ABSTRACTS OF RESEARCH PAPERS, 19TH FEBRUARY 2014 Develop a Detection System for Colour Stego Images through Extracting Colours-Gradient Cooccurrence Matrix Ahd Aljarf, Faculty of Engineering and Computing, Coventry University Recently, the concept of ‘Image Steganography’ is became an important issue in the computer security world. Image steganography simply means hide some secret data into an object. The object can be a text, an image or a sound, but the most popular cover object used for hidden secret message is images. A developed detection system is introduced in this research. The first part of the work includes creating varieties of stego-images. These stego-images are having different image file formats. Also, these stego-images have been done using different steganography methods and tools. The created stego-images are used to train the detection system in the next stage. On the other hand, the second part of the work includes detecting the hidden data. In order to do so the colour-gradient co-occurrence matrix (CGCM) is created for all tested images. The CGCM considers the information of both colour-correlation and gradient among the pixels in an image. Numbers of image features are extracted from the matrix. The system at this stage targeted the indexed images. The BMP images with 256 colours have been used to test the system. However, more image formats are planning to be used. Later, a classification method will be used to validate the features selected. These features are needed to differentiate between the clean images and the stego-images. An Ecosystem for E-learning in Mechatronics:The CLEM project Antonios Nanos, Faculty of Engineering and Computing, Coventry University This poster describes some results of the EU Leonardo Lifelong Learning Programme project CLEM (Cloud E-learning for Mechatronics). Following a European recognition for the need for updating of vocational education trainers in the area of mechatronics, CLEM set out to develop a cloud based teaching and learning facility for mechatronics based on the ideas of community, sharing and Web 2.0. An interesting development has been the creation of remote laboratories in the cloud. Learners can access such laboratories to help with their practical learning about mechatronics without need to set up laboratories at their own institutions. On the other hand the cloud infrastructure enables multiple laboratories to come together virtually to create an ecosystem for educators and learners. From such a system, educators can pick and mix materials to create suitable courses for their students. This means that learners can experience different types of devices and laboratories through the cloud. The paper provides an overview of the CLEM project, presenting results so far. In addition to the remote laboratories set up using a Raspberry Pi and Arduino microprocessor structure, this poster also presents information on the results of a survey and the development of static learning material. It also explains how a holistic e-learning experience can be obtained through use of static and dynamic material together with facilities for collaboration and innovation.. Annual Faculty Research Symposium - Abstract 1 GROUP-BASED PARALLEL MULTISCHEDULE FOR GRID COMPUTING Goodhead Tomvie Abraham, Faculty of Engineering and Computing, Coventry University As hardware design philosophy shifts from increasing the number of transistors and or increasing the clock speeds to the current multicore systems, shouldn’t there be a paradigm shift in software design philosophy? Multicore computers are already becoming pervasive in our daily computing environment while the scheduling challenges for Grid computing remains a challenge. Given that advances in computer hardware design (multicores) has automatically extended an open invitation to a shift in programming paradigm as it is a common knowledge that sequential programming does not scale well with multicores, neither do parallelism gain from sequential programming; should Grid scheduling be allowed to suffer the bottlenecks orchestrated by serial schedulers especially when the number of jobs increases? To avoid this problem hampering Grid scheduling and the growth of the Grid, it becomes imperative to exploit parallelism and multi-scheduling in Grid computing. Previous work in Grid scheduling has mostly addressed QoS, Makespan or the scheduling of parallel jobs and has failed to address the development and adoption of parallel schedulers that can take advantage of the multicores that is gradually taking over our computing lives. This work deals with the uses grouping methods to categorize both Grid jobs and Grid machines at Grid sites and employs the parallelism to multi-schedule Grid jobs and is aimed at exploiting parallelism - optimize the utility of several processors within a system, harness the advantages of the multicores and also scale Grid scheduling and sustain the growth of the Grid. Tests against the MinMin, MinMax and MinMinMinMax algorithms yielded far better scheduling times. And a Brief Introduction Computer hardware design philosophy has changed from increasing the number of transistors and clock speeds - which was good for sequential programming to multicores due largely to advances in circuit technology but programming model has not changed much to take advantage of this changes despite the established fact that sequential programming does not scale well with multicores. Grid computing entails that jobs are submitted by users in a location and processed at different locations millions of miles away. Grid computing is expanding at an extraordinary pace just as multicore systems are becoming ever more pervasive, the scheduling of Grid jobs will be hampered if not scaled in lieu with the two pronged innovation in hardware multicore computing and the expanding growth in the Grid. Multischeduling offers the ability to schedule multiple jobs from same source to various