Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 31 - 60 of 204

Full-Text Articles in Physical Sciences and Mathematics

A Scalable Robust Authentication Protocol For Secure Vehicular Communications, Lei Zhang, Qianhong Wu, Agusti Solanas, Josep Domingo-Ferrer Jan 2010

A Scalable Robust Authentication Protocol For Secure Vehicular Communications, Lei Zhang, Qianhong Wu, Agusti Solanas, Josep Domingo-Ferrer

Faculty of Informatics - Papers (Archive)

Existing authentication protocols to secure vehicular ad hoc networks (VANETs) raise challenges such as certificate distribution and revocation, avoidance of computation and communication bottlenecks, and reduction of the strong reliance on tamper-proof devices. This paper efficiently copes with these challenges with a decentralized group-authentication protocol in the sense that the group is maintained by each roadside unit (RSU) rather than by a centralized authority, as in most existing protocols that are employing group signatures. In our proposal, we employ each RSU to maintain and manage an on-the-fly group within its communication range. Vehicles entering the group can anonymously broadcast vehicle-to-vehicle …


Evolution Of Solitary Waves For A Perturbed Nonlinear Schrödinger Equation, Sayed Hoseini, Timothy R. Marchant Jan 2010

Evolution Of Solitary Waves For A Perturbed Nonlinear Schrödinger Equation, Sayed Hoseini, Timothy R. Marchant

Faculty of Informatics - Papers (Archive)

Soliton perturbation theory is used to determine the evolution of a solitary wave described by a perturbed nonlinear Schrödinger equation. Perturbation terms, which model wide classes of physically relevant perturbations, are considered. An analytical solution is found for the first-order correction of the evolving solitary wave. This solution for the solitary wave tail is in integral form and an explicit expression is found, for large time. Singularity theory, usually used for combustion problems, is applied to the large time expression for the solitary wave tail. Analytical results are obtained, such as the parameter regions in which qualitatively different types of …


Emerging Consumers View Of Secondary Uses Of Medical Data, Jennifer A. Heath Jan 2010

Emerging Consumers View Of Secondary Uses Of Medical Data, Jennifer A. Heath

Faculty of Informatics - Papers (Archive)

Results of a pilot public opinion survey regarding privacy and secondary uses of medical data are presented. Data was gathered using a self administered household survey. The setting for the survey was regional New South Wales and Darwin, Australia. 482 surveys were distributed in randomly chosen residential blocks. The main outcome measures included respondent views regarding concern for personal privacy and support for secondary uses of medical data for utilitarian purposes. 165 surveys were returned giving a 34.2% response rate. Aspects of the Restricted Access Limited Control theory of privacy were explored via the survey. Results indicate the value of …


Learning On Location: An Adaptive Mobile Learning Content Framework, Ahmed Al-Hmouz, Alison Freeman Jan 2010

Learning On Location: An Adaptive Mobile Learning Content Framework, Ahmed Al-Hmouz, Alison Freeman

Faculty of Informatics - Papers (Archive)

Delivery options for mobile learning are increasing, however new technologies alone will not improve the experience of mobile learners. There are a number of factors that impact on a typical learning experience, and many more when that learning experience becomes ‘mobile’. This paper presents a framework to describe the factors that play an important role in delivering learning content to mobile learners, and their relationship to each other. Once the necessary information is collected about a user – either automatically (e.g. location, device, previous usage) or through user input (e.g. age) – learning content can be adapted to meet the …


Rankings Of Importance Of Location-Based Services Utilisation For Emergency Management, Anas Aloudat, Yehia Alzoubi Jan 2010

Rankings Of Importance Of Location-Based Services Utilisation For Emergency Management, Anas Aloudat, Yehia Alzoubi

Faculty of Informatics - Papers (Archive)

Driven by several issues from earlier commercial public alerting projects, this paper investigates people’s opinions in regard to the current and expected deployments of mobile location-based services under national emergency alerting and warning systems. In particular, the paper examines general public perspective of the importance of utilising the services in different types of emergency events, categorised as natural and human-caused. A survey was carried out to fulfil the requirements of the investigation. The findings clearly denoted significant differences between the mean ranks of all emergency types in the two categories, providing evidence that the importance of utilising LBS is perceived …


