Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 113

Full-Text Articles in Physical Sciences and Mathematics

Signature-Based Document Retrieval, A. Chalechale, G. Naghdy, Alfred Mertins Dec 2003

Signature-Based Document Retrieval, A. Chalechale, G. Naghdy, Alfred Mertins

Faculty of Informatics - Papers (Archive)

This paper presents a new approach for document image decomposition and retrieval based on connected component analysis and geometric properties of the labeled regions. The database contains document images with Arabic/Persian text combined with English text, headlines, ruling lines, trademark and signature. In particular, Arabic/Persian signature extraction is investigated using special characteristics of the signature that is fairly different from English signatures. A set of efficient, invariant and compact features is extracted for validation purposes using angular-radial partitioning of the signature region. Experimental results show the robustness of the proposed method.


Sketch-Based Image Retrieval Using Angular Partitioning, A. Chalechale, G. Naghdy, Alfred Mertins Dec 2003

Sketch-Based Image Retrieval Using Angular Partitioning, A. Chalechale, G. Naghdy, Alfred Mertins

Faculty of Informatics - Papers (Archive)

This paper presents a novel approach for sketch-based image retrieval based on low-level features. The approach enables measuring the similarity between a full color image and a simple black and white sketched query and needs no cost intensive image segmentation. The proposed method can cope with images containing several complex objects in an inhomogeneous background. Abstract images are obtained using strong edges of the model image and thinned outline of the sketched image. Angular-spatial distribution of pixels in the abstract images is then employed to extract new compact and effective features using Fourier transform. The extracted features are scale and …


Monitoring Of Wheel Dressing Operations For Precision Grinding, Li Xue, Fazel Naghdy, C. Cook Dec 2003

Monitoring Of Wheel Dressing Operations For Precision Grinding, Li Xue, Fazel Naghdy, C. Cook

Faculty of Informatics - Papers (Archive)

In grinding operation, on-line process monitoring of dressing will ensure the quality of the grinding wheel and will achieve reproducible surface finish. The results of a study conducted to evaluate the feasibility and effectiveness of Acoustic Emission (AE) sensors in online monitoring of dressing is reported. Two aspects of the process are addressed. The first is the detection of undesired wheel conditions, such as an out-of-round wheel and wheel contour errors. The other is improving the surface finish of the ground workpiece by monitoring the dressing parameters. Experimental results indicate that AE signal can be effectively used to identify the …


Combinatorial Constructions Of 3- And 4-Secure Codes, Y. Wang, Jennifer Seberry, Beata J. Wysocki, Tadeusz A. Wysocki, Willy Susilo, Tianbing Xia, Y. Zhao, Le Chung Tran Dec 2003

Combinatorial Constructions Of 3- And 4-Secure Codes, Y. Wang, Jennifer Seberry, Beata J. Wysocki, Tadeusz A. Wysocki, Willy Susilo, Tianbing Xia, Y. Zhao, Le Chung Tran

Faculty of Informatics - Papers (Archive)

In this paper, 3- and 4-secure codes are constructed from combinatorial designs. Both constant weight and non-constant weight codes are shown.


Forensic Computing, X. Li, Jennifer Seberry Dec 2003

Forensic Computing, X. Li, Jennifer Seberry

Faculty of Informatics - Papers (Archive)

Technology is rapidly changing the speed and manner in which people interact with each other and with the world. As technology helps criminals to operate more easily and quickly across borders, so law enforcement capability must continuously improve to keep one step ahead. Computer forensics has become a specialized and accepted investigative technique with its own tools and legal precedents that validate the discipline. Specially designed forensic software is also widely used during the whole process of computer forensic investigation. This article introduces computer forensic and computer evidence, introduces and compares some forensic software, and summarizes its likely future development.


Living On The Edge-Plants And Global Change In Continental And Maritime Antarctica, Sharon A. Robinson, J. Wasley, A. K. Tobin Dec 2003

Living On The Edge-Plants And Global Change In Continental And Maritime Antarctica, Sharon A. Robinson, J. Wasley, A. K. Tobin

Faculty of Science - Papers (Archive)

Antarctic terrestrial ecosystems experience some of the most extreme growth conditions on Earth and are characterised by extreme aridity and sub-zero temperatures. Antarctic vegetation is therefore at the physiological limits of survival and, as a consequence, even slight changes to growth conditions are likely to have a large impact, rendering Antarctic terrestrial communities sensitive to climate change. Climate change is predicted to affect the high latitude regions first and most severely. In recent decades, the Antarctic has undergone significant environmental change, including the largest increases in ultraviolet B (UV-B; 290-320nm) radiation levels in the world and, in the maritime region …


