Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 41

Full-Text Articles in Physical Sciences and Mathematics

Local Aggregation Function Learning Based On Support Vector Machines, Lei Ye, Jun Zhang Dec 2012

Local Aggregation Function Learning Based On Support Vector Machines, Lei Ye, Jun Zhang

Dr Lei Yi

No abstract provided.


Data Security And Information Privacy For Pda Accessible Clinical-Log For Medical Education In Problem-Based Learning (Pbl) Approach, Rattiporn Luanrattana, Khin Than Win, John A. Fulcher Dec 2012

Data Security And Information Privacy For Pda Accessible Clinical-Log For Medical Education In Problem-Based Learning (Pbl) Approach, Rattiporn Luanrattana, Khin Than Win, John A. Fulcher

Dr Khin Win

Data security and information privacy are the important aspects to consider for the use of mobile technology for recording clinical experience and encounter in medical education. Objective: This study aims to address the qualitative findings of the appropriate data security and information privacy for PDA accessible clinical-log in problem-based learning (PBL) approach in medical education. Method: The semi-structured interviews were conducted with the medical faculty members, honorary clinical academics and medical education technology specialists. Results: Data security and information access plan were determined for managing clinical-log data. The results directed the guideline for the future development and implementation of clinical-log …


Electronic Health Record System Evaluation Based On Patient Safety, Yung-Yu Su, Khin Than Win, John A. Fulcher Dec 2012

Electronic Health Record System Evaluation Based On Patient Safety, Yung-Yu Su, Khin Than Win, John A. Fulcher

Dr Khin Win

After describing the general characteristics of Electronic Health Records (EHRs), we consider patient safety. We then proceed to discuss IS evaluation in general terms, followed by HIS system evaluation in particular. The D&M IS Success model, Technology Acceptance model and Task-Technology Fit model are considered as potential candidates for EHR System evaluation. Based upon a critical review of the available literature, we draw some conclusions about the appropriateness of current HIS/EHR evaluation approaches. Finally, we suggest that by incorporating patient safety attributes in any EHR System evaluation framework, then this could lead to improved accuracy, and in turn improved patient …


A Car Detection System Based On Hierarchical Visual Features, Fok Hing Chi Tivive, Abdesselam Bouzerdoum Dec 2012

A Car Detection System Based On Hierarchical Visual Features, Fok Hing Chi Tivive, Abdesselam Bouzerdoum

Dr Fok Hing Chi Tivive

In this paper, we address the problem of detecting and localizing cars in still images. The proposed car detection system is based on a hierarchical feature detector in which the processing units are shunting inhibitory neurons. To reduce the training time and complexity of the network, the shunting inhibitory neurons in the first layer are implemented as directional nonlinear filters, whereas the neurons in the second layer have trainable parameters. A multi-resolution processing scheme is implemented so as to detect cars of different sizes, and to reduce the number of false positives during the detection stage, an adaptive thresholding strategy …


A Human Gait Classification Method Based On Radar Doppler Spectrograms, Fok Hing Chi Tivive, Abdesselam Bouzerdoum, Moeness G. Amin Dec 2012

A Human Gait Classification Method Based On Radar Doppler Spectrograms, Fok Hing Chi Tivive, Abdesselam Bouzerdoum, Moeness G. Amin

Dr Fok Hing Chi Tivive

An image classification technique, which has recently been introduced for visual pattern recognition, is successfully applied for human gait classification based on radar Doppler signatures depicted in the time-frequency domain. The proposed method has three processing stages. The first two stages are designed to extract Doppler features that can effectively characterize humanmotion based on the nature of arm swings, and the third stage performs classification. Three types of arm motion are considered: free-arm swings, one-arm confined swings, and no-arm swings. The last two arm motions can be indicative of a human carrying objects or a person in stressed situations. The …


An Ambient Multimedia User Experience Feedback Framework Based On User Tagging And Eeg Biosignals, Eva Cheng, Stephen J. Davis, Ian Burnett, Christian H. Ritz Dec 2012

An Ambient Multimedia User Experience Feedback Framework Based On User Tagging And Eeg Biosignals, Eva Cheng, Stephen J. Davis, Ian Burnett, Christian H. Ritz

