Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 27 of 27

Full-Text Articles in Physical Sciences and Mathematics

Enhanced Learner Model For Adaptive Mobile Learning, Ahmed Alhmouz, Jun Shen, Jun Yan, Rami Al-Hmouz Dec 2012

Enhanced Learner Model For Adaptive Mobile Learning, Ahmed Alhmouz, Jun Shen, Jun Yan, Rami Al-Hmouz

Dr Jun Yan

Personalisation and learner modelling are becoming more important in the area of mobile learning applications, taking into consideration learners' interests, preferences and contextual information. Students nowadays are able to learn anywhere and at any time. Mobile learning application content is one of several factors within various contexts that play an important role in the success of the adaptation process. The vast amount of data involved in any successful adaptation process creates complexity and poses serious challenges. This paper focuses on how to model the learner and all possible contexts in an extensible way that can be used for personalisation in …


Towards Qos-Based Web Services Discovery, Jun Yan, Jingtai Piao Dec 2012

Towards Qos-Based Web Services Discovery, Jun Yan, Jingtai Piao

Dr Jun Yan

The current UDDI-based web services discovery technologies are designed to discover services which can satisfy consumers’ functional requirements. The consumers’ non-functional requirements such as quality of services are largely ignored in discovery. This may lead to the problem that the services returned from discovery are ineffective and even useless. To solve this problem, this paper presents an approach to achieving QoS-based Web services discovery. Data structures are proposed for both service providers and service consumers to describe non-functional information about services. A serial of algorithms are developed for matching and ranking services according to consumers’ non-functional requirements.


A Generic Construction Of Dynamic Single Sign-On With Strong Security, Jinguang Han, Yi Mu, Willy Susilo, Jun Yan Dec 2012

A Generic Construction Of Dynamic Single Sign-On With Strong Security, Jinguang Han, Yi Mu, Willy Susilo, Jun Yan

Dr Jun Yan

Single Sign-On (SSO) is a core component in a federated identity management (FIM). Dynamic Single Sign-on (DSSO) is a more flexible SSO where users can change their service requirements dynamically. However, the security in the current SSO and DSSO systems remain questionable. As an example, personal credentials could be illegally used to allow illegal users to access the services. It is indeed a challenging task to achieve strong security in SSO and DSSO. In this paper, we propose a generic construction of DSSO with strong security. We propose the formal definitions and security models for SSO and DSSO, which enable …


Swindew-A P2p-Based Decentralized Workflow Management System, Jun Yan, Y. Yang, G. K. Raikundalia Dec 2012

Swindew-A P2p-Based Decentralized Workflow Management System, Jun Yan, Y. Yang, G. K. Raikundalia

Dr Jun Yan

Workflow technology undoubtedly has been one of the most important domains of interest over the past decades, from both research and practice perspectives. However, problems such as potential poor performance, lack of reliability, limited scalability, insufficient user support, and unsatisfactory system openness are largely ignored. This research reveals that these problems are mainly caused by the mismatch between application nature, i.e., distributed, and system design, i.e., centralized management. Therefore, conventional approaches based on the client-server architecture have not addressed them properly so far. The authors abandon the dominating client-server architecture in supporting workflow because of its inherent limitations. Instead, the …


Privacy Preserving Protocol For Service Aggregation In Cloud Computing, Peishun Wang, Yi Mu, Willy Susilo, Jun Yan Dec 2012

Privacy Preserving Protocol For Service Aggregation In Cloud Computing, Peishun Wang, Yi Mu, Willy Susilo, Jun Yan

Dr Jun Yan

Cloud computing has increasingly become a new model in the world of computing, and more businesses are moving to the cloud. As a cost-effective and time-efficient way to develop new applications and services, service aggregation in cloud computing empowers all service providers and consumers and creates tremendous opportunities in various industry sectors. However, it also poses various challenges to the privacy of personal information as well as the confidentiality of business and governmental information. The full benefits of service aggregation in cloud computing would only be enjoyed if the privacy concerns are addressed properly. In this paper, we investigate the …


A Cloud Based Information Integration Platform For Smart Cars, Yi Xu, Jun Yan Dec 2012

