Zhang, J 1970, 'Face Detection with Effective Feature Extraction', Computer Vision ACCV 2010, Asian Conference on Computer Vision, SpringerLink, Queenstown, New Zealand, pp. 460-470.
View/Download from: Publisher's site
View description>>
There is an abundant literature on face detection due to its important rolein many vision applications. Since Viola and Jones proposed the first real-timeAdaBoost based face detector, Haar-like features have been adopted as themethod of choice for frontal face detection. In this work, we show that simplefeatures other than Haar-like features can also be applied for training aneffective face detector. Since, single feature is not discriminative enough toseparate faces from difficult non-faces, we further improve the generalizationperformance of our simple features by introducing feature co-occurrences. Wedemonstrate that our proposed features yield a performance improvement comparedto Haar-like features. In addition, our findings indicate that features play acrucial role in the ability of the system to generalize.
Park, M, Jin, JS, Peng, Y, Summons, P, Yu, D, Cui, Y, Luo, S, Wang, F, Santos, L & Xu, M 1970, 'Automatic cell segmentation in microscopic color images using ellipse fitting and watershed', IEEE/ICME International Conference on Complex Medical Engineering, 2010 IEEE/ICME International Conference on Complex Medical Engineering - CME 2010, IEEE, Gold Coast, pp. 69-74.
View/Download from: Publisher's site
View description>>
This paper presents an efficient and innovative method for the automated counting of cells in a microscopic image. The performance of watershed-based algorithms for the segmentation of clustered cells has been well demonstrated. The strength of our algorithm lies in the fact that it incorporates knowledge of color in the image. Our method uses the watershed transform with iterative shape alignment and is shown to be more accurate in retaining cell shape. We report a sensitivity of 97% and specificity of 96% when all color bands are used. Our methods could be of value to computer-based systems designed to objectively interpret microscopic images, since they provide a means for accurate cell segmentation. © 2010 IEEE.
Peng, Y, Jin, JS, Luo, S & Xu, M 1970, 'Learning priors for super-resolution in video sequence', Proceedings of the Second International Conference on Internet Multimedia Computing and Service, ICIMCS '10: The Second International Conference on Internet Multimedia Computing and Service, ACM, Harbin, China, pp. 163-166.
View/Download from: Publisher's site
View description>>
Video becomes a crucial information resource in last decades, because of the rapid development of camera as well as the internet explosion. High-quality video sequences are always desired in lots of fields. Since the bottleneck of data storage and interferences of shooting condition, we cannot always obtain high-resolution video. This botheration can be circumvented by super-resolution. Currently, almost super-resolution techniques are in the framework of Maximum a Posterior (MAP). Appropriate parameters of prior distribution are crucial for recovering accurate super-resolution image. We utilise a novel Weighted Cross Validation (WCG) method to learn theses prior parameters. Comparison experiments are provided to illustrate the effectiveness of our approach. Copyright 2010 ACM.
Qin, PY, Weily, AR, Guo, YJ & Liang, CH 1970, 'Millimeter wave frequency reconfigurable quasi-Yagi antenna', Asia-Pacific Microwave Conference Proceedings, APMC, IEEE, pp. 642-645.
View description>>
A millimeter wave frequency reconfigurable quasi-Yagi antenna with a folded dipole driven element is presented. Two PIN diodes are inserted between the upper and lower strip of the folded dipole driver. By switching between different states of PIN diodes, the driven element of the antenna can be changed from a folded dipole with one parasitic director to a dipole with two parasitic directors. Due to the reconfigurable impedance characteristics of driven element, the proposed antenna can operate in either the typical millimeter wave WPAN band (5766GHz) or E-band (7176GHz). Similar end-fire radiation patterns are achieved across the entire tunable frequency range. Preliminary theoretical results on tuning range and radiation patterns for the reconfigurable antenna are described. © 2010 IEICE Institute of Electronics Informati.
Qin, PY, Weily, AR, Guo, YJ, Liang, CH, Cai, Y & IEEE 1970, 'A Pattern Reconfigurable U-slot Patch Antenna', 2010 IEEE ANTENNAS AND PROPAGATION SOCIETY INTERNATIONAL SYMPOSIUM, IEEE, pp. 1-4.
Qumer, A & Henderson-Sellers, B 1970, 'Empirical Evaluation of the Agile Process Lifecycle Management Framework.', RCIS, International Conference on Research Challenges in Information Science, IEEE, Nice, France, pp. 213-222.
View/Download from: Publisher's site
View description>>
While many organisations are interested in adopting agile methods suitable to their local circumstances, there is little guidance available on how to do so. To address this important issue, we have developed an agile software process lifecycle management framework (APLM). The APLM framework is intended for use by agile coaches, managers and consultants to facilitate the integration of agile practices into both software project development environments. This paper presents the outcomes of an empirical evaluation of the APLM framework that has been conducted by involving a practitioners' group composed of fourteen experienced agile experts from industry. The main objective of this empirical study is to determine to what extent each component of the agile process lifecycle management (APLM) framework is relevant, valuable and sufficient to achieve its purpose from an industry practitioner's perspective. © 2010 IEEE.