Dr Christian Ritz

Multimedia is increasingly accessed online and within social networks; however, users are typically limited to visual/auditory stimulus through media presented onscreen with accompanying audio over speakers. Whilst recent research studying additional ambient sensory multimedia effects recorded numerical scores of perceptual quality, the users’ time-varying emotional response to the ambient sensory feedback is not considered. This paper thus introduces a framework to evaluate user ambient quality of multimedia experience and discover users’ time-varying emotional responses through explicit user tagging and implicit EEG biosignal analysis. In the proposed framework, users interact with the media via discrete tagging activities whilst their EEG biosignal …


Cancelable Key-Based Fingerprint Templates, Russell Ang, Reihaneh Safavi-Naini, Luke F. Mcaven Dec 2012

Cancelable Key-Based Fingerprint Templates, Russell Ang, Reihaneh Safavi-Naini, Luke F. Mcaven

Dr Luke McAven

Biometric based authentication can provide strong security guarantee about the identity of users. Security of biometric data is particularly important as compromise of the data will be permanent. Cancelable biometrics store a non-invertible transformed version of the biometric data and so if the storage is compromised the biometric data remains safe. Cancelable biometrics also provide a higher level of privacy by allowing many templates for the same biometric data and hence non-linkability of user's data stored in different databases. We define how to measure the success of a particular transformation and matching algorithm for fingerprints. We consider a key-dependent geometric …


Age Estimation Based On Extended Non-Negative Matrix Factorization, Ce Zhan, Wanqing Li, Philip Ogunbona Dec 2012

Age Estimation Based On Extended Non-Negative Matrix Factorization, Ce Zhan, Wanqing Li, Philip Ogunbona

Associate Professor Wanqing Li

Previous studies suggested that local appearance-based methods are more efficient than geometric-based and holistic methods for age estimation. This is mainly due to the fact that age information are usually encoded by the local features such as wrinkles and skin texture on the forehead or at the eye corners. However, the variations of theses features caused by other factors such as identity, expression, pose and lighting may be larger than that caused by aging. Thus, one of the key challenges of age estimation lies in constructing a feature space that could successfully recovers age information while ignoring other sources of …


Reflecting On Ontologies Towards Ontology-Based Agent-Oriented Software Engineering, Ghassan Beydoun, Brian Henderson-Sellers, Jun Shen, G. Low Dec 2012

Reflecting On Ontologies Towards Ontology-Based Agent-Oriented Software Engineering, Ghassan Beydoun, Brian Henderson-Sellers, Jun Shen, G. Low

Associate Professor Ghassan Beydoun

“Ontology” in association with “software engineering” is becoming commonplace. This paper argues for the need to place ontologies at the centre of the software development lifecycle for multi agent systems to enhance reuse of software workproducts as well as to unify agent-based software engineering knowledge. The paper bridges the state-of-the-art of ontologies research from Knowledge Engineering (KE) within Artificial Intelligence and Metamodelling within Software Engineering (SE). It presents a sketch of an ontology-based Multi Agent System (MAS) methodology discussing key roles on ontologies and their impact of workproducts, illustrating these in a MAS software development project for an important application …


Pbtrust: A Priority-Based Trust Model For Service Selection In General Service-Oriented Environments, Xing Su, Minjie Zhang, Yi Mu, Kwang Mong Sim Dec 2012

Pbtrust: A Priority-Based Trust Model For Service Selection In General Service-Oriented Environments, Xing Su, Minjie Zhang, Yi Mu, Kwang Mong Sim

Associate Professor Minjie Zhang

How to choose the best service provider (agent), which a service consumer can trust in terms of the quality and success rate of the service in an open and dynamic environment, is a challenging problem in many service-oriented applications such as Internet-based grid systems, e-trading systems, as well as service-oriented computing systems. This paper presents a Priority-Based Trust (PBTrust) model for service selection in general service-oriented environments. The PBTrust is robust and novel from several perspectives. (1) The reputation of a service provider is derived from referees who are third parties and had interactions with the provider in a rich …