computing resources while Parallelism enhances the optimized use of all processing components within a system. To make good the revolution in computer hardware design, it has become imperative for a paradigm shift in software programming model A study of evaluation methodologies and impact of STEM Outreach activities Yamuna Bagiya, Faculty of Engineering and Computing, Coventry University The government of United Kingdom has identified the uptake of Science, Technology, Engineering and Mathematics (STEM) subjects into further education as a key factor in ensuring a successful future for the nation (HM Treasury 2004, The Work Foundation 2011). Also, research conducted by The Confederation of British Industry (CBI) has predicted that, in the next 5 to ten years, an additional 2.2 million people will be required in STEM related industry (CBI 2011). However, it has been indicated that there is a shortage in the supply of STEM graduates (Department of Education 2011, HM Treasury and BIS 2011, Roberts 2002) which will affect the economy negatively. To address the shortage of STEM graduates, and in order to increase the interest of younger generation in STEM subjects, many outreach and enrichment initiatives are being designed and Annual Faculty Research Symposium - Abstract 2 delivered. Some outreach and enrichment programmes are designed to give students the motivation and interest in science and mathematics from an early age in order to aid them to take up STEM related courses at university level (Toland 2011). They create awareness and encourage more students to take up STEM related courses (Department of Education 2011, Toland 2011). Younger students especially enjoy making exciting things, taking part in fun activities and experimenting with different things. The main purpose of developing outreach programmes is that the students can understand, relate and experience the fun behind STEM subjects (Jeffers et al 2004). However, so far there are no significant research findings on pedagogy of outreach programmes, methodology of longitudinal evaluation of different types of outreach activities and their impact. This paper will highlight the findings of research carried out at Coventry University, on evaluation strategies and the impact of STEM outreach activities on different widening participation groups. References 1.HM Treasury. (2004) Science & Innovation Investment Framework 2004 – 2014: Next steps. London: HM Treasury . 2.CBI. (2011) Building For Growth: Business priorities for education and skills. London: CBI 3.Roberts, G. (2002) SET for success: The supply of people with science, technology, engineering and mathematics skills: The report of Sir Gareth Roberts’ Review. London: HM Treasury 4.Toland, A. (2011) Employability Skills Review. Birmingham: The National HE STEM Programme 5.Department of Education. (2011) The STEM cohesion programme: final report. London: Department of Education 6.Jeffers, A T., Safferman, A G., and Saffermsn S I. (2004) ‘Understanding K-12 Engineering Outreach Programs’. Journal of professional issues in engineering education and practice 130, 95-10 Network Intrusion Detection Systems (NIDS) for Multi Attack Scenarios in Multi-Core Environments in Computer Networks Waleed Bul’ajoul, Faculty of Engineering and Computing, Coventry University With growth of various malicious attacks, especially technology is more dependent on network and wireless systems, the traditional security tools such as anti-virus and firewalls are not sufficient to provide the integral, reliable and security free networks. Due to the high and precise detection from the malicious attacker, intrusion detection is one of the strong technologies that monitors network traffic and recognize illegal use, misuse of computer system, and malicious attackers. This study outlines a NIDSs software exploit that utilizes QoS and parallel NIDSs technologies in Cisco Catalyst Switches to increase NIDSs analytical performance when deployed in high-speed networks. We have designed a real network to present experiments that use a Snort NIDS to demonstrate the weaknesses of NIDSs, such as its inability to process multiple packets and its propensity to drop packets in heavy traffic and high-speed networks without analysing them. We tested Snort’s performance analysis, gauging the number of packets sent, analysed, dropped, filtered, injected, and outstanding. We suggest using QoS configuration technologies in a Cisco Catalyst 3560 Series Switch and parallel Snort NIDSs to improve NIDS performance and to reduce the number of dropped packets. The proposed research will design and implement a Network Intrusion Detection System(NIDS) to improve network security in terms of efficiency , effectiveness, performance analysis and detection engine. Annual Faculty Research Symposium - Abstract 3 Implementing median filter in 2D medical images using FPGA architecture Razan Aboabat, Faculty of Engineering and Computing, Coventry University FPGA becomes commonly used in biomedical application in different fields such as, brain tumor detection with MRI images whereas its strength comes from the flexibility that derives from the programmable environment which is the main difference with SIMD. In the median filter operation, FPGA with pipeline technique is efficient compared with CNAPS and IMAP-Vision using specific algorithm to optimize the performance by reducing the comparison times from 30 to 19 in order to achieve efficiency almost by 33%. The main focus of the research is to solve large-scale image processing problems with a fast response time with data size of 100 images size of (1024*1024) using PVM message passing system environment considering synchronization issue between different processes belonging to the same or different programs in parallel computing. Educational Game: Giving Tutorial and Exercise for Network Subnetting Mohammad Adnan Hijji, Faculty of Engineering and Computing, Coventry