Abolhasan, M, Lipman, J, Ni, W & Hagelstein, B 2015, 'Software-Defined Wireless Networking: Centralized, Distributed, or Hybrid?', IEEE NETWORK, vol. 29, no. 4, pp. 32-38.
View/Download from: Publisher's site
View description>>
© 2015 IEEE. Scalability is a key issue in large scale WDNs, such as vehicular networks and device-to-device networks. To address the issue, this article extends the SDN concept, and presents a new network architecture that eliminates the need of multi-hop flooding for route discovery, thereby enabling WDNs to scale. The key idea of the new architecture is to split network control and data forwarding by using two separate frequency bands. Another important aspect of the architecture is that computational complexity of routing is split between the SDN controller and the forwarding nodes, thereby allowing nodes to make distributed routing decisions. As a result, network control of the new architecture has a hybrid structure, which improves the operability and scalability of large scale WDNs. Our case study shows that the new architecture is able to substantially improve scalability and reliability of WDNs, especially in mobile environments.
Abu Alsheikh, M, Hoang, DT, Niyato, D, Tan, H-P & Lin, S 2015, 'Markov Decision Processes With Applications in Wireless Sensor Networks: A Survey', IEEE Communications Surveys & Tutorials, vol. 17, no. 3, pp. 1239-1267.
View/Download from: Publisher's site
View description>>
Wireless sensor networks (WSNs) consist of autonomous and resource-limited devices. The devices cooperate to monitor one or more physical phenomena within an area of interest. WSNs operate as stochastic systems because of randomness in the monitored environments. For long service time and low maintenance cost, WSNs require adaptive and robust methods to address data exchange, topology formulation, resource and power optimization, sensing coverage and object detection, and security challenges. In these problems, sensor nodes are used to make optimized decisions from a set of accessible strategies to achieve design goals. This survey reviews numerous applications of the Markov decision process (MDP) framework, a powerful decision-making tool to develop adaptive algorithms and protocols for WSNs. Furthermore, various solution methods are discussed and compared to serve as a guide for using MDPs in WSNs.
Alzoubi, YI, Gill, AQ & Al-Ani, A 2015, 'Distributed Agile Development Communication: An Agile Architecture Driven Framework.', J. Softw., vol. 10, no. 6, pp. 681-694.
View/Download from: Publisher's site
View description>>
Agile methods depend on active communication and effective knowledge sharing among team
members for producing high quality working software systems in short releases and iterations. However,
effective communication in Distributed Agile Development (DAD) can be challenging due to a number of
different factors, such as physical locations, multi-cultures and time-zones. The agile body of knowledge
mainly discusses some technology and non-technology solutions and strategies to mitigate the DAD
communication challenges from a project management perspective. Nevertheless, it has recently been
argued that there is a need to understand and analyze DAD communication from other related but different
perspectives, such as enterprise strategy, enterprise architecture and service management. Due to the fact
that agile EA provides a holistic view and blueprint of the whole environment in which a number of projects
are developed and managed, we attempt in this study to explore the effect of agile Enterprise Architecture
(EA) on DAD communication. Particularly, we propose the development of an agile EA driven approach from
the architecture body of knowledge for handling the DAD communication challenges that have not been
thoroughly investigated before
Bautista, MG, Dutkiewicz, E & Heimlich, M 2015, 'Subthreshold Energy Harvesters Circuits for Biomedical Implants Applications', Proceedings of the 10th EAI International Conference on Body Area Networks, vol. 16, no. 9, pp. 1-5.
View/Download from: Publisher's site
View description>>
This paper reviews the state-of-art of the subthreshold level design energy harvesters for powering biomedical implants. Power consumption and lifespan are crucial requirements for the electronic circuitry of implantable systems. In order to meet these challenging requirements, a design for an energy harvester that operates in a subthreshold level offers a promising solution.
Cooper, CS, Mukunthan, A, Safaei, F, Ros, M, Franklin, DR & Abolhasan, M 2015, 'Including general environmental effects in K-factor approximation for rice-distributed VANET channels.', Phys. Commun., vol. 14, pp. 32-44.
View/Download from: Publisher's site
View description>>
This paper presents a method of approximating the Rician K-factor based on the instantaneous static environment. The strongest signal propagation paths are resolved in order to determine specular and diffuse powers for approximation. The model is experimentally validated in two different urban areas in New South Wales, Australia. Good agreement between the model and experimental data was obtained over short-range communication links, demonstrating the suitability of the model in urban VANETs. The paper concludes with recommendations for methods to account for vehicles in the simulation and incorporating additional phenomena (such as scattering) in the approximation.
Cui, Y, Zhang, J, Guo, D & Jin, Z 2015, 'Robust facial landmark localization using classified random ferns and pose-based initialization', Signal Processing, vol. 110, pp. 46-53.
View/Download from: Publisher's site
Ding, C, Guo, YJ, Qin, P-Y & Yang, Y 2015, 'A Compact Microstrip Phase Shifter Employing Reconfigurable Defected Microstrip Structure (RDMS) for Phased Array Antennas', IEEE TRANSACTIONS ON ANTENNAS AND PROPAGATION, vol. 63, no. 5, pp. 1985-1996.
View/Download from: Publisher's site
View description>>
© 1963-2012 IEEE. A compact phase shifter using reconfigurable defected microstrip structure (RDMS) is proposed for phased array antennas. A complete phase shifter design scheme that serves as an engineering guidance is described. Stepwise phase shifters that have phase-shifting ranges of 90° and 180° with a step size of 45° are designed, fabricated, and tested. The experimental results demonstrate that the size, maximum insertion loss of the phase shifters, and the quantity of the lumped elements are reduced by 80%-90%, 25%-30%, and 50%, respectively, compared to our previous work. Subsequently, a four-element phased array is built employing such RDMS-based phase shifters, realizing a size reduction of 55% in the array size. The measurement results show that the phased array antenna is able to switch its main beam between -15°, 0°, and 15° in the H-plane, with the average realized gain around 10 dBi.
Ding, J, Dutkiewicz, E & Huang, X 2015, 'Joint optimal relay location and power allocation for ultra-wideband-based wireless body area networks', EURASIP Journal on Wireless Communications and Networking, vol. 2015, no. 1.
View/Download from: Publisher's site
View description>>
© 2015, Ding et al.; licensee Springer. In this paper, we study the joint optimal relay location and power allocation problem for single-relay-assisted ultra-wideband (UWB)-based wireless body area networks (WBANs). Specifically, to optimize spectral efficiency (SE) for single-relay cooperative communication in UWB-based WBANs, we seek the relay with the optimal location together with the corresponding optimal power allocation. With proposed relay-location-based network models, the SE maximization problems are mathematically formulated by considering three practical scenarios, namely, along-torso scenario, around-torso scenario, and in-body scenario. Taking into account realistic power considerations for each scenario, the optimal relay location and power allocation are jointly derived and analyzed. Numerical results show the necessity of utilization of relay node for the spectral and energy-efficient transmission in UWB-based WBANs and demonstrate the effectiveness of the proposed scheme in particular for the around-torso and in-body scenarios. With the joint optimal relay location and power allocation, the proposed scheme is able to prolong the network lifetime and extend the transmission range in WBANs significantly compared to direct transmission.
Fan, X, Cao, L & Da Xu, RY 2015, 'Dynamic Infinite Mixed-Membership Stochastic Blockmodel', IEEE Transactions on Neural Networks and Learning Systems, vol. 26, no. 9, pp. 2072-2085.
View/Download from: Publisher's site
View description>>
© 2014 IEEE. Directional and pairwise measurements are often used to model interactions in a social network setting. The mixed-membership stochastic blockmodel (MMSB) was a seminal work in this area, and its ability has been extended. However, models such as MMSB face particular challenges in modeling dynamic networks, for example, with the unknown number of communities. Accordingly, this paper proposes a dynamic infinite mixed-membership stochastic blockmodel, a generalized framework that extends the existing work to potentially infinite communities inside a network in dynamic settings (i.e., networks are observed over time). Additional model parameters are introduced to reflect the degree of persistence among one's memberships at consecutive time stamps. Under this framework, two specific models, namely mixture time variant and mixture time invariant models, are proposed to depict two different time correlation structures. Two effective posterior sampling strategies and their results are presented, respectively, using synthetic and real-world data.
Gao, S, Chamberlain, NF & Guo, YJ 2015, 'Guest Editorial Antennas for Satellite Communications', IEEE Transactions on Antennas and Propagation, vol. 63, no. 4, pp. 1186-1190.
View/Download from: Publisher's site
View description>>
© 1963-2012 IEEE. The objective of this special issue is to bring together the most updated research contributions addressing antennas for satellite communications (both spaceborne and user terminals), and propose new applications, solutions, and challenges for the future.
Gefferth, A, Molnár, S & Veitch, D 2015, 'Discrete Self-Similarity'.
Gill, A, Bunker, D & Seltsikas, P 2015, 'Moving Forward: Emerging Themes in Financial Services Technologies’ Adoption', Communications of the Association for Information Systems, vol. 36, pp. 205-230.
View/Download from: Publisher's site
View description>>
© 2015 by the Association for Information Systems. Financial services technologies (FST) are core to the continuous transformation of financial services organizations (FSO). To date, however, there has been a lack of empirical research into FST adoption against the backdrop of the recent financial crisis. In this paper, we re-examine how FSO are currently positioned to take advantage of emerging FST. Note that, in this paper, we look forward rather than provide a commentary on the state of the art in technology adoption research. We conducted this research by applying an exploratory qualitative study method: we analyzed interview transcripts from thirty recent interviews of FSO technology executives and CIOs by using a thematic network analysis tool. This analysis uncovered nineteen basic, eight organizing, and two global FST adoption research themes along with their links to FST adoption objectives, challenges, customer centricity, human resources, outsourcing, and overall IT strategy maintenance. This research has both practical and theoretical research implications and serves as a resource base for FSO and researchers to set future research priorities and directions. We intend for the emerging themes that we present in this paper to facilitate research directions by shedding light on the areas of greatest value and potential return in FST adoption.
Gill, AQ 2015, 'Agile enterprise architecture modelling: Evaluating the applicability and integration of six modelling standards.', Inf. Softw. Technol., vol. 67, pp. 196-206.
View/Download from: Publisher's site
Gill, AQ 2015, 'Distributed Agile Development: Applying a Coverage Analysis Approach to the Evaluation of a Communication Technology Assessment Tool.', Int. J. e Collab., vol. 11, no. 1, pp. 57-76.
View/Download from: Publisher's site
View description>>
Copyright © 2015, IGI Global. Organizations have shown a significant interest in the adoption of emerging social technologies to support communication and collaboration needs of their Distributed Agile or Adaptive Development Environment (DADE). However, the challenge is how best to assess contemporary social technologies for supporting communication and collaboration in the DADE. Here, a communication technology assessment tool, called CTAT, is developed as a part of the Adaptive Enterprise Service System (AESS) toolkit by using the design research approach. This paper presents the evaluation of the CTAT construct through its use in the assessment of three social technologies within the context of a DADE. The results of this evaluation indicate that CTAT is shown to be useful, for example, when assessing a particular social technology for a specific DADE communication and collaboration context. The CTAT is intended to be used by senior developers for assessing social technologies for their DADE context.
Gill, AQ 2015, 'Social architecture considerations in assessing social media for emergency information management applications', Australian Journal of Emergency Management, vol. 30, no. 1, pp. 17-21.
View description>>
The emergency management industry is showing a significant interest in the adoption of social media for sourcing and disseminating crisis information. The emergency management industry needs to identify social architecture concerns when considering the adoption of a specific social media technology. Social architecture describes the properties and environment of a social system such as the 'emergency management system'. This paper identifies a set of 21 social architecture concerns based on recent qualitative research. This set of social architecture concerns can be used as a criteria list to assess the effectiveness of social media platforms for emergency information management applications.
Gill, AQ & Qureshi, MA 2015, 'Adaptive Enterprise Architecture Modelling.', J. Softw., vol. 10, no. 5, pp. 628-638.
View/Download from: Publisher's site
View description>>
Agile or adaptive enterprise architecture driven software development approach requires a modelling standard to describe the existing and to-be developed artifacts both at the high enterprise level and low, detailed level. However, a single modelling standard may not be used off-the-shelf to fully support the modelling needs of an adaptive enterprise architecture driven software development needs. The modelling standards need to be systematically analyzed and integrated for a particular modelling context. This paper reviews two well-known modeling standards ArchiMate and BPMN by using the interoperability research framework. Based on the syntax, semantics and structural analysis of these two modelling standards’ metamodels, it proposes a hybrid adaptive enterprise architecture modelling approach for describing and analysing the artifacts both at the high enterprise level and low, detailed level for a particular context. This paper has both theoretical and practical implications for researchers and practitioners pursuing to integrate various modelling standards.
Gill, AQ, Alam, SL & Eustace, J 2015, 'Social Architecture: An Emergency Management Case Study.', Australas. J. Inf. Syst., vol. 19, pp. 23-40.
View description>>
© 2015 Gill, Alam & Eustace. Emergency management agencies are progressively using social media for the sourcing and distribution of disaster information. Emergency management agencies are often unsure as to how to best identify and assess social media concerns (e.g. information security, trust) which must be addressed to develop a social media-enabled disaster information management environment. This paper adopts the Social Architecture Viewpoint Assessment (SAVA) framework for identifying and assessing social media concerns from four different viewpoints: IT, Value, Resource and Management. This paper demonstrates the use of the SAVA framework in the context of an in-depth empirical case study of an Australian emergency management agency. The results of this study indicate that the SAVA framework is useful for emergency information management managers in identifying and assessing social media concerns.
Gill, AQ, Bunker, D & Seltsikas, P 2015, 'Moving Forward: Emerging Themes in Financial Services Technologies' Adoption', COMMUNICATIONS OF THE ASSOCIATION FOR INFORMATION SYSTEMS, vol. 36, pp. 205-230.
Gilmore, R 2015, 'The world’s fastest wireless backhaul radio', Australian Journal of Telecommunications and the Digital Economy, vol. 3, no. 1, pp. 1-1.
View/Download from: Publisher's site
View description>>
Fibre is commonly perceived to be the dominant transport mechanism for transferring data from access points back to a central office, where it is aggregated onto the core network. However, high speed and long range wireless backhaul remains a cost-effective alternative to fibre networks. In some areas, wireless backhaul is dominant and becoming more and more attractive. However, commercially available wireless backhaul systems do not meet the requirements for both high speed and long range at the same time with sufficiently low latency for some applications. Traditional microwave systems can achieve long transmission range, but the data rates are then limited to a few hundred megabits per second. Multi-gigabit per second wireless communications can be achieved using millimetre-wave (mm-wave) frequency bands, especially in E-band, but the practical transmission range has then always been a major weakness.In this article, the world’s first 5Gbps radio solution – and the fastest commercial backhaul product – developed by EM Solutions Pty Ltd with the Commonwealth Scientific and Industrial Research Organisation (CSIRO) – is described. As well as achieving a state-of-the-art data rate, other key design features include maximal path length, minimal latency, and constant antenna pointing under wind and tower vibration.
Guan, D-F, Ding, C, Qian, Z-P, Zhang, Y-S, Cao, W-Q & Dutkiewicz, E 2015, 'An SIW-Based Large-Scale Corporate-Feed Array Antenna', IEEE Transactions on Antennas and Propagation, vol. 63, no. 7, pp. 2969-2976.
View/Download from: Publisher's site
View description>>
© 2015 IEEE. A 16 × 16 substrate-integrated waveguide (SIW) cavity-backed array antenna is proposed in this paper. The array consists of two layers. The top layer employs novel SIW-based subarrays with a compact size. The bottom layer is an 8 × 8 SIW corporate-feed network to feed the subarrays. The Chebyshev amplitude weighting is employed in the feed network, which substantially reduces the side lobe level (SLL). The array antenna is fabricated using low-cost printed circuit board technology. The experimental results show that the proposed array antenna has a large bandwidth of 15% from 18.5 to 21.5 GHz with a peak gain of 29.1 dBi at 20.5 GHz. Across the entire band, high radiation efficiency above 62% and a low SLL below -17 dB are realized. The design principle can be used as a guidance for large-scale planar array antenna design and the proposed antenna can be used as a receiving antenna located on the ground in satellite communication systems.
Guo, D, Ding, J, Tang, J, Xu, M & Zhao, C 2015, 'NIF-based seam carving for image resizing', Multimedia Systems, vol. 21, no. 6, pp. 603-613.
View/Download from: Publisher's site
Hasan, MA, Xu, M, He, X & Wang, Y 2015, 'A camera motion histogram descriptor for video shot classification', Multimedia Tools and Applications, vol. 74, no. 24, pp. 11073-11098.
View/Download from: Publisher's site
View description>>
© 2014, Springer Science+Business Media New York. In this paper, a novel camera motion descriptor is proposed for video shot classification. In the proposed method, raw motion information of consecutive video frames are extracted by computing the motion vector of each macroblock to form motion vector fields (MVFs). Next, a motion consistency analysis is applied on MVFs to eliminate the inconsistent motion vectors. Then, MVFs are divided into nine (3 × 3) local regions and the singular value decomposition (SVD) technique is applied on the motion vectors extracted from each local region in the temporal direction. Consistent motion vectors of a number of MVFs are compactly represented at a time to characterize temporal camera motion. Accordingly, each local region of the whole video shot is represented using a sequence of compactly represented vectors. Finally, the sequence of vectors is converted into a histogram to describe the camera motions of each local region. Combination of all the local histograms is considered as the camera motion descriptor of a video shot. The shot descriptors are used in a classifier to classify video shots. In this work, we use support vector machine (SVM) for performing classification tasks. The experimental results show that the proposed camera motion descriptor has strong discriminative capability to classify different camera motion patterns in professionally captured video shots effectively. We also show that our proposed approach outperforms two state-of-the-art video shot classification methods.
Hoang, DT, Lu, X, Niyato, D, Wang, P & Han, Z 2015, 'Applications of Repeated Games in Wireless Networks: A Survey', IEEE Communications Surveys and Tutorials, vol. 17, no. 4, pp. 2102-2135.
View/Download from: Publisher's site
View description>>
A repeated game is an effective tool to model interactions and conflicts forplayers aiming to achieve their objectives in a long-term basis. Contrary tostatic noncooperative games that model an interaction among players in only oneperiod, in repeated games, interactions of players repeat for multiple periods;and thus the players become aware of other players' past behaviors and theirfuture benefits, and will adapt their behavior accordingly. In wirelessnetworks, conflicts among wireless nodes can lead to selfish behaviors,resulting in poor network performances and detrimental individual payoffs. Inthis paper, we survey the applications of repeated games in different wirelessnetworks. The main goal is to demonstrate the use of repeated games toencourage wireless nodes to cooperate, thereby improving network performancesand avoiding network disruption due to selfish behaviors. Furthermore, variousproblems in wireless networks and variations of repeated game models togetherwith the corresponding solutions are discussed in this survey. Finally, weoutline some open issues and future research directions.