Ontology-Based Knowledge Representation For A P2p Multi-Agent Distributed Intrusion Detection System, Dayong Ye, Quan Bai, Minjie Zhang Dec 2012

Ontology-Based Knowledge Representation For A P2p Multi-Agent Distributed Intrusion Detection System, Dayong Ye, Quan Bai, Minjie Zhang

Associate Professor Minjie Zhang

Many research efforts on application of ontology in network security have been done in the past decade. However, they mostly stop at initial proposal or focus on framework design without detailed representation of intrusion or attack and relevant detection knowledge with ontology. In this paper, the design and implementation of ontology-based knowledge representation for a peer-to-peer multi-agent distributed intrusion detection system (ontology-based MADIDS) are introduced. An example which demonstrates the representation of an attack with ontology and the relevant detection process is also presented. In ontology-Based MADIDS, ontology technique enables peers in the system and agents in one peer to …


An Agent-Based Peer-To-Peer Grid Computing Architecture, Jia Tang, Minjie Zhang Dec 2012

An Agent-Based Peer-To-Peer Grid Computing Architecture, Jia Tang, Minjie Zhang

Associate Professor Minjie Zhang

The conventional computing Grid has developed a service oriented computing architecture with a superlocal resource management and scheduling strategy. This architecture is limited in modeling computer systems with highly dynamic and autonomous computing resources due to its server-based computing model. The super-local resource management and scheduling strategy also limits the utilization of the computing resources. In this paper, we propose a multi-agent based Peer-to-Peer Grid computing architecture. This novel architecture solves the above issues, while provides reasonable compatibility and interoperability with the conventional Grid systems and clients. The main characteristics of this architecture are highlighted by its promising performance and …


An Ontology-Based Approach For Expert And Knowledge Mining In Complex Multi-Agent Systems, Minjie Zhang, Xijin Tang, Quan Bai, Jifa Gu Dec 2012

An Ontology-Based Approach For Expert And Knowledge Mining In Complex Multi-Agent Systems, Minjie Zhang, Xijin Tang, Quan Bai, Jifa Gu

Associate Professor Minjie Zhang

Complex problems require diverse expertise and multiple techniques to solve. In order to solve such problems, complex multi-agent systems include numbers of heterogeneous agents, which may include both of human experts and autonomous agents, to work together toward some complex problems. Most complex multi-agent systems are working in open domains. Due to heterogeneities and dynamic working environments, expertise and capabilities of agents might not be well estimated and presented in the system. Therefore, how to discover useful knowledge from human and autonomous experts, make more accurate estimation for experts' capabilities and to find out suitable expert(s) to solve incoming problems …


Developing Approaches To Measure The Quality Of Electronic Versus Paper-Based Nursing Documentation In Aged Care Homes, Ping Yu, David Hailey, Ning Wang, Deborah Oxlade Dec 2012

Developing Approaches To Measure The Quality Of Electronic Versus Paper-Based Nursing Documentation In Aged Care Homes, Ping Yu, David Hailey, Ning Wang, Deborah Oxlade

Dr Ping Yu

Objective: This paper is to share the experience of developing approaches in measuring the quality of nursing documentation in residential aged care homes.Background: The quality of care depends on access to quality nursing documentation which ensures continuity and individuality of nursing care. Electronic nursing documentation systems are anticipated to increase caregivers&¿ access to more accurate, adequate and up-to-date data. Evaluation of the quality of nursing documentation calls for quality research and valid instruments with comprehensive and universal criteria. A preliminary nursing documentation audit instrument has been developed for a research project aimed at evaluating the quality of electronic versus paper-based …


3d Face Recognition Based On A Modified Icp Method, Kankan Zhao, Jiangtao Xi, Yanguang Yu, Joe F. Chicharo Dec 2012

3d Face Recognition Based On A Modified Icp Method, Kankan Zhao, Jiangtao Xi, Yanguang Yu, Joe F. Chicharo

Dr Yanguang Yu

3D face recognition technique has gained much more attention recently, and it is widely used in security system, identification system, and access control system, etc. The core technique in 3D face recognition is to find out the corresponding points in different 3D face images. The classic partial Iterative Closest Point (ICP) method is iteratively align the two point sets based on repetitively calculate the closest points as the corresponding points in each iteration. After several iterations, the corresponding points can be obtained accurately. However, if two 3D face images with different scale are from the same person, the classic partial …


