Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Faculty of Informatics - Papers (Archive)

Discipline
Keyword
Publication Year

Articles 601 - 630 of 2013

Full-Text Articles in Physical Sciences and Mathematics

Ranking Web Pages Using Machine Learning Approaches, Sweah Liang Yong, Markus Hagenbuchner, Ah Chung Tsoi Jan 2008

Ranking Web Pages Using Machine Learning Approaches, Sweah Liang Yong, Markus Hagenbuchner, Ah Chung Tsoi

Faculty of Informatics - Papers (Archive)

One of the key components which ensures the acceptance of web search service is the web page ranker - a component which is said to have been the main contributing factor to the early successes of Google. It is well established that a machine learning method such as the Graph Neural Network (GNN) is able to learn and estimate Google's page ranking algorithm. This paper shows that the GNN can successfully learn many other Web page ranking methods e.g. TrustRank, HITS and OPIC. Experimental results show that GNN may be suitable to learn any arbitrary web page ranking scheme, and …


Vehicle Tracking By Non-Drifting Mean-Shift Using Projective Kalman Filter, Philippe L. Bouttefroy, Abdesselam Bouzerdoum, Son Lam Phung, Azeddine Beghdadi Jan 2008

Vehicle Tracking By Non-Drifting Mean-Shift Using Projective Kalman Filter, Philippe L. Bouttefroy, Abdesselam Bouzerdoum, Son Lam Phung, Azeddine Beghdadi

Faculty of Informatics - Papers (Archive)

Robust vehicle tracking is essential in traffic monitoring because it is the groundwork to higher level tasks such as traffic control and event detection. This paper describes a new technique for tracking vehicles with mean-shift using a projective Kalman filter. The shortcomings of the mean-shift tracker, namely the selection of the bandwidth and the initialization of the tracker, are addressed with a fine estimation of the vehicle scale and kinematic model. Indeed, the projective Kalman filter integrates the non-linear projection of the vehicle trajectory in its observation function resulting in an accurate localization of the vehicle in the image. The …


Local Estimation Of Displacement Density For Abnormal Behavior Detection, Philippe L. Bouttefroy, Abdesselam Bouzerdoum, Son Lam Phung, Azeddine Beghdadi Jan 2008

Local Estimation Of Displacement Density For Abnormal Behavior Detection, Philippe L. Bouttefroy, Abdesselam Bouzerdoum, Son Lam Phung, Azeddine Beghdadi

Faculty of Informatics - Papers (Archive)

Detecting abnormal behavior in video sequences has become a crucial task with the development of automatic video-surveillance systems. Here, we propose an algorithm which locally models the probability distribution of objects behavioral features. A temporal Gaussian mixture with local update is introduced to estimate the local probability distribution. The update of the feature probability distribution is thus temporal and local, allowing a smooth transition for neighboring locations. The integration of local information in the estimation provides a fast adaptation along with an efficient discrimination between normal and abnormal behavior. The proposed technique is evaluated on both synthetic and real data. …


Graphical Modeling And Decoding Of Human Actions, Wanqing Li, Zhengyou Zhang, Zicheng Liu Jan 2008

Graphical Modeling And Decoding Of Human Actions, Wanqing Li, Zhengyou Zhang, Zicheng Liu

Faculty of Informatics - Papers (Archive)

This paper presents a graphical model for learning and recognizing human actions. Specifically, we propose to encode actions in a weighted directed graph, referred to as action graph, where nodes of the graph represent salient postures that are used to characterize the actions and shared by all actions. The weight between two nodes measures the transitional probability between the two postures. An action is encoded as one or multiple paths in the action graph. The salient postures are modeled using Gaussian mixture models (GMM). Both the salient postures and action graph are automatically learned from training samples through unsupervised clustering …


Key-Frame Extraction Using Dominant-Set Clustering, Xianglin Zeng, Weiming Hu, Wanqing Li, Xiaoqing Zhang, Bo Xu Jan 2008

Key-Frame Extraction Using Dominant-Set Clustering, Xianglin Zeng, Weiming Hu, Wanqing Li, Xiaoqing Zhang, Bo Xu

Faculty of Informatics - Papers (Archive)

Key frames play an important role in video abstraction. Clustering is a popular approach for key-frame extraction. In this paper, we propose a novel method for key-frame extraction based on dominant-set clustering. Compared with the existing clustering-based methods, the proposed method dynamically decides the number of key frames depending on the complexity of video shots, produces key frames in a progressive manner and requires less computation. Experimental results on different types of video shots have verified the effectiveness of the method.


