Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

PDF

Series

2006

Faculty of Informatics - Papers (Archive)

Data

Articles 1 - 6 of 6

Full-Text Articles in Entire DC Network

Secure Data Transmission Using Quibits, Iman Marvian, Saied Hosseini-Khayat Jan 2006

Secure Data Transmission Using Quibits, Iman Marvian, Saied Hosseini-Khayat

Faculty of Informatics - Papers (Archive)

A quantum protocol for secure transmission of data using qubits is presented. This protocol sends one qubit in a round-trip to transmit one bit of data. The protocol offers an improvement over the BB84 QKD protocol. BB84, in conjunction with one-time pad encryption, has been shown to be unconditionally secure. However its security relies on the assumption that the qubit source device does not emit multiple replicas of the same qubit for each transmitted bit. If this happens a multi-qubit emission attack can be launched. In addition, BB84 cannot be used to send predetermined bit strings as it generates a …


Wfms-Based Data Integration For E-Learning, Jianming Yong, Jun Yan, Xiaodi Huang Jan 2006

Wfms-Based Data Integration For E-Learning, Jianming Yong, Jun Yan, Xiaodi Huang

Faculty of Informatics - Papers (Archive)

As more and more organisations and institutions are moving towards the e-learning strategy, more and more disparate data are distributed by different e-learning systems. How to effectively use this vast amount of distributed data becomes a big challenge. This paper addresses this challenge and works out a new mechanism to implement data integration for e-learning. A workflow management system based (WFMS-based) data integration model is contributed to the e-learning.


The Risk Of Public Data Availability On Critical Infrastructure Protection, Roba Abbas Jan 2006

The Risk Of Public Data Availability On Critical Infrastructure Protection, Roba Abbas

Faculty of Informatics - Papers (Archive)

This paper examines the threat of freely available information on critical infrastructure protection (CIP) efforts. Critical infrastructure are the services required to maintain the stability and security of a country, and comprise both physical and cyber infrastructures. These interdependent entities must be protected from natural disasters, accidental errors, and deliberate attacks. The CIP process typically includes vulnerability assessment, risk assessment and risk management, and has been a global concern for many years; the concern now amplified in Australia due to a number of recent events such the 9/11 attacks, and the Bali bombings. The events have called into question the …


Analyzing Harmonic Monitoring Data Using Data Mining, Ali Asheibi, David A. Stirling, Danny Sutanto Jan 2006

Analyzing Harmonic Monitoring Data Using Data Mining, Ali Asheibi, David A. Stirling, Danny Sutanto

Faculty of Informatics - Papers (Archive)

Harmonic monitoring has become an important tool for harmonic management in distribution systems. A comprehensive harmonic monitoring program has been designed and implemented on a typical electrical MV distribution system in Australia. The monitoring program involved measurements of the three-phase harmonic currents and voltages from the residential, commercial and industrial load sectors. Data over a three year period has been downloaded and available for analysis. The large amount of acquired data makes it difficult to identify operational events that impact significantly on the harmonics generated on the system. More sophisticated analysis methods are required to automatically determine which part of …


On The Design Of Early Generation Variety Trials With Correlated Data, Brian R. Cullis, A B. Smith, N. E. Coombes Jan 2006

On The Design Of Early Generation Variety Trials With Correlated Data, Brian R. Cullis, A B. Smith, N. E. Coombes

Faculty of Informatics - Papers (Archive)

This article considers the design of early generation variety trials with a prespecified spatial correlation structure and introduces a new class of partially replicated designs called p-rep designs in which the plots of standard varieties are replaced by additional plots of test lines. We show how efficient p-rep designs can be readily generated using the modified Reactive TABU search algorithm. The expected and realized genetic gain of p-rep and grid plot designs is compared in a simulation study.


Testing For Activation In Data From Fmri Experiments, Martina Pavlicova, Noel A. Cressie, Thomas J. Santner Jan 2006

Testing For Activation In Data From Fmri Experiments, Martina Pavlicova, Noel A. Cressie, Thomas J. Santner

Faculty of Informatics - Papers (Archive)

The traditional method for processing functional magnetic resonance imaging (FMRI) data is based on a voxel-wise, general linear model. For experiments conducted using a block design, where periods of activation are interspersed with periods of rest, a haemodynamic response function (HRF) is convolved with the design function and, for each voxel, the convolution is regressed on prewhitened data. An initial analysis of the data often involves computing voxel-wise two-sample t-tests, which avoids a direct specification of the HRF. Assuming only the length of the haemodynamic delay is known, scans acquired in transition periods between activation and rest are omitted, and …