Qumer, A & Henderson-Sellers, B 1970, 'Framework as Software Service (FaSS) - An Agile e-Toolkit to Support Agile Method Tailoring.', ICSOFT (2), International Conference on Software and Data Technologies, SciTePress, Athens, Greece, pp. 167-172.
View description>>
In a real software application development environment, a pre-defined or fixed methodology, whether plan-based or agile, is unlikely to be successfully adopted 'off-the-shelf. Agile methods have recognised that a method should be tailored to each situation. The purpose of this paper is to present an agile e-toolkit software service to facilitate the tailoring of agile processes in the overall context of agile method adoption and improvement. The agile e-toolkit is a web-based tool to store and manage agile practices extracted from various agile methods and frameworks. The core component of the e-toolkit is the agile knowledge-base or repository. The agile knowledge-base contains agile process fragments. Agile consultants or teams can then use agile process fragments stored in the agile knowledge-base for the tailoring of situation-specific agile processes by using a situational method engineering approach. The e-toolkit software service has been implemented using a service-oriented cloud computing technology platform (Software as a Service-SaaS). The agile e-toolkit specifications and software application details have been summarized in this paper.
Resconi, G & Chaczko, Z 1970, 'Fuzzy network of reasoning by SVD and Morphotronic network', International Conference on Fuzzy Systems, 2010 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), IEEE, Barcelona International Convention Centre, Barcelona, Spain, pp. 1709-1716.
View/Download from: Publisher's site
View description>>
In the classical logic the inferential process is based on the modus ponens rule for which when the rule that connects the premise with the consequence is true and the premise is true, we know that the consequence is also true. Now, in the fuzzy inferential process the premise and the consequence are not logic propositions that assume the logic values true or false but are fuzzy sets that can assume values between zero and one. The classical logic rule is replaced with the fuzzy rule R. In this paper, we demonstrate that the fuzzy reasoning network is isomorphic to the Morphotronic network that includes the SVD technique. We also show that Morphotronic network is capable to simulate complex fuzzy reasoning or fuzzy inference in a completely new way.
Rosberg, Z, Cantoni, A & Liu, RP 1970, 'Resource allocation for QoS multiuser MIMO with zero forcing and MMSE beamforming', 2010 IEEE 18th International Workshop on Quality of Service (IWQoS), 2010 IEEE 18th International Workshop on Quality of Service (IWQoS), IEEE.
View/Download from: Publisher's site
View description>>
To enable ubiquitous end-to-end quality of service over IP networks expanding to rural areas, we examine resource allocation problems of a MAC layer for an OFDM MIMO wireless base station (BS) using multiuser beamforming. We compare two linear beamforming techniques, zero-forcing (ZF-BF) and minimum mean square error (MMSE-BF). To guarantee minimum bandwidth and low packet delay in an environment where the number of users is much larger than the number of BS antennas, one needs to partition the users into several sets and combine space division multiple access (SDMA) with time division multiple access (TDMA). We study the impact on the optimal transmission power resulting from selecting the following design parameters: (i) ZF-BF vs. MMSE-BF; (ii) the number of user sets multiplexed by TDMA; and (iii) the number of BS antennas. Two notable results are observed: (1) power wise, ZF-BF is far more superior to MMSE-ZF; (2) substantial power can be saved by increasing the number of BS antennas; however, only by large increments, e.g., from 6 to 9 and further to 21.
Saesue, W, Chou, CT & Zhang, J 1970, 'CROSS-layer QoS-optimized EDCA adaptation for wireless video streaming', 2010 IEEE International Conference on Image Processing, 2010 17th IEEE International Conference on Image Processing (ICIP 2010), IEEE, Hong Kong, pp. 2925-2928.
View/Download from: Publisher's site
View description>>
In this paper, we propose an adaptive cross layer technique that optimally enhance the QoS of wireless video transmission in an IEEE 802.11e WLAN. The optimization takes into account the unequal error protection characteristics of video streaming, the IE
Saesue, W, Chou, CT & Zhang, J 1970, 'Video quality prediction in the presence of MAC contention and wireless channel error', 2010 IEEE International Symposium on 'A World of Wireless, Mobile and Multimedia Networks' (WoWMoM), 2010 IEEE International Symposium on 'A World of Wireless, Mobile and Multimedia Networks' (WoWMoM), IEEE.
