Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Faculty of Informatics - Papers (Archive)

Discipline
Keyword
Publication Year

Articles 991 - 1020 of 2013

Full-Text Articles in Physical Sciences and Mathematics

Cryptographic Key Generation From Biometric Data Using Lattice Mapping, Gang Zheng, Wanqing Li, Ce Zhan Aug 2006

Cryptographic Key Generation From Biometric Data Using Lattice Mapping, Gang Zheng, Wanqing Li, Ce Zhan

Faculty of Informatics - Papers (Archive)

Crypto-biometric systems are recently emerging as an effective process of key management to address the security weakness of conventional key release systems using passcodes, tokens or pattern recognition based biometrics. This paper presents a lattice mapping based fuzzy commitment method for cryptographic key generation from biometric data. The proposed method not only outputs high entropy keys, but also conceals the original biometric data such that it is impossible to recover the biometric data even when the stored information in the system is open to an attacker. Simulated results have demonstrated that its authentication accuracy is comparable to the well-known k-nearest …


A Shunting Inhibitory Convolutional Neural Network For Gender Classification, Fok Hing Chi Tivive, Abdesselam Bouzerdoum Aug 2006

A Shunting Inhibitory Convolutional Neural Network For Gender Classification, Fok Hing Chi Tivive, Abdesselam Bouzerdoum

Faculty of Informatics - Papers (Archive)

Demographic features, such as gender, are very important for human recognition and can be used to enhance social and biometric applications. In this paper, we propose to use a class of convolutional neural networks for gender classification. These networks are built upon the concepts of local receptive field processing and weight sharing, which makes them more tolerant to distortions and variations in two dimensional shapes. Tested on two separate data sets, the proposed networks achieve better classification accuracy than the conventional feedforward multilayer perceptron networks. On the Feret benchmark dataset, the proposed convolutional neural networks achieve a classification rate of …


Ultra-Wideband Technology For Video Surveillance Sensor Networks, Xiaojing Huang, Eryk Dutkiewicz, Ricardo Gandia, Darryn Lowe Aug 2006

Ultra-Wideband Technology For Video Surveillance Sensor Networks, Xiaojing Huang, Eryk Dutkiewicz, Ricardo Gandia, Darryn Lowe

Faculty of Informatics - Papers (Archive)

Wireless sensor networks have received a lot of attention in recent years both in the research community and in standards organizations. The emphasis of most sensor network research activities has been on the development of low cost and low power technologies for low bit rate applications. In this paper, we describe our work on ultra-wideband (UWB) sensor network technology targeted for video surveillance applications that require high immunity to noise, interference and jamming, high bit rate, and quality of service support. Such sensor networks are expected to find primary applications in the public safety and military fields. Our emphasis in …


Improved Three-Step Phase Shifting Profilometry Using Digital Fringe Pattern Projection, Yingsong Hu, Jiangtao Xi, Joe F. Chicharo, Zongkai Yang Jul 2006

Improved Three-Step Phase Shifting Profilometry Using Digital Fringe Pattern Projection, Yingsong Hu, Jiangtao Xi, Joe F. Chicharo, Zongkai Yang

Faculty of Informatics - Papers (Archive)

In this paper, an improved method for three-step phase shifting profilometry (PSP) is presented to eliminate the errors introduced by the second order harmonic when digital projection are used to generate fringe patterns. Firstly, the error caused by the second order harmonic is theoretically analyzed. Then based on the error analysis and principle of PSP, we propose a novel approach, called improved threestep phase shifting profilometry (I3PSP), to eliminate the influence of the second order harmonic. Finally, simulations are performed to verify the effectiveness of the proposed I3PSP, which demonstrate that the reconstruction accuracy of using three-step PSP has been …


A Gender Recognition System Using Shunting Inhibitory Convolutional Neural Networks, Fok Hing Chi Tivive, Abdesselam Bouzerdoum Jul 2006

A Gender Recognition System Using Shunting Inhibitory Convolutional Neural Networks, Fok Hing Chi Tivive, Abdesselam Bouzerdoum

Faculty of Informatics - Papers (Archive)

