Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Faculty of Informatics - Papers (Archive)

Discipline
Keyword
Publication Year

Articles 241 - 270 of 2013

Full-Text Articles in Physical Sciences and Mathematics

An Efficient Resource Allocation Algorithm For Ofdma Cooperative Relay Networks With Fairness And Qos Guaranteed, Asem A. Salah, Borhanunddin Mohd. Ali, Ahmad Saqer, Nidhal Odeh Jan 2010

An Efficient Resource Allocation Algorithm For Ofdma Cooperative Relay Networks With Fairness And Qos Guaranteed, Asem A. Salah, Borhanunddin Mohd. Ali, Ahmad Saqer, Nidhal Odeh

Faculty of Informatics - Papers (Archive)

This paper proposes a new resource allocation algorithm for uplink OFDMA-based cooperative relay networks assuming multiple source nodes, multiple relay nodes and a single destination. The aim is to maximize the total sum of the sources data rates while guaranteeing fairness among them with different QoS requirements. Assuming perfect channel state information (CSI) at the resource allocation controller. The optimization problem is formulated such that each source is assigned a weight factor based on its QoS requirements, then the ones with high weights are given more priority to select their resources (relay stations and subcarriers) first. Once the required QoS …


Harmonic Allocation Following Iec Guidelines Using The Voltage Droop Concept, V. J. Gosbell, Robert A. Barr Jan 2010

Harmonic Allocation Following Iec Guidelines Using The Voltage Droop Concept, V. J. Gosbell, Robert A. Barr

Faculty of Informatics - Papers (Archive)

Present IEC guidelines are difficult to apply to realistic cases because of the data load, the number of assumptions required and the computational complexity. A new approach is given based on the concept of voltage droop, to be detailed in a companion paper. The benefits of the approach are a simple calculation with minimal data and no required assumptions. It applies to radial or meshed distribution systems where feeders are sufficiently short that line capacitance can be ignored. The approach can be applied at the installation (MV or LV) and the equipment level and can be used to give reference …


Lifetime Analysis Of Aluminum Electrolytic Capacitor Subject To Voltage Fluctuations, Kun Zhao, Philip Ciufo, Sarath Perera Jan 2010

Lifetime Analysis Of Aluminum Electrolytic Capacitor Subject To Voltage Fluctuations, Kun Zhao, Philip Ciufo, Sarath Perera

Faculty of Informatics - Papers (Archive)

This paper evaluates the changes in the ripple current for an electrolytic capacitor used in the dc-side of a single-phase rectifier circuit when subjected to input voltage fluctuations. The study has been undertaken in order to analyse the potential impact on capacitor lifetime. The key effect is that the capacitor ripple current, as a consequence of voltage fluctuations, increases dramatically and this phenomenon keeps deteriorating as the frequency of the voltage fluctuations increases. Simulations and experimental work confirm this phenomenon. Since the power loss and temperature rise are dependent on the capacitor equivalent series resistance (ESR) and ripple current components, …


Classification Of Power Quality Disturbances Using The Iterative Hilbert Huang Transform, C. F. Drummond, Darmawan Sutanto Jan 2010

Classification Of Power Quality Disturbances Using The Iterative Hilbert Huang Transform, C. F. Drummond, Darmawan Sutanto

Faculty of Informatics - Papers (Archive)

The Hilbert Huang Transform (HHT) is a powerful tool for Power Quality (PQ) classifications. One of the main advantages of the HHT is its ability to analyse non-stationary complex waveforms with very good time resolution. However, like other waveform classification techniques, it has difficulty in resolving the instant of sudden changes in the waveform. It has also difficulty with signals that have frequency components close together. This paper summarises the fundamentals of the HHT technique and its application to power quality classifications including its advantages and disadvantages. Two novel techniques to improve the performance of the HHT technique in analysing …


Clustering Of Harmonic Monitoring Data Using Data Mining, Danny Sutanto, A. Asheibi, David A. Stirling Jan 2010

Clustering Of Harmonic Monitoring Data Using Data Mining, Danny Sutanto, A. Asheibi, David A. Stirling

Faculty of Informatics - Papers (Archive)

A comprehensive harmonic monitoring program has been designed and implemented on a typical medium-voltage distribution system in Australia. The monitoring program involved measurements of the three-phase harmonic currents and voltages from the residential, commercial, and industrial load sectors. Data over a three year period have been downloaded and available for analysis. The large amount of acquired data makes it difficult to identify operational events that significantly impact the harmonics generated on the system. More sophisticated analysis methods are required to automatically determine which part of the measurement data are of importance. Based on this information, a closer inspection of smaller …