Tolerance Of Control-Flow Testing Criteria, S. A. Vilkomir, K. Kapoor, J. P. Bowen Nov 2003

Tolerance Of Control-Flow Testing Criteria, S. A. Vilkomir, K. Kapoor, J. P. Bowen

Faculty of Informatics - Papers (Archive)

Effectiveness of testing criteria is the ability to detect failure in a software program. We consider not only effectiveness of some testing criterion in itself but a variance of effectiveness of different test sets satisfied the same testing criterion. We name this property "tolerance" of a testing criterion and show that, for practical using a criterion, a high tolerance is as well important as high effectiveness. The results of empirical evaluation of tolerance for different criteria, types of faults and decisions are presented. As well as quite simple and well-known control-flow criteria, we study more complicated criteria: full predicate coverage, …


Extreme Marine Inundations (Tsunamis?) Of Coastal Western Australia, J. Nott, Edward A. Bryant Nov 2003

Extreme Marine Inundations (Tsunamis?) Of Coastal Western Australia, J. Nott, Edward A. Bryant

Faculty of Science - Papers (Archive)

Along 2500 km of the Western Australian coast, prehistoric ephemeral marine inundations (storm surges or tsunamis) were much larger than those that occurred since European settlement. The evidence is in the form of shell and coral deposits atop 30-m-high headlands, sand deposits containing large boulders, shell and coral several kilometers inland, and fields of large imbricated boulders across shore platforms. The size of transported boulders and the altitude of these deposits suggest that tsunamis were responsible, not large storm waves. The orientation of boulders reveals paleowave directions. Radiocarbon dating of the deposits suggest three very large tsunamis along this coast …


Reducing Redundancy In The Hypertree Decomposition Scheme, Peter Harvey, Aditya K. Ghose Nov 2003

Reducing Redundancy In The Hypertree Decomposition Scheme, Peter Harvey, Aditya K. Ghose

Faculty of Informatics - Papers (Archive)

Hypertree decomposition is a powerful technique for transforming near-acyclic CSPs into acyclic CSPs. Acyclic CSPs have efficient, polynomial time solving techniques, and so these conversions are of interest to the constraints community. We present here an improvement on the opt-k-decomp algorithm for finding an optimal hypertree decomposition.


Fading Characteristics For Indoor Wireless Channels At 5 Ghz Unlicensed Bands, M. Carroll, Tadeusz A. Wysocki Oct 2003

Fading Characteristics For Indoor Wireless Channels At 5 Ghz Unlicensed Bands, M. Carroll, Tadeusz A. Wysocki

Faculty of Informatics - Papers (Archive)

The paper reports on experiments undertaken at the University of Wollongong to characterise fading profiles of indoor wireless channels at the 5 GHz bands. The measurements were undertaken at different locations around the campus with results recorded for post-processing to calculate the Rician k-factor, the level crossing rate and the average fade duration.


Performance Measurement Of Watermark Embedding Patterns, R. Scealy, R. Safavi-Naini, N. P. Sheppard Oct 2003

Performance Measurement Of Watermark Embedding Patterns, R. Scealy, R. Safavi-Naini, N. P. Sheppard

Faculty of Informatics - Papers (Archive)

Segmented watermarking is an approach to multiple watermarking that can be used to acknowledge the contribution of multiple authors or to embed a fingerprint code-word, but is susceptible to cropping attacks that discard portions of the watermarked media. Careful selection of the watermark embedding pattern can increase the resilence of a segmented watermark in the presence of cropping attacks. In this paper, we consider performance measures for embedding patterns and compare the performance of several proposed embedding patterns using these measures.


Lie Analysis Of The Webster Horn Equation With Application To Audio Object Recognition, Tania M. Barrett, Ian S. Burnett, Jason Lukasiak Oct 2003

Lie Analysis Of The Webster Horn Equation With Application To Audio Object Recognition, Tania M. Barrett, Ian S. Burnett, Jason Lukasiak

Faculty of Informatics - Papers (Archive)

The Webster horn equation describes the pressure wave in a duct of slowly varying cross section. We discuss symmetry reductions and exact solutions of the Webster horn equation using the classical Lie method of infinitesimals. The particular case of the exponential horn is examined and a complete set of reductions and solutions is formulated. The generation of a complete set of solutions using Lie analysis produces a set of group transformations. Particular attention is given to a new solution found, which contains an exponentially decaying Bessel function. The use of these group transformations as a tool for audio object recognition …


Web Agents For Requirements Consistency Management, Z. Chen, Aditya K. Ghose Oct 2003

Web Agents For Requirements Consistency Management, Z. Chen, Aditya K. Ghose

Faculty of Informatics - Papers (Archive)

Inconsistency handling is an aspect of requirements engineering that has attracted considerable research attention. We explore novel ways to applying semantic Web technologies to this problem, in the context of a Web-based agent-mediated environment for distributed requirements engineering.


