Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 316

Full-Text Articles in Physical Sciences and Mathematics

Measurements Of Trace Gas Emissions From Australian Forest Fires And Correlations With Coincident Measurements Of Aerosol Optical Depth, Clare Paton-Walsh, N. B. Jones, Stephen R. Wilson, V Haverd, A. Meier, D. W. Griffith Dec 2005

Measurements Of Trace Gas Emissions From Australian Forest Fires And Correlations With Coincident Measurements Of Aerosol Optical Depth, Clare Paton-Walsh, N. B. Jones, Stephen R. Wilson, V Haverd, A. Meier, D. W. Griffith

Faculty of Science - Papers (Archive)

We present vertically integrated measurements of C2H2, C2H4, C2H6, HCOOH, CO, H2CO, HCN and NH3 through smoke plumes from Australian forest fires measured by ground-based solar absorption spectroscopy. The column amounts of these gases are highly correlated with simultaneous, co-located measurements of aerosol optical depth, providing a potential method of mapping biomass-burning emissions using satellite measurements of aerosol optical depth. We have calculated emission ratios relative to CO for the trace gases using aerosol optical depth as a proxy for CO and converted to emission factors by using an average emission factor for CO from literature measurements of extra-tropical forest …


Simple Implementations Of Mutually Orthogonal Complementary Sets Of Sequences, Xiaojing Huang Dec 2005

Simple Implementations Of Mutually Orthogonal Complementary Sets Of Sequences, Xiaojing Huang

Faculty of Informatics - Papers (Archive)

This paper presents simple software and hardware implementations for a class of mutually orthogonal complementary sets of sequences based on its closed-form construction formula. Following a brief review of the Golay-paired Hadamard matrix concept, the flow graph for constructing mutually orthogonal Golay-paired Hadamard matrices, which represent the scalable complete complementary sets of sequences, is proposed. Then, their superb scalability and completeness are summarized. Finally, the C and Matlab functions and a logic schematic diagram are given to easily generate these complementary sequences.


A Fast Neural-Based Eye Detection System, Fok Hing Chi Tivive, Abdesselam Bouzerdoum Dec 2005

A Fast Neural-Based Eye Detection System, Fok Hing Chi Tivive, Abdesselam Bouzerdoum

Faculty of Informatics - Papers (Archive)

This paper presents a fast eye detection system which is based on an artificial neural network known as the shunting inhibitory convolutional neural network, or SICoNNet for short. With its two-dimensional network architecture and the use of convolution operators, the eye detection system processes an entire input image and generates the location map of the detected eyes at the output. The network consists of 479 trainable parameters which are adapted by a modified Levenberg-Marquardt training algorithm in conjunction with a bootstrap procedure. Tested on 180 real images, with 186 faces, the accuracy of the eye detector reaches 96.8% with only …


Fringe Pattern Profilometry Based On Inverse Function Analysis, Y. Hu, Jiangtao Xi, Enbang Li, Joe F. Chicharo, Zongkai Yang Dec 2005

Fringe Pattern Profilometry Based On Inverse Function Analysis, Y. Hu, Jiangtao Xi, Enbang Li, Joe F. Chicharo, Zongkai Yang

Faculty of Informatics - Papers (Archive)

In this paper, we proposed a new algorithm, referred to as inverse function analysis (IFA) method based on the derived mathematical model to reconstruct 3-D surfaces using fringe pattern profilometry (FPP) technique. Compared with traditional methods, our algorithm has neither the requirement for the structure of projected fringe patterns, nor the prior knowledge of the characteristics of projection systems. The correctness of inverse function analysis (IFA) method has been confirmed by simulation results. It can be seen that the measurement accuracy has been significantly improved by inverse function analysis (IFA) method, especially when the expected sinusoidal fringe patterns are distorted …


A Vision System For Providing The Blind With 3d Colour Perception Of The Environment, S. Meers, Koren Ward Dec 2005

A Vision System For Providing The Blind With 3d Colour Perception Of The Environment, S. Meers, Koren Ward

Faculty of Informatics - Papers (Archive)