View/Download from: Publisher's site
View description>>
This paper proposes an integrated model to predict the quality of video, expressed in terms of mean square error (MSE) of the received video frames, in an IEEE 802.11e wireless network. The proposed system takes into account contention at the MAC layer, wireless channel error, queueing at the MAC layer, parameters of different 802.11e access categories (ACs), and video characteristics of different H.264 data partitions (DPs). To the best of the authors' knowledge, this is the first system that takes these network and video characteristics into consideration to predict video quality in an IEEE 802.11e network. The proposed system consists of two components. The first component predicts the packet loss rate of each H.264 data partition by using a multi-dimensional discrete-time Markov chain (DTMC) coupled to a M/G/1 queue. The second component uses these packet loss rates and the video characteristics to predict the MSE of each received video frames. We verify the accuracy of our combination system by using discrete event simulation and real H.264 coded video sequences. ©2010 IEEE.
Saesue, W, Zhang, J & Chou, CT 1970, 'Frame-recursive block-based distortion estimation model for multiple reference frames and motion copy concealment in H.264/AVC', 2010 18th International Packet Video Workshop, 2010 18th International Packet Video Workshop (PV), IEEE.
View/Download from: Publisher's site
Shafi, M & Guo, YJ 1970, 'WCNC 2010 Welcome from the Technical Program Chairs', 2010 IEEE Wireless Communication and Networking Conference, Networking Conference (WCNC), IEEE.
View/Download from: Publisher's site
Sinha, S & Chaczko, Z 1970, 'Socionomics inspired data routing in WSNs', 2010 4th International Conference on Signal Processing and Communication Systems, 2010 4th International Conference on Signal Processing and Communication Systems (ICSPCS 2010), IEEE, Gold Coast, Australia, pp. 1-9.
View/Download from: Publisher's site
View description>>
A society is typically driven by an economic model to manage demand, debt and distribution that is virtually analogous to the management of data, resources and routing in WSNs. In this paper, the application of such a socio-economic model is formalised as a framework to optimise resource utilisation and collaboration among sensor nodes. A specifically designed simulation platform (WSNSim) has been used to validate the Socionomics framework for WSN. A series of experiments involving the formation of relay points, node vulnerability, packet loss and delivery, and propagation delays, has been performed to demonstrate the scheme by which the framework aids in maximising network lifetime.
Su, Y, Tang, S, Shi, J, Huang, X & Guo, YJ 1970, 'Robust Downlink Precoding in Multiuser MIMO-OFDM Systems with Time-Domain Quantized Feedback', 2010 IEEE Wireless Communication and Networking Conference, Networking Conference (WCNC), IEEE.
View/Download from: Publisher's site
View description>>
We consider the robust linear precoding (LP) and Tomlinson-Harashima precoding (THP) schemes for multiuser MIMO-OFDM downlink channels with limited feedback. Benefiting from the correlation of spatial channels, the mobile terminal compresses and feeds back the time-domain channel vectors instead of the corresponding frequency-domain vectors to substantially reduce the feedback signalling overhead. A compression and restoration method and a codebook design for channel state information at the transmitter (CSIT) feedback are proposed in the time domain. By treating the partial CSIT as a random quantity, we develop the robust precoders to combat the truncation and quantization errors introduced in the feedback procedure. In comparison with the non-robust designs, both the robust LP and THP have better bit-error rate performance especially in high signal-to-noise ratio region. ©2010 IEEE.
Sutton, GJ, Liu, RP, Yang, X & Collings, IB 1970, 'Modelling Capture Effect for 802.11 DCF under Rayleigh Fading', 2010 IEEE International Conference on Communications, ICC 2010 - 2010 IEEE International Conference on Communications, IEEE, Cape Town, SOUTH AFRICA.
View/Download from: Publisher's site
Tan, Z, Jamdagni, A, He, X, Nanda, P, Liu, RP, Jia, W & Yeh, W-C 1970, 'A Two-Tier System for Web Attack Detection Using Linear Discriminant Method', Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Information and Communications Security, Springer Berlin Heidelberg, Barcelona, Spain, pp. 459-471.
View/Download from: Publisher's site
View description>>
Computational cost is one of the major concerns of the commercial Intrusion Detection Systems (IDSs). Although these systems are proven to be promising in detecting network attacks, they need to check all the signatures to identify a suspicious attack in the worst case. This is time consuming. This paper proposes an efficient two-tier IDS, which applies a statistical signature approach and a Linear Discriminant Method (LDM) for the detection of various Web-based attacks. The two-tier system converts high-dimensional feature space into a low-dimensional feature space. It is able to reduce the computational cost and integrates groups of signatures into an identical signature. The integration of signatures reduces the cost of attack identification. The final decision is made on the integrated low-dimensional feature space. Finally, the proposed two-tier system is evaluated using DARPA 1999 IDS dataset for webbased attack detection. © 2010 Springer-Verlag.
Thi, TH, Cheng, L, Zhang, J & Wang, L 1970, 'Implicit Motion-Shape Model: A generic approach for action matching', 2010 IEEE International Conference on Image Processing, 2010 17th IEEE International Conference on Image Processing (ICIP 2010), IEEE, Hong Kong, pp. 1477-1480.