A Cloud Based Information Integration Platform For Smart Cars, Yi Xu, Jun Yan

Dr Jun Yan

Current in-car computers have limited processing capabilities, and the content in smart car applications is poor extension. Even more, tradition software install approach which was used in smart cars lacks neither economy nor convenience. To solve these issues, we introduced a Cloud based Information Integration Platform for Smart Cars that has the ability to encourage flexibility in smart cars and enhance the value of them. To achieve the smart control and information sharing in smart cars, the platform collects data on the CAN bus automatically, with the ability to process CAN bus messages in Clouds. The Smart Car Information Service …


Insc: An Iterative Negotiation Approach For Service Compositions, Q He, Yun Yang, Jun Yan, Hai Jin Dec 2012

Insc: An Iterative Negotiation Approach For Service Compositions, Q He, Yun Yang, Jun Yan, Hai Jin

Dr Jun Yan

The service-oriented paradigm offers support for engineering service-based systems (SBSs) based on service compositions. The selection of services with the aim to fulfil the quality constraints for SBSs and to achieve the optimisation goals is a critical and challenging issue. In particular, when the quality-of-service (QoS) constraints for a SBS are severe, it is often difficult to find an optimal solution for the SBS. Exploiting the competition among service providers can help SBS developers obtain favourable QoS offers for the component services of SBSs and increase the possibility of finding optimal solutions for the SBSs. In this paper, we present …


Design An Automatic Appointment System To Improve Patient Access To Primary Health Care, Hongxiang Hu, Ping Yu, Jun Yan Dec 2012

Design An Automatic Appointment System To Improve Patient Access To Primary Health Care, Hongxiang Hu, Ping Yu, Jun Yan

Dr Jun Yan

Advanced Access model has been introduced in general practice in the United States to improve patient access to primary health care services for more than ten years. It has brought in the benefits of eliminating service provider’s waiting lists, improving patients’ timely access to services and reducing no-show rate. However, to implement this model, practices need to collect relevant information, develop contingency plans and set up practice strategies to balance the provision of care and patient’s demand. These tasks are not always easy to achieve. Understanding the requirements and constraints for effective management of patient booking is essential for developing …


Towards Dynamic Formation Of Temporal Constraints For The Service Level Agreements Negotiation, Azlan Ismail, Jun Yan, Jun Shen Dec 2012

Towards Dynamic Formation Of Temporal Constraints For The Service Level Agreements Negotiation, Azlan Ismail, Jun Yan, Jun Shen

Dr Jun Yan

SLAs play an important role for the QoS-driven service composition. Meanwhile, the temporal constraints are one of the main elements in the management of SLA especially in specifying the validity period of the QoS offers. In practice, the temporal constraints should be generated dynamically by taking the resource capability of the provider into account. The generation should consider various parameters that influence the resource capability such as the expected duration of the required Web service, the amount of current utilization, the amount of available resources, the number of required time slots, etc. Therefore, this paper aims to elaborate this issue …


Modeling Mobile Learning System Using Anfis, Ahmed Al-Hmouz, Jun Shen, Jun Yan, Rami Al-Hmouz Dec 2012

Modeling Mobile Learning System Using Anfis, Ahmed Al-Hmouz, Jun Shen, Jun Yan, Rami Al-Hmouz

Dr Jun Yan

Personalisation is becoming more important in the area of mobile learning. Learner model is logically partitioned into smaller elements or classes in the form of learner profiles, which can represent the entire learning process. Machine learning techniques have the ability to detect patterns from complicated data and learn how to perform activities based on learner profiles. This paper focuses on a systematic approach in reasoning the learner contexts to deliver adaptive learning content. A fuzzy rule base model that has been proposed in related work is found insufficient in deciding all possible conditions. To tackle this problem, this paper adopts …


Kernel Density Estimation Of Traffic Accidents In A Network Space, Zhixiao Xie, Jun Yan Dec 2012

Kernel Density Estimation Of Traffic Accidents In A Network Space, Zhixiao Xie, Jun Yan

