Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Faculty of Informatics - Papers (Archive)

Discipline
Keyword
Publication Year

Articles 31 - 60 of 2013

Full-Text Articles in Physical Sciences and Mathematics

Privacy Enhanced Data Outsourcing In The Cloud, Miao Zhou, Yi Mu, Willy Susilo, Jun Yan, Liju Dong Jan 2012

Privacy Enhanced Data Outsourcing In The Cloud, Miao Zhou, Yi Mu, Willy Susilo, Jun Yan, Liju Dong

Faculty of Informatics - Papers (Archive)

How to secure outsourcing data in cloud computing is a challenging problem, since a cloud environment cannot been considered to be trusted. The situation becomes even more challenging when outsourced data sources in a cloud environment are managed by multiple outsourcers who hold different access rights. In this paper, we introduce an efficient and novel tree-based key management scheme that allows a data source to be accessed by multiple parties who hold different rights. We ensure that the database remains secure, while some selected data sources can be securely shared with other authorized parties.


On Formalizing Inter-Process Relationships, Tri A. Kurniawan, Aditya K. Ghose, Lam-Son Le, Hoa Khanh Dam Jan 2012

On Formalizing Inter-Process Relationships, Tri A. Kurniawan, Aditya K. Ghose, Lam-Son Le, Hoa Khanh Dam

Faculty of Informatics - Papers (Archive)

Most medium to large organizations support large collections of process designs, often stored in business process repositories. These processes are often inter-dependent. Managing such large collections of processes is not a trivial task. We argue that formalizing and establishing inter-process relationships play a critical role in that task leading to a machinery approach in the process repository management. We consider and propose three kinds of such relationships, namely part-whole, inter-operation and generalization-specialization, including their formal definitions, permitting us to develop a machinery approach. Analysis of the relationships relies on the semantically effects annotated process model in BPMN. This paper presents …


Positive Semidefinite Metric Learning Using Boosting-Like Algorithms, Chunhua Shen, Junae Kim, Lei Wang, Anton Van Den Hengel Jan 2012

Positive Semidefinite Metric Learning Using Boosting-Like Algorithms, Chunhua Shen, Junae Kim, Lei Wang, Anton Van Den Hengel

Faculty of Informatics - Papers (Archive)

The success of many machine learning and pattern recognition methods relies heavily upon the identification of an appropriate distance metric on the input data. It is often beneficial to learn such a metric from the input training data, instead of using a default one such as the Euclidean distance. In this work, we propose a boosting-based technique, termed BOOSTMETRIC, for learning a quadratic Mahalanobis distance metric. Learning a valid Mahalanobis distance metric requires enforcing the constraint that the matrix parameter to the metric remains positive semidefinite. Semidefinite programming is often used to enforce this constraint, but does not scale well …


Convex Hypersurfaces With Pinched Principal Curvatures And Flow Of Convex Hypersurfaces By High Powers Of Curvature, Ben Andrews, James Mccoy Jan 2012

Convex Hypersurfaces With Pinched Principal Curvatures And Flow Of Convex Hypersurfaces By High Powers Of Curvature, Ben Andrews, James Mccoy

Faculty of Informatics - Papers (Archive)

We consider convex hypersurfaces for which the ratio of principal curvatures at each point is bounded by a function of the maximum principal curvature with limit 1 at infinity. We prove that the ratio of circumradius to inradius is bounded by a function of the circumradius with limit 1 at zero. We apply this result to the motion of hypersurfaces by arbitrary speeds which are smooth homogeneous functions of the principal curvatures of degree greater than one. For smooth, strictly convex initial hypersurfaces with ratio of principal curvatures sufficiently close to one at each point, we prove that solutions remain …


A New Efficient Optimistic Fair Exchange Protocol Without Random Oracles, Qiong Huang, Guomin Yang, Duncan S Wong, Willy Susilo Jan 2012

A New Efficient Optimistic Fair Exchange Protocol Without Random Oracles, Qiong Huang, Guomin Yang, Duncan S Wong, Willy Susilo

Faculty of Informatics - Papers (Archive)

