UTS site search

Dr Zenon Chaczko

Biography

Dr Zenon Chaczko is currently the Senior Lecturer of Software Engineering at UTS, and an active member of CRIN. After 25 years of R/D experience in ICT and marine systems industry as well as concurrent 4 years of P/T lecturing at the University of Technology Sydney, he moved to full time academic position at UTS in 2002. Since then he has been Program Head of Information and Communications Technologies. He is an experienced lecturer and researcher, consistently receiving excellent teaching results and reviews from students. He is an expert software and system engineer, researcher and supervisor, having supervised/co-supervised many candidates to completion in the last 8 years. He has completed his PhD in Engineering at UTS. His specialisation is anticipatory (AI) and biomimetic middleware systems for Wireless Sensor Networks. He is an author and co-author of several innovative AI theories and computational models. His recent work in complex system simulation as well as sensor localisation, clustering, detection, data aggregation and tracking algorithms gained a very high recognition in the research community.

Professional

Zenon Chaczko's research into software systems is concerned with fundamental issues in modern engineering: the systems architectures and computing models, including large-scale distributed systems, real-time systems, and software agents. The interdisciplinary research share a strong focus on software infrastructure solutions as a vehicle for effective technology transfer. This focus underscores a pragmatic approach, aiming to be an effective tool for building interoperability. The main goal of research work is to provide effective architectural models for the construction of software infrastructure based on collaborating autonomous and relatively simple agents; designed for collecting, processing information and capable to undertake low-level communication and maintenance tasks. The research is to provide useful models for building intelligent agent-based architectures, and synthesise behavioural patterns that could be adapted for construction of complex systems such as wireless sensor/actuator networks.

Image of Zenon Chaczko
Senior Lecturer, School of Computing and Communications
Member, A/DRsch Ctre for Real-Time Information Networks
Core Member, Centre for Real-Time Information Networks
DipElect (WUT), BSc (UTS), GradDipEng (UTS), MA Sc (WUT), PhD (UTS)
 
Phone
+61 2 9514 2528
Room
CB11.08.203

Research Interests

Biomimetics, software architecture and middleware, WSN and SANET technology, AI and robotics, complex and analysable software systems, distributed real-time systems, simulation systems.

Can supervise: Yes
Registered at Level 1

As a lecturer and the ICT/Postgraduate SE programs coordinator Dr Zenon Chaczko has been a contributor to both undergraduate and postgraduate SE/CSE programs. He helped to develop many new subjects and programs which enhance UTS teaching capacities. In recent years Dr Chaczko was actively engaged in designing, coordinating and teaching such subjects as:

  • Lecturing ICT Analysis (formerly Computer/Software Systems Analysis)this involved course coordination, lecturing, tutoring, marking and course updating.
  • Lecturing ICT Design (formerly Computer/Software Systems Design) this involves course development, coordination, lecturing, tutoring, marking and course update as well as a concurrent design and development of ICT-D Lab infrastructure.
  • Lecturing and designing/developing the undergraduate/postgraduate Wireless Sensor Networks subjects
  • Lecturing Software Architecture and Middleware (formerly Software Systems Middleware) as well as the Enterprise Software Architecture subjects. This involves course design, coordination, lecturing, tutoring, marking and course update.
  • Lecturing and designing/developing the postgraduate Software Analysis and Design subject.
  • Supervision of final year Capstone Projects for undergraduate students, postgraduate Master projects as well as graduate research candidatures at the Master and PhD levels.
  • Coordination of the ICT Programs within the School of Computing and Communication.

In the past Dr Chaczko was also involved in:
  • Lecturing and Coordinating Software Engineering Principles1/Software Engineering Principles2; Teaching these subjects involved course re-design coordination and tutoring.
  • Lecturing Object Oriented Technologies (OOT); Teaching this subject involved course development, coordination, lecturing, tutoring, marking.
  • Lecturing Real-Time Object Oriented System Development within SE postgraduate program; Teaching this subject involved course development, coordination, lecturing, tutoring and marking.

Other past teaching activities involved:
Lecturing such subjects as Embedded Systems, Software Project Development, C Programming and HMI.

Chapters

Chiu, C.C. & Chaczko, Z.C. 2014, 'An Anticipatory Sanet Environment for Training and Simulation of Laparoscopic Surgical Procedures' in Advanced Methods and Applications in Computational Intelligence: Topics in Intelligent Engineering and Informatics,, Springer Media, Berlin, Germany, pp. 361-379.
View/Download from: Publisher's site
Laparoscopic Surgical Simulation tools are an essential training resource for surgeons specializing in laparoscopic surgical procedures. This chapter presents a Sensor-Actor Network (Sanet) training environment to simulate laparoscopic medical procedures, with the intention of using anticipatory models for target tracking and navigation. This case study implements the Belief-Desire-Intention (Bdi) agent-based software reasoning approach, with neural network processes to demonstrate path trajectory planning effectively aids in the handling of laparoscopic equipment in different predefined scenarios. The immersion of the trainer in the simulation environment provides a qualitative and quantitative method of measuring the trainee's efficiency for post-analysis and feedback in laparoscopic procedures.
Chiu, C.C. & Chaczko, Z.C. 2014, 'A Biomimetic Sanet Middleware Infrastructure for Guiding and Maneuvering Autonomous Land-Yacht Vessels' in Klempous, R., Nikodem, J., Jacak, W. & Chaczko, Z. (eds), Advanced Methods and Applications in Computational Intelligence: Topics in Intelligent Engineering and Informatics,, Springer Media, Berlin, Germany, pp. 261-279.
View/Download from: Publisher's site
This chapter describes the incorporation of object tracking heuristics with a dynamic sailing model for surface sailing vessels, using the maneuvering approach by Jouffroy (2009). A simplified dynamic model is simulated, with a path generation scheme and controller for a fundamental maneuver in sailing known as tacking. In addition, this maneuver is incorporated with obstacle algorithms for detection and avoidance. The incorporation of Sensor-Actor Networks (Sanets) in the sailing vessel makes it possible to incorporate sensors in the structure to monitor localized obstacles in an energy-efficient manner, while statistical data is relayed to a centralized base station for post-processing and analysis of global environmental conditions.
Chiu, C.C. & Chaczko, Z.C. 2014, 'A Biomimetic SANET Middleware Infrastructure for Guiding and Maneuvering Autonomous Land-Yacht Vessels' in Klempous, R., Nikodem, J., Jacak, W. & Chaczko, Z. (eds), Advanced Methods and Applications in Computational Intelligence, Springer, Germany, pp. 265-283.
View/Download from: Publisher's site
This chapter elaborates an approach of guiding land-yachts according to a predefined maneuvering strategy. The simulation of the path as well as the controller scheme is simulated for a sailing strategy (tacking), where the scheme of the resultant path and the sailing mechanism is driven using Sensor-Actor Network (Sanet) middleware infrastructure. The addition of obstacle avoidance and detection heuristics aids in the guiding process. By incorporating Sanets in the sailing craft, a range of sensory mechanisms can be employed to monitor and handle local obstacles in an effective manner, while data collated from the sensory environment can be transmitted to a base station node for monitoring conditions from a holistic dimension.
Zielinski, R.J., Kowal, M. & Chaczko, Z.C. 2014, 'The Study of the OFDM and MIMO-OFDM Networks Compatibility - Measurements and Simulations' in Klempous, R., Nikodem, J., Jacak, W. & Chaczko, Z. (eds), Advanced Methods and Applications in Computational Intelligence, Springer, Germany, pp. 335-347.
View/Download from: Publisher's site
The article presents the results of measurements and simulations of intrasystem compatibility of the wireless networks operated in accordance with technical documentation IEEE 802.11g and IEEE 802.11n. Simulations were carried out using an advanced model of the MIMO-OFDM system. The simulations have been preceded by measurements in the anechoic chamber. The results of these measurements were used to define the input parameters of the simulator. The results of analyzes confirmed the usefulness of presented MIMO-OFDM system simulator to performance prediction of the wireless networks in the absence and presence of interference from other networks.
Szymanski, J., Chaczko, Z.C. & Rodanski, B. 2014, 'Towards Ubiquitous and Pervasive Healthcare' in Klempous, R., Nikodem, J., Jacak, W. & Chaczko, Z. (eds), Advanced Methods and Applications in Computational Intelligence, Springer, Germany, pp. 387-404.
View/Download from: Publisher's site
In recent years, Wireless Sensor Networks (WSNs) have attracted a considerable attention from both academia and industry. There is a number of possible applications and great expectations, but at the same time there are some serious issues and challenges related to Wireless Sensor Networks. One of the areas of WSN applications is healthcare and there are a number of health related issues that WSN aims to address. Amongst the main such issues are: the aging population that causes a growing pressure on economy and the healthcare system supported by a declining number of working-age people as well as an increase in chronic diseases, which includes obesity frequently attributed to a lack of fitness and weight management due to busy lifestyles. Staying physically and mentally healthy is of the greatest importance to every individual and to the society. There is a growing interest in a new approaches to the support of the overstressed healthcare system. The fundamental concept is to shift some of the responsibilities from the clinicians, health centres and hospitals of the traditional system to the patients and their home environment. People themselves are able and should play a greater role in monitoring and maintaining their own health, provided that they are supported by an adequate technology and have a proper knowledge of how to use it. There are already a number of applications of computing and communication technologies related to healthcare including (but not limited to) the pervasive health monitoring, mobile telemedicine applications, the intelligent emergency management services, health aware mobile devices, the medical inventory management, the pervasive access to health information and the lifestyle management . In this chapter, we discuss a several of new generation of services and applications in the area of pervasive and ubiquitous healthcare that are enabled by sensor networks. We shall provide an overview of the new trends and introduce innovative ideas around the self-adapting ambient intelligence combined with specialised system requirements.
Chiu, C.C. & Chaczko, Z.C. 2014, 'An Anticipatory Sanet Environment for Training and Simulation of Laparoscopic Surgical Procedures' in Klempous, R., Nikodem, J., Jacak, W. & Chaczko, Z. (eds), Advanced Methods and Applications in Computational Intelligence, Springer, Germany, pp. 367-385.
View/Download from: Publisher's site
Surgical simulation environments are required to train laparoscopic surgeons to become familiar with the technology, before they operate on patients. The chapter examines how a Sensor-Actor Network (Sanet) incorporated into the laparoscopic training facility can be augmented with the Belief-Desire-Intention (Bdi) agents for autonomous operation of the sensor facility along with the training environment. In addition to neural network processes, path trajectory estimation can be superimposed as a visual aid in a variety of training scenarios. The algorithms used in this experiment provides a balanced approach to monitor the training surgeons level of progress and feedback as they perform the simulated training procedures.
Nikodem, J., Klempous, R., Nikodem, M. & Chaczko, Z.C. 2014, 'Improvement of Spatial Routing in WSN Based on LQI or RSSI Indicator' in Klempous, R., Nikodem, J., Jacak, W. & Chaczko, Z. (eds), Advanced Methods and Applications in Computational Intelligence, Springer, Germany, pp. 285-297.
View/Download from: Publisher's site
The chapter presents theoretical work and simulation results of spatial routing in wireless sensor network (WSN). We propose a new framework of the routing in WSN that is based on the set theory and on three elementary relations: subordination (?), tolerance (?) and collision (?) necessary to describe behaviour of nodes in distributed system. The essence of using relations is decentralization of decision making process. Relations introduce the ability to delegate decision making process to nodes, which base their actions on situation in the vicinity, information that is available to them and capabilities they have. Since relations, support local elements to make decisions, they are a better instrument compared to functions which does not facilitate such choices. Spatial routing algorithm, during network organization, builds a framework - space for globally oriented communication towards base station. Within this framework, during the network lifetime, each node, decides if the routing path should be changed in case of local interferences, neighbor nodes failure or changes in environmental conditions. Therefore, the proposed approach combines existing features of the spatial routing and LQI or RSSI indicators to aide in route selection within a neighborhood.
Chaczko, Z.C. 2012, 'WSN Clustering Using IC-SVD Algorithms' in Moreno D az, R., Pichler, F. & Quesada Arencibia, A. (eds), Computer Aided Systems Theory, Eurocast 2011, Springer-Verlag Berlin Heidelberg 2012, Las Palmas de Gran Canaria, Spain, pp. 137-145.
View/Download from: Publisher's site
This chapter presents a new biomimetic approach for sensor placement, clustering and data routing in Wireless Sensor Networks that can be deployed and managed in ubiquitous applications such as: security, business, automation, home and healthcare, precision agriculture, ecosystem monitoring and many more. Since hierarchical clustering can reduce the resource usage in sensor networks, we investigate ImmunoComputing and SVD-based algorithms for sensor clustering, routing and management of sensornet resources. The simulation results show that the proposed approach can improve robustness and extend the life-span of network infrastructures.
Chaczko, Z.C. & Resconi, G. 2012, 'Application of Morphotronic Theory to Parallel Robots' in Moreno D az, R., Pichler, F. & Quesada Arencibia, A. (eds), Computer Aided Systems Theory, Eurocast 2011, Springer-Verlag, Las Palmas de Gran Canaria, Spain, pp. 153-160.
View/Download from: Publisher's site