Hoang, DT, Niyato, D, Wang, P & Kim, DI 2015, 'Performance Analysis of Wireless Energy Harvesting Cognitive Radio Networks Under Smart Jamming Attacks', IEEE Transactions on Cognitive Communications and Networking, vol. 1, no. 2, pp. 200-216.
View/Download from: Publisher's site
View description>>
In cognitive radio networks with wireless energy harvesting, secondary users are able to harvest energy from a wireless power source and then use the harvested energy to transmit data opportunistically on an idle channel allocated to primary users. Such networks have become more common due to pervasiveness of wireless charging, improving the performance of the secondary users. However, in such networks, the secondary users can be vulnerable to jamming attacks by malicious users who can also harvest wireless energy to launch the attacks. In this paper, we first formulate the throughput optimization problem for a secondary user under the attacks by jammers as a Markov decision process (MDP). We then introduce a new solution based on the deception tactic to deal with smart jamming attacks. Furthermore, we propose a learning algorithm for the secondary user to find an optimal transmission policy and extend to the case with multiple secondary users in the same environment. Through the simulations, we demonstrate that the proposed learning algorithms can effectively reduce adverse effects from smart jammers even when they use different attack strategies.
Hoang, DT, Niyato, D, Wang, P & Kim, DI 2015, 'Performance Optimization for Cooperative Multiuser Cognitive Radio Networks with RF Energy Harvesting Capability', IEEE Transactions on Wireless Communications, vol. 14, no. 7, pp. 3614-3629.
View/Download from: Publisher's site
View description>>
We study the performance optimization problem for a cognitive radio network with radio frequency (RF) energy harvesting capability for secondary users. In such networks, the secondary users are able to not only transmit packets on a channel licensed to a primary user when the channel is idle, but also harvest RF energy from the primary users' transmissions when the channel is busy. Specifically, we propose a system model where the secondary users are able to cooperate to maximize the overall network throughput through sensing a set of common channels. We first consider the case where the secondary users cooperate in a TDMA fashion and propose a novel solution based on a learning algorithm to find optimal channel access policies for the secondary users. Then, we examine the case where the secondary users cooperate in a decentralized manner and we formulate the cooperative decentralized optimization problem as a decentralized partially observable Markov decision process (DEC-POMDP). To solve the cooperative decentralized stochastic optimization problem, we apply a decentralized learning algorithm based on the policy gradient and the Lagrange multiplier method to obtain optimal channel access policies. Extensive performance evaluation is conducted and it shows the efficiency and the convergence of the learning algorithms.
Huang, TN, Yi, X, Boon, CC, He, X, Feng, G, Lim, WM & Zhu, X 2015, 'A CMOS W-Band <formula formulatype='inline'> <tex Notation='TeX'>$4{\times}$</tex></formula> Quasi-Subharmonic Mixer', IEEE Microwave and Wireless Components Letters, vol. 25, no. 6, pp. 385-387.
View/Download from: Publisher's site
Huang, X, Zhang, JA & Guo, YJ 2015, 'Out-of-band emission reduction and a unified framework for precoded OFDM', IEEE Communications Magazine, vol. 53, no. 6, pp. 151-159.
View/Download from: Publisher's site
View description>>
© 1979-2012 IEEE. OFDM has been regarded as a promising candidate for use in cognitive radio systems with dynamic spectrum reuse capability. However, conventional OFDM has significant OOBE, which can cause severe interference to systems operating in adjacent frequency bands. In addition to conventional techniques such as spectral shaping filtering, guard band insertion, and time domain windowing, new OOBE reduction techniques, including cancellation carrier and spectral precoding, have been proposed in recent years. This article reviews various OOBE reduction techniques and proposes a generalized lowcomplexity OOBE reduction framework for discrete Fourier transform precoded OFDM. With the allocation of explicit frequency domain cancellation subcarriers and data domain cancellation symbols, the proposed framework enables various configurations to achieve significant OOBE reduction with low implementation complexity, and provides flexibility in balancing OOBE reduction and other performance metrics such as peak-to-average power ratio.
Ji, L-Y, Guo, YJ, Qin, P-Y, Gong, S-X & Mittra, R 2015, 'A Reconfigurable Partially Reflective Surface (PRS) Antenna for Beam Steering', IEEE Transactions on Antennas and Propagation, vol. 63, no. 6, pp. 2387-2395.
View/Download from: Publisher's site
View description>>
The design of a novel partially reflective surface (PRS) antenna with the capability of beam steering is presented in this paper. The beam steering is realized by employing a reconfigurable PRS structure to achieve a changeable reflection phase as well as using a phased array as the source to excite the PRS antenna. A prototype antenna including the biasing network is fabricated and measured. It achieves a consistent beam steering from -15 degrees to 15 degrees with respect to the broadside direction across an overlapped frequency range from 5.5 to 5.7 GHz with measured realized gains over 12 dBi. Good agreement between the simulated and measured results for the input reflection coefficients and radiation patterns is achieved, which validates the feasibility of the design principle. Compared with other beam steering PRS antennas, the proposed one enables a larger beam steering angle with comparable gains, requires a simpler biasing network, and is more compact.
Karmokar, DK, Esselle, KP & Bird, TS 2015, 'An Array of Half-Width Microstrip Leaky-Wave Antennas Radiating on Boresight', IEEE Antennas and Wireless Propagation Letters, vol. 14, pp. 112-114.
View/Download from: Publisher's site
Kemp, M & Xu, RYD 2015, 'Geometrically-constrained balloon fitting for multiple connected ellipses', Pattern Recognition, vol. 48, no. 7, pp. 2198-2208.
View/Download from: Publisher's site
Lai, J, Dutkiewicz, E, Liu, RP & Vesilo, R 2015, 'Opportunistic Spectrum Access with Two Channel Sensing in Cognitive Radio Networks', IEEE Transactions on Mobile Computing, vol. 14, no. 1, pp. 126-138.
View/Download from: Publisher's site
Lin, S, Ni, W, Tian, H & Liu, RP 2015, 'An Evolutionary Game Theoretic Framework for Femtocell Radio Resource Management', IEEE Transactions on Wireless Communications, vol. 14, no. 11, pp. 6365-6376.
View/Download from: Publisher's site
View description>>
© 2002-2012 IEEE. Plug-and-play femtocells will be an integrating part of future cellular networks. Resource management and interference mitigation become challenging, suffering from severely delayed network control in large-scale deployments. We propose a new game theoretic framework, where fast interference suppression is decoupled from the relatively slow frequency allocation process to tolerate the delayed control. The key idea is to cast femtocell clustering as an outer-loop evolutionary game coupled with bankruptcy channel allocation, which drives the cells to spontaneously switch to less interfered clusters. Within each cluster, we design an inner-loop non-cooperative power control game, such that the requirement of prompt control is eliminated. The two loops interact recursively with analytically confirmed stability. Simulations show that our framework can improve the throughput by 13.2% in a network of 200 cells, compared to the prior art. The gain grows further with the network size.
Liu, H, Zhu, X, Boon, CC & He, X 2015, 'Cell-Based Variable-Gain Amplifiers With Accurate dB-Linear Characteristic in 0.18 µm CMOS Technology', IEEE Journal of Solid-State Circuits, vol. 50, no. 2, pp. 586-596.
View/Download from: Publisher's site
View description>>
A simple and robust “cell-based” method is presented
for the design of variable-gain amplifiers (VGAs). The proposed
unit cell utilizes a unique gain compensation method and achieves
accurate dB-linear characteristic across a wide tuning range with
low power consumption and wide bandwidth. Several such highly
dB-linear unit cells can be cascaded to provide the required gain
range for a VGA. To prove the concept, single-cell, 5-cell, 10-cell
and 15-cell reconfigurable VGAs were fabricated in a standard
0.18 µm CMOS technology. The measurement results show that
the 10-cell VGA achieves a gain range of 38.6 dB with less than
0.19 dB gain error. The 15-cell VGA can either be used as recon-
figurable VGA for analog control voltage or tunable PGA for digital
control stream, with the flexibility of scaling gain range, gain
error/step and power consumption. For the VGA at highest gain
setting, it consumes 1.12 mW and achieves a gain range of 56 dB,
gain error less than 0.3 dB.
Liu, H, Zhu, X, Boon, CC & Yi, X 2015, 'Design of an oscillator with low phase noise and medium output power in a 0.25 µm GaN‐on‐SiC high electron‐mobility transistors technology', IET Microwaves, Antennas & Propagation, vol. 9, no. 8, pp. 795-801.
View/Download from: Publisher's site
Liu, H, Zhu, X, Boon, CC, Yi, X & Kong, L 2015, 'A 71 dB 150 <formula formulatype='inline'><tex Notation='TeX'>$\mu {\rm W}$</tex></formula> Variable-Gain Amplifier in 0.18 <formula formulatype='inline'><tex Notation='TeX'>$\mu{\rm m}$</tex></formula> CMOS Technology', IEEE Microwave and Wireless Components Letters, vol. 25, no. 5, pp. 334-336.
View/Download from: Publisher's site
Liu, W, Jia, S, Li, P, Chen, X, Yang, J & Wu, Q 2015, 'An MRF-Based Depth Upsampling: Upsample the Depth Map With Its Own Property', IEEE Signal Processing Letters, vol. 22, no. 10, pp. 1708-1712.
View/Download from: Publisher's site
Liu, W, Xue, H, Yu, Z, Wu, Q & Yang, J 2015, 'RGB-D depth-map restoration using smooth depth neighborhood supports', Journal of Electronic Imaging, vol. 24, no. 3, pp. 033015-033015.
View/Download from: Publisher's site
Liu, X, Wang, L, Huang, G-B, Zhang, J & Yin, J 2015, 'Multiple kernel extreme learning machine', Neurocomputing, vol. 149, pp. 253-264.
View/Download from: Publisher's site
Liu, Z, Zhang, Z, Wu, Q & Wang, Y 2015, 'Enhancing person re-identification by integrating gait biometric', Neurocomputing, vol. 168, pp. 1144-1156.
View/Download from: Publisher's site
View description>>
Person re-identification is an important problem for associating behavior of people monitored in surveillance camera networks. The fundamental challenges of person re-identification are the large appearance distortions caused by view angles, illumination and occlusions. To address these challenges, a method is proposed in this paper to enhance person re-identification by integrating gait biometric. The proposed framework consists of the hierarchical feature extraction and descriptor matching with learned metric matrices. Considering the appearance feature is not discriminative in some cases, the feature in this work composes of the appearance features and the gait feature for shape and temporal information. In order to solve the view-angle change problem and measuring similarity, data are mapped into a metric space so that distances between people can be measured more accurately. Then two fusion strategies are adopted. The score-level fusion computes distances on the appearance feature and the gait feature, respectively, and combine them as the final distance between samples. The feature-level fusion firstly installs two types of features in series and then computes distances by the fused feature. Finally, our method is tested on the CASIA gait dataset. Experiments show that integrating gait biometric is an effective way to enhance person re-identification.
Lu, S, Mei, T, Wang, J, Zhang, J, Wang, Z & Li, S 2015, 'Exploratory Product Image Search With Circle-to-Search Interaction', IEEE Transactions on Circuits and Systems for Video Technology, vol. 25, no. 7, pp. 1190-1202.
View/Download from: Publisher's site
Ma, X, Liu, D, Zhang, J & Xin, J 2015, 'A fast affine-invariant features for image stitching under large viewpoint changes', Neurocomputing, vol. 151, no. P3, pp. 1430-1438.
View/Download from: Publisher's site
View description>>
© 2014 Elsevier B.V. Image alignment and stitching is a popular application on many smart phones, but it is time consuming and creates a critical bottle neck in the course of implementation. In this paper, a fast and high-quality image stitching method is proposed. First, a series of simulated images is obtained by simulating the latitude and longitude angles of a raw image; second, FAST detector is used to detect the features of all the simulated images and described by Fast Retina Key-point (FREAK) before all the feature information is projected to the raw image; third, Hamming distance is used as a feature similarity metric and all the features are matched directly instead of using the repetitive projection in Affine-SIFT (ASIFT). RANSAC is then used to achieve the optimal affine-transformations, and lastly, a weighted average bending algorithm is used to smooth the intensities of the overlapping regions. The experimental results demonstrate that the proposed image stitching method greatly increases the speed of the image alignment process and produces a satisfactory result.
Nguyen, DN, Krunz, M & Hanly, SV 2015, 'Distributed Bargaining Mechanisms for MIMO Dynamic Spectrum Access Systems', IEEE Transactions on Cognitive Communications and Networking, vol. 1, no. 1, pp. 113-127.
View/Download from: Publisher's site
View description>>
© 2015 IEEE. Dynamic spectrum access (DSA) and MIMO communications are among the most promising solutions to address the ever increasing wireless traffic demand. An integration that successfully embraces the two is far from trivial due to the dynamics of spectrum opportunities as well as the requirement to jointly optimize both spectrum allocation and spatial/antenna pattern in a distributed fashion. Regardless of spectrum dynamics and heterogeneity, existing literature on channel/power allocation in MIMO DSA systems is only applicable to centralized cases. Our objective here is to design distributed algorithms that jointly allocate opportunistic channels to various links and to simultaneously optimize the MIMO precoding matrices so as to achieve fairness or maximize network throughput. For self-interested DSA links, our distributed algorithm allows links to negotiate channel allocation based on Nash bargaining (NB) and configure the precoding matrices so that links' rate demands are guaranteed while the surplus resources (after meeting minimum rate demands) are fairly allocated. Next, we consider a network throughput maximization formulation (NET-MAX). Both the NB-based and NET-MAX problems are combinatorial with mixed variables. To tackle them, we first transform the original problems by incorporating the concept of timesharing. Using dual decomposition, we develop optimal distributed algorithms for timesharing case, which shed light on how to derive a distributed algorithm for the original problems. Our work fills a gap in the literature of channel allocation where a central controller is not available.
Ni, W, Collings, IB, Lipman, J, Wang, X, Tao, M & Abolhasan, M 2015, 'GRAPH THEORY AND ITS APPLICATIONS TO FUTURE NETWORK PLANNING: SOFTWARE-DEFINED ONLINE SMALL CELL MANAGEMENT', IEEE WIRELESS COMMUNICATIONS, vol. 22, no. 1, pp. 52-60.
View/Download from: Publisher's site
View description>>
© 2015 IEEE. Network planning is facing new and critical challenges due to ad hoc deployment, unbalanced and drastically varying traffic demands, as well as limited backhaul and hardware resources in emerging small cell architectures. We discuss the application of graph theory to address the challenges. A clique-based software-defined online network management approach is proposed that captures traffic imbalance and fluctuation of small cells and optimally plans frequencies, infrastructures, and network structure at any instant. Its applications to three important small cell scenarios of cloud radio, point-to-point microwave backhaul, and interoperator spectrum sharing are demonstrated. Comparison studies show that in each of the scenarios, this new approach is able to significantly outperform conventional static offline network planning schemes in terms of throughput and satisfaction levels of small cells with regard to allocated bandwidths. Specifically, the throughput can be improved by 155 percent for the cloud radio scenario and 110.95 percent for the microwave backhaul scenario. The satisfaction level can be improved by 40 percent for interoperator spectrum sharing.
Ni, W, Collings, IB, Wang, X, Liu, RP, Kajan, A, Hedley, M & Abolhasan, M 2015, 'Radio Alignment for Inductive Charging of Electric Vehicles', IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, vol. 11, no. 2, pp. 427-440.
View/Download from: Publisher's site
View description>>
© 2005-2012 IEEE. To maximize power transfer for inductively charging electric vehicles (EVs), charger and battery coils must be aligned. Wireless sensors can be installed to estimate misalignments; however, existing ranging techniques cannot satisfy the precision requirements of the misalignment estimation. We propose a high-precision wireless ranging and misalignment estimation scheme, where high precision is achieved by iteratively measuring, estimating, and aligning the coils. Another key aspect is to convert the nonconvex misalignment estimation to a more tractable problem with a convex objective. We develop a conditional gradient descent method to solve the problem, which performs gradient descent (or conditional gradient descent on the boundary of the search space) and projects out-of-boundary points back into the space. Employing experimentally validated models, we show that our scheme can achieve 92% of the efficiency of perfectly aligned coils in 90% of operations, and tolerate correlated distance measurement errors. In contrast, the prior art is susceptible to correlation, undergoing a significant efficiency degradation of 18.5%.
Niyato, D, Hoang, DT, Luong, NC, Wang, P, Kim, DI & Han, Z 2015, 'Smart Data Pricing Models for Internet-of-Things (IoT): A Bundling Strategy Approach', IEEE Network, vol. 30, no. 2, pp. 18-25.
View/Download from: Publisher's site
View description>>
Internet of things (IoT) has emerged as a new paradigm for the futureInternet. In IoT, enormous devices are connected to the Internet and therebybeing a huge data source for numerous applications. In this article, we focuson addressing data management in IoT through using a smart data pricing (SDP)approach. With SDP, data can be managed flexibly and efficiently throughintelligent and adaptive incentive mechanisms. Moreover, it is a major sourceof revenue for providers and partners. We propose a new pricing scheme for IoTservice providers to determine the sensing data buying price and IoT servicesubscription fee offered to sensor owners and service users, respectively.Additionally, we adopt the bundling strategy that allows multiple providers toform a coalition and bid their services as a bundle, attracting more users andachieving higher revenue. Finally, we outline some important open researchissues for SDP and IoT.
Qiao, M, Bian, W, Xu, RYD & Tao, D 2015, 'Diversified Hidden Markov Models for Sequential Labeling.', IEEE Trans. Knowl. Data Eng., vol. 27, no. 11, pp. 2947-2960.
View/Download from: Publisher's site
Qin, P-Y, Wei, F & Guo, YJ 2015, 'A Wideband-to-Narrowband Tunable Antenna Using A Reconfigurable Filter', IEEE Transactions on Antennas and Propagation, vol. 63, no. 5, pp. 2282-2285.
View/Download from: Publisher's site
View description>>
A novel microstrip circular disc monopole antenna with a reconfigurable 10-dB impedance bandwidth is proposed in this communication for cognitive radios (CRs). The antenna is fed by a microstrip line integrated with a bandpass filter based on a three-line coupled resonator (TLCR). The reconfiguration of the filter enables the monopole antenna to operate at either a wideband state or a narrowband state by using a PIN diode. For the narrowband state, two varactor diodes are employed to change the antenna operating frequency from 3.9 to 4.82 GHz continuously, which is different from previous work using PIN diodes to realize a discrete tuning. Similar radiation patterns with low cross-polarization levels are achieved for the two operating states. Measured results on tuning range, radiation patterns, and realized gains are provided, which show good agreement with numerical simulations.
