Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

218,198 Full-Text Articles 276,093 Authors 47,230,550 Downloads 419 Institutions

All Articles in Physical Sciences and Mathematics

Faceted Search

218,198 full-text articles. Page 6109 of 6193.

Overview On The Profile Measurement Of Turbine Blade And Its Developm, Huang Junhui, Wang Zhao, Gao Jianmin, Yanguang Yu 2010 Xian Jiaotong University, P.R.China

Overview On The Profile Measurement Of Turbine Blade And Its Developm, Huang Junhui, Wang Zhao, Gao Jianmin, Yanguang Yu

Faculty of Informatics - Papers (Archive)

Turbine machinery has an extraordinary wide range of applications in the aviation, aerospace, automotive, energy and many other industries. The turbine blade is one of the most important parts of turbine machinery, and the characteristic parameters, pressure ratio of the engine and rotating speed of the turbine are all related to the shape and size of blades. Therefore, the profile measurement of turbine blade is an essential issue in the blade machining processing, however, it is difficult and particular to establish the profile measurement of turbine blade because of its complicated shapes and space angles of the blades, and the ...


Some Remarks On Hadamard Matrices, Jennifer Seberry, Marilena Mitrouli 2010 University of Wollongong

Some Remarks On Hadamard Matrices, Jennifer Seberry, Marilena Mitrouli

Faculty of Informatics - Papers (Archive)

In this note we use combinatorial methods to show that the unique, up to equivalence, 5 × 5 (1, −1)-matrix with determinant 48, the unique, up to equivalence, 6 × 6 (1,−1)-matrix with determinant 160, and the unique, up to equivalence, 7 × 7 (1,−1)-matrix with determinant 576, all cannot be embedded in the Hadamard matrix of order 8. We also review some properties of Sylvester Hadamard matrices, their Smith Normal Forms, and pivot patterns of Hadamard matrices when Gaussian Elimination with complete pivoting is applied on them. The pivot values which appear reconfirm the above non-embedding results.


Inter-Domain Routing Validator Based Spoofing Defence System, Lei Wang, Tianbing Xia, Jennifer Seberry 2010 University of Wollongong

Inter-Domain Routing Validator Based Spoofing Defence System, Lei Wang, Tianbing Xia, Jennifer Seberry

Faculty of Informatics - Papers (Archive)

IP spoofing remains a problem today in the Internet. In this paper, a new system called Inter-Domain Routing Validator Based Spoofing Defence System (SDS) for filtering spoofed IP packets is proposed . SDS uses efficient symmetric key message authentication code (UMAC) as its tag to verify that a source IP address is valid. Different ASes border routers obtain a shared key via the Inter-Domain Routing Validator (IRV) servers which will manage the secret keys and exchange keys among different ASes via security communication channel. SDS is efficient, secure and easy to cooperate with other defence mechanisms.


Differential Fault Analysis Of Lex, Jianyong Huang, Willy Susilo, Jennifer Seberry 2010 University of Wollongong

Differential Fault Analysis Of Lex, Jianyong Huang, Willy Susilo, Jennifer Seberry

Faculty of Informatics - Papers (Archive)

LEX is a stream cipher based on the round transformation of the AES block cipher, and it was selected for the final phase evaluation of the eSTREAM project. LEX is 2.5 times faster than AES both in software and in hardware. In this paper, we present a differential fault attack on LEX. The fault model assumes that the attacker is able to flip a random bit of the internal state of the cipher but cannot control the exact location of the induced fault. Our attack requires 40 faults, and recovers the secret key with 216 operations.


Biochemical Characterization Of Human Mismatch Recognition Proteins Mutsα And Mutsβ, Lei Tian 2010 University of Kentucky

Biochemical Characterization Of Human Mismatch Recognition Proteins Mutsα And Mutsβ, Lei Tian

University of Kentucky Doctoral Dissertations

The integrity of an organism's genome depends on the fidelity of DNA replication and the efficiency of DNA repair. The DNA mismatch repair (MMR) system, which is highly conserved from prokaryotes to eukaryotes, plays an important role in maintaining genome stability by correcting base-base mismatches and insertion/deletion (ID) mispairs generated during DNA replication and other DNA transactions. Mismatch recognition is a critical step in MMR. Two mismatch recognition proteins, MutSα (MSH2-MSH6 heterodimer) and MutSβ (MSH2-MSH3 heterodimer), have been identified in eukaryotic cells. MutSα and MutSβ have partially overlapping functions, with MutSα recognizing primarily base-base mismatches and 1-2 nt ...