Optimistic fair exchange (OFE) is a kind of protocols to solve the problem of fair exchange between two parties. Most of the previous work on this topic are provably secure in the random oracle model. In this work, we propose a new construction of OFE from another cryptographic primitive, called time capsule signature. The construction is efficient and brings almost no overhead other than the primitive itself. The security of our new construction is based on that of the underlying primitive without relying on the random oracle heuristic. Applying our generic construction to the time capsule signature scheme recently proposed …


An Eigenvalue Approach To Evaluating Minors For Weighing Matrices W(N,N-1), Anna Karapiperi, Marilena Mitrouli, Michael G. Neubauer, Jennifer Seberry Jan 2012

An Eigenvalue Approach To Evaluating Minors For Weighing Matrices W(N,N-1), Anna Karapiperi, Marilena Mitrouli, Michael G. Neubauer, Jennifer Seberry

Faculty of Informatics - Papers (Archive)

In the present paper we concentrate our study on the evaluation of minors for weighing matrices W(n,n-1). Theoretical proofs concerning their minors up to the order of (n-4) x (n-4) are derived introducing an eigenvalue approach. A general theorem specifying the analytical form of any (n-l) x (n-l) minor is developed. An application to the growth problem for weighing matrices is given.


Reaction Attack On Outsourced Computing With Fully Homomorphic Encryption Schemes, Zhenfei Zhang, Thomas Plantard, Willy Susilo Jan 2012

Reaction Attack On Outsourced Computing With Fully Homomorphic Encryption Schemes, Zhenfei Zhang, Thomas Plantard, Willy Susilo

Faculty of Informatics - Papers (Archive)

Outsourced computations enable more efficient solutions towards practical problems that require major computations. Nevertheless, users’ privacy remains as a major challenge, as the service provider can access users’ data freely. It has been shown that fully homomorphic encryption schemes might be the perfect solution, as it allows one party to process users’ data homomorphically, without the necessity of knowing the corresponding secret keys. In this paper, we show a reaction attack against full homomorphic schemes, when they are used for securing outsourced computation. Essentially, our attack is based on the users’ reaction towards the output generated by the cloud. Our …


Wavelet-Based Resampling Techniques, Richard D. Kenderdine Jan 2012

Wavelet-Based Resampling Techniques, Richard D. Kenderdine

Faculty of Informatics - Papers (Archive)

Resampling methods were first developed in the late 1970s with the aim of obtaining estimates of the error in a statistic calculated from a sample. A necessary restriction was that the observations in the sample had to be independent, and various procedures have since been proposed to adapt the methods to dependent observations. Wavelet transforms that permit data to be analysed from a frequency or time viewpoint simultaneously have also been developed over a similar period. In simple terms, a wavelet transform produces coeffcients that are dierences between adjacent averages over increasing scales, and it has been noted that these …


A Fundamental Analysis Of Continuous Flow Bioreactor And Membrane Reactor Models With Non-Competitive Product Inhibition. Iii. Linear Inhibition, Mark I. Nelson, Wei X. Lim Jan 2012

A Fundamental Analysis Of Continuous Flow Bioreactor And Membrane Reactor Models With Non-Competitive Product Inhibition. Iii. Linear Inhibition, Mark I. Nelson, Wei X. Lim

Faculty of Informatics - Papers (Archive)

The steady-state production of a product produced through the growth of microorganisms in a continuous flow bioreactor is presented. A generalised reactor model is used in which both the classic well-stirred bioreactor and the idealised membrane bioreactor are considered as special cases. The reaction is assumed to be governed by Monod growth kinetics subject to non-competitive product inhibition. Inhibition is modelled as a decreasing linear function of the product concentration with a finite cut-off. This reaction scheme is well documented in the literature, although a stability analysis of the governing equations has not previously been presented. The steady-state solutions for …


Multivariate Whole Genome Average Interval Mapping: Qtl Analysis For Multiple Traits And/Or Environments, Arunas P. Verbyla, Brian R. Cullis Jan 2012

Multivariate Whole Genome Average Interval Mapping: Qtl Analysis For Multiple Traits And/Or Environments, Arunas P. Verbyla, Brian R. Cullis

Faculty of Informatics - Papers (Archive)