Strong Shift Equivalence Of C*Correspondences, Paul Muhly, David A. Pask, Mark Tomforde Jan 2008

Strong Shift Equivalence Of C*Correspondences, Paul Muhly, David A. Pask, Mark Tomforde

Faculty of Informatics - Papers (Archive)

We define a notion of strong shift equivalence for C* -correspondences and show that strong shift equivalent C* -correspondences have strongly Morita equivalent Cuntz-Pimsner algebras. Our analysis extends the fact that strong shift equivalent square matrices with non-negative integer entries give stably isomorphic Cuntz-Krieger algebras.


Developing Ontology Revision Framework: A Case Study On The Use Of The Coherence Theory For Semantic Shopping Mall, Seung Hwan Kang, Sim Kim Lau Jan 2008

Developing Ontology Revision Framework: A Case Study On The Use Of The Coherence Theory For Semantic Shopping Mall, Seung Hwan Kang, Sim Kim Lau

Faculty of Informatics - Papers (Archive)

Why is ontology revision important? Very often, ontology exists in a particular period of timeline is often designed based on the purpose of a domain of interest at that instance of time. However over time, ontology needs to be revised due to changes in content, environment, requirements, or even structural representation. As a result, revision and updating of necessary components in the pre-defined ontology is unavoidable. When this happens, it is important to ensure that revision is conducted in a consistent manner so that it does not result in unforseen redundancies and inconsistencies. Any revision performed must be accompanied by …


Wireless Interactive System For Patient Healthcare Monitoring Using Mobile Computing Devices, Montserrat Ros, Matthew D'Souza, Adam Postula Jan 2008

Wireless Interactive System For Patient Healthcare Monitoring Using Mobile Computing Devices, Montserrat Ros, Matthew D'Souza, Adam Postula

Faculty of Informatics - Papers (Archive)

Recently there has been a need to incorporate the use of mobile computing devices in hospital or clinical applications, to enhance patient care. The advancement of wireless technology has created unique mechanisms of interaction that can meet the needs of e-health system robustness, reliability and accuracy requirements. This paper presents an interactive wireless medical information system that allows patient instrumentation output data to be accessed and patient details to be entered by medical practitioners using mobile computing devices. We examine mobile and wireless information technology concepts that can be used to interact with a medical information system for controlling real-time …


Expandable Data-Driven Graphical Modeling Of Human Actions Based On Salient Postures, Wanqing Li, Zhengyou Zhang, Zicheng Liu Jan 2008

Expandable Data-Driven Graphical Modeling Of Human Actions Based On Salient Postures, Wanqing Li, Zhengyou Zhang, Zicheng Liu

Faculty of Informatics - Papers (Archive)

This paper presents a graphical model for learning and recognizing human actions. Specifically, we propose to encode actions in a weighted directed graph, referred to as action graph, where nodes of the graph represent salient postures that are used to characterize the actions and are shared by all actions. The weight between two nodes measures the transitional probability between the two postures represented by the two nodes. An action is encoded as one or multiple paths in the action graph. The salient postures are modeled using Gaussian mixture models (GMMs). Both the salient postures and action graph are automatically learned …


Enhanced Laboratory Diagnosis Of Human Chlamydia Pneumoniae Infection Through Pattern Recognition Derived From Pathology Database Analysis, Alice Richardson, Simon Hawkins, Fariba Shadabi, Dhamendra Sharma, John Fulcher, B. Lidbury Jan 2008

Enhanced Laboratory Diagnosis Of Human Chlamydia Pneumoniae Infection Through Pattern Recognition Derived From Pathology Database Analysis, Alice Richardson, Simon Hawkins, Fariba Shadabi, Dhamendra Sharma, John Fulcher, B. Lidbury

Faculty of Informatics - Papers (Archive)

