The scope of this project is to develop a fence intrusion sensor by optical fiber for security monitoring purpose. Senstar-Stellar is the world's leading supplier of outdoor perimeter intrusion detection sensors and systems. The R&D group is seeking for new idea and new technique for building a high performance distributed intrusion sensor with large area coverage and low false alarm rate. Our current research area is distributed optical fiber sensor for dynamic measurements and we had successfully demonstrated a novel optical fiber vibration sensor in the lab environment.
Modern society is highly dependant on electricity; large scale blackouts can cost billions of dollars. High-voltage power transmission systems that transmit electricity from the generating stations to load centres could be subjected to a variety of disturbances such as faults, lightening strikes etc. These transmission systems must be protected against faults using suitable protective equipment to ensure the safety of equipment and people.
The desire to offer on-demand 24/7 services means there is pressure to quickly identify and resolve problems in a database management system (DBMS). Problem determination tools rely on the existence of sufficient monitoring data to support analysis but monitoring introduces overhead and so causes decreased application performance. The proposed research seeks to provide effective light-weight tools for monitoring and analysis to support problem determination in DBMSs.
Technology in today’s healthcare system. eHealth is the term used to describe this technology. The research performed will build a model to help determine the value of financial savings and customer service that can be attained by implementing eHealth within varying regions with varying degrees of existing information technology. The information for this model will come from existing financial data and by surveying users of the healthcare system, patients. This study will assist in deciding whether eHealth is a worth while investment in a particular region and if so, what its value is.
The aim of this research is to design and implement a model of social currency in a networked community which is based on the stock and flow concepts most commonly associated with investment forecasting and user choice in an environment of scarcity. In other words, creating a system which can assist in predicting those things users would most be willing to put their actual money behind. This research is intended to ultimately assist developers of film, television etc.
The generalization of the paper maché-like technique of covering surfaces with strips to industrial applications like building shells and ship hulls has not been fully realized. In participate, the problem of covering any curved surface with strips of material has been addressed but not solved in the general case. Most of the applicable research focuses either on using parameterizations that inevitably introduce cutting and/or stretching or using developable surfaces rather than strips.
The aim of this project is to assist Flagstone RE, a global reinsurer in evaluating whether the Quartz Analysis Engine, which is currently running on a conventional cluster, could benefit from being ported to a cluster of cell processors. Improved performance could allow for timely processing of larger data sets, resulting in better prediction accuracy.
We want to study the feasibility of using an algebra-based approach to performing program analysis. In particular, we are interested in the code comparison problem: tackling this problem enables us, among other things, to identify differences between two versions of a code or to check whether an optimized code is equivalent to its non-optimized version. We aim to reduce the comparison of programs to a simple algebraic manipulation similar to those that are constantly performed in classical algebra.
The aim of the current project is to research ways of dynamically “crawling” the Internet to collect enough information to be able to make a confident conclusion of whether a particular wep-page or blog is spam. This is proposed to be done by continually maintaining a `backbone' subset of the set of all web pages containing the pinging blogs and trusted websites, and doing a minor crawl based on the web page that is to be analyzed.
The rapid propagation of Internet into nearly every aspect of our daily life, together with the increase in volume and sophistication of network attacks, puts a special emphasis on the security of network systems. Currently, security modeling and simulation is one of the widely acknowledged methods for network security evaluation. However, in spite of its fundamental role, the information and communication security domain still lacks the sound and comprehensive tools for assessment of network system state.