Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Faculty of Informatics - Papers (Archive)

Discipline
Keyword
Publication Year

Articles 1 - 30 of 2013

Full-Text Articles in Physical Sciences and Mathematics

A Novel Approach To Data Deduplication Over The Engineering-Oriented Cloud Systems, Zhe Sun, Jun Shen, Jianming Young Jan 2013

A Novel Approach To Data Deduplication Over The Engineering-Oriented Cloud Systems, Zhe Sun, Jun Shen, Jianming Young

Faculty of Informatics - Papers (Archive)

This paper presents a duplication-less storage system over the engineering-oriented cloud computing platforms. Our deduplication storage system, which manages data and duplication over the cloud system, consists of two major components, a front-end deduplication application and a mass storage system as back-end. Hadoop distributed file system (HDFS) is a common distribution file system on the cloud, which is used with Hadoop database (HBase). We use HDFS to build up a mass storage system and employ HBase to build up a fast indexing system. With a deduplication application, a scalable and parallel deduplicated cloud storage system can be effectively built up. …


Identity-Based Traitor Tracing With Short Private Key And Short Ciphertext, Fuchun Guo, Yi Mu, Willy Susilo Dec 2012

Identity-Based Traitor Tracing With Short Private Key And Short Ciphertext, Fuchun Guo, Yi Mu, Willy Susilo

Faculty of Informatics - Papers (Archive)

Identity-based traitor tracing (IBTT) scheme can be utilized to identify a private (decryption) key of any identity that is illegally used in an identity-based broadcast encryption scheme. In PKC'07, Abdalla et al. proposed the first IBTT construction with short private key. In CCS'08, Boneh and Naor proposed a public-key traitor tracing, which can be extended to IBTT with short ciphertext. With a further exploration, in this paper, we propose the first IBTT with short private key and short ciphertext. Private key and ciphertext are both order of O(l 1+l 2), where l 1 is the bit length of codeword of …


Implementing Vertical And Horizontal Engineering Students' Integration And Assessment Of Consequence Academic Achievement, Sarim Al-Zubaidy, Nidhal Abdulaziz, Reza Dashtpour Jul 2012

Implementing Vertical And Horizontal Engineering Students' Integration And Assessment Of Consequence Academic Achievement, Sarim Al-Zubaidy, Nidhal Abdulaziz, Reza Dashtpour

Faculty of Informatics - Papers (Archive)

Recent scholarship references indicate that integration of the student body can result in an enhanced learning experience for students and also greater satisfaction. This paper reports the results of a case study whereby mechanical engineering students studying at a newly established branch campus in Dubai of a British university were exposed to vertical and horizontal integration. Different activities have been embedded to ensure that students integrated and worked together with their peers and colleagues at different levels. The implemented processes and practices led to improved academic achievements, which were better than those of a similar cohort of students where no …


Determinants Of Rfid Technology Adoption Intention In The Saudi Retail Industry: An Empirical Study, Salem Alqahtani, S. F. Wamba Jan 2012

Determinants Of Rfid Technology Adoption Intention In The Saudi Retail Industry: An Empirical Study, Salem Alqahtani, S. F. Wamba

Faculty of Informatics - Papers (Archive)

Drawing both on innovation diffusion theory and Radio frequency identification (RFID) technology, this paper assesses the influence of a set of determinants on the intention of Saudi Arabian retail firms to adopt RFID technology. In this study, a two-phase, multi-method approach was used. In the first phase, an interview-based case study was used, while in the second phase, we conducted a survey to gather data from 7 large retailers in Saudi Arabia. Our findings indicate that while the RFID relative advantage, the top management support and information intensity do not have any influence on the intention of Saudi Arabia retail …


Transport Commons: A Community Based Public Transport System, Farzad Safaei Jan 2012

Transport Commons: A Community Based Public Transport System, Farzad Safaei

Faculty of Informatics - Papers (Archive)

In this paper we present a generalization of the concept of car-pooling for a public transport system, in which members of the community donate their trips to the 'transport commons'. The proposed system will then match the passengers to vehicles based on a range of criteria, including trip times, personal choices and economic incentives. We develop an analytical model to determine the probability of obtaining a ride from the transport commons in a worst-case scenario. The results of the analysis as well as simulation study demonstrate that the transport commons can provide a practical basis for a dependable public transport …