This study focuses on pattern recognition in pathology data collected from patients tested for Chlamydia pneumoniae (Cp) infection, with co-infection by Mycoplasma pneumoniae (Myco) also considered. Both Cp and Myco are microbes that cause respiratory disease in some infected people. As well as the immunoassay results revealing whether the patient had been infected, or not, an extensive range of other routine pathology data was also available for each patient, allowing the analysis of associations between a positive immunoassay laboratory result for Cp or Myco, and a range of tests for biochemical and cellular markers (e.g. liver enzymes, electrolyte balance, haematological …


Motion Classification Using Dynamic Time Warping, Kevin Adistambha, Christian Ritz, Ian Burnett Jan 2008

Motion Classification Using Dynamic Time Warping, Kevin Adistambha, Christian Ritz, Ian Burnett

Faculty of Informatics - Papers (Archive)

Automatic generation of metadata is an important component of multimedia search-by-content systems as it both avoids the need for manual annotation as well as minimising subjective descriptions and human errors. This paper explores the automatic attachment of basic descriptions (or dasiaTagspsila) to human motion held in a motion-capture database on the basis of a dynamic time warping (DTW) approach. The captured motion is held in the Acclaim ASF/AMC format commonly used in game and movie motion capture work and the approach allows for the comparison and classification of motion from different subjects. The work analyses the bone rotations important to …


A New And Efficient Signature On Commitment Values, Fangguo Zhang, Xiaofeng Chen, Yi Mu, Willy Susilo Jan 2008

A New And Efficient Signature On Commitment Values, Fangguo Zhang, Xiaofeng Chen, Yi Mu, Willy Susilo

Faculty of Informatics - Papers (Archive)

We present a new short signature scheme based on a vari- ant of the Boneh-Boyen's short signatures schemes. Our short signature scheme is secure without requiring the random oracle model. We show how to prove a commit- ted value embedded in our short signature. Using this primitive, we construct an e±cient anonymous credential system.


Visual-Based Interface Using Hand Gesture Recognition And Object Tracking, Abdoleh Chalechale, Farzad Safaei Jan 2008

Visual-Based Interface Using Hand Gesture Recognition And Object Tracking, Abdoleh Chalechale, Farzad Safaei

Faculty of Informatics - Papers (Archive)

This paper presents a novel approach for human-machine interface using visual-based communication. Scene analysis, object recognition and tracking, together with gesture detection and classification, are employed to design and implement a system for real time interaction. A new paradigm is proposed for efficient selection of hand gestures that can be used in other gesturebased environments aiming at interactive multimedia. An inexpensive web camera and readily available tools (such as an ordinary pen) have been used in this approach to render the system cost effective and suitable for general and home-based multimedia applications. Focus is placed on real time applications with …


Mitigating Phishing With Id-Based Online/Offline Authentication, Qiong Ren, Yi Mu, W. Susilo Jan 2008

Mitigating Phishing With Id-Based Online/Offline Authentication, Qiong Ren, Yi Mu, W. Susilo

Faculty of Informatics - Papers (Archive)

Enforcing strong authentication is an option to mitigate phishing. However, existing authentication methods, like traditional digital signatures, require unrealistic full deployment of public key infrastructure(PKI) and destroy email users ’ privacy in that the identity of an email sender is automatically revealed to the public. There have been some works in the literature, where the technology of deniable authentication is adopted and sender’s privacy can be protected. However, the additional computation introduced into the system is obviously a drawback. In this paper, we introduce the notion of online/offline authentication into anti-phishing, in order to construct an efficient and secure anti-phishing …


A Compact Cmos Face Detection Architecture Based On Shunting Inhibitory Convolutional Neural Networks, Xiaoxiao Zhang, Amine Bermak, Farid Boussaid, Abdesselam Bouzerdoum Jan 2008

A Compact Cmos Face Detection Architecture Based On Shunting Inhibitory Convolutional Neural Networks, Xiaoxiao Zhang, Amine Bermak, Farid Boussaid, Abdesselam Bouzerdoum

Faculty of Informatics - Papers (Archive)

In this paper, we present a compact, low cost, real-time CMOS hardware architecture for face detection. The proposed architecture is based on a VLSI-friendly implementation of Shunting Inhibitory Convolutional Neural Networks (SICoNN). Reported experimental results show that the proposed architecture can detect faces with 93% detection accuracy at 5% false alarm rate. A VLSI Systolic architecture was considered to further optimize the design in terms of execution speed, power dissipation and area. Potential applications of the proposed face detection hardware include consumer electronics, security, monitoring and head-counting.