Rezazadeh, J, Moradi, M, Ismail, AS & Dutkiewicz, E 2015, 'Impact of static trajectories on localization in wireless sensor networks', Wireless Networks, vol. 21, no. 3, pp. 809-827.
View/Download from: Publisher's site
Shariati, N, Rowe, WST, Scott, JR & Ghorbani, K 2015, 'Multi-Service Highly Sensitive Rectifier for Enhanced RF Energy Scavenging', SCIENTIFIC REPORTS, vol. 5.
View/Download from: Publisher's site
View description>>
Due to the growing implications of energy costs and carbon footprints, the need to adopt inexpensive, green energy harvesting strategies are of paramount importance for the long-term conservation of the environment and the global economy. To address this, the feasibility of harvesting low power density ambient RF energy simultaneously from multiple sources is examined. A high efficiency multi-resonant rectifier is proposed, which operates at two frequency bands (478-496 and 852-869 MHz) and exhibits favorable impedance matching over a broad input power range (40 to 10 dBm). Simulation and experimental results of input reflection coefficient and rectified output power are in excellent agreement, demonstrating the usefulness of this innovative low-power rectification technique. Measurement results indicate an effective efficiency of 54.3%, and an output DC voltage of 772.8 mV is achieved for a multi-tone input power of '10 dBm. Furthermore, the measured output DC power from harvesting RF energy from multiple services concurrently exhibits a 3.14 and 7.24 fold increase over single frequency rectification at 490 and 860 MHz respectively. Therefore, the proposed multi-service highly sensitive rectifier is a promising technique for providing a sustainable energy source for low power applications in urban environments.
Tan, Z, Jamdagni, A, He, X, Nanda, P, Liu, RP & Hu, J 2015, 'Detection of Denial-of-Service Attacks Based on Computer Vision Techniques', IEEE Transactions on Computers, vol. 64, no. 9, pp. 2519-2533.
View/Download from: Publisher's site
View description>>
© 1968-2012 IEEE. Detection of Denial-of-Service (DoS) attacks has attracted researchers since 1990s. A variety of detection systems has been proposed to achieve this task. Unlike the existing approaches based on machine learning and statistical analysis, the proposed system treats traffic records as images and detection of DoS attacks as a computer vision problem. A multivariate correlation analysis approach is introduced to accurately depict network traffic records and to convert the records into their respective images. The images of network traffic records are used as the observed objects of our proposed DoS attack detection system, which is developed based on a widely used dissimilarity measure, namely Earth Mover's Distance (EMD). EMD takes cross-bin matching into account and provides a more accurate evaluation on the dissimilarity between distributions than some other well-known dissimilarity measures, such as Minkowski-form distance Lp and X2 statistics. These unique merits facilitate our proposed system with effective detection capabilities. To evaluate the proposed EMD-based detection system, ten-fold cross-validations are conducted using KDD Cup 99 dataset and ISCX 2012 IDS Evaluation dataset. The results presented in the system evaluation section illustrate that our detection system can detect unknown DoS attacks and achieves 99.95 percent detection accuracy on KDD Cup 99 dataset and 90.12 percent detection accuracy on ISCX 2012 IDS evaluation dataset with processing capability of approximately 59,000 traffic records per second.
Vasauskaite, J & Gill, AQ 2015, 'Rethinking enterprise architecture for sustainable energy system development', Journal of Electronic Science and Technology, vol. 13, no. 3, pp. 212-220.
View/Download from: Publisher's site
View description>>
The development of a sustainable energy system throughout an enterprise is a complex task, which requires an agile holistic approach.Such an approach needs to include a variety of objectives including energy strategy formation and strategic decision-making, which are directly related to the analysis and management of the main areas of sustainable development: The economic, technological, environmental, and social.These multidimensional requirements of sustainability are often difficult to achieve within the enterprise, because these aspects are interrelated and influenced by various internal and external environment factors. This paper first reviews the main challenges for an energy system, and then demonstrates how a strategic agile enterprise architecture driven approach could effectively guide the sustainable energy system development.The study presented in this paper provides a holistic approach that contributes to the advancement and usage of literature dealing with issues of sustainable energy system development and agile enterprise architecture, which has not been discussed before to any great extent.
Veitch, D & Tune, P 2015, 'Optimal Skampling for the Flow Size Distribution', IEEE Transactions on Information Theory, vol. 61, no. 6, pp. 3075-3099.
View/Download from: Publisher's site
View description>>
© 1963-2012 IEEE. We introduce a new method of data collection for flow size estimation, the optimized flow sampling sketch, which combines the optimal properties of flow sampling with the computational advantages of a counter array sketch. Using Fisher information as a definitive basis of comparison, we show that the statistical efficiency of the method is within a constant factor of that of flow sampling, which is known to be optimal but which cannot be implemented without a flow table, which has higher memory and computational costs. In the process, we derive new results on the Fisher information theoretic and variance properties of the counter array sketch, proving that an overloaded sketch actually destroys information. We revisit the 'eviction sketch' of Ribeiro et al. using the Fisher information framework. We show that its performance is much higher than previously supposed, and we define a new method, the optimized eviction sketch, which has very high efficiency. We compare these methods against each other and a third skampling method, sketch guided sampling, theoretically, on models and on data.
Wang, H, Liu, RP, Ni, W, Chen, W & Collings, IB 2015, 'VANET Modeling and Clustering Design Under Practical Traffic, Channel and Mobility Conditions', IEEE Transactions on Communications, vol. 63, no. 3, pp. 870-881.
View/Download from: Publisher's site
View description>>
© 1972-2012 IEEE. In Vehicular Ad Hoc Networks (VANETs), vehicles driving along highways can be grouped into clusters to facilitate communication. The design of the clusters, e.g., size and geographical span, has significant impacts on communication quality. Such design is affected by the Media Access Control (MAC) operations at the Data Link layer, the wireless channel conditions at the Physical layer, and the mobility of the vehicles. Previous works investigated these effects separately. In this paper, we present a comprehensive analysis that integrates the three important factors into one model. In particular, we model an unsaturated VANET cluster with a Markov chain by introducing an idle state. The wireless channel fading and vehicle mobility are integrated by explicitly deriving the joint distribution of inter-vehicle distances. Closed-form expressions of network performance measures, such as packet loss probability and system throughput, are derived. Our model, validated by extensive simulations, is able to accurately characterize VANET performance. Our analysis reveals intrinsic dependencies between cluster size, vehicle speed, traffic demand, and window size, as well as their impacts on the overall throughput and packet loss of the cluster. Performance evaluation results demonstrate the practical value of the proposed model in providing guidelines for VANET design and management.
Wang, S, Wu, Q, He, X, Yang, J & Wang, Y 2015, 'Local $N$ -Ary Pattern and Its Extension for Texture Classification', IEEE Transactions on Circuits and Systems for Video Technology, vol. 25, no. 9, pp. 1495-1506.
View/Download from: Publisher's site
View description>>
© 1991-2012 IEEE. Texture image classification is important in computer vision research. To effectively capture texture patterns, a distinctive feature such as a local binary pattern (LBP) is needed. An LBP is robust against monotonic and gray-scale variations and it computes quickly. Its robustness and speed advantage have made it popular in various texture analysis applications. However, an LBP is sensitive to noise, particularly smooth weak illumination gradients in near-uniform regions. To mitigate the effect of noise and increase distinctiveness, a local ternary pattern (LTP) is proposed. Compared with a binary coding LBP, an LTP adopts ternary coding. As a result, an LTP can better tolerate noise and is significantly more distinctive. These advantages of an LTP effectively improve its classification accuracy. However, the potential of ternary coding is not fully explored in LTPs because a ternary pattern is split into a pair of binary patterns. In this paper, to fully explore the distinctiveness in the local pattern, the feature extraction process is formulated as an integer decomposition problem, which is a generalized version of the Bachet de Meziriac weight problem (BMWP). Following this generalization, a local n -ary pattern (LNP) is proposed, for which the LBP is a special case parametrized under n=2. The LTP is not a special case of the LNP. Both LBP and LTP are used as benchmark methods to evaluate LNPs performance due to their well-recognized success. In addition, a rotation-invariant and uniform LNP is also proposed and compared with a rotation-invariant and uniform LBP. The proposed LNP achieves significantly improved texture classification accuracy compared with the LBP and also demonstrates considerable improvement over the LTP.
Wang, S, Zhang, J, Han, TX & Miao, Z 2015, 'Sketch-Based Image Retrieval Through Hypothesis-Driven Object Boundary Selection With HLR Descriptor', IEEE Transactions on Multimedia, vol. 17, no. 7, pp. 1045-1057.
View/Download from: Publisher's site
View description>>
The appearance gap between sketches and photo- realistic images is a fundamental challenge in sketch-based image retrieval (SBIR) systems. The existence of noisy edges on photo- realistic images is a key factor in the enlargement of the appearance gap and significantly degrades retrieval performance . To bridge the gap, we propose a framework consisting of a new line segment -based descriptor named histogram of line relationship (HLR) and a new noise impact reduction algorithm known as object boundary selection . HLR treats sketches and extracted edges of photo- realistic images as a series of piece-wise line segments and captures the relationship between them. Based on the HLR, the object boundary selection algorithm aims to reduce the impact of noisy edges by selecting the shaping edges that best correspond to the object boundaries. Multiple hypotheses are generated for descriptors by hypothetical edge selection. The selection algorithm is formulated to find the best combination of hypotheses to maximize the retrieval score; a fast method is also proposed. To reduce the distraction of false matches in the scoring process, two constraints on spatial and coherent aspects are introduced . We tested the HLR descriptor and the proposed framework on public datasets and a new image dataset of three million images, which we recently collected for SBIR evaluation purposes. We compared the proposed HLR with state-of-the-art descriptors (SHoG, GF-HOG). The experimental results show that our HLR descriptor outperforms them. Combined with the object boundary selection algorithm, our framework significantly improves SBIR performance.
Wei, F, Guo, YJ, Qin, P-Y & Shi, XW 2015, 'Compact Balanced Dual- and Tri-band Bandpass Filters Based on Stub Loaded Resonators', IEEE MICROWAVE AND WIRELESS COMPONENTS LETTERS, vol. 25, no. 2, pp. 76-78.
View/Download from: Publisher's site
View description>>
© 2001-2012 IEEE. A stub loaded resonator (SLR) is presented in this letter, which can achieve dual-band or tri-band differential-mode (DM) bandpass response with a high common-mode (CM) suppression. By changing the length of the center-loaded stub, the resonant frequency of the CM can be varied without affecting that of the DM. This helps in simplifying the design and tuning processes of the balanced filters. In order to validate its practicalbility, two balanced bandpass filters (BPFs) with two and three DM passbands and good CM suppression are designed. Good agreement between simulated and measured results is observed. To our best knowledge, the proposed balanced tri-band BPF is the first ever reported.
Xu, L, Huang, DD & Guo, YJ 2015, 'Robust Blind Learning Algorithm for Nonlinear Equalization Using Input Decision Information', IEEE Transactions on Neural Networks and Learning Systems, vol. 26, no. 12, pp. 3009-3020.
View/Download from: Publisher's site
View description>>
In this paper, we propose a new blind learning algorithm, namely, the Benveniste–Goursat input–output decision (BG-IOD), to enhance the convergence performance of neural network-based equalizers for nonlinear channel equalization. In contrast to conventional blind learning algorithms, where only the output of the equalizer is employed for updating system parameters, the BG-IOD exploits a new type of extra information, the input decision information obtained from the input of the equalizer, to mitigate the influence of the nonlinear equalizer structure on parameters learning, thereby leading to improved convergence performance. We prove that, with the input decision information, a desirable convergence capability that the output symbol error rate (SER) is always less than the input SER if the input SER is below a threshold, can be achieved. Then, the BG soft-switching technique is employed to combine the merits of both input and output decision information, where the former is used to guarantee SER convergence and the latter is to improve SER performance. Simulation results show that the proposed algorithm outperforms conventional blind learning algorithms, such as stochastic quadratic distance and dual mode constant modulus algorithm, in terms of both convergence performance and SER performance, for nonlinear equalization.
Ye, S, Geng, J, Liang, X, Jay Guo, Y & Jin, R 2015, 'A Compact Dual-Band Orthogonal Circularly Polarized Antenna Array With Disparate Elements', IEEE Transactions on Antennas and Propagation, vol. 63, no. 4, pp. 1359-1364.
View/Download from: Publisher's site
View description>>
© 1963-2012 IEEE. A dual-band orthogonally and circularly polarized antenna array with disparate elements is presented. By using corner-truncated stacked patches as elements, both left hand circular polarization (LHCP) in 12 GHz band and right hand circular polarization (RHCP) in 14 GHz band are realized in a shared antenna aperture. Furthermore, by employing disparate elements, the coupling between the two bands is suppressed effectively inside the feed network, hence improving isolation. The measured results of a four-element array agreed well with the simulated ones, achieving isolation better than 20 dB in the dual bands, and a maximum gain of 13.2 dBic for the LHCP and 13.9 dBic for the RHCP. The proposed array can find applications in satellite communications.
Yuwei Wu, Yunde Jia, Peihua Li, Jian Zhang & Junsong Yuan 2015, 'Manifold Kernel Sparse Representation of Symmetric Positive-Definite Matrices and Its Applications', IEEE Transactions on Image Processing, vol. 24, no. 11, pp. 3729-3741.
View/Download from: Publisher's site
Zhang, G & Piccardi, M 2015, 'Structural SVM with Partial Ranking for Activity Segmentation and Classification', IEEE Signal Processing Letters, vol. 22, no. 12, pp. 2344-2348.
View/Download from: Publisher's site
View description>>
© 1994-2012 IEEE. Structural SVM is an extension of the support vector machine for the joint prediction of structured labels from multiple measurements. Following a large margin principle, the training of structural SVM ensures that the ground-Truth labeling of each sample receives a score higher than that of any other labeling. However, no specific score ranking is imposed among the other labelings. In this letter, we extend the standard constraint set of structural SVM with constraints between 'almost-correct' labelings and less desirable ones to obtain a partial-ranking structural SVM (PR-SSVM) approach. Experimental results on action segmentation and classification with two challenging datasets (the TUM Kitchen mocap dataset and the CMU-MMAC video dataset) show that the proposed method achieves better detection and false alarm rates and higher F1 scores than both the conventional structural SVM and a comparable unstructured predictor. The proposed method also achieves higher accuracy than the state of the art on these datasets in excess of 14 and 31 percentage points, respectively.
Zhang, J, Huang, X, Dyadyuk, V & Guo, Y 2015, 'Massive hybrid antenna array for millimeter-wave cellular communications', IEEE Wireless Communications, vol. 22, no. 1, pp. 79-87.
View/Download from: Publisher's site
View description>>
© 2002-2012 IEEE. A massive hybrid array consists of multiple analog subarrays, with each subarray having its digital processing chain. It offers the potential advantage of balancing cost and performance for massive arrays and therefore serves as an attractive solution for future millimeter-wave (mm- Wave) cellular communications. On one hand, using beamforming analog subarrays such as phased arrays, the hybrid configuration can effectively collect or distribute signal energy in sparse mm-Wave channels. On the other hand, multiple digital chains in the configuration provide multiplexing capability and more beamforming flexibility to the system. In this article, we discuss several important issues and the state-of-the-art development for mm-Wave hybrid arrays, such as channel modeling, capacity characterization, applications of various smart antenna techniques for single-user and multiuser communications, and practical hardware design. We investigate how the hybrid array architecture and special mm-Wave channel property can be exploited to design suboptimal but practical massive antenna array schemes. We also compare two main types of hybrid arrays, interleaved and localized arrays, and recommend that the localized array is a better option in terms of overall performance and hardware feasibility.
Zhang, T, Yang, Z, Jia, W, Wu, Q, Yang, J & He, X 2015, 'Fast and robust head detection with arbitrary pose and occlusion', Multimedia Tools and Applications, vol. 74, no. 21, pp. 9365-9385.
View/Download from: Publisher's site
View description>>
© 2014, Springer Science+Business Media New York. Head detection in images and videos plays an important role in a wide range of computer vision and surveillance applications. Aiming to detect heads with arbitrarily occluded faces and head pose, in this paper, we propose a novel Gaussian energy function based algorithm for elliptical head contour detection. Starting with the localization of head and shoulder by an improved Gaussian Mixture Model (GMM) approach, the precise head contour is obtained by making use of the Omega shape formed from the head and shoulder. Experimental results on several benchmark datasets demonstrate the superiority of the proposed idea over the state-of-the-art in both detection accuracy and processing speed, even though there are various types of severe occlusions in faces.
Zhang, Z, Concha, OP & Piccardi, M 2015, 'Tracking people under heavy occlusions by layered data association', Multimedia Tools and Applications, vol. 74, no. 17, pp. 7239-7259.
View/Download from: Publisher's site
View description>>
© 2014, Springer Science+Business Media New York. One of the main difficulties in video tracking of people arises in scenarios where targets are repeatedly and extensively occluded by other moving objects. These types of occlusions significantly affect the measurements of the person’s position, motion, shape and appearance, posing major challenges to correct tracking and data association. In this paper, we present a method for tracking people in videos based on a simplified part-based model only loosely associated with body parts. Data association is provided by a layered data association approach which performs association at feature, part and global levels in a hierarchical fashion. Occlusions are detected and managed at the part level, with corresponding model update strategies. In addition, the tracker does not make any assumption on the target’s motion direction, thus allowing tracking to withstand abrupt sideways movements and changes of directions that frequently occur in busy scenes. Experimental results against popular trackers such as mean shift, particle filters and the recent k-shortest paths (KSP) tracker based on a variety of performance indicators and datasets including ETISEO, AVSS 2007 and PETS 2009 show the effectiveness of the proposed tracker.
Zhou, A, Liu, M, Li, Z & Dutkiewicz, E 2015, 'Cross-layer design with optimal dynamic gateway selection for wireless mesh networks', Computer Communications, vol. 55, pp. 69-79.
View/Download from: Publisher's site
Zhou, J, Dutkiewicz, E, Liu, RP, Fang, G & Liu, Y 2015, 'Energy Efficient Duty Cycle Design based on Quantum Immune Clonal Evolutionary Algorithm in Body Area Networks', Proceedings of the 10th EAI International Conference on Body Area Networks, vol. 16, no. 9.