The Role Of Experts In Social Media - Are The Tertiary Educated Engaged?, Eva Cheng, S. J. Davis, I. Burnett, Christian Ritz Jan 2010

The Role Of Experts In Social Media - Are The Tertiary Educated Engaged?, Eva Cheng, S. J. Davis, I. Burnett, Christian Ritz

Faculty of Informatics - Papers (Archive)

With new social media technologies arising daily, this paper reports on a pilot user survey that studies how tertiary educated users are engaging with social media. The results indicate sporadic use of social media by the tertiary educated users studied; they are generally aware of the key social media sites and facilities, but are not actively utilizing these services. The reasons for, and the implications of a lack of tertiary educated users in the egalitarian and participatory environments intrinsic to social media are discussed. Further, the paper suggests potential technological barriers that might be at the root of such a …


Location-Based Services: An Examination Of User Attitudes And Socio-Ethical Scenarios, Roba Abbas Jan 2010

Location-Based Services: An Examination Of User Attitudes And Socio-Ethical Scenarios, Roba Abbas

Faculty of Informatics - Papers (Archive)

The location-based services (LBS) industry is characterised by a multitude of vendors, all of whom assume a vital role in the provision of location solutions to their respective customer base. An attractive target audience is Gen Y consumers, recognised as being early adopters of the latest (mobile) technologies and possessing an influential role in family purchasing decisions. This paper presents and examines the outcomes of an observational study centred on the compilation of GPS data logs and accompanying diary entries for the aforementioned participant group. The emergent scenarios are reviewed, as are the attitudes of the participants. While the data …


The Legal, Social And Ethical Controversy Of The Collection And Storage Of Fingerprint Profiles And Dna Samples In Forensic Science, Katina Michael Jan 2010

The Legal, Social And Ethical Controversy Of The Collection And Storage Of Fingerprint Profiles And Dna Samples In Forensic Science, Katina Michael

Faculty of Informatics - Papers (Archive)

The collection and storage of fingerprint profiles and DNA samples in the field of forensic science for nonviolent crimes is highly controversial. While biometric techniques such as fingerprinting have been used in law enforcement since the early 1900s, DNA presents a more invasive and contentious technique as most sampling is of an intimate nature (e.g. buccal swab). A fingerprint is a pattern residing on the surface of the skin while a DNA sample needs to be extracted in the vast majority of cases (e.g. at times extraction even implying the breaking of the skin). This paper aims to balance the …


Multimedia Adaptation Based On Semantics From Social Network Users Interacting With Media, S. J. Davis, Eva Cheng, I. Burnett, Christian Ritz Jan 2010

Multimedia Adaptation Based On Semantics From Social Network Users Interacting With Media, S. J. Davis, Eva Cheng, I. Burnett, Christian Ritz

Faculty of Informatics - Papers (Archive)

A key goal of adaptive multimedia delivery is to provide users with content that maximizes their quality of experience. To achieve this goal, adaptive multimedia systems require descriptions of the content and user preference information, moving beyond traditional criteria such as quality of service requirements or perceptual quality based on traditional metrics. Media is increasingly consumed within online social networks and multimedia sharing websites can also add a wealth of metadata. In this paper, mechanisms for gathering semantics that relate to user preferences when interacting with media content in social networks are proposed. Subjective results indicate the proposed mechanisms can …


Constructing An Authentication Token To Access External Services In Service Aggregation, Peishun Wang, Yi Mu, Willy Susilo, Jun Yan Jan 2010

Constructing An Authentication Token To Access External Services In Service Aggregation, Peishun Wang, Yi Mu, Willy Susilo, Jun Yan

Faculty of Informatics - Papers (Archive)

Service aggregation is becoming a cost-effective and time-efficient way for a business to develop new applications and services. While it creates tremendous opportunities in various industry sectors, its cross-organization nature raises serious challenges in the security domains for authentication. In this paper we formulate a formal definition of authentication in service aggregation and a security model for it, and propose two authentication protocols. One is a one-way protocol and another is an interactive one. In particular, the constructed authentication tokens are anonymous to verifiers. We prove their security, show how to choose optimal system parameters, and analyse the efficiency.