A major aim in some plant-based studies is the determination of quantitative trait loci (QTL) for multiple traits or across multiple environments. Understanding these QTL by trait or QTL by environment interactions can be of great value to the plant breeder. A whole genome approach for the analysis of QTL is presented for such multivariate applications. The approach is an extension of whole genome average interval mapping in which all intervals on a linkage map are included in the analysis simultaneously. A random effects working model is proposed for the multivariate (trait or environment) QTL effects for each interval, with …


The Idio-Technopolis [Editorial], Katina Michael Jan 2012

The Idio-Technopolis [Editorial], Katina Michael

Faculty of Informatics - Papers (Archive)

The rapid rise of social media has brought with it an emphasis on the distinct dimensions of the whole person. Social media recognizes that the individual has a personal network of extensions – a home life, a work life, a social life, a study life, a hobbyist life, and much more – some of these identities even hidden from full view. Each of these online value networks are now accessible by big business, where opinion leaders and early adopters are easily distinguishable, and where brand commentary between consumers matters manifold more than any form of targeted advertising.


Solitary Waves And Their Stability In Colloidal Media: Semi-Analytical Solutions, Timothy R. Marchant, N F. Smyth Jan 2012

Solitary Waves And Their Stability In Colloidal Media: Semi-Analytical Solutions, Timothy R. Marchant, N F. Smyth

Faculty of Informatics - Papers (Archive)

Spatial solitary waves in colloidal suspensions of spherical dielectric nanopartides are considered. The interaction of the nanoparticles is modelled as a hard-sphere gas, with the Carnahan-Starling formula used for the gas compressibility. Semi-analytical solutions, for both one and two spatial dimensions, arc derived using an averaged Lagrangian and suitable trial functions for the solitary waves. Power versus propagation constant curves and neutral stability curves are obtained for both cases, which illustrate that multiple solution branches occur for both the one and two dimensional geometries. For the one-dimensional case it is found that three solution branches (with a bistable regime) occur. …


Generalised Diffusive Delay Logistic Equations: Semi-Analytical Solutions, H Y. Alfifi, Timothy R. Marchant, M I. Nelson Jan 2012

Generalised Diffusive Delay Logistic Equations: Semi-Analytical Solutions, H Y. Alfifi, Timothy R. Marchant, M I. Nelson

Faculty of Informatics - Papers (Archive)

This paper considers semi-analytical solutions for a class of generalised logis- tic partial dierential equations with both point and distributed delays. Both one and two-dimensional geometries are considered. The Galerkin method is used to approximate the governing equations by a system of ordinary dierential delay equations. This method involves assuming a spatial structure for the solution and averaging to obtain the ordinary dierential delay equation models. Semi-analytical results for the stability of the system are derived with the critical parameter value, at which a Hopf bifurcation occurs, found. The results show that diusion acts to stabilise the system, compared to …


Transport Commons: A Community Based Public Transport System, Farzad Safaei Jan 2012

Transport Commons: A Community Based Public Transport System, Farzad Safaei

Faculty of Informatics - Papers (Archive)

In this paper we present a generalization of the concept of car-pooling for a public transport system, in which members of the community donate their trips to the 'transport commons'. The proposed system will then match the passengers to vehicles based on a range of criteria, including trip times, personal choices and economic incentives. We develop an analytical model to determine the probability of obtaining a ride from the transport commons in a worst-case scenario. The results of the analysis as well as simulation study demonstrate that the transport commons can provide a practical basis for a dependable public transport …


A Cloud-Based Design Of Smart Car Information Services, Yi Xu, Jun Yan Jan 2012

A Cloud-Based Design Of Smart Car Information Services, Yi Xu, Jun Yan

Faculty of Informatics - Papers (Archive)

"Although modern Smart Car technologies are growing rapidly, there are many challenges to be addressed. The limited processing capabilities of the contemporary in-car computers in smart cars may cause bottlenecks in smart control. The content in smart car applications can hardly be extended. In addition, the traditional software installation approach that is used in smart cars is neither economical nor convenient. To address these issues in smart cars, this paper presents a Cloud-based Information Integration Platform that has the ability to improve flexibility and enhance the value of smart cars. In this work, the architecture of the Cloud-based Information Integration …


Anisotropic Coupled Diffusion Filter And Binarization For The Electronic Speckle Pattern Interferometry Fringes, Fang Zhang, Zhitao Xiao, Jun Wu, Lei Geng, Hongqiang Li, Jiangtao Xi, Jin Jiang Wang Jan 2012

