Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

None

Discipline
Keyword
Publication Year
Publication

Articles 961 - 990 of 2377

Full-Text Articles in Physical Sciences and Mathematics

Using Digital Tickets To Protect Personal Privacy, Yibing Kong, Jennifer Seberry, Janusz Getta, Ping Yu Dec 2012

Using Digital Tickets To Protect Personal Privacy, Yibing Kong, Jennifer Seberry, Janusz Getta, Ping Yu

Dr Ping Yu

No abstract provided.


Does Electronic Nursing Documentation Save Time In Residential Aged Care? Evidence Acquired 11-Weeks Into A Software Product Trial, Ping Yu Dec 2012

Does Electronic Nursing Documentation Save Time In Residential Aged Care? Evidence Acquired 11-Weeks Into A Software Product Trial, Ping Yu

Dr Ping Yu

No abstract provided.


Quality Of Nursing Documentation And Approaches To Its Evaluation: A Mixed-Method Systematic Review, Ning Wang, David Hailey, Ping Yu Dec 2012

Quality Of Nursing Documentation And Approaches To Its Evaluation: A Mixed-Method Systematic Review, Ning Wang, David Hailey, Ping Yu

Dr Ping Yu

AIMS: This paper reports a review that identified and synthesized nursing documentation audit studies, with a focus on exploring audit approaches, identifying audit instruments and describing the quality status of nursing documentation. INTRODUCTION: Quality nursing documentation promotes effective communication between caregivers, which facilitates continuity and individuality of care. The quality of nursing documentation has been measured by using various audit instruments, which reflected variations in the perception of documentation quality among researchers across countries and settings. DATA SOURCES: Searches were made of seven electronic databases. The keywords 'nursing documentation', 'audit', 'evaluation', 'quality', both singly and in combination, were used to …


A Collaborative Approach To Health Informatics Capacity Building - Learning From Canadian Practice In Fostering Research And Education, Ping Yu, Marilynne Herbert, Francis Lau Dec 2012

A Collaborative Approach To Health Informatics Capacity Building - Learning From Canadian Practice In Fostering Research And Education, Ping Yu, Marilynne Herbert, Francis Lau

Dr Ping Yu

Objectives: Canada and Australia share two priority areas for HI workforce capacity building: to support research and education. This presentation will discuss a collaborative, nationwide health informatics (HI) PhD/Postdoc training program in Canada, which demonstrates a potential solution to meet these priorities. The status of HI higher education in Australia is briefly reviewed. The potential solution in resolving workforce shortage in Australia through adopting overseas practice is discussed, such as implementing a similar collaborative HI research training program across the country. Background: A Think Tank organized by Commonwealth Department of Health and Ageing in 2003 explored the issue of HI …


Does The Introduction Of An Electronic Nursing Documentation System In A Nursing Home Reduce Time On Documentation For The Nursing Staff?, Esther Munyisia, Ping Yu, David Hailey Dec 2012

Does The Introduction Of An Electronic Nursing Documentation System In A Nursing Home Reduce Time On Documentation For The Nursing Staff?, Esther Munyisia, Ping Yu, David Hailey

Dr Ping Yu

Purpose: To determine whether the introduction of an electronic nursing documentation system in a nursing home reduces the proportion of time nursing staff spend on documentation, and to use this information in evaluating the usefulness of the system in improving the work of nursing staff. Methods: An observational work sampling study was conducted in 2009 and 2010, 2 months before, and 3, 6 and 12 months after the introduction of an electronic nursing documentation system. An observer (ENM) used a work classification tool to record documentation activities being performed using paper and with a computer by nursing staff at particular …


Research Summary: Capacity And Willingness Of Residential Aged Care Workers To Use It To Manage Care Information, Ping Yu Dec 2012

Research Summary: Capacity And Willingness Of Residential Aged Care Workers To Use It To Manage Care Information, Ping Yu

Dr Ping Yu

This research project was designed to inform strategic information technology planning and workforce education. UnitingCare Ageing needed to understand the basic computer capacity and willingness of their residential aged care workers to use IT to manage care information. Their aim was to examine the impediments to the adoption of IT solution.


Evaluating The Impact Of Implementing Of A New Wireless Telemonitoring System For Urinary Continence Management For Older People Living In Nursing Homes, Ping Yu, D Hailey, V Traynor, Z Zhang Dec 2012

Evaluating The Impact Of Implementing Of A New Wireless Telemonitoring System For Urinary Continence Management For Older People Living In Nursing Homes, Ping Yu, D Hailey, V Traynor, Z Zhang

Dr Ping Yu

No abstract provided.


