Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Faculty of Informatics - Papers (Archive)

Discipline
Keyword
Publication Year

Articles 1 - 30 of 2013

Full-Text Articles in Physical Sciences and Mathematics

A Novel Approach To Data Deduplication Over The Engineering-Oriented Cloud Systems, Zhe Sun, Jun Shen, Jianming Young Jan 2013

A Novel Approach To Data Deduplication Over The Engineering-Oriented Cloud Systems, Zhe Sun, Jun Shen, Jianming Young

Faculty of Informatics - Papers (Archive)

This paper presents a duplication-less storage system over the engineering-oriented cloud computing platforms. Our deduplication storage system, which manages data and duplication over the cloud system, consists of two major components, a front-end deduplication application and a mass storage system as back-end. Hadoop distributed file system (HDFS) is a common distribution file system on the cloud, which is used with Hadoop database (HBase). We use HDFS to build up a mass storage system and employ HBase to build up a fast indexing system. With a deduplication application, a scalable and parallel deduplicated cloud storage system can be effectively built up ...


Identity-Based Traitor Tracing With Short Private Key And Short Ciphertext, Fuchun Guo, Yi Mu, Willy Susilo Dec 2012

Identity-Based Traitor Tracing With Short Private Key And Short Ciphertext, Fuchun Guo, Yi Mu, Willy Susilo

Faculty of Informatics - Papers (Archive)

Identity-based traitor tracing (IBTT) scheme can be utilized to identify a private (decryption) key of any identity that is illegally used in an identity-based broadcast encryption scheme. In PKC'07, Abdalla et al. proposed the first IBTT construction with short private key. In CCS'08, Boneh and Naor proposed a public-key traitor tracing, which can be extended to IBTT with short ciphertext. With a further exploration, in this paper, we propose the first IBTT with short private key and short ciphertext. Private key and ciphertext are both order of O(l 1+l 2), where l 1 is the bit ...


Implementing Vertical And Horizontal Engineering Students' Integration And Assessment Of Consequence Academic Achievement, Sarim Al-Zubaidy, Nidhal Abdulaziz, Reza Dashtpour Jul 2012

Implementing Vertical And Horizontal Engineering Students' Integration And Assessment Of Consequence Academic Achievement, Sarim Al-Zubaidy, Nidhal Abdulaziz, Reza Dashtpour

Faculty of Informatics - Papers (Archive)

Recent scholarship references indicate that integration of the student body can result in an enhanced learning experience for students and also greater satisfaction. This paper reports the results of a case study whereby mechanical engineering students studying at a newly established branch campus in Dubai of a British university were exposed to vertical and horizontal integration. Different activities have been embedded to ensure that students integrated and worked together with their peers and colleagues at different levels. The implemented processes and practices led to improved academic achievements, which were better than those of a similar cohort of students where no ...


Determinants Of Rfid Technology Adoption Intention In The Saudi Retail Industry: An Empirical Study, Salem Alqahtani, S. F. Wamba Jan 2012

Determinants Of Rfid Technology Adoption Intention In The Saudi Retail Industry: An Empirical Study, Salem Alqahtani, S. F. Wamba

Faculty of Informatics - Papers (Archive)

Drawing both on innovation diffusion theory and Radio frequency identification (RFID) technology, this paper assesses the influence of a set of determinants on the intention of Saudi Arabian retail firms to adopt RFID technology. In this study, a two-phase, multi-method approach was used. In the first phase, an interview-based case study was used, while in the second phase, we conducted a survey to gather data from 7 large retailers in Saudi Arabia. Our findings indicate that while the RFID relative advantage, the top management support and information intensity do not have any influence on the intention of Saudi Arabia retail ...


Rfid-Enabled Healthcare Applications, Issues And Benefits: An Archival Analysis (1997-2011), S F. Wamba Jan 2012

Rfid-Enabled Healthcare Applications, Issues And Benefits: An Archival Analysis (1997-2011), S F. Wamba

Faculty of Informatics - Papers (Archive)

In this paper, a comprehensive review of articles published between 1997 and 2011 in the Journal of Medical Systems (JMS) on RFID technology is presented. A total of 22 papers are analyzed using a classification framework that has three dimensions: RFID-enabled healthcare applications, RFID-enabled healthcare issues, and RFID-enabled healthcare benefits. In addition, an invitation sent to all authors of the papers accepted for the special issue on RFID for the JMS allows them to position their various papers within the classification framework. Finally, a list of future research directions is presented.


