Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Faculty of Informatics - Papers (Archive)

Discipline
Keyword
Publication Year

Articles 1171 - 1200 of 2013

Full-Text Articles in Physical Sciences and Mathematics

An Agent-Based Peer-To-Peer Grid Computing Architecture, J. Tang, Minjie Zhang Nov 2005

An Agent-Based Peer-To-Peer Grid Computing Architecture, J. Tang, Minjie Zhang

Faculty of Informatics - Papers (Archive)

We propose a multi-agent based peer-to-peer grid computing architecture in this paper to solves the issues that the conventional grid architecture is limited in modeling computer systems with highly dynamic and autonomous computing resources, and its super-local resource management and scheduling strategy limits the utilization of the computing resources. Besides, the new architecture provides reasonable compatibility and interoperability with the conventional grid systems and clients.


Introducing N-Tree-Space: A Classification System For Knowledge Library Applications, E. Rayner, I. C. Piper, M. Bunder Nov 2005

Introducing N-Tree-Space: A Classification System For Knowledge Library Applications, E. Rayner, I. C. Piper, M. Bunder

Faculty of Informatics - Papers (Archive)

This paper identifies and defines the Knowledge Library Application (KLA) class. KLAs are an important class of information resource/knowledge management applications. It will be clear from the definition that KLAs are highly relevant to both the commercial and academic worlds and existing techniques such as keyword and tree classification, On-Line Analytical Processing (OLAP), and Formal Concept Analysis (FCA) do not provide key KLA features. N-Tree-Space (NTS), a technique detailed in this paper, enables the provision of these features and should facilitate the development of a range of KLAs that offer significant advantages over currently available software tools.


Collaborative Editing Using An Xml Protocol, S. J. Davis, I. S. Burnett Nov 2005

Collaborative Editing Using An Xml Protocol, S. J. Davis, I. S. Burnett

Faculty of Informatics - Papers (Archive)

XML is a popular approach to interoperable exchange of data between a wide range of devices. This paper explores the use of the Remote XML Exchange Protocol as a mechanism to provide efficient interaction with complex XML documents to users with limited complexity devices and/or limited bandwidth connections. The interactive mechanisms provided by the protocol allow users to navigate, edit and download XML even when delivery of the full XML document is impossible. The paper examines the use of the protocol to enable multiple users to collaboratively edit remote XML documents. Further, the paper explores the combination of the protocol, …


Improved Dynamic Multimedia Resource Adaptation-Based Peer-To-Peer System Through Locality-Based Clustering And Service, Letian Rong, I. Burnett Nov 2005

Improved Dynamic Multimedia Resource Adaptation-Based Peer-To-Peer System Through Locality-Based Clustering And Service, Letian Rong, I. Burnett

Faculty of Informatics - Papers (Archive)

A dynamic P2P architecture based on MPEG-21 was proposed in our previous work to support resource adaptation/personalization according to the surrounding usage environment and user preferences. In this paper, we improve the proposed system through two separate but related modifications. Firstly, peers are clustered according to registered geographic location information. Secondly, based on that registered location information, a locality-based service is introduced which allows users to search services according to their geographic locations. The service complements the proposed P2P architecture by encouraging service providers to increase the uptime of their devices and hence provide the spare computer power for active …


A Substitute Vision System For Providing 3d Perception And Gps Navigation Via Electro-Tactile Stimulation, S. Meers, Koren Ward Nov 2005

A Substitute Vision System For Providing 3d Perception And Gps Navigation Via Electro-Tactile Stimulation, S. Meers, Koren Ward

Faculty of Informatics - Papers (Archive)

This paper describes a novel approach for enabling the blind to achieve obstacle avoidance and navigation in outdoor environments with the aid of visual sensors, GPS and electro-tactile stimulation. The electro-neural vision system (ENVS) works by extracting a depth map from stereo cameras by measuring the disparity between the stereo images. This range data is then delivered to the fingers via electro-neural stimulation to indicate to the user the range of objects being viewed by the cameras. To perceive the location of obstacles and the 3D structure of the environment the user imagines that the hands are held in the …


