2019 Conference on Next Generation Computing Applications (NextComp)
Building services have come to a stage where they are closely being integrated with ICT infrastru... more Building services have come to a stage where they are closely being integrated with ICT infrastructure. The aim of this research is to develop an innovative and affordable platform for business services interfaced with augmented reality. This paper provides an innovative way of interaction between building services lighting systems through augmented reality. The system allows users to show their availability status in real time using an intelligent lighting system projected into Augmented Reality (AR) which changes color according to their availability. Furthermore, the different status and availability status can also be manipulated through an interactive interface, creating a smart space.
Allen's interval algebra is a calculus for temporal reasoning that was introduced in 1983. Re... more Allen's interval algebra is a calculus for temporal reasoning that was introduced in 1983. Reasoning with qualitative time in Allen's full interval algebra is nondeterministic polynomial time (NP) complete. Research since 1995 identified maximal tractable subclasses of this algebra via exhaustive computer search and also other ad-hoc methods. In 2003, the full classification of complexity for satisfiability problems over constraints in Allen's interval algebra was established algebraically. Recent research proposed scheduling based on the Fishburn-Shepp correlation inequality for posets. This article first reviews Allen's calculus and surrounding computational issues in temporal reasoning. We then go on to describe three potential temporal-related application areas as candidates for scheduling using the Fishburn-Shepp inequality. We also illustrate through concrete examples, and conclude the importance of Fishburn-Shepp inequality for the suggested application areas ...
2017 International Conference on Cyber Security And Protection Of Digital Services (Cyber Security), 2017
eHealth mobile technologies are becoming increasingly prevalent in both the personal and medical ... more eHealth mobile technologies are becoming increasingly prevalent in both the personal and medical world, assisting healthcare professionals to monitor the progress and current condition of patients. These devices often gather, transmit and analyse personal data. Healthcare data has rigid requirements for security, confidentiality, and availability, whilst access traceability and control, and long-term preservation are also highly desirable, particularly when exposed to cloud computing environments. This article explores some of the security and privacy challenges eHealth devices currently face. Legislative implications of data breaches are considered, as well as service provider accountability. The work also provides numerous security and privacy recommendations, in order to improve future implementations.
2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC), 2018
The aim of this project is to develop a low cost air quality monitoring system. The proposed syst... more The aim of this project is to develop a low cost air quality monitoring system. The proposed system used the Raspberry Pi board, Arduino board, Grove sensors and Microsoft’s Azure based cloud service for data storage and analysis. The data was captured from the 10th of May to the 31st of August 2017 in Bonne Terre, Vacoas. It was found that during the data capture period there was one occurrence in May and two occurrences in August where the PM2.5 and PM10 were above the 25 ug/m3 and 50 ug/m3 level based on WHO guidelines.
2017 1st International Conference on Next Generation Computing Applications (NextComp), 2017
Patient monitoring has advanced over the years, from bed side monitors in the hospital, to wearab... more Patient monitoring has advanced over the years, from bed side monitors in the hospital, to wearable devices that can monitor patients and communicate their data remotely to medical servers over wireless networks. It is a process that involves monitoring major vital signs of a patient, to check if their health is normal or deteriorating within a period of time. In a remote situation, vital signs information, can help health care providers to easily send help to patients when their health is at immediate risk. The problem with this kind of remote monitoring system is that most times the patients must be within a specified location to either monitor their health or receive emergency help. This paper presents a potential solution in the form of a global vital sign monitoring system and consists of two components to demonstrate the functionality; a wearable wireless monitoring device that records the temperature and pulse rate of the patient wearing it and a web application, which allows the patient and the emergency response unit to interact together over cellular network.
Buildings are responsible for a significant portion of energy consumption worldwide. Intelligent ... more Buildings are responsible for a significant portion of energy consumption worldwide. Intelligent buildings have been devised as a potential solution, where energy consumption and building use are harmonised. At the heart of the intelligent building is the building energy management system (BEMS), the central platform which manages and coordinates all the building monitoring and control subsystems, such as heating and lighting loads. There is often a disconnect between the BEMS and the building it is installed in, leading to inefficient operation, due to incongruous commissioning of sensors and control systems. In these cases, the BEMS has a lack of knowledge of the building form and function, requiring further complex optimisation, to facilitate efficient all year round operation. Flawed BEMS configurations can then lead to ‘sick buildings’. Recently, building energy performance simulation (BEPS) has been viewed as a conceptual solution to assist in efficient building control. Build...