Although various attempts have been made at providing the blind with substitute visual perception, no existing method provides useful colour perception of the environment. This paper describes a substitute vision system which provides perception of the three-dimensional profile and colour of the surrounding environment via haptic sensations alone. This is aimed at allowing visually-impaired people to avoid obstacles and navigate the environment by recognising landmarks by their colour and profile. The prototype system uses stereo video cameras to capture colour images of the environment from which a disparity depth map can be calculated. The depth map is sampled into ten …


High-Capacity Steganography Using A Shared Colour Palette, G. Brisbane, R. Safavi-Naini, P. Ogunbona Dec 2005

High-Capacity Steganography Using A Shared Colour Palette, G. Brisbane, R. Safavi-Naini, P. Ogunbona

Faculty of Informatics - Papers (Archive)

Seppanen, Makela and Keskinarkaus (SMK) have proposed a high-capacity steganographic technique to conceal information within a colour image. The technique is significant because of the high volume of data that is embedded into pixels but it results in a high level of noise and so the quality of the resulting image is not acceptable. A new type of coding structure is proposed, which maintains a high capacity but lowers the level of noise. Secondly, an adaptive algorithm is used to identify pixel values that have a high capacity to distortion ratio. Also the maximum size of the coding structures is …


Access Policy Sheet For Access Control In Fine-Grained Xml, Jing Wu, Yi Mu, Jennifer Seberry, Chun Ruan Dec 2005

Access Policy Sheet For Access Control In Fine-Grained Xml, Jing Wu, Yi Mu, Jennifer Seberry, Chun Ruan

Faculty of Informatics - Papers (Archive)

We propose an access control scheme for developing authorization rules for XML documents, allowing flexible data granularity and authorization propagation. To simplify the complex access control policies in XML, we introduce a new tool: Authorization Policy Sheet (APS). Complex access control rules can be easily described in an APS. The administrator of a system can easily manage the access control of the system. With aid of Data Type Definitions(DTD), the policies given in an APS can be converted into a standard XML code that can be implemented in a normal XML environment.


Living With Trees – Perspectives From The Suburbs, Lesley M. Head, Pat Muir Dec 2005

Living With Trees – Perspectives From The Suburbs, Lesley M. Head, Pat Muir

Faculty of Science - Papers (Archive)

A study of suburban backyards and backyarders in Sydney and Wollongong revealed evidence of attitudes and behaviours in relation to trees. Attitudes are characterised under themes that indicate conditions of tolerance and belonging. They include attachment/risk, order/freedom and nativeness/alienness. While love is common, high levels of suspicion and intolerance towards trees in the suburban context are more common. Our findings confirm and throw further light on previous work indicating that many Australians have very partitioned views of the world in relationto where humans and nonhuman lifeforms belong. This partitioning must be understood in conceptual as well as spatial terms.


Service Discovery In Wireless Ad-Hoc Control Networks, Shengrong Bu, F. Naghdy Dec 2005

Service Discovery In Wireless Ad-Hoc Control Networks, Shengrong Bu, F. Naghdy

Faculty of Informatics - Papers (Archive)

A new concept in distributed control systems called Wireless Ad-hoc Control Networks (WACNets) is developed. WACNets is formed by a collection of nodes with the ability to sense, actuate and control. The network does not have a fixed structure, but evolves and self organises itself according to the control requirements of the system. The service discovery developed for WACNets is reported. A review of the existing Service Discovery Protocol (SDPs) including Jini, Salutation, Universal Plug and Play (UPnP), and Bluetooth technology is carried out. An overview of WACNets is provided. The service discovery protocol developed for WACNets is introduced and …


A Digital Pixel Sensor Array With Programmable Dynamic Range, A. Kitchen, A. Bermak, Abdesselam Bouzerdoum Dec 2005

A Digital Pixel Sensor Array With Programmable Dynamic Range, A. Kitchen, A. Bermak, Abdesselam Bouzerdoum

Faculty of Informatics - Papers (Archive)

This paper presents a digital pixel sensor (DPS) array employing a time domain analogue-to-digital conversion (ADC) technique featuring adaptive dynamic range and programmable pixel response. The digital pixel comprises a photodiode, a voltage comparator, and an 8-bit static memory. The conversion characteristics of the ADC are determined by an array-based digital control circuit, which linearizes the pixel response, and sets the conversion range. The ADC response is adapted to different lighting conditions by setting a single clock frequency. Dynamic range compression was also experimentally demonstrated. This clearly shows the potential of the proposed technique in overcoming the limited dynamic range …