Semi-Analytical Solutions For Dispersive Shock Waves In Colloidal Media, Timothy R. Marchant, N. F. Smyth Jan 2012

Semi-Analytical Solutions For Dispersive Shock Waves In Colloidal Media, Timothy R. Marchant, N. F. Smyth

Faculty of Informatics - Papers (Archive)

The diffractive resolution of a discontinuity at the edge of an optical beam in a colloidal suspension of spherical dielectric nanoparticles by a collisionless shock, or undular bore, is studied. The interaction of the nanoparticles is modelled as a hard-sphere gas with the Carnahan-Starling formula used for the gas compressibility. The governing equation is a focusing nonlinear Schr¨odinger-type equation with an implicit nonlinearity. It is found that the discontinuity is resolved through the formation of a dispersive shock wave which forms before the eventual onset of modulational instability. A semi-analytical solution is developed in the 1 + 1 dimensional case ...


Business Value Of Rfid-Enabled Healthcare Transformation Projects, Anand Abijith, S. F. Wamba Jan 2012

Business Value Of Rfid-Enabled Healthcare Transformation Projects, Anand Abijith, S. F. Wamba

Faculty of Informatics - Papers (Archive)

Purpose – This paper aims to assess the business value realised from radio frequency identification (RFID)-enabled healthcare transformation projects as compared with other industries. The paper starts with a review of RFID technology in the healthcare industry and further extends to an in-depth analysis of mini-case studies collected from RFID Journal, a leading professional journal dedicated to RFID technology, in order to identify the major benefits of the implementation of RFID systems as well as its business value achieved. In addition, there is further analysis that is being carried out on other industries to have an overview of the benefits ...


A Cloud-Based Design Of Smart Car Information Services, Yi Xu, Jun Yan Jan 2012

A Cloud-Based Design Of Smart Car Information Services, Yi Xu, Jun Yan

Faculty of Informatics - Papers (Archive)

"Although modern Smart Car technologies are growing rapidly, there are many challenges to be addressed. The limited processing capabilities of the contemporary in-car computers in smart cars may cause bottlenecks in smart control. The content in smart car applications can hardly be extended. In addition, the traditional software installation approach that is used in smart cars is neither economical nor convenient. To address these issues in smart cars, this paper presents a Cloud-based Information Integration Platform that has the ability to improve flexibility and enhance the value of smart cars. In this work, the architecture of the Cloud-based Information Integration ...


Enhancing The Perceived Visual Quality Of A Size Invariant Visual Cryptography Scheme, Yang-Wai Chow, Willy Susilo, Duncan S Wong Jan 2012

Enhancing The Perceived Visual Quality Of A Size Invariant Visual Cryptography Scheme, Yang-Wai Chow, Willy Susilo, Duncan S Wong

Faculty of Informatics - Papers (Archive)

Two of the main areas of research in visual cryptography have been on improving the visual quality of the recovered image and in reducing the pixel expansion of the shares. This paper addresses both of these visual cryptography issues. First, a method to enhance the perceived visual quality of the recovered image using various image filtering techniques is presented. In particular, these image filtering techniques are used to enhance the local and global contrasts of a grayscale image. Second, a multi-pixel block size invariant visual cryptography scheme that maintains the relative density of local neighboring pixels is proposed. This method ...


Anisotropic Coupled Diffusion Filter And Binarization For The Electronic Speckle Pattern Interferometry Fringes, Fang Zhang, Zhitao Xiao, Jun Wu, Lei Geng, Hongqiang Li, Jiangtao Xi, Jin Jiang Wang Jan 2012

Anisotropic Coupled Diffusion Filter And Binarization For The Electronic Speckle Pattern Interferometry Fringes, Fang Zhang, Zhitao Xiao, Jun Wu, Lei Geng, Hongqiang Li, Jiangtao Xi, Jin Jiang Wang

Faculty of Informatics - Papers (Archive)

In this paper novel approaches based on anisotropic coupled diffusion equations are presented to do filter and binarization for ESPI fringes. An advantageous characteristic associated with the proposed technique is that diffusion takes place mainly along the direction of the edge. Therefore, the proposed anisotropic coupled diffusion filter method can avoid blur of the fringe edge and protect the useful information of the fringe patterns. The anisotropic coupled diffusion binarization, which can repair the image boundary anisotropically, is able to avoid the redundant burr. More important, it can be directly applied to the noisy ESPI fringe patterns without much preprocessing ...