Intelligent Load Management In Microgrids, J Kennedy, Philip Ciufo, Ashish Agalgaonkar Jan 2012

Intelligent Load Management In Microgrids, J Kennedy, Philip Ciufo, Ashish Agalgaonkar

Faculty of Informatics - Papers (Archive)

The increased levels of distributed generator (DG) penetration and the customer demand for high levels of reliability have attributed to the formation of the Microgrid concept. The Microgrid concept contains a variety of technical challenges, including load management and anti-islanding protection discrimination strategies. This paper provides a novel scheme in which loads and DG are able to detect the conditions where the load of the island cannot be sufficiently supplied. In these instances, a load shedding algorithm systematically removes loads from the system until an island can be maintained within satisfactory operating limits utilising the local DG. The concept of …


Rfid-Enabled Healthcare Applications, Issues And Benefits: An Archival Analysis (1997-2011), S F. Wamba Jan 2012

Rfid-Enabled Healthcare Applications, Issues And Benefits: An Archival Analysis (1997-2011), S F. Wamba

Faculty of Informatics - Papers (Archive)

In this paper, a comprehensive review of articles published between 1997 and 2011 in the Journal of Medical Systems (JMS) on RFID technology is presented. A total of 22 papers are analyzed using a classification framework that has three dimensions: RFID-enabled healthcare applications, RFID-enabled healthcare issues, and RFID-enabled healthcare benefits. In addition, an invitation sent to all authors of the papers accepted for the special issue on RFID for the JMS allows them to position their various papers within the classification framework. Finally, a list of future research directions is presented.


Business Value Of Rfid-Enabled Healthcare Transformation Projects, Anand Abijith, S. F. Wamba Jan 2012

Business Value Of Rfid-Enabled Healthcare Transformation Projects, Anand Abijith, S. F. Wamba

Faculty of Informatics - Papers (Archive)

Purpose – This paper aims to assess the business value realised from radio frequency identification (RFID)-enabled healthcare transformation projects as compared with other industries. The paper starts with a review of RFID technology in the healthcare industry and further extends to an in-depth analysis of mini-case studies collected from RFID Journal, a leading professional journal dedicated to RFID technology, in order to identify the major benefits of the implementation of RFID systems as well as its business value achieved. In addition, there is further analysis that is being carried out on other industries to have an overview of the benefits …


A Fundamental Analysis Of Continuous Flow Bioreactor And Membrane Reactor Models With Tessier Kinetics, M I. Nelson, E Balakrishnan, H S. Sidhu Jan 2012

A Fundamental Analysis Of Continuous Flow Bioreactor And Membrane Reactor Models With Tessier Kinetics, M I. Nelson, E Balakrishnan, H S. Sidhu

Faculty of Informatics - Papers (Archive)

In this research we analyze the steady-state operation of a continuous flow bioreactor, with or without recycle, and an idealized or nonidealized continuous flow membrane reactor. The model extends to include a fixed bed reactor where a fraction of the biomass is detached by the flow. The reaction is assumed to be governed by Tessier growth kinetics. We show that a flow reactor with idealized recycle has the same performance as an idealized membrane reactor and that the performance of a nonidealized membrane reactor is identical to that of an appropriately defined continuous flow bioreactor with nonidealized recycle. The performance …


Evaluating The Volatility Forecasting Performance Of Best Fitting Garch Models In Emerging Asian Stock Markets, Chaiwat Kosapattarapim, Yan-Xia Lin, Michael Mccrae Jan 2012

Evaluating The Volatility Forecasting Performance Of Best Fitting Garch Models In Emerging Asian Stock Markets, Chaiwat Kosapattarapim, Yan-Xia Lin, Michael Mccrae

Faculty of Informatics - Papers (Archive)

While modeling the volatility of returns is essential for many areas of finance, it is well known that financial return series exhibit many non-normal characteristics that cannot be captured by the standard GARCH model with a normal error distribution. But which GARCH model and which error distribution to use is still open to question, especially where the model that best fits the in-sample data may not give the most effective out-of-sample volatility forecasting ability. Approach: In this study, six simulated studies in GARCH(p,q) with six different error distributions are carried out. In each case, we determine the best fitting GARCH …


Further Analysis Of A Practical Hierarchical Identity-Based Encryption Scheme, Ying Sun, Yong Yu, Yi Mu Jan 2012

Further Analysis Of A Practical Hierarchical Identity-Based Encryption Scheme, Ying Sun, Yong Yu, Yi Mu

Faculty of Informatics - Papers (Archive)

No abstract provided.