Some New Results Of Regular Hadamard Matrices And Sbibd Ii, Tianbing Xia, M. Xia, Jennifer Seberry Dec 2005

Some New Results Of Regular Hadamard Matrices And Sbibd Ii, Tianbing Xia, M. Xia, Jennifer Seberry

Faculty of Informatics - Papers (Archive)

In this paper we prove that there exist 4—{k2; 1/2k(k—1); k(k—2)} SDS, regular Hadamard matrices of order 4k2, and SBIBD(4k2, 2k2 + k, k2 + k) for k = 47, 71, 151, 167, 199, 263, 359, 439, 599, 631, 727, 919, 5q1, 5q2N, 7q3, where ql, q2 and q3 are prime power such that ql ≡ 1(mod 4), q2 ≡ 5(mod 8) and q3 ≡ 3(mod 8), N = 2a3bt2, a, b = 0 or 1, t ≠ 0 is an arbitrary integer. We find new SBIBD(4k2, 2k2 + k, k2 + k) for 43 values of k less than …


Regioselective Synthesis Of Novel E-Edge-[60]Fullerenylmethanodihydropyrroles And 1,2-Dihydromethano[60]Fullerenes, Leila Chaker, Graham E. Ball, James R. Williams, Glenn A. Burley, Bill C. Hawkins, Paul A. Keller, Stephen G. Pyne Dec 2005

Regioselective Synthesis Of Novel E-Edge-[60]Fullerenylmethanodihydropyrroles And 1,2-Dihydromethano[60]Fullerenes, Leila Chaker, Graham E. Ball, James R. Williams, Glenn A. Burley, Bill C. Hawkins, Paul A. Keller, Stephen G. Pyne

Faculty of Science - Papers (Archive)

Treatment of a tethered N-(diphenylmethylene)glycinate-malonate derivative with [60]fullerene under Bingel conditions yielded an e-edge-[60]fullerenylmethanodihydropyrrole adduct in a regioselective manner. The regiochemical outcome was independent of the order of addition of either the N-(diphenylmethylene)glycinate or the malonate moieties. This new bis-adduct was also prepared in 13C enriched form allowing for its unequivocal structural characterization by 2D INADEQUATE NMR experiments. Ring-opening of the dihydropyrrole functionality of the bisadducts under reductive conditions gave exclusively novel dihydromethano[60]fullerene derivatives.


Culture As Concept And Influence In Environmental Research And Management, Lesley M. Head, D. Trigger, J. Mulcock Dec 2005

Culture As Concept And Influence In Environmental Research And Management, Lesley M. Head, D. Trigger, J. Mulcock

Faculty of Science - Papers (Archive)

Given that human activities have been implicated in the vast majority of contemporary environmental problems, it might be expected that research effort into those activities and the attitudes from which they stem would be both strongly supported by funding agencies, and of central interest to environmental scientists and land managers. In this paper we focus on an undervalued area of environmental humanities research—cultural analysis of the beliefs, practices and often unarticulated assumptions which underlie human–environmental relations. In discussing how cultural processes are central to environmental attitudes and behaviours, and how qualitative research methods can be used to understand them in …


Bittorrent In A Dynamic Resource Adapting Peer-To-Peer Network, L. Rong, I. Burnett Nov 2005

Bittorrent In A Dynamic Resource Adapting Peer-To-Peer Network, L. Rong, I. Burnett

Faculty of Informatics - Papers (Archive)

Our previous work proposed a MPEG-21 based P2P network architecture supporting resource adaptation on the basis of usage environment and user preferences. In this paper, we investigate the deployment of a BitTorrent (BT) - like approach in the previous super-peer P2P resource adaptation architecture. In addition, the architecture's peer selection strategy is adopted and evaluated as a way to enhance the peer selection process in BT. The strategy uses super peers as trackers to intelligently select peers according to their capabilities and shared resource segments. Simulation results show that the proposed selection strategy reduces average access time and increases download …