Healthcare Workers' Readiness To Adopt E-Health Applications In Public Hospitals In Regional Saudi Arabia: A Case Study, Fares Alshammari, Ping Yu Dec 2012

Healthcare Workers' Readiness To Adopt E-Health Applications In Public Hospitals In Regional Saudi Arabia: A Case Study, Fares Alshammari, Ping Yu

Dr Ping Yu

No abstract provided.


A New Phase Unwrapping Algorithm Based On Three Wavelength Phase Shift Profilometry Method, Limei Song, Xiaoxiao Dong, Jiangtao Xi, Yanguang Yu, Chaokui Yang Dec 2012

A New Phase Unwrapping Algorithm Based On Three Wavelength Phase Shift Profilometry Method, Limei Song, Xiaoxiao Dong, Jiangtao Xi, Yanguang Yu, Chaokui Yang

Dr Yanguang Yu

Phase Shift Profilometry (PSP) method is widely used in 3D shape measurement. The advantage of the PSP method is that it is less sensitive to the surface reflectivity variations and the object can be measured point by point. But if only a single wavelength λ1 is used, the step height cannot be larger than λ1/4. In order to measure step height object, Gray Code (GC) and Multi-Wavelength Phase Shift Profilometry (MWPSP) method are used. But the GC method cannot solve the problem of the objects with a variety of colors under different illumination. The shortcoming of MWPSP …


A Data-Fitting Approach For Displacements And Vibration Measurement Using Self-Mixing Interferometers, Yi Zhang, Jiangtao Xi, Joe Chicharo, Yanguang Yu Dec 2012

A Data-Fitting Approach For Displacements And Vibration Measurement Using Self-Mixing Interferometers, Yi Zhang, Jiangtao Xi, Joe Chicharo, Yanguang Yu

Dr Yanguang Yu

This paper presents a signal processing approach for vibration measurement using self-mixing interferometer (SMI). Compared to existing approaches, the proposed approach is able to achieve an accuracy of λ/40 which significantly exceeds the accuracy limit associated with conventional simple SMI systems λ/4.


Partially Overlapped Range Images Registration Based On Fringe Pattern Profilometry, Xiaochen He, Jiangtao Xi, Yanguang Yu Dec 2012

Partially Overlapped Range Images Registration Based On Fringe Pattern Profilometry, Xiaochen He, Jiangtao Xi, Yanguang Yu

Dr Yanguang Yu

Registration of two three-dimensional (3-D) point sets is a fundamental problem of 3-D shape measurement and modeling pipeline. This paper investigates the automatic pair-wise method to register partially overlapped range images generated by self-developed fringe pattern profilometry (FPP) system. The method is based on the classic iterative closest point (ICP) algorithm but combined with several extensions to adapt to the experimental data. Firstly, the distance function for correspondence finding is modified to be the weighted linear combination of positions and Euclidean invariant features for improving the probability of convergence. In addition, outliers can be discarded through robust statistics and adaptive …


Fast Quality-Guided Phase Unwrapping Algorithm For 3d Profilometry Based On Object Image Edge Detection, Ke Chen, Jiangtao Xi, Yanguang Yu Dec 2012

Fast Quality-Guided Phase Unwrapping Algorithm For 3d Profilometry Based On Object Image Edge Detection, Ke Chen, Jiangtao Xi, Yanguang Yu

Dr Yanguang Yu

A main challenge associated with 3-dimentional fringe pattern profilometry (3D-FPP) systems is the unwrapping of phase maps resulted from complex object surface shapes with both robustness and speed guaranteed. In this paper we propose a new quality-guided phase unwrapping algorithm. In contrast to the conventional quality-guided methods, we classify pixels on wrapped phase map into two types by detecting edge pixels on object image: high quality (HQ) pixels corresponding to smooth phase changes and low quality (LQ) ones to rough phase changes. In order to improve the computational efficiency, these two types of pixels are unwrapped by means of different …


Enhanced Learner Model For Adaptive Mobile Learning, Ahmed Alhmouz, Jun Shen, Jun Yan, Rami Al-Hmouz Dec 2012

Enhanced Learner Model For Adaptive Mobile Learning, Ahmed Alhmouz, Jun Shen, Jun Yan, Rami Al-Hmouz

