Qing Tan

Qing Tan
Athabasca University · School of Computing and Information Systems

PhD in Cybernetics

About

76
Publications
57,508
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,234
Citations

Publications

Publications (76)
Article
Full-text available
Historical information in the Canadian Maritime Judiciary increases with time because of the need to archive data to be utilized in case references and for later application when determining verdicts for similar cases. However, such data are typically stored in multiple systems, making its reachability technical. Utilizing technologies like deep le...
Article
Full-text available
This research investigates the application of deep learning in sentiment analysis of Canadian maritime case law. It offers a framework for improving maritime law and legal analytic policy-making procedures. The automation of legal document extraction takes center stage, underscoring the vital role sentiment analysis plays at the document level. The...
Article
Full-text available
The swift embrace of Industry 4.0 paradigms has led to the growing convergence of Information Technology (IT) networks and Operational Technology (OT) networks. Traditionally isolated on air-gapped and fully trusted networks, OT networks are now becoming more interconnected with IT networks due to the advancement and applications of IoT. This expan...
Preprint
Full-text available
This research investigates the application of deep learning in sentiment analysis of Canadian maritime case law. It offers a framework for improving maritime law and legal analytics policy-making procedures. The automation of legal document extraction takes center stage, underscoring the vital role sentiment analysis plays at the document level. Th...
Chapter
The growing importance of technology in daily life has led to a focus on making robots think like humans to enhance the integration of humans and robots in Cyber-Physical Systems (CPS). Cognitive science and psychology offer important knowledge and tools for integrating human-like learning processes into robots. The challenge is to enhance robots w...
Chapter
The Industrial Internet of Things (IIoT) brings the ubiquitous connectivity of the Internet of Things (IoT) to industrial processes, optimizing manufacturing and civil infrastructures with assorted “smart” technologies. This ubiquitous connectivity to industrial processes has increased the attack surface available to threat actors, with increasingl...
Chapter
In this paper, we propose a Machine Learning-based approach to validate suggested learning materials. Learning material validation is an essential part of the learning process, ensuring that learners have access to relevant and accurate information. However, the process of manual validation can be time-consuming and may not be scalable. Traditional...
Article
Full-text available
Cyber-Physical Systems (CPS) are integrated systems that combine software and physical components. CPS has experienced rapid growth over the past decade in fields as disparate as telemedicine, smart manufacturing, autonomous vehicles, the Internet of Things, industrial control systems, smart power grids, remote laboratory environments, and many mor...
Article
Full-text available
Multi-robot path planning has evolved from research to real applications in warehouses and other domains; the knowledge on this topic is reflected in the large amount of related research published in recent years on international journals. The main focus of existing research relates to the generation of efficient routes, relying the collision detec...
Chapter
As the presence of Cyber-Physical Systems (CPS) becomes ubiquitous throughout all facets of modern society, malicious attacks by hostile actors have increased exponentially in recent years. Attacks on critical national infrastructure (CNI) such as oil pipelines or electrical power grids have become commonplace, as increased connectivity to the publ...
Chapter
The use of machine learning and semantic analysis in case law is the new trend in modern society. Case Based Reasoning tools are being used to analyze texts in courts to make and predict judicial decisions which are designed to base the outcomes of current court proceedings from past and or learning from the mistakes to make better decisions. Becau...
Chapter
Full-text available
To strengthen the healthcare data privacy protecting techniques and ensure the transparency of healthcare data exchange, many data privacy-preserving methods have been introduced. This paper highlights privacy concerns and introduces techniques and research directions towards data privacy in Healthcare Information Systems (HIS). The paper demonstra...
Article
Full-text available
Wildfire research is working toward near real-time tactical wildfire mapping through the application of computer vision techniques to airborne thermal infrared (IR) imagery. One issue hindering automation is the potential for waterbodies to be marked as areas of combustion due to their relative warmth in nighttime thermal imagery. Segmentation and...
Article
In this research, a coevolutionary collision free multi-robot path planning that makes use of A* is proposed. To find collision-free paths for all robots, we generate a route for each of robot using A* path finding but introducing restrictions for each collision found. Afterward, a co-evolutionary optimization process is implemented for introducing...