Dr Jun Yan

A standard planar Kernel Density Estimation (KDE) aims to produce a smooth density surface of spatial point events over a 2-D geographic space. However, the planar KDE may not be suited for characterizing certain point events, such as traffic accidents, which usually occur inside a 1-D linear space, the roadway network. This paper presents a novel network KDE approach to estimating the density of such spatial point events. One key feature of the new approach is that the network space is represented with basic linear units of equal network length, termed lixel (linear pixel), and related network topology. The use …


Computing Resource Prediction For Mapreduce Applications Using Decision Tree, Jing Piao, Jun Yan Dec 2012

Computing Resource Prediction For Mapreduce Applications Using Decision Tree, Jing Piao, Jun Yan

Dr Jun Yan

The cloud computing paradigm offer users access to computing resource in a pay-as-you-go manner. However, to both cloud computing vendors and users, it is a challenge to predict how much resource is needed to run an application in a cloud at a required level of quality. This research focuses on developing a model to predict the computing resource consumption of MapReduce applications in the cloud computing environment. Based on the Classified and Regression Tree (CART), the proposed approach derives knowledge of the relationship among the application features, quality of service, and amount of computing resource, from a small training. The …


Privacy Enhanced Data Outsourcing In The Cloud, Miao Zhou, Yi Mu, Willy Susilo, Jun Yan, Liju Dong Dec 2012

Privacy Enhanced Data Outsourcing In The Cloud, Miao Zhou, Yi Mu, Willy Susilo, Jun Yan, Liju Dong

Dr Jun Yan

How to secure outsourcing data in cloud computing is a challenging problem, since a cloud environment cannot been considered to be trusted. The situation becomes even more challenging when outsourced data sources in a cloud environment are managed by multiple outsourcers who hold different access rights. In this paper, we introduce an efficient and novel tree-based key management scheme that allows a data source to be accessed by multiple parties who hold different rights. We ensure that the database remains secure, while some selected data sources can be securely shared with other authorized parties.


New Constructions Of Osbe Schemes And Their Applications In Oblivious Access Control, Jinguang Han, Willy Susilo, Yi Mu, Jun Yan Dec 2012

New Constructions Of Osbe Schemes And Their Applications In Oblivious Access Control, Jinguang Han, Willy Susilo, Yi Mu, Jun Yan

Dr Jun Yan

Oblivious signature-based envelope (OSBE) schemes have demonstrated their potential applications in the protection of users privacy and rights. In an OSBE protocol, an encrypted message can only be decrypted by the receiver who holds a valid signature on a public message, while the sender (encrypter) does not know whether the receiver has the signature or not. Our major contributions in this work lie in the following aspects. We improve the notion of OSBE so that a valid credential holder cannot share his/her credential with other users (i. e., all-or-nothing non-transferability). We clarify the relationship between one-round OSBE and identity-based encryption …


Dynamic Trust Model For Federated Identity Management, Hao Gao, Jun Yan, Yi Mu Dec 2012

Dynamic Trust Model For Federated Identity Management, Hao Gao, Jun Yan, Yi Mu

Dr Jun Yan

The goal of federated identity management is to allow principals, such as identities and attributes, to be shared across trust boundaries based on established policies. Since current Single Sign-On (SSO) mechanism excessively relies on the specifications of Circle of Trust (CoT), the need for service collaboration from different domains is being addressed on CoT. For the motivating issue of the cross-domain SSO mechanism, we need an emergent dynamic trust list for calculating the trust parties, thus, the CoT specifications require an initial effort on enrolling members automatically to adapt to the dynamic open environment. In this paper, we propose a …


Towards Autonomous Service Level Agreement Negotiation For Adaptive Service Composition, Jun Yan, J. Zhang, J. Lin, M. Chhetri, S. Goh, R. Kowalczyk Dec 2012

Towards Autonomous Service Level Agreement Negotiation For Adaptive Service Composition, Jun Yan, J. Zhang, J. Lin, M. Chhetri, S. Goh, R. Kowalczyk

Dr Jun Yan

This paper reports innovative research aiming at supporting autonomous establishment and maintenance of service level agreements in order to guarantee end-to-end quality of service requirements for service composition provision. In this research, a set of interrelated service level agreements is established and maintained for a service composition, through autonomous agent negotiation. To enable this, an innovative framework is proposed in which agents on behalf of the service requestor and the service providers can negotiate service level agreements in a coordinated way. This framework also enables adaptive service level agreement re-negotiation in the dynamic and ever-changing service environment.


