Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Faculty of Informatics - Papers (Archive)

Discipline
Keyword
Publication Year

Articles 421 - 450 of 2013

Full-Text Articles in Physical Sciences and Mathematics

Optical Feedback Self-Mixing Interferometry With A Large Feedback Factor C: Behavior Studies, Yanguang Yu, Jiangtao Xi, Joe F. Chicharo, Thierry Bosch Jan 2009

Optical Feedback Self-Mixing Interferometry With A Large Feedback Factor C: Behavior Studies, Yanguang Yu, Jiangtao Xi, Joe F. Chicharo, Thierry Bosch

Faculty of Informatics - Papers (Archive)

This paper studies the behavior of optical feedback self-mixing interferometric (OFSMI) systems, where the semiconductor lasers operate at a single mode (perturbed external cavity mode) with a large optical feedback factor C. Based on analysis of the spectral linewidth associated with all the possible lasing modes at different C values, a set of mode jumping rules are proposed following the minimum linewidth mode competition principle proposed in . According to the rules, the C factor can be classified into different regions, on which an OFSMI system will exhibit distinct phenomena. In particular, for the same amount of displacement associated …


Robust Controller Design For Vehicle Semi-Active Suspensions With Electroheologocal Dampers, Haiping Du, Nong Zhang Jan 2009

Robust Controller Design For Vehicle Semi-Active Suspensions With Electroheologocal Dampers, Haiping Du, Nong Zhang

Faculty of Informatics - Papers (Archive)

This paper presents a robust control approach for semi-active suspensions with electrorheological (ER) dampers considering system parameter uncertainties and control input constraint. By representing the suspension with parameter uncertainties in a polytopic form and applying a norm-bounded approach to handle control input constraint, the design of this controller is derived as solving a finite number of linear matrix inequalities (LMIs) with optimised H performance on ride comfort. Numerical simulations on a quarter-car suspension with an ER damper are performed to validate the effectiveness of the proposed approach. The obtained results show that the designed controller can achieve good suspension …


Using Social Networking And Collections To Enable Video Semantics Acquisition, S. J. Davis, Christian H. Ritz, I. Burnett Jan 2009

Using Social Networking And Collections To Enable Video Semantics Acquisition, S. J. Davis, Christian H. Ritz, I. Burnett

Faculty of Informatics - Papers (Archive)

Video content both professionally and user generated is now a prime driver of Internet usage and activity; Simultaneously, the Internet has seen the rise of social networking sites and activity. This paper brings together video content and social networking to solve the problem of gathering metadata which describes user interaction, usage and opinion of video content. The paper explores mechanisms by which implied and explicit semantics can be garnered from users interacting with media within social networks. This leads to the gathering of individual user interaction metadata which is then aggregated to form semantic metadata for a given video. The …


Improving Software Testing Cost-Effectiveness Through Dynamic Partitioning, Zhiquan Zhou, Arnaldo Sinaga, Lei Zhao, Willy Susilo, Kai-Yuan Cai Jan 2009

Improving Software Testing Cost-Effectiveness Through Dynamic Partitioning, Zhiquan Zhou, Arnaldo Sinaga, Lei Zhao, Willy Susilo, Kai-Yuan Cai

Faculty of Informatics - Papers (Archive)

We present a dynamic partitioning strategy that selects test cases using online feedback information. The presented strategy differs from conventional approaches. Firstly, the partitioning is carried out online rather than off-line. Secondly, the partitioning is not based on program code or specifications; instead, it is simply based on the fail or pass information of previously executed test cases and, hence, can be implemented in the absence of the source code or specification of the program under test. The cost-effectiveness of the proposed strategy has been empirically investigated with three programs, namely SPACE, SED, and GREP. The results show that the …


Revisiting The Question Of Social Capital In Public Policy: Exploring New Directions For Community Informatics Research, William Tibben Jan 2009

Revisiting The Question Of Social Capital In Public Policy: Exploring New Directions For Community Informatics Research, William Tibben

Faculty of Informatics - Papers (Archive)

The paper sets out to analyse the concept of social capital and its utility for Community Informatics (CI) research and practice in public policy. The paper begins by noting that the concept seems to have lost some “currency” in contemporary public policy debates. The rise and fall and social capital as a public policy concept is traced through published government reports in Australia. It then moves onto critical economic discourse to indicate a number of barriers to its adoption within public policy within Australia at the time. The paper then considers whether such criticisms are addressed from a CI perspective …


A Fringe Period Unwrapping Technique For Digital Fringe Profilometry Based On Spatial Shift Estimation, Pu Cao, Jiangtao Xi, Joe F. Chicharo, Yanguang Yu Jan 2009

A Fringe Period Unwrapping Technique For Digital Fringe Profilometry Based On Spatial Shift Estimation, Pu Cao, Jiangtao Xi, Joe F. Chicharo, Yanguang Yu

Faculty of Informatics - Papers (Archive)

In this paper we present a review of the phase unwrapping problem in Fringe Pattern Profilometry (FPP), based on which we study the spatial shift wrapping problem in spatial shift estimation (SEE) based FPP. An approach for carrying out the spatial shift unwrapping is proposed with its performance confirmed by experiments.


