Loading [MathJax]/extensions/MathZoom.js
David Harle - IEEE Xplore Author Profile

Showing 1-25 of 48 results

Filter Results

Show

Results

Inspection of rice seeds is a crucial task for plant nurseries and farmers since it ensures seed quality when growing seedlings. Conventionally, this process is performed by expert inspectors who manually screen large samples of rice seeds to identify their species and assess the cleanness of the batch. In the quest to automate the screening process through machine vision, a variety of approaches ...Show More
Contamination of rice seeds affects the crop quality, yield and price. Inspection of rice seeds for purity is a very important step for quality assessment. Promising results have been achieved using hyperspectral imaging (HSI) for classification of rice seeds. However, the relatively high number of spectral features in HSI data continues to pose problems during classification which necessitates th...Show More
A conventional method to inspect the varietal purity of rice seeds is based on human visual inspection where a random sample is drawn from a batch. This is a tedious, laborious, time consuming and extremely inefficient task. This paper presents an automatic rice seed inspection method using Hyperspectral imaging and machine learning, to automatically detect unwanted seeds from other varieties whic...Show More
Behavioural scientists track animal behaviour patterns through the construction of ethograms which detail the activities of cattle over time. To achieve this, scientists currently view video footage from multiple cameras located in and around a pen, which houses the animals, to extract their location and determine their activity. This is a time consuming, laborious task, which could be automated. ...Show More
A kernel based handover optimisation techniques has been proven to reduce the number of handovers between indoor femtocell and outdoor macro cell by 65%. By suppressing unnecessary handovers, the techniques improve the network performance by detecting area where spurious handovers occurred. This paper presents the applications of this technique on the outdoor scenario between two macro cells. The ...Show More
A novel approach to enhance the robustness of handovers in LTE femtocells is presented. A modified Self Organizing Map is used to allow femtocells to learn about their specific indoor environment including the locations that have prompted handover requests. Optimized handover parameter values are then used that are specific to these locations. This approach reduces both the number of handover fail...Show More
A novel approach to handover management for Long-Term Evolution (LTE) femtocells is presented. Within LTE, the use of self-organizing networks (SONs) is included as standard, and handover management is one of its use cases. Base stations can autonomously decide whether handover should take place and assign the values of relevant parameters. Due to the limited range of femtocells, handover requires...Show More
Most on-demand Mobile Ad Hoc Network (MANET) routing schemes typically assume operation over symmetrical and bidirectional routing paths, both of which are not feasible due to the inherent heterogeneous properties of wireless devices. Radio links between a set of wireless devices may be asymmetrical and unidirectional as a result of factors such as high mobility, packet collisions due to interfere...Show More
Society depends now more strongly than ever on large-scale networks. Failures of great significance have occurred in the last years. Thus, it has become of vital importance to define robustness metrics. Classical robustness analysis has been focused on the evaluation of topological characteristics. In this paper we extend this analysis introducing two new robustness metrics that include traffic se...Show More
Mobile ad hoc networks (MANETs) are rapidly evolving and the notion of ad hoc networking has become one of the most challenging research areas of wireless communications. The rising popularity of real-time applications among end users in MANETs has stimulated a surge of research in routing and providing quality of service (QoS) support in such networks. Capacity estimation is a key component of an...Show More
This paper considers the impact of unidirectional link on Ad-hoc on-demand distance vector routing protocol from a mobility perspective. Most routing protocols assume that all wireless connectivity is symmetrical and bidirectional. Such assumptions are not generally true. Wireless nodes exhibit non-uniform transmission power, non-uniform reception quality and signal to noise ratio which may result...Show More
TCP's downlink performance during FMIPv6-enabled IEEE802.11g handoff is examined. The use of a user-initiated Handoff Notification, sent prior to handoff, is proposed. Therefore, the correspondent node is aware of the handoff-induced disruption, hence avoiding dropping the congestion window size and triggering Fast Retransmission mechanisms. During handoff, it continues to send data packets which ...Show More
