Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 17 of 17

Full-Text Articles in Physical Sciences and Mathematics

A Part-Based Template Matching Method For Multi-View Human Detection, Duc Thanh Nguyen, Wanqing Li, Philip Ogunbona Dec 2012

A Part-Based Template Matching Method For Multi-View Human Detection, Duc Thanh Nguyen, Wanqing Li, Philip Ogunbona

Associate Professor Wanqing Li

This paper proposes a part-based template matching method for multi-view human detection. The proposed method includes two stages: matching and verification. In particular, the best individual matching parts given a detection window are determined using an improved template matching algorithm. The hypothesis of the matched parts forming a human is then verified by employing a Bayesian-based model. The verification is not only based on the matching costs of individual parts but also how well the combining the matched parts satisfying the configuration constraints of the human body. Experimental results have shown that the proposed method is robust for detecting humans …


Promises And Successful Practice In It Governance: A Survey Of Australian Senior It Managers, Akemi T. Chatfield, Terrence Coleman Dec 2012

Promises And Successful Practice In It Governance: A Survey Of Australian Senior It Managers, Akemi T. Chatfield, Terrence Coleman

Dr Akemi Chatfield

In a global, digital economy, companies increasingly depend on IT for timely information sharing,effective operational control, rapid innovation, speed to market, and customer satisfaction. On theother hand, recent global financial crisis and economic recessions encourage trends for increasedmanagerial scrutiny to reduce IT spending and to increase business value of IT. Globally, concepts ofIT governance (ITG) have proliferated as a solution for improving IT management under businessuncertainty and rapid technological change. However, empirical research on organisational ITGpractice still is lacking and urgently required. This paper, therefore, presents survey results on ITGpractice from a perspective of senior IT managers in Australian private-sector …


P2p Distributed Intrusion Detections By Using Mobile Agents, Dayong Ye, Quan Bai, Minjie Zhang, Zhen Ye Dec 2012

P2p Distributed Intrusion Detections By Using Mobile Agents, Dayong Ye, Quan Bai, Minjie Zhang, Zhen Ye

Associate Professor Minjie Zhang

Traditional hierarchical intrusion detection systems have a central manager which attracts hackers to attack and might overload when there are too many client requests. To overcome these drawbacks, some researchers suggested to apply Peer-to-Peer approaches in intrusion detection. Most current Peer-to-Peer intrusion detection systems only allow hosts to collect related information from "neighbours" (one hop hosts). The limitation of information sources may lead a system to make inaccurate decisions. In this paper, we propose a Mobile Agent Based Peer-to-Peer Distributed Intrusion Detection Framework. Agents are included in this framework to achieve intrusion detections. In addition, a mobile agent migration strategy …


Using Coverage Information To Guide Test Case Selection In Adaptive Random Testing, Zhiquan Zhou Dec 2012

Using Coverage Information To Guide Test Case Selection In Adaptive Random Testing, Zhiquan Zhou

Dr Zhiquan Zhou

Random Testing (RT) is a fundamental software testing technique. Adaptive Random Testing (ART) improves the fault-detection capability of RT by employing the location information of previously executed test cases. Compared with RT, test cases generated in ART are more evenly spread across the input domain. ART has conventionally been applied to programs that have only numerical input types, because the distance between numerical inputs is readily measurable. The vast majority of computer programs, however, involve non-numerical inputs. To apply ART to these programs requires the development of effective new distance measures. Different from those measures that focus on the concrete …


A Cloud-Based Design Of Smart Car Information Services, Yi Xu, Jun Yan Dec 2012

A Cloud-Based Design Of Smart Car Information Services, Yi Xu, Jun Yan

Dr Jun Yan

"Although modern Smart Car technologies are growing rapidly, there are many challenges to be addressed. The limited processing capabilities of the contemporary in-car computers in smart cars may cause bottlenecks in smart control. The content in smart car applications can hardly be extended. In addition, the traditional software installation approach that is used in smart cars is neither economical nor convenient. To address these issues in smart cars, this paper presents a Cloud-based Information Integration Platform that has the ability to improve flexibility and enhance the value of smart cars. In this work, the architecture of the Cloud-based Information Integration …


Identifying Anatomical Shape Difference By Regularized Discriminative Direction, Luping Zhou, Richard Hartley, Lei Wang, Paulette Lieby, Nick Barnes Dec 2012

Identifying Anatomical Shape Difference By Regularized Discriminative Direction, Luping Zhou, Richard Hartley, Lei Wang, Paulette Lieby, Nick Barnes

Dr Lei Wang

Identifying the shape difference between two groups of anatomical objects is important for medical image analysis and computer-aided diagnosis. A method called ldquodiscriminative directionrdquo in the literature has been proposed to solve this problem. In that method, the shape difference between groups is identified by deforming a shape along the discriminative direction. This paper conducts a thorough study about inferring this discriminative direction in an efficient and accurate way. First, finding the discriminative direction is reformulated as a preimage problem in kernel-based learning. This provides a complementary but conceptually simpler solution than the previous method. More importantly, we find that …