Actor Eco-Systems: Modeling And Configuring Virtual Enterprises, Aditya Ghose, George Koliadis Jan 2008

Actor Eco-Systems: Modeling And Configuring Virtual Enterprises, Aditya Ghose, George Koliadis

Faculty of Informatics - Papers (Archive)

Complex business networks such as supply chains, with cross-organizational workflows of even greater complexity, are becoming increasingly common. The problem of engineering cross-organizational processes in a manner that accounts for inter-organizational constraints, and dynamics, has received little attention in the literature. This paper describes an effective framework for addressing the problem. The actor eco-systems approach leverages the ecosystems metaphor to model cross-enterprise constraints, change propagation and equilibria. It describes how cross-enterprise processes can be derived from such models and maintained in the face of dynamic business contexts.


Information Theoretic Bounds On Authentication Systems In Query Model, Reihaneh Safavi-Naini, Peter R. Wild Jan 2008

Information Theoretic Bounds On Authentication Systems In Query Model, Reihaneh Safavi-Naini, Peter R. Wild

Faculty of Informatics - Papers (Archive)

Authentication codes provide message integrity guarantees in an information theoretic sense within a symmetric key setting. Information theoretic bounds on the success probability of an adversary who has access to previously authenticated messages have been derived by Simmons and Rosenbaum, among others. In this paper, we consider a strong attack scenario where the adversary is adaptive and has access to authentication and verification oracles. We derive information theoretic bounds on the success probability of the adversary and on the key size of the code. This brings the study of unconditionally secure authentication systems on a par with the study of …


The State Of Public Data Availability In Australia: A Study Of Suppliers Of Critical Infrastructure Information, Roba Abbas Jan 2008

The State Of Public Data Availability In Australia: A Study Of Suppliers Of Critical Infrastructure Information, Roba Abbas

Faculty of Informatics - Papers (Archive)

The purpose of this study is to evaluate the public data availability situation in Australia, and the consequent impact on the nation's critical infrastructure (CI) and the critical infrastructure protection (CIP) process in general, through an evaluation of data supplying bodies in Australia. An assessment of data suppliers was conducted, in order to allow for the categorisation of data supplying entities, and to identify the critical infrastructure data that is available, The public data availability situation in Australia is described, and the concerns associated with having CI-related information available in the public domain are highlighted.


An Ontology-Based Sentiment Classification Methodology For Online Consumer Reviews, Jantima Polpinij, Aditya K. Ghose Jan 2008

An Ontology-Based Sentiment Classification Methodology For Online Consumer Reviews, Jantima Polpinij, Aditya K. Ghose

Faculty of Informatics - Papers (Archive)

This paper presents a method of ontology-based sentiment classification to classify and analyse online product reviews of consumers. We implement and experiment with a support vector machines text classification approach based on a lexical variable ontology. After testing, it could be demonstrated that the proposed method can provide more effectiveness for sentiment classification based on text content.


Block Spread Ofdma System With Space-Time Coded Mimo Over Frequency Selective Fading Channels, Yiwei Yu, Xiaojing Huang, Eryk Dutkiewicz Jan 2008

Block Spread Ofdma System With Space-Time Coded Mimo Over Frequency Selective Fading Channels, Yiwei Yu, Xiaojing Huang, Eryk Dutkiewicz

Faculty of Informatics - Papers (Archive)

This paper proposes a block spread orthogonal frequency division multiple access (BS-OFDMA) system with a combined space-time coded multiple-input multiple-out (STC-MIMO) scheme called STC-MIMO BS-OFDMA for transmission over frequency selective fading channels. In this system, a novel block spreading approach is firstly applied to effectively achieve precoding in the OFDMA system with lower complexity for improving the multipath diversity performance. The STC-MIMO is then incorporated to take advantage of the spatial diversity. The signal model and architecture of the proposed system are presented, and simulations are carried out to confirm the expected performance improvement.