A Mobile Ad hoc Network (MANET) is a heterogeneous network; a collection of mobile wireless devices with different characteristics communicating in a random network topology. Much research over-simplifies by assuming that all nodes are homogeneous, i.e., possess identical transmission power, reception quality and signal to noise ratio, which is not realistic. Such conditions are ideal and not ofte...Show More
This work introduces a Hopfield Neural Network approach to network selection for multihomed hosts which considers a range of relevant network parameters including available radio access technologies and traffic types (VoIP, video streaming, Web browsing and FTP-based). Also proposed is a novel utility function that further improves network selection. Results show that, in terms of QoS, the allocat...Show More
There is an ambiguous opinion in the literature on whether multi-path routing offers significant merit in terms of a networkpsilas performance. The one camp supports the belief that multi-path routing is indeed advantageous compared to single-path counterparts and the other contends that the improvement is not significant, if at all. For the performance evaluation of the two counterparts, Dynamic ...Show More
A key element of the survivability cost is the amount of the additional capacity embedded in the network for recovery purposes. Generally, Internet service providers (ISPs) have the obvious aim of achieving the required level of survivability with minimum resource consumption and network cost. Therefore, in order to achieve such a challenge, it is necessary to move towards the multilayer different...Show More
In recent years, on-demand multipath routing protocols have been a key research area in mobile ad-hoc networks. Such protocols are crucial in providing resilience to route failures and to successful load balancing. Previous work shows that on-demand multipath routing protocols achieve lower end-to-end delay, routing overheads and higher goodput under certain scenarios when compared to traditional ...Show More
Packet reordering over TCP/IP networks is a phenomenon which is becoming increasingly important in network performance analysis. Reordering is a consequence of network equipment manufacturers increasing switch and link level parallelism on the Internet, seeking performance, reliability and economical improvements. This paper presents a methodology for simulating and measuring TCP reordering, provi...Show More
A bifurcated approach is typically adopted to the regular virtual topology design problem. By exploiting key metrics that affect optimization solutions, it is shown that easily computed parameters, pertaining to the spread in inter-nodal distances and the spread in inter-nodal traffic, are descriptive and appropriate means to characterize problem inputs, the physical topology and the traffic matri...Show More
On-demand multipath routing in wireless ad-hoc networks can be effective in achieving load balancing over the network and in providing a degree of resilience to route failures. A shortest multipath source routing (SMS) protocol is proposed - a multipath extension to DSR - supporting multimedia applications. The protocol has two novel aspects compared to other on-demand multipath routing protocols:...Show More
The potential performance and successful experimental demonstrations of two-dimensional time-spreading wavelength-hopping (TW) optical code-division multiple access systems have motivated a large volume of research into the development of new TW codes. The choice of the code is crucial in network design since the code not only affects the overall system performance but also sets limits on the phys...Show More
In the next generation optical internet, GMPLS-based IP-over-optical networks, ISPs will be required to support a wide variety of applications each having their own requirements. These requirements are contracted by means of the SLA. This paper describes a recovery framework that may be included in the SLA contract between ISP and customers in order to provide the required level of survivability. ...Show More
When considering network restoration, the amount of reserved resources has an important impact on network performance in that it can restrict the acceptance of new connections. Thus, the use of shared resources to support restoration can improve overall network performance. However, efficient resource sharing searches in a global network require extensive computation and database updates. The rest...Show More
Interferometric noise (IN) (also referred to as beat noise) is one of the most detrimental noise sources in optical code division multiple access (OCDMA) systems dominating the effect of multiple access interference (MAI). General classification of IN is provided supported by survey of OCDMA systems that suffer from beat noise, theoretical framework that permits an assessment of the level of syste...Show More
The effect of beat noise on two-dimensional time-wavelength optical code-division multiple-access systems utilising wavelength-aware receivers is examined. A derivation of a general formula for the bit error probability taking into consideration multiple access interference (MAI) and other noise sources is given. In addition, a comparison between the system performance of such a receiver and the t...Show More