Chapter
Educational learning contents, usually developed by instructional designers to provide learning specification and impart knowledge and skills to learners, are often only updated or changed in the yearly course revisions. This can be presented with some challenges, especially to courses on emerging subjects and catering to diversified learners, whic...
Article
Full-text available
Education Technology advances many aspects of learning. More and more learning is taking place online. Learners’ learning behaviors, style, and performance can be easily profiled through learning analytics which collects their online learning footage. It enables and encourages educational research, learning software application development, and onl...
Chapter
Full-text available
Human Computer Interaction (HCI) focuses on the interfaces between human user and computer, which largely impacts the usability of any computer-based system involving the human user. The research program Telepresence Robot Empowered Smart Lab (TRESL) aims to enable distance learning students to experience lab work in a remote laboratory as if they...
Chapter
This paper provides use case definitions and a high-level system architecture overview for human robot interaction in a fog computing-based Human in The Loop Cyber Physical System. Our focus is to develop a practical, natural, meaningful human robot interaction framework for single and multiple avatar (CPS) robots, and this paper outlines the resea...
Chapter
Finding the shortest path for an autonomous robot in static environments has been studied for many years and many algorithms exist to solve that problem. While path finding in the static setting is very useful, it is very limiting in real world scenarios due to collisions with dynamic elements in an environment. As a result, many static path planni...
Chapter
Blockchain technology, a secure ledger of transactions distributed among a network of computers is the technology that enables value transaction on the Internet, which has the potential to create new foundations for our economic and social systems. Blockchain technology has widely been used in the finance and e-commerce industries for processing pa...
Article
Full-text available
In the context of distance education, lab and field work are a considerable challenge for students, professors, and institutions. This paper presents a Telepresence Robot Empowered Smart Lab (TRESL) system as a new and emerging technology with a potential to overcome this challenge. The main focus of this paper is to propose a conceptual model, to...
Article
Full-text available
Many industry standards and methodologies were introduced which has brought forth the management of threats assessment and risk management of information assets in a systematic manner. This paper will review and analyze the main processes followed in IT risk management frameworks from the perspective of the threat analysis process using a threat mo...
Article
Full-text available
Performance of dynamic clouds depends on the efficiency of its load balancing and resource allocation. This paper is an exploratory study on the predictive approach for dynamic resource distribution of cloud services. Efficient cloud resource management can be achieved by simulating cloud services based on the predictions of incoming workloads, whi...
Chapter
A computer programming course is a great way to foster students’ ability in critical thinking and logical thinking. Computer programming skill enables students to build applications using their creativity, and scaffolding strategy helps lecturers to guide students by providing appropriate support. In this study, we proposed a learning activity that...
Conference Paper
Full-text available
Fall detection for elder people is a very challenging task that has not been solved yet. In this population, fall detection devices must not introduce extra constraints, like carrying with a belt fixed device or a mobile phone. This paper describes one fall detection approach accomplishing with these constraints. Afterwards, a discussion on some mo...
Chapter
Full-text available
Machine Learning (ML) is the convergence of different disciplines in science and technology. While it is conceived, ML is part of computer science however, in its essence, it borrows or utilizes methods from other classic disciplines and mature computing theories and technologies, such as statistics, computational algorithms, optimization, and data...
Conference Paper
Full-text available
This paper looks into the relationship between Unified Communications (UC) and Big Data Analytics (BDA). UC has been adopted in many organizations to enhance communications while BDA has been adopted to solve the existing problems. UCs is the integration of a broad range of communication tools to provide an avenue for the most efficient exchange of...
Article
Full-text available
Currently, there is limited guidance on generic cloud software architecture model for designing and building cloud applications and each platform provider has different standards that influences the way applications are developed and written. In this paper we propose a cloud application development model based on developing services (typically REST...