Line Segment Distribution Of Sketches For Persian Signature Recognition, A. Chalechale, Alfred Mertins Oct 2003

Line Segment Distribution Of Sketches For Persian Signature Recognition, A. Chalechale, Alfred Mertins

Faculty of Informatics - Papers (Archive)

A novel fast method for line segment extraction based on chain code representation of thinned sketches (or edge maps) is presented and exploited for Persian signature recognition. The method has a parallel nature and can be employed on parallel machines. It breaks the macro chains into several micro chains after applying shifting, smoothing and differentiating. The micro chains are then approximated by straight line segments. Length and position distributions of the extracted line segments are used to make a compact feature vector for Iranian cursive signature. The feature vector is invariant under affine transforms and can be used effectively in …


A Fully Snr, Spatial And Temporal Scalable 3dspiht-Based Video Coding Algorithm For Video Streaming Over Heterogeneous Networks, H. Danyali, Alfred Mertins Oct 2003

A Fully Snr, Spatial And Temporal Scalable 3dspiht-Based Video Coding Algorithm For Video Streaming Over Heterogeneous Networks, H. Danyali, Alfred Mertins

Faculty of Informatics - Papers (Archive)

Video streaming over heterogeneous networks (e.g. the Internet) requires high degree of scalability from the video coding. To achieve all types of scalability required for a fully scalable video coding, a modification of the 3DSPIHT algorithm is presented in this paper. The proposed algorithm, called fully scalable 3DSPIHT (FS-3DSPIHT), adds spatial and temporal scalability features to the 3DSPIHT algorithm, through the introduction of resolution dependent lists and a resolution-dependent sorting pass. The important features of the original 3DSPIHT coder such as compression efficiency and full embeddedness are kept. The output bitstream of the FS-3DSPIHT encoder consists of a set of …


Trends In The Selection Of Automatic Identification Technology In Electronic Commerce Applications, Katina Michael Oct 2003

Trends In The Selection Of Automatic Identification Technology In Electronic Commerce Applications, Katina Michael

Faculty of Informatics - Papers (Archive)

Since the 1970s, automatic identification (auto-ID) technologies have been evolving to revolutionise the way people live and work. Previous research has not addressed auto-ID technological innovation as a field of study, despite its growing importance on consumer, business and government electronic commerce (EC) applications. This paper is specifically concerned with five auto-ID technologies, bar codes, magnetic-stripe card, smart card, biometrics and radiofrequency identification (RF/ID) tags and transponders. Using multiple embedded case studies and applying the fundamental concepts of the systems of innovation (SI) approach, the overall aim is to understand the selection environment of the auto-ID industry. The results show …


Mpeg-21: Goals And Achievements, I. Burnett, R. Van De Walle, K. Hill, J. Bormans, F. Pereira Oct 2003

Mpeg-21: Goals And Achievements, I. Burnett, R. Van De Walle, K. Hill, J. Bormans, F. Pereira

Faculty of Informatics - Papers (Archive)

MPEG-21 is an open standards-based framework for multimedia delivery and consumption. It aims to enable the use of multimedia resources across a wide range of networks and devices. We discuss MPEG-21's parts, achievements, ongoing activities, and opportunities for new technologies.


The Reporting Of Distribution Power Quality Surveys, V. J. Gosbell, Alex Baitch, M. H. Bollen Oct 2003

The Reporting Of Distribution Power Quality Surveys, V. J. Gosbell, Alex Baitch, M. H. Bollen

Faculty of Informatics - Papers (Archive)

Power quality surveys can contain a large amount of data for many sites and several utilities. A reporting format needs to be adopted which gives useful insights without sacrificing detail. It is recommended that a three level structure be adopted with site, network and utility component styles. The first of these is the presentation of the raw data in slightly abbreviated form while the second allows all sites in one network to be ranked according to severity of their power quality disturbances. Utility reporting allows comparison between the overall power quality performance of different utilities in benchmarking studies. Some new …