The Internet of Things (IoT) and the number of sensors integrated within safety critical environm... more The Internet of Things (IoT) and the number of sensors integrated within safety critical environments is increasing exponentially. System designers employ off-the-shelf hardware to reduce development time and cost, however, the early adoption of consumer hardware and software raises numerous security questions. Several successful attacks and threats to critical infrastructures have been reported. This paper reviews safety-critical applications in aviation, connected cars and power plants. An engineering development roadmap is proposed with cyber-security in mind from “cradle-to-grave” rather than an afterthought. The development roadmap introduces a cybersecurity review at each design step to strengthen the robustness of IoT hardware and software. However, considering these systems have an extremely long lifetime (>20 years), secure maintenance and integrity of ageing infrastructure is usually a secondary consideration. The paper proposes the use of a cyclic cyberphysical securit...
With the world moving towards being increasingly dependent on computers and automation, one of th... more With the world moving towards being increasingly dependent on computers and automation, one of the main challenges in the current decade has been to build secure applications, systems and networks. Alongside these challenges, the number of threats is rising exponentially due to the attack surface increasing through numerous interfaces offered for each service. To alleviate the impact of these threats, researchers have proposed numerous solutions; however, current tools often fail to adapt to ever-changing architectures, associated threats and 0-days. This manuscript aims to provide researchers with a taxonomy and survey of current dataset composition and current Intrusion Detection Systems (IDS) capabilities and assets. These taxonomies and surveys aim to improve both the efficiency of IDS and the creation of datasets to build the next generation IDS as well as to reflect networks threats more accurately in future datasets. To this end, this manuscript also provides a taxonomy and s...
Graphics Processing Units allow for running massively parallel applications offloading the CPU fr... more Graphics Processing Units allow for running massively parallel applications offloading the CPU from computationally intensive resources, however GPUs have a limited amount of memory. In this paper a trie compression algorithm for massively parallel pattern matching is presented demonstrating 85% less space requirements than the original highly efficient parallel failure-less aho-corasick, whilst demonstrating over 22 Gbps throughput. The algorithm presented takes advantage of compressed row storage matrices as well as shared and texture memory on the GPU.
2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC), 2018
The aim of this research is to develop an innovative low cost and affordable platform for smart h... more The aim of this research is to develop an innovative low cost and affordable platform for smart home control and energy monitoring interfaced with augmented reality. This method will educate people about energy use at a time when fuel costs are rising and create novel methods of interaction for those with disabilities. In order to increase the awareness of energy consumption, we have developed an interactive system using Augmented Reality to show live energy usage of electrical components. This system allows the user to view his real time energy consumption and at the same time offers the possibility to interact with the device in Augmented Reality. The energy usage was captured and stored in a database which can be accessed for energy monitoring. We believe that the combinations of both, complex smart home applications and transparent interactive user interface will increase the awareness of energy consumption.
2019 Conference on Next Generation Computing Applications (NextComp), 2019
The Internet of Things (IoT) aims at transforming everyday objects into smart or virtual objects,... more The Internet of Things (IoT) aims at transforming everyday objects into smart or virtual objects, giving us control of objects and additionally keeping us informed of the condition of these objects. This idea is gaining traction, thanks to the large number of gadgets connected to the web, ranging from cell phones to appliances. However, the development of the IoT gives rise to various security-related, privacy and ethical issues due to the complexity of the systems being implemented and the heterogeneity of these networks. It is furthermore imperative to stress that the greater part of connected objects are often left unattended or are not properly secured. In light of these issues, this study addresses the Internet of Things concepts through deliberate audit of academic research papers, corporate white papers and online databases. The primary goal of this study is to addresses challenges regarding privacy and security of Internet of Things, within some of its key application areas, namely Smart Homes, Smart Cities, Wearables, Smart Retail, Connected Cars, and Health-Care. Moreover, this paper provides a threat model for all aforementioned areas and provide extensive countermeasures for each of them, highlighting the benefits of security and privacy by design.