Fuzzy Tracking Control Design Using Observer-Based Stabilizing Compensator For Nonlinear Systems, Trihastuti Agustinah, Achmad Jazidie, Mohammad Nuh, Haiping Du Jan 2010

Fuzzy Tracking Control Design Using Observer-Based Stabilizing Compensator For Nonlinear Systems, Trihastuti Agustinah, Achmad Jazidie, Mohammad Nuh, Haiping Du

Faculty of Informatics - Papers (Archive)

This paper presents fuzzy tracking control design for nonlinear systems. The design methodology is a synthesis of the tracking control theory of linear multivariable control and the Takagi-Sugeno fuzzy model. The observer-based stabilizing compensator type from muItivariable tracking control theory is used, because not all states of the nonlinear system are fully available or measured while Takag-Sugeno (T-S) fuzzy model is used to represent the dynamic of nonlinear system. The concept of parallel distributed compensation is employed to design fuzzy tracker and fuzzy observer from the T-S fuzzy model. The stability analysis of the designed system is derived via the …


Metamodelling Approach To Support Disaster Management Knowledge Sharing, Siti Hajar Othman, Ghassan Beydoun Jan 2010

Metamodelling Approach To Support Disaster Management Knowledge Sharing, Siti Hajar Othman, Ghassan Beydoun

Faculty of Informatics - Papers (Archive)

Handling uncertain events that could happen anytime and anywhere and dealing with many complex systems interconnected physically and socially makes Disaster Management (DM) a multidisciplinary endeavor and a very difficult domain to model. In this paper we present a development and validation of a Disaster Management Metamodel (DMM), a language that we develop specific for describing DM domain. The metamodel, a precise definition of the constructs and rules needed for creating the semantic models of DM domain consists of four views based on four DM phases including Mitigation, Preparedness, Response and Recovery-phase classes of concept. A Model Importance Factor (MIF) …


Speech Enhancement Via Separation Of Sources From Co-Located Microphone Recordings, Muawiyath Shujau, Christian Ritz, I. Burnett Jan 2010

Speech Enhancement Via Separation Of Sources From Co-Located Microphone Recordings, Muawiyath Shujau, Christian Ritz, I. Burnett

Faculty of Informatics - Papers (Archive)

This paper investigates multichannel speech enhancement for colocated microphone recordings based on Independent Component Analysis (ICA). Comparisons are made between co-located microphone arrays that contain microphones with mixed polar responses with traditional uni form linear arrays formed from omnidirectional microphones. It is shown that polar responses of the microphones are a key factor in the performance oflCA applied to co-located microphones. Results from PESQ testing show a significant improvement in speech quality of ICA separated sources as a result of using an A VS rather than other types of microphone arrays.


A Secure End-To-End Protocol For Conference Mobile Call, Qifan Yang, Tiancheng Zhang Jan 2010

A Secure End-To-End Protocol For Conference Mobile Call, Qifan Yang, Tiancheng Zhang

Faculty of Informatics - Papers (Archive)

The advent of conference mobile call demands the security communication between end users. However, currently there is no efficient secure end-to-end protocol exists for conference mobile call. This slows down the steps of conference communication. In this paper a secure end-to-end protocol for remote conference is designed base on previous experts work, which is one-to-one end-to-end protocol. In addition, security analysis from perspectives of confidentiality, authenticity, anonymity, freshness as well as preventing from denial of service (DoS) attack on the protocol is made. At the end, the efficiency of this protocol is discussed.


Supporting Change Propagation In Uml Models, Hoa Khanh Dam, Michael Winikoff Jan 2010

Supporting Change Propagation In Uml Models, Hoa Khanh Dam, Michael Winikoff

Faculty of Informatics - Papers (Archive)

A critical issue in software maintenance and evolution is change propagation: given a primary change that is made in order to meet a new or changed requirement, what additional, secondary, changes are needed? We have previously developed techniques for effectively supporting change propagation within design models of intelligent agent systems. In this paper, we propose how this approach is applied to support change propagation within UML design models. Our approach offers a number of advantages in terms of saving substantial time writing hard-coded rules, ensuring soundness and completeness, and at the same time capturing the cascading nature of change propagation. …


Supporting Change Propagation In The Evolution Of Enterprise Architectures, Hoa Khanh Dam, Lam-Son Le, Aditya K. Ghose Jan 2010