View/Download from: Publisher's site
View description>>
© 2015 ICST. Duty cycle design is an important topic in body area networks. As small sensors are equipped with the limited power source, the extension of network lifetime is generally achieved by reducing the network energy consumption, for instance through duty cycle schemes. However, the duty cycle design is a highly complex NP-hard problem and its computational complexity is too high with exhaustive search algorithm for practical implementation. In order to extend the network lifetime, we proposed a novel quantum immune clonal evolutionary algorithm (QICEA) for duty cycle design while maintaining full coverage in the monitoring area. The QICEA is tested, and a performance comparison is made with simulated annealing (SA) and genetic algorithm (GA). Simulation results show that compared to the SA and the GA, the proposed QICEA can extending the lifetime of body area networks and enhancing the energy efficiency effectively.
Zhou, J, Dutkiewicz, E, Liu, RP, Fang, G & Liu, Y 2015, 'Low Energy Clustering in BAN Based on Fuzzy Simulated Evolutionary Computation', Proceedings of the 10th EAI International Conference on Body Area Networks, vol. 16, no. 8, pp. 1-7.
View/Download from: Publisher's site
View description>>
© 2015 ICST. A low energy clustering method of body area networks based on fuzzy simulated evolutionary computation is proposed in this paper. To reduce communication energy consumption, we also designed a fuzzy controller to dynamically adjust the crossover and mutation probability. Simulations are conducted by using the proposed method, the clustering methods based on the particle swarm optimization and the method based on the quantum evolutionary algorithm. Results show that the energy consumption of the proposed method decreased compared with the other two methods, which means that the proposed method significantly improves the energy efficiency.
Zhou, J, Dutkiewicz, E, Liu, RP, Huang, X, Fang, G & Liu, Y 2015, 'A Modified Shuffled Frog Leaping Algorithm for PAPR Reduction in OFDM Systems', IEEE Transactions on Broadcasting, vol. 61, no. 4, pp. 698-709.
View/Download from: Publisher's site
View description>>
© 2015 IEEE. Significant reduction of the peak-to-average power ratio (PAPR) is an implementation challenge in orthogonal frequency division multiplexing (OFDM) systems. One way to reduce PAPR is to apply a set of selected partial transmission sequence (PTS) to the transmit signals. However, PTS selection is a highly complex NP-hard problem and the computational complexity is very high when a large number of subcarriers are used in the OFDM system. In this paper, we propose a new heuristic PTS selection method, the modified chaos clonal shuffled frog leaping algorithm (MCCSFLA). MCCSFLA is inspired by natural clonal selection of a frog colony, it is based on the chaos theory. We also analyze MCCSFLA using the Markov chain theory and prove that the algorithm can converge to the global optimum. Simulation results show that the proposed algorithm achieves better PAPR reduction than using others genetic, quantum evolutionary and selective mapping algorithms. Furthermore, the proposed algorithm converges faster than the genetic and quantum evolutionary algorithms.
Zhu, H & Abbosh, A 2015, 'Compact tunable bandpass filter with wide tuning range using ring resonator and short‐ended coupled lines', Electronics Letters, vol. 51, no. 7, pp. 568-570.
View/Download from: Publisher's site
Zhu, H & Abbosh, A 2015, 'Tunable band‐pass filter with wide stopband and high selectivity using centre‐loaded coupled structure', IET Microwaves, Antennas & Propagation, vol. 9, no. 13, pp. 1371-1375.
View/Download from: Publisher's site
Zhu, H, Wang, Y & Abbosh, AM 2015, 'Broadband microwave crossover using parallel‐coupled microstrip lines and short‐ended stubs', IET Microwaves, Antennas & Propagation, vol. 9, no. 1, pp. 79-85.
View/Download from: Publisher's site
Abbas, SM, Esselle, KP, Ranga, Y, Qin, P-Y & IEEE 1970, 'Reconfigurable Antennas with Narrowband and Ultra Wideband Modes', 2015 IEEE MTT-S INTERNATIONAL MICROWAVE WORKSHOP SERIES ON RF AND WIRELESS TECHNOLOGIES FOR BIOMEDICAL AND HEALTHCARE APPLICATIONS (IMWS-BIO), IEEE MTT-S International Microwave Workshop Series on RF and Wireless Technologies for Biomedical and Healthcare Applications (IMWS-Bio), IEEE, Taipei, Taiwan, pp. 56-57.
View/Download from: Publisher's site
View description>>
© 2015 IEEE. In this paper simple printed reconfigurable antennas are presented for wireless body area network (WBAN) applications. These antennas are capable of switching between an ultra-wide mode for 3.1-10.6 GHz UWB links and a narrowband mode for 2.45 GHz industrial, scientific and medical (ISM) links. In addition, the printed single layer geometry avoids the need for any vias to the ground. Moreover, this multifunctional operation with the compact configuration ultimately saves much needed space in wearable electronic devices. The narrowband mode has a 10 dB return-loss bandwidth from 1.5 GHz to 2.98 GHz, while the UWB mode yields a 121% return-loss bandwidth.
Al-Manasia, M & Chaczko, Z 1970, 'An Overview of Chip Multi-Processors Simulators Technology', Advances in Intelligent Systems and Computing, International Conference on Systems Engineering, Springer International Publishing, Las Vegas, USA, pp. 877-884.
View/Download from: Publisher's site
View description>>
Computer System Architecture (CSA) simulators are generally used to develop and validate new CSA designs and developments. The goal of this paper is to provide an insight into the importance of CSA simulation and the possible criteria that differentiate between various CSA simulators. Multi-dimensional aspects determine the taxonomy of CSA simulators including their accuracy, performance, functionality and flexibility. The Sniper simulator has been selected for a closer look and testing. The Sniper proofs its ability to scale to hundred cores with a wide range of functionality and performance. © Springer International Publishing Switzerland 2015.
Alzoubi, YI & Gill, AQ 1970, 'An agile enterprise architecture driven model for geographically distributed agile development', International Conference on Information Systems Development, ISD 2015.
View description>>
Agile development is a highly collaborative environment, which requires active communication (i.e. effective and efficient communication) among stakeholders. The active communication in geographically distributed agile development (GDAD) environment is difficult to achieve due to many challenges. Literature has reported that active communication play critical role in enhancing GDAD performance through reducing the cost and time of a project. However, little empirical evidence is known about how to study and establish active communication construct in GDAD in terms of its dimensions, determinants and effects on GDAD performance. To address this knowledge gap, this paper describes an enterprise architecture (EA) driven research model to identify and empirically examine the GDAD active communication construct. This model can be used by researchers and practitioners to examine the relationships among two dimensions of GDAD active communication (effectiveness and efficiency), one antecedent that can be controlled (agile EA), and four dimensions of GDAD performance (on-Time completion, on-budget completion, software functionality and software quality).
Ara, P, Cheng, S, Heimlich, M & Dutkiewicz, E 1970, 'Grid sensitivity analysis of human phantom models to minimize the simulation error for capsule endoscope localization', 2015 15th International Symposium on Communications and Information Technologies (ISCIT), 2015 15th International Symposium on Communications and Information Technologies (ISCIT), IEEE, Nara, Japan, pp. 295-298.
View/Download from: Publisher's site
View description>>
© 2015 IEEE.Sensitivity analysis plays an important role in a variety of statistical methodologies, design procedures and model selection. For development of in-body wireless communications, it is essential to evaluate the designed system performance prior to conducting any practical procedures. Localization of a capsule endoscope inside the gastrointestinal tract is one of the areas that needs to be precisely addressed in wireless body area networks. Since practical experiments on the real human body are quite infeasible, various human phantom models have been developed for this purpose. This study provides a detailed sensitivity analysis for two different anatomical human phantom models. The study shows that the adjustment of best possible grid and the number of cells have a significant impact on the simulation results to obtain a precise path loss and consequently to estimate an accurate location of capsule. This all aid us to improve the system performance.
Ara, P, Cheng, S, Heimlich, M & Dutkiewicz, E 1970, 'Sensitivity analysis of human phantom models for accurate in-body path-loss model development', 2015 IEEE 26th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), 2015 IEEE 26th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), IEEE, China, pp. 1328-1332.
View/Download from: Publisher's site
View description>>
© 2015 IEEE. Sensitivity analysis plays an important role in a variety of statistical methodologies, design procedures and model selection. For development of in-body wireless communications, it is essential to evaluate the designed system performance prior to conducting any practical procedures. Localization of a capsule endoscope inside the gastrointestinal tract is one of the areas that needs to be precisely addressed in wireless body area networks. A highly accurate location estimation of a capsule endoscope in the range of several millimeters is a challenging task. This is mainly because the Radio-Frequency signals encounter a high loss and a highly dynamic channel propagation environment. Therefore, investigation of an accurate path-loss model is required for the development of localization algorithms. Since practical experiments on the real human body are quite infeasible, various human phantom models have been developed for this purpose. This study provides a detailed sensitivity analysis for two different anatomical human phantom models and shows how much the adjustment of the voxeling and the number of cells in phantom models are crucial to reduce the measurement errors in path loss and improve system performance.
Ara, P, Shaokoon Cheng, Heimlich, M & Dutkiewicz, E 1970, 'Investigation of in-body path loss in different human subjects for localization of capsule endoscope', 2015 37th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), 2015 37th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), IEEE, Milan, pp. 5461-5464.
View/Download from: Publisher's site
View description>>
© 2015 IEEE. Recent developments in capsule endoscopy have highlighted the need for accurate techniques to estimate the location of a capsule endoscope. A highly accurate location estimation of a capsule endoscope in the gastrointestinal (GI) tract in the range of several millimeters is a challenging task. This is mainly because the radio-frequency signals encounter high loss and a highly dynamic channel propagation environment. Therefore, an accurate path-loss model is required for the development of accurate localization algorithms. This paper presents an in-body path-loss model for the human abdomen region at 2.4 GHz frequency. To develop the path-loss model, electromagnetic simulations using the Finite-Difference Time-Domain (FDTD) method were carried out on two different anatomical human models. A mathematical expression for the path-loss model was proposed based on analysis of the measured loss at different capsule locations inside the small intestine. The proposed path-loss model is a good approximation to model in-body RF propagation, since the real measurements are quite infeasible for the capsule endoscopy subject.
Aslanzadeh, S & Chaczko, Z 1970, 'Load balancing optimization in cloud computing: Applying Endocrine-particale swarm optimization', 2015 IEEE International Conference on Electro/Information Technology (EIT), 2015 IEEE International Conference on Electro/Information Technology (EIT), IEEE, Dekalb, IL, USA, pp. 165-169.
View/Download from: Publisher's site
View description>>
© 2015 IEEE. Load balancing optimization is categorized as NP-hard problem, playing an important role in enhancing the cloud utilization. Different methods have been proposed for achieving the system load balancing in cloud environment. VM migration is one of these techniques, proposed to improve the VMs' functionality. Despite of the advantageous of VM migration, there are still some drawbacks which urged researchers to improve VM migration methods. In this paper we propose a new load balancing technique, using Endocrine algorithm which is inspired from regulation behavior of human's hormone system. Our proposed algorithm achieves system load balancing by applying self-organizing method between overloaded VMs. This technique is structured based on communications between VMs. It helps the overloaded VMs to transfer their extra tasks to another under-loaded VM by applying the enhanced feed backing approach using Particle Swarm Optimization (PSO). To evaluate our proposed algorithm, we expanded the cloud simulation tool (Cloudsim) which is developed by University of Melbourne. The simulation result proves that our proposed load balancing approach significantly decreases the timespan compared to traditional load balancing techniques. Moreover it increases the Quality Of Service (QOS) as it minimizes the VMs' downtime.
Awwad, S, Hussein, F, Piccardi, M & ACM 1970, 'Local Depth Patterns for Tracking in Depth Videos', MM'15: PROCEEDINGS OF THE 2015 ACM MULTIMEDIA CONFERENCE, ACM International Conference on Multimedia, ACM, Australia, Brisbane, pp. 1115-1118.
View/Download from: Publisher's site
View description>>
Conventional video tracking operates over RGB or grey-level data which contain significant clues for the identification of the targets. While this is often desirable in a video surveillance context, use of video tracking in privacy-sensitive environments such as hospitals and care facilities is often perceived as intrusive. Therefore, in this work we present a tracker that provides effective target tracking based solely on depth data. The proposed tracker is an extension of the popular Struck algorithm which leverages a structural SVM framework for tracking. The main contributions of this work are novel depth features based on local depth patterns and a heuristic for effectively handling occlusions. Experimental results over the challenging Princeton Tracking Benchmark (PTB) dataset report a remarkable accuracy compared to the original Stuck tracker and other state-of-the-art trackers using depth and RGB data.
Banjar, A, Pupatwibul, P & Braun, R 1970, 'Comparison of TCP/IP Routing Versus OpenFlow Table and Implementation of Intelligent Computational Model to Provide Autonomous Behavior', Studies in Computational Intelligence, Asia-Pacific Conference on Computer Aided System Engineering (APCASE), Springer International Publishing, Bali, Indonesia, pp. 121-142.
View/Download from: Publisher's site
View description>>
© Springer International Publishing Switzerland 2015 Software-Defined Networking (SDN) is an emerging programmable network architecture, where network control plane is decoupled from forwarding plane. The first standardize communication interface defined between the controls and forwarding layers of the SDN architecture is known as OpenFlow. OpenFlow is a key enabler for SDN that allows direct manipulation on the forwarding plane of network devices. SDN forwarding methods are based on flows, through a protocol like OpenFlow, which operates in contrast to conventional networking device methods, such as TCP/IP routing table and MAC learning table. In more details, OpenFlow protocol has the same forwardingmethods to push L2-L4 functions which are simplified into a Flow-Table(s). This paper discusses the relationship between the processes of forwarding packets in conventional IP routing table versus OpenFlow-table. Then, the paper proposes the three phases of implementing aDistributed Active Information Model (DAIM) within OpenFlow to support an autonomic network management.
Bautista, MG, Jilluh, QI, Heimlich, M, Dutkiewicz, E & Pasco, J 1970, 'Design of low power, high PSRR low drop-out voltage regulator', 2015 International Conference on Humanoid, Nanotechnology, Information Technology,Communication and Control, Environment and Management (HNICEM), 2015 International Conference on Humanoid, Nanotechnology, Information Technology,Communication and Control, Environment and Management (HNICEM), IEEE, Cebu City, Philippines.
View/Download from: Publisher's site
View description>>
© 2015 IEEE.This paper presents a low power, low drop-out (LDO) voltage regulator, designed and implemented using 0.18 micron CMOS process. With a supply voltage of 1.8V, 50mA current and with a single compensation capacitor of 1pF. A constant transconductance current reference is used as a bias circuit for the Error Amplifier. The maximum output load current is 50mA at a regulated output voltage of 1.68V.The voltage regulator delivers a full load transient response of 5.5mV overshoot and 3.4mV undershoot. Furthermore, the LDO PSRR rating is -73dB @ 16.7MHz, and a relatively low power of 90mW.
Braun, R & Chaczko, Z 1970, 'That flipping classroom - getting engineering students to be consciously competent on their own', 2015 International Conference on Information Technology Based Higher Education and Training (ITHET), 2015 International Conference on Information Technology Based Higher Education and Training (ITHET), IEEE, Lisbon, pp. 1-4.
View/Download from: Publisher's site
View description>>
© 2015 IEEE. This paper is inspired by the Keynote Speech which I gave at ITHET 2014 in York in September 2014. The material was very well received, and it seemed appropriate to offer it for publication in the proceedings of ITHET 2015.
Braytee, A, Gill, AQ, Kennedy, PJ & Hussain, FK 1970, 'A Review and Comparison of Service E-Contract Architecture Metamodels.', ICONIP (4), International Conference on Neural Information Processing, Springer, Istanbul, Turkey, pp. 583-595.
View/Download from: Publisher's site
View description>>
© Springer International Publishing Switzerland 2015. An adaptive service e-contract is an electronic agreement which is required to enable adaptive or agile service sourcing and pro- visioning. There are a number of e-contract metamodels that can be used to create a context specific adaptive service e-contract. The chal- lenge is which one to choose and adopt for adaptive services. This paper presents a review and comparison of well-known e-contract metamod- els using the architecture theory. The architecture theory allows the analysis of the e-contract metamodels using a three-dimension analyt- ical lens: structure, behavior and technology. The results of this paper highlight the metamodels structural, behavioral and technological differ- ences and similarities. This paper will help researchers and practitioners to observe the existing e-contract metamodels are appropriate to the adaptive services or if thwhetherere is a need to merge and integrate the concepts of these metamodels to propose a new unifying adaptive service e-contract metamodel. This paper is limited to the number of compared metamodels.
Cao, K, Guo, Y & Su, SW 1970, 'A review of motion related EEG artifact removal techniques', 2015 9th International Conference on Sensing Technology (ICST), 2015 9th International Conference on Sensing Technology (ICST), IEEE, Auckland, pp. 600-604.
View/Download from: Publisher's site
View description>>
The traditional EEG (electroencephalograph) system requires the subject to stay still when acquiring bio-signals. There have been mobile EEG units, for instance ambulatory electroencephalography (AEEG), a portable device designed for recording ictal events or interictal epileptiform discharge. However, these were never intended for motion related EEG recordings. Such techniques constrain motion related brain potential tests. A number of papers have considered this issue and as a result a new research area was established. This paper is a review on the different aspects of this problem, such as algorithms and hardware design, for the reduction of motion related EEG artifacts. Finally, this paper recommends several proper strategies on EEG artifact reduction.
Chaczko, Z, Alenazy, W & Chan, CY 1970, 'Middleware-based Software Architecture For Interactions in the Smart Learning Environment', INNOVATION MANAGEMENT AND SUSTAINABLE ECONOMIC COMPETITIVE ADVANTAGE: FROM REGIONAL DEVELOPMENT TO GLOBAL GROWTH, VOLS I - VI, 2015, International Business Information Management, IBIMA Publishing, Madrid, SPAIN, pp. 699-714.
View description>>
Traditional classrooms involve the use of face-to-face and a whiteboard or projector, but the inabilities to micro manage the environment between the teaching staff and the student calls for a need for a smart interactive learning environment. The aim of this work is to develop evidence and experiments for an architecture for a smart learning environment. This paper discusses the design and implementation of integrating haptic technologies into the architecture of a smart learning environment by designing components of service oriented software middleware that defines a common gesture framework. The study utilised a software test-bed to confirm the feasibility of the architectural design based on the proposed framework. The results indicated that the new structural design allows multiple haptic and gesture peripherals to share a common protocol, as well as, facilitate individual devices to work and exist as stand-alone entities within the ambient setting to enhance collaborative learning.
Chaczko, Z, Alenazy, W & Tran, A 1970, 'Augmented Reality and the Adapted of Smart Grid Monitoring for Educational Enhancement', Computational Intelligence and Efficiency in Engineering Systems, Asia-Pacific Conference on Computer Aided System Engineering (APCASE), Springer International Publishing, Bali, Indonesia, pp. 347-364.