Estimating Variance Components And Predicting Breeding Values For Eventing Disciplines And Grades In Sport Horses, I D. Stewart, I.M S. White, Arthur R. Gilmour, R Thompson, J A. Woolliams, S Brotherstone Jan 2012

Estimating Variance Components And Predicting Breeding Values For Eventing Disciplines And Grades In Sport Horses, I D. Stewart, I.M S. White, Arthur R. Gilmour, R Thompson, J A. Woolliams, S Brotherstone

Faculty of Informatics - Papers (Archive)

Eventing competitions in Great Britain (GB) comprise three disciplines, each split into four grades, yielding 12 discipline-grade traits. As there is a demand for tools to estimate (co)variance matrices with a large number of traits, the aim of this work was to investigate different methods to produce large (co)variance matrices using GB eventing data. Data from 1999 to 2008 were used and penalty points were converted to normal scores. A sire model was utilised to estimate fixed effects of gender, age and class, and random effects of sire, horse and rider. Three methods were used to estimate (co)variance matrices. Method …


A Survey On Bio-Inspired Algorithms For Web Service Composition, Lijuan Wang, Jun Shen, Jianming Yong Jan 2012

A Survey On Bio-Inspired Algorithms For Web Service Composition, Lijuan Wang, Jun Shen, Jianming Yong

Faculty of Informatics - Papers (Archive)

Web service composition has become a promis- ing technology in a variety of e-science or e-business areas. There are a variety of models and methods to deal with this issue from dierent aspects. Bio-inspired algorithms are becoming main approaches and solutions. This paper reviews the current researches on web service composition based on bio-inspired algorithms, such as Ant Colony Opti- mization(ACO), Genetic Algorithm(GA), Evolutionary Al- gorithm(EA) and Particle Swarm Optimization(PSO). By analyzing and investigating dierent approaches, this paper gives an overview about the researches on bio-inspired al- gorithm in web service composition and point out future directions.


A Novel Scheduler For Concurrent Tx/Rx Wireless Mesh Networks With Weighted Links, Kwan-Wu Chin, Sieteng Soh, Chen Meng Jan 2012

A Novel Scheduler For Concurrent Tx/Rx Wireless Mesh Networks With Weighted Links, Kwan-Wu Chin, Sieteng Soh, Chen Meng

Faculty of Informatics - Papers (Archive)

This paper considers the NP-hard problem of scheduling weighted links in concurrent transmit/receive wireless mesh networks. The problem generalizes existing works to links with weight wij ≥ 1. We propose an O(|V|2) algorithm, where V is the set of routers, that is orders of magnitude faster than computationally intensive approaches that use the well-known Goemans-Williamson (GWA)'s maximum cut algorithm and also brute-force. Our algorithm generates schedules, on average, with at most 3% and 9% fewer links than the GWA and brute-force approaches respectively.


Efficient Oblivious Transfers With Access Control, Jinguang Han, Willy Susilo, Yi Mu, Jun Yan Jan 2012

Efficient Oblivious Transfers With Access Control, Jinguang Han, Willy Susilo, Yi Mu, Jun Yan

Faculty of Informatics - Papers (Archive)

Oblivious transfer (OT) is a protocol where a receiver can obtain t-out-of-n services from the sender without releasing anything about his choices. OT can be used to protect user’s privacy. In principle, any user can interact with a server to request some services. This might allow some undesirable users to obtain services from the server. How to ensure that only the authorized receivers can obtain services obliviously is a daunting task. In this paper, we introduce oblivious signature based-on envelope (OSBE) to OT and propose two novel OT schemes, which only allow the legitimate receivers to obtain services obliviously. The …


Homology For Higher-Rank Graphs And Twisted C*-Algebras, Alex Kumjian, David Pask, Aidan Sims Jan 2012

Homology For Higher-Rank Graphs And Twisted C*-Algebras, Alex Kumjian, David Pask, Aidan Sims

Faculty of Informatics - Papers (Archive)