A Unified Study Of Epidemic Routing Protocols And Their Enhancements, Zuyong Feng, Kwan-Wu Chin Jan 2012

A Unified Study Of Epidemic Routing Protocols And Their Enhancements, Zuyong Feng, Kwan-Wu Chin

Faculty of Informatics - Papers (Archive)

Epidemic protocols belong to a class of routing paradigm that have wide ranging applications in Delay Tolerant Networks (DTNs) due to their simplicity, low delays, and little to no reliance on special nodes. To this end, a comprehensive study of their performance will serve as an important guide to future protocol designers. Unfortunately, to date, there is no work that studies epidemic routing protocols using a common framework that evaluates their performance objectively using the same mobility model and parameters. To this end, we study four categories of epidemic routing protocols. Namely, P-Q epidemic, epidemic with Time-To-Live (TTL), epidemic with ...


Aged Care It In Australia-The Past, Present And Future, Ping Yu Jan 2012

Aged Care It In Australia-The Past, Present And Future, Ping Yu

Faculty of Informatics - Papers (Archive)

This paper reviews the development of aged care IT innovations in Australia in the past decade. It starts with a brief description of the establishment of the Aged Care eConnect project by the Commonwealth Department of Health and Ageing to promote aged care IT. This is followed by a snapshot of the aged care associations' and research groups' promotional activities. The roles of government, industry peak bodies, aged care providers, aged care IT application providers and researchers for the diffusion of aged care IT innovations are analysed.


Dynamical Random-Set Modeling Of Concentrated Precipitation In North America, Noel Cressie, Renato Assuncao, Scott H. Holan, Michael Levine, Orietta Nicolis, Jun Zhang, Jian Zou Jan 2012

Dynamical Random-Set Modeling Of Concentrated Precipitation In North America, Noel Cressie, Renato Assuncao, Scott H. Holan, Michael Levine, Orietta Nicolis, Jun Zhang, Jian Zou

Faculty of Informatics - Papers (Archive)

In order to study climate at scales where policy decisions can be made, regional climate models (RCMs) have been developed with much finer resolution (~50 km) than the ~500 km resolution of atmosphere-ocean general circulation models (AOGCMs). The North American Regional Climate Change Assessment Program (NARCCAP) is an international program that provides 50-km resolution climate output for the United States, Canada, and northern Mexico. In Phase I, there are six RCMs, from which we choose one to illustrate our methodology. The RCMs are updated every 3 hours and contain a number of variables, including temperature, precipitation, wind speed, wind direction ...


Combining Outputs From The North American Regional Climate Change Assessment Program By Using A Bayesian Hierarchical Model, Emily L. Kang, Noel Cressie, Stephan R. Sain Jan 2012

Combining Outputs From The North American Regional Climate Change Assessment Program By Using A Bayesian Hierarchical Model, Emily L. Kang, Noel Cressie, Stephan R. Sain

Faculty of Informatics - Papers (Archive)

We investigate the 20-year-average boreal winter temperatures generated by an ensemble of six regional climate models (RCMs) in phase I of the North American Regional Climate Change Assessment Program. We use the long-run average (20-year integration) to smooth out variability and to capture the climate properties from the RCM outputs. We find that, although the RCMs capture the large-scale climate variation from coast to coast and from south to north similarly, their outputs can differ substantially in some regions. We propose a Bayesian hierarchical model to synthesize information from the ensemble of RCMs, and we construct a consensus climate signal ...


Transport Commons: A Community Based Public Transport System, Farzad Safaei Jan 2012

Transport Commons: A Community Based Public Transport System, Farzad Safaei

Faculty of Informatics - Papers (Archive)

In this paper we present a generalization of the concept of car-pooling for a public transport system, in which members of the community donate their trips to the 'transport commons'. The proposed system will then match the passengers to vehicles based on a range of criteria, including trip times, personal choices and economic incentives. We develop an analytical model to determine the probability of obtaining a ride from the transport commons in a worst-case scenario. The results of the analysis as well as simulation study demonstrate that the transport commons can provide a practical basis for a dependable public transport ...