In this paper, we employ shunting inhibitory convolutional neural networks to develop an automatic gender recognition system. The system comprises two modules: a face detector and a gender classifier. The human faces are first detected and localized in the input image. Each detected face is then passed to the gender classifier to determine whether it is a male or female. Both the face detection and gender classification modules employ the same neural network architecture; however, the two modules are trained separately to extract different features for face detection and gender classification. Tested on two different databases, Web and BioID database, …


Evolution Of Protection Technologies In Metro Core Optical Networks, S. Chen Jul 2006

Evolution Of Protection Technologies In Metro Core Optical Networks, S. Chen

Faculty of Informatics - Papers (Archive)

The market of metro optical networking has increased rapidly over the last few years. Traditional telecommunication infrastructure has an emphasis on long-haul optical transmission with ultra broadband capacity, relying mostly on large pure Dense Wavelength Division Multiplexing (DWDM) systems. Today, however, metro core optical networks take the major role in provisioning local access services and interconnecting service points of presences (POPs) with long-haul transmission. This represents a pivotal point in business operations of data communication services for service providers and large enterprises. In addition, the upper layer data services completely leans upon the substrate wavelength communication, and hence the survivability …


Optimization Of Online Data Integration, J. R. Getta Jul 2006

Optimization Of Online Data Integration, J. R. Getta

Faculty of Informatics - Papers (Archive)

Online data integration is a process of continuous consolidation of data transmitted over the wide area networks with data already stored at a central site of a multidatabase system. The continuity of the process requires activation of data integration procedure each time a new portion of data is received at a central site. Efficient implementation of online data integration needs a new system of elementary operations on the increments and/or decrements of data and the intermediate results of integration. This work shows how to derive a new system of elementary operations for online data integration from a system of base …


Hadamard Ideals And Hadamard Matrices With Circulant Core, I. S. Kotsireas, C. Koukouvinos, Jennifer Seberry Jul 2006

Hadamard Ideals And Hadamard Matrices With Circulant Core, I. S. Kotsireas, C. Koukouvinos, Jennifer Seberry

Faculty of Informatics - Papers (Archive)

Computational Algebra methods have been used successfully in various problems in many fields of Mathematics. Computational Algebra encompasses a set of powerful algorithms for studying ideals in polynomial rings and solving systems of nonlinear polynomial equations efficiently. The theory of Grobner bases is a cornerstone of Computational Algebra, since it provides us with a constructive way of computing a kind of a particular basis of an ideal which enjoys some important properties. In this paper we introduce the concept of Hadamard ideals in order to establish a new approach to the construction of Hadamard matrices with circulant core. Hadamard ideals …


Hadamard Ideals And Hadamard Matrices With Two Circulant Cores, I. S. Kotsireas, C. Koukouvinos, Jennifer Seberry Jul 2006

Hadamard Ideals And Hadamard Matrices With Two Circulant Cores, I. S. Kotsireas, C. Koukouvinos, Jennifer Seberry

Faculty of Informatics - Papers (Archive)

We apply Computational Algebra methods to the construction of Hadamard matrices with two circulant cores, given by Fletcher, Gysin and Seberry. We introduce the concept of Hadamard ideal, to systematize the application of Computational Algebra methods for this construction. We use the Hadamard ideal formalism to perform exhaustive search constructions of Hadamard matrices with two circulant cores for the twelve orders 8, 12, 16, 20, 24, 28, 32, 36, 40, 44, 48, 52. The total number of such Hadamard matrices is proportional to the square of the parameter. We use the Hadamard ideal formalism to compute the proportionality constants for …


Synchronized Flicker Measurement For Flicker Transfer Evaluation In Power Systems, S. Perera, Duane Robinson, S. Elphick, D. Geddey, N. Browne, V. Smith, V. J. Gosbell Jul 2006

Synchronized Flicker Measurement For Flicker Transfer Evaluation In Power Systems, S. Perera, Duane Robinson, S. Elphick, D. Geddey, N. Browne, V. Smith, V. J. Gosbell

Faculty of Informatics - Papers (Archive)