Fast Quality-Guided Flood-Fill Phase Unwrapping Algorithm For Three-Dimensional Fringe Pattern Profilometry, Ke Chen, Jiangtao Xi, Yanguang Yu, Joe F. Chicharo Jan 2010

Fast Quality-Guided Flood-Fill Phase Unwrapping Algorithm For Three-Dimensional Fringe Pattern Profilometry, Ke Chen, Jiangtao Xi, Yanguang Yu, Joe F. Chicharo

Faculty of Informatics - Papers (Archive)

A fast quality-guided flood-fill phase unwrapping algorithm is proposed for real-time 3D Fringe Pattern Profilometry (FPP) system. The proposed approach consists of three steps. First, based on the phase maps acquired by phase shift profilometry (PSP) techniques, a quality map is generated according to the phase variance adjacent pixels on the wrapped phase map. According to the quality map, the phase map is divided into several parts which are categorised as either rapid phase changing areas or smooth phase changing areas. Then quality-guided flood-fill phase unwrapping algorithm is applied to rapid phase changing areas and non-guided path-following algorithm is used …


Implementing Patient Accessible Health Information Site For Diabetes Management, Khin Than Win Jan 2010

Implementing Patient Accessible Health Information Site For Diabetes Management, Khin Than Win

Faculty of Informatics - Papers (Archive)

The focus of health care has changed from health care provider paternalistic approach to consumer focused approach. The aim of this study is to implement an online health information site for patient education of Diabetes. To achieve this, design criteria for effective patient education were considered and diabetes patients information site was implemented which includes patient information access, diabetes challenge, administrator module and the scheduler module. Implementing patients access for their health information with providing patients tailored health information according to their needs to enhance patient education is important. This project contributes vastly in consumer health informatics as it develops …


Virtual Museums And Web-Based Digital Ecosystems, Peter Eklund, Peter Goodall, Timothy Wray Jan 2010

Virtual Museums And Web-Based Digital Ecosystems, Peter Eklund, Peter Goodall, Timothy Wray

Faculty of Informatics - Papers (Archive)

The Virtual Museum of the Pacific was developed by the authors and launched by the Australian Museum in November 2009. A digital ecosystem implemented as Web 2.0 application, the VMP is an experimental platform with information and knowledge acquisition for the Australian Museum’s Pacific collection. Importantly, the VMP facilitates a number of social media interfaces that enable content to be added and tagged, the control vocabulary to be extended, user perspectives to be defined and narratives added via wiki. It is therefore extensible. This paper concentrates on technical issues involving several search methods: attribute search based on a control vocabulary, …


A Knowledge-Based Risk Advisor Model For Chronic Complications Of Diabetes, Mohsen Sangi, Khin Than Win, John Fulcher Jan 2010

A Knowledge-Based Risk Advisor Model For Chronic Complications Of Diabetes, Mohsen Sangi, Khin Than Win, John Fulcher

Faculty of Informatics - Papers (Archive)

Diabetes as an unprecedented epidemic is spreading all around the world. While one in every seven health care dollars in USA is spent on diabetes, 60% of direct costs and almost 80-90% of indirect costs of that are related to diabetic complications. The ultimate aim of this study is to develop a rule-based model for advising the risk of chronic diabetic complications. An extensive literature review has been carried out to gather actual knowledge about diabetic complications and their related predisposing factors. NViv08 is used to organize and categorize the acquired knowledge. A rule-based decision support model is constructed from …


A Control Approach For Voltage And Frequency Regulation Of A Wind-Diesel-Battery Based Hybrid Remote Area Power Supply System, Nishad Mendis, Kashem Muttaqi, Saad Sayeef, Sarath Perera Jan 2010

A Control Approach For Voltage And Frequency Regulation Of A Wind-Diesel-Battery Based Hybrid Remote Area Power Supply System, Nishad Mendis, Kashem Muttaqi, Saad Sayeef, Sarath Perera

Faculty of Informatics - Papers (Archive)

A novel Remote Area Power Supply (RAPS) system consisting of a Doubly Fed Induction Generator (DFIG) wind turbine generator, synchronous diesel generator system, battery storage system and a dump load is considered in this paper. A control coordination strategy is formulated with a view to regulate the system voltage and frequency within acceptable limits while extracting the maximum power available from the wind. The battery storage unit is used to provide a smooth state transition from Wind-Only (WO) to Wind-Diesel (WD) mode while enabling the DFIG to operate in its maximum power point tracking mode of operation. The dump load …


