Time filter
Source Type

Ahmed N.U.,IT House | Cvetkovic S.,IT House | Siddiqi E.H.,IT House | Nikiforov A.,IT House | Nikiforov I.,IT House
Pattern Recognition Letters | Year: 2017

This paper describes biometric matching of eye images captured by the visible spectrum smart phone cameras from the MICHE II database. The matching is performed by calculating matching scores for iris codes and periocular biometric based on the Multi-Block Transitional Local Binary Patterns. The authentication scores are calculated separately, and the results are fused to improve the system performance. Score fusion significantly improves error statistics compared to individual iris and periocular matching. For example, equal error rate is about two times lower for fused scores compared to the separate iris and periocular matching. Our matching algorithm ranked first in MICHE II competition. © 2017 Elsevier B.V.

Kbar G.,Riyadh Techno Valley Research Center | Mansoor W.,American University in Dubai | Naim A.,IT House
Proceedings - 6th International Conference on Wireless and Mobile Communications, ICWMC 2010 | Year: 2010

Voice telephony over mobile is currently supported at a cost using service provider such as GSM, or using IP service provider at cheaper cost. The purpose of this research is to design and implement a telephony program that uses WIFI in p2p (Peer-to-Peer) or WLAN (Wireless Local Area Network) as a means of communication between mobile phones at no cost. The system will allow users to search for other individuals within WIFI range and to establish free p2p voice connections, or to establish virtual connection through Access Points (AP), as well as giving the option to user to use GSM in the case of no WIFI connectivity is available. The system will use a novel algorithm to convert mobile number into IP address and use it as a mean for contacting other mobile over p2p or AP using WIFI technology. The software will use a correlation between current address books available in mobile phones to convert phone numbers into IP addresses. The system will allow user to make voice conversation, sending SMS (Short Message Service) as well as MMS. Inbox and outbox services, message delivery reports, and message drafts will be used for SMS and MMS management. The current system will only allow for one call per connection, and no call waiting, or conference calls. The first step of this research and development is to resolve the technical issue regarding mapping of the mobile user's phone number to a unique IP address in order to avoid IP collision, centralized control, and user configuration. In addition, voice call will be supported using WIFI to allow mobile phones to communicate free of cost to each other through p2p or through AP. © 2010 IEEE.

Hall-May M.,IT House | Surridge M.,IT House | Nossal-Tuyeni R.,Austro Control
International Journal of Applied Mathematics and Computer Science | Year: 2011

The SERSCIS approach aims to support the use of interconnected systems of services in Critical Infrastructure (CI) applications. The problem of system interconnectedness is aptly demonstrated by 'Airport Collaborative Decision Making' (A-CDM). Failure or underperformance of any of the interlinked ICT systems may compromise the ability of airports to plan their use of resources to sustain high levels of air traffic, or to provide accurate aircraft movement forecasts to the wider European air traffic management systems. The proposed solution is to introduce further SERSCIS ICT components to manage dependability and interdependency. These use semantic models of the critical infrastructure, including its ICT services, to identify faults and potential risks and to increase human awareness of them. Semantics allow information and services to be described in a way that makes them understandable to computers. Thus when a failure (or a threat of it) is detected, SERSCIS components can take action to manage the consequences, including changing the interdependency relationships between services. In some cases, the components will be able to take action autonomously, e.g., to manage 'local' issues such as the allocation of CPU time to maintain service performance, or the selection of services where there are redundant sources available. In other cases the components will alert human operators so they can take action instead. The goal of this paper is to describe a Service Oriented Architecture (SOA) that can be used to address the management of ICT components and interdependencies in critical infrastructure systems.

Clarke H.,Telespazio VEGA UK Ltd. | Pechorro E.,ESA Climate Office | Bennett V.,Rutherford Appleton Laboratory | Farquhar C.,IT House | Blower J.,University of Reading
European Space Agency, (Special Publication) ESA SP | Year: 2016

The European Space Agency's (ESA's) Climate Change Initiative (CCI) Programme, producing harmonised datasets from long term Earth Observation satellite data records for a number of Essential Climate Variables (ECV's), provides a solid basis for climate science and modelling, for specialist application development and ultimately for European and global policy making. The resulting Climate Data Records (CDRs) represent a major investment of science, funding and personal effort, therefore extended access to those products is a key element of programme success. ECV datasets are currently being distributed through individual ECV teams, and access procedures and interfaces vary. To compliment and unify the work of the individual teams and to maximise the visibility and uptake of ECV data in the climate data user community within and beyond the CCI, a new ESA CCI project has started, to create a central open data portal and metadata catalogue for the ESA CCI project. This paper highlights key features of the Portal to date.