View/Download from: Publisher's site
View description>>
We develop a robust technique to find similar matches of human actions in video. Given a query video, Motion History Images (MHI) are constructed for consecutive keyframes. This is followed by dividing the MHI into local Motion-Shape regions, which allow
Thi, TH, Cheng, L, Zhang, J, Wang, L & Satoh, S 1970, 'Weakly Supervised Action Recognition Using Implicit Shape Models', 2010 20th International Conference on Pattern Recognition, 2010 20th International Conference on Pattern Recognition (ICPR), IEEE, Istanbul, pp. 3517-3520.
View/Download from: Publisher's site
View description>>
In this paper, we present a robust framework for action recognition in video, that is able to perform competitively against the state-of-the-art methods, yet does not rely on sophisticated background subtraction preprocess to remove background features.
Thi, TH, Zhang, J, Cheng, L, Wang, L & Satoh, S 1970, 'Human Action Recognition and Localization in Video Using Structured Learning of Local Space-Time Features', 2010 7th IEEE International Conference on Advanced Video and Signal Based Surveillance, 2010 7th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS), IEEE, Boston, MA, pp. 204-211.
View/Download from: Publisher's site
View description>>
This paper presents a unified framework for human action classification and localization in video using structured learning of local space-time features. Each human action class is represented by a set of its own compact set of local patches. In our approach, we first use a discriminative hierarchical Bayesian classifier to select those space-time interest points that are constructive for each particular action. Those concise local features are then passed to a Support Vector Machine with Principal Component Analysis projection for the classification task. Meanwhile, the action localization is done using Dynamic Conditional Random Fields developed to incorporate the spatial and temporal structure constraints of superpixels extracted around those features. Each superpixel in the video is defined by the shape and motion information of its corresponding feature region. Compelling results obtained from experiments on KTH [22], Weizmann [1], HOHA [13] and TRECVid [23] datasets have proven the efficiency and robustness of our framework for the task of human action recognition and localization in video. © 2010 IEEE.
Tian, L, Pang, D, Yang, Y, Shi, J, Fang, G & Dutkiewicz, E 1970, 'Subcarrier Allocation for Multicast Services in Multicarrier Wireless Systems with QoS Guarantees', 2010 IEEE Wireless Communication and Networking Conference, Networking Conference (WCNC), IEEE.
View/Download from: Publisher's site
View description>>
The throughput of conventional multicast transmission in wireless systems is limited by the user with the worst channel quality in the multicast service group. The subcarrier allocation for multicast services in multicarrier systems is a feasible solution to overcome the capacity limitation by exploiting the frequency diversity among subcarriers. However, most of the current subcarrier allocation algorithms are limited to unicast services. In this paper, we propose an optimal subcarrier allocation algorithm for multicast services with Quality of Services (QoS) guarantees. A low-complexity suboptimal algorithm is also proposed, which includes three steps: Conservative Allocation, Greedy Step and Iterative Enhancement. Simulation results show that the proposed algorithms significantly outperform the conventional multicast transmission scheme while at the same time guaranteeing the minimum data rates of all users. Moreover, simulation results also show that the performance difference between the optimal and suboptimal algorithms is small. ©2010 IEEE.
Tornero, JLG, Weily, AR & Guo, YJ 1970, 'Non-Standard tapering of leaky-wave antennas in hybrid technology', 2010 IEEE Antennas and Propagation Society International Symposium, 2010 IEEE International Symposium Antennas and Propagation and CNC-USNC/URSI Radio Science Meeting, IEEE.
View/Download from: Publisher's site
View description>>
This paper illustrates for the first time the ability of leaky-wave antennas (LWAs) [1] in hybrid waveguide printed-circuit technology [2] to provide non-standard simultaneous tapering of the phase and the leakage rate of the constituent leakymode. This unusual tapering allows synthesis of broadbeam radiation patterns with high rejection out of the prescribed beamwidth [3], high efficiency focusing near field patterns [3,4] , or highly directive conformal antennas [5]. The proposed hybrid technology offers a much simpler and more flexible mechanism to design this unusual type of tapered LWAs, if compared to LWAs in pure waveguide [3] or pure printed-circuit [4-5] technologies. © 2010 IEEE.
Wang, JC-P, Hagelstein, B & Abolhasan, M 1970, 'Experimental Evaluation of IEEE 802.11s Path Selection Protocols in a Mesh Testbed', 2010 4TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION SYSTEMS (ICSPCS), International Conference on Signal Processing and Communication Systems, IEEE, Gold Coast, Australia, pp. 1-3.