Applying The Modified Delphi Method To Identify The Taiwanese Electronic Health Record Systems Evaluation Framework And Instrument, Yung-Yu Su, Khin Than Win, Tieh-Chi Chung Jan 2010

Applying The Modified Delphi Method To Identify The Taiwanese Electronic Health Record Systems Evaluation Framework And Instrument, Yung-Yu Su, Khin Than Win, Tieh-Chi Chung

Faculty of Informatics - Papers (Archive)

The aim of this research is to design an appropriate conceptual evaluation framework with a draft instrument for validating the structure of the Taiwanese EHR systems evaluation framework. According to the knowledge of "Triangulation research method" and both quantitative and qualitative approaches, the modified Delphi method was applied to refine the proposed instrument into practicable for real medical environment based on a quantitative approach. In addition, by calculating content validity index for items (I-CVI) and content validity index for scales (S-CVI), it also indicates the degree of consensus between and within questions in the proposed instrument. In short, an appropriate …


Autonomous Operation Of Wind-Battery Hybrid Power System With Maximum Power Extraction Capability, Nishad Mendis, Kashem Muttaqi, Saad Sayeef, Sarath Perera Jan 2010

Autonomous Operation Of Wind-Battery Hybrid Power System With Maximum Power Extraction Capability, Nishad Mendis, Kashem Muttaqi, Saad Sayeef, Sarath Perera

Faculty of Informatics - Papers (Archive)

The hybrid operation of a remote area power system consisting of a Doubly Fed Induction Generator (DFIG) based wind turbine, a battery storage unit and a dummy load is investigated in this paper. The battery storage unit operates as a source or load, depending on the wind power output and loading conditions of the system. The battery storage is connected to the AC side of the wind energy system through a three phase inverter to supply both active and reactive power. A dummy load is also incorporated into the AC side of the system. The design criteria of the controllers …


Captcha Challenges For Massively Multiplayer Online Games: Mini-Game Captchas, Yang-Wai Chow, Willy Susilo, Hua-Yu Zhou Jan 2010

Captcha Challenges For Massively Multiplayer Online Games: Mini-Game Captchas, Yang-Wai Chow, Willy Susilo, Hua-Yu Zhou

Faculty of Informatics - Papers (Archive)

Botting or automated programs in Massively Multiplayer Online Games (MMOGs) has long been a problem in these networked virtual environments. The use of bots gives cheating players an unfair advantage over other honest players. Using bots, players can potentially amass a huge amount of game wealth, resources, experience points, etc. without much effort, as bot programs can be run continuously for countless hours and will never get tired. Honest players on the other hand have to spend much more time and effort in order to gather an equal amount of game resources. This destroys the fun for legitimate players, ruins …


Phase Error Correction Based On Inverse Function Shift Estimation In Phase Shifting Profilometry Using A Digital Video Projector, Yang Liu, Jiangtao Xi, Yanguang Yu, Joe F. Chicharo Jan 2010

Phase Error Correction Based On Inverse Function Shift Estimation In Phase Shifting Profilometry Using A Digital Video Projector, Yang Liu, Jiangtao Xi, Yanguang Yu, Joe F. Chicharo

Faculty of Informatics - Papers (Archive)

Fringe Pattern Profilometry (FPP) is 3D surface measuring technique based on triangulation. The utilization of digital projection in FPP system introduces significant phase distortion for Phase Shifting Profilometry (PSP), because of the nonlinear response of digital video projectors, which is referred as gamma distortion. Considering that the distorted phase has a stable function for a reference plane, this paper proposes an approach based on inverse function shift estimation (IFSE) to detect the spatial shift of the distorted phase caused by object height. This spatial shift is independent of projector’s gamma distortion and accurate surface can be reconstructed based it. The …


Fair Data Flows Scheduling Schema For Multihop Wireless Ad Hoc Networks, Hamidreza Salarian, Pejman Khadivi Jan 2010

Fair Data Flows Scheduling Schema For Multihop Wireless Ad Hoc Networks, Hamidreza Salarian, Pejman Khadivi

Faculty of Informatics - Papers (Archive)