Supporting Change Propagation In The Evolution Of Enterprise Architectures, Hoa Khanh Dam, Lam-Son Le, Aditya K. Ghose

Faculty of Informatics - Papers (Archive)

Enterprise Architecture (EA) models the whole vision of an organisation in various aspects regarding both business processes and information technology resources. As the organisation grows, tbe architecture governing its systems and processes must also evolve to meet with the demands of the business environment. In this context, a critical issue is change propagation: given a set of primary changes that have been made to the EA model, what additional secondary changes are needed to maintain consistency across multiple levels of the EA. This paper proposes an enterprise architectural description language, namely ChangeAwareHierarchicalEA, integrated with a framework to support change propagation …


Event Recognition Based On Top-Down Motion Attention, Li Li, Weiming Hu, Bing Li, Chunfeng Yuan, Pengfei Zhu, Wanqing Li Jan 2010

Event Recognition Based On Top-Down Motion Attention, Li Li, Weiming Hu, Bing Li, Chunfeng Yuan, Pengfei Zhu, Wanqing Li

Faculty of Informatics - Papers (Archive)

How to fuse static and dynamic information is a key issue in event analysis. In this paper, a top-down motion guided fusing method is proposed for recognizing events in an unconstrained news video. In the method, the static information is represented as a Bag-of-SIFT-features and motion information is employed to generate event specific attention map to direct the sampling of the interest points. We build class-specific motion histograms for each event so as to give more weight on the interest points that are discriminative to the corresponding event. Experimental results on TRECVID 2005 video corpus demonstrate that the proposed method …


On Business Services Representation - The 3 X 3 X 3 Approach, Lam-Son Le, Hoa Khanh Dam, Aditya K. Ghose Jan 2010

On Business Services Representation - The 3 X 3 X 3 Approach, Lam-Son Le, Hoa Khanh Dam, Aditya K. Ghose

Faculty of Informatics - Papers (Archive)

The increasing popularity and influence of service-oriented computing give rise to the need of representational and methodological supports for the development and management of business services. From an IT perspective, there is a proliferation of methods and languages for representing Web services. Unfortunately, there has not been much work in modeling high-level services from a business perspective. Modeling business services should arguably capture their inherent features, along with many other representational artifacts. We propose a novel approach for business services representation featuring a three-dimensional representational space of which dimensions stand for the service consumer, service provider and service context. We …


Mirroring And Interleaving In The Paperfolding Sequence, Bruce Bates, Martin Bunder, Keith Tognetti Jan 2010

Mirroring And Interleaving In The Paperfolding Sequence, Bruce Bates, Martin Bunder, Keith Tognetti

Faculty of Informatics - Papers (Archive)

Three equivalent methods of generating the paperfolding sequence are presented as well as a categorisation of runs of identical terms. We find all repeated subsequences, the largest repeated subsequences and the spacing of singles, doubles and triples throughout the sequence. The paperfolding sequence is shown to have links to the Binary Reflected Gray Code and the Stern-Brocot tree.


Supporting Change Propagation In The Maintenance And Evolution Of Service-Oriented Architectures, Hoa Khanh Dam, Aditya K. Ghose Jan 2010

Supporting Change Propagation In The Maintenance And Evolution Of Service-Oriented Architectures, Hoa Khanh Dam, Aditya K. Ghose

Faculty of Informatics - Papers (Archive)

As Service-Oriented Architecture (SOA) continues to be broadly adopted, the maintenance and evolution of service-oriented systems become a growing issue. Maintenance and evolution are inevitable activities since almost all systems tbat are useful and successful stimulate user-generated requests for change and improvement. A critical issue in the evolution of SOA is change propagation: given a set of primary changes that have been made to the SOA model, what additional secondary changes are needed to maintain consistency across mUltiple levels of the SOA models. This paper presents how an existing framework can be applied to effectively support change propagation within a …


Robust Fuzzy Control Of An Active Magnetic Bearing Subject To Voltage Saturation, Haiping Du, Nong Zhang, Jinchen Ji, Wei Gao Jan 2010

Robust Fuzzy Control Of An Active Magnetic Bearing Subject To Voltage Saturation, Haiping Du, Nong Zhang, Jinchen Ji, Wei Gao

Faculty of Informatics - Papers (Archive)

Based on a recently proposed model for the active-magnetic-bearing (AMB) switching mode of operation, this paper presents a robust Takagi-Sugeno-model-based fuzzy-control strategy to stabilize the AMB with fast response speed subject to control-voltage saturation and parameter uncertainties. The sufficient conditions for the existence of such a controller are derived in terms of linear matrix inequalities. Numerical simulations against the proposed AMB model and a high-fidelity AMB model are used to validate the effectiveness of the proposed approach.