View/Download from: Publisher's site
View description>>
IEEE 802.11s is an upcoming standard that defines how wireless devices can interconnect in a multi-hop configuration. While there are several protocol stacks based on the IEEE 802.11s draft standard, there has not been a formal study or comparison examining their practical performance. This paper evaluates the routing performance of open80211s in a real-world mesh testbed. The experiments benchmark open80211s against two established network layer routing protocols - OLSR and B.A.T.M.A.N.. The experimental results show that open80211s does not outperform existing routing protocols in practice. This indicates that more design and development effort is required for IEEE 802.11s to yield the performance that is expected for an IEEE standard protocol. ©2010 IEEE.
Wang, L, Cheng, L, Thi, TH & Zhang, J 1970, 'Human Action Recognition from Boosted Pose Estimation', 2010 International Conference on Digital Image Computing: Techniques and Applications, 2010 International Conference on Digital Image Computing: Techniques and Applications (DICTA), IEEE, Sydney, NSW, pp. 308-313.
View/Download from: Publisher's site
View description>>
This paper presents a unified framework for recognizing human action in video using human pose estimation. Due to high variation of human appearance and noisy context background, accurate human pose analysis is hard to achieve and rarely employed for the task of action recognition. In our approach, we take advantage of the current success of human detection and view invariability of local feature-based approach to design a pose-based action recognition system. We begin with a frame-wise human detection step to initialize the search space for human local parts, then integrate the detected parts into human kinematic structure using a tree structural graphical model. The final human articulation configuration is eventually used to infer the action class being performed based on each single part behavior and the overall structure variation. In our work, we also show that even with imprecise pose estimation, accurate action recognition can still be achieved based on informative clues from the overall pose part configuration. The promising results obtained from action recognition benchmark have proven our proposed framework is comparable to the existing state-of-the-art action recognition algorithms.
Wang, S, Du, R, Wu, Q & He, X 1970, 'Adaptive Stick-Like Features for Human Detection Based on Multi-scale Feature Fusion Scheme', 2010 International Conference on Digital Image Computing: Techniques and Applications, 2010 International Conference on Digital Image Computing: Techniques and Applications (DICTA), IEEE, Sydney, Australia, pp. 375-380.
View/Download from: Publisher's site
View description>>
Human detection has been widely used in many applications. In the meantime, it is still a difficult problem with many open questions due to challenges caused by various factors such as clothing, posture and etc. By investigating several benchmark methods and frameworks in the literature, this paper proposes a novel method which successfully implements the Real AdaBoost training procedure on multi-scale images. Various object features are exposed on multiple levels. To further boost the overall performance, a fusion scheme is established using scores obtained at various levels which integrates decision results with different scales to make the final decision. Unlike other score-based fusion methods, this paper re-formulates the fusion process through a supervised learning. Therefore, our fusion approach can better distinguish subtle difference between human objects and non-human objects. Furthermore, in our approach, we are able to use simpler weak features for boosting and hence alleviate the training complexity existed in most of AdaBoost training approaches. Encouraging results are obtained on a well recognized benchmark database. © 2010 IEEE.
Wang, W, Zhang, J & Shen, C 1970, 'Improved human detection and classification in thermal images', 2010 IEEE International Conference on Image Processing, 2010 17th IEEE International Conference on Image Processing (ICIP 2010), IEEE, Hong Kong, pp. 2313-2316.
View/Download from: Publisher's site
View description>>
We present a new method for detecting pedestrians in thermal images. The method is based on the Shape Context Descriptor (SCD) with the Adaboost cascade classifier framework. Compared with standard optical images, thermal imaging cameras offer a clear advantage for night-time video surveillance. It is robust on the light changes in day-time. Experiments show that shape context features with boosting classification provide a significant improvement on human detection in thermal images. In this work, we have also compared our proposed method with rectangle features on the public dataset of thermal imagery. Results show that shape context features are much better than the conventional rectangular features on this task.
Xu, KC, Jay Guo, Y & Dutkiewicz, E 1970, 'Swimmer tracking with underwater acoustic networks', 2010 10th International Symposium on Communications and Information Technologies, 2010 10th International Symposium on Communications and Information Technologies (ISCIT), IEEE, pp. 1045-1049.
View/Download from: Publisher's site
View description>>
A scheme for positioning swimmers using underwater acoustic networks is proposed. The design and the performance of such a network are presented. Owing to its high accuracy, the spherical interpolation approach is employed as the positioning algorithm. The configuration of the network, namely, the arrangement of anchor nodes in the swimming pool, is optimized to achieve the highest accuracy with the minimum number of nodes and therefore the lowest cost. The simulation study includes both two dimensional (2D) and three dimensional (3D) cases in order to understand the variation of positioning estimation accuracy in horizontal and vertical directions. ©2010 IEEE.
Xu, M, Chen, L, He, X, Xu, C & Jin, JS 1970, 'Adaptive local hyperplanes for MTV affective analysis', Proceedings of the Second International Conference on Internet Multimedia Computing and Service, ICIMCS '10: The Second International Conference on Internet Multimedia Computing and Service, ACM, Harbin, China, pp. 167-170.