News Article | February 20, 2017

The Manhattan-Based Center for Kids will Help Spark a Desire to Learn by Figuratively Transporting them Back in Time to Ancient Egypt LOS ANGELES, CA / ACCESSWIRE / February 20, 2017 / Antonio Kenyatta, Founder and Chief Pharaoh Scientist of The Pharaoh's House – It Starts With Them, is pleased to announce the upcoming launch of his innovative new learning center. To watch a video that showcases what The Pharaoh's House will look like and learn more about the project, please check out at any time. As a spokesperson for the project noted, The Pharaoh's House is a Manhattan-Based center for kids designed to reawaken their natural curiosity and spark an enthusiasm for learning. Pulling together math and science learning program principals and exploratory fun into a museum-quality environment, this center will inspire kids to want to start learning more. "The Pharaoh's House will be decorated with beautiful rich colors, murals, and hieroglyphs that transport visitors back in time," the spokesperson said, adding that upon entering, kids will immediately be enchanted by the magical surroundings as they enjoy hands-on learning in math and science. "This space will be designed to serve as a location for celebrations, parties, and more while fostering a passion for everything from bugs to astronomy." As a bonus, rather than letting the math and science fields become standardized and uninspiring, Kenyatta and his creative team are intent on teaching these subjects through the eyes of the Ancient Egyptians as kids enjoy lessons that awaken their curiosity. In order to help pay for the many costs associated with fixing up the Manhattan space and transforming it into an Ancient Egyptian learning center, Kenyatta and his team recently launched a fundraiser on Indiegogo. There, they hope to raise $615,000 through crowdfunding. "Ultimately we will turn this space into a museum grade venue, ready to hold events including the ultimate birthday parties," the spokesperson said. About The Pharaoh's House - It Starts With Them: Kids across America are falling behind on developing a solid foundation in math and science, which are the very backbone of change. To help fight this tide, Antonio Kenyatta, Founder of The Pharaoh's house, has acquired a space in midtown Manhattan and is now seeking funding to make it museum quality. As such, it will be used to inspire children's interest in math and science while they explore the many wonders of Ancient Egypt. For more information, please visit

Giles J.,University of Southampton | Myers L.,University of Southampton | Bahaj A.,University of Southampton | O'Nians J.,IT House | Shelmerdine B.,IT House
IET Renewable Power Generation | Year: 2011

This study presents a preliminary experimental study investigating the potential benefits of foundation-based flow acceleration structures for marine current energy converters (MCECs). Such structures would provide multiple benefits, including; increased device power output, increased foundation footprint and scour protection. Two phases of experimental testing have been conducted. The first series of tests investigated the flow acceleration caused by a ramp foundation without the presence of a MCEC. They were scaled from a shallow tidal flow site and provide evidence that these structures could give power benefits of 12-25 depending on ramp size and flow depth. An optimum ramp size was established based on the suitability of the vertical velocity profiles for energy extraction. The second phase of testing modelled a commercial marine current energy convertor with a gravity-based ramp foundation. The device was modelled using actuator plates to represent the interaction between the device and the surrounding flow field. A proposed single-operation installation method using a concrete ramp foundation is proposed and preliminary stability calculations are presented. © 2011 The Institution of Engineering and Technology.

Surridge M.,IT House | Nasser B.,IT House | Chen X.,IT House | Chakravarthy A.,IT House | Melas P.,IT House
Proceedings - 2013 International Conference on Availability, Reliability and Security, ARES 2013 | Year: 2013

We will present results of the SERSCIS project related to risk management and mitigation strategies in adaptive multi-stakeholder ICT systems. The SERSCIS approach involves using semantic threat models to support automated design-time threat identification and mitigation analysis. The focus of this paper is the use of these models at run-time for automated threat detection and diagnosis. This is based on a combination of semantic reasoning and Bayesian inference applied to run-time system monitoring data. The resulting dynamic risk management approach is compared to a conventional ISO 27000 type approach, and validation test results presented from an Airport Collaborative Decision Making (A-CDM) scenario involving data exchange between multiple airport service providers. © 2013 IEEE.

Engen V.,IT House | Brian Pickering J.,IT House | Walland P.,IT House
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | Year: 2016

We live in an emerging hyper-connected era in which people are in contact and interacting with an increasing number of other people and devices. Increasingly, modern IT systems form networks of humans and machines that interact with one another. As machines take a more active role in such networks, they exert an increasing level of influence on other participants. We review the existing literature on agency and propose a definition of agency that is practical for describing the capabilities and impact human and machine actors may have in a human-machine network. On this basis, we discuss and demonstrate the impact and trust implications for machine actors in human-machine networks for emergency decision support, healthcare and future smart homes. We maintain that machine agency not only facilitates human to machine trust, but also interpersonal trust; and that trust must develop to be able to seize the full potential of future technology. © Springer International Publishing Switzerland 2016.

Saidi E.,IT House
Journal of Internet Banking and Commerce | Year: 2010

E-commerce is enjoying wide recognition in many countries but its adoption in developing countries is still a challenge. In such countries, m-commerce is being preferred especially due to the relative low costs associated with the deployment of the technology behind such applications. In Malawi, drivers of m-commerce such as banks and mobile network providers are gearing to implement m-commerce applications including m-banking, m-shopping, mobile information services, m-marketing and m-health. However, the range of applications is being limited by a number of technical, business and policy challenges. In this paper, solutions to the identified challenges are proposed by drawing from literature and experiences from other countries. It is envisaged that the proposed solutions will provide an organized technical and managerial approach to understanding and addressing the implementation challenges within the emerging domain of m-commerce. © Edwin Saidi, 2009.

Loading IT House collaborators
Loading IT House collaborators