Article
Full-text available
Location-based mobile learning applications harness the advantages of mobile devices to enhance learner's interaction with the learning context. This paper presents the 5R adaptation framework, the underlying concept for adaptive mobile learning management systems and mobile learning applications. The framework enriches mobile learning management s...
Article
AR technology can be considered as mainly consisting of two aspects: identification of real-world object and display of computer-generated digital contents related the identified real-world object. The technical challenge of mobile AR is to identify the real-world object that mobile device's camera aim at. In this paper, we will present a location-...
Conference Paper
With the improved elasticity of the computing landscape, resources can be added or removed on demand. These new capabilities require a closer look at the link between business processes and IT infrastructure. Therefore, it seems prudent to focus on a conceptual blueprint that will encourage research in developing pragmatic offerings in monitoring,...
Article
By superimposing digital learning content on top of the video stream of the mobile device's camera, Augmented Reality (AR) enables learners to interact with real-world context in mobile learning setting. Technically, the AR technology can be considered as consisting of two major aspects: identification of the real-world object and display of comput...
Chapter
The integration of location-based environments for formal and informal learning aims to engage learners in the analysis of objects or scenes in the real world that are used as learning objects for achieving learning objectives. Location awareness of mobile devices allows mobile devices to be able to sense and react based on location-based environme...
Conference Paper
Full-text available
With the adoption of cloud computing, a multitude of front-end mobile devices are emerging that require access to services in the cloud. Applications in the cloud are now commonly deployed as software as a service (SaaS). However, with the introduction of SaaS new security challenges need to be addressed. The challenge is to provide a single sign-o...
Article
Full-text available
It is of little surprise that falling is often accepted as a natural part of the aging process. In fact, it is the impact rather than the occurrence of falls in the elderly, which is of most concern. Aging people are typically frailer, more unsteady, and have slower reactions, thus are more likely to fall and be injured than younger individuals. Ty...
Article
Full-text available
The increasing aging of the population requires new kinds of social and medical intervention and the availability of different supportive services for elderly people. Falling is one of the events that usually occur to elderly persons with resultant morbidity ranging from soft injury through to fractures and possibly death. Due the fragility of the...
Conference Paper
Full-text available
Cloud computing can be defined as the use of new or existing computing hardware and virtualization technologies to form a shared infrastructure that enables web-based value added services. The three predominant service models are infrastructure, platform, and software-asa-service. Infrastructure-as-a-Service (IaaS) can be defined as the use of serv...
Conference Paper
Full-text available
Security within the cloud is of paramount importance as the interest and indeed utilization of cloud computing increase. Multitenancy in particular introduces unique security risks to cloud computing as a result of more than one tenant utilizing the same physical computer hardware and sharing the same software and data. The purpose of this paper is...
Conference Paper
Ubiquitous mobile computing and the advances in wireless telecommunication networks have encouraged significant growth of mobile learning in recent years. Since mobile learning can take place at anytime and anywhere, there is an advantage to integrate the real world objects into learning contents. Mobile devices have characteristics that include lo...
Conference Paper
Full-text available
Modern life has a strong tie with ICT technology, so as to the sensing technology which has played an important role than before. Its application is somewhat more than we have learned, such as education. Meanwhile, with the advance of software/hardware and the popularity of the Internet, e-books have drawn much of attention. With the introduction o...
Conference Paper
Web applications offer business and convenience services that society has become dependent on, such as online banking. Success of these applications is dependent on end user trust, although these services have serious weaknesses that can be exploited by attackers. Application owners must take additional steps to ensure the security of customer data...
Conference Paper
Use of mobile and sensor technologies in learning has emerged as a growing research area, and has given rise to a lot of research that takes advantage of learner's location, environment, proximity and situation to contextualizing the learning process. The adaptivity and personalization in these scenarios have taken a new meaning by bringing authent...
Conference Paper