The main aim of this paper is to demonstrate the connection between parallel robotics and electronic circuits using the Morphotronic geometry. Parallel robotic system can be represented by a non Euclidean geometry which metric is the kinetic energy and the metric tensor is the mass metrics in the configuration space of the join angles. We can also remark that for electrical circuit we can have a similar non Euclidean geometry in the space of the currents or voltages. In this way we establish a morphological connection between the mechanical and electrical devises that we denote as Morphotronic. We present examples for the geometry in the kinetic space and example in the natural biological membrane represented by electrical circuits.
Resconi, G. & Chaczko, Z.C. 2012, 'Mechatronics and the Bond Graph Theory Extended by the Morphotronic Systems' in Moreno Diaz, R., Pichler, F. & Quesada Arencibia, A. (eds), Computer Aided Systems Theory, Eurocast 2011, Springer-Verlag Berlin Heidelberg 2012, Las Palmas de Gran Canaria, Spain, pp. 160-169.
View/Download from: Publisher's site
Mechatronics plays an important role in surgical, automotive, food and industrial applications. To become smarter and more robust, mechatronic systems have to rely on numerous objects and controls that operate in a diverse range of conditions. These controls can exhibit undesirable and coupled behavior. Adjusting the controllers in hardware is difficult and time consuming, often resulting in de-tuning the system below acceptable performance levels. The Morphotronics theory aided by a new approach to the Bond Graph theory represents an improvement to traditional computation models used for the analysis of mechatronic systems. Morphotronics use non-Euclidean geometry for context shaping and defining the projection operators in an ideal network of mechatronic forms.
Kale, A.V., Chaczko, Z.C. & Rudas, I. 2012, 'Parallel Robot Vision Using Genetic Algorithm and Object Centroid' in Moreno Diaz, R., Pichler, F. & Quesada Arencibia, A. (eds), Computer Aided Systems Theory, Eurocast 2011, Springer-Verlag Berlin Heidelberg 2012, Las Palmas de Gran Canaria, Spain, pp. 170-178.
View/Download from: Publisher's site
Parallel Robots are playing a very important role in the medical, automotive, food and many manufacturing applications. Due to its high speed and efficient operation, it is gaining an increasing popularity in these application domains. For making the parallel robots more automated and an intelligent a machine vision system with robust performance is needed. Here, a Machine Vision Algorithm based on Genetic Evolutionary principles for object detection in the Delta Parallel Robot based systems is proposed. The solution applies a simple, robust and high speed algorithm to accurately detect objects for the application domain. The Image Acquisition of a robots workspace is performed by using a camera mounted on the end-effector of the robot. The system is trained with the object database and with the most significant visual features of every class of objects. Images are assessed periodically for detecting the Region of Interest (ROI) within an image of the robots workspace. The ROI is defined as an area in which a presence of object features is detected. The ROI detection is achieved by applying a random sampling of pixels and an assessment of color threshold of every pixel. The color intensity is assumed as one of the features for classification that is based on the training data. After classification process, the Genetic Algorithm is applied to locate the centroid of an object in every class. In a given application class, the Centroid is considered as the most important feature. Knowledge of an approximate location of the Centroid of objects helps to maintain a high speed and reliable pick and place operations of the Delta robot system. The proposed algorithm is tested by detecting presence of electronic components in the workspace. Experimental results show that the suggested approach offers a reliable solution for the Delta robot system.
Nikodem, J., Chaczko, Z.C., Nikodem, M., Klempous, R. & Wickramasooriya, R. 2012, 'Combating Security Threats via Immunity and Adapatbility in Cognitive Radio Networks' in Fodro, J., Klempous, R. & Araujo, C.P.S. (eds), Recent Advances in Intelligent Engineering Systems, Springer-Verlag, Berlin Heidelberg, pp. 221-242.
View/Download from: Publisher's site
In this chapter we shall consider security, immunity and adaptability aspects of Cognitive Radio (CR) networks and its applications. We shall cover design of a immunity/adaptability and security simulation model for cognitive radio and discuss results of conducted experiments using Matlab simulation tools and Crossbow's XMesh using MoteWorks software platform. The aim of this chapter is to provide an overview of various applications of CR as well as methods of combating security threats faced when applying the CR technology. The immunity/ adaptability functions, their benefits and applications in CR are analysed, along with the challenges faced. We shall discuss in detail how our immunity and adaptability model can mitigate security threats faced by CR and carry out selected research on techniques that can help to mitigate malicious attacks and provide examples of simulation experiments.
Chaczko, Z.C., Chiu, C.C. & Lucas, J. 2010, 'Collaborative Team Project Management' in Chaczko, Z., Klempous, R. & Nikodem, J. (eds), STEALING TIME EXPLORATION IN 24/7 SOFTWARE ENGINEERING DEVELOPMENT, River Publishers, Denmark, pp. 11-33.
The first part discusses managing software activities by using event-flows in a collaborative environment. Over the years the information and communication technology has become alienated from the physical environment. Centralistic models of computer systems architecture followed traditional social models of central software project management and decision making. A centralistic approach to management and application of software resources is still the predominant model in educational environments. In most computer systems today, large amounts of data are transferred from users or environment to a central processing place where information is created, stored and where decisions are made. This model carries not only much inefficiencies and contributes to serious problems in ever interdependent, interoperating systems and applications. By exploring the impact and implications of use of Eventflow mechanisms in 24/7 Virtual Student Exchange (VSX) virtual environments, we realize how Eventflow facilities can assist communication and collaboration between culturally and time-zone diverse software development groups. The second part investigates the application and effectiveness of deploying remote Virtual Machine Labs (VM Labs) for undergraduate students in large teamoriented coursework. While the use of virtual machines is not new for commercial enterprise developments, there is an awareness of the pedagogical benefits of using VM technologies for student activities in software project development.
Nikodem, J., Nikodem, M., Woda, M., Klempous, R. & Chaczko, Z.C. 2010, 'Relation-based Message Routing in Wireless Sensor Networks' in Chinh, M.H.D. & Editor-in-Chief, D.Y.K.T. (eds), Smart Wireless Sensor Networks, InTech, Rijeka, Croatia, pp. 127-146.
Chapter 7 introduces a relational model that represents the dependences between nodes of the network and defines the actions of these nodes in different situations. Based on this model, communication activities of the network are managed in order to route the message from nodes to the base station efficiently.
Chaczko, Z.C. & Rasconi, G. 2009, 'Morphotronic System (Applications)' in Moreno-Diaz, R., Pichler, F. & Quesada-Arencibia Alexis, A. (eds), Computer Aided Systems Theory, Eurocast 2009, Springer, Las Palmas, Spain, pp. 905-913.
View/Download from: Publisher's site
This paper discusses a newly proposed Morphotronic System paradigm that can be used as a general computation model for construction of software. The Morphotronic System allows for a definition of very flexible software prototypes, in which a processing path can be interpreted as an extremum principle. This approach offers a significant improvement to traditional software practices. The system purpose is stated as a conceptual input to the computer system at a starting point of the computation process while the local machine state is completely ignored. The system context and its rules are generated as resources to allocate the computational components. The morphotronic system applies non-Euclidean geometry which allows to shape the context and to define the projection operators for an ideal network of forms.
Sinha, S., Chaczko, Z.C. & Klempous, R. 2009, 'SNIPER: A Wireless Sensor Network Simulator' in Moreno-Diaz, R., Pichler, F. & Quesada-Arencibia, A. (eds), Computer Aided Systems Theory, Eurocast 2009, Springer, Las Palmas, Spain, pp. 913-920.
View/Download from: Publisher's site
Wireless Sensor Networks (WSN) is fast becoming the holy grail of digital surveillance, data monitoring and analysis. Being relatively cheap, low-powered and easy to deploy WSNs is being adopted in a range of different fields. Currently, the focus is towards optimizing techniques used to form sensor clusters and to route data within a network. In order to satisfy these goals a significant amount of research is being done globally and what tends to be lacking at times is the right tools to make such research work less time consuming and inexpensive. The use of simulation tools is one such adaptation that can help researchers closely analyse a particular aspect of WSN while sticking with a known environment that is applicable to other scenarios in a similar way. This paper presents the performance and features of WSNSim, a WSN Simulator and the immediate advantages that can be experienced by researchers working on various realms in this area.
Resconi, G. & Chaczko, Z.C. 2009, 'Morphotronic System Theory' in NA (ed), Computer Aided Systems Theory, Eurocast 2009, Springer, Las Palmas Spain, pp. 9-16.
View/Download from: Publisher's site
The Morphotronic approach postulates a significant improvement to traditional system design thinking based on the Turing Machine model. The paper presents a range of important concepts and definitions supporting this proposition.The Morphotronic system represents an abstract universe of the objects. This universe of objects has two interpretations as in the case of the voltages and currents in the electrical circuit. For the space of the voltages the objects are the voltages at edges of the electrical circuit. For the current space of the currents the objects are the currents in any edge. The dimension of the object space is equal to the number of edges in the electrical circuit. Such a space allows dual interpretation of the current and voltages. Other possible dual variables can be used in the morphotronic system as forces and the fluxes in mechanics or dissipative thermodynamics, in a general way the dual interpretation of the object space will be denoted as causes and effects. The morphogenetic system can be modelled by samples of the causes and effects. The morphotronic system with the samples generates the algorithm to implement the purpose in the system. Providing that the samples of the effect and the purpose denote a virtual cause, the vector E can be computed so that it represents the effective origin of the causes inside the purpose map. With the cause-effect rule the effective causes can be computed obtaining results that are coherent with the samples. Providing that the virtual cause is given by purpose the effective causes can be generated in agreement with the samples. The described algorithm is denoted as the projection operator that transforms a virtual cause (purpose) into an effective cause.
Chaczko, Z.C., Klempous, R. & Nikodem, J. 2009, 'Teaching Practice-based Subjects in 3 Time Zones (3TZ) Virtual Student Exchange (VSX) Environment' in Chaczko, Z., Klempous, R. & Nikodem, J. (eds), STEALING TIME EXPLORATION IN 24/7 SOFTWARE ENGINEERING DEVELOPMENT, River Publishers, Denmark, pp. 1-9.
Effective and successful e-learning occurs within a complex system that encompasses the student experience of learning, teachers strategies, teachers planning and thinking, and the teaching/learning context? [1]. Education and research communities (at least in theory) are perhaps the most open and the least affected by negative aspects of human psychology often exhibited in collaborative environments. The proposed Teaching Practice-based Subjects in 3 Time Zones (3TZ) Virtual Student Exchange (VSX) Environment [2],[4],[6] methodology intends to explore and evaluate a new collaborative framework for the design, development and implementation of e-learning system in higher education. The project is compatible a model of teaching and learning involving a blend of three interrelated features: a practice situated in a global workplace, an integrated exposure to professional practice as well as a research inspired and integrated learning.
Chaczko, Z.C., Moulton, B.D., Quang, J. & Jain, K. 2009, 'Data and Knowledge-Transfer Model for the Development of Software Requirements Analysis CASE Tools designed for Cross-Time-Zone Projects' in Chaczko, Z., Klempous, R. & Nikodem, J. (eds), STEALING TIME EXPLORATION IN 24/7 SOFTWARE ENGINEERING DEVELOPMENT, River Publishers, Denmark, pp. 157-169.
This chapter describes work undertaken to evaluate an approach for developing collaborative requirements-analysis CASE tools that are specifically designed to address the needs of cross-time-zone development teams, that is, teams spread across different geographical locations around the world. Few of the software requirements analysis computer assisted software environment (CASE) tools readily available are designed specifically for cross-time-zone development activities. We propose a specifically tailored data and knowledge-transfer model, and investigate its suitability for the development of a cross-time-zone oriented CASE tool. The approach was used to develop a working prototype. The approach and prototype will be further evaluated in a collaborative undertaking involving the Wrocaw University of Technology, the University of Technology, Sydney and the University of Arizona (UA).
Chiang, F., Chaczko, Z.C., Agbinya, J.I. & Braun, R.M. 2007, 'Ant-Based Topology Convergence Algorithms for Resource Management in VANETs' in az, R.M.D., Pichler, F. & Arencibia, A.Q. (eds), Computer Aided Systems Theory - EUROCAST 2007, Springer, Germany, pp. 992-1000.
View/Download from: Publisher's site
Frequent changes caused by IP-connectivity and user-oriented services in Inter-Vehicular Communication Networks (VCNs) set great challenges to construct reliable, secure and fast converged topology formed by trusted mobile nodes and links. In this paper, based on a new metric for network performance called topology convergence and a new Object-Oriented Management Information Base - active MIB (O:MIB), we propose an ant-based topology convergence algorithm that applies the swarm intelligence metaphor to find the near-optimal converged topology in VCNs which maximizes system performance and guarantee a further sustainable and maintainable system topology to achieve Quality of Service (QoS) and system throughput. This algorithm is essentially a distributed approach in that each node collects information from local neighbor nodes by invoking the methods from each localized O:MIB, through the sending and receiving of ant packets from each active node, to find the appropriate nodes to construct a routing path. Simulation results show this approach can lead to a fast converged topology with regards to multiple optimization objectives, as well as scale to network sizes and service demands.

