Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

2003

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 571 - 600 of 3876

Full-Text Articles in Physical Sciences and Mathematics

ความร่วมมือด้านการขนส่งลำน้ำในเอเชียตะวันออกเฉียงใต้, ระหัตร โรจนประดิษฐ์ Oct 2003

ความร่วมมือด้านการขนส่งลำน้ำในเอเชียตะวันออกเฉียงใต้, ระหัตร โรจนประดิษฐ์

Thai Environment

No abstract provided.


การจัดการน้ำเสียในมหาวิทยาลัย, นุชนาถ แช่มช้อย Oct 2003

การจัดการน้ำเสียในมหาวิทยาลัย, นุชนาถ แช่มช้อย

Thai Environment

No abstract provided.


สัมภาษณ์ : สภาเครือข่ายเยาวชนสิ่งแวดล้อมแห่งชาติ (Thai Yen), สิริพร แก่นสียา Oct 2003

สัมภาษณ์ : สภาเครือข่ายเยาวชนสิ่งแวดล้อมแห่งชาติ (Thai Yen), สิริพร แก่นสียา

Thai Environment

No abstract provided.


พ.ร.บ. สิ่งบ่งชี้ทางภูมิศาสตร์, สิริพร แก่นสียา Oct 2003

พ.ร.บ. สิ่งบ่งชี้ทางภูมิศาสตร์, สิริพร แก่นสียา

Thai Environment

No abstract provided.


ระบบทะเบียนการปลดปล่อยมลพิษสู่สิ่งแวดล้อม, สุรเชษฐ์ พิทยาพิบูลพงศ์ Oct 2003

ระบบทะเบียนการปลดปล่อยมลพิษสู่สิ่งแวดล้อม, สุรเชษฐ์ พิทยาพิบูลพงศ์

Thai Environment

No abstract provided.


การปกป้องอ่าว Aqaba เมือง Eilat, กนกธร ดำรงวัฒน Oct 2003

การปกป้องอ่าว Aqaba เมือง Eilat, กนกธร ดำรงวัฒน

Thai Environment

No abstract provided.


มุมมองการจัดการทรัพยากรธรรมชาติและสิ่งแวดล้อม ในทัศนะของประชาชน, สิริพร แก่นสียา Oct 2003

มุมมองการจัดการทรัพยากรธรรมชาติและสิ่งแวดล้อม ในทัศนะของประชาชน, สิริพร แก่นสียา

Thai Environment

No abstract provided.


สิ่งแวดล้อมน่ารู้ Oct 2003

สิ่งแวดล้อมน่ารู้

Thai Environment

No abstract provided.


สร้างโลกสวย Oct 2003

สร้างโลกสวย

Thai Environment

No abstract provided.


Safe Robot Driving In Cluttered Environments, Chuck Thorpe, Justin Carlson, Dave Duggins, Jay Gowdy, Rob Maclachlan, Christoph Mertz, Arne Suppe, Bob Wang Oct 2003

Safe Robot Driving In Cluttered Environments, Chuck Thorpe, Justin Carlson, Dave Duggins, Jay Gowdy, Rob Maclachlan, Christoph Mertz, Arne Suppe, Bob Wang

Research Collection School Of Computing and Information Systems

The Navlab group at Carnegie Mellon University has a long history of development of automated vehicles and intelligent systems for driver assistance. The earlier work of the group concentrated on road following, cross-country driving, and obstacle detection. The new focus is on short-range sensing, to look all around the vehicle for safe driving. The current system uses video sensing, laser rangefinders, a novel light-stripe rangefinder, software to process each sensor individually, and a map-based fusion system. The complete system has been demonstrated on the Navlab 11 vehicle for monitoring the environment of a vehicle driving through a cluttered urban environment, …


Making The Key Agreement Protocol In Mobile Ad Hoc Network More Efficient, Gang Yao, Kui Ren, Feng Bao, Robert H. Deng, Dengguo Feng Oct 2003

Making The Key Agreement Protocol In Mobile Ad Hoc Network More Efficient, Gang Yao, Kui Ren, Feng Bao, Robert H. Deng, Dengguo Feng