Securing Mobile Ip Enabled Laptop, Rungrat Wiangsripanawan, R. Safavi-Naini, Willy Susilo Sep 2003

Securing Mobile Ip Enabled Laptop, Rungrat Wiangsripanawan, R. Safavi-Naini, Willy Susilo

Faculty of Informatics - Papers (Archive)

Mobile IP Onternet Protocol) enables access to the Internet anywhere with one IP address, hence, providing the flexibility that is required by today’s growing mobile work force. Deploying Mobile IP introduces new security h a t s that if not carefully addressed can have severe consequences for home organizations. IPSec is a commonly used protection mechanism that is employed in this context. IPSec requires a flexible key management scheme to provide cryptographic keys to communicating entities. A commonly used public key based key management system is SKIP (Simple Key-Management for Internet Protocols). In this paper we consider the scenario where …


Tcmca: A Source-Based Distributed Topology Control Algorithm For Mission Critical Applications In Mobile Ad-Hoc Networks, G. Srivastava, P. Boustead, Joe F. Chicharo, C. Ware Sep 2003

Tcmca: A Source-Based Distributed Topology Control Algorithm For Mission Critical Applications In Mobile Ad-Hoc Networks, G. Srivastava, P. Boustead, Joe F. Chicharo, C. Ware

Faculty of Informatics - Papers (Archive)

Topology control in a wireless ad-hoc network allows better spatial reuse of the wireless channel and network resources. The existing topology control algorithms tend to optimise network power usage by keeping the topology connected but do not take the network application requirements into account. Mission critical applications which require explicit end-to-end bandwidth and delay guarantees may not find enough resources in the network with the existing network topology. We have devised a topology control algorithm for mission critical applications (TCMCA) in wireless ad-hoc networks, which adapts the network topology to improve the available resources for a set of mission critical …


Web Filtering Using Text Classification, R. Du, R. Safavi-Naini, Willy Susilo Sep 2003

Web Filtering Using Text Classification, R. Du, R. Safavi-Naini, Willy Susilo

Faculty of Informatics - Papers (Archive)

No abstract provided.


Resource Aware Information Dissemination In Ad Hoc Networks, Justin Lipman, P. Boustead, Joe F. Chicharo, J. Judge Sep 2003

Resource Aware Information Dissemination In Ad Hoc Networks, Justin Lipman, P. Boustead, Joe F. Chicharo, J. Judge

Faculty of Informatics - Papers (Archive)

Information dissemination (flooding) forms an integral part of routing protocols, network management, service discovery and information collection (sensing). Given the broadcast nature of ad hoc network communications, information dissemination provides a challenging problem. This paper introduces Utility Based Flooding (UBF). UBF is a distributed optimised flooding mechanism for ad hoc networks that unlike existing optimised flooding algorithms is fully resource aware. Resource awareness is achieved by assigning a forwarding utility to neighouring nodes to determining the desirability of a neighbouring node in continuing a flood. UBF is particularly applicable to ad hoc network environments composed of heterogeneous nodes that may …


Provisioning Content Distribution Networks Over Shared Infrastructure, T. V. Nguyen, Chuntung Chou, P. Boustead Sep 2003

Provisioning Content Distribution Networks Over Shared Infrastructure, T. V. Nguyen, Chuntung Chou, P. Boustead

Faculty of Informatics - Papers (Archive)

The current paradigm of content distribution networks (CDN) deployment requires heavy infrastructure investment since a large number of servers have to be deployed over a wide area. To overcome this difficulty, we propose a new paradigm where future CDNs are to be deployed over a leased server infrastructure. This paradigm shift changes the object placement problem in current CDNs to a combined object placement and resource provisioning problem. In this paper, we present a formulation of this problem, which is a combinatorial optimization, and prove its NP-hardness. We also present a heuristic solution to this problem based on Lagrangian relaxation …


A Novel Dynamic Key Management Scheme For Secure Multicasting, J. Zhang, V. Varadharajan, Y. Mu Sep 2003

A Novel Dynamic Key Management Scheme For Secure Multicasting, J. Zhang, V. Varadharajan, Y. Mu

Faculty of Informatics - Papers (Archive)

We propose a new secure multicast scheme based on a novel hybrid key distribution scheme. This scheme meets the requirements described in the Internet Engineering Task Force (IETF) for multicast security architecture. It exhibits certain unique advantages in security services over existing schemes in the area of dynamic group key management. Our scheme allows efficient mechanisms for group members to join and leave a group frequently.