Voltage fluctuations caused by rapidly changing loads, such as arc furnaces, can propagate to different parts of a power system. Although the flicker level at its origin can be high, levels that are measured at other sites are subject to attenuation, a process that is influenced by fault levels, transformer impedances, line impedances, and composition of the connected loads. This paper presents the methodology, measurement results, and data analysis in relation to synchronized flicker measurements carried out in a high-voltage (HV)/medium-voltage (MV) power system which contains an arc furnace supplied by a dedicated feeder connected to the HV busbar. The …


A Pixel-Based Robust Image Watermarking System, Wenming Lu, Wanqing Li, Rei Safavi-Naini, Philip Ogunbona Jul 2006

A Pixel-Based Robust Image Watermarking System, Wenming Lu, Wanqing Li, Rei Safavi-Naini, Philip Ogunbona

Faculty of Informatics - Papers (Archive)

Robust image watermarking systems are required to be resistant to geometric attacks in addition to common image processing tasks, such as JPEG compression. However, robustness against geometric attacks, such as rotation, scaling and translation, still remains one of the most challenging research topics in image watermarking. We propose a new pixel-based watermarking system in which a binary logo is embedded, a bit per pixel, in the pixel domain of an image. The encoder of the proposed system is based on a sliding window embedding scheme that applies the local average quantization index modulation (QIM), to achieve geometric attack robustness. The …


On-Demand Partial Schema Delivery For Multimedia Metadata, S. J. Davis, I. S. Burnett Jul 2006

On-Demand Partial Schema Delivery For Multimedia Metadata, S. J. Davis, I. S. Burnett

Faculty of Informatics - Papers (Archive)

XML is a popular approach to interoperable exchange of Multimedia metadata between a wide range of devices. This paper explores extending the use of the Remote XML Exchange Protocol (previously proposed by the authors) as a mechanism to provide efficient interaction with complex Multimedia XML documents and their associated schemas. This is particularly applicable to users with limited application complexity devices and/or limited bandwidth connections. Many XML documents do not fully utilize all the information present in a given schema; thus, users download substantial redundant information for the current application. This paper introduces the use of RXEP for the transmission …


Format-Independent Multimedia Streaming, Joseph Thomas-Kerr, I. Burnett, C. H. Ritz Jul 2006

Format-Independent Multimedia Streaming, Joseph Thomas-Kerr, I. Burnett, C. H. Ritz

Faculty of Informatics - Papers (Archive)

The Bitstream Binding Language (BBL) is a new technology developed by the authors and being standardized by MPEG, which describes how multimedia content and metadata can be mapped onto streaming formats. This paper describes a particular application of BBL - format-independent multimedia streaming. This means that streaming servers no longer require additional software modules in order to support new content formats as they are introduced. Instead, the server requires only a BBL description of the mapping between the content format and the stream, and any content in the new format may then be delivered by the streaming server. This approach …


Protecting Privacy With The Mpeg-21 Ipmp Framework, N. P. Sheppard, R. Safavi-Naini Jun 2006

Protecting Privacy With The Mpeg-21 Ipmp Framework, N. P. Sheppard, R. Safavi-Naini

Faculty of Informatics - Papers (Archive)

A number of authors have observed a duality between privacy protection and copyright protection, and, in particular, observed how digital rights management technology may be used as the basis of a privacy protection system. In this paper, we describe our experiences in implementing a privacy protection system based on the Intellectual Property Management and Protection ("IPMP") components of the MPEG-21 Multimedia Framework. Our approach allows individuals to express their privacy preferences in a way enabling automatic enforcement by data users' computers. This required the design of an extension to the MPEG Rights Expression Language to cater for privacy applications, and …


Stc-Mimo Block Spread Ofdm In Frequency Selective Rayleigh Fading Channels, Le Chung Tran, Xiaojing Huang, E. Dutkiewicz, Joe F. Chicharo Jun 2006

Stc-Mimo Block Spread Ofdm In Frequency Selective Rayleigh Fading Channels, Le Chung Tran, Xiaojing Huang, E. Dutkiewicz, Joe F. Chicharo

Faculty of Informatics - Papers (Archive)