View/Download from: Publisher's site
View description>>
Affective analysis attracts increasing attention in multimedia domain since affective factors directly reflect audiences' attention, evaluation and memory. Existing study focuses on mapping low-level affective features to high-level emotions by applying machine learning methods. Therefore, choosing effective features and developing efficient machine learning algorithms become vital for affective analysis. In this paper, we investigate the effectiveness of a novel classification approach, called Adaptive Local Hyperplanes (ALH), in affective analysis. The reason ALH is appealing in affective analysis is two-fold. Firstly, affective features are not equally important for emotion categories; ALH inherently assigns feature weights based on discriminative ability of each feature. Secondly, ALH achieves competitive performance with state-of-the-art classifiers (e.g., SVM) while it is designed for multi-class classification. Consequently, it is worthwhile to explore the usage of ALH in affective analysis. MTV data are used in this study. As the first effort of applying ALH to affective analysis, the results presented in this paper provide a foundation for future research in affective analysis. Copyright 2010 ACM.
Yang, X, Rosberg, Z, Cao, Z & Liu, RP 1970, 'Admission Control for Wireless Mesh Networks Based on Active Neighbor Bandwidth Reservations', 2010 IEEE International Conference on Communications, ICC 2010 - 2010 IEEE International Conference on Communications, IEEE, Cape Town, SOUTH AFRICA.
View/Download from: Publisher's site
Yin, XX, Ng, BW-H, Abbott, D, Jia, W & Ramamohanarao, K 1970, 'Fuzzy inference systems in MR image processing-a review', 2010 International Conference on Bioinformatics and Biomedical Technology, 2010 International Conference on Bioinformatics and Biomedical Technology, IEEE, pp. 19-22.
View/Download from: Publisher's site
View description>>
Fuzzy inference systems are of great interest to provide a consistent mathematical framework for the representation of imprecision in relation to objects, relationships, knowledge and aims, and are viewed as powerful tools for reasoning and decision-making. In this paper, we survey several fuzzy approaches in magnetic resonances image processing, with an aim to develop and validate multidimensional segmentation and filtering methodology for future research. We also briefly review a number of advances of fuzzy set theory in the MR image processing application domain. © 2010 IEEE.
Yu Peng, Park, M, Min Xu, Suhuai Luo, Jin, JS, Yue Cui & Felix Wong, WS 1970, 'Detection of nuclei clusters from cervical cancer microscopic imagery using C4.5', 2010 2nd International Conference on Computer Engineering and Technology, 2010 2nd International Conference on Computer Engineering and Technology, IEEE.
View/Download from: Publisher's site
View description>>
Cervical cancer is the second most common cancer among women. At the same time, cervical cancer could be largely preventable and curable with regular Pap tests. This test can find nuclei changes in the cervix. Accurate nuclei detection is extremely critical as it is the previous step of analysing nuclei changes and diagnosis afterwards. In recent years, automatic nuclei segmentation has increased dramatically. Although such algorithms could be utilised in the situation for sparse nuclei since they are intuitively detected, the segmentation for the complicated nuclei clusters is still challenging task. This paper presents a new methodology for the detection of cervical nuclei clusters. We first detect all the nuclei from the cervical microscopic image by an ellipse fitting algorithm. All the ellipses are then classified into single ones and cluster ones by C4.5 decision tree with selected features. We evaluated the performance of this method by the classification accuracy, sensitivity, and cluster predictive value. The result shown that the promising classification accuracy (97.8%) is obtained using C4.5 with 9 relative features. © 2010 IEEE.
Yu Peng, Park, M, Min Xu, Suhuai Luo, Jin, JS, Yue Cui, Wong, WSF & Santos, LD 1970, 'Clustering nuclei using machine learning techniques', IEEE/ICME International Conference on Complex Medical Engineering, 2010 IEEE/ICME International Conference on Complex Medical Engineering - CME 2010, IEEE, Gold Coast Australia, pp. 52-57.
View/Download from: Publisher's site
View description>>
Cervical cancer is the second most common cancer among women. Meanwhile, cervical cancer could be largely preventable and curable with regular Pap tests. Nuclei changes in the cervix could be found by this test. Accurate nuclei detection is extremely critical as it is the previous step of analysing nuclei changes and diagnosis afterwards. Recently, computer-aided nuclei segmentation has increased dramatically. Although such algorithms could be utilised in the situation for sparse nuclei since they are intuitively detected, the segmentation for the complicated nuclei clusters is still challenging task. This paper presents a new methodology for the detection of cervical nuclei clusters. We first detect all the nuclei from the cervical microscopic image by an ellipse fitting algorithm. Second, we chose some high-relevant features from all the features we obtained in last step via F-score, which is based on to what extent one feature attributes to results. All the ellipses are then classified into single ones and cluster ones by C4.5 decision tree with selected features. We evaluated the performance of this method by the classification accuracy, sensitivity, and cluster predictive value. With the 9 selected features from the original 13 features, we came by the promising classification accuracy (97.8%). © 2010 IEEE.