A Survey Of Pda Use In Pbl-Medical Curricula, Rattiporn Luanrattana, Khin Than Win Jan 2009

A Survey Of Pda Use In Pbl-Medical Curricula, Rattiporn Luanrattana, Khin Than Win

Faculty of Informatics - Papers (Archive)

Objective: This study was undertaken to determine the personal digital assistant (PDA) functionalities for a problem-based learning (PBL) medical curriculum in general, the influence factors of incorporating PDAs, and the attitudes of medical educators, medical professions and educational technology specialists regarding the use of PDAs in such PBL-based medical curricula. Methods: Web-based survey was designed and conducted with medical faculty, medical professions and medical education technology specialists. Results: Four major PDA functionalities were identified, these being: clinical-log, reference, communication, and personal information management (PIM). Two major aspects to incorporating PDAs into PBL-medical curricula were determined from survey. Conclusion: There is …


Mathematical Modelling For Nanotube Bundle Oscillators, Barry Cox, Ngamta Thamwattana, James M. Hill Jan 2009

Mathematical Modelling For Nanotube Bundle Oscillators, Barry Cox, Ngamta Thamwattana, James M. Hill

Faculty of Informatics - Papers (Archive)

Fullerenes C60 and carbon nanotubes are of considerable interest to researchers from many scientific areas due to their unique electronic and mechanical properties. One application of these carbon nanostructures that has recently attracted much attention is the creation of an oscillator that operates in the gigahertz range frequency. A number of studies have found that the sliding of the inner-shell inside the outer-shell of a multi-walled carbon nanotube can generate gigahertz oscillatory frequencies. In this presentation, we investigate the mechanics of a gigahertz oscillator comprising a carbon nanotube oscillating within the centre of a uniform concentric ring or bundle of …


An E-Learning System Architecture Based On Web Services And Intelligent Agents, Xu Wei, Jun Yan Jan 2009

An E-Learning System Architecture Based On Web Services And Intelligent Agents, Xu Wei, Jun Yan

Faculty of Informatics - Papers (Archive)

E-learning has evolved dramatically in the past decades. With the emergence of more and more advanced technologies such as Web services, development of light weight, flexible, and intelligent E-learning systems becomes a reality. This paper proposes a novel architecture for E-learning systems based on Web services and intelligent agents. This architecture provides a flexible integration model in which all the learning components and applications are loosely connected and can be distributed on the Internet. In addition, through the use of agents, learning content can be intelligently customized to fit the context and the special learning needs of particular users.


Modulation Analysis Of Boundary Induced Motion Of Optical Solitary Waves In A Nematic Liquid Crystal, Alessandro Alberucci, Gaetano Assanto, Daniel Buccoliero, Anton Desyatnikov, Timothy R. Marchant, Noel Smyth Jan 2009

Modulation Analysis Of Boundary Induced Motion Of Optical Solitary Waves In A Nematic Liquid Crystal, Alessandro Alberucci, Gaetano Assanto, Daniel Buccoliero, Anton Desyatnikov, Timothy R. Marchant, Noel Smyth

Faculty of Informatics - Papers (Archive)

No abstract provided.


Learner Profile Design For Personalized E-Learning Systems, Xu Wei, Jun Yan Jan 2009

Learner Profile Design For Personalized E-Learning Systems, Xu Wei, Jun Yan

Faculty of Informatics - Papers (Archive)

E-learning, as an efficient education method, has been developed rapidly. Personalization in e-learning has also drawn more and more attention. Based on our agent-based e-learning system architecture, this paper proposes a learner profile design model to facilitate the development of personalized e-learning systems. The model extends the IEEE PAPI specification and focuses on critical personal information that facilitates intelligent learning objects discovery and assembling.