Dynamic Modelling, Validating And Fine-Tuning Of Engineering Curriculum, Fazel Naghdy 2010 University of Wollongong

Dynamic Modelling, Validating And Fine-Tuning Of Engineering Curriculum, Fazel Naghdy

Faculty of Informatics - Papers (Archive)

The undergraduate Engineering schools in Australia are required to embed and assess the Competency Standards defined by the Engineers Australia in their curriculum. At the same time, embedding graduate attributes in the curriculum has become an important element in the quality assurance processes of universities. The embedding and mapping are only the first step in a long term process. The mapping should be validated empirically and reviewed in a repeating cycle towards an effective and optimal curriculum. This will require a rigorous action learning process for creating and cyclic validation of a living curriculum. The conceptual development and early stages ...


The Case For Ict Work-Integrated Learning From Graduates In The Workplace, Anthony J. Koppi, Sylvia L. Edwards, Judy Sheard, Fazel Naghdy, Wayne Brookes 2010 University of Wollongong

The Case For Ict Work-Integrated Learning From Graduates In The Workplace, Anthony J. Koppi, Sylvia L. Edwards, Judy Sheard, Fazel Naghdy, Wayne Brookes

Faculty of Informatics - Papers (Archive)

An online survey of recent ICT graduates in the workplace was carried out as part of a recent project funded by the Australian Learning and Teaching Council. The survey was concerned with the ICT curriculum in relation to workplace job requirements and university preparation for these requirements. The survey contained quantitative and qualitative components and findings from the former have been published (Koppi et al., 2009). This paper reports on a quantitative comparison of responses from graduates who had workplace experience and those who did not, and a qualitative analysis of text responses from all ICT graduates to open-ended questions ...


Estimates Of Probable Dementia Prevalence From Population-Based Surveys Compared With Dementia Prevalence Estimates Based On Meta-Analyses, Kaarin J. Anstey, Richard A. Burns, Carole Birrell, David G. Steel, Kim M. Kiely, Mary A. Luszcz 2010 Australian National University

Estimates Of Probable Dementia Prevalence From Population-Based Surveys Compared With Dementia Prevalence Estimates Based On Meta-Analyses, Kaarin J. Anstey, Richard A. Burns, Carole Birrell, David G. Steel, Kim M. Kiely, Mary A. Luszcz

Faculty of Informatics - Papers (Archive)

Background: National data on dementia prevalence are not always available, yet it may be possible to obtain estimates from large surveys that include dementia screening instruments. In Australia, many of the dementia prevalence estimates are based on European data collected between 15 and 50 years ago. We derived populationbased estimates of probable dementia and possible cognitive impairment in Australian studies using the Mini-Mental State Examination (MMSE), and compared these to estimates of dementia prevalence from meta-analyses of European studies.

Methods: Data sources included a pooled dataset of Australian longitudinal studies (DYNOPTA), and two Australian Bureau of Statistics National Surveys of ...


An Approach To Studying Location-Based Services Regulation In Australia, Roba Abbas 2010 University of Wollongong

An Approach To Studying Location-Based Services Regulation In Australia, Roba Abbas

Faculty of Informatics - Papers (Archive)

Location-based Services (LBS) afford a means of positioning, tracing and tracking individuals and objects, for purposes such as emergency management, employee monitoring, and consumer convenience. This paper reviews the present LBS setting and expected developments in this space, with a particular focus on the implications for Australian research and regulatory efforts. The origins of LBS in the mobile-commerce field are explored, incorporating an appraisal of the underlying positioning technology, the stakeholders in the LBS value chain, and the regulatory environment in which these services are employed. There is an evident disparity between the implementation of LBS technologies and the introduction ...


Some Mathematical Models Arising In Nano- And Bio-Technology, Yue Chan 2010 University of Wollongong

Some Mathematical Models Arising In Nano- And Bio-Technology, Yue Chan

Faculty of Informatics - Papers (Archive)

In this thesis, three mechanical models arising from nanoscale and biological systems are investigated, namely the dynamics of various nanostructures, the axial buckling of carbon nanotubes and nanopeapods, and the worm-like chain model for stretched semi-flexible molecules and the utilization of such a model for investigating molecular stretching in the connective tissue extracellular matrix.