Wfms-Based Data Integration For E-Learning, Jianming Yong, Jun Yan, Xiaodi Huang Dec 2012

Wfms-Based Data Integration For E-Learning, Jianming Yong, Jun Yan, Xiaodi Huang

Dr Jun Yan

As more and more organisations and institutions are moving towards the e-learning strategy, more and more disparate data are distributed by different e-learning systems. How to effectively use this vast amount of distributed data becomes a big challenge. This paper addresses this challenge and works out a new mechanism to implement data integration for e-learning. A workflow management system based (WFMS-based) data integration model is contributed to the e-learning.


A P2p Based Service Flow System With Advanced Ontology-Based Service Profiles, J. Shen, Y. Yang, Jun Yan Dec 2012

A P2p Based Service Flow System With Advanced Ontology-Based Service Profiles, J. Shen, Y. Yang, Jun Yan

Dr Jun Yan

A peer-to-peer (p2p) based service flow management system, SwinDeW-S, could support decentralised Web service composition, deployment and enactment. However, traditional workflow definition languages, such as extended XPDL and service-oriented BPEL4WS, have become insufficient to specify business process semantics, especially the descriptions of inputs, outputs, preconditions and effects. In this paper, we propose a novel solution based on OWL-S, a semantic Web ontology language that leverages service discovery, invocation and negotiation more effectively. The enhanced SwinDeW-S architecture is adapted with advanced ontology-based service profiles, and it takes advantage of a well-developed profile generation tool, which translates the BPEL4WS process models to …


Efficient Oblivious Transfers With Access Control, Jinguang Han, Willy Susilo, Yi Mu, Jun Yan Dec 2012

Efficient Oblivious Transfers With Access Control, Jinguang Han, Willy Susilo, Yi Mu, Jun Yan

Dr Jun Yan

Oblivious transfer (OT) is a protocol where a receiver can obtain t-out-of-n services from the sender without releasing anything about his choices. OT can be used to protect user’s privacy. In principle, any user can interact with a server to request some services. This might allow some undesirable users to obtain services from the server. How to ensure that only the authorized receivers can obtain services obliviously is a daunting task. In this paper, we introduce oblivious signature based-on envelope (OSBE) to OT and propose two novel OT schemes, which only allow the legitimate receivers to obtain services obliviously. The …


Privacy-Preserved Access Control For Cloud Computing, Miao Zhou, Yi Mu, Willy Susilo, Man Ho Allen Au, Jun Yan Dec 2012

Privacy-Preserved Access Control For Cloud Computing, Miao Zhou, Yi Mu, Willy Susilo, Man Ho Allen Au, Jun Yan

Dr Jun Yan

The problem of access control on outsourced data to "honest but curious" cloud servers has received considerable attention, especially in scenarios involving potentially huge sets of data files, where re-encryption and re-transmission by the data owner may not be acceptable. Considering the user privacy and data security in cloud environment, in this paper, we propose a solution to achieve flexible and fine-grained access control on outsourced data files. In particular, we look at the problem of defining and assigning keys to users based on different attribute sets, and hiding access policies as well as users information to the third-party cloud …


Location-Based Services In Emergency Management- From Government To Citizens: Global Case Studies, A. Aloudat, Katina Michael, Jun Yan Dec 2012

Location-Based Services In Emergency Management- From Government To Citizens: Global Case Studies, A. Aloudat, Katina Michael, Jun Yan

Dr Jun Yan

In emergencies governments have long utilised broadcasting media like radio and television to disseminate up-to-date real-time information to citizens. In the same context, however, some other technologies like mobile location-based services have not been utilised to full extent or potential. The value of such services could be foreseen in the case of critical situations where the coordination of emergency management procedures with location-awareness activities is paramount. This paper tracks the introduction of location-aware services in the realm of emergency management. It investigates case studies where text messaging has been exploited to deliver safety information and early warnings to users based …


Attribute-Based Oblivious Access Control, Jinguang Han, Willy Susilo, Yi Mu, Jun Yan Dec 2012

