Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Faculty of Informatics - Papers (Archive)

Discipline
Keyword
Publication Year

Articles 511 - 540 of 2013

Full-Text Articles in Physical Sciences and Mathematics

Learning Pattern Classification Tasks With Imbalanced Data Sets, Son Lam Phung, Abdesselam Bouzerdoum, Giang Hoang Nguyen Jan 2009

Learning Pattern Classification Tasks With Imbalanced Data Sets, Son Lam Phung, Abdesselam Bouzerdoum, Giang Hoang Nguyen

Faculty of Informatics - Papers (Archive)

This chapter is concerned with the class imbalance problem, which has been recognised as a crucial problem in machine learning and data mining. The problem occurs when there are significantly fewer training instances of one class compared to another class.


Reduced Training Of Convolutional Neural Networks For Pedestrian Detection, Giang Hoang Nguyen, Son Lam Phung, Abdesselam Bouzerdoum Jan 2009

Reduced Training Of Convolutional Neural Networks For Pedestrian Detection, Giang Hoang Nguyen, Son Lam Phung, Abdesselam Bouzerdoum

Faculty of Informatics - Papers (Archive)

Pedestrian detection is a vision task with many practical applications in video surveillance, road safety, autonomous driving and military. However, it is much more difficult compared to the detection of other visual objects, because of the tremendous variations in the inner region as well as the outer shape of the pedestrian pattern. In this paper, we propose a pedestrian detection approach that uses convolutional neural network (CNN) to differentiate pedestrian and non-pedestrian patterns. Among several advantages, the CNN integrates feature extraction and classification into one single, fully adaptive structure. It can extract two-dimensional features at increasing scales, and it is …


Preliminary Development Of An Inexpensive And Portable Network Monitoring Probe Using An Internet Embedded Microprocessor, Karthic Rajaram, Montse Ros, Peter James Vial Jan 2009

Preliminary Development Of An Inexpensive And Portable Network Monitoring Probe Using An Internet Embedded Microprocessor, Karthic Rajaram, Montse Ros, Peter James Vial

Faculty of Informatics - Papers (Archive)

Management of a telecommunication network involves the requirement to monitor and manage devices on local and wide area networks (for optical, wired and wireless). Devices used to perform this function are referred to as Remote Monitoring devices or network probes. This paper investigates the prototyping of a network probe which uses an embedded internet microprocessor to collect and send data to a network monitor. The device uses the TINI Internet Interface developed by Dallas Semiconductor. This device was chosen as the ethernet driver has a promiscuous mode which potentially allows the capture of all packets sent on the ethernet connection …


Mitagation Against Mai In A Space Time Spreading Software Defined Radio, Shinhan Wee, Montse Ros, Peter James Vial Jan 2009

Mitagation Against Mai In A Space Time Spreading Software Defined Radio, Shinhan Wee, Montse Ros, Peter James Vial

Faculty of Informatics - Papers (Archive)

A Software Defined Radio test bed using the Gnu Radio project was installed on Unix boxes and modified so that estimates of the channel state coefficients were taken for a Multiple Input Multiple output (MIMO) system to take advantage of space time transmission at a frqeuency of 2.4GHz. This system was modified to provide a Space Time Spreading test bed. The test bed was modified so that multiple access interference was experienced by off-setting different users data streams. The Walsh-Hadamard and Wysocki (low correlation) spreading sequences were deployed in the test bed to compare their Bit Error Rate performance. We …


The Use Of Technology To Support Student Learning, Anne L. Porter, Norhayati Baharun Jan 2009

The Use Of Technology To Support Student Learning, Anne L. Porter, Norhayati Baharun

Faculty of Informatics - Papers (Archive)

This paper presents the results of a case study investigating the use of technology i.e. video resources in teaching statistics to 40 Health Informatics post-graduate students at the University of Wollongong. The purpose of the study is to investigate if the use of such technology has some impact on student learning outcomes in terms of their understanding of topics and level of anxiety in learning the subject. The findings from the study reveal that students were concerned about their learning of the subject and they found that the use of videos as teaching and learning tools in the subject was …


A Neural Network Pruning Approach Based On Compressive Sampling, Abdesselam Bouzerdoum, Son Lam Phung, Jie Yang Jan 2009