Proof-Of-Knowledge Of Representation Of Committed Value And Its Applications, Willy Susilo, Yi Mu, Man Ho Allen Au 2010 University of Wollongong

Proof-Of-Knowledge Of Representation Of Committed Value And Its Applications, Willy Susilo, Yi Mu, Man Ho Allen Au

Faculty of Informatics - Papers (Archive)

We present a zero-knowledge argument system of representation of a committed value. Specifically, for commitments C = Commit1(y), D = Commit2(x), of value y and a tuple x = (x1, . . . , xL), respectively, our argument system allows one to demonstrate the knowledge of (x, y) such that x is a representation of y to bases h1, . . . , hL. That is, y = hx11 · · · hxLL . Our argument system is zero-knowledge and hence, it does not reveal anything such as x or y. We note that applications of our argument system are enormous. In particular, we show ...


Ste3d-Cap: Stereoscopic 3d Captcha, Willy Susilo, Yang-Wai Chow, Huayu Zhou 2010 University of Wollongong

Ste3d-Cap: Stereoscopic 3d Captcha, Willy Susilo, Yang-Wai Chow, Huayu Zhou

Faculty of Informatics - Papers (Archive)

We present STE3D-CAP (pronounced as “steed-cap” /'stidkæp/), a text-based CAPTCHA that is built from stereoscopic 3D images. This is a completely new direction in CAPTCHA techniques. Our idea is to incorporate stereoscopic 3D images in order to present the CAPTCHA challenge in 3D, which will be easy for humans to read (as the text stands out in the 3D scene) but hard for computers. The main idea is to produce a stereo pair, two images of the distorted 3D text objects generated from two different camera/eye viewpoints, that are presented to a human user’s left and right eyes ...


The 230 V Cbema Curve - Preliminary Studies, Sean T. Elphick, Victor W. Smith 2010 University of Wollongong

The 230 V Cbema Curve - Preliminary Studies, Sean T. Elphick, Victor W. Smith

Faculty of Informatics - Papers (Archive)

The ITI, formerly CBEMA, curve was developed by the Information Technology Industry Council of the United States of America. The curve describes an AC input voltage envelope which typically can be tolerated by most Information Technology (IT) Equipment. Although the curve ostensibly applies only to IT equipment it is often used throughout the electricity supply industry to provide an indication of the input voltage tolerance of a wide range of equipment. In spite of the fact that the curve was designed to apply to equipment supplied at 120 V 60 Hz nominal voltages it is widely used in Australia which ...


Pbtrust: A Priority-Based Trust Model For Service Selection In General Service-Oriented Environments, Xing Su, Minjie Zhang, Yi Mu, Kwang Mong Sim 2010 University of Wollongong

Pbtrust: A Priority-Based Trust Model For Service Selection In General Service-Oriented Environments, Xing Su, Minjie Zhang, Yi Mu, Kwang Mong Sim

Faculty of Informatics - Papers (Archive)

How to choose the best service provider (agent), which a service consumer can trust in terms of the quality and success rate of the service in an open and dynamic environment, is a challenging problem in many service-oriented applications such as Internet-based grid systems, e-trading systems, as well as service-oriented computing systems. This paper presents a Priority-Based Trust (PBTrust) model for service selection in general service-oriented environments. The PBTrust is robust and novel from several perspectives. (1) The reputation of a service provider is derived from referees who are third parties and had interactions with the provider in a rich ...


On Optimising Route Discovery For Multi-Interface And Power-Aware Nodes In Heterogeneous Manets, Huda AlAamri, Mehran Abolhasan, Tadeusz A. Wysocki, Justin Lipman 2010 University of Wollongong

On Optimising Route Discovery For Multi-Interface And Power-Aware Nodes In Heterogeneous Manets, Huda Alaamri, Mehran Abolhasan, Tadeusz A. Wysocki, Justin Lipman

Faculty of Informatics - Papers (Archive)

This paper presents a new routing discovery strategy for heterogeneous MANETs. Node heterogeneity is modeled in terms of: types and number of different interfaces, power, and transmission ranges. Our proposed route discovery algorithm is implemented on the top of On-demand Tree-based Routing Protocol (OTRP) and hence it is called OTRP Heterogeneity-Aware (OTRP HA). OTRP HA utilizes node heterogeneity and optimizes route discovery to reduce overheads and ensures connectivities between different types of nodes with different interfaces. Each node makes its own decision to participate in the route discovery process according to its location, local density, and available resources. Simulation results ...


