Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Keyword
-
- For (14)
- Approach (9)
- Era2015 (9)
- Based (8)
- RFID (6)
-
- Recognition (6)
- Automatic (5)
- Information (5)
- Method (5)
- Using (5)
- Analysis (4)
- Classification (4)
- Design (4)
- Detection (4)
- Digital (4)
- Estimation (4)
- Image (4)
- Multi (4)
- Selection (4)
- Self (4)
- Social (4)
- System (4)
- Adaptive (3)
- Algebras (3)
- Algorithm (3)
- Care (3)
- Data (3)
- Facial (3)
- From (3)
- Graphs (3)
Articles 181 - 204 of 204
Full-Text Articles in Physical Sciences and Mathematics
Control Coordination Of A Wind Turbine Generator And A Battery Storage Unit In A Remote Area Power Supply System, Nishad Mendis, Kashem Muttaqi, Saad Sayeef, Sarath Perera
Control Coordination Of A Wind Turbine Generator And A Battery Storage Unit In A Remote Area Power Supply System, Nishad Mendis, Kashem Muttaqi, Saad Sayeef, Sarath Perera
Faculty of Informatics - Papers (Archive)
A novel hybrid Remote Area Power Supply (RAPS) system consisting of a Doubly Fed Induction Generator (DFIG) based wind turbine and a battery Energy Storage System (ESS) is investigated in this paper. The proposed RAPS system also consists of a dummy load and its controller. The battery energy storage system is used as a buffer which is connected to the DC link of the DFIG. The dummy load which is connected to the AC side of the system is used to absorb the energy associated with over generation, a situation which cannot be handled through the battery system. Control coordination …
Preliminary Sample Design For The New Zealand Health Survey 2010, Robert Graham Clark
Preliminary Sample Design For The New Zealand Health Survey 2010, Robert Graham Clark
Faculty of Informatics - Papers (Archive)
This report describes the choice of the preliminary design for the New Zealand Health Survey, to be implemented from 2011. The survey will use computer assisted personal interviewing. The sample will be selected using a multi-stage area design. The selected sample size will be around 12,000 people per year. This is envisaged as sufficient to provide adequate precision for estimates of key prevalences for adults and children. The main objectives of the sample design are: • The design should support analysis of the survey by multiple users, which implies avoiding great variation in estimation weights. • Estimates for children and …
Definition Of A Description Language For Business Service Decomposition, Lam-Son Le, Aditya K. Ghose, Evan D. Morrison
Definition Of A Description Language For Business Service Decomposition, Lam-Son Le, Aditya K. Ghose, Evan D. Morrison
Faculty of Informatics - Papers (Archive)
In the last few years, service-oriented computing has become an emerging research topic in response to the shift from product-oriented economy to service-oriented economy and the move from focusing on software/system development to addressing business-IT alignment. From an IT perspective, there is a proliferation of methods and languages for describing Web services. There has not been as much work in defining languages or ontologies for describing services from business perspectives. In this paper, we analyze the landscape of service representation and discuss the needs of having a description language for business services. By leveraging existing work on describing service capabilities …
Strategy Representation Using An I*-Like Notation, Lam-Son Le, Bingyu Zhang, Aditya K. Ghose
Strategy Representation Using An I*-Like Notation, Lam-Son Le, Bingyu Zhang, Aditya K. Ghose
Faculty of Informatics - Papers (Archive)
Assessing and achieving alignment between an organization’s strategies and its IT/business functions has long been recognized as a critically important question. This paper reports on a project that seeks to overturn established management orthodoxy by establising that strategies can be adequately modeled using conceptual modeling notations and that methodological and tool support can be provided for the task of assessing and achieving alignment between the strategies of an organization and its service offerings. A key element of this enterprise has been the design of SML - the Strategy Modeling Language. This paper presents an interim report from this project that …
A Particle Swarm Optimization Algorithm Based On Orthogonal Design, Jie Yang, Abdesselam Bouzerdoum, Son Lam Phung
A Particle Swarm Optimization Algorithm Based On Orthogonal Design, Jie Yang, Abdesselam Bouzerdoum, Son Lam Phung
Faculty of Informatics - Papers (Archive)