Investigating The Relationship Between Location-Based Services And National Security, Holly Tootell Nov 2005

Investigating The Relationship Between Location-Based Services And National Security, Holly Tootell

Faculty of Informatics - Papers (Archive)

Public awareness of national security has increased significantly since September 11, 2001. Literature has discussed ways to respond or prevent breaches of National security with some of these methods employing information technologies, including Radio Frequency Identification (RFID) and Global Positioning System (GPS). Other studies have focused on the privacy impact the proposed solutions will have. This research examines the technologies under the umbrella of Location-Based Services (LBS). The preliminary findings of this research indicate that the broader notion of LBS is what needs to be focused on in order to understand the impact that they are having in the effort …


Location Privacy In Mobile Ip, Rungrat Wiangsripanawan, R. Safavi-Naini, Willy Susilo Nov 2005

Location Privacy In Mobile Ip, Rungrat Wiangsripanawan, R. Safavi-Naini, Willy Susilo

Faculty of Informatics - Papers (Archive)

Several security issues arise, due to the design of the mobile IP and its deployment in conjunction with other network protocols. Most of the work on the security of mobile IP has focused on authentication of the control packet and the confidentiality of the content in the protocol, and there are not many proposals in the area of location privacy. In this paper, we propose a method to provide location privacy for mobile IP users. We present two protocols that use an overlay network approach, and designed particularly for mobile IP. We employ universal re-encryption and extend it to n-out-of-n …


Secure And Anonymous Mobile Ad-Hoc Networks, Y. Mu, F. Zhang, Willy Susilo Nov 2005

Secure And Anonymous Mobile Ad-Hoc Networks, Y. Mu, F. Zhang, Willy Susilo

Faculty of Informatics - Papers (Archive)

A mobile ad-hoc network (MANET) is a wireless network made up of mobile hosts that do not require any fixed infrastructure to communicate. The major features of ad-hoc networks is self-organization and dynamics in user participation. Because of these features, the security in ad-hoc becomes a challenge. In this paper, we consider an interesting scenario, where an arbitrary number of nodes in MANET can dynamically form an anonymous group that exhibits the following features: (1) any outsider can be convinced that the node is indeed in the group; (2) any outsider can send a message back to the node in …


Efficient And Highly Scalable Route Discovey For On-Demand Routing Protocols In Ad Hoc Networks, Mehran Abolhasan, Justin Lipman Nov 2005

Efficient And Highly Scalable Route Discovey For On-Demand Routing Protocols In Ad Hoc Networks, Mehran Abolhasan, Justin Lipman

Faculty of Informatics - Papers (Archive)

This paper presents a number of different route discovery strategies for on-demand routing protocols, which provide more control to each intermediate node make during the route discovery phase to make intelligent forwarding decisions. This is achieved through the idea of selfselection. In self-selecting route discovery each node independently makes Route Request (RREQ) forwarding decisions based upon a selection criterion or by satisfying certain conditions. The nodes which do not satisfy the selection criterion do not rebroadcast the routing packets. We implemented our self-selecting route discovery strategies over AODV using the GloMoSim network simulation package, and compared the performance with existing …


A Simulation Study Of Tcp Over The Ieee 802.15.3 Mac, Kwan-Wu Chin, Darryn Lowe Nov 2005

A Simulation Study Of Tcp Over The Ieee 802.15.3 Mac, Kwan-Wu Chin, Darryn Lowe

Faculty of Informatics - Papers (Archive)

This paper presents the impact of IEEE 802.15.3 MAC’s channel time allocation methods on a TCP flow’s performance. We show the importance of having super rate and appropriately sized channel time allocations (CTAs).