Grounding Locations Assessment Of Practical Power System, Nadheer Shalash, Ahmed M. Haidar, Abdul Sattar Jan 2012

Grounding Locations Assessment Of Practical Power System, Nadheer Shalash, Ahmed M. Haidar, Abdul Sattar

Faculty of Informatics - Papers (Archive)

Grounding Points (GPs) are installed in electrical power system to drive protective devices and accomplish the person- nel safety. The general grounding problem is to find the optimal locations of these points so that the security and reli- ability of power system can be improved. This paper presents a practical approach to find the optimal location of GPs based on the ratios of zero sequence reactance with positive sequence reactance (X0/X1), zero sequence resistance with positive sequence reactance (R0/X1) and Ground Fault Factor (GFF). The optimal values of these indicators were deter- mined by considering several scenarios of ...


The Idio-Technopolis [Editorial], Katina Michael Jan 2012

The Idio-Technopolis [Editorial], Katina Michael

Faculty of Informatics - Papers (Archive)

The rapid rise of social media has brought with it an emphasis on the distinct dimensions of the whole person. Social media recognizes that the individual has a personal network of extensions – a home life, a work life, a social life, a study life, a hobbyist life, and much more – some of these identities even hidden from full view. Each of these online value networks are now accessible by big business, where opinion leaders and early adopters are easily distinguishable, and where brand commentary between consumers matters manifold more than any form of targeted advertising.


Solitary Waves And Their Stability In Colloidal Media: Semi-Analytical Solutions, Timothy R. Marchant, N F. Smyth Jan 2012

Solitary Waves And Their Stability In Colloidal Media: Semi-Analytical Solutions, Timothy R. Marchant, N F. Smyth

Faculty of Informatics - Papers (Archive)

Spatial solitary waves in colloidal suspensions of spherical dielectric nanopartides are considered. The interaction of the nanoparticles is modelled as a hard-sphere gas, with the Carnahan-Starling formula used for the gas compressibility. Semi-analytical solutions, for both one and two spatial dimensions, arc derived using an averaged Lagrangian and suitable trial functions for the solitary waves. Power versus propagation constant curves and neutral stability curves are obtained for both cases, which illustrate that multiple solution branches occur for both the one and two dimensional geometries. For the one-dimensional case it is found that three solution branches (with a bistable regime) occur ...


Generalised Diffusive Delay Logistic Equations: Semi-Analytical Solutions, H Y. Alfifi, Timothy R. Marchant, M I. Nelson Jan 2012

Generalised Diffusive Delay Logistic Equations: Semi-Analytical Solutions, H Y. Alfifi, Timothy R. Marchant, M I. Nelson

Faculty of Informatics - Papers (Archive)

This paper considers semi-analytical solutions for a class of generalised logis- tic partial dierential equations with both point and distributed delays. Both one and two-dimensional geometries are considered. The Galerkin method is used to approximate the governing equations by a system of ordinary dierential delay equations. This method involves assuming a spatial structure for the solution and averaging to obtain the ordinary dierential delay equation models. Semi-analytical results for the stability of the system are derived with the critical parameter value, at which a Hopf bifurcation occurs, found. The results show that diusion acts to stabilise the system, compared to ...


Perfect Ambiguous Optimistic Fair Exchange, Yang Wang, Man Ho Allen Au, Willy Susilo Jan 2012

Perfect Ambiguous Optimistic Fair Exchange, Yang Wang, Man Ho Allen Au, Willy Susilo

Faculty of Informatics - Papers (Archive)

Protocol for fair exchange of digital signatures is essential in many applications including contract signing, electronic commerce, or even peer-to-peer file sharing. In such a protocol, two parties, Alice and Bob, would like to exchange digital signatures on some messages in a fair way. It is known that a trusted arbitrator is necessary in the realization of such a protocol. We identify that in some scenarios, it is required that prior to the completion of the protocol, no observer should be able to tell whether Alice and Bob are conducting such an exchange. Consider the following scenario in which Apple ...