Research Collection School Of Computing and Information Systems

Mobile ad hoc networks offer convenient infrastructureless communications over the shared wireless channel. However, the nature of mobile ad hoc networks makes them vulnerable to security attacks, such as passive eavesdropping over the wireless channel and denial of service attacks by malicious nodes. To ensure the security, several cryptography protocols are implemented. Due to the resource scarcity in mobile ad hoc networks, the protocols must be communication efficient and need as less computational power as possible. Broadcast communication is an important operation for many application in mobile ad hoc networks. To securely broadcast a message, all the members in the …


An Efficient Known Plaintext Attack On Fea-M, Hongjun Wu, Feng Bao, Robert H. Deng Oct 2003

An Efficient Known Plaintext Attack On Fea-M, Hongjun Wu, Feng Bao, Robert H. Deng

Research Collection School Of Computing and Information Systems

Yi et al. have proposed a cipher called the fast encryption algorithm for multimedia (FEA-M). Recently Mihaljevi and Kohno pointed out that FEA-M is insecure. However, their attacks are not efficient: their chosen plaintext attack and known plaintext attack require 237-bit chosen plaintext and 260-bit known plaintext, respectively. In this paper we give an efficient known plaintext attack against FEA-M. Our attack requires only 228-bit known plaintext and about 233 XOR operations.


Validating Digital Signatures Without Ttp’S Time-Stamping And Certificate Revocation, Jianying Zhou, Feng Bao, Robert H. Deng Oct 2003

Validating Digital Signatures Without Ttp’S Time-Stamping And Certificate Revocation, Jianying Zhou, Feng Bao, Robert H. Deng

Research Collection School Of Computing and Information Systems

In non-repudiation services where digital signatures usually serve as irrefutable cryptographic evidence for dispute resolution, trusted time-stamping and certificate revocation services, although very costly in practice, must be available, to prevent big loss due to compromising of the signing key. In [12], a new concept called intrusion-resilient signature was proposed to get rid of trusted time-stamping and certificate revocation services and a concrete scheme was presented. In this paper, we put forward a new scheme that can achieve the same effect in a much more efficient way. In our scheme, forward-secure signature serves as a building block that enables signature …


An Efficient Public-Key Framework, Jianying Zhou, Feng Bao, Robert H. Deng Oct 2003

An Efficient Public-Key Framework, Jianying Zhou, Feng Bao, Robert H. Deng

Research Collection School Of Computing and Information Systems

Public-key certificates play an important role in binding the public key with the identity of the owner of the corresponding private key. A certificate might be revoked before its scheduled expiry date by the issuing CA. Efficient and timely distribution of certificate revocation information is a big challenge facing the PKI providers. Existing certificate revocation schemes place a considerable processing, communication, and storage overheads on the CA as well as the relying parties. To improve the current situation, we propose a revocation-free public-key framework, in which the maximum lifetime of a certificate is divided into short periods and the certificate …


Security Remarks On A Group Signature Scheme With Member Deletion, Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng Oct 2003

Security Remarks On A Group Signature Scheme With Member Deletion, Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng

Research Collection School Of Computing and Information Systems

A group signature scheme allows a group member of a given group to sign messages on behalf of the group in an anonymous and unlinkable fashion. In case of a dispute, however, a designated group manager can reveal the signer of a valid group signature. Based on the Camenisch-Michels group signature scheme, Kim, Lim and Lee proposed the first group signature scheme with a member deletion procedure at ICISC 2000. Their scheme is very efficient in both communication and computation aspects. Unfortunately, their scheme is insecure. In this paper, we first identify an effective way that allows any verifier to …


Variations Of Diffie-Hellman Problem, Feng Bao, Robert H. Deng, Huafei Zhu Oct 2003

Variations Of Diffie-Hellman Problem, Feng Bao, Robert H. Deng, Huafei Zhu

Research Collection School Of Computing and Information Systems

This paper studies various computational and decisional Diffie-Hellman problems by providing reductions among them in the high granularity setting. We show that all three variations of computational Diffie-Hellman problem: square Diffie-Hellman problem, inverse Diffie-Hellman problem and divisible Diffie-Hellman problem, are equivalent with optimal reduction. Also, we are considering variations of the decisional Diffie-Hellman problem in single sample and polynomial samples settings, and we are able to show that all variations are equivalent except for the argument DDH ⇐ SDDH. We are not able to prove or disprove this statement, thus leave an interesting open problem. Keywords: Diffie-Hellman problem, Square Diffie-Hellman …