Towards Qos-Based Web Services Discovery, Jun Yan, Jingtai Piao Dec 2012

Towards Qos-Based Web Services Discovery, Jun Yan, Jingtai Piao

Dr Jun Yan

The current UDDI-based web services discovery technologies are designed to discover services which can satisfy consumers’ functional requirements. The consumers’ non-functional requirements such as quality of services are largely ignored in discovery. This may lead to the problem that the services returned from discovery are ineffective and even useless. To solve this problem, this paper presents an approach to achieving QoS-based Web services discovery. Data structures are proposed for both service providers and service consumers to describe non-functional information about services. A serial of algorithms are developed for matching and ranking services according to consumers’ non-functional requirements.


Wfms-Based Data Integration For E-Learning, Jianming Yong, Jun Yan, Xiaodi Huang Dec 2012

Wfms-Based Data Integration For E-Learning, Jianming Yong, Jun Yan, Xiaodi Huang

Dr Jun Yan

As more and more organisations and institutions are moving towards the e-learning strategy, more and more disparate data are distributed by different e-learning systems. How to effectively use this vast amount of distributed data becomes a big challenge. This paper addresses this challenge and works out a new mechanism to implement data integration for e-learning. A workflow management system based (WFMS-based) data integration model is contributed to the e-learning.


Support-Based Distributed Optimisation: An Approach To Radiotherapy Patient Scheduling, Graham Billiau, Chee-Fon Chang, Andrew Alexis Miller, Aditya K. Ghose Dec 2012

Support-Based Distributed Optimisation: An Approach To Radiotherapy Patient Scheduling, Graham Billiau, Chee-Fon Chang, Andrew Alexis Miller, Aditya K. Ghose

Professor Aditya K. Ghose

In the health system inefficiency leads to poor use of scarce expensive resources. Lengthy patient treatment waiting time can result from inefficiency in scheduling. The use of state-of-the art multi-agent and distributed computing technologies can provide a solution to address this problem. However, distributed optimisation in such a multi-agent setting poses an important challenge that requires protocols to enable agents to optimise shared objectives without necessarily revealing all of their private constraints. In this study we show that if the problem is expressed as a Dynamic Distributed Constraint Optimisation Problem a powerful algorithm such as SBDO can be deployed to …


A Provable Secure Id-Based Explicit Authenticated Key Agreement Protocol Without Random Oracles, Haibo Tian, Willy Susilo, Yang Ming, Yumin Wang Dec 2012

A Provable Secure Id-Based Explicit Authenticated Key Agreement Protocol Without Random Oracles, Haibo Tian, Willy Susilo, Yang Ming, Yumin Wang

Professor Willy Susilo

In this paper, we present an identity-based explicit authenticated key agreement protocol that is provably secure without random oracles. The protocol employs a new method to isolate a session key from key con¯rmation keys so that there is no direct usage of hash functions in the protocol. The protocol is proved secure without random oracles in a variant of Bellare and Rogaway style model, an exception to current proof method in this style model in the ID-based setting. We believe that this key isolation method is novel and can be further studied for constructing more e±cient protocols.


Estimates Of Probable Dementia Prevalence From Population-Based Surveys Compared With Dementia Prevalence Estimates Based On Meta-Analyses, Kaarin J. Anstey, Richard A. Burns, Carole Birrell, David G. Steel, Kim M. Kiely, Mary A. Luszcz Dec 2012

Estimates Of Probable Dementia Prevalence From Population-Based Surveys Compared With Dementia Prevalence Estimates Based On Meta-Analyses, Kaarin J. Anstey, Richard A. Burns, Carole Birrell, David G. Steel, Kim M. Kiely, Mary A. Luszcz

Professor David Steel

Background: National data on dementia prevalence are not always available, yet it may be possible to obtain estimates from large surveys that include dementia screening instruments. In Australia, many of the dementia prevalence estimates are based on European data collected between 15 and 50 years ago. We derived populationbased estimates of probable dementia and possible cognitive impairment in Australian studies using the Mini-Mental State Examination (MMSE), and compared these to estimates of dementia prevalence from meta-analyses of European studies.