Stabilizing Vehicle Lateral Dynamics With Considerations Of Parameter Uncertainties And Control Saturation Through Robust Yaw Control, Haiping Du, Nong Zhang, Guangming Dong Jan 2010

Stabilizing Vehicle Lateral Dynamics With Considerations Of Parameter Uncertainties And Control Saturation Through Robust Yaw Control, Haiping Du, Nong Zhang, Guangming Dong

Faculty of Informatics - Papers (Archive)

This paper presents a robust yaw-moment controller design for improving vehicle handling and stability with considerations of parameter uncertainties and control saturation. The parameter uncertainties dealt with are the changes of vehicle mass and moment of inertia about the yaw axis and the variations of cornering stiffnesses. The control saturation considered is due to the physical limitations of actuators and tires. Both polytopic and norm-bounded approaches are used to describe parameter uncertainties, and a norm-bounded approach is applied to handle the saturation nonlinearity. The conditions for designing such a controller are derived as linear matrix inequalities (LMIs). A nonlinear vehicle …


An Accelerating Two-Layer Anchor Search With Application To The Resource-Constrained Project Scheduling Problem, Reza Zamani Jan 2010

An Accelerating Two-Layer Anchor Search With Application To The Resource-Constrained Project Scheduling Problem, Reza Zamani

Faculty of Informatics - Papers (Archive)

This paper presents a search method that combines elements from evolutionary and local search paradigms by the systematic use of crossover operations, generally used as structured exchange of genes between a series of solutions in genetic algorithms. Crossover operations here are particularly utilized as a systematic means to generate several possible solutions from two superior solutions. To test the effectiveness of the method, it has been applied to the resource-constrained project scheduling problem. The computational experiments show that the application of the method to this problem is promising.


Interferon A-Inducible Protein 27 Computational Network Construction And Comparison Between The Frontal Cortex Of Hiv Encephalitis (Hive) And Hive-Control Patients, Juxiang Huang, Lin Wang, Minghu Jiang, Xiguang Zheng Jan 2010

Interferon A-Inducible Protein 27 Computational Network Construction And Comparison Between The Frontal Cortex Of Hiv Encephalitis (Hive) And Hive-Control Patients, Juxiang Huang, Lin Wang, Minghu Jiang, Xiguang Zheng

Faculty of Informatics - Papers (Archive)

Interferon α-inducible protein 27 (IFI27) computational network construction and analysis of frontal cortex of HIV encephalitis (HIVE) is very useful to identify novel markers and potential targets for prognosis and therapy. Based on integrated gene regulatory network infer (GRNInfer) method by linear programming and a decomposition procedure with analysis of the significant function cluster using Kappa statistics and fuzzy heuristic clustering from DAVID, we identified and constructed significant molecular IFI27 networks from 12 frontal cortex of HIVE-control patients and 16 HIVE in the same GEO Dataset GDS1726. Our integrative results reflected an IFI27 membrane module only in the upstream of …


Subquadratic Space Complexity Binary Field Multiplier Using Double Polynomial Representation, Jean-Claude Bajard, Christophe Negre, Thomas Plantard Jan 2010

Subquadratic Space Complexity Binary Field Multiplier Using Double Polynomial Representation, Jean-Claude Bajard, Christophe Negre, Thomas Plantard

Faculty of Informatics - Papers (Archive)

This paper deals with binary field multiplication. We use the bivariate representation of binary field called Double Polynomial System (DPS) presented in . This concept generalizes the composite field representation to every finite field. As shown in , the main interest of DPS representation is that it enables to use Lagrange approach for multiplication, and in the best case, Fast Fourier Transform approach, which optimizes Lagrange approach. We use here a different strategy from to perform reduction, and we also propose in this paper, some new approaches for constructing DPS. We focus on DPS, which provides a simpler and more …


Non-Standard Semiparametric Regression Via Brugs, Jennifer Marley, M. Wand Jan 2010

Non-Standard Semiparametric Regression Via Brugs, Jennifer Marley, M. Wand

Faculty of Informatics - Papers (Archive)

We provide several illustrations of Bayesian semiparametric regression analyses in the BRugs package. BRugs facilitates use of the BUGS inference engine from the R computing environment and allows analyses to be managed using scripts. The examples are chosen to represent an array of non-standard situations, for which mixed model software is not viable. The situations include: the response variable being outside of the one-parameter exponential family, data subject to missingness, data subject to measurement error and parameters entering the model via an index.