Conferences

Chaczko, Z.C., Klempous, R. & Nikodem, J. 2014, 'Modeling autonomic monitoring and control for IoT systems', 25th European Modeling and Simulation Symposium, Proceedings of the European Modeling and Simulation Symposium, EMSS 2013, Athens, Greece, pp. 625-631.
European Modelling & Simulation Symposium - EMSS The EMSS represents the 25th edition of the classic autumn M&S event in Europe; the Symposium is a really International meeting involving world experts in the area of M&S with special attention to methodologies, techniques and applications.
Aslanzadeh, S. & Chaczko, Z.C. 2013, 'The impact of cloud computing on businesses', 1st Australian Conference on the Applications of Systems Engineering (ACASE'12), University Of Technology Sydney, Australia, Sydney, pp. 71-71.
Investigating through the business world, organizations are applying new technologies to improve their business to compete with other competitors. Minimizing the costs while gaining the most benefits from the business are the main goals of all the enterprises; however, the budget that should be spent on purchasing and installing the essential software and hardware and maintaining the related infrastructures which are needed to set up their tasks can affect their goals.
Chaczko, Z.C., Kirkpatrick, S. & Braun, R.M. 2013, 'A Web-based Solution to Collect, Manage and Analyse Auditory Brainstem Response Data', 2013 International Conference on Information Technology Based Higher Education and Training, IEEE, New York, pp. 1-4.
View/Download from: Publisher's site
Auditory neuroscience often involves the collection of experiment data from test subjects in the form of non-invasive Auditory Brainstem Responses (ABR). These ABRs are most often used to gauge a subjects hearing threshold. Although rarely; they can be analysed further. Research into ABRs has shown that the presence of brain damage or tumours may be detectable. This can be achieved if large amounts of ABRs are collected and compared. However many laboratories around the world do not keep the data as it is difficult to store and analyse, and sometimes only used for threshold analysis. This results in a huge amount of wasted data and opportunity. The goal of this project was to develop and build a web-based system to collect, manage and analyse ABR data for hearing research. The project was run as an iterative process based on the eXtreme-Programming (XP) methodology. It involved very close contact with the client laboratory. Onsite weekly meetings, demonstrations and experiments were attended to help understand the problem domain. A continuous analysis, design and integration cycle coupled with automated testing and deployment was used throughout the project. Where possible all key aspects of XP development were adhered to and the project managed in this fashion. The final OpenABR system was deployed to a cloud server and is being used by the client laboratory. It has several unique features that no other system of its type possesses. Its dynamic database interface allows scientists the flexibility and reliability they cannot get from standard databases. Future work would focus on expanding the dynamic database interface, integrating more analysis including heuristics and trying to include new data types such as imaging results.
Chaczko, Z.C., Braun, R.M. & Jizan, A. 2013, 'A Virtual Stock Exchange Simulator for Education and Training', 2013 International Conference on Information Technology Based Higher Education and Training (ITHET), IEEE, New York, pp. 1-5.
View/Download from: Publisher's site
The use of an open-source, virtual stock exchange simulators can be seen as a viable alternative for various learners to train trading practice without risking loses of real funds. At present, there is a shortage of suitable tools that could allow entry level users to engage in a real market trading after gaining a certain degree of confidence from practicing in a both very practical and safe environment. Topics covered in this paper, include shared experiences, challenges as well as common issues related to the design and development of a StockET simulation tool for training and education. The developed open source simulation tool is a robust and highly usable solution that can be used for multiple purposes.
Al-okaily, A., Hani, Q.B., Almazaydeh, L., Abuzaghleh, O. & Chaczko, Z.C. 2013, 'Designing and Integrating a New Model of Semi-Online Vehicle's Fines Control System', Innovations and Advances in Computer, Information, Systems Sciences, and Engineering, Vol 152, Lecture Notes in Electrical Engineering, Springer, New York, pp. 1205-1219.
View/Download from: Publisher's site
In this paper we suggest to develop a vehicle's speed and fines control system to manage and control different aspects of fleet and cruise management system. The system developed to be sponsored by the government, which is represented by Department of Motor Vehicle (DMV) and should be operated by them. The purposes of the proposed project include speed, passengers safety and vehicle readiness and related fines associated with driving practice such as wearing seat belt and speed limits. The system can be implemented by developing a software system inside a chip supported by recent related technologies such as GPS, GPRS and cameras, then installing the chip into the vehicle. The final outcome will be levying penalties respective to the drivers mistakes and offences; in addition new era of communication between DMV and driver, vehicle and driver, driver and DMV will be followed.
Chaczko, Z.C., Chiu, C.C., Alqarni, L. & Almarwani, A. 2013, 'Implementing Sensor-Actor Networks with the Elastic Network Model for laparoscopic training', 2013 Seventh International Conference on Sensing Technology, IEEE, Piscataway, USA, pp. 526-531.
View/Download from: Publisher's site
ensor-Actor Networks (Sanets) is adaptable for surgical simulation contexts, to illustrate how the Elastic Network Model can be used for laparoscopic end-effector navigation through vital organs and other obstacles. The active modeling of agents as interactive components of a unified laparoscopic simulator seeks to emulate the medical environment as a virtual representation in the coordinated Sanet infrastructure. The combination of Sanet middleware framework paradigms towards a surgical knowledge-based conception demonstrates how Sanets can help to enhance medical education. The hybrid architecture of the training equipment enables the adaptation of elastic modeling techniques for effective advances in laparoscopic training exercises.
Chaczko, Z.C. & Braun, R.M. 2013, 'Teaching and Learning Perspective on System Development in Large Teams', 2013 International Conference on Information Technology Based Higher Education and Training (ITHET), IEEE, New York, USA, pp. 1-7.
View/Download from: Publisher's site
This paper covers aims and objectives, the approaches, shared experiences and issues faced in teaching and learning of the ICT Analysis and ICT Design pair of subjects within the core block of ICT Engineering courses at the Faculty of Engineering and IT, University of Technology, Sydney (UTS) in Australia. Both practice based subjects, synthesize into a coherent whole, teaching and learning components of all subjects in the ICT Engineering curriculum. One of the main goals of the ICTA and ICTD pair is to close the gap between the students' individualistic tendencies, unplanned and unbudgeted efforts, as well as uncoordinated actions that often characterize teaching and learning approaches to engineering subjects. Additionally, modern industry expects from engineering graduates both leadership skills and team based skills in the development of complex systems. This includes the ability to work in well-planned, process driven, budgeted and coordinated environment. Fundamentally, the course's subjects are adaptive and evolutionary; however, the key challenge is to keep a fine balance between academic concerns and fast changing industry needs.
Chaczko, Z.C., Klempous, R. & Chiu, C.C. 2013, 'Modelling Intrusion Detection in Security Systems', 3rd International Defence and Homeland Security Simulation Workshop, I3M, The 10th International Multidisciplinary Modelling & Simulation Multiconference, Proceedings of the Third International Defense and Homeland Secuirity Simulation, Athens, pp. 41-46.
DHSS 2013 is a workshop focusing on the advances and potential of using M&S within this framework. It will bring experts together for the purpose of presenting and discussing all type of innovation related to the use of Modeling & Simulation in Defense and Homeland Security applications. DHSS will focus on new concepts, methods, techniques and tools for advancing in the modeling & simulation sector.
Almarwani, A., Alqarni, L., Hakami, H., Chaczko, Z. & Xu, M. 2013, 'Door wave home automation system', IET Conference Publications, pp. 108-113.
View/Download from: Publisher's site
The technological developments are focused on automation of control systems. Technology is used in homes to create a digital environment such as controlling room temperature, sundry devices, security and lighting. The design of home automation systems is geared towards the automation of processes like remote control of the home environment appliances. The use of Wireless Sensor and Actuators Networks (WSANs) in home automation is a growing trend. WSANs are based on network architecture and protocols in order to enable a network of integrated devices which monitor and control household apparatus.
Agbinya, J.I., Masihpour, M., Thilak, N., Chaczko, Z.C., Ollett, A. & Ibos, S. 2012, 'Hardware Evaluation of Near Field Magnetic Induction Communication systems', APCast, APCast, Sydney, pp. 87-96.
This paper examines the performance of magnetic induction communication systems for body area networks. First a theoretical study, examination and investigation of the properties and capabilities of near field magnetic induction communications as an emerging form of short range telecommunications access is given. From both a theoretical and hardware tests, results are correlated showing strong agreement between theory and hardware implementation. It is shown that power decay follows an inverse law of distance to power 6 and that certain structures in the communication terrain can affect the magnetic flux created by the transmitter from reaching the receiver thus limiting the range of communications. A body area network of the devices is shown in which a centralised hub aggregates data from the nodes before accessing a wide area network of choice
Chiu, C.C. & Chaczko, Z.C. 2012, 'Collaborative Target Tracking for Laparoscopic Surgery Simulation utilizing Anticipatory Sanets', 1st Australian Conference on the Applications of Systems Engineering ACASE'12, University of Technology, Sydney, Sydney, pp. 1-2.
Laparoscopic Surgical Simulation tools are an essential training resource for surgeons specializing in laparoscopic surgical procedures. This paper presents a Sensor-Actor Network (Sanet) training environment to simulate laparoscopic medical procedures, with the intention of using anticipatory models for target tracking and navigation. This case study implements the Belief-Desire-Intention (BDI) agent-based software reasoning approach, with neural network processes to demonstrate path trajectory planning effectively aids in the handling of laparoscopic equipment in different predefined scenarios. The immersion of the trainer in the simulation environment provides a qualitative and quantitative method of measuring the trainee's efficiency for post-analysis and feedback in laparoscopic procedures.
Chiu, C.C. & Chaczko, Z.C. 2012, 'Steering a Swarm of Autonomous Sailing Vehicles implementing Biomimetic SANET Middleware', 1st Australian Conference on the Applications of Systems Engineering ACASE'12, University of Technology, Sydney, Sydney, pp. 1-2.
This paper describes the incorporation of object tracking heuristics with a dynamic sailing model for surface sailing vessels, using the maneuvering approach by Jouffroy (2009). A simplified dynamic model is simulated, with a path generation scheme and controller for a fundamental maneuver in sailing known as tacking. In addition, this maneuver is incorporated with obstacle algorithms for detection and avoidance. The incorporation of Sensor-Actor Networks (Sanets) in the sailing vessel makes it possible to incorporate sensors in the structure to monitor localized obstacles in an energy efficient manner, while statistical data is relayed to a centralized base station for post-processing and analysis of global environmental conditions.
Chaczko, Z.C. & Szymanski, J. 2012, 'Teaching multidisciplinary engineering using concepts and technology of WSN', Information Technology Based Higher Education and Training (ITHET), 2012 International Conference on, IEEE, Bogazici University, Istanbul, Turkey, pp. 1-7.
View/Download from: Publisher's site
Topic(s) : Communication, Networking & Broadcasting ; Computing & Processing (Hardware/Software) ; General Topics for Engineers (Math, Science & Engineering) Conference Location : Istanbul Print ISBN: 978-1-4673-2332-1 INSPEC Accession Number: 12882984 Digital Object Identifier : 10.1109/ITHET.2012.6246055 Date of Current Version : 23 July 2012 Issue Date : 21-23 June 2012
Kowal, M., Zielinski, R. & Chaczko, Z.C. 2012, 'Intrasystem compatibility of OFDM and MIMO-OFDM networks in measurements and simulations', 1st Australian Conference on the Applications of Systems Engineering (ACASE'12), UTS, Australia, pp. 45-49.
The paper presents an intrasystem IEEE 802.11g and IEEE 802.11n networks compatibility study. First measurements of real system were done in anechoic chamber. In the next step the simulation model of MIMO-OFDM system made in Matlab Simulink was used to perform simulation in accordance to environment of anechoic chamber. Comparison results of measurement and simulation proves that presented simulator is very useful in prediction process of range and throughput of wireless networks.
Kale, A.V. & Chaczko, Z.C. 2012, 'Evolutionary Feature Optimization for Robust Multimodal Object Detection', 1st Australian Conference on the Applications of Systems Engineering (ACASE'12), UTS, Australia, pp. 69-70.
Multimodal Sensor Vision is one of the most prominent techniques for detecting objects in dynamic and uncertain environmental conditions. Recent advancement in sensor technologies has stimulated research in the sensor fusion domain. One of the most commonly applied frameworks for sensor fusion is the Joint Defense Labs (JDL) Model. The model allows managing aspects of uncertainty by applying series of operational levels. This research focuses on the level one (Object Refinement) of the JDL Model. An approach based on Genetic Algorithms is proposed to refine this level. An automated feature subset selection is proposed to the mixed set of features acquired from multiple sensors. Based on the environmental conditions, we try to consider merits of the respective sensor and then optimize the feature subset using genetic operators. It is believed that, Genetic Algorithms with problem specific modifications can make the detection process more reliable and adaptive. In the proposed approach, a Genetic Algorithm is customized by applying the problem specific encoding and by adding a specialized operator. An additional operator allows prioritizing and switching the selection of the feature subset as per varied environmental conditions. Thus, the feature level fusion that uses the most prominent features allows the detection process to be robust and high performing. An experimental platform is developed using C# programming language and Aforge libraries. During the experiments, the proposed approach is assessed by using means of AIC Thermal/Visual type and OTCBVS Benchmark datasets. Further experimental work will be performed to validate robustness and performance properties of the algorithm.
Kale, A.V. & Chaczko, Z.C. 2012, 'Genetically Inspired Modeling of the Multimodal Feature Space', 1st Australian Conference on the Applications of Systems Engineering (ACASE'12), University of Technology Sydney, Sydney, Australia, pp. 26-27.
Detecting objects in dynamic environmental conditions using multimodal approach is an ongoing research topic. The detection process is improved by combining different modalities which can adapt to specific environmental states. Due to huge quantity of information the feature based approach proves very helpful to improve the performance of the system. Feature optimization to improve performance and robustness is important and can be handled by using heuristic approaches like Genetic Algorithms. Here a modeling approach inspired from Genetic Modeling is proposed to represent feature matrix. Evolutionary biological concepts like genotype, phenotype, reaction norms and phenotypic plasticity are applied to model the multimodal feature space. This modeling helps to determine the environmental cues to select a situation specific modality for feature optimization using Genetic Algorithm. An experimental work is conducted to validate the proposed approach
Nikodem, J., Klempous, R., Nikodem, M. & Chaczko, Z.C. 2012, 'Enhanced Performance of Spatial Routing in WSN Based on LQI Metrics', 1st Australian Conference on the Applications of Systems Engineering (ACASE'12), University of Technology Sydney, Sydney, Australia, pp. 108-114.
The wireless sensor network (WSN) is a multi-hop system with a large number of nodes communicating among each other using wireless channels. From one point of view, each sensor works in its vicinity autonomously, interacting with environment stimulus. And from the other point of view, sensors must communicate with each other, therefore communication channels are crucial elements of the WSN architecture.
Szymanski, J., Chaczko, Z.C. & Rodanski, B. 2012, 'Towards Ubiquitous and Pervasive Healthcare', 1st Australian Conference on the Applications of Systems Engineering (ACASE'12), University of Technology Sydney, Sydney, Australia, pp. 383-399.