Fragile Watermark Based On Polarity Of Pixel Points, C. Kailasanathan Sep 2003

Fragile Watermark Based On Polarity Of Pixel Points, C. Kailasanathan

Faculty of Informatics - Papers (Archive)

A fragile watermarking scheme for authenticating images based on the Yeung-Mintzer scheme is proposed in this paper. This scheme does provide a better protection against all the attacks proposed for Yeung-Mintzer scheme. A polar set derived from the image blocks is used in the embedding process. The center pixel values of image blocks are perturbed by small quantities in such a way that the perceptual quality of the image is not modified. This paper also analyse the security level with respect to other attacks.


Flexible Multichannel Blind Deconvolution, An Investigation, Ah Chung Tsoi, L. S. Ma Sep 2003

Flexible Multichannel Blind Deconvolution, An Investigation, Ah Chung Tsoi, L. S. Ma

Faculty of Informatics - Papers (Archive)

In this paper, we consider the issue of devising a flexible nonlinear function for multichannel blind deconvolution. In particular, we consider the underlying assumption of the source probability density functions. We consider two cases, when the source probability density functions are assumed to be uni-modal, and multimodal respectively. In the unimodal case, there are two approaches: Pearson function and generalized exponential function. In the multimodal case, there are three approaches: mixture of Gaussian functions, mixture of Pearson functions, and mixture of generalized exponential functions. It is demonstrated through an illustrating example that the assumption on the source probability density functions …


Mmse Design Of Redundant Fir Precoders For Arbitrary Channel Lengths, Alfred Mertins Sep 2003

Mmse Design Of Redundant Fir Precoders For Arbitrary Channel Lengths, Alfred Mertins

Faculty of Informatics - Papers (Archive)

The joint design of transmitter and receiver for multichannel data transmission over dispersive channels is considered. The design criterion is the minimization of the mean squared error (MSE) at the receiver output under the constraint of a fixed transmit power. The focus is on the practically important case where the transmitter employs finite impulse response (FIR) filters, and the channel impulse response has arbitrary length. The proposed algorithm allows a straightforward transmitter design and generally yields near-optimal solutions for the transmit filters. Under certain conditions, the exact solutions for optimum block transmission, as known from the literature, are obtained.


Secure Computations On Handheld Devices With The Help Of An Untrusted Server, Jianyong Huang, Willy Susilo, Jennifer Seberry Jul 2003

Secure Computations On Handheld Devices With The Help Of An Untrusted Server, Jianyong Huang, Willy Susilo, Jennifer Seberry

Faculty of Informatics - Papers (Archive)

Recently, handheld devices have become one of the most popular computing tools. Although handheld devices are able to perform anything that a PC can do, their lack of computing power makes it next to impossible to perform some heavy calculations. Hence it appears very useful to have a combination of a handheld with a PC, where the PC can perform heavy calculations to assist the handheld. However, we must be assured that the PC will not have learnt anything from the interaction. In this paper, we show two schemes which involve some server-aided computation where the server has not learnt …


Design And Implementation Of Personal Firewalls For Handheld Devices, Jianyong Huang, Willy Susilo, Jennifer Seberry Jul 2003

Design And Implementation Of Personal Firewalls For Handheld Devices, Jianyong Huang, Willy Susilo, Jennifer Seberry

Faculty of Informatics - Papers (Archive)

Personal Digital Assistants (PDAs) have become one of the important tools in our life. Their popularity are due to their small size and mobility which enable them to be carried anywhere. Along with their popularity, handheld devices are starting to become the target for the attackers, who are mainly interested in gaining the data stored in handheld de-vices. Therefore, security of handheld devices have attracted a lot of attention in an effort to protect the sensitive information stored in handheld devices. Securing handheld de-vices is a daunting task. It requires a careful design since the devices have very limited computational …


The Positive Model For Offshore Team Teaching, Penelope Mcfarlane, A. Fuller, K. Lam Jul 2003

The Positive Model For Offshore Team Teaching, Penelope Mcfarlane, A. Fuller, K. Lam

Faculty of Informatics - Papers (Archive)

Like many western universities, the University of Wollongong is offering degrees to an increasing number of offshore students. Our usual offshore teaching model involves intensive delivery of course material. Disadvantages of this model include the brevity of student contact with the UOW academic and delays in response to student questions and concerns regarding the subject. We discuss some results of an experiment using inexpensive and readily available Internet technologies to overcome those disadvantages.