A Neural Network Pruning Approach Based On Compressive Sampling, Abdesselam Bouzerdoum, Son Lam Phung, Jie Yang

Faculty of Informatics - Papers (Archive)

The balance between computational complexity and the architecture bottlenecks the development of Neural Networks (NNs), An architecture that is too large or too small will influence the performance to a large extent in terms of generalization and computational cost. In the past, saliency analysis has been employed to determine the most suitable structure, however, it is time-consuming and the performance is not robust. In this paper, a family of new algorithms for pruning elements (weighs and hidden neurons) in Neural Networks is presented based on Compressive Sampling (CS) theory. The proposed framework makes it possible to locate the significant elements, …


Novel Constructions Of Improved Square Complex Orthogonal Designs For Eight Transmit Antennas, Le Chung Tran, Alfred Mertins, Jennifer Seberry, Tadeusz A. Wysocki, Sarah S. Adams Jan 2009

Novel Constructions Of Improved Square Complex Orthogonal Designs For Eight Transmit Antennas, Le Chung Tran, Alfred Mertins, Jennifer Seberry, Tadeusz A. Wysocki, Sarah S. Adams

Faculty of Informatics - Papers (Archive)

Constructions of square, maximum rate complex orthogonal space–time block codes (CO STBCs) are well known, however codes constructed via the known methods include numerous zeros, which impede their practical implementation. By modifying the Williamson and Wallis-Whiteman arrays to apply to complex matrices, we propose two methods of construction of square, order-4n CO STBCs from square, order-n codes which satisfy certain properties. Applying the proposed methods, we construct square, maximum rate, order-8 CO STBCs with no zeros, such that the transmitted symbols are equally dispersed through transmit antennas. Those codes, referred to as the improved square CO STBCs, have the advantages …


Rfid Adoption Issues: Analysis Of Organizational Benefits & Risks, Samuel Fosso Wamba, Byron W. Keating, Tim Coltman, Katina Michael Jan 2009

Rfid Adoption Issues: Analysis Of Organizational Benefits & Risks, Samuel Fosso Wamba, Byron W. Keating, Tim Coltman, Katina Michael

Faculty of Informatics - Papers (Archive)

What makes companies such as Wal-Mart in the U.S., Metro Group in Germany and Tesco in the United Kingdom, so willing to adopt RFID technology? More precisely, what are those factors that matter most and least to firms when considering an investment in RFID? And how does the importance of such factors vary between adopters and non-adopters? The answers to these questions are important because they indicate where future development effort should be directed to increase the rate of RFID adoption. To begin, we conducted a large survey of 133 RFID Journal readers. The industries represented in the sample include: …


Public Service Reform Through E-Government: A Case Study Of 'E-Tax' In Japan, Akemi T. Chatfield Jan 2009

Public Service Reform Through E-Government: A Case Study Of 'E-Tax' In Japan, Akemi T. Chatfield

Faculty of Informatics - Papers (Archive)

There is a growing interest in the debate over whether or not e-government has a transformational impact on government performance, governance, and public service, as we addressed this very issue at the 2007 ECEG. However, e-government research results on the transformational impact are mixed. This may be an apt reflection of either the early stages of e-government development or the newness of e-government research field or both. Our research goal as scholars of e-government must be to penetrate appearances to ascertain whatever lessons and meanings might lie beneath. This paper is an initial attempt toward achieving this goal. The main …


Allocated Harmonic Quantities As The Basis For Source Detection, Timothy J. Browne, Sarath Perera, Victor J. Gosbell Jan 2009

Allocated Harmonic Quantities As The Basis For Source Detection, Timothy J. Browne, Sarath Perera, Victor J. Gosbell

Faculty of Informatics - Papers (Archive)

A considerable body of literature examines assessment, from measurements, of whether it is the network or a customer installation which makes the greater contribution to harmonic distortion at a point of common coupling. However, the customer contribution to harmonic distortion at a point of common coupling depends heavily upon the definition chosen for that contribution. For example, expressing contributions as currents instead of voltages or vice versa may lead to large changes in results. Further, it can be shown that the harmonic voltage at the point of common coupling cannot be expressed independently of the network conditions, meaning that the …