View/Download from: Publisher's site
Chaczko, Z, Aslanzadeh, S & Lulwah, A 1970, 'Autonomous Model of Software Architecture for Smart Grids', Advances in Intelligent Systems and Computing, International Conference on Systems Engineering, Springer International Publishing, Las Vegas, pp. 843-847.
View/Download from: Publisher's site
View description>>
Smart grids are being deployed at global level to ensure energy efficiency. As a result, scalable smart software platforms are required which can be used to incorporate and integrate information coming from various consumers using smart meters. Smart grids are supported by smart software architectures which are supported by cloud platforms. Cloud and Internet-of-Things (IoT) platforms provide scalable resources which can be used to design software infrastructures which allow always-on applications. The report paper explores smart grid and energy efficiency, how cloud and IoT platforms are used to enhance smart software architecture for smart grids, and privacy and security issues that result from the use of clouds. © Springer International Publishing Switzerland 2015.
Chaczko, Z, Aslanzadeh, S & Soltani, M 1970, 'Middleware Solution for Cross-Site Data Transfer', Advances in Intelligent Systems and Computing - Proceedings of the Twenty-Third International Conference on Systems Engineering, International Conference on Systems Engineering, Springer International Publishing, Texas, USA, pp. 837-841.
View/Download from: Publisher's site
View description>>
Nowadays more and more companies are ready to move to cloud and take advantage of cloud computing. CIOs have a variety of sourcing options to choose from: traditional, private clouds and public clouds. Since an increasing number of companies are moving to cloud, integration plays a critical role in future of Enterprise systems. Reliable Messaging becomes very important when it comes to integration between services across different sites which provides unreliable environment. To gain the benefits of a hybrid environment, enterprises need to consider an IT delivery model that is both flexible across different sourcing options and that can be managed as an integrated technology environment. This paper discusses advantages and pitfalls of using cloud infrastructure as service. © Springer International Publishing Switzerland 2015.
Chaczko, Z, Cheuk Yan Chan, Carrion, L & Alenazy, WMG 1970, 'Haptic Middleware Based Software Architecture for Smart Learning', 2015 Asia-Pacific Conference on Computer Aided System Engineering, 2015 Asia-Pacific Conference on Computer-Aided System Engineering (APCASE), IEEE, Quito, Equador, pp. 257-263.
View/Download from: Publisher's site
View description>>
The software architecture of smart learning environment can be perceived as an environment that is equipped with various audio-visual objects to capture human motion, utterance and gesture, allowing the teacher to deliver lectures to both local and remote audience through the Internet. The interactive objects in such architectural environment are interfaced with simple navigation, depending on operation characteristics, voice, tactile and visual interaction with the aim to improve Human-Machine Interaction. This facilitates effective data acquisition and statistical analysis, in order to assist in decision making by the participants, as well as, apply them in the process of self-assessment. This paper discusses the design and implementation of integrating hap tic technologies into the architecture of smart learning environment by designing components of service oriented software middleware that defines a common gesture framework, and thus allowing multiple hap tic and gesture peripherals to share a within common protocol, as well as, enabling individual device to work as stand-alone entity.
Cheng, H, Zhang, J, An, P & Liu, Z 1970, 'A Novel Saliency Model for Stereoscopic Images', 2015 International Conference on Digital Image Computing: Techniques and Applications (DICTA), 2015 International Conference on Digital Image Computing: Techniques and Applications (DICTA), IEEE, Adelaide, pp. 1-7.
View/Download from: Publisher's site
View description>>
In this paper, we propose a novel saliency model
for stereoscopic images. To improve depth information for stereo
saliency analysis, this model exploits depth information from
three aspects: 1) we extract the low-level features based on the
color-depth contrast features in a local and global search range
(local-global contrast); 2) to extract the topological structural
from a depth map, a surrounding map based on a Boolean
map is obtained as a weight value to enhance the local-global
contrast features; and 3) based on the saliency probability
distribution in depth information, we employ stereo center prior
enhancement to compute the final saliency. Experimental results
on two recent eye-tracking databases show that our proposed
method outperforms the state-of-the-art saliency models
Cunha, Í, Teixeira, R, Veitch, D & Diot, C 1970, 'RemapRoute: Reduzindo o custo do remapeamento de mudanças de roteamento na Internet', University of Melbourne.
Ding, C, Guo, YJ, Qin, P-Y, Dutkiewicz, E & Yang, Y 1970, 'A phased array antenna employing reconfigurable defected microstrip structure (RDMS)', 2015 IEEE International Symposium on Antennas and Propagation & USNC/URSI National Radio Science Meeting, 2015 IEEE International Symposium on Antennas and Propagation & USNC/URSI National Radio Science Meeting, IEEE, Vancouver, CANADA, pp. 2469-2470.
View/Download from: Publisher's site
View description>>
© 2015 IEEE. In this paper, a compact phase-shifting unit based on reconfigurable defected microstrip structure (RDMS) is used to provide controllable phase shift for a 1×4 phased array antenna. The RDMS is made by etching two slots on the microstrip line and loading with PIN diodes. By controlling the working states of the employed PIN diodes, the RDMS is able to provide phase shift. A 1×4 phased array antenna is built employing optimized RDMS. The tested results show that the antenna can work in the frequency band from 5.1-5.4 GHz, and switch its beam to -15°, 0°, and 15° in the H-plane with the average gain of 10 dBi. Compared to our previous work, significantly size reduction of 55% is achieved with similar performance.
Ding, J, Dutkiewicz, E, Huang, X & Fang, G 1970, 'Energy efficient cooperative transmission in single-relay UWB based body area networks', 2015 IEEE International Conference on Communications (ICC), 2015 IEEE International Conference on Signal Processing for Communications (ICC), IEEE, London, UK, pp. 1559-1564.
View/Download from: Publisher's site
View description>>
© 2015 IEEE. Energy efficiency is one of the most critical parameters in ultra-wideband (UWB) based wireless body area networks (WBANs). In this paper, the energy efficiency optimization problem is investigated for cooperative transmission with a single relay in UWB based WBANs. Two practical onbody transmission scenarios are taken into account, namely, along-torso scenario and around-torso scenario. With a proposed single-relay WBAN model, a joint optimal scheme for the energy efficiency optimization is developed, which not only derives the optimal power allocation but also seeks the corresponding optimal relay location for each scenario. Simulation results show that the utilization of a relay node is necessary for the energy efficient transmission in particular for the around-torso scenario and the relay location is an important parameter. With the joint optimal relay location and power allocation, the proposed scheme is able to achieve up to 30 times improvement compared to direct transmission in terms of the energy efficiency when the battery of the sensor node is very limited, which indicates that it is an effective way to prolong the network lifetime in WBANs.
Ding, J, Dutkiewicz, E, Huang, X & Fang, G 1970, 'Energy-Efficient Distributed Beamforming in UWB Based Implant Body Area Networks', 2015 IEEE 81st Vehicular Technology Conference (VTC Spring), 2015 IEEE 81st Vehicular Technology Conference (VTC Spring), IEEE, Glasgow, UK, pp. 1-5.
View/Download from: Publisher's site
View description>>
© 2015 IEEE. In this paper, we investigate a distributed beamforming problem to optimize energy efficiency (EE) in ultra-wideband (UWB) based implant body area networks (IBANs). To evaluate the impact of relay location on the EE, a relay location based cooperative network model is proposed, where multiple on-body relays are employed to assist an implant node to communicate with a BAN coordinator. With the proposed model, the EE optimization problem is mathematically formulated as a non-convex optimization problem. Sequential quadratic programming (SQP) combined with scatter search are applied to find the corresponding optimal solution. Simulation results illustrate that the proposed beamforming scheme outperforms other transmission schemes. A remarkable improvement can be achieved not only in EE but also in spectral efficiency (SE) compared to direct transmission. Moreover, numerical examples show that the relay location has a significant impact on the EE performance.
Fontugne, R, Abry, P, Fukuda, K, Borgnat, P, Mazel, J, Wendt, H & Veitch, D 1970, 'Random projection and multiscale wavelet leader based anomaly detection and address identification in internet traffic', 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), ICASSP 2015 - 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), IEEE, South Brisbane, QLD, pp. 5530-5534.
View/Download from: Publisher's site
View description>>
We present a new anomaly detector for data traffic, `SMS', based on combining random projections (sketches) with multiscale analysis, which has low computational complexity. The sketches allow `normal' traffic to be automatically and robustly extracted, and anomalies detected, without the need for training data. The multiscale analysis extracts statistical descriptors, using wavelet leader tools developed recently for multifractal analysis, without any need for timescales to be selected a priori. The proposed detector is illustrated using a large recent dataset of Internet backbone traffic from the MAWI archive, and compared against existing detectors.
Gay, V, Leijdekkers, P, Gill, A & Felix Navarro, K 1970, 'Le Bon Samaritain: A Community-Based Care Model Supported by Technology.', Stud Health Technol Inform, Health Informatics Conference, IOS Press, Netherlands, pp. 50-55.
View/Download from: Publisher's site
View description>>
BACKGROUND: The effective care and well-being of a community is a challenging task especially in an emergency situation. Traditional technology-based silos between health and emergency services are challenged by the changing needs of the community that could benefit from integrated health and safety services. Low-cost smart-home automation solutions, wearable devices and Cloud technology make it feasible for communities to interact with each other, and with health and emergency services in a timely manner. OBJECTIVES: This paper proposes a new community-based care model, supported by technology, that aims at reducing healthcare and emergency services costs while allowing community to become resilient in response to health and emergency situations. METHODS: We looked at models of care in different industries and identified the type of technology that can support the suggested new model of care. Two prototypes were developed to validate the adequacy of the technology. RESULTS: The result is a new community-based model of care called 'Le Bon Samaritain'. It relies on a network of people called 'Bons Samaritains' willing to help and deal with the basic care and safety aspects of their community. Their role is to make sure that people in their community receive and understand the messages from emergency and health services. The new care model is integrated with existing emergency warning, community and health services. CONCLUSION: Le Bon Samaritain model is scalable, community-based and can help people feel safer, less isolated and more integrated in their community. It could be the key to reduce healthcare cost, increase resilience and drive the change for a more integrated emergency and care system.
Gill, AQ 1970, 'Adaptive enterprise architecture drivenagiledevelopment', International Conference on Information Systems Development, ISD 2015, International Conference on Information Systems Development, City University of Hong Kong, Harbin, China..
View description>>
Agile development practices focus on developing and delivering working software systems in small iterations with minimal documentation. However, locally project focused agile practices overlook the need for holistic enterprise architecture. Lack of enterprise architecture in agile, especially in the large agile environments, may lead to a number of problems such as technical debt, unnecessary re-work, inconsistent communication, locally focused isolated architecture, design and implementation. There is a missing link between the enterprise architecture and agile development. Enterprise architecture is a strategic capability that should enable and enhance agility of agile development. However, organisations are not sure how best to approach strategic enterprise architecture capability for supporting agile development. This paper proposes and demonstrate the applicability of an integrated adaptive enterprise architecture driven agile development approach for large agile environments.
Gill, AQ 1970, 'Learning Enterprise Agile Software Engineering: Scaling Agility at the Enterprise Level.', ASWEC, Australian Software Engineering Conference, IEEE Computer Society, Adelaide, AUSTRALIA, pp. 148-154.
View/Download from: Publisher's site
View description>>
Agile software engineering practices, originated in the context of individual software project development, are getting vast attention from enterprises for handling multiple agile software engineering projects at a large program and portfolio level. Adoption of agility at a large scale is a challenging task. The success of agility adoption at a large scale is dependent on the knowledge and skills of people involved. This suggests that agile software engineering education and training remains one of the important factors for organizations pursuing to scale agile practices for large environments. However, the teaching of agile software engineering practices for a large scale poses many challenges to software engineering educators. These difficulties include how to establish and simulate an appropriate large scale software engineering environment. This paper presents learnings from teaching agile software engineering practices for large scale at the University of Technology - Sydney (UTS), Australia. The learnings from this paper can be used by other educators who are aiming to teach enterprise scale agile software engineering practices.
Gill, AQ, Chew, E, Bird, G & Kricker, D 1970, 'An Agile Service Resilience Architecture Capability: Financial Services Case Study.', CBI (1), IEEE Conference on Business Informatics (CBI), IEEE Computer Society, Lisbon, Portugal, pp. 209-216.
View/Download from: Publisher's site
View description>>
Service resilience in the face of constant business change is an imperative and complex task for any service organization including those in financial services. Yet, due to its systemic complexity, service resilience as a practice in most organisations is performed in an ad-hoc and inefficient manner resulting in periodic disruptions to day-to-day business operations. Therefore, there is an urgent need for organisations to formulate an agile or adaptive capability for service resilience architecture design and implementation that meets their dynamic business needs. This paper presents one such agile or adaptive service resilience architecture (ASRA) design and implementation capability that has been developed using an adaptive enterprise service system meta-framework (a.k.a. The Gill Framework®). An action-design research method was employed in collaboration with a financial services organisation (FSO) for the establishment of a holistic ASRA design and implementation capability.
Gordon, LC & Chaczko, Z 1970, 'Digital Patterns for Heritage and Data Preservation Standards', Computational Intelligence and Efficiency in Engineering Systems, Asia-Pacific Conference on Computer Aided System Engineering (APCASE), Springer International Publishing, Bali, Indonesia, pp. 47-59.
View/Download from: Publisher's site
View description>>
Christopher Chiu and Zenon Chaczko Abstract Developing software
environments for Sensor-Actor Networks (Sanets) is a promising research
concern in systems engineering. Current concepts in software would adopt
Sanets in a singular ...
Gordon, LC, Chaczko, Z & Resconi, G 1970, 'Standardized Mapping Model for Heritage Preservation and Serendipity in Cloud', Computer Aided Systems Theory – EUROCAST 2015 (LNCS), International Conference on Computer Aided Systems Theory (EUROCAST), Springer International Publishing, Las Palmas de Gran Canaria, Spain, pp. 110-117.
View/Download from: Publisher's site
View description>>
© Springer International Publishing Switzerland 2015. In this research the proposal of a model covers and explanation of how to construct and decide an accurate framework for Data Preservation. The relation between Preservation and Digital patterns of Heritage is well related because of the two aspects to consider: Accessibility and Context. They cover the conceptualization of real digital preservation. However availability, contextualization and value of the information are the principal matters to focus. First in the introduction we can find the context and the description of the initial scenario. Second the process of preservation with the modelling applications and implementation of patterns. Finally the conclusions and future projects based on the findings. The principal objective is the integration between models and standardization for sustainable solution.
Gordon, LC, Reinoso, JSS & Chaczko, Z 1970, 'Architectural framework to preserve information of cardiac valve control', Proceedings of the 26th International Business Information Management Association Conference - Innovation Management and Sustainable Economic Competitive Advantage: From Regional Development to Global Growth, IBIMA 2015, International Business Information Management, IBIMA, Madrid, pp. 1504-1516.
View description>>
According to the relation of Digital Preservation and the Health field as a case of study, the architectural model help us to explain that definitions..The principal goal of Data Preservation is to keep information for a long term. Regarding of Mediacal information, in order to perform a heart transplant, physicians need to preserve this organ in an adequate way. This approach between the two perspectives, the medical and the technological allow to check the similarities about the concepts of preservation. Digital preservation and medical advances are related in the same level as knowledge improvement.
Guo, H, Wang, J, Xu, M, Zha, Z-J & Lu, H 1970, 'Learning Multi-view Deep Features for Small Object Retrieval in Surveillance Scenarios', Proceedings of the 23rd ACM international conference on Multimedia, MM '15: ACM Multimedia Conference, ACM, Brisbane, Australia, pp. 859-859.
View/Download from: Publisher's site
Guo, YJ & Qin, PY 1970, 'Advances in reconfigurable antennas for wireless communications', 2015 9th European Conference on Antennas and Propagation, EuCAP 2015, 2015 9th European Conference on Antennas and Propagation (EuCAP), IEEE, Lisbon, Portugal, pp. 1-4.
View description>>
This paper presents an overview of the recent advances in frequency, polarization and pattern reconfigurable antennas for wireless communications. In particular, it reports our latest progress in this research field, including a wideband to narrowband frequency tunable antenna, a dual-band polarization reconfigurable antenna, a beam-steering quasi-Yagi dipole antenna and a beam-steering antenna array based on reconfigurable defected microstrip structure (RDMS).
Hakami, HA, Chaczko, Z & Kale, A 1970, 'Review of Big Data Storage based on DNA Computing', 2015 ASIA-PACIFIC CONFERENCE ON COMPUTER-AIDED SYSTEM ENGINEERING - APCASE 2015, Asia-Pacific Conference on Computer Aided System Engineering (APCASE), IEEE, Quito, Equador, pp. 113-117.
View/Download from: Publisher's site
View description>>
There is a need of noteworthy scaling down in the information approached may be saved in the most recent decade. Delicate and advanced version hard paper duplicate which helps in two ways that they increased the effectiveness from claiming data management but also improved the distribution of entrance of information. On engineered DNA, it may be a chance to view the late improvement on the possibility about data capacity. Similarly in this way we have figured out how leap forward engineering could dramatically change the lifestyle out of our information capacity. This topic ' Big Data Storage based DNA' is described from the first research to newer one, their advantages and disadvantages, their techniques and how it will become a practice in the future. We also propose an approach is proposed as simple method to store data into DNA. The experiment work is done to validate the proposed approach result clearly show advantages merits of proposed method.
He, C, Zhang, L, He, X & Jia, W 1970, 'A New Image Decomposition and Reconstruction Approach - Adaptive Fourier Decomposition.', MMM (2), International Conference on Multimedia Modelling, Springer, Sydney, Australia, pp. 227-236.
View/Download from: Publisher's site
View description>>
© Springer International Publishing Switzerland 2015. Fourier has been a powerful mathematical tool for representing a signal into an expression consist of sin and cos. Recently a new developed signal decomposition theory is proposed by Pro. Tao Qian named Adaptive Fourier Decomposition, which has the advantage in time frequency over Fourier decomposition and without the need for a fixed window size problem such as short-time frequency transform. Studies show that AFD can fast decompose signals into positive-frequency functions with good analytical properties. In this paper we apply AFD into image decomposition and reconstruction area first time in the literature, which shows a promising result and gives the fundamental prospect for image compression.
He, Y, Dutkiewicz, E, Fang, G & Mueck, MD 1970, 'Fractional Frequency Reuse in distributed antenna systems in Cloud Radio Access Networks', 2015 IEEE International Conference on Communication Workshop (ICCW), 2015 ICC - 2015 IEEE International Conference on Communications Workshops (ICC), IEEE, London, ENGLAND, pp. 907-912.