We introduce a homology theory for k-graphs and explore its fundamental properties. We establish connections with algebraic topology by showing that the homology of a k-graph coincides with the homology of its topological realisation as described by Kaliszewski et al. We exhibit combinatorial versions of a number of standard topological constructions, and show that they are compatible, from a homological point of view, with their topological counterparts. We show how to twist the C*-algebra of a k-graph by a T-valued 2-cocycle and demonstrate that examples include all noncommutative tori. In the appendices, we construct a cubical set …


Efficient And Secure Stored-Value Cards With Leakage Resilience, Fuchun Guo, Yi Mu, Willy Susilo Jan 2012

Efficient And Secure Stored-Value Cards With Leakage Resilience, Fuchun Guo, Yi Mu, Willy Susilo

Faculty of Informatics - Papers (Archive)

Stored-value cards (SVCs) are a kind of smartcards that can be used to store monetary values. SVCs have demonstrated a wide range of applications in commerce. SVCs are in general tamper-resistant, but they are very computationally weak and their security mechanisms are also weak against side-channel attacks. In this paper, we propose an efficient and secure stored-value card system. With the help of pre-computations, storedvalue cards in our scheme are only required to perform simple arithmetic operations and bitwise comparisons. Our system especially for SVCs is secure with unbounded computational leakage resilience. Our novel scheme provides a practical solution to …


Frequency Selection In Absolute Phase Maps Recovery With Two Frequency Projection Fringes, Yi Ding, Jiangtao Xi, Yanguang Yu, Wengqing Cheng, Shu Wang, Joe F. Chicharo Jan 2012

Frequency Selection In Absolute Phase Maps Recovery With Two Frequency Projection Fringes, Yi Ding, Jiangtao Xi, Yanguang Yu, Wengqing Cheng, Shu Wang, Joe F. Chicharo

Faculty of Informatics - Papers (Archive)

In a recent published work we proposed a technique to recover the absolute phase maps of two fringe patterns with different spatial frequencies. It is demonstrated that a number of selected frequency pairs can be used for the proposed approach, but the published work did not provide a guideline for frequency selection. In addition, the performance of the proposed technique in terms of its anti-noise capability is not addressed. In this paper, the rules for selecting the two frequencies are presented based on theoretical analysis of the proposed technique. Also, when the two frequencies are given, the anti-noise capability of …


Blacr: Ttp-Free Blacklistable Anonymous Credentials With Reputation, Man Ho Au, Apu Kapadia, Willy Susilo Jan 2012

Blacr: Ttp-Free Blacklistable Anonymous Credentials With Reputation, Man Ho Au, Apu Kapadia, Willy Susilo

Faculty of Informatics - Papers (Archive)

Anonymous authentication can give users the license to misbehave since there is no fear of retribution. As a deterrent, or means to revocation, various schemes for accountable anonymity feature some kind of (possibly distributed) trusted third party (TTP) with the power to identify or link misbehaving users. Recently, schemes such as BLAC and PEREA showed how anonymous revocation can be achieved without such TTPs—anonymous users can be revoked if they misbehave, and yet nobody can identify or link such users cryptographically. Despite being the state of the art in anonymous revocation, these schemes allow only a basic form of revocation …


Fault Analysis Of The Katan Family Of Block Ciphers, Shekh Faisal Abdul-Latip, Mohammad Reza Reyhanitabar, Willy Susilo, Jennifer Seberry Jan 2012

Fault Analysis Of The Katan Family Of Block Ciphers, Shekh Faisal Abdul-Latip, Mohammad Reza Reyhanitabar, Willy Susilo, Jennifer Seberry

Faculty of Informatics - Papers (Archive)

In this paper, we investigate security of the KATAN family of block ciphers against differential fault attacks. KATAN consists of three variants with 32, 48 and 64-bit block sizes, called KATAN32, KATAN48 and KATAN64, respectively. All three variants have the same key length of 80 bits. We assume a single-bit fault injection model where the adversary is supposed to be able to corrupt a single random bit of the internal state of the cipher and this fault induction process can be repeated (by resetting the cipher); i.e., the faults are transient rather than permanent. First, we show how to identify …


A New Efficient Optimistic Fair Exchange Protocol Without Random Oracles, Qiong Huang, Guomin Yang, Duncan S Wong, Willy Susilo Jan 2012