Adaptive Subband Selection In Ofdm-Based Cognitive Radios For Better System Coexistence, Pingzhou Tu, Xiaojing Huang, Eryk Dutkiewicz Jan 2008

Adaptive Subband Selection In Ofdm-Based Cognitive Radios For Better System Coexistence, Pingzhou Tu, Xiaojing Huang, Eryk Dutkiewicz

Faculty of Informatics - Papers (Archive)

In an environment of shared radio spectrum, multiple systems may interfere with each other and cause significant impacts on system coexistence. In this paper we propose an adaptive subband selection technique based on orthogonal frequency division multiplexing (OFDM) to avoid interference for better system coexistence when multiple systems are operating in the same unlicensed industrial, scientific and medical (ISM) bands. Under the assumption that the interference power level and the interfered frequency bands are identified at the receiver, interference thresholds, determined over both Gaussian and multipath fading channels, are applied to adaptively select the transmission subbands so that interference is …


Requirements Elicitation Using Goal-Based Organizational Model, Aneesh Krishna, He Lu Jan 2008

Requirements Elicitation Using Goal-Based Organizational Model, Aneesh Krishna, He Lu

Faculty of Informatics - Papers (Archive)

Domain knowledge is crucial for the quality of requirements. The systems analysts, who have adequate knowledge of software often don't understand the organizational context well. The Tropos methodology proposes a set of concepts, which are effective in capturing the organizational context, the interactions between the software system and the human agents. Based on the Tropos methodology, Software System-Business Model (SS-BM), which integrates the Software System Actor (SSA) from early requirements organizational model has been proposed. In this paper, a methodological approach of applying the SS-BM to requirements list elicitation is presented. In the proposed method, requirements items were mapped to …


An Integrated Approach Of Wavelet-Rough Set Technique For Classification Of Power Quality Disturbances, Chandrashekhar Bhende, Satya Mishra Jan 2008

An Integrated Approach Of Wavelet-Rough Set Technique For Classification Of Power Quality Disturbances, Chandrashekhar Bhende, Satya Mishra

Faculty of Informatics - Papers (Archive)

This paper presents an integrated approach of wavelet and rough set theory for the classification of power quality (PQ) disturbances. Further, the number of features and the rules required for proper classification are decided through rough set approach. Moreover, as the proposed methodology can reduce the number of features extracted through wavelet to a great extent, it will indirectly reduce the memory requirement for the classification procedure. Eleven types of PQ disturbances are considered for classification. The simulation results show that the combination of wavelet and rough set theory can effectively classify different power quality disturbances. Since rule based approach …


Clinician Assessments Of Workplace Security Training - An Informatics Perspective, Juanita Fernando, Linda Dawson Jan 2008

Clinician Assessments Of Workplace Security Training - An Informatics Perspective, Juanita Fernando, Linda Dawson

Faculty of Informatics - Papers (Archive)

This paper describes and analyses clinicians’ assessments of workplace privacy and security (PaS) training in the context of contemporary health information system (HIS) practice. The PaS training underpins national e-health frameworks. The paper draws on findings from a forthcoming dissertation. The ‘questerview’ technique was applied to this case study of 26 clinicians in three Victorian (Australia) public hospitals. The technique relies on data collection that applies standardised questions and questionnaires during interviews. Respondents were recorded while they completed the standardised questions and questionnaires and were encouraged to discuss their responses to items in detail. Data analysis involved the scrutiny of …


Tests Of Fit For The Logarithmic Distribution, Donald John Best, J. C. W Rayner, Olivier Thas Jan 2008

Tests Of Fit For The Logarithmic Distribution, Donald John Best, J. C. W Rayner, Olivier Thas

Faculty of Informatics - Papers (Archive)

Smooth tests for the logarithmic distribution are compared with three tests: the first is a test due to Epps and is based on a probability generating function, the second is the Anderson-Darling test, and the third is due to Klar and is based on the empirical integrated distribution function. These tests all have substantially better power than the traditional Pearson-Fisher X2 test of fit for the logarithmic. These traditional chi-squared tests are the only logarithmic tests of fit commonly applied by ecologists and other scientists.