An Efficient Resource Allocation Algorithm For Ofdma Cooperative Relay Networks With Fairness And Qos Guaranteed, Asem A. Salah, Borhanunddin Mohd. Ali, Ahmad Saqer, Nidhal Odeh Jan 2010

An Efficient Resource Allocation Algorithm For Ofdma Cooperative Relay Networks With Fairness And Qos Guaranteed, Asem A. Salah, Borhanunddin Mohd. Ali, Ahmad Saqer, Nidhal Odeh

Faculty of Informatics - Papers (Archive)

This paper proposes a new resource allocation algorithm for uplink OFDMA-based cooperative relay networks assuming multiple source nodes, multiple relay nodes and a single destination. The aim is to maximize the total sum of the sources data rates while guaranteeing fairness among them with different QoS requirements. Assuming perfect channel state information (CSI) at the resource allocation controller. The optimization problem is formulated such that each source is assigned a weight factor based on its QoS requirements, then the ones with high weights are given more priority to select their resources (relay stations and subcarriers) first. Once the required QoS …


Harmonic Allocation Following Iec Guidelines Using The Voltage Droop Concept, V. J. Gosbell, Robert A. Barr Jan 2010

Harmonic Allocation Following Iec Guidelines Using The Voltage Droop Concept, V. J. Gosbell, Robert A. Barr

Faculty of Informatics - Papers (Archive)

Present IEC guidelines are difficult to apply to realistic cases because of the data load, the number of assumptions required and the computational complexity. A new approach is given based on the concept of voltage droop, to be detailed in a companion paper. The benefits of the approach are a simple calculation with minimal data and no required assumptions. It applies to radial or meshed distribution systems where feeders are sufficiently short that line capacitance can be ignored. The approach can be applied at the installation (MV or LV) and the equipment level and can be used to give reference …


Lifetime Analysis Of Aluminum Electrolytic Capacitor Subject To Voltage Fluctuations, Kun Zhao, Philip Ciufo, Sarath Perera Jan 2010

Lifetime Analysis Of Aluminum Electrolytic Capacitor Subject To Voltage Fluctuations, Kun Zhao, Philip Ciufo, Sarath Perera

Faculty of Informatics - Papers (Archive)

This paper evaluates the changes in the ripple current for an electrolytic capacitor used in the dc-side of a single-phase rectifier circuit when subjected to input voltage fluctuations. The study has been undertaken in order to analyse the potential impact on capacitor lifetime. The key effect is that the capacitor ripple current, as a consequence of voltage fluctuations, increases dramatically and this phenomenon keeps deteriorating as the frequency of the voltage fluctuations increases. Simulations and experimental work confirm this phenomenon. Since the power loss and temperature rise are dependent on the capacitor equivalent series resistance (ESR) and ripple current components, …


Classification Of Power Quality Disturbances Using The Iterative Hilbert Huang Transform, C. F. Drummond, Darmawan Sutanto Jan 2010

Classification Of Power Quality Disturbances Using The Iterative Hilbert Huang Transform, C. F. Drummond, Darmawan Sutanto

Faculty of Informatics - Papers (Archive)

The Hilbert Huang Transform (HHT) is a powerful tool for Power Quality (PQ) classifications. One of the main advantages of the HHT is its ability to analyse non-stationary complex waveforms with very good time resolution. However, like other waveform classification techniques, it has difficulty in resolving the instant of sudden changes in the waveform. It has also difficulty with signals that have frequency components close together. This paper summarises the fundamentals of the HHT technique and its application to power quality classifications including its advantages and disadvantages. Two novel techniques to improve the performance of the HHT technique in analysing …