In this paper, we expand the idea of spreading the transmitted symbols in OFDM systems by unitary spreading matrices based on the rotated Hadamard or rotated Discrete Fourier Transform (DFT) matrices proposed in the literature to apply to Space-Time Coded Multiple-Input Multiple- Output OFDM (STC-MIMO-OFDM) systems. We refer the resulting systems to as STC-MIMO Block Spread OFDM (STC-MIMO-BOFDM) systems. In the proposed systems, a multi-dimensional diversity, including time, frequency, space and modulation diversities, can be used, resulting in better bit error performance in frequency selective Rayleigh fading channels compared to the conventional OFDM systems with or without STCs. Simulations carried …


Understanding The Adoption Of Clusters By Smes Using Innovation Theory, Y. R. Kim Chung, William Tibben Jun 2006

Understanding The Adoption Of Clusters By Smes Using Innovation Theory, Y. R. Kim Chung, William Tibben

Faculty of Informatics - Papers (Archive)

SMEs-clustering has been of considerable interest over the last decade and is associated with regional development. The Australian government advocates the formation of SMEs cluster thereby encouraging SMEs to achieve competitive advantage through globalisation. However, the notion of SMEs clusters involves some issues in terms of its adoption by SMEs. Firstly, most academic research shows that SMEs cluster has been treated as a phenomenon in the economy and that its foundation lacks a theoretical perspective. Secondly, there is a lack of understanding of SME clusters in general. Much of the literature on SMEs and clusters has primarily addressed the benefit …


The Challenges For The Adoption Of M-Health, Ping Yu, M. X. Wu, H. Yu, G. C. Xiao Jun 2006

The Challenges For The Adoption Of M-Health, Ping Yu, M. X. Wu, H. Yu, G. C. Xiao

Faculty of Informatics - Papers (Archive)

The potential benefit of mobile and wireless information technology for healthcare service delivery, improving patient safety and reducing cost is increasingly recognized and emphasized. To contributing to the knowledge about critical factors determining the success of mobile health (m-Health) solutions, this study researched the driving force for the advancement of m-health solutions. The current advancement of m-health was reviewed. The challenges for developing and deploying m-health applications were addressed. The paper concluded in suggesting the most critical factor for the success of m-health. The method used for the study was literature research, market scan and analysis.


From Bpel4ws Process Model To Full Owl-S Ontology, M. A. Aslam, S. Auer, J. Shen Jun 2006

From Bpel4ws Process Model To Full Owl-S Ontology, M. A. Aslam, S. Auer, J. Shen

Faculty of Informatics - Papers (Archive)

BPEL4WS is one of the most utilized business process development languages. It can be used to develop executable business processes as a combination of Web Services interactions in a specific sequence called process flow. But still BPEL4WS lacks sufficient representation of business process semantics required for business processes automation. On the other hand OWL-S (OWL for Web Services) is designed to present such kind of semantic information. There exists similarity in the conceptual model of OWL-S and BPEL4WS that can be used to overcome this lack of semantics in BEPL4WS by mapping the BPEL4WS process model to the OWL-S ontology. …


Combinatorial Structures For Design Of Wireless Sensor Networks, Dibyendu Chakrabarti, Jennifer Seberry Jun 2006

Combinatorial Structures For Design Of Wireless Sensor Networks, Dibyendu Chakrabarti, Jennifer Seberry

Faculty of Informatics - Papers (Archive)

Combinatorial designs are very effective tools for managing keys in an infrastructure where power and memory are two major constraints. None of the present day wireless technologies takes the advantage of combinatorial designs. In this paper, we have proposed a general framework using combinatorial designs which will enable the participating devices to communicate securely among themselves with little memory and power overhead. The scheme caters for different kinds of user requirements and allows the designer to choose different combinatorial designs for different parts or levels of the network. This general framework will find application in all wireless radio technologies, typically …


Towards Chipification: The Multifunctional Body Art Of The Net Generation, Katina Michael, M G. Michael Jun 2006

Towards Chipification: The Multifunctional Body Art Of The Net Generation, Katina Michael, M G. Michael

Faculty of Informatics - Papers (Archive)

This paper considers the trajectory of the microchip within the context of converging disciplines to predict the realm of likely possibilities in the shortterm future of the technology. After presenting the evolutionary development from first generation to fourth generation wearable computing, a case study on medical breakthroughs using implantable devices is presented. The findings of the paper suggest that before too long, implantable devices will become commonplace for everyday humancentric applications. The paradigm shift is exemplified in the use of microchips, from their original purpose in identifying humans and objects to its ultimate trajectory with multifunctional capabilities buried within the …