Dr Jun Yan

Personalisation and learner modelling are becoming more important in the area of mobile learning applications, taking into consideration learners' interests, preferences and contextual information. Students nowadays are able to learn anywhere and at any time. Mobile learning application content is one of several factors within various contexts that play an important role in the success of the adaptation process. The vast amount of data involved in any successful adaptation process creates complexity and poses serious challenges. This paper focuses on how to model the learner and all possible contexts in an extensible way that can be used for personalisation in …


Towards Qos-Based Web Services Discovery, Jun Yan, Jingtai Piao Dec 2012

Towards Qos-Based Web Services Discovery, Jun Yan, Jingtai Piao

Dr Jun Yan

The current UDDI-based web services discovery technologies are designed to discover services which can satisfy consumers’ functional requirements. The consumers’ non-functional requirements such as quality of services are largely ignored in discovery. This may lead to the problem that the services returned from discovery are ineffective and even useless. To solve this problem, this paper presents an approach to achieving QoS-based Web services discovery. Data structures are proposed for both service providers and service consumers to describe non-functional information about services. A serial of algorithms are developed for matching and ranking services according to consumers’ non-functional requirements.


A Generic Construction Of Dynamic Single Sign-On With Strong Security, Jinguang Han, Yi Mu, Willy Susilo, Jun Yan Dec 2012

A Generic Construction Of Dynamic Single Sign-On With Strong Security, Jinguang Han, Yi Mu, Willy Susilo, Jun Yan

Dr Jun Yan

Single Sign-On (SSO) is a core component in a federated identity management (FIM). Dynamic Single Sign-on (DSSO) is a more flexible SSO where users can change their service requirements dynamically. However, the security in the current SSO and DSSO systems remain questionable. As an example, personal credentials could be illegally used to allow illegal users to access the services. It is indeed a challenging task to achieve strong security in SSO and DSSO. In this paper, we propose a generic construction of DSSO with strong security. We propose the formal definitions and security models for SSO and DSSO, which enable …


Privacy Preserving Protocol For Service Aggregation In Cloud Computing, Peishun Wang, Yi Mu, Willy Susilo, Jun Yan Dec 2012

Privacy Preserving Protocol For Service Aggregation In Cloud Computing, Peishun Wang, Yi Mu, Willy Susilo, Jun Yan

Dr Jun Yan

Cloud computing has increasingly become a new model in the world of computing, and more businesses are moving to the cloud. As a cost-effective and time-efficient way to develop new applications and services, service aggregation in cloud computing empowers all service providers and consumers and creates tremendous opportunities in various industry sectors. However, it also poses various challenges to the privacy of personal information as well as the confidentiality of business and governmental information. The full benefits of service aggregation in cloud computing would only be enjoyed if the privacy concerns are addressed properly. In this paper, we investigate the …


A Cloud Based Information Integration Platform For Smart Cars, Yi Xu, Jun Yan Dec 2012

A Cloud Based Information Integration Platform For Smart Cars, Yi Xu, Jun Yan

Dr Jun Yan

Current in-car computers have limited processing capabilities, and the content in smart car applications is poor extension. Even more, tradition software install approach which was used in smart cars lacks neither economy nor convenience. To solve these issues, we introduced a Cloud based Information Integration Platform for Smart Cars that has the ability to encourage flexibility in smart cars and enhance the value of them. To achieve the smart control and information sharing in smart cars, the platform collects data on the CAN bus automatically, with the ability to process CAN bus messages in Clouds. The Smart Car Information Service …


Insc: An Iterative Negotiation Approach For Service Compositions, Q He, Yun Yang, Jun Yan, Hai Jin Dec 2012

Insc: An Iterative Negotiation Approach For Service Compositions, Q He, Yun Yang, Jun Yan, Hai Jin

Dr Jun Yan

The service-oriented paradigm offers support for engineering service-based systems (SBSs) based on service compositions. The selection of services with the aim to fulfil the quality constraints for SBSs and to achieve the optimisation goals is a critical and challenging issue. In particular, when the quality-of-service (QoS) constraints for a SBS are severe, it is often difficult to find an optimal solution for the SBS. Exploiting the competition among service providers can help SBS developers obtain favourable QoS offers for the component services of SBSs and increase the possibility of finding optimal solutions for the SBSs. In this paper, we present …


Modeling Mobile Learning System Using Anfis, Ahmed Al-Hmouz, Jun Shen, Jun Yan, Rami Al-Hmouz Dec 2012

Modeling Mobile Learning System Using Anfis, Ahmed Al-Hmouz, Jun Shen, Jun Yan, Rami Al-Hmouz