Anisotropic Coupled Diffusion Filter And Binarization For The Electronic Speckle Pattern Interferometry Fringes, Fang Zhang, Zhitao Xiao, Jun Wu, Lei Geng, Hongqiang Li, Jiangtao Xi, Jin Jiang Wang

Faculty of Informatics - Papers (Archive)

In this paper novel approaches based on anisotropic coupled diffusion equations are presented to do filter and binarization for ESPI fringes. An advantageous characteristic associated with the proposed technique is that diffusion takes place mainly along the direction of the edge. Therefore, the proposed anisotropic coupled diffusion filter method can avoid blur of the fringe edge and protect the useful information of the fringe patterns. The anisotropic coupled diffusion binarization, which can repair the image boundary anisotropically, is able to avoid the redundant burr. More important, it can be directly applied to the noisy ESPI fringe patterns without much preprocessing, …


A Unified Study Of Epidemic Routing Protocols And Their Enhancements, Zuyong Feng, Kwan-Wu Chin Jan 2012

A Unified Study Of Epidemic Routing Protocols And Their Enhancements, Zuyong Feng, Kwan-Wu Chin

Faculty of Informatics - Papers (Archive)

Epidemic protocols belong to a class of routing paradigm that have wide ranging applications in Delay Tolerant Networks (DTNs) due to their simplicity, low delays, and little to no reliance on special nodes. To this end, a comprehensive study of their performance will serve as an important guide to future protocol designers. Unfortunately, to date, there is no work that studies epidemic routing protocols using a common framework that evaluates their performance objectively using the same mobility model and parameters. To this end, we study four categories of epidemic routing protocols. Namely, P-Q epidemic, epidemic with Time-To-Live (TTL), epidemic with …


Perceptions Of A Gender-Inclusive Curriculum Amongst Australian Information And Communications Technology Academics, Tony Koppi, Madeleine Roberts, Golshah Naghdy Jan 2012

Perceptions Of A Gender-Inclusive Curriculum Amongst Australian Information And Communications Technology Academics, Tony Koppi, Madeleine Roberts, Golshah Naghdy

Faculty of Informatics - Papers (Archive)

The lack of female enrolments in ICT is widely recognised and has prompted a range of strategies to attract more women, most of which do not include curriculum changes at any level. Research suggests that there are aspects of the ICT curriculum that could appeal to females, particularly in relation to benefits to society and humanity in general, and that including these considerations in the curriculum would be of interest to all students. The perceptions of a gender-inclusive ICT curriculum in Australia have been ascertained from a survey and forum discussions of ICT academic managers and leaders of ICT learning …


A Fundamental Analysis Of Continuous Flow Bioreactor And Membrane Reactor Models With Tessier Kinetics, M I. Nelson, E Balakrishnan, H S. Sidhu Jan 2012

A Fundamental Analysis Of Continuous Flow Bioreactor And Membrane Reactor Models With Tessier Kinetics, M I. Nelson, E Balakrishnan, H S. Sidhu

Faculty of Informatics - Papers (Archive)

In this research we analyze the steady-state operation of a continuous flow bioreactor, with or without recycle, and an idealized or nonidealized continuous flow membrane reactor. The model extends to include a fixed bed reactor where a fraction of the biomass is detached by the flow. The reaction is assumed to be governed by Tessier growth kinetics. We show that a flow reactor with idealized recycle has the same performance as an idealized membrane reactor and that the performance of a nonidealized membrane reactor is identical to that of an appropriately defined continuous flow bioreactor with nonidealized recycle. The performance …


Boundary Quotients Of The Toeplitz Algebra Of The Affine Semigroup Over The Natural Numbers, Nathan Brownlowe, Astrid An Huef, Marcelo Laca, Iain Raeburn Jan 2012

Boundary Quotients Of The Toeplitz Algebra Of The Affine Semigroup Over The Natural Numbers, Nathan Brownlowe, Astrid An Huef, Marcelo Laca, Iain Raeburn

Faculty of Informatics - Papers (Archive)

No abstract provided.