Methods: Data sources included a pooled dataset of Australian longitudinal studies (DYNOPTA), and two Australian Bureau of Statistics National …


A Pragmatic Gis-Oriented Ontology For Location Based Services, Jun Shen, Aneesh Krishna, Shuai Yuan, Ke Cai, Yuemin Qin Dec 2012

A Pragmatic Gis-Oriented Ontology For Location Based Services, Jun Shen, Aneesh Krishna, Shuai Yuan, Ke Cai, Yuemin Qin

Dr Jun Shen

With advances in automatic position sensing and wireless connectivity, location-based services (LBS) are rapidly developing, particularly in fields of geographic, tourism and logistic information systems. Currently, Web service has been viewed as one of most significant innovations in business industry, and designed on demand to provide spatial related information for LBS consumption. However, the traditional Web Service Description Language (WSDL) cannot meet those requirements, as WSDL is not able to support semantic content and information. In recent years, Ontology came up with an effective approach to enhance service description, automated discovery, dynamic composition, enactment, and other tasks such as managing …


Reflecting On Ontologies Towards Ontology-Based Agent-Oriented Software Engineering, Ghassan Beydoun, Brian Henderson-Sellers, Jun Shen, G. Low Dec 2012

Reflecting On Ontologies Towards Ontology-Based Agent-Oriented Software Engineering, Ghassan Beydoun, Brian Henderson-Sellers, Jun Shen, G. Low

Dr Jun Shen

“Ontology” in association with “software engineering” is becoming commonplace. This paper argues for the need to place ontologies at the centre of the software development lifecycle for multi agent systems to enhance reuse of software workproducts as well as to unify agent-based software engineering knowledge. The paper bridges the state-of-the-art of ontologies research from Knowledge Engineering (KE) within Artificial Intelligence and Metamodelling within Software Engineering (SE). It presents a sketch of an ontology-based Multi Agent System (MAS) methodology discussing key roles on ontologies and their impact of workproducts, illustrating these in a MAS software development project for an important application …


Adaptive Task Allocation For P2p-Based E-Services Composition, Jun Shen, Shuai Yuan Dec 2012

Adaptive Task Allocation For P2p-Based E-Services Composition, Jun Shen, Shuai Yuan

Dr Jun Shen

To effectively manage the task allocation, especially when handling with numerous different peers’ qualities, is one of the greatest challenges to be faced in order to guarantee the success of P2P-based e-services composition. In this context, various QoS descriptive frameworks and Web services technologies (such as WSDL and BPEL) are being considered as the most affordable solutions to promote the performance of decentralized e-services, through applying strategies like QoS ontologies and related optimization algorithms globally or locally. Nonetheless, most P2P-based service selection and composition approaches applied nowadays lack dynamism and autonomy. In this paper, we first propose an extension of …


A Coloured Petri Net Based Approach For Flexible Agent Interactions, Quan Bai, Minjie Zhang, Fenghui Ren Nov 2012

A Coloured Petri Net Based Approach For Flexible Agent Interactions, Quan Bai, Minjie Zhang, Fenghui Ren

Dr Fenghui Ren

As one of the most important artificial intelligence techniques, multi-agent systems are widely applied in many fields. In a multi-agent system, agent interactions are established through exchanging messages by following some interaction protocols. However, as the application domains of MASs are getting more and more complex, some limitations of current multi-agent interaction mechanisms are rising up. To cover some limitations of current agent interaction mechanisms, in this paper, we propose a Coloured Petri Net based approach to enable flexible agent interactions in open environments. This approach adopts Coloured Petri Net techniques to model agent interaction protocols, and separates interaction protocols …


Desire-Based Negotiation In Electronic Marketplaces, Minjie Zhang, Fenghui Ren Nov 2012

Desire-Based Negotiation In Electronic Marketplaces, Minjie Zhang, Fenghui Ren

Dr Fenghui Ren

No abstract provided.


