Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Physical Sciences and Mathematics

Secure Data Transmission Using Quibits, Iman Marvian, Saied Hosseini-Khayat Jan 2006

Secure Data Transmission Using Quibits, Iman Marvian, Saied Hosseini-Khayat

Faculty of Informatics - Papers (Archive)

A quantum protocol for secure transmission of data using qubits is presented. This protocol sends one qubit in a round-trip to transmit one bit of data. The protocol offers an improvement over the BB84 QKD protocol. BB84, in conjunction with one-time pad encryption, has been shown to be unconditionally secure. However its security relies on the assumption that the qubit source device does not emit multiple replicas of the same qubit for each transmitted bit. If this happens a multi-qubit emission attack can be launched. In addition, BB84 cannot be used to send predetermined bit strings as it generates a …


Wfms-Based Data Integration For E-Learning, Jianming Yong, Jun Yan, Xiaodi Huang Jan 2006

Wfms-Based Data Integration For E-Learning, Jianming Yong, Jun Yan, Xiaodi Huang

Faculty of Informatics - Papers (Archive)

As more and more organisations and institutions are moving towards the e-learning strategy, more and more disparate data are distributed by different e-learning systems. How to effectively use this vast amount of distributed data becomes a big challenge. This paper addresses this challenge and works out a new mechanism to implement data integration for e-learning. A workflow management system based (WFMS-based) data integration model is contributed to the e-learning.


Comparisons Between Sciamachy And Ground-Based Ftir Data For Total Columns Of Co, Ch4, Co2 And N2o, B Dils, M De Maziere, J F. Muller, T Blumenstock, Nicholas B. Jones, David W. Griffith, C P Rinsland, E Mahieu, S Wood, R De Beek, P Demoulin, M Buchwitz, P Duchatelet, C Frankenberg, A Gloudemans, T Kerzenmacher, I Kramer, J Mellqvist, H Shrijver, A Strandberg, D Smale, W Stremme, A G. Straume, R Sussmann, M Van Den Broek, T Wagner, K Strong, Aldona Wiacek, J R. Taylor, Hans Fast, Thorsten Warneke, Richard L. Mittermeier, Justus Notholt, Voltaire A. Velazco Jan 2006

Comparisons Between Sciamachy And Ground-Based Ftir Data For Total Columns Of Co, Ch4, Co2 And N2o, B Dils, M De Maziere, J F. Muller, T Blumenstock, Nicholas B. Jones, David W. Griffith, C P Rinsland, E Mahieu, S Wood, R De Beek, P Demoulin, M Buchwitz, P Duchatelet, C Frankenberg, A Gloudemans, T Kerzenmacher, I Kramer, J Mellqvist, H Shrijver, A Strandberg, D Smale, W Stremme, A G. Straume, R Sussmann, M Van Den Broek, T Wagner, K Strong, Aldona Wiacek, J R. Taylor, Hans Fast, Thorsten Warneke, Richard L. Mittermeier, Justus Notholt, Voltaire A. Velazco

Faculty of Science - Papers (Archive)

Total column amounts of CO, CH4, CO2 and N2O retrieved from SCIAMACHY nadir observations in its near-infrared channels have been compared to data from a ground-based quasi-global network of Fourier-transform infrared (FTIR) spectrometers. The SCIAMACHY data considered here have been produced by three different retrieval algorithms, WFM-DOAS (version 0.5 for CO and CH4 and version 0.4 for CO2 and N2O), IMAP-DOAS (version 1.1 and 0.9 (for CO)) and IMLM (version 6.3) and cover the January to December 2003 time period. Comparisons have been made for individual data, as well as for monthly averages. To maximize the number of reliable coincidences …


The Risk Of Public Data Availability On Critical Infrastructure Protection, Roba Abbas Jan 2006

The Risk Of Public Data Availability On Critical Infrastructure Protection, Roba Abbas

Faculty of Informatics - Papers (Archive)

This paper examines the threat of freely available information on critical infrastructure protection (CIP) efforts. Critical infrastructure are the services required to maintain the stability and security of a country, and comprise both physical and cyber infrastructures. These interdependent entities must be protected from natural disasters, accidental errors, and deliberate attacks. The CIP process typically includes vulnerability assessment, risk assessment and risk management, and has been a global concern for many years; the concern now amplified in Australia due to a number of recent events such the 9/11 attacks, and the Bali bombings. The events have called into question the …


Analyzing Harmonic Monitoring Data Using Data Mining, Ali Asheibi, David A. Stirling, Danny Sutanto Jan 2006

Analyzing Harmonic Monitoring Data Using Data Mining, Ali Asheibi, David A. Stirling, Danny Sutanto

Faculty of Informatics - Papers (Archive)

Harmonic monitoring has become an important tool for harmonic management in distribution systems. A comprehensive harmonic monitoring program has been designed and implemented on a typical electrical MV distribution system in Australia. The monitoring program involved measurements of the three-phase harmonic currents and voltages from the residential, commercial and industrial load sectors. Data over a three year period has been downloaded and available for analysis. The large amount of acquired data makes it difficult to identify operational events that impact significantly on the harmonics generated on the system. More sophisticated analysis methods are required to automatically determine which part of …


On The Design Of Early Generation Variety Trials With Correlated Data, Brian R. Cullis, A B. Smith, N. E. Coombes Jan 2006

On The Design Of Early Generation Variety Trials With Correlated Data, Brian R. Cullis, A B. Smith, N. E. Coombes

Faculty of Informatics - Papers (Archive)

This article considers the design of early generation variety trials with a prespecified spatial correlation structure and introduces a new class of partially replicated designs called p-rep designs in which the plots of standard varieties are replaced by additional plots of test lines. We show how efficient p-rep designs can be readily generated using the modified Reactive TABU search algorithm. The expected and realized genetic gain of p-rep and grid plot designs is compared in a simulation study.