An Experimental Determination Of Perceived Liveability In Sydney, Mohammad-Reza Namazi-Rad, Pascal Perez, Matthew Berryman, Francois Lamy Jan 2012

An Experimental Determination Of Perceived Liveability In Sydney, Mohammad-Reza Namazi-Rad, Pascal Perez, Matthew Berryman, Francois Lamy

Faculty of Informatics - Papers (Archive)

The term liveability is used to evaluate the quality of life in a region based on the surrounding physical environment and different location-based social elements. Having a reliable measurement of general well-being of individuals and societies can help the government and non-government organizations planning for better infrastructure. However, a variety of factors can impact the social perception of local environmental conditions, many of which are difficult to measure. This makes different liveability concepts quite challenging to be evaluated. In collaboration with the IRIS Research, we have conducted a Computer Assisted Telephone Interviewing (CATI) survey on perceived liveability. This measures the ...


New Constructions Of Osbe Schemes And Their Applications In Oblivious Access Control, Jinguang Han, Willy Susilo, Yi Mu, Jun Yan Jan 2012

New Constructions Of Osbe Schemes And Their Applications In Oblivious Access Control, Jinguang Han, Willy Susilo, Yi Mu, Jun Yan

Faculty of Informatics - Papers (Archive)

Oblivious signature-based envelope (OSBE) schemes have demonstrated their potential applications in the protection of users privacy and rights. In an OSBE protocol, an encrypted message can only be decrypted by the receiver who holds a valid signature on a public message, while the sender (encrypter) does not know whether the receiver has the signature or not. Our major contributions in this work lie in the following aspects. We improve the notion of OSBE so that a valid credential holder cannot share his/her credential with other users (i. e., all-or-nothing non-transferability). We clarify the relationship between one-round OSBE and identity-based ...


A Fundamental Analysis Of Continuous Flow Bioreactor And Membrane Reactor Models With Non-Competitive Product Inhibition. Iii. Linear Inhibition, Mark I. Nelson, Wei X. Lim Jan 2012

A Fundamental Analysis Of Continuous Flow Bioreactor And Membrane Reactor Models With Non-Competitive Product Inhibition. Iii. Linear Inhibition, Mark I. Nelson, Wei X. Lim

Faculty of Informatics - Papers (Archive)

The steady-state production of a product produced through the growth of microorganisms in a continuous flow bioreactor is presented. A generalised reactor model is used in which both the classic well-stirred bioreactor and the idealised membrane bioreactor are considered as special cases. The reaction is assumed to be governed by Monod growth kinetics subject to non-competitive product inhibition. Inhibition is modelled as a decreasing linear function of the product concentration with a finite cut-off. This reaction scheme is well documented in the literature, although a stability analysis of the governing equations has not previously been presented. The steady-state solutions for ...


Multivariate Whole Genome Average Interval Mapping: Qtl Analysis For Multiple Traits And/Or Environments, Arunas P. Verbyla, Brian R. Cullis Jan 2012

Multivariate Whole Genome Average Interval Mapping: Qtl Analysis For Multiple Traits And/Or Environments, Arunas P. Verbyla, Brian R. Cullis

Faculty of Informatics - Papers (Archive)

A major aim in some plant-based studies is the determination of quantitative trait loci (QTL) for multiple traits or across multiple environments. Understanding these QTL by trait or QTL by environment interactions can be of great value to the plant breeder. A whole genome approach for the analysis of QTL is presented for such multivariate applications. The approach is an extension of whole genome average interval mapping in which all intervals on a linkage map are included in the analysis simultaneously. A random effects working model is proposed for the multivariate (trait or environment) QTL effects for each interval, with ...


Evaluating Usage Of Wsmo And Owl-S In Semantic Web Services, Lina Azleny Kamaruddin, Jun Shen, Ghassan Beydoun Jan 2012

Evaluating Usage Of Wsmo And Owl-S In Semantic Web Services, Lina Azleny Kamaruddin, Jun Shen, Ghassan Beydoun

Faculty of Informatics - Papers (Archive)

Applying ontologies is the most promising approach to semantically enrich Web services. To facilitate this, two efforts contributed the most in enabling the creation of ontologies: OWL-S from the US and WSMO in Europe. These two compete and promote their ontologies from the design perspective, reflecting their inventors’ bias but not offering much help to Web service developers using them. To bypass existing biases and enable evaluation of ontologies expressed in these two languages, this paper provides a study of the two important facilitators, OWL-S and WSMO, surveying their usage in several SWS Projects and identifying their respective and outstanding ...