One of the most critical problems in multihop wireless networks is the fair allocation of bandwidth among different nodes. Although there are significant researches on the fairness issues in single-hop wireless networks, research on multihop fairness rarely found in the literature. A user in multi-hop network, besides the contention with other nodes to obtain the channel in physical layer, must find a solution for the inevitable contention between its own and the relayed traffic in the network layer. Accordingly, a suitable mechanism is needed to schedule data flows in network layer fairly. In this paper, a new algorithm is proposed …


A Novel Approach For Interference Suppression In Multi-Subband Convolutional Coded Ofdm System, Ke Chen, Xiaojing Huang, Jiangtao Xi Jan 2010

A Novel Approach For Interference Suppression In Multi-Subband Convolutional Coded Ofdm System, Ke Chen, Xiaojing Huang, Jiangtao Xi

Faculty of Informatics - Papers (Archive)

This paper proposes a novel approach of suppressing narrowband interference from a multi - subband convolutional coded orthogonal frequency division multiplexing (OFDM) system. In this system, the convolutional coded data symbols using different coding generators are transmitted in different subbands. By identifying and discarding the interfered subband(s), the interference level can be greatly reduced and the system performance of the OFDM system can be improved. The interference thresholds for discarding the interfered subband(s) are determined through simulations over additive white Gaussian noise (AWGN) channel for demonstration purpose. The principle can also be applied to multipath fading channel.


The European Court Of Human Rights Ruling Against The Policy Of Keeping Fingerprints And Dna Samples Of Criminal Suspects In Britain, Wales And Northern Ireland: The Case Of S. And Marper V United Kingdom, Katina Michael Jan 2010

The European Court Of Human Rights Ruling Against The Policy Of Keeping Fingerprints And Dna Samples Of Criminal Suspects In Britain, Wales And Northern Ireland: The Case Of S. And Marper V United Kingdom, Katina Michael

Faculty of Informatics - Papers (Archive)

In England, Wales and Northern Island, the Police and Criminal Evidence Act 1984 (the PACE) contained powers for the taking of fingerprints, and samples in the form of deoxyribonucleic acid (DNA). In 2001, Section 64(1A) of the PACE was substituted with Section 82 of the Criminal Justice and Police Act. The change to legislation meant that a suspect of a crime would have their fingerprints and samples permanently stored on the police national computer (PNC) even after having been acquitted. This paper critically analyses the circumstances of the landmark case of S. AND MARPER V. THE UNITED KINGDOM in two …


Eliminating Noises Contained In Sensing Signals From A Self-Mixing Laser Diode, Yanguang Yu, Tiemin Mei, Jiangtao Xi, Joe F. Chicharo, Huiying Ye, Zhao Wang Jan 2010

Eliminating Noises Contained In Sensing Signals From A Self-Mixing Laser Diode, Yanguang Yu, Tiemin Mei, Jiangtao Xi, Joe F. Chicharo, Huiying Ye, Zhao Wang

Faculty of Informatics - Papers (Archive)

The paper studied the noise elimination methods for the signals observed from a self-mixing-laser diode (SM-LD) based sensing system. The core part of the sensing system consists of a LD, a lens and an external vibrating target. The proposed noise elimination methods are applied on both the simulated and experimental sensing signals. The results presented in the paper show the noise contained in the sensing signals can be effectively eliminated. As a consequence, the vibration trace of the target can be reconstructed with high accuracy using this sensing system.


A Framework For Privacy Policy Management In Service Aggregation, Peishun Wang, L. Dong, Yi Mu, Willy Susilo, Jun Yan Jan 2010

A Framework For Privacy Policy Management In Service Aggregation, Peishun Wang, L. Dong, Yi Mu, Willy Susilo, Jun Yan

Faculty of Informatics - Papers (Archive)

With a rapid growth of the Internet, exploring cost-effective and time-efficient methods for creating Internet services has become critical. As an emerging technology, service aggregation has been regarded as a promising candidate. However, it also raises serious issues on privacy management, as a service is usually provided by multiple providers that are usually transparent to its users. We observe that these issues have not been formally studied in the literature. In this paper, we propose a formal model for the privacy management in service aggregation and present a negotiation strategy on different privacy policies between two organizations.