A New Efficient Optimistic Fair Exchange Protocol Without Random Oracles, Qiong Huang, Guomin Yang, Duncan S Wong, Willy Susilo

Faculty of Informatics - Papers (Archive)

Optimistic fair exchange (OFE) is a kind of protocols to solve the problem of fair exchange between two parties. Most of the previous work on this topic are provably secure in the random oracle model. In this work, we propose a new construction of OFE from another cryptographic primitive, called time capsule signature. The construction is efficient and brings almost no overhead other than the primitive itself. The security of our new construction is based on that of the underlying primitive without relying on the random oracle heuristic. Applying our generic construction to the time capsule signature scheme recently proposed …


An Eigenvalue Approach To Evaluating Minors For Weighing Matrices W(N,N-1), Anna Karapiperi, Marilena Mitrouli, Michael G. Neubauer, Jennifer Seberry Jan 2012

An Eigenvalue Approach To Evaluating Minors For Weighing Matrices W(N,N-1), Anna Karapiperi, Marilena Mitrouli, Michael G. Neubauer, Jennifer Seberry

Faculty of Informatics - Papers (Archive)

In the present paper we concentrate our study on the evaluation of minors for weighing matrices W(n,n-1). Theoretical proofs concerning their minors up to the order of (n-4) x (n-4) are derived introducing an eigenvalue approach. A general theorem specifying the analytical form of any (n-l) x (n-l) minor is developed. An application to the growth problem for weighing matrices is given.


Reaction Attack On Outsourced Computing With Fully Homomorphic Encryption Schemes, Zhenfei Zhang, Thomas Plantard, Willy Susilo Jan 2012

Reaction Attack On Outsourced Computing With Fully Homomorphic Encryption Schemes, Zhenfei Zhang, Thomas Plantard, Willy Susilo

Faculty of Informatics - Papers (Archive)

Outsourced computations enable more efficient solutions towards practical problems that require major computations. Nevertheless, users’ privacy remains as a major challenge, as the service provider can access users’ data freely. It has been shown that fully homomorphic encryption schemes might be the perfect solution, as it allows one party to process users’ data homomorphically, without the necessity of knowing the corresponding secret keys. In this paper, we show a reaction attack against full homomorphic schemes, when they are used for securing outsourced computation. Essentially, our attack is based on the users’ reaction towards the output generated by the cloud. Our …


Wavelet-Based Resampling Techniques, Richard D. Kenderdine Jan 2012

Wavelet-Based Resampling Techniques, Richard D. Kenderdine

Faculty of Informatics - Papers (Archive)

Resampling methods were first developed in the late 1970s with the aim of obtaining estimates of the error in a statistic calculated from a sample. A necessary restriction was that the observations in the sample had to be independent, and various procedures have since been proposed to adapt the methods to dependent observations. Wavelet transforms that permit data to be analysed from a frequency or time viewpoint simultaneously have also been developed over a similar period. In simple terms, a wavelet transform produces coeffcients that are dierences between adjacent averages over increasing scales, and it has been noted that these …


Attribute-Based Oblivious Access Control, Jinguang Han, Willy Susilo, Yi Mu, Jun Yan Jan 2012

Attribute-Based Oblivious Access Control, Jinguang Han, Willy Susilo, Yi Mu, Jun Yan

Faculty of Informatics - Papers (Archive)

In an attribute-based system (ABS), users are identified by various attributes, instead of their identities. Since its seminal introduction, the attribute-based mechanism has attracted a lot of attention. However, current ABS schemes have a number of drawbacks: (i) the communication cost is linear in the number of the required attributes; (ii) the computation cost is linear in the number of the required attributes and (iii) there are no efficient verification algorithms for the secret keys. These drawbacks limit the use of ABS in practice. In this paper, we propose an attribute-based oblivious access control (ABOAC) scheme to address these problems, …


Multivariate Whole Genome Average Interval Mapping: Qtl Analysis For Multiple Traits And/Or Environments, Arunas P. Verbyla, Brian R. Cullis Jan 2012

Multivariate Whole Genome Average Interval Mapping: Qtl Analysis For Multiple Traits And/Or Environments, Arunas P. Verbyla, Brian R. Cullis