The last decade has witnessed a great interest in using evolutionary algorithms, such as genetic algorithms, evolutionary strategies and particle swarm optimization (PSO), for multivariate optimization. This paper presents a hybrid algorithm for searching a complex domain space, by combining the PSO and orthogonal design. In the standard PSO, each particle focuses only on the error propagated back from the best particle, without “communicating” with other particles. In our approach, this limitation of the standard PSO is overcome by using a novel crossover operator based on orthogonal design. Furthermore, instead of the “generating-and-updating” model in the standard PSO, the elitism …
Adaptive Hierarchical Architecture For Visual Recognition, Fok Hing Chi Tivive, Abdesselam Bouzerdoum, Son Lam Phung, Khan M. Iftekharuddin
Adaptive Hierarchical Architecture For Visual Recognition, Fok Hing Chi Tivive, Abdesselam Bouzerdoum, Son Lam Phung, Khan M. Iftekharuddin
Faculty of Informatics - Papers (Archive)
We propose a new hierarchical architecture for visual pattern classification. The new architecture consists of a set of fixed, directional filters and a set of adaptive filters arranged in a cascade structure. The fixed filters are used to extract primitive features such as orientations and edges that are present in a wide range of objects, whereas the adaptive filters can be trained to find complex features that are specific to a given object. Both types of filters are based on the biological mechanism of shunting inhibition. The proposed architecture is applied to two problems: pedestrian detection and car detection. Evaluation …
Automatic Human Motion Classification From Doppler Spectrograms, Fok Hing Chi Tivive, Abdesselam Bouzerdoum, Moeness G. Amin
Automatic Human Motion Classification From Doppler Spectrograms, Fok Hing Chi Tivive, Abdesselam Bouzerdoum, Moeness G. Amin
Faculty of Informatics - Papers (Archive)
No abstract provided.
Motion Estimation With Adaptive Regularization And Neighborhood Dependent Constraint, Muhammad Wasim Nawaz, Abdesselam Bouzerdoum, Son Lam Phung
Motion Estimation With Adaptive Regularization And Neighborhood Dependent Constraint, Muhammad Wasim Nawaz, Abdesselam Bouzerdoum, Son Lam Phung
Faculty of Informatics - Papers (Archive)
Modern variational motion estimation techniques use total variation regularization along with the L1 norm in constant brightness data term. An algorithm based on such homogeneous regularization is unable to preserve sharp edges and leads to increased estimation errors. A better solution is to modify regularizer along strong intensity variations and occluded areas. In addition, using neighborhood information with data constraint can better identify correspondence between image pairs than using only a pointwise data constraint. In this work, we present a novel motion estimation method that uses neighborhood dependent data constraint to better characterize local image structure. The method also uses …
Automatic Recognition Of Smiling And Neutral Facial Expressions, Peiyao Li, S L. Phung, Abdesselam Bouzerdoum, Fok Hing Chi Tivive
Automatic Recognition Of Smiling And Neutral Facial Expressions, Peiyao Li, S L. Phung, Abdesselam Bouzerdoum, Fok Hing Chi Tivive
Faculty of Informatics - Papers (Archive)
Facial expression is one way humans convey their emotional states. Accurate recognition of facial expressions via image analysis plays a vital role in perceptual human computer interaction, robotics and online games. This paper focuses on recognising the smiling from the neutral facial expression. We propose a face alignment method to address the localisation error in existing face detection methods. In this paper, smiling and neutral facial expression are differentiated using a novel neural architecture that combines fixed and adaptive non-linear 2-D filters. The fixed filters are used to extract primitive features, whereas the adaptive filters are trained to extract more …
Inter-Domain Routing Validator Based Spoofing Defence System, Lei Wang, Tianbing Xia, Jennifer Seberry
Inter-Domain Routing Validator Based Spoofing Defence System, Lei Wang, Tianbing Xia, Jennifer Seberry
Faculty of Informatics - Papers (Archive)
IP spoofing remains a problem today in the Internet. In this paper, a new system called Inter-Domain Routing Validator Based Spoofing Defence System (SDS) for filtering spoofed IP packets is proposed . SDS uses efficient symmetric key message authentication code (UMAC) as its tag to verify that a source IP address is valid. Different ASes border routers obtain a shared key via the Inter-Domain Routing Validator (IRV) servers which will manage the secret keys and exchange keys among different ASes via security communication channel. SDS is efficient, secure and easy to cooperate with other defence mechanisms.