Yu, K, Fang, G & Dutkiewicz, E 1970, 'Position and Orientation Accuracy Analysis for Wireless Endoscope Magnetic Field Based Localization System Design', 2010 IEEE Wireless Communication and Networking Conference, Networking Conference (WCNC), IEEE.
View/Download from: Publisher's site
View description>>
This paper focuses on wireless capsule endoscope magnetic field based localization by using a linear algorithm, an unconstrained optimization method and a constrained optimization method. Eight sensor populations are employed for performance evaluation. For each of five sensor populations, four different sensor configurations are investigated, which represent potential sensor placements in practice. Accuracy is evaluated over a range of noise standard deviations and the position area is set on a solid cylinder which well represents the realistic scenario of the human body. It is observed that the optimization method greatly outperforms the linear algorithm that should not be used alone in general. The constrained optimization approach outperforms the unconstrained optimization method in presence of large noise. Simulation results show that best position accuracy is achieved when the sensors are uniformly deployed on a 2D plane with some sensors on the boundary of the position area. For the sensor populations considered, when increasing sensor population by one, the accuracy improves by about 0.45 divided by the sensor population. The results provide useful information for the design of wireless endoscope localization systems. ©2010 IEEE.
Yu, Y, Dutkiewicz, E, Huang, X, Mueck, M & Fang, G 1970, 'Performance analysis of soft frequency reuse for inter-cell interference coordination in LTE networks', 2010 10th International Symposium on Communications and Information Technologies, 2010 10th International Symposium on Communications and Information Technologies (ISCIT), IEEE, pp. 504-509.
View/Download from: Publisher's site
View description>>
Due to the requirement of high spectrum efficiency, the frequency reuse of one is targeted for next generation OFDMA-based cellular networks. Such a frequency planning strategy can lead to unacceptable inter-cell interference levels experienced especially by users located at the cell edge area. Soft frequency reuse (SFR) is considered as an effective frequency reuse scheme for inter-cell interference coordination as well as maintaining spectrum efficiency. In this paper, we investigate the performance of SFR for LTE downlink transmission by considering issues of various traffic loads and different power ratio configurations. In addition to the cell-edge user performance, the overall cell performance and the cell-center user performance are both evaluated in terms of throughput estimation. Using simulation studies, the advantages and limitations of SFR are comprehensively examined and compared against the classical frequency reuse of one scheme. ©2010 IEEE.
Yuan, Y, Zhang, Z, Li, J, Shi, J, Zhou, J, Fang, G & Dutkiewicz, E 1970, 'Extension of SCTP for Concurrent Multi-Path Transfer with Parallel Subflows', 2010 IEEE Wireless Communication and Networking Conference, Networking Conference (WCNC), IEEE.
View/Download from: Publisher's site
View description>>
With its new features such as multi-homing and multi-streaming the Stream Control Transmission Protocol (SCTP) has become a promising candidate as a general-purpose transport layer protocol. Multi-homing in an SCTP association can make concurrent multi-path transfer an appealing candidate to satisfy the ever increasing user demands for bandwidth. Multiple streams provide an aggregation mechanism to accommodate heterogeneous objects, which belong to the same application but may require different QoS from the network. However, the current approach lacks an internal mechanism to support preferential treatment among its streams for concurrent multipath transfer. In this paper, we introduce WM -SCTP (Wireless Multi-path Multi-flow - Stream Control Transmission Protocol), a transport layer solution for concurrent multi-path transfer with parallel subflows. WM -SCTP aims at exploiting SCTP's multi-homing and multi-streaming capability by grouping SCTP streams into subflows based on their required QoS and selecting best paths for each subflow to improve data transfer rates. The results show that under different scenarios WM -SCTP, can effectively enhance transmission efficiency. ©2010 IEEE. 2 2 2
Yuehe Ge, Esselle, KP & Bird, TS 1970, 'Designing a partially reflective surface for dual-band EBG resonator antennas', 2010 IEEE Antennas and Propagation Society International Symposium, 2010 IEEE International Symposium Antennas and Propagation and CNC-USNC/URSI Radio Science Meeting, IEEE.
View/Download from: Publisher's site
View description>>
A simple method is proposed for obtaining a partially reflective surface for use in dual-band, low-profile electromagnetic band-gap resonator antennas. This partially reflective surface is combined with an electric conductor ground to form a dual-band resonant cavity, allowing the design of a dual-band resonator antenna. The method to design the partially reflective surface is described and examples are given. © 2010 IEEE.
Zeng, C, Jia, W, He, X & Yang, J 1970, 'Graph-Based Text Segmentation Using a Selected Channel Image', 2010 International Conference on Digital Image Computing: Techniques and Applications, 2010 International Conference on Digital Image Computing: Techniques and Applications (DICTA), IEEE, Sydney, Australia, pp. 535-539.