The world today is facing a number of health related issues. Amongst the main problems are: the aging population causing a growing pressure on economy and the healthcare system supported by a declining number of working-age people; an increase in chronic diseases which also includes obesity frequently attributed to a luck of fitness and weight management due to busy lifestyles. Staying physically and mentally healthy is of prime importance to every individual and to the society. There is a growing interest in a new approached to support an overstressed healthcare system. The fundamental concept is to shift some responsibilities from the clinicians, health centres and hospitals of the traditional system to the patients and their home environment. People themselves are able and should play a greater role in monitoring and maintaining their own health, provided that they are supported by an adequate technology and have a proper knowledge of how to use it. There are already a number of applications of computing and communication technologies related to healthcare including (but not limited to) pervasive health monitoring, mobile telemedicine, intelligent emergency management service, health aware mobile devices, pervasive access to health information, pervasive lifestyle management and medical inventory management. In this paper, we discuss the potential for new generation of services and applications in the area of pervasive and ubiquitous healthcare that are enabled by sensor networks. We shall provide an overview of the new trends and introduce innovative ideas around self-adapting ambient intelligence combined with specialised system requirements for them to be implemented
Jiang, F., Ling, S.S., Chan, K.Y., Chaczko, Z.C., Leung, F.H. & Frater, M. 2012, 'An immunology-inspired host-based multi-engine anomaly detection system with hybrid particle swarm optimisations', IEEE International Conference on Fuzzy Systems, IEEE, US, pp. 1279-1286.
View/Download from: Publisher's site
In this paper, multiple detection engines with multilayered intrusion detection mechanisms are proposed for enhancing computer security. The principle is to coordinate the results from each single-engine intrusion alert system, which seamlessly integrates with a multiple layered distributed service-oriented structure. An improved hidden Markov model (HMM) is created for the detection engine which is capable of the immunologybased self/nonself discrimination. The classications of normal and abnormal behaviours of system calls are further examined by an advanced fuzzy-based inference process tuned by HPSOWM. Considering a real benchmark dataset from the public domain, our experimental results show that the proposed scheme can greatly shorten the training time of HMM and signicantly reduce the false positive rate. The proposed HPSOWM works especially well for the efcient classication of unknown behaviors and malicious attacks.
Nikodem, J., Klempous, R., Nikodem, M. & Chaczko, Z.C. 2012, 'Neighbors cooperation in WSN based on collective decisions', Intelligent Engineering Systems (INES), 2012 IEEE 16th International Conference on, IEEE, Piscataway, NJ, pp. 139-143.
View/Download from: Publisher's site
The paper describes the concept of neighborhood cooperation in context of the Wireless Sensor Network, in which each node can identify and communicate with neighbors around it. The innovative spatial routing scheme shapes an area where the packet retransmission toward the base station can take effect. In this work, the retransmission rules that use notion of actions limited to node's neighborhood are determined. The proposed solution based on collective cooperation within neighborhood to support routing decisions was implemented and tested in Matlab environment. The simulation results show an improvement in the network adaptability to disturbances and as well as to changes of propagation conditions in the environment.
Chiu, C.C., Chaczko, Z.C. & Kong, X. 2012, 'Design of an Intelligent Health System Using Evolutionary Middleware for Sensor Actor Networks', International Conference on Information Science and Applications (ICISA 2012), IEEE Computer Society, Piscataway, USA, pp. 1-6.
View/Download from: Publisher's site
Information infrastructure for healthcare is undergoing a transformational shift in the way it is perceived and used by health professionals. This is driven by the need to unify patient records seamlessly, and integrate emerging technologies in the Sensor-Actor Network (SANET) realm that incorporate patient sensory systems such as wireless sensor networks and body-area networks. By harnessing The Open Group Architecture Framework (TOGAF), it ensures integrity is considered throughout development processes by analyzing the problem space and scenarios, constraints, requirements, risks, enablers and inhibitors of the legacy application architectures. The proposed architecture with TOGAF components incorporating SANETs addresses the need to harmonize legacy operations in a consistent manner with industry best practice to ensure universal patient records are comprehensive and secure, thus protecting against identity theft and adhering to privacy regulation compliance.
Chiu, C.C., Chaczko, Z.C. & Wazirali, R. 2012, 'Sensor-Actor Networks utilising the Spring Tensor Model for Laparoscopic Surgical Training Simulations', 7th International Conference on Broadband and Biomedical Communications, IQProceedings, Australia, pp. 152-157.
The use of Sensor-Actor Networks (SANETs) has been applied to surgical training contexts, to illustrate how the Spring Tensor Model (STEM) can be used for laparoscopic end-effector navigation through obstacles and high-risk areas. The modelling of agents as interactive components of a laparoscopic simulator seeks to emulate the physical environment as a virtualised representation in the integrated SANET infrastructure. Combining SANET middleware framework paradigms to a surgical knowledge-based construct demonstrates how SANETs can enhance medical practice. The architectural hybridisation of the training framework has enabled the adaptation of STEM modelling techniques for a simulated laparoscopic training methodology. The primary benefit of the architecture is that this integration strategy has resulted in a seamless transition of the heuristic framework to be applied to surgical training.
Braun, R.M., Chaczko, Z.C., Neilson, M. & Aslanzadeh, S. 2012, 'A Practical Approach for Redesigning System Engineering Processes', 11th International Conference on Information Technology Based Higher Education and Training, IEEE, New York, pp. 1-8.
View/Download from: Publisher's site
This paper describes the methodology of applying Business Process Reengineering and Total Quality Management principles to a model a telecommunications service and infrastructure provider company. By applying these principles to existing processes this paper aims to provide redefined and reengineered processes for consideration of implementation into the company's business model. The processes that this paper is focusing on are purely engineering based processes and as such, do not represent, change or consider processes outside of the engineering department. The overall aim of this paper is to demonstrate a typical use of methodology and ICT tools that can be used for training students in the improvement of engineering processes and to enable them to design a more streamlined and productive work environment.
Jiang, F., Ling, S.S., Chan, K.Y., Chaczko, Z.C., Leung, F.H. & Frater, M.R. 2012, 'An immunology-inspired host-based multi-engine detection system with sequential pattern recognition', 2012 IEEE International on Fuzzy Systems (FUZZ-IEEE),, IEEE WCCI, Brisbane Convention & Exhibition Centre Brisbane, Australia, pp. 1279-1286.
View/Download from: Publisher's site
In this paper, multiple detection engines with multi-layered intrusion detection mechanisms are proposed for enhancing computer security. The principle is to coordinate the results from each single-engine intrusion alert system, which seamlessly integrates with a multiple layered distributed service-oriented structure. An improved hidden Markov model (HMM) is created for the detection engine which is capable of the immunology-based self/nonself discrimination. The classifications of normal and abnormal behaviours of system calls are further examined by an advanced fuzzy-based inference process tuned by HPSOWM. Considering a real benchmark dataset from the public domain, our experimental results show that the proposed scheme can greatly shorten the training time of HMM and significantly reduce the false positive rate. The proposed HPSOWM works especially well for the efficient classification of unknown behaviors and malicious attacks.
Chiu, C.C. & Chaczko, Z.C. 2011, 'Multi-Dimensional Representations of Laparoscopic Simulations for SANETs', Eurocast 2011, Computer Aided Systems Theory, IUCTC Universidad Las Palmas de Gran Canaria, Las Palmas de Gran Canaria, Spain, pp. 368-369.
View/Download from: Publisher's site
13th International Conference on Computer Aided Systems Theory Las Palmas de Gran Canaria, Spain, February 2011
Szymanski, J., Chaczko, Z.C. & Rodanski, B. 2011, 'Body Area Networks and Smart Spaces in Pervasive Health Monitoring', Eurocast 2011 - Computer Aided Systems Theory, Universidad de Las Palmas de Gran Canaria, Las Palmas de Gran Canaris, Spain, pp. 376-377.
Wireless Sensor Network technologies has seen significant advances in recent years. There is a great need for development and expectations of wireless Body Area Networks as a special case of WSN.
Chaczko, Z.C., Chiu, C.C., Aslanzadeh, S. & Dune, T. 2011, 'Software Infrastructure for Wireless Sensor and Actuator Networks', 21st International Conference on Systems Engineering, 2011, IEEE Computer Society, Las Vegas, Nevada, USA, pp. 474-479.
View/Download from: Publisher's site
In the development of large ad-hoc Wireless Sensor and Actuator Agent Networks (SANETS), a multitude of disparate problems are faced. In order for these networks to function, software must be able to effectively manage: unreliable dynamic distributed communication, the power constraints of un-wired devices, failure of hardware devices in hostile environments and the remote allocation of distributed processing tasks throughout the network. The solutions to these problems must be solved in a highly scalable manner. The paper describes the process of analysis of the requirements and presents a design of a service-oriented software infrastructure (middleware) solution for scalable ad-hoc networks, in a context of a system made of mobile sensors and actuators.
Rahali, E., Chong, W.J., Chaczko, Z.C. & Braun, R.M. 2011, 'Holonic Modelling of Business Process Management', 2011 International Conference on Information Technology Based Higher Education and Training (ITHET), IEEE Xplore, Turkey, pp. 1-6.
View/Download from: Publisher's site
This paper discusses experiences of applying a Holonic approach for Modelling the Business Process Management (BPM) in the telecommunication domain. Topics presented in this paper include shared experiences as well as common problems both experienced and anticipated in adaptation of Holonic approach for specifying and modelling the UMTS technology using the AnyLogic multi-agent based simulation software. The theory of Holonic modelling for BPM would be applied as a development paradigm for the models.
Nikodem, J., Klempous, R., Nikodem, M. & Chaczko, Z.C. 2011, 'Multi-hop and directed routing based on neighborhood cooperation in WSN', 15th IEEE International Conference on Intelligent Engineering Systems (INES), 2011, IEEE Xplore, Koice, Slovakia, pp. 221-227.
View/Download from: Publisher's site
The paper describes a relational abstraction of neighborhood cooperation for the Wireless Sensor Network (WSN) where node can identify its neighbors around it. Since radio links have limited range only some nodes have a direct contact with the Base Station (BS) and data transmission is executed using multi-hop communication to ensure that information is send from one node to another towards the BS. The novel abstract uses a subordination relation, to manage the neighbor cooperation between the WSN nodes, that exploits topological properties of the WSN. Based on the hop-distance from the BS, any node k is able to establish a set N<(k) consisting of nodes to which k has to send communication messages in order to maintain the data-flow direction towards the BS.
Chaczko, Z.C., Aslanzadeh, S. & Klempous, R. 2011, 'Development of Software with Cloud Computing in 3TZ Collaborative Team Environment', 2011 6th International Conference on Broadband and Biomedical Communications (IB2Com), IEEE, Piscatway, USA, pp. 318-323.
In the global economy, we have seen a decrease in the barriers towards communication across the globe along with an increase of service availability to support this communication. Software development is one discipline that is capable of effectively utilizing and benefiting from global collaboration prospect lent by ever increasing capability of information and communication technology. 24-hour continues development is ideal for application towards tasks that have hard-deadlines or require work completed as soon as possible. This article will mainly focus on introducing 24/7 global models that can be applied in cloud environment used in three different time zones. The case study related to developing agricultural software has been investigated in this article.
Chaczko, Z.C. & Aslanzadeh, S. 2011, 'Cloud Computing for business: Enablers and Inhibitors', 2011 International Conference on Computer Control and Automation, Institute of Electrical and Electronics Engineers, Inc., Piscataway, USA, pp. 684-687.
The main issues affecting cloud computing are the high costs associated with the transfer of data and the availability of cloud systems. Data transfer costs are rather high especially for those businesses that extensively use document management systems that are characterised by the production of large amounts of transactions and data records. Communication traffic associated with these large data transfers significantly adds to the operational cost as well. In this article we will focus on cloud computing from the perspective of business application and highlight the technology' s potential benefits and shortcomings both in short and long terms.
Chaczko, Z.C. & Aslanzadeh, S. 2011, 'C2EN: Anisotropic Model of Cloud Computing', 21st International Conference on Systems Engineering, 2011, IEEE Computer Society, Las Vegas, Nevada, USA, pp. 467-473.
View/Download from: Publisher's site
In Cloud computing, due to non-locale and a multi-tenancy of services and resources, there is a need for sophisticated methods for the metering of efficiency, availability and utilisation of services and resources. Setup and management of computing infrastructure, that is in a state of constant flux, related uncertainties of the state of individual elements as well as levels of their usage per application or user on an hourly, daily, weekly, monthly, and yearly basis - pose serious challenges. This paper describes how the Anisotropic Network concept, with its mathematical apparatus, can be adopted to model, monitor and manage usage of the cloud computing resources and services seen as an elastic network of interacting elements that are in a constant motion. Various aspects of service utilisation prediction and anisotropic resource movements related to the novel Cloud Computing Elastic Network (C2EN) model will be discussed in the context of a mathematical model and experimental results of simulations.
Chaczko, Z.C., Mahadevan, V., Aslanzadeh, S. & Mcdermid, C. 2011, 'Availability and Load Balancing in Cloud Computing', International Proceedings of Computer Science and Information Technology,2011 International Conference on Computer and Software Modeling IPCSIT 2011, IACSIT Press, Singapore, http://www.ipcsit.com/vol14.htm, Singapore, pp. 134-140.
Availability of cloud systems is one of the main concerns of cloud computing. The term, availability of clouds, is mainly evaluated by ubiquity of information comparing with resource scaling. In clouds, load balancing, as a method, is applied across different data centers to ensure the network availability by minimizing use of computer hardware, software failures and mitigating recourse limitations. This work discusses the load balancing in cloud computing and then demonstrates a case study of system availability based on a typical Hospital Database Management solution. http://www.ipcsit.com/vol14/25-ICCSM2011-S0063.pdf
Chaczko, Z.C., Chiu, C.C., Klempous, R. & Nikodem, J. 2010, '3TZ Collaborative Team Environments incorporating the Hybrid Holonic Architecture', 17th IEEE International Conference and Workshops on the Engineering of Computer-Based Systems, ECBS 2010, IEEE Computer Society 2010, Oxford, England, UK, pp. 300-305.
View/Download from: Publisher's site
The paper describes a business reengineering process (BPR) approach to address multi-timezone (3-timezone or 3TZ) collaborative teamwork environments by combining the Holonic architecture with the Zachman Metamodel Framework. While the use of collaborative project systems is not new, the methodology to share time resources from different timezones seeks to address pedagogical and engineering process concerns in team-based project development. The benefits of collaborative project management tools go beyond a uniform platform to deploy project resources, but to also enhance systemic processes and engineering practice. This facilitates team members to dedicate their time towards common work tasks, delineates individual and shared work packages, and improves student/tutor feedback techniques as teachers can actively monitor