E-Cheating, Online Sources And Technologies: A Critical Review Of Existing Literature, Zeenath Reza Khan, Stephen D. Samuel Jan 2009

E-Cheating, Online Sources And Technologies: A Critical Review Of Existing Literature, Zeenath Reza Khan, Stephen D. Samuel

Faculty of Informatics - Papers (Archive)

Being tech-savvy in the twenty-first century is no eye-brow raiser. It is more the norm than the exception. Every academic institution across borders is trying hard to keep up with the technology outside classroom, bringing it to the students inside classrooms to help and enhance their teaching and learning experience. While their achievements have been very well received and appreciated, the negative impacts have not gone totally ignored. From defining technology in the classrooms, to looking closely at cheating, how to detect them and curb them, a lot has been written by various authors in different disciplines. This paper, however, …


Face Recognition From Single Sample Based On Human Face Perception, Ce Zhan, Wanqing Li, Philip Ogunbona Jan 2009

Face Recognition From Single Sample Based On Human Face Perception, Ce Zhan, Wanqing Li, Philip Ogunbona

Faculty of Informatics - Papers (Archive)

Although research show that human recognition performance for unfamiliar faces is relatively poor, when the sample is always available for analysis and becomes ”familiar”, people are able to recognize a previous unknown face from single sample. In this paper, a method is proposed to deal with the one sample per person face recognition problem based on the process how unfamiliar faces become familiar to people. Particularly, quantized local features which learnt from generic face dataset are used in the proposed method to mimic the prototype effect of human face recognition. Furthermore, a landmark-based scheme is introduced to quantify the distinctiveness …


Face Detection Using Generalised Integral Image Features, Alister Cordiner, Philip Ogunbona, Wanqing Li Jan 2009

Face Detection Using Generalised Integral Image Features, Alister Cordiner, Philip Ogunbona, Wanqing Li

Faculty of Informatics - Papers (Archive)

This paper proposes generalised integral image features (GIIFs) for face detection. GIIFs provide a richer and more flexible set of features than Haar-like features. Due to the large set of possible GIIFs, a genetic algorithm is developed to select the feature space for the optimal weak classifiers. Experimental results have shown that this method is able to improve face detection accuracy.


Hierarchical Model Building, Fitting, And Checking: A Behind-The-Scenes Look At A Bayesian Analysis Of Arsenic Exposure Pathways, Peter F. Craigmile, Catherine A. Calder, Hongfei Li, Rajib Paul, Noel Cressie Jan 2009

Hierarchical Model Building, Fitting, And Checking: A Behind-The-Scenes Look At A Bayesian Analysis Of Arsenic Exposure Pathways, Peter F. Craigmile, Catherine A. Calder, Hongfei Li, Rajib Paul, Noel Cressie

Faculty of Informatics - Papers (Archive)

In this article, we present a behind-the-scenes look at a Bayesian hierarchical analysis of pathways of exposure to arsenic (a toxic heavy metal) using the Phase I National Human Exposure Assessment Survey carried out in Arizona. Our analysis combines individual-level personal exposure measurements (biomarker and environmental media) with water, soil, and air observations from the ambient environment. We include details of our model-building exercise that involved a combination of exploratory data analysis and substantive knowledge in exposure science. Then we present our strategies for model fitting, which involved piecing together components of the hierarchical model in a systematic fashion to …


An Efficient Certificateless Signature From Pairings, Changji Wang, Dongyang Long, Yong Tang Jan 2009

An Efficient Certificateless Signature From Pairings, Changji Wang, Dongyang Long, Yong Tang

Faculty of Informatics - Papers (Archive)

A certificateless signature retains the efficiency of Shamir's identity-based signature while it does not suffer from the inherent private key escrow problem, which is first introduced by S. Al-Riyami and K. Paterson in Asiacrypt 2003. In this paper, we proposed a new certificateless signature scheme based on bilinear pairings. The proposed scheme is more efficient than those of previous schemes by pre-computing the pairing e(P, P) = g and publishing as the system parameters, it needs not to compute the pairing in the Sign stage, and only needs to compute three pairings in the Verify stage. In addition, the proposed …