University Subnetting is an integral part of the network computing technique, and a very significant process for the network of any organization, where it plans and arranges the company’s computer network. In fact, students who studied networking need to practice this concept during and after networking course, in order to gain and understand this concept effectively. Attracting students to practice Subnetting technique needs modern and entertaining methods of giving tutorials and exercises. From this perspective, the idea of this project came up. Hence, this research presents an educational game which aims to support lecturers in computer networking classes. The proposed game provides tutorials and exercises regarding the concept of ‘Subnetting technique’ in an entertaining manner. The design of game takes into account the targeted audience, their pre-required knowledge and Human Computer Interaction (HCI). The Storyboard’s method was used to design the interfaces sequence of the game, while Unified Modelling Language (UML) was used to design the software. The designed framework of the game was implemented by C# programming language. The game was constructed, tested and evaluated successfully. The evaluation process was through a process of primary data collection. Keywords- Educational Game; Subnetting Game; Converting Decimal to Binary Game; Converting Binary to Decimal Game; IP address classes Game; IP hosts Game Annual Faculty Research Symposium - Abstract 4 Investigation of the current E-Learning Situation in Higher Education in Saudi Arabia Latifah Almuquren, Faculty of Engineering and Computing, Coventry University The use of IT/ICT in the field of education has become remarkable across many countries. The unification between these fields (i.e. IT/ICT and education) has enhanced education across several areas, such income and teaching methods. Public and private organizations are required on-going development and evaluation in order to find out the most effective approach of education across various levels of education. In the sight of government's interest in Saudi Arabia, toward the development in higher education including E-learning, this research aim to investigates the current status of E-learning in universities within Saudi Arabia through exploring barriers and hurdles that facing deployment E-learning in universities within Saudi Arabian, undertaken the experiences of the UK and Australia in E-learning to propose a set of recommendations for the sake of developing Elearning in Saudi Arabian universities. The results indicate that there are (i) lack of applications Elearning in most of universities (ii) and they missed some of the major requirements of E-learning which aid to configure and implement E-learning, although it has been implemented for more than five years. Active Buckling Control for Vehicle Body Structures James E Trollope, Control Theory and Applications Centre (CTAC), Coventry University An active buckling control strategy for mechanical structural applications is being developed at the Control Theory and Applications Centre (CTAC), Coventry University, whereby the structures are designed to exhibit a natural response phenomenon when subject to external stimuli, e.g. an applied force. An example of a natural structure is the self-preserving properties of trees where they are able to automatically flexibly change their shapes in response to dynamic loads, e.g. to counteract effects of wind and adapt to the variation in humidity levels. Applying such an approach to mechanical structures provides an opportunity to reduce the mass of current structures, which are typically over-engineered in order to deal with undesirable crash scenarios. This poster presents the concept of a novel active buckling control strategy aimed at alleviating the compatibility problem arising when two vehicles of dissimilar mass and stiffness values encounter a collision. This approach assumes that the properties of the vehicle body structures can be changed via actively controlled materials, commonly known as smart materials; in particular the smallest positive eigenvalue which corresponds to the point at which buckling commences. This approach is based on a multi-dimensional look-up table combined with fuzzy logic for interpolating between precalculated levels of energy absorption related to the stiffness values. By modelling the force versus deformation characteristic, the energy to be absorbed is more appropriately apportioned, thus enhancing vehicle safety. Annual Faculty Research Symposium - Abstract 5 Dynamic Resource Allocation for Web Hosting Environment Olfat Mirza, University of Warwick Hardware and system resource allocation to e-business web application has been a known challenge and it is becoming increasingly difficult to allocate resource efficiently beforehand as there is variation in workload received by these applications that is difficult to predict. Ignoring this fact can either lead to over-allocating expensive resources inefficiently, or it can lead to have long response time that anticipated, frequent request timeouts, or unexpected connection closure or system failure. To mitigate this risk, resources can be re-allocated dynamically bearing in mind the the benefit or resource re-allocation exceed the cost of the re-allocation. One possible way to achieve this is to host these applications in virtualised server pools, and dynamically reassign computer resources between pools to meet the demands on the hosted application. In this work, a combination of the reactive behaviour of two well-known switching policies (Proportional Switching Policy and Bottleneck Aware Switching Policy) is proposed with the proactive forecasting of expected workload using seven forecasting models. These forecast models are to be implemented and test via simulation to gauge the effectiveness achieved. Annual Faculty Research Symposium - Abstract 6
© Copyright 2024 ExpyDoc