Multipurpose Weighting For Small Area Estimation, Hukum Chandra, Ray Chambers Jan 2009

Multipurpose Weighting For Small Area Estimation, Hukum Chandra, Ray Chambers

Faculty of Informatics - Papers (Archive)

Sample surveys are generally multivariate, in the sense that they collect data on more than one response variable. In theory, each variable can then be assigned an optimal weight for estimation purposes. However, it is a distinct practical advantage to have a single weight for all variables collected in the survey. This article describes how such multipurpose sample weights can be constructed when small area estimates of the survey variables are required. The approach is based on the model-based direct (MBD) method of small area estimation described in Chandra and Chambers (2005). Empirical results reported in this article show that …


Design And Experimental Investigation Of Demand Dependent Active Suspension For Vehicle Rollover Control, Lifu Wang, Nong Zhang, Haiping Du Jan 2009

Design And Experimental Investigation Of Demand Dependent Active Suspension For Vehicle Rollover Control, Lifu Wang, Nong Zhang, Haiping Du

Faculty of Informatics - Papers (Archive)

This paper presents a novel design for demand dependent active suspension (DDAS) focusing on vehicle rollover control. Active suspensions take credit for improving ride comfort and handling performance, but to use active suspension in vehicle rollover control has not been widely investigated. The proposed active suspension design consists of four double direction hydraulic actuators, hydraulically interconnected, and it can actively tilt the vehicle against its roll motion by supplying a required restoring moment, which is over the competence of passive or semi-active suspension. Based on a real vehicle fitted with DDAS, the experimental investigation validates the effectiveness of DDAS in …


Design And Estimation For Split Questionnaire Surveys, James O. Chipperfield, David G. Steel Jan 2009

Design And Estimation For Split Questionnaire Surveys, James O. Chipperfield, David G. Steel

Faculty of Informatics - Papers (Archive)

When sampling from a finite population to estimate the means or totals of K population characteristics of interest, survey designs typically impose the constraint that information on all K characteristics (or data items) is collected from all units in the sample. Relaxing this constraint means that information on a subset of the K data items may be collected from any given unit in the sample. Such a design, called a split questionnaire design (SQD), has three advantages over the typical design: increased efficiency with which design objectives can be met, by allowing the number of sample units from which information …


Provenance Of Sedimentary Rocks, Geoffrey Pritchard, Paul Moloney, Ken Russell, Bill Whiten Jan 2009

Provenance Of Sedimentary Rocks, Geoffrey Pritchard, Paul Moloney, Ken Russell, Bill Whiten

Faculty of Informatics - Papers (Archive)

Understanding the origins, or provenance, of a sedimentary deposit is an important aspect of geology. Sedimentary rocks are derived from the erosion of other rocks and thus provide important records of the geological environment at the time they were deposited. Some minerals found in sedimentary rocks, such as zircon particles, can be dated using uranium-lead techniques to trace the age of their parent rock thus providing useful information about the geological environment. Statistical and mathematical analyses that can assist in the analysis of the distribution of ages of the zircon crystals are examined. Methods of defining a difference between the …


Learning Nonsparse Kernels By Self-Organizing Maps For Structured Data, Fabio Aiolli, Giovanni Da San Martino, Markus Hagenbuchner, Alessandro Sperduti Jan 2009

Learning Nonsparse Kernels By Self-Organizing Maps For Structured Data, Fabio Aiolli, Giovanni Da San Martino, Markus Hagenbuchner, Alessandro Sperduti

Faculty of Informatics - Papers (Archive)

The development of neural network (NN) models able to encode structured input, and the more recent definition of kernels for structures, makes it possible to directly apply machine learning approaches to generic structured data. However, the effectiveness of a kernel can depend on its sparsity with respect to a specific data set. In fact, the accuracy of a kernel method typically reduces as the kernel sparsity increases. The sparsity problem is particularly common in structured domains involving discrete variables which may take on many different values. In this paper, we explore this issue on two well-known kernels for trees, and …


Content Based Image Retrieval Using Unclean Positive Examples, Jun Zhang, Lei Ye Jan 2009

Content Based Image Retrieval Using Unclean Positive Examples, Jun Zhang, Lei Ye

Faculty of Informatics - Papers (Archive)

Conventional content-based image retrieval (CBIR) schemes employing relevance feedback may suffer from some problems in the practical applications. First, most ordinary users would like to complete their search in a single interaction especially on the Web. Second, it is time consuming and difficult to label a lot of negative examples with sufficient variety. Third, ordinary users may introduce some noisy examples into the query. This correspondence explores solutions to a new issue that image retrieval using unclean positive examples. In the proposed scheme, multiple feature distances are combined to obtain image similarity using classification technology. To handle the noisy positive …


Publicly Verifiable Privacy-Preserving Group Decryption, Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu Jan 2009

Publicly Verifiable Privacy-Preserving Group Decryption, Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu

Faculty of Informatics - Papers (Archive)

No abstract provided.