2019 Conference on Next Generation Computing Applications (NextComp)
Building services have come to a stage where they are closely being integrated with ICT infrastru... more Building services have come to a stage where they are closely being integrated with ICT infrastructure. The aim of this research is to develop an innovative and affordable platform for business services interfaced with augmented reality. This paper provides an innovative way of interaction between building services lighting systems through augmented reality. The system allows users to show their availability status in real time using an intelligent lighting system projected into Augmented Reality (AR) which changes color according to their availability. Furthermore, the different status and availability status can also be manipulated through an interactive interface, creating a smart space.
Allen's interval algebra is a calculus for temporal reasoning that was introduced in 1983. Re... more Allen's interval algebra is a calculus for temporal reasoning that was introduced in 1983. Reasoning with qualitative time in Allen's full interval algebra is nondeterministic polynomial time (NP) complete. Research since 1995 identified maximal tractable subclasses of this algebra via exhaustive computer search and also other ad-hoc methods. In 2003, the full classification of complexity for satisfiability problems over constraints in Allen's interval algebra was established algebraically. Recent research proposed scheduling based on the Fishburn-Shepp correlation inequality for posets. This article first reviews Allen's calculus and surrounding computational issues in temporal reasoning. We then go on to describe three potential temporal-related application areas as candidates for scheduling using the Fishburn-Shepp inequality. We also illustrate through concrete examples, and conclude the importance of Fishburn-Shepp inequality for the suggested application areas ...
2017 International Conference on Cyber Security And Protection Of Digital Services (Cyber Security), 2017
eHealth mobile technologies are becoming increasingly prevalent in both the personal and medical ... more eHealth mobile technologies are becoming increasingly prevalent in both the personal and medical world, assisting healthcare professionals to monitor the progress and current condition of patients. These devices often gather, transmit and analyse personal data. Healthcare data has rigid requirements for security, confidentiality, and availability, whilst access traceability and control, and long-term preservation are also highly desirable, particularly when exposed to cloud computing environments. This article explores some of the security and privacy challenges eHealth devices currently face. Legislative implications of data breaches are considered, as well as service provider accountability. The work also provides numerous security and privacy recommendations, in order to improve future implementations.
2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC), 2018
The aim of this project is to develop a low cost air quality monitoring system. The proposed syst... more The aim of this project is to develop a low cost air quality monitoring system. The proposed system used the Raspberry Pi board, Arduino board, Grove sensors and Microsoft’s Azure based cloud service for data storage and analysis. The data was captured from the 10th of May to the 31st of August 2017 in Bonne Terre, Vacoas. It was found that during the data capture period there was one occurrence in May and two occurrences in August where the PM2.5 and PM10 were above the 25 ug/m3 and 50 ug/m3 level based on WHO guidelines.
2017 1st International Conference on Next Generation Computing Applications (NextComp), 2017
Patient monitoring has advanced over the years, from bed side monitors in the hospital, to wearab... more Patient monitoring has advanced over the years, from bed side monitors in the hospital, to wearable devices that can monitor patients and communicate their data remotely to medical servers over wireless networks. It is a process that involves monitoring major vital signs of a patient, to check if their health is normal or deteriorating within a period of time. In a remote situation, vital signs information, can help health care providers to easily send help to patients when their health is at immediate risk. The problem with this kind of remote monitoring system is that most times the patients must be within a specified location to either monitor their health or receive emergency help. This paper presents a potential solution in the form of a global vital sign monitoring system and consists of two components to demonstrate the functionality; a wearable wireless monitoring device that records the temperature and pulse rate of the patient wearing it and a web application, which allows the patient and the emergency response unit to interact together over cellular network.
Buildings are responsible for a significant portion of energy consumption worldwide. Intelligent ... more Buildings are responsible for a significant portion of energy consumption worldwide. Intelligent buildings have been devised as a potential solution, where energy consumption and building use are harmonised. At the heart of the intelligent building is the building energy management system (BEMS), the central platform which manages and coordinates all the building monitoring and control subsystems, such as heating and lighting loads. There is often a disconnect between the BEMS and the building it is installed in, leading to inefficient operation, due to incongruous commissioning of sensors and control systems. In these cases, the BEMS has a lack of knowledge of the building form and function, requiring further complex optimisation, to facilitate efficient all year round operation. Flawed BEMS configurations can then lead to ‘sick buildings’. Recently, building energy performance simulation (BEPS) has been viewed as a conceptual solution to assist in efficient building control. Build...