Short Designated Verifier Signature Scheme And Its Identity-Based Variant, Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang Jan 2008

Short Designated Verifier Signature Scheme And Its Identity-Based Variant, Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang

Faculty of Informatics - Papers (Archive)

The notion of strong designated verifier signature was put forth by Jakobsson, Sako and Impagliazzo in 1996, but the formal definition was defined recently by Saeednia, Kremer and Markowitch in 2003 and revisited by Laguil- laumie and Vergnaud in 2004. In this paper, we firstly propose the notion of short strong designated verifier sig- nature scheme, and extend it to the short identity-based strong designated verifier scheme. Then, we propose the first construction of short strong designated verifier sig- nature scheme. We also extend our scheme to construct a short identity-based strong designated verifier signature scheme. The size of the …


The Noncommutative Geometry Of K-Graph C*-Algebras, David A. Pask, Adam Rennie, Aidan Sims Jan 2008

The Noncommutative Geometry Of K-Graph C*-Algebras, David A. Pask, Adam Rennie, Aidan Sims

Faculty of Informatics - Papers (Archive)

This paper is comprised of two related parts. First we discuss which k-graph algebras have faithful gauge invariant traces, where the gauge action of T^k is the canonical one. We give a sufficient condition for the existence of such a trace, identify the C*-algebras of k-graphs satisfying this condition up to Morita equivalence, and compute their K-theory. For k-graphs with faithful gauge invariant trace, we construct a smooth (k,infinity)-summable semifinite spectral triple. We use the semifinite local index theorem to compute the pairing with K-theory. This numerical pairing can be obtained by applying the trace to a KK-pairing with values …


Phase Diagrams Of The Metallic Zigzag Carbon Nanotube, J E. Bunder, Hsiu-Hau Lin Jan 2008

Phase Diagrams Of The Metallic Zigzag Carbon Nanotube, J E. Bunder, Hsiu-Hau Lin

Faculty of Informatics - Papers (Archive)

We investigate a metallic zigzag carbon nanotube by means of a Hubbard model, which includes both on-site and nearest-neighbor interactions. Assuming weak interactions, a renormalization group analysis of the equivalent two-leg ladder followed by bosonization and refermionization results in a Gross-Neveu model with an enlarged symmetry relative to the original Hamiltonian. For the undoped case the symmetry of the Gross-Neveu model is SO_8_, but for the doped case the particle-hole symmetry is broken and the symmetry reduces to SO_6_. Four ground-state phases are found in the undoped carbon nanotube with repulsive interactions, a d-wave Mott insulator, an s-wave Mott insulator, …


The Crisis In Ict Education: An Academic Perspective, Tony J. Koppi, Fazel Naghdy, Joe F. Chicharo, Judy Sheard, Sylvia Edwards, David Wilson Jan 2008

The Crisis In Ict Education: An Academic Perspective, Tony J. Koppi, Fazel Naghdy, Joe F. Chicharo, Judy Sheard, Sylvia Edwards, David Wilson

Faculty of Informatics - Papers (Archive)

A national Discipline-Based Initiative project for ICT, funded by the ALTC, has sought to identify the issues and challenges facing the sector. The crisis in ICT education spans high schools, universities and industry. The demand for skilled ICT graduates is increasing yet enrolments are declining. Several factors contribute to this decline including the perceived quality of teaching and a poor perception of the ICT profession amongst the general public. This paper reports on a consultation process with the academic community. Academic concerns include the capacity of the sector to survive the downturn, and improving relationships with industry which should benefit …


Evaluation Of Human Gait Through Observing Body Movements, Amir S. Hesami, Fazel Naghdy, David A. Stirling, Harold C. Hill Jan 2008

Evaluation Of Human Gait Through Observing Body Movements, Amir S. Hesami, Fazel Naghdy, David A. Stirling, Harold C. Hill

Faculty of Informatics - Papers (Archive)

A new modelling and classification approach for human gait evaluation is proposed. The body movements are obtained using a sensor suit recording inertial signals that are subsequently modelled on a humanoid frame with 23 degrees of freedom (DOF). Measured signals include position, velocity, acceleration, orientation, angular velocity and angular acceleration. Using the features extracted from the sensory signals, a system with induced symbolic classification models, such as decision trees or rule sets, based on a range of several concurrent features has been used to classify deviations from normal gait. It is anticipated that this approach will enable the evaluation of …