Integration On Locally Compact Noncommutative Spaces, A L. Carey, V Gayral, Adam C. Rennie, F A. Sukochev Jan 2012

Integration On Locally Compact Noncommutative Spaces, A L. Carey, V Gayral, Adam C. Rennie, F A. Sukochev

Faculty of Informatics - Papers (Archive)

We present an ab initio approach to integration theory for nonunital spectral triples. This is done without reference to local units and in the full generality of semifinite noncommutative geometry. The main result is an equality between the Dixmier trace and generalised residue of the zeta function and heat kernel of suitable operators. We also examine definitions for integrable bounded elements of a spectral triple based on zeta function, heat kernel and Dixmier trace techniques. We show that zeta functions and heat kernels yield equivalent notions of integrability, which imply Dixmier traceability.


Blacr: Ttp-Free Blacklistable Anonymous Credentials With Reputation, Man Ho Au, Apu Kapadia, Willy Susilo Jan 2012

Blacr: Ttp-Free Blacklistable Anonymous Credentials With Reputation, Man Ho Au, Apu Kapadia, Willy Susilo

Faculty of Informatics - Papers (Archive)

Anonymous authentication can give users the license to misbehave since there is no fear of retribution. As a deterrent, or means to revocation, various schemes for accountable anonymity feature some kind of (possibly distributed) trusted third party (TTP) with the power to identify or link misbehaving users. Recently, schemes such as BLAC and PEREA showed how anonymous revocation can be achieved without such TTPs—anonymous users can be revoked if they misbehave, and yet nobody can identify or link such users cryptographically. Despite being the state of the art in anonymous revocation, these schemes allow only a basic form of revocation …


Attribute-Based Oblivious Access Control, Jinguang Han, Willy Susilo, Yi Mu, Jun Yan Jan 2012

Attribute-Based Oblivious Access Control, Jinguang Han, Willy Susilo, Yi Mu, Jun Yan

Faculty of Informatics - Papers (Archive)

In an attribute-based system (ABS), users are identified by various attributes, instead of their identities. Since its seminal introduction, the attribute-based mechanism has attracted a lot of attention. However, current ABS schemes have a number of drawbacks: (i) the communication cost is linear in the number of the required attributes; (ii) the computation cost is linear in the number of the required attributes and (iii) there are no efficient verification algorithms for the secret keys. These drawbacks limit the use of ABS in practice. In this paper, we propose an attribute-based oblivious access control (ABOAC) scheme to address these problems, …


Dynamical Random-Set Modeling Of Concentrated Precipitation In North America, Noel Cressie, Renato Assuncao, Scott H. Holan, Michael Levine, Orietta Nicolis, Jun Zhang, Jian Zou Jan 2012

Dynamical Random-Set Modeling Of Concentrated Precipitation In North America, Noel Cressie, Renato Assuncao, Scott H. Holan, Michael Levine, Orietta Nicolis, Jun Zhang, Jian Zou

Faculty of Informatics - Papers (Archive)

In order to study climate at scales where policy decisions can be made, regional climate models (RCMs) have been developed with much finer resolution (~50 km) than the ~500 km resolution of atmosphere-ocean general circulation models (AOGCMs). The North American Regional Climate Change Assessment Program (NARCCAP) is an international program that provides 50-km resolution climate output for the United States, Canada, and northern Mexico. In Phase I, there are six RCMs, from which we choose one to illustrate our methodology. The RCMs are updated every 3 hours and contain a number of variables, including temperature, precipitation, wind speed, wind direction, …


Semi-Analytical Solutions For Dispersive Shock Waves In Colloidal Media, Timothy R. Marchant, N. F. Smyth Jan 2012

Semi-Analytical Solutions For Dispersive Shock Waves In Colloidal Media, Timothy R. Marchant, N. F. Smyth

Faculty of Informatics - Papers (Archive)

The diffractive resolution of a discontinuity at the edge of an optical beam in a colloidal suspension of spherical dielectric nanoparticles by a collisionless shock, or undular bore, is studied. The interaction of the nanoparticles is modelled as a hard-sphere gas with the Carnahan-Starling formula used for the gas compressibility. The governing equation is a focusing nonlinear Schr¨odinger-type equation with an implicit nonlinearity. It is found that the discontinuity is resolved through the formation of a dispersive shock wave which forms before the eventual onset of modulational instability. A semi-analytical solution is developed in the 1 + 1 dimensional case …