An Efficient Certificateless Encryption Scheme In The Standard Model, Hua Guo, Xiyong Zhang, Yi Mu, Zhoujun Li Jan 2009

An Efficient Certificateless Encryption Scheme In The Standard Model, Hua Guo, Xiyong Zhang, Yi Mu, Zhoujun Li

Faculty of Informatics - Papers (Archive)

We propose an efficient certificateless public key encryption (CL-PKE) scheme which is provably secure against chosen ciphertext attacks without random oracles. Our scheme is more computationally efficient than the existing schemes and provides the shortest public key length compared to other existing CL-PKEs with random oracles. We also propose a practical self-generated-certificate encryption (SGC-PKE) scheme based on our CL-PKE scheme. One of merits of such cryptographic systems is that it can be applied to countermeasure "Denial-of-Decryption (DoD) Attacks" that is inherent in CL-PKE.


Inverse Function Analysis Method For Fringe Pattern Profilometry, Y. Hu, Jiangtao Xi, Joe F. Chicharo, Wenqing Cheng, Zongkai Yang Jan 2009

Inverse Function Analysis Method For Fringe Pattern Profilometry, Y. Hu, Jiangtao Xi, Joe F. Chicharo, Wenqing Cheng, Zongkai Yang

Faculty of Informatics - Papers (Archive)

In this paper, we present a mathematical model that describes a general relationship between the projected signal and the deformed signal in fringe pattern profilometry (FPP) systems. The derived mathematical model proves that in theory any kind of fringe pattern could be utilized for profilometry. Based on the derived mathematical model, this paper also proposes a new algorithm, referred to as inverse function analysis (IFA) method, to reconstruct 3-D surfaces using the FPP technique. Compared with traditional methods, our algorithm has neither the requirement for the structure of projected fringe patterns nor the prior knowledge of the distortion characteristics of …


Process Seer: A Tool For Semantic Effect Annotation Of Business Process Models, Kerry G. Hinge, Aditya K. Ghose, George Koliadis Jan 2009

Process Seer: A Tool For Semantic Effect Annotation Of Business Process Models, Kerry G. Hinge, Aditya K. Ghose, George Koliadis

Faculty of Informatics - Papers (Archive)

A key challenge in devising solutions to a range of problems associated with business process management: process life cycle management, compliance management, enterprise process architectures etc. is the problem of identifying process semantics. The current industry standard business process modeling notation, BPMN, provides little by way of semantic description of the effects of a process (beyond what can be conveyed via the nomenclature of tasks and the decision conditions associated with gateways). In this paper, we describe the conceptual underpinnings, design, implementation and evaluation of the process SEER tool that supports several strategies for obtaining semantic effect descriptions of BPMN …


Identification And Prioritization Of Variables That Influence Learning Content Development In E-Learning Platforms, Zhengui Wu, Parviz Doulai Jan 2009

Identification And Prioritization Of Variables That Influence Learning Content Development In E-Learning Platforms, Zhengui Wu, Parviz Doulai

Faculty of Informatics - Papers (Archive)

E-Learning is widely used to facilitate and enhance learning in higher education. For developing any e-learning program, direct and indirect costs associated with digital learning content should be measured. Normally, over 60% of total e-learning costs are spent on design, development, publication and evaluation of learning content. However, the rapid growth of high quality digital content has become a challenge to tertiary education institutions. This paper discusses the employment of new technology known as learning objects for creating cost effective learning content. By investigating essential factors that affect learning content development, variables influencing the development cost are identified. Identified variables …


Ddos Defense Using Tcp_Ip Header Analysis And Proactive Tests, Zhen Ye, Weiwei Shi, Dayong Ye Jan 2009

Ddos Defense Using Tcp_Ip Header Analysis And Proactive Tests, Zhen Ye, Weiwei Shi, Dayong Ye

Faculty of Informatics - Papers (Archive)

To defend against distributed denial of service (DDoS) attacks, one critical issue is to effectively isolate the attack traffic from the normal ones. A novel DDoS defense scheme based on TCP_IP Header Analysis and Proactive Tests (THAPT) is hereby proposed. Unlike most of the previous DDoS defense schemes that are passive in nature, the proposal uses proactive tests to identify and isolate the malicious traffic. Simulation results validate the effectiveness of our proposed scheme.