View/Download from: Publisher's site
View description>>
© 2015 IEEE. A distributed antenna system (DAS) architecture is considered to be a key enabler for further Network Virtualization where different network configurations are created as needed by a centralized decision making unit that is typically integrated into the Cloud Radio Access Networks (C-RAN) which offers a potential architecture for 5G wireless communication systems. Many schemes have been proposed for Fractional Frequency Reuse (FFR) for resource allocation in the static cellular network architecture. In this paper, we investigate the effect of different FFR resource allocation approaches on the downlink cell edge users’ capacity. We use a Multiset approach to model the resource allocation and interference. Targeting maximum average capacity, a closed-form lower bound of the average capacity is derived and the optimum FFR resource allocation is obtained. This provides a guide in the evaluation of DAS performance.
He, Y, Dutkiewicz, E, Fang, G & Mueck, MD 1970, 'SNR Threshold for Distributed Antenna Systems in Cloud Radio Access Networks', 2015 IEEE 82nd Vehicular Technology Conference (VTC2015-Fall), 2015 IEEE 82nd Vehicular Technology Conference (VTC Fall), IEEE, Boston, MA.
View/Download from: Publisher's site
View description>>
© 2015 IEEE. A distributed antenna system (DAS) architecture is a key enabler for Cloud Radio Access Networks (CRAN) where geographically separated base stations are connected to a centralized processing and decision making unit. Many schemes have been proposed to leverage Fractional Frequency Reuse (FFR) and co-ordinated joint transmission between base stations to improve cell-edge performance for static network deployments. In this paper, we investigate dynamic decision making that whether co-ordinated joint transmission should be selected in the downlink of a FFR-aided DAS. We derive the transmitting Signal-to-Noise-Ratio (SNR) threshold that co-ordinated joint transmission can provide better performance if the transmitting SNR is below this threshold. We simulated a three-cell cluster layout with FFR and the numerical results agree with our analytical results. We show that the transmitting SNR threshold is critical in the FFR-aided DAS analysis and can be used as a guide in the CRAN network planning and the evaluation of DAS performance.
Hoang, DT, Niyato, D & Hung, NT 1970, 'Optimal Energy Allocation Policy for Wireless Networks in the Sky', IEEE International Conference on Communications, IEEE International Conference on Communications (ICC), IEEE, London, ENGLAND, pp. 3204-3209.
View/Download from: Publisher's site
View description>>
Google's Project Loon was launched in 2013 with the aim of providing Internetaccess to rural and remote areas. In the Loon network, balloons travel aroundthe Earth and bring access points to the users who cannot connect directly tothe global wired Internet. The signals from the users will be transmittedthrough the balloon network to the base stations connected to the Internetservice provider (ISP) on Earth. The process of transmitting and receiving dataconsume a certain amount of energy from the balloon, while the energy onballoons cannot be supplied by stable power source or by replacing batteriesfrequently. Instead, the balloons can harvest energy from natural energysources, e.g., solar energy, or from radio frequency energy by equipping withappropriate circuits. However, such kinds of energy sources are often dynamicand thus how to use this energy efficiently is the main goal of this paper. Inthis paper, we study the optimal energy allocation problem for the balloonssuch that network performance is optimized and the revenue for serviceproviders is maximized. We first formulate the stochastic optimization problemas a Markov decision process and then apply a learning algorithm based onsimulation-based method to obtain optimal policies for the balloons. Numericalresults obtained by extensive simulations clearly show the efficiency andconvergence of the proposed learning algorithm.
Huang, S, Zhang, J, Lu, S & Hua, X-S 1970, 'Social Friend Recommendation Based on Network Correlation and Feature Co-Clustering', Proceedings of the 5th ACM on International Conference on Multimedia Retrieval, ICMR '15: International Conference on Multimedia Retrieval, ACM, Shanghai, pp. 315-322.
View/Download from: Publisher's site
View description>>
Friend recommendation is an important recommender application in social media. Major social websites such as Twitter and Facebook are all capable of recommending friends to individuals. However, friend recommendation is a difficult task and most social websites use simple friend recommendation algorithms such as similarity and popularity, whose level of accuracy does do not satisfy the majority of users.
In this paper we propose a two-stage procedure for more accurate friend recommendation: In the rest stage, based on the relationship of different social networks, the Flickr tag network and contact network are aligned to generate a "possible friend list"; In the second stage, making the assumption that a friend's friends also tend to be friends",
co-clustering is applied to the tag and image information of the list to refine the recommendation result in the first stage. Experimental results show that the proposed method achieves good performance and every stage contributes to the recommendation.
Huang, X, Yuan, C & Zhang, J 1970, 'Graph Cuts Stereo Matching Based on Patch-Match and Ground Control Points Constraint', Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Pacific-Rim Conference on Multimedia, Springer International Publishing, Gwangju, South Korea, pp. 14-23.
View/Download from: Publisher's site
View description>>
© Springer International Publishing Switzerland 2015. Stereo matching methods based on Patch-Match obtain good results on complex texture regions but show poor ability on low texture regions. In this paper, a new method that integrates Patch-Match and graph cuts (GC) is proposed in order to achieve good results in both complex and low texture regions. A label is randomly assigned for each pixel and the label is optimized through propagation process. All these labels constitute a label space for each iteration in GC. Also, a Ground Control Points (GCPs) constraint term is added to the GC to overcome the disadvantages of Patch-Match stereo in low texture regions. The proposed method has the advantage of the spatial propagation of Patch- Match and the global property of GC. The results of experiments are tested on the Middlebury evaluation system and outperform all the other PatchMatch based methods.
Huang, X, Zhang, J, Wu, Q, Yuan, C & Fan, L 1970, 'Dense Correspondence Using Non-Local DAISY Forest', 2015 International Conference on Digital Image Computing: Techniques and Applications (DICTA), 2015 International Conference on Digital Image Computing: Techniques and Applications (DICTA), IEEE, Adelaide, pp. 1-8.
View/Download from: Publisher's site
View description>>
© 2015 IEEE. Dense correspondence computation is a critical computer vision task with many applications. The most existing dense correspondence methods consider all the neighbors connected to the center pixels and use local support region. However, such approach might only achieve a locally-optimal solution.In this paper, we propose a non-local dense correspondence computation method by calculating the match cost on a tree structure. It is non-local because all other nodes on the tree contribute to the match cost computing for the current node. The proposed method consists of three steps, namely: 1) DAISY descriptor computation, 2) edge-preserving segmentation and forest construction, 3) PatchMatch fast search. We test our algorithm on the Middlebury and Moseg datasets. The results show that the proposed method outperforms the state-of-The-Art methods in dense correspondence computing and has a low computation complexity.
Huang, X, Zhang, JA & Guo, YJ 1970, 'Joint transmitter and receiver I/Q imbalance estimation in presence of carrier frequency offset', 2015 15th International Symposium on Communications and Information Technologies (ISCIT), 2015 15th International Symposium on Communications and Information Technologies (ISCIT), IEEE, Nara, Japan, pp. 209-212.
View/Download from: Publisher's site
View description>>
© 2015 IEEE. This paper proposes a simple frequency domain joint transmitter and receiver I/Q imbalance estimation method which exploits the phase rotation introduced by carrier frequency offset. Using two frequency domain training sequences inserted in each transmission frame, the transmitter and receiver I/Q imbalances can be jointly estimated over multiple frames. The transmitter I/Q imbalance parameter can be fed back to the transmitter for I/Q imbalance pre-compensation, whereas the receiver I/Q imbalance can be compensated locally followed by conventional frequency domain equalization. Numerical simulation results show that the image rejection ratios for both transmitter and receiver after I/Q imbalance compensation can be improved to over 50 dB which is necessary for multichannel systems with high order modulation and wide transmission bandwidth.
Jan, MA, Nanda, P, He, X & Liu, RP 1970, 'A sybil attack detection scheme for a centralized clustering-based hierarchical network', Proceedings - 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2015, IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), IEEE, Helsinki, Finland, pp. 318-325.
View/Download from: Publisher's site
View description>>
Wireless Sensor Networks (WSNs) have experienced phenomenal growth over the past decade. They are typically deployed in remote and hostile environments for monitoring applications and data collection. Miniature sensor nodes collaborate with each other to provide information on an unprecedented temporal and spatial scale. The resource-constrained nature of sensor nodes along with human-inaccessible terrains poses various security challenges to these networks at different layers. In this paper, we propose a novel detection scheme for Sybil attack in a centralized clustering-based hierarchical network. Sybil nodes are detected prior to cluster formation to prevent their forged identities from participating in cluster head selection. Only legitimate nodes are elected as cluster heads to enhance utilization of the resources. The proposed scheme requires collaboration of any two high energy nodes to analyze received signal strengths of neighboring nodes. The simulation results show that our proposed scheme significantly improves network lifetime in comparison with existing clustering-based hierarchical routing protocols.
Jayawickrama, BA, Dutkiewicz, E, Mueck, M & IEEE 1970, 'Incumbent User Active Area Detection for Licensed Shared Access', 2015 IEEE 82ND VEHICULAR TECHNOLOGY CONFERENCE (VTC FALL), IEEE Vehicular Technology Conference, IEEE, Boston, USA, pp. 1-5.
View/Download from: Publisher's site
View description>>
Print Request Permissions Licensed Shared Access is a European standardisation effort which promotes repository based quasi-static hierarchical spectrum sharing. In this scheme the sharing time base is in the order of months if not years. For widespread use of Licensed Shared Access, shrinking the sharing time base is crucial. In this paper we propose a scheme to reduce the sharing time base to seconds or minutes scale. We present a new technique named lightweight Radio Environment Map based on a Kalman Filter derived from geo-location aware spectrum measurements, which can be run at the shared access licensee end. Our objective is to determine the active area of a static or slowly moving incumbent. We consider a challenging scenario where a large fraction of measurements is missing and the available measurements are highly distorted. Performance of our incumbent active area detection approach is evaluated by simulating a low power incumbent in an urban cellular environment. Simulation results show a substantial improvement of missed detection area in comparison to the counterpart that does not use our lightweight Radio Environment Map.
Ji, L-Y, Fu, G, Gong, S-X, Zhang, T, Guo, YJ, Qin, P-Y, Ding, C & IEEE 1970, 'Pattern Reconfigurable Fabry-Perot Cavity Antenna', 2015 INTERNATIONAL SYMPOSIUM ON ANTENNAS AND PROPAGATION (ISAP), IEEE International Symposium on Antennas and Propagation, IEEE, Hobart, AUSTRALIA.
View description>>
© 2015 The Institute of Electronics, Information and Comm. A newly designed pattern reconfigurable Fabry-Perot cavity antenna is presented in this paper. The reconfigurability is achieved by employing a phased array with a reconfigurable feed network as the source of the FPC antenna. The design can switch its main beam direction between ™10° and 10° with respect to the broadside direction from 5.36 GHz to 5.76 GHz. The realized gain of the proposed antenna is over 11.6 dBi. Good agreement between the simulated and measured results is achieved.
Ji, L-Y, Guo, YJ, Qin, P-Y, Fu, G & IEEE 1970, 'A Reconfigurable Beam-Scanning Partially Reflective Surface (PRS) Antenna', 2015 9th European Conference on Antennas and Propagation (EuCAP), European Conference on Antennas and Propagation, IEEE, Lisbon, Portugal, pp. 1-3.
View description>>
© 2015 EurAAP. A novel reconfigurable partially reflective surface (PRS) antenna is presented in this paper. The beam scanning ability is realized by employing a reconfigurable PRS structure and a phased array as the source. The design achieves a beam switching between -15°, 0°, to 15° with respect to the broadside direction from 5.5 GHz to 5.7 GHz with the realized gains over 12 dBi. Good agreement between the simulated and measured results is achieved.
Kale, A, Chaczko, Z & Slehat, S 1970, 'HyMuDS: A Hybrid Multimodal Data Acquisition System', 2015 Asia-Pacific Conference on Computer Aided System Engineering, 2015 Asia-Pacific Conference on Computer-Aided System Engineering (APCASE), IEEE, Quito, Equador, pp. 107-112.
View/Download from: Publisher's site
View description>>
This paper outlines an architectural perspective for a multimodal data acquisition to be implemented in order to monitor contamination in urban waterways. The purpose is to develop an approach to detect objects and anomalies in dynamic environmental conditions. For overcoming effects of environmental variations like high reflectivity, heat waves, fog and variable illumination, an implementation with multiple camera modalities including infrared, ultraviolet and visual spectrum is proposed. Detection of a micro-level parameters related with the environment and the water, analog sensing nodes connected to a wireless gateway are deployed. Main parameters under consideration include temperature, salinity, moisture and illumination. Software architecture for a data acquisition purpose is implemented in a C# .Net development environment. This software implementation allows parallel or concurrent data acquisition operate with a greater efficiency. Another important aspect of the software architecture implemented is to allow use of heterogeneous data for post-acquisition analysis. A problem specific data storage approach is proposed and implemented to improve availability and accessibility of the acquired data. Initial trials of this system clearly indicate merits of the system proposed. This approach has a strong capability to support capturing huge information of different scenarios and with a greater efficiency.
Karmokar, DK, Esselle, KP, Bird, TS & Hay, SG 1970, 'Conical beaming using simple arrays of uniform half-width microstrip leaky-wave antennas', 2015 IEEE 4th Asia-Pacific Conference on Antennas and Propagation (APCAP), 2015 IEEE 4th Asia-Pacific Conference on Antennas and Propagation (APCAP), IEEE, Kuta, Indonesia, pp. 90-91.
View/Download from: Publisher's site
View description>>
© 2015 IEEE. A simple array of half-width (HW) microstrip leaky-wave antennas (LWAs) radiates a conical beam around the boresight. Uniform microstrip LWAs usually radiate a fan-shaped beam with a beam direction near boresight at lower frequencies and near endfire at higher frequencies. Six HW-MLWAs terminated by matched loads are used in this array. The whole array is on a single substrate, where the LWAs are placed at 60° angular displacement from each other with respect to a common center point. The peak gain of the array is 7.8 dBi and it radiates a conical beam over a 6.1% (4 GHz to 4.25 GHz) band.
Koziol, F, Borowik, G, Wozniak, M & Chaczko, Z 1970, 'Toward Dynamic Signal Coding for Safe Communication Technology', 2015 Asia-Pacific Conference on Computer Aided System Engineering, 2015 Asia-Pacific Conference on Computer-Aided System Engineering (APCASE), IEEE, Quito, Equador, pp. 246-251.
View/Download from: Publisher's site
View description>>
This paper gives a theoretical background to dynamic generation of primitive polynomials, their usage in many fields including cryptography for a mobile communication systems. Presented polynomials and their generation over a Galois field is discussed. Additionally, the basic properties and arithmetic methods over finite fields of characteristic 3 are presented. The main objective of this paper is to outline the mathematical background for design and implementation for dynamic coding in mobile communication technology widely applied in telephones, computers and any device communicating over TCP/IP protocol.
Li, K, Ni, W, Wang, X, Liu, RP, Kanhere, SS & Jha, SK 1970, 'EPLA: Energy-balancing packets scheduling for airborne relaying networks.', ICC, IEEE International Conference on Communications, IEEE, London, UK, pp. 6246-6251.
View/Download from: Publisher's site
View description>>
© 2015 IEEE. Airborne relaying is of potential to extend wireless sensor networks (WSN) to human-unfriendly terrains. Challenges arise due to lossy airborne channels and limited battery of unmanned aerial vehicles (UAVs). We propose an energy-efficient relaying scheme to overcome the challenges. A swarm of UAVs are deployed to listen to remote sensors from distributed locations, improving packet reception over lossy channels. UAVs report their reception qualities to the base station where the optimal schedule with guaranteed success rates and balanced energy consumption can be generated. Such scheduling is an NP-hard binary integer programming. We develop a suboptimal solution by decoupling the processes of energy balancing and data rate adjustment. Simulations confirm that, in terms of network yield, our method is indistinguishable to the NP-hard optimal solution, 15% higher than greedy algorithms. Our method can reduce the complexity by orders of magnitude, and extend network lifetime by 33%.
Li, M, Da Xu, RY & He, X 1970, 'Face hallucination based on nonparametric Bayesian learning', 2015 IEEE International Conference on Image Processing (ICIP), 2015 IEEE International Conference on Image Processing (ICIP), IEEE, Quebec City, Canada, pp. 986-990.
View/Download from: Publisher's site
View description>>
In this paper, we propose a novel example-based face hallucination method through nonparametric Bayesian learning based on the assumption that human faces have similar local pixel structure. We cluster the low resolution (LR) face image patches by nonparametric method distance dependent Chinese Restaurant process (ddCRP) and calculate the centres of the clusters (i.e., subspaces). Then, we learn the mapping coefficients from the LR patches to high resolution (HR) patches in each subspace. Finally, the HR patches of input low resolution face image can be efficiently generated by a simple linear regression. The spatial distance constraint is employed to aid the learning of subspace centers so that every subspace will better reflect the detailed information of image patches. Experimental results show our method is efficient and promising for face hallucination.
Liu, X, Wang, L, Yin, J, Dou, Y & Zhang, J 1970, 'Absent multiple kernel learning', Proceedings of the National Conference on Artificial Intelligence, AAAI Conference on Artificial Intelligence, AAAI Publications, Austin, Texas, pp. 2807-2813.
View description>>
Multiple kernel learning (MKL) optimally combines the multiple channels of each sample to improve classification performance. However, existing MKL algorithms cannot effectively handle the situation where some channels are missing, which is common in practical applications. This paper proposes an absent MKL (AMKL) algorithm to address this issue. Different from existing approaches where missing channels are firstly imputed and then a standard MKL algorithm is deployed on the imputed data, our algorithm directly classifies each sample with its observed channels. In specific, we define a margin for each sample in its own relevant space, which corresponds to the observed channels of that sample. The proposed AMKL algorithm then maximizes the minimum of all sample-based margins, and this leads to a difficult optimization problem. We show that this problem can be reformulated as a convex one by applying the representer theorem. This makes it readily be solved via existing convex optimization packages. Extensive experiments are conducted on five MKL benchmark data sets to compare the proposed algorithm with existing imputation-based methods. As observed, our algorithm achieves superior performance and the improvement is more significant with the increasing missing ratio.
Ma, J, Ni, W, Yin, J, Lin, S, Cui, H, Liu, RP & Fang, BX 1970, 'Modelling social characteristics of mobile radio networks', 2015 IEEE International Conference on Communication Workshop (ICCW), 2015 ICC - 2015 IEEE International Conference on Communications Workshops (ICC), IEEE, London, UK, pp. 1575-1580.