Dr Jun Yan

Personalisation is becoming more important in the area of mobile learning. Learner model is logically partitioned into smaller elements or classes in the form of learner profiles, which can represent the entire learning process. Machine learning techniques have the ability to detect patterns from complicated data and learn how to perform activities based on learner profiles. This paper focuses on a systematic approach in reasoning the learner contexts to deliver adaptive learning content. A fuzzy rule base model that has been proposed in related work is found insufficient in deciding all possible conditions. To tackle this problem, this paper adopts …


Computing Resource Prediction For Mapreduce Applications Using Decision Tree, Jing Piao, Jun Yan Dec 2012

Computing Resource Prediction For Mapreduce Applications Using Decision Tree, Jing Piao, Jun Yan

Dr Jun Yan

The cloud computing paradigm offer users access to computing resource in a pay-as-you-go manner. However, to both cloud computing vendors and users, it is a challenge to predict how much resource is needed to run an application in a cloud at a required level of quality. This research focuses on developing a model to predict the computing resource consumption of MapReduce applications in the cloud computing environment. Based on the Classified and Regression Tree (CART), the proposed approach derives knowledge of the relationship among the application features, quality of service, and amount of computing resource, from a small training. The …


Privacy-Preserved Access Control For Cloud Computing, Miao Zhou, Yi Mu, Willy Susilo, Man Ho Allen Au, Jun Yan Dec 2012

Privacy-Preserved Access Control For Cloud Computing, Miao Zhou, Yi Mu, Willy Susilo, Man Ho Allen Au, Jun Yan

Dr Jun Yan

The problem of access control on outsourced data to "honest but curious" cloud servers has received considerable attention, especially in scenarios involving potentially huge sets of data files, where re-encryption and re-transmission by the data owner may not be acceptable. Considering the user privacy and data security in cloud environment, in this paper, we propose a solution to achieve flexible and fine-grained access control on outsourced data files. In particular, we look at the problem of defining and assigning keys to users based on different attribute sets, and hiding access policies as well as users information to the third-party cloud …


An Extended Dual Concern Model For Partner Selection In Multi-Agent Systems, Minjie Zhang, Jun Yan, Fenghui Ren Dec 2012

An Extended Dual Concern Model For Partner Selection In Multi-Agent Systems, Minjie Zhang, Jun Yan, Fenghui Ren

Dr Jun Yan

No abstract provided.


Modelling And Simulation Of An Adaptive Neuro-Fuzzy Inference System (Anfis) For Mobile Learning, Ahmed Al-Hmouz, Jun Shen, Rami Al-Hmouz, Jun Yan Dec 2012

Modelling And Simulation Of An Adaptive Neuro-Fuzzy Inference System (Anfis) For Mobile Learning, Ahmed Al-Hmouz, Jun Shen, Rami Al-Hmouz, Jun Yan

Dr Jun Yan

With recent advances in mobile learning (m-learning), it is becoming possible for learning activities to occur everywhere. The learner model presented in our earlier work was partitioned into smaller elements in the form of learner profiles, which collectively represent the entire learning process. This paper presents an Adaptive Neuro-Fuzzy Inference System (ANFIS) for delivering adapted learning content to mobile learners. The ANFIS model was designed using trial and error based on various experiments. This study was conducted to illustrate that ANFIS is effective with hybrid learning, for the adaptation of learning content according to learners' needs. Study results show that …


Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption, Jinguang Han, Willy Susilo, Yi Mu, Jun Yan Dec 2012

Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption, Jinguang Han, Willy Susilo, Yi Mu, Jun Yan

Dr Jun Yan

Decentralized attribute-based encryption (ABE) is a variant of a multiauthority ABE scheme where each authority can issue secret keys to the user independently without any cooperation and a central authority. This is in contrast to the previous constructions, where multiple authorities must be online and setup the system interactively, which is impractical. Hence, it is clear that a decentralized ABE scheme eliminates the heavy communication cost and the need for collaborative computation in the setup stage. Furthermore, every authority can join or leave the system freely without the necessity of reinitializing the system. In contemporary multiauthority ABE schemes, a user's …


Improved Certificateless Signature Scheme Provably Secure In The Standard Model, Yong Yu, Yi Mu, Guilin Wang, Q Xia, B Yang Dec 2012

Improved Certificateless Signature Scheme Provably Secure In The Standard Model, Yong Yu, Yi Mu, Guilin Wang, Q Xia, B Yang