Uberveillance: Microchipping People And The Assault On Privacy, M. G. Michael, Katina Michael Jan 2009

Uberveillance: Microchipping People And The Assault On Privacy, M. G. Michael, Katina Michael

Faculty of Informatics - Papers (Archive)

Uberveillance is above and beyond, an exaggerated, and omnipresent 24/7 electronic surveillance. It is a surveillance that is not only always on but always with you. It is ever-present because the technology that facilitates it, in its ultimate implementation, is embedded within the human body. The inherent problem with this kind of bodily pervasive surveillance is that omnipresence will not always equate with omniscience. Infallibility and ambient context will be for the greater part absent. For as Marcus Wigan has pithily put it, “context is all.” Hence the real concern for misinformation, misinterpretation, and information manipulation of citizens’ data.


Removing The Angst From Statistics, N. Baharun, A. Porter Jan 2009

Removing The Angst From Statistics, N. Baharun, A. Porter

Faculty of Informatics - Papers (Archive)

This paper presents the results of a case study investigating the use of video resources in teaching statistics proven to have their impact on student learning outcomes which positively affect the student understanding of topics and reduce students’ anxiety. A two-way ANOVA is utilized to analyze the sample data from forty postgraduate students in the Health Informatics at University of Wollongong. The findings from the study show that male students are significantly more confident in their understanding of statistics topics e.g. writing meaningful paragraphs about variables (p=0.014, F=6.684), producing and interpreting scatter plots and correlations (p=0.007, F=8.388); and less anxious …


A New Class Of Fully Nonlinear Curvature Flows, James A. Mccoy Jan 2009

A New Class Of Fully Nonlinear Curvature Flows, James A. Mccoy

Faculty of Informatics - Papers (Archive)

This article is about contraction by fully nonlinear curvature flows of convex hypersurfaces. As with previously considered flows, including the quasilinear mean curvature flow and a broad class of fully nonlinear curvature flows, solutions exist for a finite time and contract to a point. As with some other flows, including the mean curvature flow, a smaller class of fully nonlinear flows and the Gauss curvature flow for surfaces, under a suitable rescaling the solutions converge exponentially to spheres. We provide an introduction to the study of curvature flow of hypersurfaces with extensive references to most of the main areas of …


Crossed Products Of K-Graph C*-Algebras By Zl, Cyntyhia Farthing, David Pask, Aidan Sims Jan 2009

Crossed Products Of K-Graph C*-Algebras By Zl, Cyntyhia Farthing, David Pask, Aidan Sims

Faculty of Informatics - Papers (Archive)

An action of Zl by automorphisms of a k-graph induces an action of Zl by automorphisms of the corresponding k-graph C*-algebra. We show how to construct a (k + l)-graph whose C*-algebra coincides with the crossed product of the original k-graph C)-algebra by Zl. We then investigate the structure of the crossed-product C*-algebra.


Characterising The Behaviour Of Ieee 802.11 Broadcast Transmissions In Ad Hoc Wireless Lans, Mehran Abolhasan, Farzad Safaei, Jerry Chun-Ping Wang, Daniel R. Franklin Jan 2009

Characterising The Behaviour Of Ieee 802.11 Broadcast Transmissions In Ad Hoc Wireless Lans, Mehran Abolhasan, Farzad Safaei, Jerry Chun-Ping Wang, Daniel R. Franklin

Faculty of Informatics - Papers (Archive)

This paper evaluates the performance of the IEEE 802.11 broadcast traffic under both saturation and nonsaturation conditions. The evaluation highlights some important characteristics of IEEE 802.11 broadcast traffic as compared to corresponding unicast traffic. Moreover, it underlines the inaccuracy of the broadcast saturation model proposed by Ma and Chen due to the absence of backoff counter freeze process when channel is busy. Computer simulations are used to validate the accuracy of the new model and demonstrate the importance of capturing the freezing of backoff counter in the analytical study of IEEE 802.11 broadcast.