View/Download from: Publisher's site
View description>>
© 2015 IEEE. Mobile communications are increasingly contributing to the Internet traffic. Users move within cellular networks and generate traffics of different types. In this paper, we propose to categorize cellular base stations from multiple dimensions. Key social characteristics of the base stations are jointly considered, including traffic fluctuation, user non-determinacy, temporal homogeneity and usage diversity. Our categorization is based on spectral clustering, which is able to leverage the multiple social characteristics. The results of the categorization indicate different application environments and scenarios. We further establish social models with important parameters derived for each of the categories. The applications to energy efficient wireless networks are studied. The proposed model is of practical value to facilitate designing, simulating, and evaluating network deployment.
Maleki, B, Ebrahimnezhad, H, Xu, M & He, X 1970, 'Hand gesture recognition for a virtual mouse application using geometric feature of finger's trajectories', Proceedings of the 7th International Conference on Internet Multimedia Computing and Service, ICIMCS '15: International Conference on Internet Multimedia Computing and Service, ACM, China, pp. 16-19.
View/Download from: Publisher's site
View description>>
© 2015 ACM. We aim to enable a computer to comprehend and perform the mouse functions by analyzing a video with hand motions. For this purpose, dynamic gestures are captured by a web cam and are recognized as pre-defined gestures which are used to suggest mouse functions. The proposed algorithm initially detects the hand. Then, it tracks fingertips' trajectories within a frame sequence. Finally, hand gestures are recognized through computing a set of proposed geometric features of fingers' trajectories and comparing with our collected gestures dataset. In this paper, four types of descriptors are defined for a dynamic gesture. Each descriptor includes different number of features, which compose a feature vector with 135 dimensions. Different classification algorithms (e.g. KNN, LDA, Naïve Bayes and SVM) are applied to compare the detection results. The minimal misclassification error rate (MCR) reaches about 4% (i.e. Correct Recognition rate of 96%). Furthermore, we applied Principle Component Analysis (PCA) to reduce the number of features. With 30 dimensional features (principle components), LDA classifier can achieve about 0.09% misclassification error rate.
Mohammadi, MS, Dutkiewicz, E & Zhang, Q 1970, 'Sampling of Band-Limited Signals with Nonuniform Sampling-Time and Bit-Depth', 2015 IEEE Global Communications Conference (GLOBECOM), GLOBECOM 2015 - 2015 IEEE Global Communications Conference, IEEE.
View/Download from: Publisher's site
Mohammadi, MS, Zhang, Q & Dutkiewicz, E 1970, 'Exploiting partial packets in random linear codes using sparse error recovery', 2015 IEEE International Conference on Communications (ICC), 2015 IEEE International Conference on Signal Processing for Communications (ICC), IEEE, London, pp. 2577-2582.
View/Download from: Publisher's site
View description>>
© 2015 IEEE. We propose a novel scheme based on compressive sensing and sparse recovery to boost the performance of cross-packet random linear coding (RLC) by incorporating the partial packets in the decoding algorithm. In conventional RLC schemes, to successfully decode the packets the receiver needs to collect a certain number of correct innovative encoded packets. During this process, there are usually a lot of partially correct packets that are discarded. Our objective is to recover the errors in the partial packets to decrease the total transmitted packets to improve the performance in terms of throughput and energy efficiency. Assuming a systematic RLC, we first formulate this problem in form of a standard sparse recovery problem where the channel errors are sparsely distributed within the packets. Then we show that to correct a certain number of errors at the receiver, the minimum required number of transmitted packets is lower-bounded by the number of partial packets. We show that by correcting and exploiting the partial packets, the required number of RLC transmit packets to successfully deliver a given generation is reduced by typically 57% in comparison with the conventional scheme.
Mohammadi, MS, Zhang, Q & Dutkiewicz, E 1970, 'Joint binary field transform and polar coding', 2015 IEEE International Conference on Communications (ICC), 2015 IEEE International Conference on Signal Processing for Communications (ICC), IEEE, London, UK, pp. 4406-4411.
View/Download from: Publisher's site
View description>>
© 2015 IEEE. A novel joint source-channel (JSC) coding scheme that combines transform source coding with polar channel codes is proposed with performance gains at low SNRs in terms of bandwidth and energy efficiency. Binary wavelet transform source coding is first applied to decompose the binary source data into a set of components with uneven distributions, particularly, components that are zero with high probability. Normally, a polar code of rate K/N appends N - K redundant bits to the message which can decrease the throughput and introduce an extra energy consumption. By exploiting the binary wavelet transform, the proposed scheme transforms the original signal to the polar code without adding redundant zeros. Hence, the resulting JSC code is of rate one. Since no floating-point arithmetic is required and all operations are performed in GF(2), complexity is vastly reduced which can eventually alleviate the total hardware cost as well as the energy consumption.
Movassaghi, S, Majidi, A, Smith, D, Abolhasan, M, Jamalipour, A & IEEE 1970, 'Exploiting Unknown Dynamics in Communications Amongst Coexisting Wireless Body Area Networks', 2015 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), IEEE Global Telecommunications Conference, IEEE, San Diego, CA.
View/Download from: Publisher's site
Movassaghi, S, Majidi, A, Smith, DB, Abolhasan, M, Jamalipour, A & IEEE 1970, 'Self-Organization Amongst Multiple Co-existing Wireless Body Area Networks', 2015 IEEE 26TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR, AND MOBILE RADIO COMMUNICATIONS (PIMRC), IEEE International Symposium on Personal and Indoor Mobile Radio Conference, IEEE, Hong Kong, pp. 1323-1327.
View/Download from: Publisher's site
View description>>
This paper presents a novel primitive for self-organization amongst multiple coexisting Wireless Body Area Networks (WBANs). It follows a biologically inspired approach based on the theory of pulse-coupled oscillators. Our proposal allows for coexisting WBANs to use delayed information from previous transmissions to adjust to a collision-free TDMA schedule amongst each other for future communications. Most importantly, it does not require a global coordinator as all nodes achieve synchronization in a completely self-organized manner. Simulation results show that our protocol achieves a significantly fast convergence time despite little information from its coexisting networks. Moreover, the proposed approach is shown to be robust to variations in channel conditions, density of sensor nodes within each network and the number of coexisting WBANs. We conduct extensive simulations to evaluate the efficiency of the proposed protocol using the NS-2 simulator.
Nguyen, DN & Krunz, M 1970, 'Be responsible: A novel communications scheme for full-duplex MIMO radios', 2015 IEEE Conference on Computer Communications (INFOCOM), IEEE INFOCOM 2015 - IEEE Conference on Computer Communications, IEEE, Hong Kong, PEOPLES R CHINA, pp. 1733-1741.
View/Download from: Publisher's site
View description>>
© 2015 IEEE. Full-duplex (FD) radios have the potential to double a link's capacity. However, it has been recently reported that the network throughput gain of FD radios over half-duplex (HD) ones is unexpectedly marginal or even negative. This is because both ends of each link transmit at the same time, a set of concurrent FD links will experience more network interference (hence, reduction in the spatial reuse). This article identifies the unique advantages of FD radios and leverage multi-input multioutput (MIMO) communications to translate the FD spectral efficiency gain at the PHY level to throughput and power efficiency gain at the network layer. To that end, we first study the power minimization problem subject to rate demands in a FD-MIMO network. Sufficient conditions under which the FD network throughput can asymptotically double that of an HD network are then established. These conditions also guarantee the existence of a unique Nash Equilibrium that the game quickly converges to. By capturing 'spatial signatures' of other radios, a FD-MIMO radio can instantly adjust its ongoing radiation pattern to avoid interfering with the reception directions at other radios. We exploit that to develop a novel MAC protocol that allows multiple FD links to concurrently communicate while adapting their radiation patterns to minimize network interference. The protocol does not require any feedback or coordination among nodes, but relies on the network interference perceived by these FD radios. Extensive simulations show that the proposed MAC design dramatically outperforms traditional FD-based CSMA protocols and HD radios w.r.t. both throughput and energy efficiency. A centralized algorithm for the FD network-wide transmit power minimization problem is also developed. Simulations show that, the proposed MAC protocol on average achieves almost the same power efficiency as the centralized algorithm. Interestingly, we even observe cases when the proposed distributed algor...
Nguyen, DN, Collings, IB, Hanly, SV & Whiting, P 1970, 'A cooperation framework for traffic offloading among cellular systems', 2015 IEEE International Conference on Communications (ICC), ICC 2015 - 2015 IEEE International Conference on Communications, IEEE, London, United Kingdom, pp. 1637-1642.
View/Download from: Publisher's site
View description>>
© 2015 IEEE. This work introduces a novel cooperation framework that allows mobile service providers (MSPs) to offload traffic onto each other so that temporarily unused spectrum/resources of cellular bands can be opportunistically harvested. Specifically, through traffic offloading, MSPs aim to maximize their profit while maintaining their QoS commitment. For that purpose, we model the strategic cooperation between MSPs as a stochastic Markov game in which the dynamics of MSPs' resources and user behaviors are captured by an underlying Markov decision process. We prove that the game is irreducible and admits a Nash Equilibrium at which all MSPs benefit from traffic offloading. A practical algorithm that uses only local information to govern traffic offloading at MSPs is then developed. Numerical simulations show that by designing appropriate profit sharing contracts, this algorithm can achieve almost the same performance as that of a socially optimal solution.
Okada, M, Onoye, T, Dutkiewicz, E & Chanmongthai, K 1970, 'Message from general co-chairs', 2015 15th International Symposium on Communications and Information Technologies (ISCIT), 2015 15th International Symposium on Communications and Information Technologies (ISCIT), IEEE.
View/Download from: Publisher's site
Omer, S, Vesilo, R, Dutkiewicz, E & Zhang, Q 1970, 'A Dual-channel Routing Protocol for Wireless Body Area Networks', Proceedings of the 10th EAI International Conference on Body Area Networks, 10th EAI International Conference on Body Area Networks, ICST.
View/Download from: Publisher's site
View description>>
Wireless Body Area networks (WBANs) are a subset of wireless sensor networks that interconnect miniaturized nodes with sensor or actuator capabilities in, on, or around a human body. WBANs can operate over a number of different frequency bands such as MICS (Medical Implant Communications system), 2.4 GHz ISM (Industrial Scientific and Medical), UWB (Ultra Wideband), HBC (Human Body Communications) bands. Most WBANs utilize only one of these wireless bands for routing, network access, etc. Fading conditions can result in poor network performance in terms of node energy and throughput. With recent interest in multi-band devices for WBANs such as multi-band antennas and transceivers effective utilization of multiple bands requires an equally effective routing protocol. In this paper we develop a multi-channel extension to the Ad Hoc on Demand Distance Vector (AODV) routing protocol for use in multi-channel WBANs that chooses the next hop channel that has the best Received Signal Strength Indicator (RSSI) value. Our extensions to AODV were implemented by modifying the single-band Castalia model built on the OMNeT++ network simulator. We compared our dual channel AODV protocol with RSSI channel selection against a dual channel AODV with random channel selection and single channel AODV. Our simulation experiments showed that in terms of packet delivery dual channel AODV with RSSI performs equally with single channel AODV but with a lower overhead of AODV control packets, better routing stability and slightly better energy per bit efficiency.
Omer, S, Vesilo, R, Dutkiewicz, E & Zhang, Q 1970, 'An LQI based dual-channel routing protocol for Wireless Body Area networks', 2015 International Telecommunication Networks and Applications Conference (ITNAC), 2015 International Telecommunication Networks and Applications Conference (ITNAC), IEEE, Sydney, Australia, pp. 320-325.
View/Download from: Publisher's site
View description>>
© 2015 IEEE. Wireless Body Area networks (WBANs) are wireless sensor networks that interconnect miniaturized nodes with sensor or actuator capabilities in, on, or around a human body. Mobility is a key factor in WBAN design as the human body may be experiencing posture changes and be moving around in the environment. Most WBANs utilize only one wireless channel for communication. With recent interest in multi-channel devices for WBANs such as multi-channel antennas and transceivers there is a need for an effective multi-channel routing protocol. In this paper we develop a multi-channel extension to the Ad Hoc on Demand Distance Vector (AODV) routing protocol for use in multi-channel WBANs. We utilize both Link Quality Indicator (LQI) values and Received Signal Strength Indication (RSSI) values to choose the best channel to transmit on. Our extensions to AODV were implemented by modifying the single-band Castalia model built on the OMNeT++ network simulator. We compared our dual channel AODV protocol with LQI channel selection against a dual channel AODV with RSSI and random channel selection for mobile and static nodes. Simulation results showed that our multi-channel AODV protocol with RSSI and LQI channel selection gave comparable, if not better, performance to single channel AODV in terms of packet delivery but with less AODV control messages needing to be sent, better routing stability. In the case of one mobile node and the rest static, dual channel operation reduced the number of unwanted data packets received by nodes.
Rafiei, A, Maali, Y, Abolhasan, M & Franklin, DR 1970, 'A geometrical sink-based cooperative coverage hole recovery strategy for WSNs.', ICSPCS, International Conference on Signal Processing and Communication Systems, IEEE, Cairns, Australia, pp. 1-8.
View/Download from: Publisher's site
View description>>
Unlike sporadic node failures, coverage holes emerging from multiple temporally-correlated node failures can severely affect quality of service in a network and put the integrity of entire wireless sensor networks at risk. Conventional topology control schemes addressing such undesirable topological changes have usually overlooked the status of participating nodes in the recovery process with respect to the deployed sink node(s) in the network. In this paper, a cooperative coverage hole recovery model is proposed which utilises the simple geometrical procedure of circle inversion. In this model, autonomous nodes consider their distances to the deployed sink node(s) in addition to their local status, while relocating towards the coverage holes. By defining suitable metrics, the performance of our proposed model performance is compared with a force-based approach.
Shariati, N, Rowe, WST, Ghorbani, K & IEEE 1970, 'Highly Sensitive FM Frequency Scavenger Integrated in Building Materials', 2015 45TH EUROPEAN MICROWAVE CONFERENCE (EUMC), European Microwave Conference, IEEE, Paris, France, pp. 68-71.
View/Download from: Publisher's site
View description>>
© 2015 EuMA. Due to the abundance of ambient RF (Radio Frequency) energy, considerable research effort has been invested in RF energy scavenging. In this paper, we propose a rectifier which can be embedded into the building materials to provide a sustainable energy source in urban environments. The power will be available through DC sockets with different voltage settings. A highly sensitive and efficient rectifier operating at the FM frequency band is proposed which exhibits favorable impedance matching over a broad low input power range of-50 to-20 dBm (0.01 to 10 μW). Measurement results of input reflection coefficient and rectified output power are provided. An output DC power of around 11 μW is achieved from concurrently rectifying six tones of-20 dBm, providing a viable perpetual energy source for low power applications.
Shi, J & Braun, R 1970, 'Crossed Linear Arrays Using Doppler Radar Beamforming for Detecting Single Moving Targets', Computational Intelligence and Efficiency in Engineering Systems, Asia-Pacific Conference on Computer Aided System Engineering (APCASE), Springer International Publishing, Bali, Indonesia, pp. 229-241.
View/Download from: Publisher's site
View description>>
Christopher Chiu and Zenon Chaczko Abstract Developing software
environments for Sensor-Actor Networks (Sanets) is a promising research
concern in systems engineering. Current concepts in software would adopt
Sanets in a singular ...
Shi, J & Braun, R 1970, 'Image Construction Using Low Cost Airborne Beamforming', Computational Intelligence and Efficiency in Engineering Systems, Asia-Pacific Conference on Computer Aided System Engineering (APCASE), Springer International Publishing, Bali, Indonesia, pp. 243-257.
View/Download from: Publisher's site
View description>>
Christopher Chiu and Zenon Chaczko Abstract Developing software
environments for Sensor-Actor Networks (Sanets) is a promising research
concern in systems engineering. Current concepts in software would adopt
Sanets in a singular ...
Shrestha, S, Fang, G, Dutkiewicz, E & Huang, X 1970, 'Medium Access Control Protocol to Address Hidden Terminals in MU-MIMO WLANs', 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing, 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM), IEEE, Liverpool, UK, pp. 1638-1645.
View/Download from: Publisher's site
View description>>
© 2015 IEEE. We exploit the Degrees of Freedom (DoF) resulting from the deployment of multiple antennas, both at the Access Points (APs) and the clients, to address the Hidden Terminal problem in Multi User (MU) Multiple Input Multiple Output (MIMO) Wireless Local Area Networks (WLANs). This approach permits concurrent transmissions and is able to maintain a constant gain in network throughput in a Hidden Terminal scenario. We treat concurrent transmissions as an integral part of our design, so we adopt and extend the traditional Point Coordination Function (PCF) to manage them. Specifically, contention free period of the traditional PCF is used in uplink and downlink. In addition, based on DoF at APs, our MAC decides the Transmission Opportunity (TXOP) of APs/Transmitters in contrast to many traditional approaches. Besides, our MAC runs a concurrent algorithm at APs which forms an important part for the calculation of precoding vectors (based on the Zeroforcing) in the Physical Layer (PHY). Additionally, a seamless channel sounding process is designed to support the ZF precoding at the PHY which has 98.67μs signaling overhead, lower than IEEE802.11ac. Simulation studies in a typical 6-antenna AP and client scenario show that our MAC provides a remarkable constant network throughput gain of 4-5 times in comparison to traditional RTS/CTS, and a lower signaling overhead than IEEE802.11ac. Besides, our simple fairness algorithm provides a fair share in the throughput among APs, with the Jain Fairness Index greater than 90%.
Shrestha, S, Fang, G, Dutkiewicz, E & Huang, X 1970, 'Zeroforcing precoding based MAC design to address hidden terminals in MU-MIMO WLANs', 2015 22nd International Conference on Telecommunications (ICT), 2015 22nd International Conference on Telecommunications (ICT), IEEE, Sydney, AUSTRALIA, pp. 283-288.
View/Download from: Publisher's site
View description>>
© 2015 IEEE. This paper focuses on the Medium Access Control (MAC) layer design for an inevitable Hidden Terminal problem in Multi User Multiple Input Multiple Output (MU-MIMO) Wireless Local Area Networks (WLANs). Specifically, our MAC design is supported by the precoding vectors obtained by Zeroforcing technique which are used to address the Hidden Terminals. An efficient channel sounding process is used by our MAC protocol to obtain the Channel State Information (CSI) from the desired and undesired clients which are used to calculate the precoding vectors at the transmitters (Access Points). Our MAC design then uses these precoding vectors in order to null interferences among the undesired clients to avoid collision of signals and to maintain the concurrent transmissions among the desired clients. The the parameters such as network capacity, signaling overheads and fairness are considered in the design. Our MAC layer design shows a slightly higher signaling overhead compared to RTS/CTS scheme. However, due to the concurrent transmissions after the handshaking process, the cost of singling overheads are compensated. The simulation study of our MAC layer design shows a remarkable constant network capacity gain of 4-5 times in comparison to traditional RTS/CTS. Moreover, the gain is irrespective to the available air-time.