Attrition From Australian Ict Degrees - Why Women Leave, Madeleine R. H Roberts, Tanya J. Mcgill, Peter N. Hyland Jan 2012

Attrition From Australian Ict Degrees - Why Women Leave, Madeleine R. H Roberts, Tanya J. Mcgill, Peter N. Hyland

Faculty of Informatics - Papers (Archive)

Student attrition is of particular concern in the field of ICT because the industry faces staffing shortfalls, generally and a noticeable lack of female employees. This paper explores the reasons female students give for leaving their ICT courses. An online survey of early leavers from four Australian universities was conducted. The results show that, for many students, it is a combination of issues that leads to their withdrawal. Contrary to expectations, few female ex-students had experienced serious life events that necessitated their withdrawal or indicated that negative behaviour or attitudes had contributed to their decision to leave. More commonly female ...


Perceptions Of A Gender-Inclusive Curriculum Amongst Australian Information And Communications Technology Academics, Tony Koppi, Madeleine Roberts, Golshah Naghdy Jan 2012

Perceptions Of A Gender-Inclusive Curriculum Amongst Australian Information And Communications Technology Academics, Tony Koppi, Madeleine Roberts, Golshah Naghdy

Faculty of Informatics - Papers (Archive)

The lack of female enrolments in ICT is widely recognised and has prompted a range of strategies to attract more women, most of which do not include curriculum changes at any level. Research suggests that there are aspects of the ICT curriculum that could appeal to females, particularly in relation to benefits to society and humanity in general, and that including these considerations in the curriculum would be of interest to all students. The perceptions of a gender-inclusive ICT curriculum in Australia have been ascertained from a survey and forum discussions of ICT academic managers and leaders of ICT learning ...


A Novel Scheduler For Concurrent Tx/Rx Wireless Mesh Networks With Weighted Links, Kwan-Wu Chin, Sieteng Soh, Chen Meng Jan 2012

A Novel Scheduler For Concurrent Tx/Rx Wireless Mesh Networks With Weighted Links, Kwan-Wu Chin, Sieteng Soh, Chen Meng

Faculty of Informatics - Papers (Archive)

This paper considers the NP-hard problem of scheduling weighted links in concurrent transmit/receive wireless mesh networks. The problem generalizes existing works to links with weight wij ≥ 1. We propose an O(|V|2) algorithm, where V is the set of routers, that is orders of magnitude faster than computationally intensive approaches that use the well-known Goemans-Williamson (GWA)'s maximum cut algorithm and also brute-force. Our algorithm generates schedules, on average, with at most 3% and 9% fewer links than the GWA and brute-force approaches respectively.


A Survey On Bio-Inspired Algorithms For Web Service Composition, Lijuan Wang, Jun Shen, Jianming Yong Jan 2012

A Survey On Bio-Inspired Algorithms For Web Service Composition, Lijuan Wang, Jun Shen, Jianming Yong

Faculty of Informatics - Papers (Archive)

Web service composition has become a promis- ing technology in a variety of e-science or e-business areas. There are a variety of models and methods to deal with this issue from dierent aspects. Bio-inspired algorithms are becoming main approaches and solutions. This paper reviews the current researches on web service composition based on bio-inspired algorithms, such as Ant Colony Opti- mization(ACO), Genetic Algorithm(GA), Evolutionary Al- gorithm(EA) and Particle Swarm Optimization(PSO). By analyzing and investigating dierent approaches, this paper gives an overview about the researches on bio-inspired al- gorithm in web service composition and point out future ...


A Fundamental Analysis Of Continuous Flow Bioreactor And Membrane Reactor Models With Tessier Kinetics, M I. Nelson, E Balakrishnan, H S. Sidhu Jan 2012

A Fundamental Analysis Of Continuous Flow Bioreactor And Membrane Reactor Models With Tessier Kinetics, M I. Nelson, E Balakrishnan, H S. Sidhu

Faculty of Informatics - Papers (Archive)

In this research we analyze the steady-state operation of a continuous flow bioreactor, with or without recycle, and an idealized or nonidealized continuous flow membrane reactor. The model extends to include a fixed bed reactor where a fraction of the biomass is detached by the flow. The reaction is assumed to be governed by Tessier growth kinetics. We show that a flow reactor with idealized recycle has the same performance as an idealized membrane reactor and that the performance of a nonidealized membrane reactor is identical to that of an appropriately defined continuous flow bioreactor with nonidealized recycle. The performance ...