Resconi, G. & Chaczko, Z.C. 2010, 'Fuzzy Network of Reasoning by SVD and Morphotronic Network', The IEEE World Congress on Computational Intelligence (IEEE WCCI 2010), IEEE, Barcelona, Spain, pp. 1709-1716.
View/Download from: Publisher's site
In the classical logic the inferential process is based on the modus ponens rule for which when the rule that connects the premise with the consequence is true and the premise is true, we know that the consequence is also true. Now, in the fuzzy inferential process the premise and the consequence are not logic propositions that assume the logic values true or false but are fuzzy sets that can assume values between zero and one. The classical logic rule is replaced with the fuzzy rule R. In this paper, we demonstrate that the fuzzy reasoning network is isomorphic to the Morphotronic network that includes the SVD technique. We also show that Morphotronic network is capable to simulate complex fuzzy reasoning or fuzzy inference in a completely new way.
Chaczko, Z.C., Kohli, A.S., Klempous, R. & Nikodem, J. 2010, 'Middleware Integration Model for Smart Hospital System Using the Open Group Architecture Framework (TOGAF)', Proceedings - 14th International Conference on Intelligent Engineering Systems (INES 2010), IEEE, USA, pp. 215-220.
View/Download from: Publisher's site
A significant portion of the Hospital Information Systems currently consists of various individual legacy applications that have to be integrated, to deliver a more unified solution. The performance, reliability and other factors of these applications can alter the performance, reliability and other characteristics of integrated Solution, the Smart Hospital Management System (SHS). The actual evaluation of these parameters of these applications is outside the scope of this document. The SHS being an infrastructure component relies heavily on the actual resources made available to it for its proper functioning, operation and maintenance. This article aims to deliver an approach in architecting solutions which can be utilised as framework to address common issues in integration of enterprise level solutions. The methodologies discussed in TOGAF version 9 are utilised to demonstrate the feasibility of proposed solution. This paper introduces the problem space/scenarios, constraints, requirements, enablers, risks, sample legacy application architectures and proposed integration solution presented with TOGAF components. The growing number of waiting lists, rising pressure on medical professionals and accountability for medical negligence are only part of the motivation to take initiative towards holds a core model integration strategy in various legacy infrastructure systems.
Chaczko, Z.C., Wickramasooriya, R., Klempous, R. & Nikodem, J. 2010, 'Security Threats in Cognitive Radio Applications', Proceedings - 14th IEEE International Conference on Intelligent Engineering Systems (INES 2010), IEEE, Spain, pp. 209-214.
View/Download from: Publisher's site
In this paper we shall consider security aspects of Cognitive Radio (CR) and its applications. We shall cover design of a security simulation model for cognitive radio and discuss results of conducted experiments using Omnet++ simulation tool in the .Net environment. The aim of this paper is to provide an overview of various applications of CR as well as the security threats faced when applying this technology. The functions, benefits and applications of CR are analyzed, along with the challenges faced by the technology. We shall discuss in detail a several security threats faced by CR and carry out selected research on techniques used to mitigate such malicious attacks and provide examples of simulation experiments in Omnet++.
Sinha, S.N. & Chaczko, Z.C. 2010, 'Socionomics inspired data routing in Wireless Sensor Networks', 2010 4th International Conference on Signal Processing and Communication Systems - Proceedings, IEEE, USA, pp. 1-9.
View/Download from: Publisher's site
A society is typically driven by an economic model to manage demand, debt and distribution that is virtually analogous to the management of data, resources and routing in WSNs. In this paper, the application of such a socio-economic model is formalised as a framework to optimise resource utilisation and collaboration among sensor nodes. A specifically designed simulation platform (WSNSim) has been used to validate the Socionomics framework for WSN. A series of experiments involving the formation of relay points, node vulnerability, packet loss and delivery, and propagation delays, has been performed to demonstrate the scheme by which the framework aids in maximising network lifetime.
Chaczko, Z.C., Kale, A.V. & Chiu, C.C. 2010, 'Intelligent Health Care - A Motion Analysis System for Health Practitioners', Proceedings of the 2010 Sixth International Conference on Intelligent Sensors, Sensor Networks and Information Processing, ISSNIP 2010, Casual Productions/IEEE, QUT, Brisbane, Australia, pp. 303-308.
View/Download from: Publisher's site
In the proposed work we present a combination of two paradigms: Wireless Sensor Networks (WSN) and Computer Vision applied for Motion Analysis. In this work the Computer Vision provides high-level behavioural monitoring and analysis, whereas Wireless Sensors capture detailed parameters of a moving object. Fusion of sensory information received from both types of sensors provides micro-level and macro-level details. These combined details can be used in various application areas. In considered applications, one of the areas can be Robotics. In this case this strategy can be used to monitor health of robots under certain actions and situations. Another important application domain is health care and rehabilitation of injured persons. In this application, movement of an injured body portion is measured after its treatment. Apart from the analysis of motion we also propose optimized movement advice to patients. Optimum motion advice is very useful in case of sports injury to recover strength and performance. In this paper we produce experimental work performed by simulating different movements of hands and legs in free space. The experimental simulation provides a broad range of data on motion analysis with visualization. The third area of application that is explored is elderly patient condition monitoring and motion analysis for health monitoring.
Chaczko, Z.C. & Klempous, R. 2010, 'Anticipatory Biomimetic Middleware', Computing Anticipatory Systems: CASYS `09: Ninth International Conference on Computing Anticipatory Systems, AIP Conference Proceedings, USA, pp. 379-388.
View/Download from: Publisher's site
Anticipatory, multi-agents based and biology inspired middleware for resource constrained systems such as the sensornets is able to provide infrastructure oriented services with anticipatory system properties such as: (1) selforganization, (2) selfshaping, (3) self-monitoring and self-healing. The paper aim is to explain how these fundamental properties, if imprinted on executing agents, can help in the construction of robust, cooperative and sustainable information services for infrastructure oriented software. This can occur through the application of the selected immune-computing and allometric paradigms.
Chaczko, Z.C., Chiu, C.C., Kohli, A.S. & Mahadevan, V. 2010, 'Smart Hospital Management System: An integration of enterprise level solutions utilising open group architecture framework (TOGAF)', Proceedings - 2010 3rd IEEE International Conference on Computer Science and Information Technology, ICCSIT 2010, IEEE, Piscataway, USA, pp. 8-15.
View/Download from: Publisher's site
A significant portion of the Hospital Information Systems currently consists of various individual legacy applications that have to be integrated, to deliver a more unified solution. The performance, reliability and other factors of these applications ca
Chaczko, Z.C., Chiu, C.C. & Kale, A.V. 2010, 'Cooperative agent-based SANET architecture for personalised healthcare monitoring', 2010 4th International Conference on Signal Processing and Communication Systems - Proceedings, IEEE, USA, pp. 1-6.
View/Download from: Publisher's site
This paper describes the adaptation of a computational technique utilizing Extended Kohonen Maps (EKMs) and Rao-Blackwell-Kolmogorov (R-B) Filtering mechanisms for the administration of Sensor-Actuator networks (SANETs). Inspired by the BDI (Belief-Desire-Intention) Agent model from Rao and Georgeff, EKMs perform the quantitative analysis of an algorithmic artificial neural network process by using an indirect-mapping EKM to self-organize, while the Rao-Blackwell filtering mechanism reduces the external noise and interference in the problem set introduced through the self-organization process. Initial results demonstrate that a combinatorial approach to optimization with EKMs and Rao-Blackwell filtering provides an improvement in event trajectory approximation in comparison to standalone cooperative EKM processes to allow responsive event detection and optimization inpatient healthcare.
Sinha, S.N. & Chaczko, Z.C. 2010, 'T-SNIPER: Trust-Aware Sensor Network Information Protocol for Efficient Routing', Proceedings - 24th IEEE International Conference on Advanced Information Networking and Applications Workshops (WAINA 2010), IEEE Computer Society Conference Publishing Services (CPS), USA, pp. 686-692.
View/Download from: Publisher's site
This paper presents a new framework called t-SNIPER for sensor node clustering and routing that is based on socio-economic banking model. Unlike other routing protocols, this particular model does not guarantee data transfer and instead focuses more on determining the best route for the transfer to occur. The communication protocol also employs a trust framework to ensure integrity among the nodes. T-SNIPER draws on the features demonstrated in LEACH and HEED, and is assessed against these models to prove some of the benefits of this model using a WSN simulator (WSNSim). The results presented in this paper show how the proposed model can improve network lifetime and also discusses some of the main trade-offs and assumptions.
Chaczko, Z.C., Yeoh, L. & Mahdevan, V. 2010, 'A Preliminary Investigation on Computer Vision for Telemedicine Systems using OpenCV', Proceedings - Second International Conference on Machine Learning and Computing ICMLC 2010, IEEE Computer Society, USA, pp. 42-46.
View/Download from: Publisher's site
OpenCV is typically, an open source vision library suitable for computer vision programs. In this paper, we present some of our preliminary investigation experiences of developing Computer Vision programs using OpenCV for robotic telemedicine cluster system, within the practice based ICTD subject within the undergraduate Software Engineering Program at the Faculty of Engineering, University of Technology Sydney (UTS). Firstly, it discusses our shared experiences in designing and implementing Computer Vision subsystem and discusses successes, as well as common problems both experienced and anticipated in adaptation of OpenCV framework and then justifies its purpose building a robotic system for telemedicine. Finally, it attempts to bridge the gap between the theoretical knowledge of design and programming with the practical side of software reuse and modularization when designing and implementing a robotic system for medical applications.
Nikodem, J., Klempous, R., Nikodem, M., Woda, M. & Chaczko, Z.C. 2010, 'Wireless Sensors Network Simulator for Modeling Relation Based Communication Activity', 2010 Fifth International Conference on Broadband and Biomedical Communications (IB2Com 2010), IEEE, USA, pp. 1-6.
View/Download from: Publisher's site
The paper presents a simulator that models routing paths and energy distribution in a WSN as a function of the algorithm executed by each node of the network. Simulator was prepared to investigate whether globally defined goals can be achieved through the decisions and actions taken locally by each node that has restricted information about the whole network. Therefore, simulator models each node independently defining three basic relations for each of them - subordination, tolerance and restriction. We have implemented several novel, non-clustered routing protocols that describe behavior of each node of the network - so that we are able to verify how decisions taken locally affect the whole network.
Chaczko, Z.C. & Braun, R.M. 2010, 'Teaching Computer Vision for Telemedicine Systems using OpenCV', 9th International Conference on Information Technology Based Higher Education and Training, 29th April - 1st May 2010, Cappadocia, TURKEY, IEEE, New York, pp. 17-20.
This paper reports on experiences of teaching Computer Vision for robotic telemedicine cluster system, within the practice based ICTD subject within the undergraduate Software Engineering Program at the Faculty of Engineering, University of Technology Sydney (UTS). Topics described by this paper include shared experiences in designing and implementing Computer Vision subsystem and discusses successes, as well as common problems both experienced and anticipated in adaptation of OpenCV framework for building a robotic system for telemedicine. One of the main objectives of the ICTD is to bridge the gap between the students theoretical knowledge of design and programming with the practical side of software reuse and modularization when designing and implementing a robotic system for medical applications.
Chaczko, Z.C., Chiu, C.C., Kohli, A.S. & Mahadevan, V. 2009, 'Patient information management: application of performance theories for healthcare', Information and Multimedia Technology, 2009. ICIMT '09, International Association of Computer Science and Information Technology, South Korea, pp. 173-178.
View/Download from: Publisher's site
This paper conceptualises the development of a Patient Information Management system to assist health care professionals and carers in providing an enhanced level of support to patients. By focusing on throughput analysis and mission criticality the system designers can make valued judgement on the needs of the professional and system's long term requirements.
Agbinya, J.I., Chaczko, Z.C. & Aboura, K. 2009, 'Radio Frequency Pollution Mapping', Selected Papers on the 4th International Conference on Broadband Communication, Information Technology & Biomedical Applications, BroadBandCom '09, BroadBandCom '09, Wroclaw, Poland., pp. 177-182.
Electromagnetic Fields radiation has raised concerns within several segments of the population in the past three decades. Many studies proved inconclusive mainly due to the scarcity of the data. We propose an architecture for a geographical model based radiation pollution database, and discuss its benefits to the community at large.
Chaczko, Z.C., Moses, P. & Chiu, C.C. 2009, 'Co-operative Extended Kohonen Mapping (EKM) for Wireless Sensor Networks', Computer Aided Systems Theory, Eurocast 2009, Springer Berlin Heidelberg, New York, pp. 897-904.
This paper discusses a methodology to manage wireless sensor networks (WSN) with self-organising feature maps, using co-operative Extended Kohonen Maps (EKMs). EKMs have been successfully demonstrated in other machine-learning contexts such as learning sensori-motor control and feedback tasks. Through a quantitative analysis of the algorithmic process, an indirect-mapping EKM can self-organise from a given input space, such as theWSNs external factors, to administer theWSNs routing and clustering functions with a control parameter space. Preliminary results demonstrate indirect mapping with EKMs provide an economical control and feedback mechanism by operating in a continuous sensory control space when compared with direct mapping techniques. By training the control parameter, a faster convergence is made with processes such as the recursive least squares method. The management of a WSNs clustering and routing procedures are enhanced by the co-operation of multiple self-organising EKMs to adapt to actively changing conditions in the environment.
Kumar, J., Chaczko, Z.C., Moulton, B.D. & Mahdevan, V. 2009, 'Investigating the Suitability of a .NET/SQL Server approach for developing a remotely accessible information system for vehicle inspectors, International Conference on Information and Network Technology', International Conference on Information and Network Technology 2009, ICINT 2009, Perth, Australia, pp. 1-7.
Vehicle inspectors using current systems typically make mental or brief written notes while inspecting a vehicle, to be entered into a computer system at a later date. We propose a paperless system for vehicle inspection, and investigate some software engineering tools and methods for its development. The work was initiated as part of a final year computer system engineering thesis project. The research project involved analyses of the requirements and functional specifications, and included the design, implementation and analysis of a working prototype system. Preliminary evaluation of the approach suggests that it appears to be suitable for the development of the specified vehicle inspection information system. The approach is intended to be scalable, but questions remain as to the extent to which the approach is suitable for the development of a larger scale deployment.
Sinha, S.N. & Chaczko, Z.C. 2009, 'Socio-economic (Banking) model based algorithm for energy efficient routing in Wireless Sensor Networks', Selected Papers on4th International Conference on Broadband Communication, Information Technology & Biomedical Applications, BroadBandCom '09, BroadbandCom '09, Wroclaw, Poland, pp. 195-201.
Wireless Sensor Networks are typically characterized by very low-powered nodes performing data gathering, aggregation and routing tasks for very specific targets. The goal of such distributed network of nodes is essentially to work intelligently in data gathering, processing and routing in order to maximise the life-time of the network as a whole. Since these nodes are usually distributed in fairly inaccessible domains, such as a battlefield, bridges, tunnels, and other critical areas, it is not always easy to re-energize the nodes by replacing their battery source. So, the only other way to improve the service of such nodes is to minimize exchange of radio messages by optimizing routing and clustering algorithms. This paper introduces a new routing and clustering algorithm based on a popular and very familiar socioeconomic model the Banking Model.