Escrowed Deniable Identification Schemes, Pairat Thorncharoensri, Qiong Huang, Willy Susilo, Man Ho Allen Au, Yi Mu, Duncan Wong Jan 2010

Escrowed Deniable Identification Schemes, Pairat Thorncharoensri, Qiong Huang, Willy Susilo, Man Ho Allen Au, Yi Mu, Duncan Wong

Faculty of Informatics - Papers (Archive)

Generally, the goal of identification schemes is to provide security assurance against impersonation attacks. Identification schemes based on zero knowledge protocols have more advantages, for example, deniability, which enables the prover to deny an identification proof so that the verifier couldn’t persuade others that it is indeed the prover who identified itself to him. This kind of identifications is called ‘deniable identification’. However, in some applications we require the existence of a (trusted) party being able to find out an evidence that a party did identify itself to a verifier is required, in order to prevent parties from misbehavior. So …


Efficient Processing Of Databases With Inconsistent Information, Janusz Getta Jan 2010

Efficient Processing Of Databases With Inconsistent Information, Janusz Getta

Faculty of Informatics - Papers (Archive)

Abstract—Representation and efficient processing of inconsistent information is a common problem for centralized and distributed database systems. While detection of inconsistencies through offline verification of the consistency constraints is a relatively easy task, a complete elimination of inconsistent information from a database as almost impossible. Therefore, database systems should enable the features that allow for the representation and processing of inconsistent information by the user applications. Implementation of such features require the conceptual extensions to both data model and data manipulation language used for the implementation of a database system. This work presents a formal model for the representation and …


Medical Image Retrieval With Query-Dependent Feature Fusion Based On One-Class Svm, Yonggang Huang, Jun Zhang, Yongwang Zhao, Dianfu Ma Jan 2010

Medical Image Retrieval With Query-Dependent Feature Fusion Based On One-Class Svm, Yonggang Huang, Jun Zhang, Yongwang Zhao, Dianfu Ma

Faculty of Informatics - Papers (Archive)

Due to the huge growth of the World Wide Web, medical images are now available in large numbers in online repositories, and there exists the need to retrieval the images through automatically extracting visual information of the medical images, which is commonly known as content-based image retrieval (CBIR). Since each feature extracted from images just characterizes certain aspect of image content, multiple features are necessarily employed to improve the retrieval performance. Meanwhile, experiments demonstrate that a special feature is not equally important for different image queries. Most of existed feature fusion methods for image retrieval only utilize query independent feature …


An Authentication Framework For Wireless Sensor Networks Using Identity-Based Signatures, Rehana Yasmin, Eike Ritter, Guilin Wang Jan 2010

An Authentication Framework For Wireless Sensor Networks Using Identity-Based Signatures, Rehana Yasmin, Eike Ritter, Guilin Wang

Faculty of Informatics - Papers (Archive)

In Wireless Sensor Networks (WSNs), authentication is a crucial security requirement to avoid attacks against secure communication, and to mitigate DoS attacks exploiting the limited resources of sensor nodes. Resource constraints of sensor nodes are hurdles in applying strong public key cryptographic based mechanisms in WSNs. To address the problem of authentication in WSNs, we propose an efficient and secure framework for authenticated broadcast/multicast by sensor nodes as well as for outside user authentication, which utilizes identity based cryptography and online/offline signature schemes. The primary goals of this framework are to enable all sensor nodes in the network, firstly, to …


Operation Of A Wind-Diesel-Battery Based Hybrid Remote Area Power Supply System, Nishad Mendis, Kashem Muttaqi, Saad Sayeef, Sarath Perera Jan 2010

Operation Of A Wind-Diesel-Battery Based Hybrid Remote Area Power Supply System, Nishad Mendis, Kashem Muttaqi, Saad Sayeef, Sarath Perera

Faculty of Informatics - Papers (Archive)

The operational behaviour of a Remote Area Power Supply (RAPS) system consisting of a Doubly Fed Induction Generator (DFIG) as the wind turbine generator, diesel generator system, battery storage, dump load and mains loads is investigated in this paper. The diesel generator operates during low wind penetration or high load demand periods. Otherwise, the DFIG and battery storage are able to satisfy the load demand of the system. The battery storage can be used as a source or load depending on the wind and loading conditions of the system. A control coordination among the system components is established with a …


Enhanced Reactive Power Support Of A Pmsg Based Wind Turbine For A Remote Area Power System, Saad Sayeef, Nishad Mendis, Kashem Muttaqi, Sarath Perera Jan 2010

Enhanced Reactive Power Support Of A Pmsg Based Wind Turbine For A Remote Area Power System, Saad Sayeef, Nishad Mendis, Kashem Muttaqi, Sarath Perera

Faculty of Informatics - Papers (Archive)