Multi-Agent Coalition Via Autonomous Price Negotiation In A Real-Time Web Environment, Hoong Chuin Lau, Wei Sian Lim Oct 2003

Multi-Agent Coalition Via Autonomous Price Negotiation In A Real-Time Web Environment, Hoong Chuin Lau, Wei Sian Lim

Research Collection School Of Computing and Information Systems

In e-marketplaces, customers specify job requests in real-time and agents form coalitions to service them. This paper proposes a protocol for self-interested agents to negotiate prices in forming successful coalitions. We propose and experiment with two negotiation schemes: one allows information sharing while the other does not.


Using Optical And Near-Infrared Photometry To Test Macho Lens Candidates, Ted Von Hippel, Et Al. Oct 2003

Using Optical And Near-Infrared Photometry To Test Macho Lens Candidates, Ted Von Hippel, Et Al.

Publications

We obtained new VLT/ISAAC H-band observations for five MACHO LMC source stars and adjacent LMC field regions. After combining our near-IR photometry with Hubble Space Telescope/PC BVRI optical photometry, we compared the MACHO objects to the adjacent field stars in a variety of color-magnitude and color-color diagrams. These diagnostic diagrams were chosen to be sensitive to our hypothesis that at least some of the MACHO lenses were foreground Galactic disk or thick-disk M dwarfs. For the five lensed objects we studied, our hypothesis could be ruled out for main-sequence lens masses ≥0.1 M☉ for distances out to …


Toy Models For The Falling Chimney, Gabriele U. Varieschi, Kaoru Kamiya Oct 2003

Toy Models For The Falling Chimney, Gabriele U. Varieschi, Kaoru Kamiya

Physics Faculty Works

In this paper we review the theory of the ‘‘falling chimney,’’ which deals with the breaking in mid-air of tall structures when they fall to the ground. We show that these ruptures can be caused by either shear forces typically developing near the base, or by the bending of the structure which is caused primarily by the internal bending moment. In the latter case the breaking is more likely to occur between one-third and one-half of the height of the chimney. Small scale toy models are used to reproduce the dynamics of the falling chimney. By examining photos taken during …


Extensive Regional Atmospheric Hydrocarbon Pollution In The Southwestern United States, Lambert A. Doezema Oct 2003

Extensive Regional Atmospheric Hydrocarbon Pollution In The Southwestern United States, Lambert A. Doezema

Chemistry and Biochemistry Faculty Works

Light alkane hydrocarbons are present in major quantities in the near-surface atmosphere of Texas, Oklahoma, and Kansas during both autumn and spring seasons. In spring 2002, maximum mixing ratios of ethane [34 parts per 109 by volume (ppbv)], propane (20 ppbv), and n-butane (13 ppbv) were observed in north-central Texas. The elevated alkane mixing ratios are attributed to emissions from the oil and natural gas industry. Measured alkyl nitrate mixing ratios were comparable to urban smog values, indicating active photochemistry in the presence of nitrogen oxides, and therefore with abundant formation of tropospheric ozone. We estimate that 4-6 teragrams of …


An Is Capstone Project: The Mywick Property Management System, Martha Myers Oct 2003

An Is Capstone Project: The Mywick Property Management System, Martha Myers

Faculty Articles

This paper describes a project suitable for use in an upper division course requiring the completion of analysis, design and implementation of a software system. It is especially useful for illustrating multiple cycles through the development process, as well as for integrating key concepts from a number of fundamental knowledge clusters in a typical undergraduate IS program of study. These knowledge clusters include database management, project management, programming principles, and system analysis and design. In the pilot class, students employed use case analysis as well as standard object-oriented techniques such as class diagrams and sequence diagrams. Students followed a modified …


Moore River : Catchment Appraisal 2003, A Alderman, M Clarke, Natural Heritage Trust (Australia), Moore River Catchment Support Team (Wa) Oct 2003

Moore River : Catchment Appraisal 2003, A Alderman, M Clarke, Natural Heritage Trust (Australia), Moore River Catchment Support Team (Wa)

Resource management technical reports

Using the Rapid Catchment Appraisal process, this report summarises current information for the Moore River catchment, Western Australia. The headwaters of the Moore River commence in Perenjori, Carnamah and Dalwallinu shires and drain southwards through Moora.