Full-text available
Augmented Reality allows the user to see the virtual objects superimposed upon or composited with the real world. This paper presented the system design of the Multi-Object Oriented Augmented Reality (MOOAR) system for location-based adaptive mobile learning environment and the scenario study. Moreover, the detailed rationales behind the MOOAR syst...
Article
In this paper we present a securing patient medical images and authentication system to increase the security, confidentiality and integrity of medical images transmitted through the Internet. A public key encryption technique was used to encrypt the patient capturing fingerprint and then embed it into the patient medical image. The fingerprint has...
Article
Full-text available
Mobile devices are more powerful and portable nowadays with plenty of useful tools for assisting people handle daily life. With the advance of mobile technology, the issue of mobile learning has been widely investigated in e-learning research. Many researches consider it is important to integrate pedagogical and technical strengths of mobile techno...
Article
Emerges in the sophistication of modern mobile devices encourages re-evaluations of mobile application design principles that were ideal only several years ago. As well, several mobile application design principles for facilitating collaboration are proposed. This paper then presents a system design that addresses all the discussed principles, crea...
Conference Paper
This paper presents a collaborative mobile learning system: Mobile Virtual Campus (MVC) powered by the loction-based dynamic grouping algorithm. The MVC system has been developed to provide an innovative and interactive platform for online mobile learners by utilizing the location awareness and other built-in sensory compoments in mobile devices. O...
Conference Paper
Full-text available
This research aims to bring up a strategy called Multi-Object Oriented Augmented Reality, based on the Augmented Reality technique and the location of Mobile Learning Objects, which allows learner to see the suitable learning contents superimposed upon the specific learning objects and enhance the interactive in a mobile learning environment. The t...
Article
Full-text available
In a client-server mobile learning system, client mobile software must run on the mobile phone to acquire, package, and send student’s interaction data via the mobile communications network to the connected mobile application server. The server will receive and process the client data in order to offer appropriate content and learning activities. T...
Conference Paper
Full-text available
Location-based adaptive mobile learning utilizes a unique feature: location awareness of mobile devices in regards to other online learning to implement location-based functionalities or features to create adaptive and collaborative learning in mobile learning environment. There are many important research issues and technical challenges in the loc...
Conference Paper
Full-text available
This paper presents an infrastructure for developing problem-based pervasive learning environments. Building such environments necessitates having many autonomous components dealing with various tasks and heterogeneous distributed resources. Our proposed infrastructure is based on a multi-agent system architecture to integrate various components of...
Conference Paper
Full-text available
Giving examples to students or letting students give examples is important in ordinary instruction. However, it is difficult for teacher to provide work-out examples to students since the proper examples are depending on the contexts and varying with students' life experiences and knowledge. In order to deal with the limitation of ordinary classroo...
Conference Paper
Full-text available
This paper describes the MAA-based (Multi-Agent Architecture) location-aware service project for supporting users learning in the ubiquitous/pervasive environment. The project plans to build a MAA-based learning environment with various agents have different abilities, for examples, the agent can sense the location where the user is at; the agent c...
Conference Paper
Full-text available
A general quaternion transformation representation for robotic application is presented in this paper. By using the representation robot kinematic equation can be directly derived. A relation between Euler parameters and rotation matrix in rotation transformation is developed, which takes the computation advantage of rotation matrix when we use the...
Article
Utilizing the location-awareness of mobile devices in developing innovative mobile application system has attracted much attention of academic researchers and commercial application developers. Location-based mobile learning systems have taken the advantage of the mobile devices to enhance learner's interaction with the learning context. This paper...
Article
Full-text available
Each MIDP2 ready mobile device has its own specific operating system, Java Virtual Machine, optional JSRs, and vendor specific classes, which makes important characteristics of mobile devices: multi-platform. There is no standard running environment for mobile software in the multi-platform environment. This paper presents a mobile computing archit...

Network

Cited By