View/Download from: Publisher's site
View description>>
This paper proposes a graph-based method for segmentation of a text image using a selected colour-channel image. The text colour information usually presents a two-polarity trend. According to the observation that the histogram distributions of the respective colour channel images are usually different from each other, we select the colour channel image with the histogram having the biggest distance between the two main peaks, which represents the main foreground colour strength and background colour strength respectively. The peak distance is estimated by the mean-shift procedure performed on each individual channel image. Then, a graph model is constructed on a selected channel image to segment the text image into foreground and background. The proposed method is tested on a public database, and its effectiveness is demonstrated by the experimental results. © 2010 IEEE.
Zhan Wang, Hai Jiang, Yi Sun, Jun Li, Jing Liu & Dutkiewicz, E 1970, 'A k-coordinated decentralized replica placement algorithm for the ring-based CDN-P2P architecture', The IEEE symposium on Computers and Communications, 2010 IEEE Symposium on Computers and Communications (ISCC), IEEE, pp. 811-816.
View/Download from: Publisher's site
View description>>
Content distribution networks (CDNs) improve the performance of content delivery by replicating the popular content on surrogate servers deployed at the edge of the Internet. The CDN-P2P architecture, which combines the complementary advantages of both CDN and P2P networks, can improve the quality of service (QoS). In this paper, we propose a k-coordinated decentralized replica placement algorithm (DRPA) based on a gain formulation of the replica placement problem. Although the gain formulation is designed for different types of the CDN-P2P architecture, we focus on the robust ring-based architecture in this study. In our approach, each surrogate server makes the replica placement in terms of the content replicas on k closer surrogate servers, which enhances the system scalability compared to the centralized replica placement heuristics. In addition, according to the simulation results, the proposed algorithm is able to reduce the backbone traffic between the servers and the requesting peers compared to the traditional replica placement algorithms for the pure CDN. © 2010 IEEE.
Zhang, A, Hanlen, LW & Huang, X 1970, 'Spreading with Walsh code for π/2-DBPSK modulated WBAN systems', 2010 IEEE 21st International Symposium on Personal, Indoor and Mobile Radio Communications Workshops, 2010 IEEE 21st International Symposium on Personal, Indoor and Mobile Radio Communications Workshops (PIMRC Workshops), IEEE, IEEE, pp. 84-88.
View/Download from: Publisher's site
View description>>
The IEEE has proposed a narrowband PHY for the IEEE standard of wireless body area network. To maintain small phase transition of the π/2-DBPSK modulated signal and ensure simple receiver design, repetition code is used where lower data rate is needed. In this paper, we suggest to replace the repetition code by Walsh code to improve the interference cancelation capability of the system. Spreading-before-modulation approach is suggested to retain the merit of small phase transition. Three receivers, including frequency discriminator, differential demodulator and coherent receiver, are developed for the proposed scheme. We show that the proposed scheme, with slightly increased complexity, can improve the signal to interference ratio by about 2 dB, which increases with increasing packet length. ©2010 IEEE.
Zhang, A, Smith, DB, Miniutti, D, Hanlen, LW, Rodda, D & Gilbert, B 1970, 'Performance of Piconet Co-Existence Schemes in Wireless Body Area Networks', 2010 IEEE Wireless Communication and Networking Conference, Networking Conference (WCNC), IEEE, IEEE, pp. 1-6.
View/Download from: Publisher's site
Zhang, J, Shen, C & Geers, G 1970, 'Preface', 2010 International Conference on Digital Image Computing: Techniques and Applications, 2010 International Conference on Digital Image Computing: Techniques and Applications (DICTA), IEEE.
View/Download from: Publisher's site
Zhou, E, Shi, J, Li, Y, Vucetic, B, Huang, X & Guo, YJ 1970, 'Power Allocation Based on Truncated Squared Norm of Channel Equalization Coefficients for TDD LTE-A Uplink Systems', 2010 IEEE Wireless Communication and Networking Conference, Networking Conference (WCNC), IEEE.
View/Download from: Publisher's site
View description>>
The power allocation problem is addressed for time division duplex (TDD) LTE-A uplink systems in this paper. Due to the IDFT de-spreading in LTE-A uplink, the channel frequency responses in an IDFT de-spreading block will be tangled together. After analyzing the equivalent signal to interference plus noise ratio (SINR) in the time domain, a Truncated Squared norm of channel equalization Coefficients based Power Allocation (TSCPA) method is proposed to improve the final SINR performance after the IDFT de-spreading block. The proposed TSC-PA algorithm is verified for the clustered DFT-s-OFDM system in eigen-model block diagonalization multi-user MIMO uplink environment by simulations. The results demonstrate that the proposed TSC-PA algorithm can further improve the system block error rate (BLER) performance by selecting a proper truncation threshold. ©2010 IEEE.