Usman, M, He, X, Xu, M & Lam, KM 1970, 'Survey of Error Concealment techniques: Research directions and open issues', 2015 Picture Coding Symposium (PCS), 2015 Picture Coding Symposium (PCS), IEEE, Cairns, pp. 233-238.
View/Download from: Publisher's site
Wang, H, Dutkiewicz, E, Fang, G & Mueck, MD 1970, 'An auction framework based on flexible transmit powers in the Licensed Shared Access Systems', 2015 15th International Symposium on Communications and Information Technologies (ISCIT), 2015 15th International Symposium on Communications and Information Technologies (ISCIT), IEEE, Japan.
View/Download from: Publisher's site
Wang, H, Dutkiewicz, E, Fang, G & Mueck, MD 1970, 'Framework of joint auction and mixed graph for Licensed Shared Access systems', 2015 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN), 2015 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN), IEEE, Stockholm, Sweden, pp. 154-163.
View/Download from: Publisher's site
View description>>
© 2015 IEEE. Licensed Shared Access offers an opportunity to further increase data rates in 5G networks. Considering that different commercial operators have no knowledge of each other, their base stations should be coordinated by a management entity to enable them to access the licensed shared spectrum without interference. An auction mechanism is often used as an efficient tool for resource allocation where rivalry is high. In this paper, we propose an on-line auction framework using a mixed graph due to the spatial reusability of spectrum. This proposed scheme allows each base station to make a concession by asking for a second shrinking interference-free area if its initial area overlaps some other base stations. We use a mixed graph to model the interference between them, because a mixed graph can quantify the interference much closer to the practical cases than an undirected graph does. We also propose to take the bid comparison into account when grouping the independent nodes in the interference graph. These two feathers together make the spectrum spatial efficiency improved, which leads to a higher revenue and a better buyer satisfaction.
Wang, H, Dutkiewicz, E, Fang, G & Mueck, MD 1970, 'Spectrum Sharing Based on Truthful Auction in Licensed Shared Access Systems', 2015 IEEE 82nd Vehicular Technology Conference (VTC2015-Fall), 2015 IEEE 82nd Vehicular Technology Conference (VTC Fall), IEEE, USA.
View/Download from: Publisher's site
View description>>
© 2015 IEEE. The explosion of different types of wireless communications is leading to an impending spectrum famine. As a result, spectrum sharing has gained increasing interest from governments, industry and regulators, such as FCC in US and CEPT in Europe. Licensed Shared Access (LSA), developed by CEPT and ETSI, is a concept for an efficient use of current spectrum resources to enable keeping pace with increasing mobile data usage demands. In this paper, we present a truthful auction mechanism for spectrum sharing based on the LSA concept. This proposal is to allocate Incumbents' idle spectrum to Licensee Access Points from different operators for the purpose of commerce. We give insights into spectrum allocation methods based on auction mechanisms to obtain high revenue to attract Incumbents to join in the LSA architecture and operators to offload data from primary spectrum band. The proposed LSA Auction (LSAA) mechanism combines independent set selection by bidding and an elaborately designed group bid called Rank-bid, which further improves the revenue compared to related allocation methods. Our simulation results show that LSAA results in enhanced performance for Incumbent revenue and Licensee satisfaction.
Wang, X, Xu, M & Pusatli, ÖT 1970, 'A Survey of Applying Machine Learning Techniques for Credit Rating: Existing Models and Open Issues', Springer International Publishing Switzerland 2015 S. Arik et al. (Eds.): ICONIP 2015, Part II, LNCS 9490, International Conference on Neural Information Processing, Springer International Publishing, Istanbul, Turkey, pp. 122-132.
View/Download from: Publisher's site
View description>>
In recent years, machine learning techniques have been widely applied for credit rating. To make a rational comparison of performance of different learning-based credit rating models, we focused on those models that
are constructed and validated on the two mostly used Australian and German credit approval data sets. Based on a systematic review of literatures, we further compare and discuss about the performance of existing models. In addition, we identified and illustrated the limitations of existing works and discuss about some open issues that could benefit future research in this area.
Wang, Y, Zhang, J, Liu, Z, Wu, Q, Chou, P, Zhang, Z & Jia, Y 1970, 'Completed Dense Scene Flow in RGB-D Space', Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Asian Conference on Computer Vision, Springer International Publishing, Singapore, pp. 191-205.
View/Download from: Publisher's site
View description>>
© 2015, Springer International Publishing Switzerland. Conventional scene flow containing only translational vectors is not able to model 3D motion with rotation properly. Moreover, the accuracy of 3D motion estimation is restricted by several challenges such as large displacement, noise, and missing data (caused by sensing techniques or occlusion). In terms of solution, there are two kinds of approaches: local approaches and global approaches. However, local approaches can not generate smooth motion field, and global approaches is difficult to handle large displacement motion. In this paper, a completed dense scene flow framework is proposed, which models both rotation and translation for general motion estimation. It combines both a local method and a global method considering their complementary characteristics to handle large displacement motion and enforce smoothness respectively. The proposed framework is applied on the RGB-D image space where the computation efficiency is further improved. According to the quantitative evaluation based on Middlebury dataset, our method outperforms other published methods. The improved performance is further confirmed on the real data acquired by Kinect sensor.
Wazirali, R & Chaczko, Z 1970, 'Perceptual threshold in DWT for optimum embedding rate in data hiding using HVS and GA', 2015 International Conference on Image and Vision Computing New Zealand (IVCNZ), 2015 International Conference on Image and Vision Computing New Zealand (IVCNZ), IEEE, Auckland, New Zealand, pp. 1-8.
View/Download from: Publisher's site
View description>>
Steganography is the process of concealing data to protect the carrier file data from intruders. One of the main challenges of steganography is to maintain optimum visual quality while increasing hiding capacity. This can be resolved by incorporating the human visual systems weaknesses in steganography, which results in a good quality of the algorithm. Additionally, steganography is considered as an optimization problem to obtain optimum embedding rate. For this reason, this paper presents a novel method aimed towards a selection of perceptual embedding threshold in Discrete Wavelet Transform using human visual system characteristics and Genetic Algorithm. This method included an introduction of an optimization model by maintaining a correlation between neighboring areas of the image and the different parts of the object. The results of the experiment involving a variety of two thousand images show the differences between the various methods and the HVS in relation to accuracy. Furthermore, higher levels of detectability and comprehensiveness were seen. Lastly, the method has a high tendency to maintain image quality as well as the transparency when subjected to steganography.
Wazirali, R, Chaczko, Z & Carrion, L 1970, 'Bio-informatics with Genetic Steganography Technique', Proceedings of Computational Intelligence and Efficiency in Engineering Systems, Asia-Pacific Conference on Computer Aided System Engineering (APCASE), Springer International Publishing, Bali, Indonesia, pp. 333-345.
View/Download from: Publisher's site
View description>>
Biological systems have been a rich source of stimulation for computer security specialists. A wide number of approaches have been proposed over the last decade for encoding data using deoxyribo nucleic acid (DNA), giving rise to the developing area of DNA data hiding. In this work, a new data hiding technique based upon DNA characteristic have been developed. DNA matrix has been used to represent the secret message. After that DNA matrix converted to Quick Response (QR) representation that offers a broad scope of practical usage. In addition, the paper provides an idea of choosing the optimal locations of the QR in order to obtain rightmost position. A new system based on the genetic algorithm has been developed. Finally, we embed the QR codes into the most appropriate location by applying the Haar Wavelet technique on the resulting DNA signals and LSB with assist of the GA in order to reduce the error between the cover image and the stego image. Experimental results have presented a high PSNR which indicate a high level of quality in stego-image with high capacity.
Wazirali, R, Slehat, S, Chaczko, Z, Borowik, G & Carrion, L 1970, 'Objective Quality Metrics in Correlation with Subjective Quality Metrics for Steganography', 2015 Asia-Pacific Conference on Computer Aided System Engineering, 2015 Asia-Pacific Conference on Computer-Aided System Engineering (APCASE), IEEE, Quito, Ecuador, pp. 238-245.
View/Download from: Publisher's site
View description>>
© 2015 IEEE. The main goal of hiding data is to conceal the very existence of the hidden information, therefore there is a significant demand for steganographic approaches that can ensure imperceptibility of such infromation. However, there is a limited corresponding evaluation parameters available. Most of the studies use the Peak Signal to Noise Ratio (PSNR) as a metric for imperceptibility evaluation, although it could provide less accurate results than the Human Visual System (HVS) evaluation. This paper provides a review of the existent evaluation metrics that are used to assess the quality of steganography. The examination of the correlation between the existing objective and subjective metrics is also conducted. Pixel differences metrics have a poor correlation with the subjective metrics, hence the HSV based metrics have better correlation than pixel metrics.
Xie, K, Fu, K, Zhou, T, Yang, J, Wu, Q & He, X 1970, 'Small target detection using an optimization-based filter', 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), ICASSP 2015 - 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), IEEE, South Brisbane, Australia, pp. 1583-1587.
View/Download from: Publisher's site
View description>>
© 2015 IEEE. Small target detection is a critical problem in the Infrared Search And Track (IRST) system. Although it has been studied for years, there are some challenges remained, e.g. cloud edges and horizontal lines are likely to cause false alarms. This paper proposes a novel method using an optimization-based filter to detect infrared small target in heavy clutter. First, we design a certain pixel area as active area. Second, a weighted quadratic cost function is performed in the active area. Finally, a filter based on statistics of active area is derived from the cost function. Our method could preserve heterogeneous area, meanwhile, remove target region. Experimental results show our method achieves satisfied performance in heavy clutter.
Xu, W, Miao, Z, Zhang, J & Tian, Y 1970, 'Learning Spatio-Temporal Features for Action Recognition with Modified Hidden Conditional Random Field', Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), European Conference on Computer Vision, Springer International Publishing, Zurich; Switzerland, pp. 786-801.
View/Download from: Publisher's site
View description>>
© Springer International Publishing Switzerland 2015. Previous work on human action analysis mainly focuses on designing hand-crafted local features and combining their context information. In this paper, we propose using supervised feature learning as a way to learn spatio- temporal features. More specifically, a modified hidden conditional random field is applied to learn two high-level features conditioned on a certain action label. Among them, the individual features can describe the appearance of local parts and the interaction features can capture their spatial constraints. In order to make the best of what have been learned, a new categorization model is proposed for action matching. It is inspired by the Deformable Part Model and the intuition is that actions can be modeled by local features in a changeable spatial and temporal dependency. Experimental result shows that our algorithm can successfully recognize human actions with high accuracies both on the simple atomic action database (KTH and Weizmann) and complex interaction activity database (CASIA).
Xuan, J, Lu, J, Zhang, G, Xu, RYD & Luo, X 1970, 'Infinite Author Topic Model based on Mixed Gamma-Negative Binomial Process', 2015 IEEE INTERNATIONAL CONFERENCE ON DATA MINING (ICDM), IEEE International Conference on Data Mining, IEEE, Atlantic City, USA, pp. 489-498.
View/Download from: Publisher's site
View description>>
© 2015 IEEE. Incorporating the side information of text corpus, i.e., authors, time stamps, and emotional tags, into the traditionaltext mining models has gained significant interests in the area of information retrieval, statistical natural language processing, andmachine learning. One branch of these works is the so-called Author Topic Model (ATM), which incorporates the authors'sinterests as side information into the classical topic model. However, the existing ATM needs to predefine the number of topics, which is difficult and inappropriate in many real-world settings. In this paper, we propose an Infinite Author Topic (IAT) modelto resolve this issue. Instead of assigning a discrete probability on fixed number of topics, we use a stochastic process to determinethe number of topics from the data itself. To be specific, we extend a gamma-negative binomial process to three levels in orderto capture the author-document-keyword hierarchical structure. Furthermore, each document is assigned a mixed gamma processthat accounts for the multi-author's contribution towards this document. An efficient Gibbs sampling inference algorithm witheach conditional distribution being closed-form is developed for the IAT model. Experiments on several real-world datasets showthe capabilities of our IAT model to learn the hidden topics, authors' interests on these topics and the number of topicssimultaneously.
Zha, X, Ni, W, Liu, RP, Zheng, K & Niu, X 1970, 'Secure Data Transmission and Modelling in Vehicular Ad Hoc Networks', 2015 IEEE Globecom Workshops (GC Wkshps), 2015 IEEE Globecom Workshops (GC Wkshps), IEEE, San Diego, CA.
View/Download from: Publisher's site
View description>>
© 2015 IEEE. Data security is crucial to safety-related vehicular applications. Critical challenges of unstable topologies and the collisions of uncoordinated data transmissions arise, due to the mobile and distributed nature of vehicular ad-hoc networks (VANETs). We propose a new secure transmission protocol for VANETs, where the transmitter can adaptively switch between backing off transmissions to alleviate collisions, as well as changing keys, to increase success rate with matched keys. We also develop a new 3-dimensional (3-D) Markov model to characterize the protocol. Security analyses are carried out. Interesting insights and useful guidelines to adequately distribute keys among mobile vehicular nodes are also provided.
Zhang, F, Li, J, Li, F, Xu, M, Xu, RYD & He, X 1970, 'Community Detection Based on Links and Node Features in Social Networks.', MMM (1), International Conference on Multimedia Modelling, Springer, Sydney, Australia, pp. 418-429.
View/Download from: Publisher's site
View description>>
© Springer International Publishing Switzerland 2015. Community detection is a significant but challenging task in the field of social network analysis. Many effective methods have been proposed to solve this problem. However, most of them are mainly based on the topological structure or node attributes. In this paper, based on SPAEM [1], we propose a joint probabilistic model to detect community which combines node attributes and topological structure. In our model, we create a novel feature-based weighted network, within which each edge weight is represented by the node feature similarity between two nodes at the end of the edge. Then we fuse the original network and the created network with a parameter and employ expectation-maximization algorithm (EM) to identify a community. Experiments on a diverse set of data, collected from Facebook and Twitter, demonstrate that our algorithm has achieved promising results compared with other algorithms.
Zhang, JA, Huang, X & Guo, YJ 1970, 'Adaptive searching and tracking algorithm for AoA estimation in localized hybrid array', 2015 IEEE International Conference on Communication Workshop (ICCW), 2015 ICC - 2015 IEEE International Conference on Communications Workshops (ICC), IEEE, London, UK, pp. 1095-1100.
View/Download from: Publisher's site
View description>>
© 2015 IEEE. Angle-of-Arrival estimation in localized hybrid array is very challenging due to the phase ambiguity problem. A differential beam searching (DBS) algorithm was proposed to solve the problem. However, it converges slowly and suffers from a zigzag effect where estimates may jump between correct and wrong estimates. In this paper, we first propose an improved DBS algorithm to mitigate the zigzag effect. We then analyze the error sources for general DBS algorithms, and propose a new adaptive searching and tracking (AST) algorithm. By using carefully designed updating functions and exit conditions, the proposed AST algorithm allows automatic switching between searching and tracking modes, and can significantly speed up estimation process and reduce estimation error. Numerical results are provided to verify the effectiveness of the proposed schemes.
Zhang, T, Xu, L, Yang, J, Shi, P & Jia, W 1970, 'Sparse coding-based spatiotemporal saliency for action recognition', 2015 IEEE International Conference on Image Processing (ICIP), 2015 IEEE International Conference on Image Processing (ICIP), IEEE, Quebec City, Canada, pp. 2045-2049.
View/Download from: Publisher's site
View description>>
© 2015 IEEE. In this paper, we address the problem of human action recognition by representing image sequences as a sparse collection of patch-level spatiotemporal events that are salient in both space and time domain. Our method uses a multi-scale volumetric representation of video and adaptively selects an optimal space-time scale under which the saliency of a patch is most significant. The input image sequences are first partitioned into non-overlapping patches. Then, each patch is represented by a vector of coefficients that can linearly reconstruct the patch from a learned dictionary of basis patches. We propose to measure the spatiotemporal saliency of patches using Shannon's self-information entropy, where a patch's saliency is determined by information variation in the contents of the patch's spatiotemporal neighborhood. Experimental results on two benchmark datasets demonstrate the effectiveness of our proposed method.
Zhao, M, Zhang, C, Zhang, W, Li, W & Zhang, J 1970, 'Decorrelation-stretch based cloud detection for total sky images', 2015 Visual Communications and Image Processing (VCIP), 2015 Visual Communications and Image Processing (VCIP), IEEE, Singapore.
View/Download from: Publisher's site
View description>>
© 2015 IEEE. Cloud detection plays an important role in total-sky images based solar forecasting and has received more attention in recent years. Accurate cloud detection for complicated total-sky images is especially changeling due to the low contrast and vague boundaries between cloud and sky regions. Unlike the existing cloud detection method without any preprocessing, one novel decorrelation-stretch (DS) based method is proposed in this work, where the total-sky images are preprocessed using the DS algorithm firstly. With this enhancement, color feature disparity of cloud and sky can be intensified notably, and then a more accurate threshold can be obtained by applying the Minimum Cross Entropy (MCE) to the preprocessed image. Experimental results demonstrated the proposed scheme achieves better performance than the existing cloud detection methods on total-sky images, especially for images with low contrast or vague boundaries between cloud and sky regions.
Zhou, J, Dutkiewicz, E, Liu, RP, Fang, G & Liu, Y 1970, 'Target allocation of WSN based on Parallel Chaotic Elite Quantum-Inspired Evolutionary Algorithm', 2015 15th International Symposium on Communications and Information Technologies (ISCIT), 2015 15th International Symposium on Communications and Information Technologies (ISCIT), IEEE, Nara Kasugano Int Forum IRAKA, Nara, JAPAN, pp. 287-290.
View/Download from: Publisher's site
View description>>
© 2015 IEEE. The target allocation problem is one of the important challenges in WSNs as sensor nodes have limited sensing and communication capabilities. In the target allocation problem, a set of targets is selected for each sensor to improve the monitoring quality as well as the energy efficiency. However, the target allocation problem is a combinatorial optimization problem, and the computational complexity is too high to consider all combinations for practical implementation. In this paper, we propose a novel Parallel Chaotic Elite Quantum-Inspired Evolutionary Algorithm (PCEQEA) for target allocation problem in WSNs. The PCEQEA combines the advantages of elite genetic algorithm and quantum-inspired evolutionary algorithm. It achieves high parallel search performance and fast convergence to global optimum solution. Simulation results demonstrate that proposed PCEQEA improves WSN detection coverage by detecting more targets than other existing schemes.