Is Solution For The Global Environmental Challenge: An Australian Initiative, Trevor A. Spedding, Aditya K. Ghose, Helen M. Hasan Jan 2009

Is Solution For The Global Environmental Challenge: An Australian Initiative, Trevor A. Spedding, Aditya K. Ghose, Helen M. Hasan

Faculty of Informatics - Papers (Archive)

There is a complex range of interrelated environmental issues that currently challenge decision-makers across the world. To date the reputation of the information and communication technology (ICT) industry in Australia, and elsewhere, has been quite negative with respect to its effect on the environment. The recent "Green IT" initiatives of the Australian Computer Society to reduce carbon emission are manifestations of this. While not denying the worth of this agenda, the authors of this paper suggest that it is timely to promote a more positive position for ICT as a source of solutions to environmental problems. In this paper, we …


Vehicle Tracking Using Projective Particle Filter, Azeddine Beghdadi, Philippe Bouttefroy, Son Lam Phung, Abdesselam Bouzerdoum Jan 2009

Vehicle Tracking Using Projective Particle Filter, Azeddine Beghdadi, Philippe Bouttefroy, Son Lam Phung, Abdesselam Bouzerdoum

Faculty of Informatics - Papers (Archive)

This article introduces a new particle filtering approach for object tracking in video sequences. The projective particle filter uses a linear fractional transformation, which projects the trajectory of an object from the real world onto the camera plane, thus providing a better estimate of the object position. In the proposed particle filter, samples are drawn from an importance density integrating the linear fractional transformation. This provides a better coverage of the feature space and yields a finer estimate of the posterior density. Experiments conducted on traffic video surveillance sequences show that the variance of the estimated trajectory is reduced, resulting …


A Simulation Study On The Energy Efficiency Of Pure And Slotted Aloha Based Rfid Tag Reading Protocols, Alejandro Ruiz-Rivera, Dheeraj Klair, Kwan-Wu Chin Jan 2009

A Simulation Study On The Energy Efficiency Of Pure And Slotted Aloha Based Rfid Tag Reading Protocols, Alejandro Ruiz-Rivera, Dheeraj Klair, Kwan-Wu Chin

Faculty of Informatics - Papers (Archive)

This paper studies the energy efficiency of twelve Pure and Slotted Aloha tag reading protocol variants via simulation. We compare their energy consumption in three collision resolution phases: 1) success, 2) collision, and 3) idle. Our extensive simulation results show that Pure Aloha with fast mode and muting has the lowest energy consumption, and hence is most suited for deployment in energy-constrained environments.


Routing Metric For Multi-Interface And Power-Aware Nodes In Heterogenous Manets, Huda Mubarak Al Amri, Mehran Abolhasan, Tadeusz A. Wysocki Jan 2009

Routing Metric For Multi-Interface And Power-Aware Nodes In Heterogenous Manets, Huda Mubarak Al Amri, Mehran Abolhasan, Tadeusz A. Wysocki

Faculty of Informatics - Papers (Archive)

This paper presents heterogeneity ratio (HR) as a new routing metric for heterogeneous MANETs. This metric is the ratio of number of powerful nodes to hop count that is used to select the best path to destination. Node heterogeneity is modeled in terms of: types and number of different interfaces, power, and transmission ranges. Our proposed routing metric is based on developing route discovery algorithm that is implemented on the top of on-demand tree-based routing protocol (OTRP)[2] to accommodate nodes heterogeneity. Simulation results show that using HR with OTRP heterogeneity aware outperforms other metrics like minimal hop count and maximal …


Formal Concept Analysis For An E-Learning Semantic Web, Ghassan Beydoun Jan 2009

Formal Concept Analysis For An E-Learning Semantic Web, Ghassan Beydoun

Faculty of Informatics - Papers (Archive)

We capture student interactions in an e-learning community to construct a semantic web (SW) to create a collective meta-knowledge structure guiding students as they search the existing knowledge corpus. We use formal concept analysis (FCA) as a knowledge acquisition tool to process the students virtual surfing trails to express and exploit the dependencies between web-pages to yield subsequent and more effective focused search results. We mirror social navigation and bypass the cumbersome manual annotation of webpages and at the same time paralleling social navigation for knowledge.

We present our system KAPUST2 (Keeper and Processor of User Surfing Trails) which constructs …