Faculty of Informatics - Papers (Archive)

A major aim in some plant-based studies is the determination of quantitative trait loci (QTL) for multiple traits or across multiple environments. Understanding these QTL by trait or QTL by environment interactions can be of great value to the plant breeder. A whole genome approach for the analysis of QTL is presented for such multivariate applications. The approach is an extension of whole genome average interval mapping in which all intervals on a linkage map are included in the analysis simultaneously. A random effects working model is proposed for the multivariate (trait or environment) QTL effects for each interval, with …


Solitary Waves And Their Stability In Colloidal Media: Semi-Analytical Solutions, Timothy R. Marchant, N F. Smyth Jan 2012

Solitary Waves And Their Stability In Colloidal Media: Semi-Analytical Solutions, Timothy R. Marchant, N F. Smyth

Faculty of Informatics - Papers (Archive)

Spatial solitary waves in colloidal suspensions of spherical dielectric nanopartides are considered. The interaction of the nanoparticles is modelled as a hard-sphere gas, with the Carnahan-Starling formula used for the gas compressibility. Semi-analytical solutions, for both one and two spatial dimensions, arc derived using an averaged Lagrangian and suitable trial functions for the solitary waves. Power versus propagation constant curves and neutral stability curves are obtained for both cases, which illustrate that multiple solution branches occur for both the one and two dimensional geometries. For the one-dimensional case it is found that three solution branches (with a bistable regime) occur. …


Combining Outputs From The North American Regional Climate Change Assessment Program By Using A Bayesian Hierarchical Model, Emily L. Kang, Noel Cressie, Stephan R. Sain Jan 2012

Combining Outputs From The North American Regional Climate Change Assessment Program By Using A Bayesian Hierarchical Model, Emily L. Kang, Noel Cressie, Stephan R. Sain

Faculty of Informatics - Papers (Archive)

We investigate the 20-year-average boreal winter temperatures generated by an ensemble of six regional climate models (RCMs) in phase I of the North American Regional Climate Change Assessment Program. We use the long-run average (20-year integration) to smooth out variability and to capture the climate properties from the RCM outputs. We find that, although the RCMs capture the large-scale climate variation from coast to coast and from south to north similarly, their outputs can differ substantially in some regions. We propose a Bayesian hierarchical model to synthesize information from the ensemble of RCMs, and we construct a consensus climate signal …


Dynamical Random-Set Modeling Of Concentrated Precipitation In North America, Noel Cressie, Renato Assuncao, Scott H. Holan, Michael Levine, Orietta Nicolis, Jun Zhang, Jian Zou Jan 2012

Dynamical Random-Set Modeling Of Concentrated Precipitation In North America, Noel Cressie, Renato Assuncao, Scott H. Holan, Michael Levine, Orietta Nicolis, Jun Zhang, Jian Zou

Faculty of Informatics - Papers (Archive)

In order to study climate at scales where policy decisions can be made, regional climate models (RCMs) have been developed with much finer resolution (~50 km) than the ~500 km resolution of atmosphere-ocean general circulation models (AOGCMs). The North American Regional Climate Change Assessment Program (NARCCAP) is an international program that provides 50-km resolution climate output for the United States, Canada, and northern Mexico. In Phase I, there are six RCMs, from which we choose one to illustrate our methodology. The RCMs are updated every 3 hours and contain a number of variables, including temperature, precipitation, wind speed, wind direction, …


New Constructions Of Osbe Schemes And Their Applications In Oblivious Access Control, Jinguang Han, Willy Susilo, Yi Mu, Jun Yan Jan 2012

New Constructions Of Osbe Schemes And Their Applications In Oblivious Access Control, Jinguang Han, Willy Susilo, Yi Mu, Jun Yan

Faculty of Informatics - Papers (Archive)

Oblivious signature-based envelope (OSBE) schemes have demonstrated their potential applications in the protection of users privacy and rights. In an OSBE protocol, an encrypted message can only be decrypted by the receiver who holds a valid signature on a public message, while the sender (encrypter) does not know whether the receiver has the signature or not. Our major contributions in this work lie in the following aspects. We improve the notion of OSBE so that a valid credential holder cannot share his/her credential with other users (i. e., all-or-nothing non-transferability). We clarify the relationship between one-round OSBE and identity-based encryption …