Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 22 of 22

Full-Text Articles in Physical Sciences and Mathematics

Bedrock-Sculpturing By Tsunami, South Coast New South Wales, Australia, Edward A. Bryant, R. W. Young Jan 1996

Bedrock-Sculpturing By Tsunami, South Coast New South Wales, Australia, Edward A. Bryant, R. W. Young

Faculty of Science - Papers (Archive)

Bedrock-sculpturing resulting in s-forms is associated with catastrophic flooding in near- and subglacial environments produced by flow velocities approximating 10 m s-1. These velocities can also be produced by extreme tsunami generated by submarine landslides or comet impacts with oceans. Repetitive tsunami events during the late Holocene have overwashed headlands along the New South Wales south coast and produced two suites of bedrock-sculptured terrain. At the smaller scale, s-forms similar to muschelbrüche, v-shaped grooves and sichelwannen have developed on upslopes while broad potholes, flutes and transverse troughs have formed on headland crests. Cavitation features consisting of sinuous grooves, impact marks, …


Security Issues In Mobile Information Networks, Thomas Hardjono, Jennifer Seberry Jan 1996

Security Issues In Mobile Information Networks, Thomas Hardjono, Jennifer Seberry

Faculty of Informatics - Papers (Archive)

During the last decade the decrease in the size of computing machinery, coupled with the increase in their computing power has lend to the development of the concept of mobile computing. Effects of this new vision is currently evident in the flourishing numbers of mobile telephones and portable computing units. In this paper we briefly investigate some issues concerning the security of mobile computing systems, within the framework of the categories of mobility, disconnection, data access modes and scale of operation (Imielinski & Badrinath, 1993). In contrast to previous works which concentrate on security in wireless communications, we focus on …


Beacons For Authentication In Distributed Systems, Azad Jiwa, Thomas Hardjono, Jennifer Seberry Jan 1996

Beacons For Authentication In Distributed Systems, Azad Jiwa, Thomas Hardjono, Jennifer Seberry

Faculty of Informatics - Papers (Archive)

Reliable authentication of communicating entities is essential for achieving security in a distributed computing environment. The design of such systems as Kerberos, SPX and more recently KryptoKnight and Kuperee, have largely been successful in addressing the problem. The common element with these implementations is the need for a trusted third-party authentication service. This essentially requires a great deal of trust to be invested in the authentication server which adds a level of complexity and reduces system flexibility. The use of a Beacon to promote trust between communicating parties was first suggested by M. Rabin in "Transactions protected by beacons", Journal …


New Weighing Matrices, Christos Koukouvinos, Jennifer Seberry Jan 1996

New Weighing Matrices, Christos Koukouvinos, Jennifer Seberry

Faculty of Informatics - Papers (Archive)

New weighing matrices and skew weighing matrices are given for many orders 4t ≤ 100. These are constructed by finding new sequences with zero autocorrelation. These results enable us to determine for the first time that for 4t ≤ 84 a W{4t,k) exists for all k = 1, ... ,4t -1 and also that there exists a skew-weighing matrix (also written as an OD(4t;1,k)) for 4t ≤ 80, t odd, k = a2 + b2 + c2,a,b,c integers except k = 4t - 2 must be the sum of two squares.


On Sufficient Conditions For Some Orthogonal Designs And Sequences With Zero Autocorrelation Function, C. Koukouvinos, M. Mitrouli, Jennifer Seberry, P. Karabelas Jan 1996

On Sufficient Conditions For Some Orthogonal Designs And Sequences With Zero Autocorrelation Function, C. Koukouvinos, M. Mitrouli, Jennifer Seberry, P. Karabelas

Faculty of Informatics - Papers (Archive)