A Provable Secure Id-Based Explicit Authenticated Key Agreement Protocol Without Random Oracles, Haibo Tian, Willy Susilo, Yang Ming, Yumin Wang Dec 2012

A Provable Secure Id-Based Explicit Authenticated Key Agreement Protocol Without Random Oracles, Haibo Tian, Willy Susilo, Yang Ming, Yumin Wang

Professor Willy Susilo

In this paper, we present an identity-based explicit authenticated key agreement protocol that is provably secure without random oracles. The protocol employs a new method to isolate a session key from key con¯rmation keys so that there is no direct usage of hash functions in the protocol. The protocol is proved secure without random oracles in a variant of Bellare and Rogaway style model, an exception to current proof method in this style model in the ID-based setting. We believe that this key isolation method is novel and can be further studied for constructing more e±cient protocols.


Efficient Strong Designated Verifier Signature Schemes Without Random Oracle Or With Non-Delegatability, Q Huang, G Yang, D S Wong, Willy Susilo Dec 2012

Efficient Strong Designated Verifier Signature Schemes Without Random Oracle Or With Non-Delegatability, Q Huang, G Yang, D S Wong, Willy Susilo

Professor Willy Susilo

Designated verifier signature (DVS) allows a signer to convince a designated verifier that a signature is generated by the signer without letting the verifier transfer the conviction to others, while the public can still tell that the signature must be generated by one of them. Strong DVS (SDVS) strengthens the latter part by restricting the public from tellingwhether the signature is generated by one of them or by someone else. In this paper, we propose two new SDVS schemes. Compared with existing SDVS schemes, the first new scheme has almost the same signature size and meanwhile, is proven secure in …


Analysis Of Property-Preservation Capabilities Of The Rox And Esh Hash Domain Extenders, Reza Reyhanitabar, Willy Susilo, Yi Mu Dec 2012

Analysis Of Property-Preservation Capabilities Of The Rox And Esh Hash Domain Extenders, Reza Reyhanitabar, Willy Susilo, Yi Mu

Professor Willy Susilo

Two of the most recent and powerful multi-property preserving (MPP) hash domain extension transforms are the Ramdom-Oracle-XOR (ROX) transform and the Enveloped Shoup (ESh) transform. The former was proposed by Andreeva et al. at ASIACRYPT 2007 and the latter was proposed by Bellare and Ristenpart at ICALP 2007. In the existing literature, ten notions of security for hash functions have been considered in analysis of MPP capabilities of domain extension transforms, namely CR, Sec, aSec, eSec (TCR), Pre, aPre, ePre, MAC, PRF, PRO. Andreeva et al. showed that ROX is able to preserve seven properties; namely collision resistance (CR), three …


Analysis Of Property-Preservation Capabilities Of The Rox And Esh Hash Domain Extenders, Reza Reyhanitabar, Willy Susilo, Yi Mu Dec 2012

Analysis Of Property-Preservation Capabilities Of The Rox And Esh Hash Domain Extenders, Reza Reyhanitabar, Willy Susilo, Yi Mu

Dr Reza Reyhanitabar

Two of the most recent and powerful multi-property preserving (MPP) hash domain extension transforms are the Ramdom-Oracle-XOR (ROX) transform and the Enveloped Shoup (ESh) transform. The former was proposed by Andreeva et al. at ASIACRYPT 2007 and the latter was proposed by Bellare and Ristenpart at ICALP 2007. In the existing literature, ten notions of security for hash functions have been considered in analysis of MPP capabilities of domain extension transforms, namely CR, Sec, aSec, eSec (TCR), Pre, aPre, ePre, MAC, PRF, PRO. Andreeva et al. showed that ROX is able to preserve seven properties; namely collision resistance (CR), three …


Analysis Of Property-Preservation Capabilities Of The Rox And Esh Hash Domain Extenders, Reza Reyhanitabar, Willy Susilo, Yi Mu Nov 2012

Analysis Of Property-Preservation Capabilities Of The Rox And Esh Hash Domain Extenders, Reza Reyhanitabar, Willy Susilo, Yi Mu

Professor Yi Mu

Two of the most recent and powerful multi-property preserving (MPP) hash domain extension transforms are the Ramdom-Oracle-XOR (ROX) transform and the Enveloped Shoup (ESh) transform. The former was proposed by Andreeva et al. at ASIACRYPT 2007 and the latter was proposed by Bellare and Ristenpart at ICALP 2007. In the existing literature, ten notions of security for hash functions have been considered in analysis of MPP capabilities of domain extension transforms, namely CR, Sec, aSec, eSec (TCR), Pre, aPre, ePre, MAC, PRF, PRO. Andreeva et al. showed that ROX is able to preserve seven properties; namely collision resistance (CR), three …