Application Of Competitive Clustering To Acquisition Of Human Manipulation Skills, S. Dong, F. Naghdy Nov 2005

Application Of Competitive Clustering To Acquisition Of Human Manipulation Skills, S. Dong, F. Naghdy

Faculty of Informatics - Papers (Archive)

The work carried out to explore the feasibility of reconstructing human constrained motion manipulation skills is reported. This is achieved by tracing and learning the manipulation performed by a human operator in a haptic rendered virtual environment. The peg-in-hole insertion problem is used as a case study. In the developed system, position and contact force and torque as well as orientation data generated in the haptic rendered virtual environment combined with a priori knowledge about the task are used to identify and learn the skills in the newly demonstrated task. The data obtained from the virtual environment is classified into …


Adaptive Modeling Of Vehicle Mirror Vibrations By Predictive Compensation, Antoine Larchez, Fazel Naghdy Nov 2005

Adaptive Modeling Of Vehicle Mirror Vibrations By Predictive Compensation, Antoine Larchez, Fazel Naghdy

Faculty of Informatics - Papers (Archive)

The external and internal mirrors used particularly in high mass recreational and commercial vehicles are prone to vibrations. Under certain conditions, this leads to blurring of the reflected images above the tolerable levels for the human vision. While such vibrations are quite disturbing, they can compromise the driver’s safety on the road. An adaptive predictive system is designed to compensate for the mirror vibrations under different driving conditions. The realtime adaptive modeling of the vibrations using ARMA for the purpose of their prediction is reported.


Human Motion Recognition Through Fuzzy Hidden Markov Model, X. Zhang, F. Naghdy Nov 2005

Human Motion Recognition Through Fuzzy Hidden Markov Model, X. Zhang, F. Naghdy

Faculty of Informatics - Papers (Archive)

A new type of Hidden Markov Model (HMM) developed based on the fuzzy clustering result is proposed for identification of human motion. By associating the human continuous movements with a series of human motion primitives, the complex human motion could be analysed as the same process as recognizing a word by alphabet. However, because the human movements can be multi-paths and inherently stochastic, it is indisputable that a more sophisticated framework must be applied to reveal the statistic relationships among the different human motion primitives. Hence, based on the human motion recognition results derived from the fuzzy clustering function, HMM …


Constructing University Timetable Using Constraint Satisfaction Programming Approach, L. Zhang, Sim Kim Lau Nov 2005

Constructing University Timetable Using Constraint Satisfaction Programming Approach, L. Zhang, Sim Kim Lau

Faculty of Informatics - Papers (Archive)

The timetabling problem consists of a set of subjects to be scheduled in different timeslots, a set of rooms in which the subjects can take place, a set of students who attend the subjects, and a set of subjects satisfied by rooms and required by timeslots. The heart of the problem is the constraints that exist as regulations within each resource and between resources. There are various solution approaches to solve the timetabling problem. This paper focuses on developing a constraint satisfaction problem model for a university timetabling problem. A solution of a constraint satisfaction problem is a consistent assignment …


An Agent-Based Peer-To-Peer Grid Computing Architecture, J. Tang, Minjie Zhang Nov 2005

An Agent-Based Peer-To-Peer Grid Computing Architecture, J. Tang, Minjie Zhang

Faculty of Informatics - Papers (Archive)

We propose a multi-agent based peer-to-peer grid computing architecture in this paper to solves the issues that the conventional grid architecture is limited in modeling computer systems with highly dynamic and autonomous computing resources, and its super-local resource management and scheduling strategy limits the utilization of the computing resources. Besides, the new architecture provides reasonable compatibility and interoperability with the conventional grid systems and clients.


Introducing N-Tree-Space: A Classification System For Knowledge Library Applications, E. Rayner, I. C. Piper, M. Bunder Nov 2005

Introducing N-Tree-Space: A Classification System For Knowledge Library Applications, E. Rayner, I. C. Piper, M. Bunder

Faculty of Informatics - Papers (Archive)

This paper identifies and defines the Knowledge Library Application (KLA) class. KLAs are an important class of information resource/knowledge management applications. It will be clear from the definition that KLAs are highly relevant to both the commercial and academic worlds and existing techniques such as keyword and tree classification, On-Line Analytical Processing (OLAP), and Formal Concept Analysis (FCA) do not provide key KLA features. N-Tree-Space (NTS), a technique detailed in this paper, enables the provision of these features and should facilitate the development of a range of KLAs that offer significant advantages over currently available software tools.