Due to the intermittent nature of wind, a wind turbine generator alone cannot supply all the active and reactive power required by the load at all times in a standalone environment. As a close relationship exists between reactive power and voltage magnitude, reactive power support is the mean used to maintain the desired voltage profile, both during normal and contingency conditions. In this paper, a synchronous condenser is integrated into the AC bus of a wind turbine generator based hybrid Remote Area Power Supply (RAPS) system where a Permanent Magnet Synchronous Generator (PMSG) is used to satisfy the active power …


On The Outage Of Multihop Parallel Relay Networks, Bappi Barua, Farzad Safaei, Mehran Abolhasan Jan 2010

On The Outage Of Multihop Parallel Relay Networks, Bappi Barua, Farzad Safaei, Mehran Abolhasan

Faculty of Informatics - Papers (Archive)

In this paper we analyze the outage probability of a cooperative multihop parallel relay network in Nakagami-m fading channels. The general closed form expression of the outage probability is derived both for integer and arbitrary Nakagami parameter m. We present numerical results on the performance of the network. It shows a careful configuration of the network size and power sharing between nodes can ensure optimal outage performance in the network.


Using In-Air Acoustic Vector Sensors For Tracking Moving Speakers, Muawiyath Shujau, Christian H. Ritz, I. Burnett Jan 2010

Using In-Air Acoustic Vector Sensors For Tracking Moving Speakers, Muawiyath Shujau, Christian H. Ritz, I. Burnett

Faculty of Informatics - Papers (Archive)

This paper investigates the use of an Acoustic Vector Sensor (AVS) for tracking a moving speaker in real time through estimation of the Direction of Arrival (DOA). This estimation is obtained using the MUltiple SIgnal Classification (MUSIC) [1] algorithm applied on a time-frame basis. The performance of the AVS is compared with a SoundField Microphone which has similar polar responses to the AVS using time-frames ranging from 20 ms to 1 s. Results show that for 20 ms frames, the AVS is capable of estimating the DOA for both mono-tone and speech signals, which are both stationary and moving, with …


Efficient Rfid Authentication Scheme For Supply Chain Applications, Fei Bi, Yi Mu Jan 2010

Efficient Rfid Authentication Scheme For Supply Chain Applications, Fei Bi, Yi Mu

Faculty of Informatics - Papers (Archive)

Radio Frequency Identification (RFID) technology has been widely used in supply chains to track and manage shipments. By tagging shipments with RFID tags, which can be remotely accessed by RFID readers, shipments can be identified and tracked in a supply chain. Security issues in RFID have been major concerns, since passive RFID tags have very weak computational power to support authentication. Sound authentication between tag and reader remains a challenging problem. In this paper, we provide a novel authentication scheme to protect tags from being tracked and identified by unauthorized readers and protect authorized readers against bogus tags. Our scheme …


Classification Cervical Cancer Using Histology Images, Rahmadwati, Golshah Naghdy, Montserrat Ros, Catherine Todd, E. Norachmawati Jan 2010

Classification Cervical Cancer Using Histology Images, Rahmadwati, Golshah Naghdy, Montserrat Ros, Catherine Todd, E. Norachmawati

Faculty of Informatics - Papers (Archive)

This papers reports on methodologies and outcome of a study aiming at developing robust tool to evaluate and classify histology images of cervical cancer. Using the histology images acquired from the pathology laboratories in an Indonesian hospital, this study aims to classify cervical biopsy images based on four well known discriminatory features a) the ratio of nuclei to cytoplasm b) diameter of nuclei c) shape factor and d) roundness of nuclei. In this study, the cervical histology images are classified into three categories: 1) normal, 2) pre cancer and 3) malignant. The final system will take as input a biopsy …


Demystifying The Number Of The Beast In The Book Of Revelation: Examples Of Ancient Cryptology And The Interpretation Of The “666” Conundrum, M G. Michael Jan 2010

Demystifying The Number Of The Beast In The Book Of Revelation: Examples Of Ancient Cryptology And The Interpretation Of The “666” Conundrum, M G. Michael

Faculty of Informatics - Papers (Archive)

As the year 2000 came and went, with the suitably forecasted fuse-box of utopian and apocalyptic responses, the question of "666" (Rev 13:18) was once more brought to our attention in different ways. Biblical scholars, for instance, focused again on the interpretation of the notorious conundrum and on the Traditionsgeschichte of Antichrist. For some of those commentators it was a reply to the outpouring of sensationalist publications fuelled by the millennial mania. This paper aims to shed some light on the background, the sources, and the interpretation of the “number of the beast”. It explores the ancient techniques for understanding …