Key Predistribution Schemes Using Block Designs In Wireless Sensor Networks, Sushmita Ruj, J. Seberry, Bimal Roy Jan 2009

Key Predistribution Schemes Using Block Designs In Wireless Sensor Networks, Sushmita Ruj, J. Seberry, Bimal Roy

Faculty of Informatics - Papers (Archive)

We present a deterministic key predistribution scheme in wireless sensor networks (WSN) using combinatorial designs. The design finds application where a large number sensor nodes are to be deployed. This scheme has the advantage that each sensor node contains very few keys, however every pair of sensor nodes within communication range can directly communicate with each other. We calculate the resiliency of the network with respect to two parameters of resiliency. Our scheme is resilient to selective node capture attack and node fabrication attack.


Watermarking Protocol For Protecting User's Right In Content Based Image Retrieval, Jun Zhang, Lei Ye Jan 2009

Watermarking Protocol For Protecting User's Right In Content Based Image Retrieval, Jun Zhang, Lei Ye

Faculty of Informatics - Papers (Archive)

Content based image retrieval (CBIR) is a technique to search for images relevant to the user's query from an image collection. In last decade, most attention has been paid to improve the retrieval performance. However, there is no significant effort to investigate the security concerning in CBIR. Under the query by example (QBE) paradigm, the user supplies an image as a query and the system returns a set of retrieved results. If the query image includes user's private information, an untrusted server provider of CBIR may distribute it illegally, which leads to the user's right problem. In this paper, we …


On Optimising Route Discovery In Absence Of Previous Route Information In Manets, Huda Mubarak Al Amri, Mehran Abolhasan, Tadeusz A. Wysocki Jan 2009

On Optimising Route Discovery In Absence Of Previous Route Information In Manets, Huda Mubarak Al Amri, Mehran Abolhasan, Tadeusz A. Wysocki

Faculty of Informatics - Papers (Archive)

This paper present a new routing protocol for Ad hoc networks, called On-demand Tree-based Routing Protocol (OTRP). This protocol combines the idea of hop-by-hop routing such as AODV with an efficient route discovery algorithm called Tree-based Optimized Flooding (TOF) to improve scalability of Ad hoc networks when there is no previous knowledge about the destination. To achieve this in OTRP, route discovery overheads are minimized by selectively flooding the network through a limited set of nodes, referred to as branching-nodes. The theoretical analysis and simulation results showed that OTRP outperforms AODV, DYMO, and OLSR and it reduces overheads as number …


Image Retrieval Using Noisy Query, Jun Zhang, Lei Ye Jan 2009

Image Retrieval Using Noisy Query, Jun Zhang, Lei Ye

Faculty of Informatics - Papers (Archive)

In conventional content based image retrieval (CBIR) employing relevance feedback, one implicit assumption is that both pure positive and negative examples are available. However it is not always true in the practical applications of CBIR. In this paper, we address a new problem of image retrieval using several unclean positive examples, named noisy query, in which some mislabeled images or weak relevant images present. The proposed image retrieval scheme measures the image similarity by combining multiple feature distances. Incorporating data cleaning and noise tolerant classifier, a two-step strategy is proposed to handle noisy positive examples. Experiments carried out on a …


Selected Rns Bases For Modular Multiplication, Jean-Claude Bajard, Marcello Kaihara, Thomas Plantard Jan 2009

Selected Rns Bases For Modular Multiplication, Jean-Claude Bajard, Marcello Kaihara, Thomas Plantard

Faculty of Informatics - Papers (Archive)

The selection of the elements of the bases in an RNS modular multiplication method is crucial and has a great impact in the overall performance.This work proposes specific sets of optimal RNS moduli with elements of Hamming weight three whose inverses used in the MRS reconstruction have very small Hamming weight. This property is exploited in RNS bases conversions, to completely remove and replace the products by few additions/subtractions and shifts, reducing the time complexity of modular multiplication.These bases are specially crafted to computation with operands of sizes 256 or more and are suitable for cryptographic applications such as the …


A Concrete Certificateless Signature Scheme Without Pairings, Aijun Ge, Shaozhen Chen, Xinyi Huang Jan 2009

A Concrete Certificateless Signature Scheme Without Pairings, Aijun Ge, Shaozhen Chen, Xinyi Huang

Faculty of Informatics - Papers (Archive)