Manipulation Skills Acquisition Through State Classification And Dimension Decrease, S. Dong, F. Naghdy Nov 2005

Manipulation Skills Acquisition Through State Classification And Dimension Decrease, S. Dong, F. Naghdy

Faculty of Informatics - Papers (Archive)

The work carried out to explore the feasibility of reconstructing human constrained motion manipulation skills is reported. This is achieved by tracing and learning the manipulation performed by a human operator in a haptic rendered virtual environment. The peg-in-hole insertion problem is used as a case study. In the developed system, force and position variables generated in the haptic rendered virtual environment combined with a priori knowledge about the task are used to identify and learn the skills in the newly demonstrated task. The data obtained from the virtual environment is classified into different cluster sets using Fuzzy Gustafson-Kessel Model …


Practical Application Of Support-Based Distributed Search, Peter Harvey, C. F. Chang, Aditya K. Ghose Nov 2005

Practical Application Of Support-Based Distributed Search, Peter Harvey, C. F. Chang, Aditya K. Ghose

Faculty of Informatics - Papers (Archive)

Algorithms for Distributed Constraint Satisfaction Problems have tended to mirror existing non-distributed global-search or local-search algorithms. Unfortunately, existing distributed global-search algorithms derive from classical backtracking search methods and require a total ordering over variables for completeness. Distributed variants of local-search algorithms (such as distributed breakout) inherit the incompleteness properties of their predecessors. A meeting scheduling problem translates to a DisCSP where a global ordering is difficult to maintain and creates undesirable behaviours. We present a practical demonstration of an algorithm in which a global ordering is not required, while avoiding the problems of local-search algorithms.


Blind Speech Separation Using A Joint Model Of Speech Production, Daniel Smith, Jason Lukasiak, Ian Burnett Nov 2005

Blind Speech Separation Using A Joint Model Of Speech Production, Daniel Smith, Jason Lukasiak, Ian Burnett

Faculty of Informatics - Papers (Archive)

We propose a new blind signal separation (BSS)technique, developed specifically for speech, that exploits a priori knowledge of speech production mechanisms. In our approach, the autoregressive (AR) structure and fundamental frequency ( 0) production mechanisms of speech are jointly modeled. We compare the separation performance of our joint AR-F0 algorithm to existing BSS algorithms that model either speech’s AR structure [1] or 0 [2] individually. Experimental results indicate that the joint algorithm demonstrates superior separation performance to both the individual AR algorithm (up to 77% improvement) and F0 (up to 50% improvement) algorithms. This suggests that speech separation performance is …


Efficient Delivery Within The Mpeg-21 Framework, S. J. Davis, I. Burnett Oct 2005

Efficient Delivery Within The Mpeg-21 Framework, S. J. Davis, I. Burnett

Faculty of Informatics - Papers (Archive)

MPEG-21, the new Multimedia Framework standard is nearing completion. It is centred around the concept of a Digital Item which is exchanged in the form of an XML declaration. This paper initially considers the challenge of compressing these Digital Item Declarations and presents conclusive results showing that schema based compression is the best solution. A new technique is then presented whereby the one-way delivery framework is expanded to allow client selection and control of Digital Item fragment transmission. This uses a new Remote XML Exchange Protocol (RXEP) which significantly reduces storage and time delays in mobile environments. Finally, the new …


A Sequential Approach To Sparse Component Analysis, Daniel Smith, Jason Lukasiak, I. Burnett Oct 2005

A Sequential Approach To Sparse Component Analysis, Daniel Smith, Jason Lukasiak, I. Burnett

Faculty of Informatics - Papers (Archive)

A sequential approach to sparse component analysis (SeqTIF) is proposed in this paper. Although SeqTIF employs the estimation process of the simultaneous TIFROM algorithm, a source cancellation and deflation technique are also incorporated to sequentially estimate speech signals in the mixture. Results indicate that SeqTIF's separation performance shows a clear improvement upon the simultaneous TIFROM approach, due to the less restrictive assumptions it places upon the signals in the mixture. In particular, the analysis indicates SeqTIF's data efficiency is high, enabling the sequential approach to track a time-varying mixture with much greater accuracy than the simultaneous algorithm. Furthermore, SeqTIF is …