Information Retrieval And Social Tagging For Digital Libraries Using Formal Concept Analysis, Peter W. Eklund, Peter Goodall, Timothy Wray 2010 University of Wollongong

Information Retrieval And Social Tagging For Digital Libraries Using Formal Concept Analysis, Peter W. Eklund, Peter Goodall, Timothy Wray

Faculty of Informatics - Papers (Archive)

This paper reports a novel semantic web application developed to deliver a collaborative tagging system for a digital on-line museum. The key features of our application – called the Virtual Museum of the Pacific – concern the browsing and retrieval interface based on Formal Concept Analysis, the extensible distributed data model to support collaborative tagging and its web services implementation.


Monitoring Intelligent Distribution Power Systems: A Power Quality Plan, Neil R. Browne, Timothy J. Browne, Sean T. Elphick 2010 Integral Energy

Monitoring Intelligent Distribution Power Systems: A Power Quality Plan, Neil R. Browne, Timothy J. Browne, Sean T. Elphick

Faculty of Informatics - Papers (Archive)

Power system monitoring capabilities and requirements are evolving rapidly. The traditional monitoring framework in Australian distribution networks involves biannual readings of maximum demand at each distribution substation. As utilities respond to developments in metering and communications technology, automated collection and retrieval of quasi-real-time system data between substations and central repositories is now feasible. This gives network managers a significantly increased understanding of distribution network dynamic activity such as daily and seasonal load profiles. This leads to the increased ability of utilities to exploit metering data for power quality analysis purposes. This paper examines the scope for, and challenges associated with ...


Social Tagging For Digital Libraries Using Formal Concept Analysis, Timothy Wray, Peter W. Eklund 2010 University of Wollongong

Social Tagging For Digital Libraries Using Formal Concept Analysis, Timothy Wray, Peter W. Eklund

Faculty of Informatics - Papers (Archive)

This paper describes the Art Collection Ecosystem – an application that allows users to tag and serendipitously browse content using Formal Concept Analysis. Within this application, tags are derived from meta-data of artworks within an existing asset management system and are classified according to theories derived from social tagging behaviour.We present past and recent iterations of its design, where it is evaluated as a contextual comparison to a popular image tagging application, Flickr. Through the process of iterative design and user evaluation, we produce results are of interest to any applied research and development that involves the exploration of digital ...


On The Combination Of Local Texture And Global Structure For Food Classification, Zhimin Zong, Duc Thanh Nguyen, Philip O. Ogunbona, Wanqing Li 2010 University of Wollongong

On The Combination Of Local Texture And Global Structure For Food Classification, Zhimin Zong, Duc Thanh Nguyen, Philip O. Ogunbona, Wanqing Li

Faculty of Informatics - Papers (Archive)

This paper proposes a food image classification method using local textural patterns and their global structure to describe the food image. In this paper, a visual codebook of local textural patterns is created by employing Scale Invariant Feature Transformation (SIFT) interest point detector with the Local Binary Pattern (LBP) feature. In addition to describing the food image using local texture, the global structure of the food object is represented as the spatial distribution of the local textural structures and encoded using shape context. We evaluated the proposed method on the Pittsburgh Fast-Food Image (PFI) dataset. Experimental results showed that the ...


Automating Dimensional Tolerancing Using Ripple Down Rules (Rdr), Ghassan Beydoun, Achim Hoffmann, Ramsey Hamade 2010 University of Wollongong

Automating Dimensional Tolerancing Using Ripple Down Rules (Rdr), Ghassan Beydoun, Achim Hoffmann, Ramsey Hamade

Faculty of Informatics - Papers (Archive)

We propose to use a knowledge based approach to assist in mechanical design focusing on dimensional tolerancing. To illustrate our approach, we capture the knowledge which human designers utilize in order to specify dimensional tolerances on shafts and mating holes in order to meet desired classes of fit as set by relevant engineering standards. The software system we developed would help mechanical designers become more effective in the time-consuming dimensioning and tolerancing process of their designs in the future. In doing this, the paper makes a twofold contribution to the field of knowledge acquisition: firstly, interface was adjusted to receive ...


Digital Commons powered by bepress