Differential Fault Analysis Of Lex, Jianyong Huang, Willy Susilo, Jennifer Seberry
Differential Fault Analysis Of Lex, Jianyong Huang, Willy Susilo, Jennifer Seberry
Faculty of Informatics - Papers (Archive)
LEX is a stream cipher based on the round transformation of the AES block cipher, and it was selected for the final phase evaluation of the eSTREAM project. LEX is 2.5 times faster than AES both in software and in hardware. In this paper, we present a differential fault attack on LEX. The fault model assumes that the attacker is able to flip a random bit of the internal state of the cipher but cannot control the exact location of the induced fault. Our attack requires 40 faults, and recovers the secret key with 216 operations.
Social Tagging For Digital Libraries Using Formal Concept Analysis, Timothy Wray, Peter W. Eklund
Social Tagging For Digital Libraries Using Formal Concept Analysis, Timothy Wray, Peter W. Eklund
Faculty of Informatics - Papers (Archive)
This paper describes the Art Collection Ecosystem – an application that allows users to tag and serendipitously browse content using Formal Concept Analysis. Within this application, tags are derived from meta-data of artworks within an existing asset management system and are classified according to theories derived from social tagging behaviour.We present past and recent iterations of its design, where it is evaluated as a contextual comparison to a popular image tagging application, Flickr. Through the process of iterative design and user evaluation, we produce results are of interest to any applied research and development that involves the exploration of digital …
Estimating Shared Copy Number Aberrations For Array Cgh Data: The Linear-Median Method, Yan-Xia Lin, Veera Baladandayuthapani, V Bonato, K.-A. Do
Estimating Shared Copy Number Aberrations For Array Cgh Data: The Linear-Median Method, Yan-Xia Lin, Veera Baladandayuthapani, V Bonato, K.-A. Do
Faculty of Informatics - Papers (Archive)
Motivation: Existing methods for estimating copy number variations in array comparative genomic hybridization (aCGH) data are limited to estimations of the gain/loss of chromosome regions for single sample analysis. We propose the linear-median method for estimating shared copy numbers in DNA sequences across multiple samples, demonstrate its operating characteristics through simulations and applications to real cancer data, and compare it to two existing methods.
Results: Our proposed linear-median method has the power to estimate common changes that appear at isolated single probe positions or very short regions. Such changes are hard to detect by current methods. This new …
Probabilistic Neural Network For Vulnerability Prediction On A Practical Power System, Ahmed Haidar, Zulkeflee Khalidin, Ibrahim Abdulrab Ahmed
Probabilistic Neural Network For Vulnerability Prediction On A Practical Power System, Ahmed Haidar, Zulkeflee Khalidin, Ibrahim Abdulrab Ahmed
Faculty of Informatics - Papers (Archive)
Vulnerability prediction of power systems is important so as to determine its ability to continue to provide service in case of any unforeseen catastrophic contingency. It is considered one of the vital concerns due to the continual blackouts in recent years which indicate that the power system today is too vulnerable to withstand a severer disturbance. The objective of this paper is to investigate and compare the performance of two vulnerability indices used for assessing the vulnerability of power systems when subjected to various contingencies. The Probabilistic Neural Network (PNN) based on power system loss and possible loss of load …
A Longer Look At The Asymmetric Dependence Between Hedge Funds And The Equity Market, Byoung Kang, Francis In, Gunky Kim, Tong Kim
A Longer Look At The Asymmetric Dependence Between Hedge Funds And The Equity Market, Byoung Kang, Francis In, Gunky Kim, Tong Kim
Faculty of Informatics - Papers (Archive)