A Protected Digital Item Declaration Language For Mpeg-21, S. Lauf, I. Burnett Oct 2005

A Protected Digital Item Declaration Language For Mpeg-21, S. Lauf, I. Burnett

Faculty of Informatics - Papers (Archive)

Within the MPEG-21 Multimedia Framework, Digital Items are introduced as a structured digital representation for multimedia. To facilitate the representation of Digital Items which include secure or controlled content, the authors have implemented an IPMP Digital Item Declaration Language (IPMP DIDL). This provides for a protected representation of Digital Item structure, allowing the use of existing DRM systems and rights expression languages. This paper examines the design and implementation of the IPMP DIDL and its incorporation into MPEG-21 Part 4: IPMP Components.


Optimisation Of Triangulation Based Optical Profilometers Utilising Digital Video Projection Technology, Matthew J. Baker, Jiangtao Xi, Joe F. Chicharo, Enbang Li Oct 2005

Optimisation Of Triangulation Based Optical Profilometers Utilising Digital Video Projection Technology, Matthew J. Baker, Jiangtao Xi, Joe F. Chicharo, Enbang Li

Faculty of Informatics - Papers (Archive)

Fast, high precision and automated optical noncontact surface profile and shape measurement has been an extensively studied research area due to its many potential applications including 3D sensing, industrial monitoring, mechanical engineering, medicine, robotics, machine vision,animation, virtual reality, dressmaking, prosthetics, ergonomics. Among others, structured light approaches including fringe profilometry have proven to be one of the most promising techniques. In such profilometry techniques a structured light pattern, generally composed of parallel lines is projected onto a diffuse surface to be measured and viewed from an offset angle. The observed pattern is distorted by the object in such a way that …


Multi-Point Fiber Bragg Grating Based Vibration Measurement System With High Sensitivity And Fast Frequency Response, Enbang Li, Jiangtao Xi, Joe F. Chicharo Oct 2005

Multi-Point Fiber Bragg Grating Based Vibration Measurement System With High Sensitivity And Fast Frequency Response, Enbang Li, Jiangtao Xi, Joe F. Chicharo

Faculty of Informatics - Papers (Archive)

We have proposed and demonstrated a new fiber Bragg grating (FBG) based vibration measurement system which can demodulate vibration signals from wavelength-multiplexed FBG sensors with high sensitivity and fast frequency response.


A Novel Ieee 802.15.3 Cta Sharing Protocol For Supporting Vbr Streams, Kwan-Wu Chin, Darryn Lowe Oct 2005

A Novel Ieee 802.15.3 Cta Sharing Protocol For Supporting Vbr Streams, Kwan-Wu Chin, Darryn Lowe

Faculty of Informatics - Papers (Archive)

The IEEE 802.15.3 MAC enables high-rate communications between devices in a wireless personal area network and has good support for applications requiring quality of service (QoS). To meet applications' QoS requirements, such as delay and jitter, the channel time allocation (CTA) scheduler plays an important role in sizing and positioning CTAs within each super-frame. In this paper, we first present a novel CTA sharing protocol, called VBR-MCTA that enables the sharing of CTAs belonging to streams with the same group identity. This allows our protocol to exploit the statistical characteristics of variable bit rate (VBR) streams by giving unused time …


Ardez: A Low Power Asymmetric Rendezvous Mac For Sensor Networks, K. Chin, Mohammed Raad Oct 2005

Ardez: A Low Power Asymmetric Rendezvous Mac For Sensor Networks, K. Chin, Mohammed Raad

Faculty of Informatics - Papers (Archive)