Certificateless public key cryptography was introduced to avoid the inherent key escrow problem in identity-based cryptography, and eliminate the use of certificates in traditional PKI. Most cryptographic schemes in certificateless cryptography are built from bilinear mappings on elliptic curves which need costly operations. Despite the investigation of certificateless public key encryption without pairings, certificateless signature without pairings received much less attention than what it deserves. In this paper, we present a concrete pairing-free certificateless signature scheme for the first time. Our scheme is more computationally efficient than others built from pairings. The new scheme is provably secure in the random …


Image Retrieval Based On Bag Of Images, Jun Zhang, Lei Ye Jan 2009

Image Retrieval Based On Bag Of Images, Jun Zhang, Lei Ye

Faculty of Informatics - Papers (Archive)

Conventional relevance feedback schemes may not be suitable to all practical applications of content-based image retrieval (CBIR), since most ordinary users would like to complete their search in a single interaction, especially on the web search. In this paper, we explore a new approach to improve the retrieval performance based on a new concept, bag of images, rather than relevance feedback. We consider that image collection comprises of image bags instead of independent individual images. Each image bag includes some relevant images with the same perceptual meaning. A theoretical case study demonstrates that image retrieval can benefit from the new …


A Five-Round Algebraic Property Of Aes And Its Application To The Alpha-Mac, Jianyong Huang, Jennifer Seberry, Willy Susilo Jan 2009

A Five-Round Algebraic Property Of Aes And Its Application To The Alpha-Mac, Jianyong Huang, Jennifer Seberry, Willy Susilo

Faculty of Informatics - Papers (Archive)

We present a five-round algebraic property of the advanced encryption standard (AES), and we show that this algebraic property can be used to analyse the internal structure of ALPHA-MAC whose underlying block cipher is AES. In the proposed property, we modify 20 bytes from five intermediate values at some fixed locations in five consecutive rounds, and we show that after five rounds of operations, such modifications do not change the intermediate result and finally, still produce the same ciphertext. By employing the proposed five-round algebraic property of AES, we provide a method to find second preimages of the ALPHA-MAC based …


A Generic Approach To Haptic Modeling Of Textile Artifacts, Hooman Shidanshidi, Fazel Naghdy, Golshah Naghdy, Diana Wood Conroy Jan 2009

A Generic Approach To Haptic Modeling Of Textile Artifacts, Hooman Shidanshidi, Fazel Naghdy, Golshah Naghdy, Diana Wood Conroy

Faculty of Informatics - Papers (Archive)

Haptic Modeling of textile has attracted significant interest over the last decade. In spite of extensive research, no generic system has been proposed. The previous work mainly assumes that textile has a 2D planar structure. They also require time-consuming measurement of textile properties in construction of the mechanical model. A novel approach for haptic modeling of textile is proposed to overcome the existing shortcomings. The method is generic, assumes a 3D structure for the textile, and deploys computational intelligence to estimate the mechanical properties of textile. The approach is designed primarily for display of textile artifacts in museums. The haptic …


Ontology Matching Techniques: A 3-Tier Classification Framework, Nelson K. Y. Leung, Seung Hwan Kang, Sim Kim Lau, Joshua Fan Jan 2009

Ontology Matching Techniques: A 3-Tier Classification Framework, Nelson K. Y. Leung, Seung Hwan Kang, Sim Kim Lau, Joshua Fan

Faculty of Informatics - Papers (Archive)

No abstract provided.


An Ontology-Based Collaborative Knowledge Management Network To Enhance The Reusability Of Inter-Organizational Knowledge, Nelson K. Y. Leung, Sim Kim Lau, Joshua Fan Jan 2009

An Ontology-Based Collaborative Knowledge Management Network To Enhance The Reusability Of Inter-Organizational Knowledge, Nelson K. Y. Leung, Sim Kim Lau, Joshua Fan

Faculty of Informatics - Papers (Archive)

No abstract provided.


Clustering, Classification And Explanatory Rules From Harmonic Monitoring Data, Ali Asheibi, David A. Stirling, Danny Sutanto, D A. Robinson Jan 2009

Clustering, Classification And Explanatory Rules From Harmonic Monitoring Data, Ali Asheibi, David A. Stirling, Danny Sutanto, D A. Robinson

Faculty of Informatics - Papers (Archive)

A method based on the successful AutoClass (Cheeseman & Stutz, 1996) and the Snob research programs (Wallace & Dowe, 1994); (Baxter & Wallace, 1996) has been chosen for our research work on harmonic classification. The method utilizes mixture models (McLachlan, 1992) as a representation of the formulated clusters. This research is principally based on the formation of such mixture models (typically based on Gaussian distributions) through a Minimum Message Length (MML) encoding scheme (Wallace & Boulton, 1968). During the formation of such mixture models the various derivative tools (algorithms) allow for the automated selection of the number of clusters and …