The Internet of Things (IoT) and the number of sensors integrated within safety critical environm... more The Internet of Things (IoT) and the number of sensors integrated within safety critical environments is increasing exponentially. System designers employ off-the-shelf hardware to reduce development time and cost, however, the early adoption of consumer hardware and software raises numerous security questions. Several successful attacks and threats to critical infrastructures have been reported. This paper reviews safety-critical applications in aviation, connected cars and power plants. An engineering development roadmap is proposed with cyber-security in mind from “cradle-to-grave” rather than an afterthought. The development roadmap introduces a cybersecurity review at each design step to strengthen the robustness of IoT hardware and software. However, considering these systems have an extremely long lifetime (>20 years), secure maintenance and integrity of ageing infrastructure is usually a secondary consideration. The paper proposes the use of a cyclic cyberphysical securit...
With the world moving towards being increasingly dependent on computers and automation, one of th... more With the world moving towards being increasingly dependent on computers and automation, one of the main challenges in the current decade has been to build secure applications, systems and networks. Alongside these challenges, the number of threats is rising exponentially due to the attack surface increasing through numerous interfaces offered for each service. To alleviate the impact of these threats, researchers have proposed numerous solutions; however, current tools often fail to adapt to ever-changing architectures, associated threats and 0-days. This manuscript aims to provide researchers with a taxonomy and survey of current dataset composition and current Intrusion Detection Systems (IDS) capabilities and assets. These taxonomies and surveys aim to improve both the efficiency of IDS and the creation of datasets to build the next generation IDS as well as to reflect networks threats more accurately in future datasets. To this end, this manuscript also provides a taxonomy and s...
Graphics Processing Units allow for running massively parallel applications offloading the CPU fr... more Graphics Processing Units allow for running massively parallel applications offloading the CPU from computationally intensive resources, however GPUs have a limited amount of memory. In this paper a trie compression algorithm for massively parallel pattern matching is presented demonstrating 85% less space requirements than the original highly efficient parallel failure-less aho-corasick, whilst demonstrating over 22 Gbps throughput. The algorithm presented takes advantage of compressed row storage matrices as well as shared and texture memory on the GPU.
2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC), 2018
The aim of this research is to develop an innovative low cost and affordable platform for smart h... more The aim of this research is to develop an innovative low cost and affordable platform for smart home control and energy monitoring interfaced with augmented reality. This method will educate people about energy use at a time when fuel costs are rising and create novel methods of interaction for those with disabilities. In order to increase the awareness of energy consumption, we have developed an interactive system using Augmented Reality to show live energy usage of electrical components. This system allows the user to view his real time energy consumption and at the same time offers the possibility to interact with the device in Augmented Reality. The energy usage was captured and stored in a database which can be accessed for energy monitoring. We believe that the combinations of both, complex smart home applications and transparent interactive user interface will increase the awareness of energy consumption.
2019 Conference on Next Generation Computing Applications (NextComp), 2019
The Internet of Things (IoT) aims at transforming everyday objects into smart or virtual objects,... more The Internet of Things (IoT) aims at transforming everyday objects into smart or virtual objects, giving us control of objects and additionally keeping us informed of the condition of these objects. This idea is gaining traction, thanks to the large number of gadgets connected to the web, ranging from cell phones to appliances. However, the development of the IoT gives rise to various security-related, privacy and ethical issues due to the complexity of the systems being implemented and the heterogeneity of these networks. It is furthermore imperative to stress that the greater part of connected objects are often left unattended or are not properly secured. In light of these issues, this study addresses the Internet of Things concepts through deliberate audit of academic research papers, corporate white papers and online databases. The primary goal of this study is to addresses challenges regarding privacy and security of Internet of Things, within some of its key application areas, namely Smart Homes, Smart Cities, Wearables, Smart Retail, Connected Cars, and Health-Care. Moreover, this paper provides a threat model for all aforementioned areas and provide extensive countermeasures for each of them, highlighting the benefits of security and privacy by design.
Uploads
Papers by Amar Seeam