Nikodem, J., Klempous, R., Nikodem, M., Woda, M. & Chaczko, Z.C. 2009, 'Multihop Communication in Wireless Sensors Network Based on Directed Cooperation', Selected Papers on the 4th International Conference on Broadband Communication, Information Technology & Biomedical Applications, BroadBandCom '09, BroadBandCom '09, Wroclaw, Poland, pp. 239-241.
We consider a Wireless Sensor Network where, due to limited radio link range, only some nodes have a direct contact with the base station and transmission is carried out in a multihop way. We propose a relation that represents cooperation between nodes and takes advantages of topological properties of the network. Based on the hop-distance from the BS any node k can determine a set N<(k) that consist of nodes to which k should send messages in order to retain a data-flow direction towards the BS.
Braun, R.M., Chaczko, Z.C. & Chiang, F. 2009, 'Towards a New Information-Centric View of Wireless Sensor Networks', Selected Papers on the 4th International Conference on Broadband Communication, Information Technology & Biomedical Applications, BroadBandCom '09, BroadBandCom '09, Wroclaw, Poland, pp. 229-232.
This paper presents a new paradigm for viewing the work of Wireless Sensor Networks. The Observed Field (OF) is described as a multi-dimensional Information Space? (ISp). The Wireless Sensor Network is described as a Transformation Space? (TS), while the information collector is a single point consumer of information, described as an "Information Sink" (ISi). Formal mathematical descriptions are suggested for the OF and the ISp. Mathematical descriptions for the TS and the ISi, based on the notion of Path Mutual Information, are proposed. Information flows from ISp to ISi via TS. TS can be formally thought of as a multi-dimensional transform function between ISp and ISi. It can be aggregated into a notional multidimensional value. This formal mathematical description can be used to create numerical optimization routines for generating TSs, against cost functions such as power consumption, and constraints such as maximum distance between sensors.
Lee, C., Chaczko, Z.C. & Moulton, B.D. 2009, 'Bio-inspired Agent-based System for Cooperative Decision-making and Control of Unmanned Aerial Vehicles', Selected Papers on the 4th International Conference on Broadband Communication, Information Technology & Biomedical Applications, BroadBandCom '09, BroadBandCom '09, Wroclaw, Poland, pp. 105-110.
Chiu, C.C., Chaczko, Z.C. & Moses, P. 2009, 'Advanced Extended Kohonen Mapping Modelling Techniques for Sensor Actor Networks', 4th International Conference on Broadband Communications, Information Technology & Biomedical Applications, IEEE CPS, Piscataway, NJ, pp. 245-250.
This paper discusses the results of utilising advanced EKM modelling techniques to manage Sensor-Actor networks (SANETs) such as wireless sensor networks. EKMs allow a quantitative analysis of an algorithmic artificial neural network process by using an indirect-mapping EKM to self-organise from a given input space to administer SANET routing and clustering functions with a control parameter space.
Mohamed Mowjoon, D., Agbinya, J.I. & Chaczko, Z.C. 2009, 'Replicating Cytokines in Modelling Signal Exchange between Nodes in Wireless Mesh Networks', The International MultiConference of Engineers and Computer Scientists 2009, Newswood Limited, International Association of Engineers, Hong Kong, pp. 315-318.
In recent years wireless mesh network (WMN) technologies and their applications have been actively researched and developed as the promising solution for future wireless mobile networks. Conversely security of WMN is often a secondary reflection in development. In our previous work we proposed Artificial Immune System model to employ in secure routing in WMN. This paper proposes an emerging perception to model danger signal exchange between nodes in WMN by emulating the function of Cytokines in Human Immune System (HIS).
Davis, D.J. & Chaczko, Z.C. 2009, 'Environmental Monitoring System', Selected Papers on the 4th International Conference on Broadband Communication, Information Technology & Biomedical Applications, BroadBandCom '09, BroadBandCom '09, Wroclaw, Poland, pp. 215-221.
The Environmental Monitoring System`s (EMS) main purpose is to monitor key environmental factors utilising incorporated wireless sensor networks (WSN) technology. While the system discussed in this paper is intended to be an integrated turnkey solution for Chemical Manufacturing Plants it is flexible enough to be adapted to static or dynamic situations that warrant environmental monitoring. Principally the discussion looks at various issues that confront the deployment of a supervisory system employing a WSN.
Agbinya, J.I., Lee, V., Aboura, K. & Chaczko, Z.C. 2009, 'Recognition of Radio Signal Pollution Levels and Signatures', Selected Papers on the 4th International Conference on Broadband Communication, Information Technology & Biomedical Applications, BroadBandCom '09, BroadBandCom '09, Wroclaw, Poland, pp. 183-188.
Radio frequency spectrum mapping allows determining the radio frequency signatures prevalent within an environment. We address the primary frequency bands used for cellular, wireless LAN, UMTS and ultra wideband communications. The purpose of this paper is to map the detected radio frequencies within an environment and display the collated data on a graphical user interface. The program identifies the presence of the aforementioned radio frequency signatures and recognizes signal levels which exceed the exposure standards enforced by the Australian Communication and Media Authority. The results assist in the understanding of the ramifications of long-term exposure to radio frequency radiation associated with the continued proliferation of wireless devices.
Chaczko, Z.C. & Chiu, C.C. 2008, 'Intelligent Tele-Homecare: The Application of Soft-Computing Models in Sensor Agent Network Systems', 10th Annual Postgraduate Research Students Conference 2008 Abstracts, University of Technology, Sydney, Sydney, Australia, pp. 1-3.
This paper conceptualises the development of an Intelligent Home Care system to assist health care professionals and carers in providing an enhanced level of support to senior citizens. The social demographics in the developed world indicate a decline in population growth, indicating a need for greater resources to be dedicated towards enhancing the lives of an aging society. Furthermore, the dissociation of extended family structures in modern society results in senior citizens to take greater independence in managing their own lives. With the technological advances in the Tele-Homecare domain, there is an impetus to develop improved computational techniques that reflect the nature of complex systems in medicine and biology.
Mohamed Mowjoon, D., Agbinya, J.I., Chaczko, Z.C. & Braun, R.M. 2008, 'Artificial Immune System Inspired Danger Modelling in Wireless Mesh Networks', Proceedings International Conference on Computer and Communication Engineering (ICCCE08), IEEE, Kuala Lumpur, pp. 984-988.
View/Download from: Publisher's site
In recent years wireless mesh network (WMN) technologies and its applications have been actively researched and developed as the promising solution for future wireless mobile networks. On the other hand security of WMN is often a secondary reflection in development. In our previous work we proposed artificial immune system model to employ in secure routing in WMN. This paper improves and extends the algorithm in our previous work with more achievable danger levels and introduces responsible parameters and model danger in WMN. Moreover this paper proposes the elected network simulator for the experiments.
Mohamed Mowjoon, D., Agbinya, J.I. & Chaczko, Z.C. 2008, 'Policy-based Danger Management in Artificial Immune System Inspired Secure Routing in Wireless Mesh Networks', Proceedings International MultiConference of Engineers and Computer Scientists, International Association of Engineers, Hong Kong, pp. 268-270.
This paper introduces Policy based Management Information Base to manage danger in Artificial Immune System inspired secure routing in Wireless Mesh Networks. WMN management functions are defined and the paper focuses only on the security function. Proposed policy based management and typical operation of the architecture are also reported.
Chaczko, Z.C. 2008, 'Biometric Middleware for Wireless Sensor Networks', The European Modeling and Simulation Symposium 2008, pp. 7-14.
Chaczko, Z.C. & Shehata, H.E. 2008, 'Cardioscope Simulator System', The European Modeling and Simulation Symposium 2008, pp. 15-19.
Chaczko, Z.C. & Chiu, C.C. 2008, 'A Smart-Shop System - Mulit-Agent Simulation System for Monitoring Retail Activities', The European Modeling and Simulation Symposium 2008 Proceedings, IEEE, United States, pp. 21-26.
This paper outlines a concept of employing intelligent agents to simulate and deploy a Smart-Shop System for retail environments. The discussion will examine the technical and conceptual challenges, main ideas and the final design rationale. The design model of the Smart-Shop System uses Multi-Agent Simulation Systems (MASS) and distributed middleware frameworks to automate a wide variety of asset monitoring and control tasks in traditional and distributed system concerns, which can be applied to similar application areas. Retail organisations containing any form of physical inventory can benefit from the proposed software solution by allowing assets to be efficiently managed and monitored. This would improve the quality of business trade and strategic marketing to sustain sales growth.
Nikodem, J., Klempous, R. & Chaczko, Z.C. 2008, 'Modelling of Immune Functions in a Wireless Sensors Network', The European Modeling and Simulation Symposium 2008, IEEE, Piscataway, USA, pp. 45-50.
In this paper we explore relationships between immunity and adaptation in Wireless Sensors Network (WSN). We consider the WSN as a set of sensors deployed in a given area. The sensors must communicate to achieve both their particular selfinterests and global goals. In the proposed approach we determine immunity and adaptation abstractions and considering them in the context of three fundamental relations (subordination, tolerance, collision). The proposed conceptual framework provides a powerful paradigm to conceptualise, model, support and manage dynamically organizing complex systems processes.
Chan, A., Chaczko, Z.C., Chiu, C.C. & Zielinski, R. 2008, 'File Compression Using Typogenetic Computation', Proceedings of the Third International Conference on Broadband Communications, Information Technology and Biomedical Applications, IEEE CPS, Piscataway, NJ, pp. 202-208.
View/Download from: Publisher's site
Typogenetic algorithms are a break from classical approaches to computation. Based on gene expression and intercellular processes, typo-genetic computation can offer a new approach to the algorithmic problems of system security, data compression and encryption. The method has a potential of much higher compression ratios at the limited computational costs i.e. processing time. This paper presents a formal system based on typogenetics for the purposes of compression. Lossless data compression is an important part of computer science. While the ability to reduce consumption of hard disk space or transmission bandwidth through statistical redundancy has served well in the past, the explosive growth in high quality media content (*.mp3, *.mpg) on the internet in the past few years have highlighted the limitations of traditional statistical techniques for compression.
Chaczko, Z.C., Mahadevan, V. & Nikodem, J. 2008, 'A Bio-inspired Telecollaboration Service Taxonomy: Usability Related Concerns', Third International Conference on Broadband Communications, Information Technology & Biomedical Applications (Broadcom), IEEE CPS, Piscataway, NJ, pp. 209-214.
View/Download from: Publisher's site
As the Internet is transforming the global information economy, the Telecollaboration (TC) system services are moving at a transitional pace dictated by market forces. However, the pace is turning out to be a lot slower than expected. This has prompted us now to approximate and synthesize the design concepts of building a scalable biomimetic system manager for a telecollaboration service taxonomy. Thus, it is expected that if there is more correlation across the design concepts of the system manager, the greater will be the likelihood of demonstrating a rescue-like operation for humans in this new taxonomy. The main goal of this paper is initially to over view the bio-swarm behaviours of insect colonies to embrace a notional computing architecture that enables an individual TC service entity. It is important that these behaviours along with the proposed self-x autonomic functions offered by the system manager need to be pursued, and indeed continue, in a highly correlated way to fulfil the opportunistic functional tasks related to the discovery and delivery of Telecollaboration services. In this context next, we attempt to study the significant usability benefits of qualitative and quantitative execution pressures related to the implementation of these functions. This includes a better understanding of the constraints of implementation of these functions to deal with complex usability performance baselines. Finally, we give an updated foresight of process deployment strategies through a group of highly diverse and autonomous objects called Teleholons whilst exploiting the role of these self-x autonomic functions.
Rahali, E., Chaczko, Z.C., Agbinya, J.I. & Chiu, C.C. 2008, 'Business Process Re-engineering in Saudi Arabia: A Survey of Understanding and Attitudes', Third International Conference on Broadband Communications, Information Technology & Biomedical Applications, IEEE CPS, Piscataway, NJ, pp. 148-155.
View/Download from: Publisher's site
This survey was conducted in the Kingdom of Saudi Arabia (KSA) to investigate the level of awareness of BPR. Respondents (customers, employees, and managers) had different educational backgrounds and were from private and public sectors. Findings of the study indicate a general awareness of BPR in KSA. sustain sales growth.
Chaczko, Z.C., Klempous, R., Nikodem, J. & Szymanski, J. 2008, 'Applications of Cooperative WSN in Homecare Systems', Third International Conference on Broadband Communications, Information Technology & Biomedical Applications, IEEE CPS, Piscataway, NJ, pp. 215-220.
View/Download from: Publisher's site
Cooperation plays the crucial role in shared space of the homecare processes. It is a rather hard task to ensure effective cooperation in home care environment. This is due to variability of schedules, tasks and mobility of both patients and carers. In this paper, we discuss sensor network technology that can facilitate and improve home care cooperation scenarios. We present methodology, recommendations and applications for incorporating a WSN based solution in various areas of Homecare. We argue that even the most difficult areas of cooperation between patients and their carers such as: information retrieval, information dissemination, scheduling, coordination of short and long-term treatment can be supported by WSN based solutions. Finally, we discuss sensor network design approaches for incorporating smart communication devices and sensors to support health care workers and their patients in their daily activities. The network of smart sensors can help to maintain awareness of the activities of all stakeholders and the need to integrate communication and computer technology with the requirements of effective aged care infrastructure.
Eissa, M.M., Chaczko, Z.C. & Rahali, E. 2007, 'Interactive Protection System for Operator Training Simulator Using New Wavelet Techniques', Wireless Broadband and Ultra Wideband Communications, 2007. AusWireless 2007. The 2nd International Conference on, IEEE, USA, pp. 11-18.
View/Download from: Publisher's site
An increase in complexity of relays and power systems makes the relay settings and the process of coordination quite difficult. The changes of operating conditions in power systems also adversely affect the installed relays. There is a strong requirement to avoid protection relay maloperation and to ensure continuing optimal relay coordination and operation. It is rather difficult to determine which of the protective relays will operate as specified or whether the coordination of the relays is maintained due to complexity of the system. This paper introduces a reliable and secure interactive framework system for investigation, calculation of relay settings and relay coordination using wavelet based techniques. The interactive system allows an engineer in the control room to assign the location, the type of fault and the relay data set pattern; then the operating time of the protective devices is generated. The system framework introduces a dynamic, interactive transient of the relay models for the power system.
Chaczko, Z.C. & Moses, P. 2007, 'Neuro-Immune-Endocrine (NIE) Models for Emergency Services Interoperatibility', Computer Aided Systems Theory - EUROCAST 2007, Springer Berlin / Heidelberg, Berlin, Germany, pp. 105-112.
View/Download from: Publisher's site