We give new sets of sequences with entries from {0, ±a, ±b, ±c, ±d} on the commuting variables a, b, c, d and zero autocorrelation function. Then we use these sequences to construct some new orthogonal designs. This means that for order 28 only the existence of the following five cases, none of which is ruled out by known theoretical results, remain in doubt: OD(28; 1, 4, 9, 9), OD(28; 1, 8, 8, 9), OD(28; 2, 8, 9, 9), OD(28; 3, 6, 8, 9), OD(28; 4, 4, 4, 9). We consider 4 - N PAF(Sl, S2, …


Necessary And Sufficient Conditions For Some Two Variable Orthogonal Designs In Order 36, Christos Koukouvinos, Nikos Platis, Jennifer Seberry Jan 1996

Necessary And Sufficient Conditions For Some Two Variable Orthogonal Designs In Order 36, Christos Koukouvinos, Nikos Platis, Jennifer Seberry

Faculty of Informatics - Papers (Archive)

We give new sets of sequences with entries from {0, ±a, ±b, ±c, ±d} on the commuting variables a, b, c, d with zero autocorrelation function. We show that the necessary conditions are sufficient for the existence two variable orthogonal designs constructed from circulant matrices in order 36. Further we show that the necessary conditions for the existence of an OD(36;S1,S2) are sufficient except possibly for the following five cases: (3,29) (11,20) (11,21) (13,19) (15,17).


On The Smith Normal Form Of D-Optimal Designs, Christos Koukouvinos, M. Mitrouli, Jennifer Seberry Jan 1996

On The Smith Normal Form Of D-Optimal Designs, Christos Koukouvinos, M. Mitrouli, Jennifer Seberry

Faculty of Informatics - Papers (Archive)

The Smith normal forms (SNF) of V-optimal designs of size < 100 are determined by a computer search. A theorem is given for the SNF of V-optimal designs of order 4t + 2 when 4t + 1 is square free, and bounds for the minimum number of 2's which can appear in the SNF are derived.


Multiplication Of Ternary Complementary Pairs, Marc Gysin, Jennifer Seberry Jan 1996

Multiplication Of Ternary Complementary Pairs, Marc Gysin, Jennifer Seberry

Faculty of Informatics - Papers (Archive)

We present a computer-search method for concatenating or "multiplying" binary or ternary complementary pairs. All multiplications by a particular number m are considered. The computer-search method is new and leads to a large set of new results. The results and equivalences are discussed and some applications and numerical consequences are shown.


Minimal And Maximal Critical Sets In Room Squares, Ghulam Rasool Chaudhry, Jennifer Seberry Jan 1996

Minimal And Maximal Critical Sets In Room Squares, Ghulam Rasool Chaudhry, Jennifer Seberry

Faculty of Informatics - Papers (Archive)

In this paper we introduce critical sets in Room squares. We give the cardinality of the minimal critical sets (min. cs) and maximal critical sets (max. cs) for inequivalence classes of Room squares of side 7,9, and 11. We also describe algorithms to compute min. cs and max. cs and conjecture the lower and upper bounds for min. cs and max. cs.


Shared Cryptographic Bits Via Quantized Quandrature Phase Amplitudes Of Light, Yi Mu, Jennifer Seberry, Yuliang Zheng Jan 1996

Shared Cryptographic Bits Via Quantized Quandrature Phase Amplitudes Of Light, Yi Mu, Jennifer Seberry, Yuliang Zheng

Faculty of Informatics - Papers (Archive)

We propose a novel quantum cryptographic protocol without using polarized photons. The protocol consists of an optical coupler and four nonorthogonal coherent states which are analyzed by means of quadrature phase amplitudes of quantized light field.