This paper reexamines, at a range of investment horizons, the asymmetric dependence between hedge fund returns and market returns. Given the current availability of hedge fund data, the joint distribution of longer-horizon returns is extracted from the dynamics of monthly returns using the filtered historical simulation; we then apply the method based on copula theory to uncover the dependence structure therein. While the direction of asymmetry remains unchanged, the magnitude of asymmetry is attenuated considerably as the investment horizon increases. Similar horizon effects also occur on the tail dependence. Our findings suggest that nonlinearity in hedge fund exposure to market …
Analysis Of A Model For Ethanol Production Through Continuous Fermentation: Ethanol Productivity, Simon Watt, Harvinder Sidhu, Mark Nelson, Ajay Ray
Analysis Of A Model For Ethanol Production Through Continuous Fermentation: Ethanol Productivity, Simon Watt, Harvinder Sidhu, Mark Nelson, Ajay Ray
Faculty of Informatics - Papers (Archive)
We investigate a model for the production of ethanol through continuous fermentation using Saccharomyces cerevisiae in a single reactor and cascades of up to five reactors. Using path-following methods we investigate how the ethanol productivity varies with the residence time in each reactor of the cascade. With a substrate feed concentration of 160 g/l we find the optimal productivity is 3.80 g/l/h, 5.08 g/l/h, and 5.18 g/l/h in a single reactor, a double reactor cascade and a triple reactor cascade respectively. For the case of a cascade containing reactors of equal size we investigate reactor configurations of up to five …
A Novel Control Strategy For A Variable-Speed Wind Turbine With A Permanent-Magnet Synchronous Generator, Md. Enamul Haque, Michael Negnevitsky, Kashem M. Muttaqi
A Novel Control Strategy For A Variable-Speed Wind Turbine With A Permanent-Magnet Synchronous Generator, Md. Enamul Haque, Michael Negnevitsky, Kashem M. Muttaqi
Faculty of Informatics - Papers (Archive)
This paper presents a novel control strategy for the operation of a direct-drive permanent-magnet synchronous-generator-based stand-alone variable-speed wind turbine. The control strategy for the generator-side converter with maximum power extraction is presented. The stand-alone control is featured with output voltage and frequency controller that is capable of handling variable load. The potential excess of power is dissipated in the dump-load resistor with the chopper control, and the dc-link voltage is maintained. Dynamic representation of dc bus and small-signal analysis are presented. Simulation results show that the controllers can extract maximum power and regulate the voltage and frequency under varying wind …
Ontology Modeling Of Ubl Process Diagrams Using Owl, Suman Roy, Kiran Prakash Sawant, Aditya K. Ghose
Ontology Modeling Of Ubl Process Diagrams Using Owl, Suman Roy, Kiran Prakash Sawant, Aditya K. Ghose
Faculty of Informatics - Papers (Archive)
We present a logical framework for modeling Universal Business Language (UBL) processes. The proposed framework provides a representation of the dynamic world being modeled on the user supplied axioms about preconditions and the initial state of the world, and produces a workflow specification at a higher level of abstraction. We use the Frieghtbilling process of the UBL as a case study for our experiment. Further we extract ontology from the associated UBL document that can ensure efficient information retrieval, discovery and auditing. We use the popular semantic web formalism, Web Ontology Language (OWL) for ontology construction purposes. These domain ontologies …
Efficient Svm Training With Reduced Weighted Samples, Son Lam Phung, Giang Hoang Nguyen, Abdesselam Bouzerdoum
Efficient Svm Training With Reduced Weighted Samples, Son Lam Phung, Giang Hoang Nguyen, Abdesselam Bouzerdoum
Faculty of Informatics - Papers (Archive)
This paper presents an efficient training approach for support vector machines that will improve their ability to learn from a large or imbalanced data set. Given an original training set, the proposed approach applies unsupervised learning to extract a smaller set of salient training exemplars, which are represented by weighted cluster centers and the target outputs. In subsequent supervised learning, the objective function is modified by introducing a weight for each new training sample and the corresponding penalty term. In this paper, we investigate two methods of defining the weight based on cluster vectors. The proposed SVM training is implemented …