Ict Professionals’ Perceptions Of Responsibility For Breaches Of Computer Security , M. Barrett, K. Garrety, Jennifer Seberry Jun 2006

Ict Professionals’ Perceptions Of Responsibility For Breaches Of Computer Security , M. Barrett, K. Garrety, Jennifer Seberry

Faculty of Informatics - Papers (Archive)

With ubiquitous computer use and networking, concerns about security breaches have intensified. However the human element in security, especially perceptions of responsibility, is less well understood than technological solutions, and both are needed. Previous studies focus on ‘regular’ users rather than ICT specialists. This paper reports on a scenario-based survey of ICT professionals comparing their views on responsibility for typical and serious computer security breaches with what they believe senior, non computer-skilled managers believe. Results showed that ICT professionals are actually tougher on themselves than they think management would be and regard computer security as ‘their job’, yet feel misunderstood …


The Hybridization Of Automatic Identification Techniques In Mass Market Applications: Towards A Model Of Coexistence, Katina Michael, M. G. Michael, Holly Tootell, V. Baker Jun 2006

The Hybridization Of Automatic Identification Techniques In Mass Market Applications: Towards A Model Of Coexistence, Katina Michael, M. G. Michael, Holly Tootell, V. Baker

Faculty of Informatics - Papers (Archive)

The number and type of automatic identification technologies in the market have grown since the bar code was introduced in the retail sector in the late 1960s. This paper studies the selection environment of auto-ID and defines, describes and gives examples of three main patterns of innovation: migration, integration, and convergence. The findings indicate that technology adoption is not always about choosing the dominant design but about how to future-proof an auto-ID implementation. Enterprises wishing to adopt auto-ID techniques need to be aware that technology is not static, auto-ID techniques are not stand-alone, and consumers may have wide-ranging requirements for …


The Emerging Ethics Of Humancentric Gps Tracking And Monitoring, Katina Michael, Andrew Mcnamee, M G. Michael Jun 2006

The Emerging Ethics Of Humancentric Gps Tracking And Monitoring, Katina Michael, Andrew Mcnamee, M G. Michael

Faculty of Informatics - Papers (Archive)

The Global Positioning System (GPS) is increasingly being adopted by private and public enterprise to track and monitor humans for location-based services (LBS). Some of these applications include personal locators for children, the elderly or those suffering from Alzheimer’s or memory loss, and the monitoring of parolees for law enforcement, security or personal protection purposes. The continual miniaturization of the GPS chipset means that receivers can take the form of wristwatches, mini mobiles and bracelets, with the ability to pinpoint the longitude and latitude of a subject 24/7/365. This paper employs usability context analyses to draw out the emerging ethical …


Location-Based Intelligence – Modeling Behavior In Humans Using Gps, Katina Michael, Andrew Mcnamee, M G. Michael, Holly Tootell Jun 2006

Location-Based Intelligence – Modeling Behavior In Humans Using Gps, Katina Michael, Andrew Mcnamee, M G. Michael, Holly Tootell

Faculty of Informatics - Papers (Archive)

This paper introduces the notion of location-based intelligence by tracking the spatial properties and behavior of a single civilian participant over a two-week study period using a global positioning system (GPS) receiver, and displaying them on a geographic information system (GIS). The paper clearly shows the power of combining speed (S), distance (D), time (T) and elevation (E) data with the exact longitude and latitude position of the user. The issues drawn from the observation and the civilian’s personal diary are useful in understanding the social implications of tracking and monitoring objects and subjects using GPS. The findings show that …


Complementary Properties Of Hadamard Matrices, Xiaojing Huang Jun 2006

Complementary Properties Of Hadamard Matrices, Xiaojing Huang

Faculty of Informatics - Papers (Archive)

This paper demonstrates and compares the complementary properties of two types of Hadamard matrices, i.e., the Walsh-Hadamard matrix and the Golay-paired Hadamard matrix. A simple process is also proposed to construct mutually orthogonal Walsh-Hadamard matrices and mutually orthogonal Golay-paired Hadamard matrices, which represent respectively a collection of mutually orthogonal complementary sets of sequences. Examples are given to verify the relationships between the two types of Hadamard matrices and illustrate the completeness and scalability of the constructed mutually orthogonal complementary sets of sequences.