Replicating The Kuperee Authentication Server For Increased Security And Reliability, Thomas Hardjono Jan 1996

Replicating The Kuperee Authentication Server For Increased Security And Reliability, Thomas Hardjono

Faculty of Informatics - Papers (Archive)

The current work proposes a new scheme for the replication of authentication services in Kuperee based on a public key cryptosystem, in response to the two main shortcomings of the traditional single server solutions, namely those of low availability and high security risks. The work represents further developments in the Kuperee authentication system. The Kuperee server is presented in its simplified design to aid the presentation of the replication scheme. The replication approach is based on the sharing of session public keys, together with a threshold or secret sharing scheme. However, unlike previous approaches, in the current work the object …


Secret Sharing Schemes Based On Room Squares, Ghulam Rasool Chaudhry, Jennifer Seberry Jan 1996

Secret Sharing Schemes Based On Room Squares, Ghulam Rasool Chaudhry, Jennifer Seberry

Faculty of Informatics - Papers (Archive)

In this paper, we describe secret sharing schemes. We discuss Room squares and their critical sets. We propose a model of sharing based on critical sets of Room squares.


Design And Security Issues In Strongbox Systems For The Internet, Thomas Hardjono, Jennifer Seberry Jan 1996

Design And Security Issues In Strongbox Systems For The Internet, Thomas Hardjono, Jennifer Seberry

Faculty of Informatics - Papers (Archive)

This paper presents and discusses some design and security issues surrounding electronic strongboxes as an electronic counterpart of physical strongboxes typically found in large traditional financial institutions. The concept of electronic strongboxes is briefly discussed, comparing against physical strongboxes. A basic system for electronic strongboxes is then provided and the functional and security requirements of the system's components is presented.


Strong Boxes For Electronic Commerce, Thomas Hardjono, Jennifer Seberry Jan 1996

Strong Boxes For Electronic Commerce, Thomas Hardjono, Jennifer Seberry

Faculty of Informatics - Papers (Archive)

As electronic commerce becomes a reality, additional services related to electronic commerce will also emerge. The current paper proposes the provision of electronic strongboxes as an integrated part of the wider electronic commerce. The strongbox concept is introduced as an electronic counterpart of physical strongboxes typically found in large traditional financial institutions, such as banks, having secure vaults or other secure physical storage. The work identifies some requirements of electronic strongboxes both from the functionality perspective and from the security point of view. A simple framework for an electronic strongbox system is also presented.


Triangle Buildings And Actions Of Type Iii 1/Q2, Jacqueline Ramagge, Guyan Robertson Jan 1996

Triangle Buildings And Actions Of Type Iii 1/Q2, Jacqueline Ramagge, Guyan Robertson

Faculty of Informatics - Papers (Archive)

We study certain group actions on triangle buildings and their boundaries and some von Neumann algebras which can be constructed from them. In particular, for buildings of order q ≥ 3 certain natural actions on the boundary are hyperfinite of type III1/q2.


New Wavelet Based Art Network For Texture Classification, Jiazhao Wang, Golshah Naghdy, Philip O. Ogunbona Jan 1996

New Wavelet Based Art Network For Texture Classification, Jiazhao Wang, Golshah Naghdy, Philip O. Ogunbona

Faculty of Informatics - Papers (Archive)

A new method for texture classification is proposed. It is composed of two processing stages, namely, a low level evolutionary feature extraction based on Gabor wavelets and a high level neural network based pattern recognition. This resembles the process involved in the human visual system. Gabor wavelets are exploited as the feature extractor. A neural network, Fuzzy Adaptive Resonance Theory (Fuzzy ART), acts as the high level decision making and recognition system. Some modifications to the Fuzzy ART make it capable of simulating the post-natal and evolutionary development of the human visual system. The proposed system has been evaluated using …


Texture Analysis Using Gabor Wavelets, Golshah Naghdy, Jianli Wang, Philip Ogunbona Jan 1996

Texture Analysis Using Gabor Wavelets, Golshah Naghdy, Jianli Wang, Philip Ogunbona

Faculty of Informatics - Papers (Archive)