Dr Guilin Wang

Certificateless cryptography shares many features of identity-based cryptography and partially solves the problem of key escrow. Three certificateless signature schemes without random oracles were found in the literature. However, all the schemes suffer from some common drawbacks. First, by obtaining a signature on a message and replacing the public key of a signer, an adversary can forge valid signatures on the same message under the replaced public key. Secondly, all the schemes require a relatively large size of public parameters. The authors propose a new certificateless signature scheme, which exhibits an improvement on the existing schemes. Compared with the previous …


Provably Secure Single Sign-On Scheme In Distributed Systems And Networks, Jiangshan Yu, Guilin Wang, Yi Mu Dec 2012

Provably Secure Single Sign-On Scheme In Distributed Systems And Networks, Jiangshan Yu, Guilin Wang, Yi Mu

Dr Guilin Wang

Distributed systems and networks have been adopted by telecommunications, remote educations, businesses, armies and governments. A widely applied technique for distributed systems and networks is the single sign-on (SSO) which enables a user to use a unitary secure credential (or token) to access multiple computers and systems where he/she has access permissions. However, most existing SSO schemes have not been formally proved to satisfy credential privacy and soundness of credential based authentication. To overcome this drawback, we formalise the security model of single sign-on scheme with authenticated key exchange. Specially, we point out the difference between soundness and credential privacy, …


On The Invisibility Of Designated Confirmer Signatures, Fubiao Xia, Guilin Wang, Rui Xue Dec 2012

On The Invisibility Of Designated Confirmer Signatures, Fubiao Xia, Guilin Wang, Rui Xue

Dr Guilin Wang

As an important cryptographic primitive, designated con- rmer signatures are introduced to control the public veria- bility of signatures. That is, only the signer or a semi-trusted party, called designated conrmer, can interactively assist a verier to check the validity of a designated conrmer sig- nature. The central security property of a designated con- rmer signature scheme is called invisibility, which requires that even an adaptive adversary cannot determine the valid- ity of an alleged signature without direct cooperation from either the signer or the designated conrmer. However, in the literature researchers have proposed two other related properties, called impersonation …


Secure And Practical Key Distribution For Rfid-Enabled Supply Chains, Tieyan Li, Yingjiu Li, Guilin Wang Dec 2012

Secure And Practical Key Distribution For Rfid-Enabled Supply Chains, Tieyan Li, Yingjiu Li, Guilin Wang

Dr Guilin Wang

In this paper, we present a fine-grained view of an RFIDenabled supply chain and tackle the secure key distribution problem on a peer-to-peer base, In our model, we focus on any pair of consecutive parties along a supply chain, who agreed on a transaction and based on which, certain RFID-tagged goods are to be transferred by a third party from one party to the other as in common supply chain practice. Under a strong adversary model, we identify and define the security requirements with those parties during the delivery process. To meet the security goal, we first propose a resilient …


A Pairing-Free Id-Based One-Pass Authenticated Key Establishment Protocol For Wireless Sensor Networks, Rehana Yasmin, Eike Ritter, Guilin Wang Dec 2012

A Pairing-Free Id-Based One-Pass Authenticated Key Establishment Protocol For Wireless Sensor Networks, Rehana Yasmin, Eike Ritter, Guilin Wang

Dr Guilin Wang

Due to resource constraints and unique features of wireless sensor networks (WSNs), designing a key establishment protocol is much harder for WSNs than for traditional wired and wireless counterparts. In this paper, we propose a new efficient and secure ID-based one-pass authenticated key establishment protocol between an outside user and a sensor node. The proposed protocol does not require sensor nodes to compute any expensive pairing function. Moreover, it imposes very light computational and communication overheads and also provides scalability. We analyze security and efficiency of the proposed protocol by comparing firstly the session key establishment protocols for WSNs and …


Incorporation Of Radius-Info Can Be Simple With Simplemkl, Xinwang Liu, Lei Wang, Jianping Yin, Lingqiao Liu Dec 2012

Incorporation Of Radius-Info Can Be Simple With Simplemkl, Xinwang Liu, Lei Wang, Jianping Yin, Lingqiao Liu

Dr Lei Wang

Recent research has shown the benefit of incorporating the radius of the Minimal Enclosing Ball (MEB) of training data into Multiple Kernel Learning (MKL). However, straightforwardly incorporating this radius leads to complex learning structure and considerably increased computation. Moreover, the notorious sensitivity of this radius to outliers can adversely affect MKL. In this paper, instead of directly incorporating the radius of MEB, we incorporate its close relative, the trace of data scattering matrix, to avoid the above problems. By analyzing the characteristics of the resulting optimization, we show that the benefit of incorporating the radius of MEB can be fully …