Fpga-Based Signal Processing In An Optical Feedback Self-Mixing Interferometry System, Zongzhen Li, Yanguang Yu, Jiangtao Xi, Huiying Ye
Fpga-Based Signal Processing In An Optical Feedback Self-Mixing Interferometry System, Zongzhen Li, Yanguang Yu, Jiangtao Xi, Huiying Ye
Faculty of Informatics - Papers (Archive)
Optical feedback Self-mixing Interferometry (OFSMI) can achieve a high-resolution displacement sensing and measurement by using advanced digital signal processing. However, most existing signal processing algorithms used for OFSMI signals are implemented on a PC by Matlab or other programming languages. In this case, the whole structure of OFSMI sensing system is incompact and the measurement is in low speed. The design trends in sensing systems are towarding to small size, high integration and fast real time processing. These trends require us to improve the existing OFSMI design. It is a good solution to apply Field-programmable gate arrays (FPGAs) technique onto …
Cryptanalysis On Two Certificateless Signature Schemes, Futai Zhang, Sujuan Li, Songqin Miao, Yi Mu, Willy Susilo, Xinyi Huang
Cryptanalysis On Two Certificateless Signature Schemes, Futai Zhang, Sujuan Li, Songqin Miao, Yi Mu, Willy Susilo, Xinyi Huang
Faculty of Informatics - Papers (Archive)
Certificateless cryptography [1] is a new paradigm that not only removes the inherent key escrow problem of identity based public cryptography [2] (ID-PKC for short), but also eliminates the cumbersome certificate management in traditional PKI. In CL-PKC, the actual private key of a user is comprised of two secrets: a secret value and a partial private key. The user generates a secret value by himself, while the partial private key is generated by a third party called Key Generating Center (KGC), who makes use of a system wide master key and the user’s identity information. In this way, the key …
A Survey And Tutorial Of Rfid Anti-Collision Protocols, Dheeraj K. Klair, Kwan-Wu Chin, Raad Raad
A Survey And Tutorial Of Rfid Anti-Collision Protocols, Dheeraj K. Klair, Kwan-Wu Chin, Raad Raad
Faculty of Informatics - Papers (Archive)
RFID technologies have revolutionized the asset tracking industry, with applications ranging from automated checkout to monitoring the medication intakes of elderlies. In all these applications, fast, and in some cases energy efficient, tag reading is desirable, especially with increasing tag numbers. In practice, tag reading protocols face many problems. A key one being tag collision, which occurs when multiple tags reply simultaneously to a reader. As a result, an RFID reader experiences low tag reading performance, and wastes valuable energy. Therefore, it is important that RFID application developers are aware of current tag reading protocols. To this end, this paper …
Application Of Microsimulation To The Modelling Of Epidemics And Terrorist Attacks, Ian Piper, Daniel Keep, Tony Green, Ivy Zhang
Application Of Microsimulation To The Modelling Of Epidemics And Terrorist Attacks, Ian Piper, Daniel Keep, Tony Green, Ivy Zhang
Faculty of Informatics - Papers (Archive)
In this paper, a novel approach to behavioural modelling is presented with reference to biological infection spread in communities. Its potential application to various terrorist-related scenarios is discussed in relation to attack point simulation and interdiction simulation.
A Family Of Asymmetric Ellis-Type Theorems, Peter Nickolas, Susan Andima, Ralph Kopperman, S Popvassilev
A Family Of Asymmetric Ellis-Type Theorems, Peter Nickolas, Susan Andima, Ralph Kopperman, S Popvassilev
Faculty of Informatics - Papers (Archive)
Bouziad in 1996 generalized theorems of Montgomery (1936) and Ellis (1957), to prove that every Cech complete space with a separately continuous group operation must be a topological group. We generalize these results in a new direction, by dropping the requirement that the spaces be T2 or even T1. Our theorems then become applicable to groups with asymmetric topologies, such as the group of real numbers with the upper topology, whose open sets are the open upper rays. We first show a generic Ellis-type theorem for groups with a Hausdor k-bitopological structure whose symmetrization belongs to a class of k-spaces …