An Impulse Ultra-Wideband System Capable Of Concurrent Transmission And Reception, Part I: Requirements And Innovations, Xiaojing Huang, Darryn Lowe, Ricardo Gandia, Eryk Dutkiewicz Jun 2006

An Impulse Ultra-Wideband System Capable Of Concurrent Transmission And Reception, Part I: Requirements And Innovations, Xiaojing Huang, Darryn Lowe, Ricardo Gandia, Eryk Dutkiewicz

Faculty of Informatics - Papers (Archive)

This paper presents a novel ultra-wideband (UWB) system for low power, long range, mid to high data rate mesh networking applications. Combined with the complementary code division multiplexing modulation and the multicode interleaved direct sequence spread spectrum techniques, the system aims to achieve interference resistance, coexistence with legacy systems, and robust performance in hostile multipath environments. The unique feature of the system is the support for concurrent transmission and reception, which will enable a medium access control mechanism with cut-through routing to be developed for high-throughput UWB mesh networks. It is concluded that this new UWB system represents a fundamental …


An Impulse Ultra-Wideband System Capable Of Concurrent Transmission And Reception, Part Ii: Design And Performance, Xiaojing Huang, Darryn Lowe, Ricardo Gandia, Eryk Dutkiewicz Jun 2006

An Impulse Ultra-Wideband System Capable Of Concurrent Transmission And Reception, Part Ii: Design And Performance, Xiaojing Huang, Darryn Lowe, Ricardo Gandia, Eryk Dutkiewicz

Faculty of Informatics - Papers (Archive)

This second part of the paper presents the system design and performance simulation results of a novel ultra-wideband (UWB) system developed for low power, long range, mid to high data rate mesh networking applications. Firstly, the transceiver architecture is described, and the system parameters are selected and justified. Then, the physical layer (PHY) protocol is introduced briefly. Finally, the simulation results regarding the system performance with different data rates in Gaussian and multipath channels are given. It is concluded that the designed transceiver architecture and PHY protocol are adequate and the developed receiver algorithms are feasible for practical implementation.


Understanding The Erp Investment Decision, V. Baker Jun 2006

Understanding The Erp Investment Decision, V. Baker

Faculty of Informatics - Papers (Archive)

This paper investigates the multi-million dollar decisions that organizations undertake when they decide to invest in ERP systems. The focus is on the recent decision made by a large manufacturing organization in Australia, to invest in ERP. Many issues surrounding ERP as a source of competitive advantage are brought to light and approaches to solving the complex investment problems are posed.


Comments On Sample Design For Proposed Australian Asthma Survey, Robert Graham Clark Jun 2006

Comments On Sample Design For Proposed Australian Asthma Survey, Robert Graham Clark

Faculty of Informatics - Papers (Archive)

The proposed design for the Australian Asthma Survey involves: a phone or face-toface screening interview with approximately 20,000 responding adults, followed by an in-depth interview and objective testing of all asthmatics and 1/10th of nonasthmatics in the screen. This report elaborates on sample design options based on the aims and approaches in the Australian Asthma Survey Proposal. The main requirement affecting the sample design is the need for a relatively small number of objective testing centres to be able to service the whole sample. This report considered a number of options where the sample was clustered in only 25 Statistical …


An Overview On The Integrated Ip Optical Data Control Plane In The Optical Transport Network, S. Chen Jun 2006

An Overview On The Integrated Ip Optical Data Control Plane In The Optical Transport Network, S. Chen

Faculty of Informatics - Papers (Archive)

In recent years, the Optical Transport Network (OTN) systems have been introduced widely, however, wide adoption has been limited due to the immature infrastructural issues. The OTN infrastructure takes the responsibility of data and signal transmission for substratal layer, as well as provides carrying and maintaining services (mostly the IP-based traffic today) through an optical data transport control plane. Thus, this paper focuses on the latest OTN data control plane and therefore gives a comprehensive introduction on the integrated IP Optical peer control plane.