Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

2020

Science and Technology Studies

Approach

Articles 1 - 6 of 6

Full-Text Articles in Engineering

A Decentralized Latency-Aware Task Allocation And Group Formation Approach With Fault Tolerance For Iot Applications, Muhammad Mudassar, Yanlong Zhai, Lejian Liao, Jun Shen Jan 2020

A Decentralized Latency-Aware Task Allocation And Group Formation Approach With Fault Tolerance For Iot Applications, Muhammad Mudassar, Yanlong Zhai, Lejian Liao, Jun Shen

Faculty of Engineering and Information Sciences - Papers: Part B

Development of internet of things (IoT) and smart devices eased life by offering numerous applications targeting to provide real-time low latency services, but they also brought challenges in handling huge data generated from the powerful computations, to get a job done. Decentralized edge computing could help to achieve latency requirements of the applications by executing them closer to the user at edge of network, but most of the current studies actually deployed centralized approaches for cluster computing at edge, which put extra overhead of cluster formation and management. In this article, we propose to group heterogeneous edge nodes on task …


A New Approach To Keep The Privacy Information Of The Signer In A Digital Signature Scheme, Dung Hoang Duong, Willy Susilo, Viet Cuong Trinh Jan 2020

A New Approach To Keep The Privacy Information Of The Signer In A Digital Signature Scheme, Dung Hoang Duong, Willy Susilo, Viet Cuong Trinh

Faculty of Engineering and Information Sciences - Papers: Part B

In modern applications, such as Electronic Voting, e-Health, e-Cash, there is a need that the validity of a signature should be verified by only one responsible person. This is opposite to the traditional digital signature scheme where anybody can verify a signature. There have been several solutions for this problem, the first one is we combine a signature scheme with an encryption scheme; the second one is to use the group signature; and the last one is to use the strong designated verifier signature scheme with the undeniable property. In this paper, we extend the traditional digital signature scheme to …


The Role Of Particle Shape On The Hydraulic Conductivity Of Granular Soils Captured Through Kozeny-Carman Approach, Thanh Trung Nguyen, Buddhima Indraratna Jan 2020

The Role Of Particle Shape On The Hydraulic Conductivity Of Granular Soils Captured Through Kozeny-Carman Approach, Thanh Trung Nguyen, Buddhima Indraratna

Faculty of Engineering and Information Sciences - Papers: Part B

Previous studies indicate that particle shape plays an important role in the hydraulic conductivity (k) of granular materials, often represented through the Kozeny-Carman (KC) concept. Several recent studies have improved the accuracy of the KC approach using the particle size distribution (PSD) to estimate the specific surface area of particles but overly simplifying the effect of particle shape. This current study innovatively adopts the Micro-Computed Tomography (CT) technique to compute particle shape parameters of different granular materials (e.g., glass beads, sand and crushed gravel) and then incorporate these parameters into the KC equation to estimate k more accurately, which is …


Pricing Of Barrier Options On Underlying Assets With Jump-Diffusion Dynamics: A Mellin Transform Approach, Marianito R. Rodrigo Jan 2020

Pricing Of Barrier Options On Underlying Assets With Jump-Diffusion Dynamics: A Mellin Transform Approach, Marianito R. Rodrigo

Faculty of Engineering and Information Sciences - Papers: Part B

A barrier option is an exotic path-dependent option contract where the right to buy or sell is activated or extinguished when the underlying asset reaches a certain barrier price during the lifetime of the contract. In this article we use a Mellin transform approach to derive exact pricing formulas for barrier options with general payoffs and exponential barriers on underlying assets that have jump-diffusion dynamics. With the same approach we also price barrier options on underlying futures contracts.


Robust Extended H∞ Control Strategy Using Linear Matrix Inequality Approach For Islanded Microgrid, Maniza Armin, Mizanur Rahman, Md Mukidur Rahman, Subrata K. Sarker, Sajal Das, Md Rabiul Islam, Abbas Z. Kouzani, M. A Parvez Mahmud Jan 2020

Robust Extended H∞ Control Strategy Using Linear Matrix Inequality Approach For Islanded Microgrid, Maniza Armin, Mizanur Rahman, Md Mukidur Rahman, Subrata K. Sarker, Sajal Das, Md Rabiul Islam, Abbas Z. Kouzani, M. A Parvez Mahmud

Faculty of Engineering and Information Sciences - Papers: Part B

This paper presents the design of an extended parameterisations of H∞ controller for off grid operation of a microgrid. The microgrid consists of distributed generation units, filters and local loads. The filters are used to achieve accurate sinusoidal output voltage. However, loads which are connected to the microgrid are parametrically uncertain. Hence, it undergoes with unknown loads uncertainties. These unknown loads may create unknown loads harmonics, non-linearities which may reduce the voltage and current profile of the microgrid. As a result, the sudden rise and fall of voltage current profile damages the domestic and commercial loads. The proposed controller provides …


On Masking And Releasing Smart Meter Data At Micro-Level: The Multiplicative Noise Approach, John Brackenbury, P. Y. O'Shaughnessy, Yan-Xia Lin Jan 2020

On Masking And Releasing Smart Meter Data At Micro-Level: The Multiplicative Noise Approach, John Brackenbury, P. Y. O'Shaughnessy, Yan-Xia Lin

Faculty of Engineering and Information Sciences - Papers: Part B

Smart meter electricity data presents privacy risks when malicious agents gain insights of private information, including residents’ lifestyle and daily habits. When allowing access to record-level data, we apply the multiplicative noise method to mask individual smart meter data, which simultaneously aims to minimise disclosure of a dwelling’s consumption signal to any third party and to enable accurate estimation of the sum of a cluster of households. Three testing criteria are introduced to measure the performance of multiplicative noise masking approach relevant to the smart meter data. We propose a novel ‘Twin Uniform’ noise distribution and derive relevant theoretical results. …