A Unified Study Of Epidemic Routing Protocols And Their Enhancements, Zuyong Feng, Kwan-Wu Chin Nov 2012

A Unified Study Of Epidemic Routing Protocols And Their Enhancements, Zuyong Feng, Kwan-Wu Chin

Associate Professor Kwan-Wu Chin

Epidemic protocols belong to a class of routing paradigm that have wide ranging applications in Delay Tolerant Networks (DTNs) due to their simplicity, low delays, and little to no reliance on special nodes. To this end, a comprehensive study of their performance will serve as an important guide to future protocol designers. Unfortunately, to date, there is no work that studies epidemic routing protocols using a common framework that evaluates their performance objectively using the same mobility model and parameters. To this end, we study four categories of epidemic routing protocols. Namely, P-Q epidemic, epidemic with Time-To-Live (TTL), epidemic with …


Pedestrian Sensing Using Time-Of-Flight Range Camera, Xue Wei, Son Lam Phung, Abdesselam Bouzerdoum Nov 2012

Pedestrian Sensing Using Time-Of-Flight Range Camera, Xue Wei, Son Lam Phung, Abdesselam Bouzerdoum

Professor Salim Bouzerdoum

This paper presents a new approach to detect pedestrians using a time-of-flight range camera, for applications in car safety and assistive navigation of the visually impaired. Using 3-D range images not only enables fast and accurate object segmentation and but also provides useful information such as distances to the pedestrians and their probabilities of collision with the user. In the proposed approach, a 3-D range image is first segmented using a modified local variation algorithm. Three state-of-the-art feature extractors (GIST, SIFT, and HOG) are then used to find shape features for each segmented object. Finally, the SVM is applied to …


Regional Development And Local Government: Three Generations Of Federal Intervention, Andrew H. Kelly, Brian Dollery, Bligh Grant Oct 2012

Regional Development And Local Government: Three Generations Of Federal Intervention, Andrew H. Kelly, Brian Dollery, Bligh Grant

Bligh Grant

Contemporary Australian local government faces several daunting problems, not least escalating financial un-sustainability and local infrastructure depletion. The main response of the various state and territory governments has taken the form of a series structural reform programs, with a strong emphasis on forced amalgamation. However, widespread dissatisfaction with the consequences of these compulsory consolidation programs has led to a search for alternative policy solutions based largely on shared services and various types of regional co-operation between local councils. This paper seeks to place proposed ‘regional’ solutions to contemporary problems in historical perspective by providing a comparative account of three distinct …


A Part-Based Template Matching Method For Multi-View Human Detection, Duc Thanh Nguyen, Wanqing Li, Philip Ogunbona Sep 2012

A Part-Based Template Matching Method For Multi-View Human Detection, Duc Thanh Nguyen, Wanqing Li, Philip Ogunbona

Professor Philip Ogunbona

This paper proposes a part-based template matching method for multi-view human detection. The proposed method includes two stages: matching and verification. In particular, the best individual matching parts given a detection window are determined using an improved template matching algorithm. The hypothesis of the matched parts forming a human is then verified by employing a Bayesian-based model. The verification is not only based on the matching costs of individual parts but also how well the combining the matched parts satisfying the configuration constraints of the human body. Experimental results have shown that the proposed method is robust for detecting humans …


Foundational Myths: Country And Conservation In Australia, Michael Adams Jun 2012

Foundational Myths: Country And Conservation In Australia, Michael Adams

Michael Adams

In Australia, while each state has responsibility for the creation and management of their own national park systems, overall coordination is achieved through the Commonwealth National Reserve System. The Australian systems, like many others, are essentially based on the ‘Yellowstone model’ of protected areas: government owned and managed, precise boundaries, and with people present only as visitors or rangers (Stevens 1997). The Yellowstone model had its origins in wilderness protection, and despite many changes, wilderness persists as a foundational concept for Australian national parks.


A New Generic Digital Signature Algorithm, Jennifer Seberry, Vinhbuu To, Dongvu Tonien May 2012

A New Generic Digital Signature Algorithm, Jennifer Seberry, Vinhbuu To, Dongvu Tonien

Professor Jennifer Seberry

In this paper, we study two digital signature algorithms, the DSA and ECDSA, which have become NIST standard and have been widely used in almost all commercial applications. We will show that the two algorithms are actually ‘the same’ algebraically and propose a generic algorithm such that both DSA and ECDSA are instances of it. By looking at this special angle through the generic algorithm, we gain a new insight into the two algorithms DSA and ECDSA. Our new proposed digital signature algorithm is described generically using a group G and a map toNumber : G → Z. As an …