Collaborative Editing Using An Xml Protocol, S. J. Davis, I. S. Burnett Nov 2005

Collaborative Editing Using An Xml Protocol, S. J. Davis, I. S. Burnett

Faculty of Informatics - Papers (Archive)

XML is a popular approach to interoperable exchange of data between a wide range of devices. This paper explores the use of the Remote XML Exchange Protocol as a mechanism to provide efficient interaction with complex XML documents to users with limited complexity devices and/or limited bandwidth connections. The interactive mechanisms provided by the protocol allow users to navigate, edit and download XML even when delivery of the full XML document is impossible. The paper examines the use of the protocol to enable multiple users to collaboratively edit remote XML documents. Further, the paper explores the combination of the protocol, …


Improved Dynamic Multimedia Resource Adaptation-Based Peer-To-Peer System Through Locality-Based Clustering And Service, Letian Rong, I. Burnett Nov 2005

Improved Dynamic Multimedia Resource Adaptation-Based Peer-To-Peer System Through Locality-Based Clustering And Service, Letian Rong, I. Burnett

Faculty of Informatics - Papers (Archive)

A dynamic P2P architecture based on MPEG-21 was proposed in our previous work to support resource adaptation/personalization according to the surrounding usage environment and user preferences. In this paper, we improve the proposed system through two separate but related modifications. Firstly, peers are clustered according to registered geographic location information. Secondly, based on that registered location information, a locality-based service is introduced which allows users to search services according to their geographic locations. The service complements the proposed P2P architecture by encouraging service providers to increase the uptime of their devices and hence provide the spare computer power for active …


A Substitute Vision System For Providing 3d Perception And Gps Navigation Via Electro-Tactile Stimulation, S. Meers, Koren Ward Nov 2005

A Substitute Vision System For Providing 3d Perception And Gps Navigation Via Electro-Tactile Stimulation, S. Meers, Koren Ward

Faculty of Informatics - Papers (Archive)

This paper describes a novel approach for enabling the blind to achieve obstacle avoidance and navigation in outdoor environments with the aid of visual sensors, GPS and electro-tactile stimulation. The electro-neural vision system (ENVS) works by extracting a depth map from stereo cameras by measuring the disparity between the stereo images. This range data is then delivered to the fingers via electro-neural stimulation to indicate to the user the range of objects being viewed by the cameras. To perceive the location of obstacles and the 3D structure of the environment the user imagines that the hands are held in the …


Investigating The Relationship Between Location-Based Services And National Security, Holly Tootell Nov 2005

Investigating The Relationship Between Location-Based Services And National Security, Holly Tootell

Faculty of Informatics - Papers (Archive)

Public awareness of national security has increased significantly since September 11, 2001. Literature has discussed ways to respond or prevent breaches of National security with some of these methods employing information technologies, including Radio Frequency Identification (RFID) and Global Positioning System (GPS). Other studies have focused on the privacy impact the proposed solutions will have. This research examines the technologies under the umbrella of Location-Based Services (LBS). The preliminary findings of this research indicate that the broader notion of LBS is what needs to be focused on in order to understand the impact that they are having in the effort …


Location Privacy In Mobile Ip, Rungrat Wiangsripanawan, R. Safavi-Naini, Willy Susilo Nov 2005

Location Privacy In Mobile Ip, Rungrat Wiangsripanawan, R. Safavi-Naini, Willy Susilo

Faculty of Informatics - Papers (Archive)

Several security issues arise, due to the design of the mobile IP and its deployment in conjunction with other network protocols. Most of the work on the security of mobile IP has focused on authentication of the control packet and the confidentiality of the content in the protocol, and there are not many proposals in the area of location privacy. In this paper, we propose a method to provide location privacy for mobile IP users. We present two protocols that use an overlay network approach, and designed particularly for mobile IP. We employ universal re-encryption and extend it to n-out-of-n …