We present a rendezvous based medium access control (MAC), culled ArDeZ, for use in sensor networks. ArDeZ is a TDMA based medium access scheme that does not rely on strict time slot positioning and assignments, making ArDeZ easily deployable in large sensor networks without having to adhere to strict time slot boundaries. ArDeZ establishes two independent peer-to-peer time channels between nodes, and these channels do not necessarily have the same duty cycle. Each channel has a set of rendezvous periods associated with it that are generated from a seed exchanged during the setup process. Further, the duration and frequency of …


Bounds On Authentication Systems In Query Mode, R. Safavi-Naini, P. Wild Oct 2005

Bounds On Authentication Systems In Query Mode, R. Safavi-Naini, P. Wild

Faculty of Informatics - Papers (Archive)

Unconditionally secure authentication codes provide information theoretic security against an adversary who observes authenticated messages and then wants to construct a fraudulent message that is acceptable by the receiver. The attack model for these codes has recently been strengthened and adaptive adversaries with oracle access have been introduced. In this paper we give an analysis of this new model and derive information theoretic bounds on the success probability and key size of the codes. Our analysis treats two games that an adversary can play: an offline attack in which the adversary is allowed to query a verification oracle and then …


Deploying The Digital Aid Framework: A Non-Traditionalist View Of The Intrinsic Nature Of E-Business Solutions For Humanitarian Relief, J. Sargent Oct 2005

Deploying The Digital Aid Framework: A Non-Traditionalist View Of The Intrinsic Nature Of E-Business Solutions For Humanitarian Relief, J. Sargent

Faculty of Informatics - Papers (Archive)

Commercial Fortune 500 companies come readily to mind in any discussion or categorization of global e- Businesses. However, organizations within the international humanitarian relief sector such as UNHCR, the UN’s refugee agency, are consistently over-looked or underestimated as global ‘e-Biz’ players. This paper acts as a primer for the principles of e-Business for humanitarian relief by presenting deployment examples of traditional e-Business processes in non-traditional contexts; refugee and Internally Displaced Person (IDP) crises. Preliminary research indicates such illustrated indicative examples detailed in the Digital Aid Framework have potential for easy adoption and integration into future humanitarian (refugee & IDP) relief …


Humancentric Applications Of Precise Location Based Services, L. Perusco, Katina Michael Oct 2005

Humancentric Applications Of Precise Location Based Services, L. Perusco, Katina Michael

Faculty of Informatics - Papers (Archive)

This paper focuses on the growing need to consider the implications of humancentric applications of precise location based services (LBS). As newer positioning technologies are introduced into the market with a greater level of location accuracy, and existing technologies are utilized in an integrated fashion to overcome limitations, issues pertaining to the use and potential misuse of location information rise to the fore. The scenario planning methodology provides a robust approach within which to consider future possibilities based on current market developments. To this end, document and content analysis play an important role in the collection of facts used to …


Is It The End Of Barcodes In Supply Chain Management? , Luke Mccathie, Katina Michael Oct 2005

Is It The End Of Barcodes In Supply Chain Management? , Luke Mccathie, Katina Michael

Faculty of Informatics - Papers (Archive)

Barcode is a mature automatic identification (auto-ID) technology that has been used in supply chain management (SCM) for several decades. Such has been the domination of the auto-ID technique that it has pervaded all facets of SCM, from item-level identification to transportation applications. It has enjoyed free reign especially in the retail sector. However, recently radio-frequency identification (RFID) has been considered a rival technology, more superior in terms of its power to store and update information instantaneously, and non-line of sight (nLoS) ability to be read. Yet RFID is more costly and for the present barcode is still the most …


Mpeg-21 In Backpack Journalism Scenario, G. Drury, I. Burnett Oct 2005

Mpeg-21 In Backpack Journalism Scenario, G. Drury, I. Burnett

Faculty of Informatics - Papers (Archive)

The vision of MPEG-21-the multimedia framework-is to enable transparent and augmented use of multimedia resources across a wide range of networks and devices used by different communities. As the initial standardization effort for MPEG-21 reaches its conclusion, this article explores one case scenario and examines whether MPEG-21 can achieve its vision.