Using Colored Petri Nets To Predict Future States In Agent-Based Scheduling And Planning Systems, Minjie Zhang, John Fulcher, Quan Bai, Fenghui Ren Nov 2012

Using Colored Petri Nets To Predict Future States In Agent-Based Scheduling And Planning Systems, Minjie Zhang, John Fulcher, Quan Bai, Fenghui Ren

Dr Fenghui Ren

No abstract provided.


Are Drug Detection Dogs And Mass-Media Campaigns Likely To Be Effective Policy Responses To Psychostimulant Use And Related Harm? Results From An Agent-Based Simulation Model, David Moore, Lisa Maher, Christine Siokou, Rachael Green, Anne Dray, Rebecca Jenkinson, Susan Hudson, Gabriele Bammer, Pascal Perez, Paul Dietze Nov 2012

Are Drug Detection Dogs And Mass-Media Campaigns Likely To Be Effective Policy Responses To Psychostimulant Use And Related Harm? Results From An Agent-Based Simulation Model, David Moore, Lisa Maher, Christine Siokou, Rachael Green, Anne Dray, Rebecca Jenkinson, Susan Hudson, Gabriele Bammer, Pascal Perez, Paul Dietze

Professor Pascal Perez

Background Agent-based simulation models can be used to explore the impact of policy and practice on drug use and related consequences. In a linked paper (Perez et al., 2011), we described SimAmph, an agent-based simulation model for exploring the use of psychostimulants and related harm amongst young Australians. Methods In this paper, we use the model to simulate the impact of two policy scenarios on engagement in drug use and experience of drug-related harm: (i) the use of passive-alert detection (PAD) dogs by police at public venues and (ii) the introduction of a mass-media drug prevention campaign. Results The findings …


Voltage Quality Behaviour Of A Wind Turbine Based Remote Area Power System, Nishad Mendis, Kashem Muttaqi, Sarath Perera Nov 2012

Voltage Quality Behaviour Of A Wind Turbine Based Remote Area Power System, Nishad Mendis, Kashem Muttaqi, Sarath Perera

Associate Professor Sarath Perera

The power quality behaviour of a Remote Area Power System (RAPS) consisting of a Doubly Fed Induction Generator (DFIG), its main loads and a dummy load is presented in this paper. The dummy load is used to maintain the power balance of the system under changing wind and loading conditions. The performance of the remote area power system subject to various loading conditions has been evaluated in terms of the voltage quality, an aspect which has not received much attention in the past. The existing Distributed Generation (DG) power quality standards are taken as the basis to compare the voltage …


Voltage Quality Behaviour Of A Wind Turbine Based Remote Area Power System, Nishad Mendis, Kashem Muttaqi, Sarath Perera Nov 2012

Voltage Quality Behaviour Of A Wind Turbine Based Remote Area Power System, Nishad Mendis, Kashem Muttaqi, Sarath Perera

Associate Professor Kashem Muttaqi

The power quality behaviour of a Remote Area Power System (RAPS) consisting of a Doubly Fed Induction Generator (DFIG), its main loads and a dummy load is presented in this paper. The dummy load is used to maintain the power balance of the system under changing wind and loading conditions. The performance of the remote area power system subject to various loading conditions has been evaluated in terms of the voltage quality, an aspect which has not received much attention in the past. The existing Distributed Generation (DG) power quality standards are taken as the basis to compare the voltage …


Pbtrust: A Priority-Based Trust Model For Service Selection In General Service-Oriented Environments, Xing Su, Minjie Zhang, Yi Mu, Kwang Mong Sim Nov 2012

Pbtrust: A Priority-Based Trust Model For Service Selection In General Service-Oriented Environments, Xing Su, Minjie Zhang, Yi Mu, Kwang Mong Sim

Professor Yi Mu

How to choose the best service provider (agent), which a service consumer can trust in terms of the quality and success rate of the service in an open and dynamic environment, is a challenging problem in many service-oriented applications such as Internet-based grid systems, e-trading systems, as well as service-oriented computing systems. This paper presents a Priority-Based Trust (PBTrust) model for service selection in general service-oriented environments. The PBTrust is robust and novel from several perspectives. (1) The reputation of a service provider is derived from referees who are third parties and had interactions with the provider in a rich …