Highly dynamic, re-configurable hardware, embedded software and communication networks are becoming very significant in operation of various emergency services. The key challenge in designing such systems is to provide a framework for interoperability of emergency services in disaster situations. The goal of the paper is to provide an insight into modelling techniques for studying emergency services interoperability functions in system design to avoid hidden points of failures. Concepts of artificial Neuro-Immune-Endocrine (NIE) homeostatic models [21][22][24] for autonomous self-configuring and self-healing systems are discussed. The paper features examples of collaborative software agents? behaviour in hostile environments, cooperating protocols, smart embedded devices and pro-active infrastructures in various areas related to emergency services operations.
Chaczko, Z.C., Chiang, F. & Braun, R.M. 2007, 'Active MIB: Addressing Challenges of Wireless Mesh Networks', Computer Aided Systems Theory - EUROCAST 2007, Springer, Berlin/Heidelberg, pp. 1199-1207.
View/Download from: Publisher's site
There is a list of very much needed object-oriented and autonomous paradigms that are currently absent from traditional implementations of MIBs in telecommunication systems. We argue that some of autonomous features can be inherent in an application of an Active MIB mechanism itself, and thus this type of application would be a more appropriate substrate in which to model, develop and integrate the benefits brought by the object-oriented approach. In our work, we claim that active networks are such an application area, in which the object-oriented and autonomous system ideas can be successfully applied. The objective of this research paper is to demonstrate applicability and compatibility of the AMIB concept with functional and architectural requirements of wireless mesh networks. This paper introduces new approaches for using AMIB-based mechanisms in telecommunication networks as well as discusses autonomic processes and algorithms that can be used to manage such networks.
Mahadevan, V., Chaczko, Z.C. & Agbinya, J.I. 2007, 'A Comprehensive Analytical Model for Video over IP in Telecollaboration Business System Environments', Proceedings of the 8th International Conference on Intelligent Technologies (InTech-07), University of Technology Sydney, Australia, Sydney, Australia, pp. 212-218.
This paper proposes the emerging Telecollaboration (TC) business system environments supported by Video over IP applications, thus contributing the measurement of user experience. Initially, a simple but comprehensive analytical model for Video over IP is presented for the development of Quality of Service (QoS) indices. We then characterize the model with few illustrative units that provide an integrated context for estimation and mapping of the quality and quantity measures of Video over IP in the ubiquitous Internet. This includes application of Pittss software methodology, whilst addressing the second-order network performance statistics in the context of jitter (such as delay and packet-loss variation). Finally at the network level, the behavior of source, queuing, multi-service requirement mechanisms and a set of flows, connections and aggregates are measured to justify the quality inherent usability aspects of video quality. It is expected that the proposed modeling overcomes the degradation of video quality, which is seen as a fundamental problem that often occurs due to the multi-user packet switched network. Our results also suggest that the experimentally validated analytical modeling of Video over IP is of considerable value in promoting the TC initiatives.
Chaczko, Z.C. & Chiu, C.C. 2007, 'Intelligent Agents for Educational Environments', Information Technology Based Higher Education and Training Abstracts, Kumamoto University, Kumamoto, Japan, pp. 1-6.
This paper outlines a concept of employing intelligent agents to simulate, construct and deploy a Smart Library System for an educational facility. Discussion into the many technical challenges driving the concept, ideas behind this approach and the final design rationale are examined. The design model of the Smart Library System that uses Multi-agent simulation and distributed middleware frameworks can be successfully applied to many similar application areas as a means of automating a wide variety of asset monitoring and control tasks in both traditional and distributed systems concerns. Educational environments containing material such as books, multimedia and laboratory equipment can benefit from the proposed software solution allowing such assets to be efficiently managed and monitored. This subsequently would improve the quality of teaching and training support.
Mohamed Mowjoon, D., Agbinya, J.I., Chaczko, Z.C. & Chiang, F. 2007, 'Self-Organized Classification of Dangers for Secure Wireless Mesh Networks', Australasian Telecommunication Networks and Applications Conference 2007, IEEE, Christchurch, New Zealand, pp. 1-6.
View/Download from: Publisher's site
This paper introduces danger theory in artificial immune system as a method of responding to danger in wireless mesh networks. It identifies the challenges in deploying Wireless Mesh networks (WMNs) and focus on secure routing as one of the key challenges in deploying WMNs. In order to implement a secure routing system, various Artificial Immune System (AIS) models were analysed. These models have been used in Intrusion Detection System (IDS) and computer security in the literature. In this paper, the authors propose to use Danger models to secure routing in WMNs. The first step in secure routing process is to identify and classify the network dangers and take necessary actions to overcome those dangers. For the classification task, we apply Self-organizing Maps (SOMs) as the classifier to classify the danger levels in WMNs. These identified danger conditions are further deployed as the warning signals for the design of secure routing protocol. The experimental results validate the proposal of applying the Danger Theory (DT) into security area and good performance is also reported by the use of Artificial Neural Network (ANN) classifier.
Chaczko, Z.C., Klempous, R., Nikodem, J. & Rozenblit, J. 2006, '24/7 Software Development in Virtual Student Exchange Groups: redefining the work and study week', 7th International Conference on Information Technology Based Higher Education and Training, IEEE, New York, USA, pp. 30-38.
Chaczko, Z.C. & Sinha, S.N. 2006, 'Innovative Strategies of Teaching Software Analysis and Design - Interactive Digital Television Games', 7th International Conference on Information Technology Based Higher Education and Training, IEEE, New York, USA, pp. 38-56.
The essence of a University is realized through the quality of education it delivers to the students and how useful they find it in their lives. To fulfil this quest recently the University of Technology, Sydney added a new subject to the existing curriculum for Master of Software Engineering - Software Analysis and Design. The primary goal of the subject was to promote skills and understanding about software engineering practices, project management, and scheduling and resource management. In doing so the students were also exposed to a hands-on learning experience in development of Interactive Digital TV application in collaboration with the Australian Broadcasting Corporation - using the MHP middleware. The response to this program has proven to be very encouraging as it provides a very effective approach to increasing the software development capability.
Chaczko, Z.C., Klempous, R., Nikodem, J., Rozenblit, J., Jacak, W. & Araujo, C. 2006, 'Assessment of the quality of teaching and learning based on data driven evaluation methods', 7th International Conference on Information Technology Based Higher Education and Training, IEEE 2006, New York, USA, pp. 39-55.
The data-driven decision support tool built around the SAS technology has been developed to support the evaluation and monitoring of the quality of educational process. The tool forms an integrated framework that can be used for managing of teaching and learning processes and for performing comparative studies in the participating institutions. The tool includes: the engine for the comparative statistical analysis of the quality of teaching, the mechanism for dissemination of analytical results and the reporting facility. The main aim of our study is to extract and to compare the information on the quality of courses and teaching obtained from the different sets of databases at the Faculty of Electronic Engineering (FEE) of the Wroclaw, University of Technology (WUT), Poland; the Faculty of Computer Science (FCS) at University of Las Palmas de Grand Canaria (ULPGC), Spain; the Faculty of Engineering, Software, the Polytechnic University of Upper Austria in Hagenberg, Austria; the Electrical and Computer Science Department at the University of Arizona in Tucson, USA and Software Engineering Group at the Faculty of Engineering University of Technology, Sydney (UTS), Australia. In this paper we describe the process involved, the methodology, the tools for the analysis; and we present the results of our study.
Chaczko, Z.C., Klempous, R., Nikodem, J., Nikodem, M. & Rozenblit, J. 2006, 'An Improvement of Energy Aware Routing in Wireless Sensors Network', International Mediterranean Modelling Multiconference 2006. (2nd European Modelling and Simulation Symposium. EMSS 2006], Barcelona, Spain, October 4-6 2006., EMSS, Barcelona, Spain, pp. 599-604.
Chaczko, Z.C. & Ahmad, F. 2005, 'Wireless sensor network based system for fire endangered areas', Proceedings of Third International Conference On Information Technology And Applications, Vol 2, IEEE, Piscataway, USA, pp. 203-207.
View/Download from: Publisher's site
This paper describes a system design approach for a wireless sensor network based application that is to be used to measure temperature and humidity as well as being fitted with a smoke defector. Such a device can be used as an early warning fire detecti
Gulrez, T., Al-Hmouz, R., Al-Jumaily, A. & Chaczko, Z.C. 2005, 'CA Based PRM for Autonomous Mobile Robot's path-planning in cluttered environment', Proceedings of the First International Conference on Modeling, Simulation and Applied Optimization, American University of Sharjah, Sharjah, UAE, pp. 1-6.
Challa, S., Gulrez, T., Chaczko, Z.C. & Tumkur, P. 2005, 'Opportunistic Information Fusion: A New Paradigm for Next Generation Networked Sensing Systems', Proceedings of 7th International Conference on Information Fusion, IEEE, USA, pp. 720-727.
View/Download from: Publisher's site
Traditionally, Information Fusion systems assume that the information is gathered from known sensors over proprietary communication networks and fuse using fixed rules of information fusion and designated computing and communication resources. Emerging technologies like wireless sensor networks, TEDS enabled legacy sensors, ubiquitous computing devices and all IP next generation networks are challenging the rationale of conventional information fusion systems. The technology has matured to a point where it is reasonable to discover sensors based on the context, establish relevance, query for appropriate data, and fuse it using the most appropriate fusion rule, using ubiquitous computing and communication environment in an opportunistic manner. We define such fusion systems as opportunistic information fusion systems. In this paper we introduce this new paradigm for information fusion and identify plausible approaches and challenges to design, develop and deploy the proposed next generation opportunistic information fusion systems.
Chaczko, Z.C. & Sinha, S.N. 2005, 'SAFE Model Approach to Construction of Intelligent Security Systems', Proceedings - Third International Conference on Information Technology and Applications, University of Technology, Sydney, Sydney, Australia, pp. 197-202.
View/Download from: Publisher's site
Dynamic environments such as that of any public and private infrastructure, workplace and even home consist of multiple entities that continuously interact with each other. Integrating an intelligent security system in such an environment necessitates the need for a soft systems approach that gives perspective to such interactions through identifying associated holons. The holonic analysis allows characterisation of ill-defined and often problematic situations that are resultant of the human activity system. This paper discusses some techniques that can be adopted to resolve scenarios that are plagued with uncertainty in reasoning and the continuously varying nature of interrelationship between native entities. The technical aspect of this system encompasses the mode of query processing and surveillance through a structured sensor network set up with the aid of distributed services and network protocols.
Chaczko, Z.C. & Braun, R.M. 2004, 'Modelling a Holonic Network System Using Cellular Automata for Detecting Traffic Congestion', WITSP'2004, 3rd Workshop on the Internet, Telecommunications and Signal Processing, IEEE, New York.
Mahadevan, V., Braun, R.M. & Chaczko, Z.C. 2004, 'A Holistic Approach of Knowledge Management Initiative for a Telecollaboration Business System', Proceedings of International Business Research Conference Melbourne 2004, World Business Institute, Melbourne, Australia, Melbourne, Australia, pp. 16-16.
Mahadevan, V., Braun, R.M., Kulasuriya, S. & Chaczko, Z.C. 2004, 'The Crisis of SLM and SLA development in the Technology Enhanced Telecollaboration Environments', Proceedings of International Business Research Conference Melbourne 2004, World Business Institute, Melbourne, Australia, Melbourne, Australia, pp. 10-10.
Mahadevan, V., Chaczko, Z.C. & Braun, R.M. 2004, 'The Telecollaboration Spin as a Concurrent Paradigm Shift in Business Practices', Proceedings of International Business Research Conference Melbourne 2004, World Business Institute, Melbourne, Australia, Melbourne, Australia, pp. 15-15.
Mahadevan, V. & Chaczko, Z.C. 2004, 'Telecollaboration - A Case Study For Performance Analysis of Voip Systems', Proceedings of the IADIS International Conference WWW/Internet 2004 Volume II, IADIS Press International Association for Development of the Information Society, Madrid, Spain, pp. 1218-1223.
Mahadevan, V., Braun, R.M. & Chaczko, Z.C. 2004, 'The Influence of Workload Characterization in the Performance Analysis of Tele-collaboration Environments', 5th International Conference on Information Technology Based Higher Education Training and Education ITHET 2004, IEEE, Piscataway, USA, pp. 287-292.
The telecollaboration (TC) business system is an important class of emerging applications that is spawning new challenges in achieving the desired levels of performance. One important implication in identifying and characterizing the properties of TC system implementations is that performance evaluation should no longer be isolated and viewed as a separate analytic activity. Instead, we require a physical and logical understanding of the complex quality issues that affect overall performance of applications, systems and network infrastructures. As one of the natural artifacts of this practice, a workload model are developed to characterize a TC system. We demonstrate how such an analysis may result in characterization of workload behavior, and that in turn lead to definition of efficient analytical model parameters, network invariants and use of relevant quality metrics. The study of underlying issues of telecollaboration quality of service (TQoS) within the context of TC could have positive impacts on performance analysis and traffic control, if the analytical modeling used remains consistent and effective in describing the Web-based environments.
Mahadevan, V., Braun, R.M. & Chaczko, Z.C. 2004, 'Mastering The Mystery Through "Saiq" Metrics of User Experience in Telecollaboration', Proceedings of the IADIS International Conference WWW/Internet 2004 Volume II, IADIS Press Intrnational Association for Development of the Information Society, Madrid, Spain, pp. 1029-1034.
Mahadevan, V., Braun, R.M. & Chaczko, Z.C. 2004, 'An Advanced QoS Index Framework for a Next Generation Internet Application', The 8th World Multi-Conference on Systemics,Cybernetics and Informatics, SCI 2004, Orlando, Florida, USA, pp. 1-6.
Kotwal, A. & Chaczko, Z.C. 2004, 'Secure Network Application Proxy', Proceedings The 3rd Workshop on Internet, Telecommunications and Signal Processing WITSP'2004, IEEE, Adelaide, Australia, pp. 1-6.
Chaczko, Z.C., Gulrez, T., Al-Hmouz, R. & Braun, R.M. 2004, 'Modelling a Holonic Network System using Cellular Automata for Detecting Traffic Congestion', Proceedings The 3rd Workshop on Internet, Telecommunications and Signal Processing WITSP'2004, IEEE, Adelaide, Australia, pp. 1-6.
Davis, D.J., Chaczko, Z.C. & Mahadevan, V. 2004, 'New Perspectives on Teaching and Learning Software Systems Development in Large groups', ITHET Fifth International Conference, IEEE, Instanbul, pp. 409-414.
Gulrez, T., Al-Hmouz, R. & Chaczko, Z.C. 2004, 'Unmanned autonomous vehicle control & SLAM problem in 2-D environment', Proceedings of INMIC 2004 8th International Multitopic Conference, IEEE, USA, pp. 712-716.
View/Download from: Publisher's site
This paper proposes a method of selecting (autonomously) the artificial landmarks by Laser measurement, to establish the 2D obstacle map. Due to the error in the motion and measurement of the robot, the observed landmarks positions include the uncertainty. In this paper we discuss the simultaneous laser type localizaiton and map building (SLAW) problems. SLAM problem asks, is it possible for an autonomous vehicle to start in an unknown location in an unknown environment and then incrementally builds a map of this environment, while simultaneously using the map to compute the absolute vehicle location. From the results, we proved that a solution to the SLAM problem is indeed possible for 2D obstacle map. This implementation was made on Real time Player/Stage Robotics Software as well as the Matlab results were obtained, also we demonstrated how key issues such as, map management and data association can be handled in a practical eivironment.