The Structure And Components Of E-Mall Business Models, Renae Cooper, Katina Michael Oct 2005

The Structure And Components Of E-Mall Business Models, Renae Cooper, Katina Michael

Faculty of Informatics - Papers (Archive)

This paper is concerned with e-mall business models. The investigation defines what constitutes an e-mall, the different types of implementations, and surveys a number of established e-malls. The study looks at e-malls through the eyes of a buyer and seller and describes the different types of components available to each on e-malls including categorization, payment facilities and considerations, site linking and redirection, buyer traffic, loyalty and advertising schemes and legalities. It becomes apparent throughout the paper that e-malls use a diverse number of strategies in their implementations, and that sellers using e-malls maintain their autonomy as individual retailers. Therefore while …


The Rise And Fall Of Digital Music Distribution Services: A Cross-Case Comparison Of Mp3.Com, Napster And Kazaa, K. Alves, Katina Michael Oct 2005

The Rise And Fall Of Digital Music Distribution Services: A Cross-Case Comparison Of Mp3.Com, Napster And Kazaa, K. Alves, Katina Michael

Faculty of Informatics - Papers (Archive)

The aim of this research is to assess the role of digital music distribution services in the downturn and restructuring of the music industry. The research was bound by the systems of innovation conceptual framework and explores the dynamics between the technical, social, legal and economic dimensions with the purpose of understanding how the traditional supply chain has changed. The cases of MP3.com, Napster and Kazaa are studied for their historical significance and the sheer breadth of issues they bring to the fore. Data was collected using documentation review and interviews. The findings of the research show that the creation …


Performance Investigation On Three-Classes Of Manet Routing Protocols, Mehran Abolhasan, Tadeusz A. Wysocki, Justin Lipman Oct 2005

Performance Investigation On Three-Classes Of Manet Routing Protocols, Mehran Abolhasan, Tadeusz A. Wysocki, Justin Lipman

Faculty of Informatics - Papers (Archive)

Routing in Ad-hoc Networks has received significant attention with a number of different routing protocols proposed in recent years. These routing protocols may be classified into three main categories: proactive, reactive and hybrid. Prior work aimed at comparing the performance of routing protocols has mainly fo cused on comparing reactive and proactive protocols [6] [4] [1]. In this paper, we present a simulation study of different routing protocols from all three categories. We also explore the benefits and performance of each routing category. Further, we present a discussion of future research directions for routing in Ad-hoc Networks.


The Behavior Of Manet Routing Protocols In Realistic Environments, K. Chin Oct 2005

The Behavior Of Manet Routing Protocols In Realistic Environments, K. Chin

Faculty of Informatics - Papers (Archive)

This paper presents an analysis of MANET routing protocols’ behavior in realistic channel fading scenarios. The motivation of this study was due to our previous testbed experimentations where we found that AODV and DSDV’s performance did not match simulation results, primarily due to the use of a simple radio propagation model that did not take into account transient links caused by small-scale fading. Henceforth, we extended the ns-2 simulator with a realistic radio propagation model, that incorporated Rayleigh fading, to gain insights into the impact of transient links on AODV, DSR, and DSDV’s behaviour. Our simulation studies explain each protocol’s …


On The Performance Of Turbo Codes With Convolutional Interleavers, Sina Vafi, Tadeusz A. Wysocki Oct 2005

On The Performance Of Turbo Codes With Convolutional Interleavers, Sina Vafi, Tadeusz A. Wysocki

Faculty of Informatics - Papers (Archive)

In this paper, some issues governing the block-wise performance of convolutional interleavers used in turbo codes are presented. Two different constructions of convolutional interleaver differing by the position of stuff bits in the interleaved data block are considered here. The performance assessment is based on the contribution of each weight to the overall code performance. For the given turbo code and each utilized interleaver, weight contribution is computed to finalize the code behavior in different signal to noise ratios. Simulations have been performed to verify the conducted analysis.