Receptive field profiles of simple cells in the visual cortex have been shown to resemble even- symmetric or odd-symmetric Gabor filters. Computational models employed in the analysis of textures have been motivated by two-dimensional Gabor functions arranged in a multi-channel architecture. More recently wavelets have emerged as a powerful tool for non-stationary signal analysis capable of encoding scale-space information efficiently. A multi-resolution implementation in the form of a dyadic decomposition of the signal of interest has been popularized by many researchers. In this paper, Gabor wavelet configured in a 'rosette' fashion is used as a multi-channel filter-bank feature extractor for …


Differentiate And Make Waves, R. Nillsen Jan 1996

Differentiate And Make Waves, R. Nillsen

Faculty of Informatics - Papers (Archive)

In 1972 Gary Meisters and Wolfgang Schmidt showed that if the Fourier coefficient of a function is zero at the origin, then the function is a sum of three first order differences. They deduced from this that every translation invariant linear form on the space of square integrable functions on the circle group is automatically continuous. Their results were subsequently developed by the author for the case of n-dimensional Euclidean space (Lectures Notes in Mathematics, vol. 1586, Springer-Verlag,1994). The present paper gives an exposition of some of the ideas in this work, with the aim of minimising the technicalities. In …


Global Telerobotics: Exploring Effective Internet Access To Robots, Simon Hartfiel, Susan Hartfiel, Leone Dunn Jan 1996

Global Telerobotics: Exploring Effective Internet Access To Robots, Simon Hartfiel, Susan Hartfiel, Leone Dunn

Faculty of Informatics - Papers (Archive)

This paper describes an Industrial Automation research project at the University of Wollongong, Australia. The project aims to develop a telerobotic planning and control architecture and human robot interface that can be used for intervention robots which require task level programming. In order to investigate global telerobotic principles, the workspace will be made accessible across the Internet via the World Wide Web. The paper describes the experimental setup and implementation of this project, focussing on a discussion of human robot interaction issues, such as interface design problems and the use of a World Wide Web browser for user interaction.


Catastrophic Wave (Tsunami?) Transport Of Boulders In Southern New South Wales, Australia, R. W. Young, Edward A. Bryant, D. M. Price Jan 1996

Catastrophic Wave (Tsunami?) Transport Of Boulders In Southern New South Wales, Australia, R. W. Young, Edward A. Bryant, D. M. Price

Faculty of Science - Papers (Archive)

Deposits of large boulders above modern limits of storm waves along the coast of southern New South Wales record catastrophic wave action. The largest boulders that were moved weigh 80-90 tonnes, and the maximum height of wave action was 32 m. Hydraulic reconstruction indicates flow depths of 3.4 and perhaps > 4 m and velocities of 5.5 m/s to 10.3 m/s. Cavitation features on some rock surfaces support the estimates of maximum velocities. A remarkably limited range in the orientation of imbricated boulders along 150 km indicates that the deposits record a single event that approached from the SE. to SSE. …


Circulant Weighing Designs, K. T. Arasu, Jennifer Seberry Jan 1996

Circulant Weighing Designs, K. T. Arasu, Jennifer Seberry

Faculty of Informatics - Papers (Archive)

Algebraic techniques are employed to obtain necessary conditions for the existence of certain families of circulant weighing designs. As an application we rule out the existence of many circulant weighing designs. In particular, we show that there does not exist a circulant weighing matrix of order 43 for any weight. We also prove two conjectures of Yosef Strassler. © 1996 John Wiley & Sons, Inc.


Selective Withdrawal From Stratified Streams, Chia-Shun Yih, Song-Ping Zhu Jan 1996

Selective Withdrawal From Stratified Streams, Chia-Shun Yih, Song-Ping Zhu

Faculty of Informatics - Papers (Archive)

Selective withdrawal from a stratified stream is considered. The average density of the withdrawn fluid and the flow pattern are found, within the limitations on the densimetric Froude number and the withdrawal rate specified in this paper, to depend on the strength and location of the sink, and very little on any slight variation in the velocity distribution far upstream and the densimetric Froude number. The upstream density distribution is assumed linear, but many other density distributions can be similarly treated.