Attribute-Based Oblivious Access Control, Jinguang Han, Willy Susilo, Yi Mu, Jun Yan

Dr Jun Yan

In an attribute-based system (ABS), users are identified by various attributes, instead of their identities. Since its seminal introduction, the attribute-based mechanism has attracted a lot of attention. However, current ABS schemes have a number of drawbacks: (i) the communication cost is linear in the number of the required attributes; (ii) the computation cost is linear in the number of the required attributes and (iii) there are no efficient verification algorithms for the secret keys. These drawbacks limit the use of ABS in practice. In this paper, we propose an attribute-based oblivious access control (ABOAC) scheme to address these problems, …


Towards Collaborative Service Level Agreement Negotiation, Qiang He, Jun Yan, Yun Yang, Ryszard Kowalczyk, Hai Jin Dec 2012

Towards Collaborative Service Level Agreement Negotiation, Qiang He, Jun Yan, Yun Yang, Ryszard Kowalczyk, Hai Jin

Dr Jun Yan

A critical issue in the Service Level Agreement management for service composition is to control the relationship between the composite service and the component services in the negotiation. However, existing approaches are inefficient. This paper presents a novel agent-based collaborative approach to address this problem. We introduce a negotiation protocol, under which the agents on the service providers’ side collaborate by exchanging information with each other to gain global knowledge of the negotiation. The collaboration can facilitate the progress of the negotiation. We also discuss the corresponding impact on the decision making strategies.


A Cloud-Based Design Of Smart Car Information Services, Yi Xu, Jun Yan Dec 2012

A Cloud-Based Design Of Smart Car Information Services, Yi Xu, Jun Yan

Dr Jun Yan

"Although modern Smart Car technologies are growing rapidly, there are many challenges to be addressed. The limited processing capabilities of the contemporary in-car computers in smart cars may cause bottlenecks in smart control. The content in smart car applications can hardly be extended. In addition, the traditional software installation approach that is used in smart cars is neither economical nor convenient. To address these issues in smart cars, this paper presents a Cloud-based Information Integration Platform that has the ability to improve flexibility and enhance the value of smart cars. In this work, the architecture of the Cloud-based Information Integration …


An Extended Dual Concern Model For Partner Selection In Multi-Agent Systems, Minjie Zhang, Jun Yan, Fenghui Ren Dec 2012

An Extended Dual Concern Model For Partner Selection In Multi-Agent Systems, Minjie Zhang, Jun Yan, Fenghui Ren

Dr Jun Yan

No abstract provided.


Modelling And Simulation Of An Adaptive Neuro-Fuzzy Inference System (Anfis) For Mobile Learning, Ahmed Al-Hmouz, Jun Shen, Rami Al-Hmouz, Jun Yan Dec 2012

Modelling And Simulation Of An Adaptive Neuro-Fuzzy Inference System (Anfis) For Mobile Learning, Ahmed Al-Hmouz, Jun Shen, Rami Al-Hmouz, Jun Yan

Dr Jun Yan

With recent advances in mobile learning (m-learning), it is becoming possible for learning activities to occur everywhere. The learner model presented in our earlier work was partitioned into smaller elements in the form of learner profiles, which collectively represent the entire learning process. This paper presents an Adaptive Neuro-Fuzzy Inference System (ANFIS) for delivering adapted learning content to mobile learners. The ANFIS model was designed using trial and error based on various experiments. This study was conducted to illustrate that ANFIS is effective with hybrid learning, for the adaptation of learning content according to learners' needs. Study results show that …


Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption, Jinguang Han, Willy Susilo, Yi Mu, Jun Yan Dec 2012

Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption, Jinguang Han, Willy Susilo, Yi Mu, Jun Yan

Dr Jun Yan

Decentralized attribute-based encryption (ABE) is a variant of a multiauthority ABE scheme where each authority can issue secret keys to the user independently without any cooperation and a central authority. This is in contrast to the previous constructions, where multiple authorities must be online and setup the system interactively, which is impractical. Hence, it is clear that a decentralized ABE scheme eliminates the heavy communication cost and the need for collaborative computation in the setup stage. Furthermore, every authority can join or leave the system freely without the necessity of reinitializing the system. In contemporary multiauthority ABE schemes, a user's …