Journal articles

Chaczko, Z.C., Aslanzadeh, S., Jiang, F. & Klempous, R. 2013, 'The Implementation of 3TZ Model of Software Development', Kwartalnik Elektroniki i Telekomunikacji - Electronics and Telecommunications Quarterly, vol. 58, no. 4, pp. 433-439.
View/Download from: Publisher's site
This paper presents the concepts and explores issues related to the 3 Time Zones (3TZ) model of software development in global workspace environment. The 3TZ model itself seeks to take advantages of differences in time zones between places around the world. By engaging software development teams in different regions separated by 8 hours each, it is possible for their combined working hours to cover the whole 24 hours period. Thus, while they each work their normal 8 hour days, together they are able to achieve in 1 day what a single team would achieve in 3 days. They are able to achieve this by passing on their work from one team to the next as one finishes their workday and the next team starts their workday. The 3TZ model of software development revolves around the employment of a software development team distributed in at least 3 different locations around the world in 3 different time zones. If work was passed on from one team to the next and adjacent teams were separated by 8 hours, then 24 hours continuous collaborative software development could be achieved.
Szymanski, J., Chaczko, Z.C., Rodanski, B. & Jablonski, A. 2013, 'Enabling Design and Development of Wireless BANs using 802.15x', Lecture Notes in Computer Science, vol. 8112, no. 1, pp. 475-482.
View/Download from: Publisher's site
The articles covers issues related to adaptation of wireless sensor and body area networks standards and best practices in the domain of pervasive healthcare.
Kale, A.V., Chaczko, Z.C. & Rudas, I. 2013, 'Managing Dynamism of Multimodal Detection in Machine Vision Using Selection of Phenotypes', Computer Aided Systems Theory -- EUROCAST 2013, vol. 8112, no. 1, pp. 483-490.
View/Download from: Publisher's site
Multimodal Sensor Vision is a technique for detecting objects in dynamic and uncertain environmental conditions. In this research, a new approach for automated feature subset selection-mechanism is proposed that combines a set of features acquired from multiple sensors. Based on changing environmental conditions, the merits of respective sensory data can be assessed and the feature subset optimized, using genetic operators. Genetic Algorithms (GAs) with problem specific modifications improve reliability and adaptability of the detection process. In the new approach, a traditional GA is customized by combining the problem profiled encoding with a specialized operator. Application of an additional operator prioritizes and switches within the feature subsets of the algorithm, allowing a feature level aggregation that uses the most prominent features. The approach offers a more robust and a better performing Machine Vision processing.
Resconi, G. & Chaczko, Z.C. 2013, 'Morphotronics and Bond Graphs Representation', Lecture Notes in Computer Science, vol. 8112, no. 1, pp. 499-512.
View/Download from: Publisher's site
The article provides an overview of computational apparatus of Morphotronics theory in context of its applicability for Bond Graphs representation
Aslanzadeh, S. & Chaczko, Z.C. 2013, 'Generalized Spring Tensor Algorithms: with Workflow Scheduling Applications in Cloud Computing', International Journal of Computer Applications, vol. 84, no. 7, pp. 15-17.
View/Download from: Publisher's site
In Cloud Computing, designing an efficient workflow scheduling algorithm is considered as a main goal. Load balancing is one of the most sophisticated methodologies, which can optimize workflow scheduling by distributing the load evenly among available resources. A well-designed load balancing algorithm has significant impact on performance and output in Cloud Computing. Therefore, designing robust load balancing techniques to manage the networks' load has always been a priority. Researchers have proposed and examined different load balancing methods; there is, however, a large knowledge gap in adopting an efficient load balancing algorithm in the Cloud system. This paper describes how a generalized spring tensor, an evolutionary algorithm with mathematical apparatus, can be utilized for a more efficient and effective load management in Cloud Computing. Considering the fluctuation and magnitude of the load, a novel application of workflow scheduling is investigated in the context of various mathematical patterns. The preliminary results of the research show that defining the dependency ratio between workflow tasks in Cloud Computing, results in better resource management, maximized performance and minimized response time while dealing with customer's requests.
Resconi, G., Braun, R.M. & Chaczko, Z.C. 2013, 'Geometry of Sensor Networks', Lecture Notes in Computer Science, vol. 507, no. 512, pp. 1-6.
View/Download from: Publisher's site
Given a set of sensors or cluster of sensors S located at different points or nodes in the ordinary space. Any sensor measures one or more values, such as Temperature. We assume that the information from all sensors at different positions in the space is transmitted to a Gateway node as a probabilistic phenomena, not in a deterministic way. The measured value X at the Gateway sensor node is a random value. Noise in the network randomly changes the original measurements. Information at the gateway is given by a distribution of the probability at the gateway sensor. We can show that given the values at the sensor node the distribution of the probability at the gateway changes. So the sensor measurements are parameters that define the distribution of the values at the gateway. The probability at the gateway is conditioned by the original measures at the sensor node. The probability approach cannot take care of the topology of the network but only of the conditional probability at the gateway conditioned by the sensors. Now we compute the derivative of the conditional Boltzmann entropy for any variation of the sensor value and for any value at the gateway X. This matrix gives us the sensor situation so we can compute the Fisher information of the sensor. It is the Hessian of the entropy average function in the space of the sensors S. The Fisher information gives us the geometry or form of the sensor space S. Sensor information is very important to obtain the form of the phenomena that we want to measure with the different sensors. Networks of sensors with their geometry go beyond the individual sensor that measures only one value and cannot discover the field or form of the physical phenomena.
Resconi, G., Braun, R.M. & Chaczko, Z.C. 2013, 'Geometry of a Sensor Networks', Lecture Notes in Computer Science, vol. 8112, no. 1, pp. 507-512.
View/Download from: Publisher's site
Given a set of sensors or cluster of sensors S located at different points or nodes in the ordinary space. Any sensor measures one or more values, such as Temperature. We assume that the information from all sensors at different positions in the space is transmitted to a Gateway node as a probabilistic phenomena, not in a deterministic way. The measured value X at the Gateway sensor node is a random value. Noise in the network randomly changes the original measurements. Information at the gateway is given by a distribution of the probability at the gateway sensor. We can show that given the values at the sensor node the distribution of the probability at the gateway changes. So the sensor measurements are parameters that define the distribution of the values at the gateway. The probability at the gateway is conditioned by the original measures at the sensor node. The probability approach cannot take care of the topology of the network but only of the conditional probability at the gateway conditioned by the sensors. Now we compute the derivative of the conditional Boltzmann entropy for any variation of the sensor value and for any value at the gateway X. This matrix gives us the sensor situation so we can compute the Fisher information of the sensor. It is the Hessian of the entropy average function in the space of the sensors S. The Fisher information gives us the geometry or form of the sensor space S. Sensor information is very important to obtain the form of the phenomena that we want to measure with the different sensors. Networks of sensors with their geometry go beyond the individual sensor that measures only one value and cannot discover the field or form of the physical phenomena.
Chaczko, Z.C. & Resconi, G. 2013, 'Assessing the Quality of WSAN Topologies', Lecture Notes in Computer Science, vol. 8112, no. 1, pp. 174-182.
View/Download from: Publisher's site
The article provides an overview of various methods for partitioning of WSAN topologies.
Chaczko, Z.C. & Chiu, C.C. 2013, 'Enhancement of Surgical Training Practice with the Spring Tensor Heuristic Model', Kwartalnik Elektroniki i Telekomunikacji - Electronics and Telecommunications Quarterly, vol. 59, no. 3, pp. 237-244.
View/Download from: Publisher's site
The enhancement of surgical simulation tools is an important research study, to assist in the assessment and feedback of medical training practice. In this research, the Spring Tensor Model (STEM) has been used for laparoscopic endeffector navigation through obstacles and high-risk areas. The modelling of the surgical trainer as part of the laparoscopic simulator seek s to emulate the physical environment as a virtualised representation in the integrated infrastructure. Combining sensor network framework paradigms to a surgical k nowledge-based construct demonstrates how STEMcan enhance medical practice. The architectural hybridisation of the training framework has enabled the adaptation of STEM modelling techniques for a simulated laparoscopic training methodology. The primary benefit of the architecture is that this integration strategy has resulted in a seamless transition of the heuristic framework to be applied to surgical training. http://www.degruyter.com/view/j/eletel.2013.59.issue-3/eletel-2013-0028/eletel-2013-0028.xml?format=INT
Chiu, C.C., Kohli, A.S. & Chaczko, Z.C. 2012, 'Middleware Integration Model for Smart Hospital System Using the Open Group Architecture Framework (TOGAF)', International Journal of Advanced Computer Science, vol. 2, no. 2, pp. 56-64.
Health Information Systems in industry are undergoing a paradigm shift in uniformity. The needs for health professionals to utilise universal patient records require various legacy health applications to be integrated in a logical, orderly process. The Smart Hospital Management System is an infrastructure solution that seeks to unify health patient management subsystems together while retaining the existing performance and reliability requirements of the individual subsystems. The infrastructure oriented application of The Open Group Architecture Framework, presented in this research work, ensures that integrity and an enterprise-level perspective is considered throughout the development process. This includes a consideration of the problem space and scenarios, constraints, requirements, risks, enablers and inhibitors of the legacy application architectures. The proposed integration solution with TOGAF components, addresses the need for health institutions to unify their legacy operations in a consistent and best practise compliant manner to ensure universal patient records are thorough, comprehensive and provide robust security mechanisms to make certain that privacy regulation compliance and protection against identity theft are vital.
Chaczko, Z.C., Chiu, C.C., Aslanzadeh, S. & Dune, T. 2012, 'Sensor-Actor Network Solution for Scalable Ad-hoc Sensor Networks', International Journal of Electronics and Telecommunications, vol. 58, no. 1/2012, pp. 55-62.
View/Download from: Publisher's site
Architects of ad-hoc wireless Sensor-Actor Networks (SANETS) face various problems and challenges. The main limitations relate to aspects such as the number of sensor nodes involved, low bandwidth, management of resources and issues related to energy management. In order for these networks to be functionally proficient, the underlying software system must be able to effectively handle unreliable and dynamic distributed communication, power constraints of wireless devices, failure of hardware devices in hostile environments and the remote allocation of distributed processing tasks throughout the wireless network. The solution must be solved in a highly scalable manner. This paper provides the requirements analysis and presents the design of a software system middleware that provides a scalable solution for ad-hoc sensor network infrastructure made of both stationary and mobile sensors and actuators.
Braun, R.M. & Chaczko, Z.C. 2012, 'Multi-dimensional Information Space View of Wireless Sensor Networks with Optimization applications', Lecture Notes in Computer Science, vol. 6928, pp. 146-152.
View/Download from: Publisher's site
This paper presents an optimization example using a new paradigm for viewing the work of Wireless Sensor Networks. In our earlier paper the Observed Field (OF) is described as a multi-dimensional Information Space (ISp). The Wireless Sensor Network is described as a Transformation Space (TS), while the information collector is a single point consumer of information, described as an Information Sink (ISi). Formal mathematical descriptions were suggested for the OF and the ISp. We showed how the TS can be formally thought of as a multi-dimensional transform function between ISp and ISi. It can be aggregated into a notional multi-dimensional value between {0, 1}. In this paper, this formal mathematical description is used to create a genetic algorithm based optimization strategy for creating routes through the TS, using a cost function based on mutual information. The example uses a connectivity array, a mutual information array and the PBIL algorithm.
Chaczko, Z.C., Resconi, G., Chiu, C.C. & Aslanzadeh, S. 2012, 'N-Body Potential Interaction as a Cost Function in the Elastic Model for SANET Cloud Computing', International Journal of Electronics and Telecommunications, vol. 58, no. 1/2012, pp. 63-70.
View/Download from: Publisher's site
Given a connection graph of entities that send and receive a flow of data controlled by effort and given the parameters, the metric tensor is computed that is in the elastic relational flow to effort. The metric tensor can be represented by the Hessian of the interaction potential. Now the interaction potential or cost function can be among two entities: 3 entities or N entities and can be separated into two main parts. The first part is the repulsion potential the entities move further from the others to obtain minimum cost, the second part is the attraction potential for which the entities move near to others to obtain the minimum cost. For Pauli's model, the attraction potential is a functional set of parameters given from the environment (all the elements that have an influence in the module can be the attraction of one entity to another). Now the cost function can be created in a space of macro-variables or macro-states that is less of all possible variables. Any macro-variable collect a set of micro-variables or microstates. Now from the hessian of the macro-variables, the Hessian is computed of the micro-variables in the singular points as stable or unstable only by matrix calculus without any analytical computation - possible when the macro-states are distant among entities. Trivially, the same method can be obtained by a general definition of the macro-variable or macro-states and micro-states or variables. As cloud computing for Sensor-Actor Networks is based on the bonding concept for complex interrelated systems; the bond valence or couple corresponds to the minimum of the interaction potential V and in the Cloud as a minimum cost.
Chaczko, Z.C., Aslanzadeh, S. & Kuleff2, J.A. 2012, 'The Artificial Immune System Approach for Smart Air-Conditioning Control', Kwartalnik Elektroniki i Telekomunikacji - Electronics and Telecommunications Quarterly, vol. 58, no. 2, pp. 193-199.
View/Download from: Publisher's site
Biologically inspired computing that looks to nature and biology for inspiration is a revolutionary change to our thinking about solving complex computational problems. It looks into nature and biology for inspiration rather than conventional approaches. The Human Immune System with its complex structure and the capability of performing pattern recognition, self-learning, immune-memory, generation of diversity, noise tolerance, variability, distributed detection and optimisation - is one area that has been of strong interest and inspiration for the last decade. An air conditioning system is one example where immune principles can be applied. This paper describes new computational technique called Artificial Immune System that is based on immune principles and refined for solving engineering problems. The presented system solution applies AIS algorithms to monitor environmental variables in order to determine how best to reach the desired temperature, learn usage patterns and predict usage needs. The aim of this paper is to explore the AIS-based artificial intelligence approach and its impact on energy efficiency. It will examine, if AIS algorithms can be integrated within a Smart Air Conditioning System as well as analyse the impact of such a solution.
Sinha, S.N. & Chaczko, Z.C. 2011, 'Socionomic Modelling In Wireless Sensor Networks', International Journal Of Electronics And Telecommunications, vol. 57, no. 3, pp. 301-308.
View/Download from: Publisher's site
The performance and efficiency of a Wireless Sensor Network (WSN) is typically subject to techniques used in data routing, clustering, and localization. Being primarily driven by resource constraints, a Socionomic model has been formulated to optimize re
Chaczko, Z.C. & Kale, A.V. 2011, 'Automated Tablet Quality Assurance And Identification For Hospital Pharmacies', Kwartalnik Elektroniki i Telekomunikacji - Electronics and Telecommunications Quarterly, vol. 57, no. 2, pp. 153-158.
View/Download from: Publisher's site
The tablet quality checking and identification in hospital pharmacies is done manually and does not use any automated solution. Manual sorting and handling makes this activity laborious and error-prone. This paper describes a low cost solution that is ch
Chaczko, Z.C. & Resconi, G. 2011, 'Reasoning By SVD And Morphotronic Network', International Journal Of Electronics And Telecommunications, vol. 57, no. 2, pp. 145-152.
View/Download from: Publisher's site
The immune system of the vertebrates possess the capabilities of 'intelligent' information processing, which include memory, the ability to learn, to recognize, and to make decisions with respect to unknown situations. The mathematical formalization of t
Chiu, C.C. & Chaczko, Z.C. 2011, 'Deployment Of An Agent-based SANET Architecture For Healthcare Services', International Journal of Electronics and Telecommunications, vol. 57, no. 3, pp. 309-315.
View/Download from: Publisher's site
This paper describes the adaptation of a computational technique utilizing Extended Kohonen Maps (EKMs) and Rao-Blackwell-Kolmogorov (R-B) Filtering mechanisms for the administration of Sensor-Actuator networks (SANETs). Inspired by the BDI (Belief-Desir
Agbinya, J.I., Lee, V., Aboura, K. & Chaczko, Z.C. 2010, 'Mapping and Recognition of Radio Frequency Clutter in Various Environments in Australia', Kwartalnik Elektroniki i Telekomunikacji - Electronics and Telecommunications Quarterly, vol. 56, no. 1/2010, pp. 137-144.
View/Download from: Publisher's site
Radio frequency spectrum mapping allows determining the radio frequency signatures prevalent within an environment. We address the primary frequency bands used for cellular, wireless Local Area Network (LAN), Universal Mobile Telecommunications System (UMTS) and Ultra-wideband (UWB) communications. The purpose of the experiment presented in this paper is to map the detected radio frequencies within an environment and display the collated data on a graphical user interface. A program identifies the presence of the aforementioned radio frequency signatures and recognizes signal levels which exceed the exposure standards enforced by the Australian Communication and Media Authority. The results assist in the understanding of the ramifications of long-term exposure to radio frequency radiation associated with the continued proliferation of wireless devices.
Agbinya, J.I., Thilak, N., Ollett, A., Ibos, S., Ooi-Sanchez, Y., Brennan, M. & Chaczko, Z.C. 2010, 'Characteristics Of The Magnetic Bubble 'Cone Of Silence' In Near-Field Magnetic Induction Communications', Journal of Battlefield Technology, vol. 13, no. 1, pp. 1-35.
This paper introduces the concept of bubble factors for assessing the communication bubble created by a near-field magnetic induction (NFMI) communication system. First, the coupling coefficient as a function of distance between two magnetic transmitters is derived and used to show that the induced magnetic field reduces in proportion to the inverse sixth power of distance. This idea is used to define and analyse the communication bubble around the source. Three bubble factors are defined and shown to provide the best approach for quantifying the cone of silence around the transmitter and receiver. The decaying power based on the distance-bubble factor and receiver-load-bubble- factor shows that the transmitted power reduces by 60.25 dB/m. This provides the basis for receiver design and the distance at which interception of the NFMI communication is most secure.
Chiu, C.C., Chaczko, Z.C. & Moses, P. 2010, 'Sensor Actor Network Modeling Utilizing the Holonic Architectural Framework', International Journal of Electronics and Telecommunications, vol. 56/1, no. 2010, pp. 49-54.
View/Download from: Publisher's site
This paper discusses the results of utilizing advanced EKM modeling techniques to manage Sensor-Actor networks (SANETs) based upon the Holonic Architectural Framework. EKMs allow a quantitative analysis of an algorithmic artificial neural network process by using an indirect-mapping EKM to self-organize from a given input space to administer SANET routing and clustering functions with a control parameter space. Results demonstrate that in comparison to linear approximation techniques, indirect mapping with EKMs provide fluid control and feedback mechanisms by operating in a continuous sensory control space - thus enabling interactive detection and optimization of events in real-time environments.
Chaczko, Z.C., Agbinya, J.I. & Aboura, K. 2010, 'Software Engineering for Mapping Radio Frequency Pollution', Kwartalnik Elektroniki i Telekomunikacji - Electronics and Telecommunications Quarterly, vol. 56, no. 1/2010, pp. 129-136.
Electromagnetic fields radiation has raised concerns within several segments of the population in the past three decades. Many studies proved inconclusive, in part due to the scarcity of data. We propose the idea of a geographical model based radiation pollution database. We discuss networked sensing technology for detection and monitoring of electromagnetic fields. We elaborate on software engineering issues for the visualization in real time of electromagnetic field mappings and the dissemination of information through various means and levels of access. We propose the database be complimented by a data algorithmic software solution for the extraction of patterns.
Chaczko, Z.C., Quang, J. & Moulton, B.D. 2010, 'Knowledge transfer model for the development of software equirements analysis CASE tools to be used in cross time-zone projects', International Journal of Digital Content Technology and its Applications, vol. 4, no. 1, pp. 10-15.
View/Download from: Publisher's site
This article describes work undertaken to evaluate an approach for developing collaborative requirementsanalysis CASE tools that are specifically designed to address the needs of cross-time-zone development teams, that is, teams spread across different geographical locations around the world. Few of the software requirements analysis computer assisted software environment (CASE) tools readily available are designed specifically for cross-time-zone development activities. We propose a specifically tailored data and knowledge-transfer model, and investigate its suitability for the development of a cross-time-zone oriented CASE tool. The approach was used to develop a working prototype. The approach and prototype will be further evaluated in a collaborative undertaking involving the Wroclaw University of Technology, the University of Technology Sydney and the University of Arizona (UA).
Nikodem, J., Klempous, R., Nikodem, M., Woda, M. & Chaczko, Z.C. 2010, 'Directed Cooperation in Multihop Wireless Sensors Networks', International Journal of Electronics and Telecommunications (JET), vol. 56/1, no. 2010, pp. 7-12.
View/Download from: Publisher's site
This paper proposes a relational abstraction for Wireless Sensors Network where node can identify its neighbors around it. Because of limited radio link range only some of nodes have a direct contact with the base station and transmission is carried out in a multihop way so information is send from one node to another towards the BS. We propose a relation ? that represents cooperation between nodes and takes advantages of topological properties of the network. Based on the hop-distance from the BS any node k can determine a set N<(k) that consists of nodes to which/ k should send messages in order to retain a data-flow direction towards the BS.
Moulton, B.D., Chaczko, Z.C. & Karatovic, M. 2009, 'Updating Electronic Health Records with Information from Sensor Systems: Considerations Relating To Standards and Architecture Arising From the Development of a Prototype System', Journal of Convergence Information Technology, vol. 4, no. 4, pp. 21-26.
Several countries around the globe are moving towards national and international standards for Electronic Health Records (EHRs). One function of the standards is to guide the long-term convergence of local systems into integrated evolving national health information systems. The Australian commonwealth government is implementing a nationwide EHR system whereby every Australian will be able to upload data to his or her EHR. Thus Australians, if they wish, will eventually be able to upload data from on-body sensors and in-home monitoring systems to their EHRs. This article explores issues associated with the architecture of systems which allow medical records to be updated with information from monitoring/sensor systems. A prototype was developed to determine some of the key architectural considerations. A sensor simulator was implemented for testing purposes which allows a user of the simulator to impersonate a bed or group of in-home or on-body sensors connected with a person who is in a hospital, retirement home or private home. Findings are discussed relating to key architectural considerations including security, maintainability and modularity.
Moulton, B.D., Chaczko, Z.C. & Karatovic, M. 2009, 'Data Fusion and Aggregation Methods for Pre-Processing Ambulatory Monitoring and Remote Sensor Data for Upload to Personal Electronic Health Records', International Journal of Digital Content Technology a..., vol. 3, no. 4, pp. 120-127.
Several countries including Australia are developing standards for personal electronic health records, and in many cases the standards provide ways for patients to upload data from their own sensor systems to their electronic health records. This article explores issues relating to the design of systems where electronic medical records are updated with data or meta-data from in-home or on-body health monitoring sensor systems. A prototype system was designed, implemented and subsequently evaluated in a way intended to further understanding regarding collection and transfer of sensor data to an electronic health record. A key issue that arose was the extent to which levels of confidence in the data may be affected by the type, quality, installation, maintenance and calibration of the sensors.
Moulton, B.D., Chaczko, Z.C. & Pradhan, G. 2009, 'Voice Operated Guidance Systems for Vision Impaired People: Investigating a User-Centered Open Source Model', International Journal of Digital Content Technology and its Applications, vol. 3, no. 4, pp. 60-68.
People who have impaired vision regularly use white canes and/or guide dogs to assist in obstacle avoidance. Several electronic devices are currently available for providing guidance to a remote location, but these tend to be expensive, or make use of a Braille interface. This project investigated the suitability of a user centered client server approach for the development of a talking GPS system intended to fill a niche for outdoor wayfinding. The work resulted in a working prototype proof-of-concept system that uses a speech-recognition speech-synthesis interface. The prototype solution includes a custom web application which accesses the Google maps API. The system is intended to be scalable and extensible with additional features such as sensors for obstacle avoidance and access to web-based information such as weather, train or bus timetable information. The client server approach was found to be suitable for the development of this type of application.