Secure And Anonymous Mobile Ad-Hoc Networks, Y. Mu, F. Zhang, Willy Susilo Nov 2005

Secure And Anonymous Mobile Ad-Hoc Networks, Y. Mu, F. Zhang, Willy Susilo

Faculty of Informatics - Papers (Archive)

A mobile ad-hoc network (MANET) is a wireless network made up of mobile hosts that do not require any fixed infrastructure to communicate. The major features of ad-hoc networks is self-organization and dynamics in user participation. Because of these features, the security in ad-hoc becomes a challenge. In this paper, we consider an interesting scenario, where an arbitrary number of nodes in MANET can dynamically form an anonymous group that exhibits the following features: (1) any outsider can be convinced that the node is indeed in the group; (2) any outsider can send a message back to the node in …


Efficient And Highly Scalable Route Discovey For On-Demand Routing Protocols In Ad Hoc Networks, Mehran Abolhasan, Justin Lipman Nov 2005

Efficient And Highly Scalable Route Discovey For On-Demand Routing Protocols In Ad Hoc Networks, Mehran Abolhasan, Justin Lipman

Faculty of Informatics - Papers (Archive)

This paper presents a number of different route discovery strategies for on-demand routing protocols, which provide more control to each intermediate node make during the route discovery phase to make intelligent forwarding decisions. This is achieved through the idea of selfselection. In self-selecting route discovery each node independently makes Route Request (RREQ) forwarding decisions based upon a selection criterion or by satisfying certain conditions. The nodes which do not satisfy the selection criterion do not rebroadcast the routing packets. We implemented our self-selecting route discovery strategies over AODV using the GloMoSim network simulation package, and compared the performance with existing …


A Simulation Study Of Tcp Over The Ieee 802.15.3 Mac, Kwan-Wu Chin, Darryn Lowe Nov 2005

A Simulation Study Of Tcp Over The Ieee 802.15.3 Mac, Kwan-Wu Chin, Darryn Lowe

Faculty of Informatics - Papers (Archive)

This paper presents the impact of IEEE 802.15.3 MAC’s channel time allocation methods on a TCP flow’s performance. We show the importance of having super rate and appropriately sized channel time allocations (CTAs).


Evidence Of Reduced Measurement Uncertainties From An Ftir Instrument Intercomparison At Kiruna, Sweden, A. Meier, Clare Paton-Walsh, C. Bell, T. Blumenstock, F. Hase, A. Goldman, A. Steen, R. Kift, P. Woods, Y. Kondo Nov 2005

Evidence Of Reduced Measurement Uncertainties From An Ftir Instrument Intercomparison At Kiruna, Sweden, A. Meier, Clare Paton-Walsh, C. Bell, T. Blumenstock, F. Hase, A. Goldman, A. Steen, R. Kift, P. Woods, Y. Kondo

Faculty of Science - Papers (Archive)

We report the results of an intercomparison of vertical column amounts of HCl, HF, N2O, HNO3, CH4, O3, CO2 and N2 derived from the spectra recorded by two ground-based FTIR spectrometers operated side-by-side using the sun as a source. The procedures used to record spectra and derive vertical column amounts followed the format of previous instrument intercomparisons organised by the Network for Detection of Stratospheric Change (NDSC), but the level of agreement achieved was significantly better than for previous intercomparisons. For most gases the differences were typically 1% or less, with at least one of the five datasets showing no …


Manipulation Skills Acquisition Through State Classification And Dimension Decrease, S. Dong, F. Naghdy Nov 2005

Manipulation Skills Acquisition Through State Classification And Dimension Decrease, S. Dong, F. Naghdy

Faculty of Informatics - Papers (Archive)

The work carried out to explore the feasibility of reconstructing human constrained motion manipulation skills is reported. This is achieved by tracing and learning the manipulation performed by a human operator in a haptic rendered virtual environment. The peg-in-hole insertion problem is used as a case study. In the developed system, force and position variables generated in the haptic rendered virtual environment combined with a priori knowledge about the task are used to identify and learn the skills in the newly demonstrated task. The data obtained from the virtual environment is classified into different cluster sets using Fuzzy Gustafson-Kessel Model …