Location-Based Social Networking: Impact On Trust In Relationships, Sarah J. Fusco, Roba Abbas, Katina Michael, Anas Aloudat Jan 2012

Location-Based Social Networking: Impact On Trust In Relationships, Sarah J. Fusco, Roba Abbas, Katina Michael, Anas Aloudat

Faculty of Informatics - Papers (Archive)

Location based social networking (LBSN) applications are part of a new suite of social networking tools. LBSN is the convergence between location based services (LBS) and online social networking (OSN). LBSN applications offer users the ability to look up the location of another “friend” remotely using a smart phone, desktop or other device, anytime and anywhere. Users invite their friends to participate in LBSN and there is a process of consent that follows. This paper explores the potential impact of LBSN upon trust in society. It looks at the willingness of individuals to share their location data with family, friends, …


Evaluating Usage Of Wsmo And Owl-S In Semantic Web Services, Lina Azleny Kamaruddin, Jun Shen, Ghassan Beydoun Jan 2012

Evaluating Usage Of Wsmo And Owl-S In Semantic Web Services, Lina Azleny Kamaruddin, Jun Shen, Ghassan Beydoun

Faculty of Informatics - Papers (Archive)

Applying ontologies is the most promising approach to semantically enrich Web services. To facilitate this, two efforts contributed the most in enabling the creation of ontologies: OWL-S from the US and WSMO in Europe. These two compete and promote their ontologies from the design perspective, reflecting their inventors’ bias but not offering much help to Web service developers using them. To bypass existing biases and enable evaluation of ontologies expressed in these two languages, this paper provides a study of the two important facilitators, OWL-S and WSMO, surveying their usage in several SWS Projects and identifying their respective and outstanding …


A Survey On Bio-Inspired Algorithms For Web Service Composition, Lijuan Wang, Jun Shen, Jianming Yong Jan 2012

A Survey On Bio-Inspired Algorithms For Web Service Composition, Lijuan Wang, Jun Shen, Jianming Yong

Faculty of Informatics - Papers (Archive)

Web service composition has become a promis- ing technology in a variety of e-science or e-business areas. There are a variety of models and methods to deal with this issue from dierent aspects. Bio-inspired algorithms are becoming main approaches and solutions. This paper reviews the current researches on web service composition based on bio-inspired algorithms, such as Ant Colony Opti- mization(ACO), Genetic Algorithm(GA), Evolutionary Al- gorithm(EA) and Particle Swarm Optimization(PSO). By analyzing and investigating dierent approaches, this paper gives an overview about the researches on bio-inspired al- gorithm in web service composition and point out future directions.


On Crystal Sets, Chun Li, Jennifer Seberry Jan 2012

On Crystal Sets, Chun Li, Jennifer Seberry

Faculty of Informatics - Papers (Archive)

We are interested in 2-crystal sets and protocrystal sets in which every difference between distinct elements occurs zero or an even number of times. We show that several infinite families of such sets exist. We also give non-existence theorems for infinite families. We find conditions to limit the computer search space for such sets. We note that search for 2-crystal sets (n; k1, k2), k =k1 + k2 even, in a set of size n, immediately cuts the search space for two circulant weighing matrices with periodic autocorrelation function zero from 32n to …


Enhancing The Perceived Visual Quality Of A Size Invariant Visual Cryptography Scheme, Yang-Wai Chow, Willy Susilo, Duncan S Wong Jan 2012

Enhancing The Perceived Visual Quality Of A Size Invariant Visual Cryptography Scheme, Yang-Wai Chow, Willy Susilo, Duncan S Wong

Faculty of Informatics - Papers (Archive)

Two of the main areas of research in visual cryptography have been on improving the visual quality of the recovered image and in reducing the pixel expansion of the shares. This paper addresses both of these visual cryptography issues. First, a method to enhance the perceived visual quality of the recovered image using various image filtering techniques is presented. In particular, these image filtering techniques are used to enhance the local and global contrasts of a grayscale image. Second, a multi-pixel block size invariant visual cryptography scheme that maintains the relative density of local neighboring pixels is proposed. This method …