Annual Report To The Pastoral Lands Board Of Western Australia: 2002 / 2003 Financial Year, Rod Williams, Sandra Van Vreeswyk, Philip Thomas Oct 2003

Annual Report To The Pastoral Lands Board Of Western Australia: 2002 / 2003 Financial Year, Rod Williams, Sandra Van Vreeswyk, Philip Thomas

Natural resources published reports

The Department of Agriculture has prepared this Annual Report for the Pastoral Lands Board of Western Australia for the financial year 2002 – 2003. The report details trends in a number of indicators of importance to Western Australia’s rangelands.

The Department of Agriculture’s activities to the Board are outlined and environmental indicators are presented at the regional and property scales. New methodologies of pastoral lease inspections incorporating a categorisation model are also introduced. The integrated assessment processes incorporating rangeland resource and condition surveys, pastoral lease inspection processes, and WARMS provides land users with a sound information base from which informed …


Adaptive Collusion Attack To A Block Oriented Watermarking Scheme, Yongdong Wu, Robert H. Deng Oct 2003

Adaptive Collusion Attack To A Block Oriented Watermarking Scheme, Yongdong Wu, Robert H. Deng

Research Collection School Of Computing and Information Systems

In this paper, we propose an adaptive collusion attack to a block oriented watermarking scheme [1]. In this attack, traitors conspire to selectively manipulate watermarked blocks to remove the watermark information. To this end, the traitors compare the watermarked blocks generated from the same original block. If two watermarked block are not equal, they average these two blocks to generate a pirated block. Then, replace the watermarked blocks with the pirated blocks so as to build a pirated image. The pirated image has no watermark but has much higher quality than watermarked images. We also give a theoretical analysis on …


An Experimental Evaluation Of The Effects Of Scale On Oyster Reef Restoration, Mark W. Luckenbach, Paige G. Ross Oct 2003

An Experimental Evaluation Of The Effects Of Scale On Oyster Reef Restoration, Mark W. Luckenbach, Paige G. Ross

Reports

We investigated the effects of spatial scale, ranging from 10’s of meters to several km’s, on the development of oyster populations and other reef-associated organisms during the early stage of reef restoration. Employing a block design, experimental reefs were constructed at four sites in the lower Rappahannock River, VA. We tested the effects of sites (scale ≈ 1 – 10 km), reef sizes (scale ≈ 100 m) and locations within reef (scale ≈ 10 m) on the settlement, survival and growth of oysters and on the abundance, biomass, species richness and diversity of developing communities utilizing the reefs.

The project …


High-Performance Architectures For Ip-Based Multihop 802.11 Networks, Arup Acharya, Archan Misra, Sorav Bansal Oct 2003

High-Performance Architectures For Ip-Based Multihop 802.11 Networks, Arup Acharya, Archan Misra, Sorav Bansal

Research Collection School Of Computing and Information Systems

The concept of a forwarding node, which receives packets from upstream nodes and then transmits these packets to downstream nodes, is a key element of any multihop network, wired or wireless. While high-speed IP router architectures have been extensively studied for wired networks, the concept of a "wireless IP router" has not been addressed so far. We examine the limitations of the IEEE 802.11 MAC protocol in supporting a low-latency and high-throughput IP datapath comprising multiple wireless LAN hops. We first propose a wireless IP forwarding architecture that uses MPLS with modifications to 802.11 MAC to significantly improve packet forwarding …


Automatic Video Summarization By Graph Modeling, Chong-Wah Ngo, Yu-Fei Ma, Hong-Jiang Zhang Oct 2003

Automatic Video Summarization By Graph Modeling, Chong-Wah Ngo, Yu-Fei Ma, Hong-Jiang Zhang

Research Collection School Of Computing and Information Systems

We propose a unified approach for summarization based on the analysis of video structures and video highlights. Our approach emphasizes both the content balance and perceptual quality of a summary. Normalized cut algorithm is employed to globally and optimally partition a video into clusters. A motion attention model based on human perception is employed to compute the perceptual quality of shots and clusters. The clusters, together with the computed attention values, form a temporal graph similar to Markov chain that inherently describes the evolution and perceptual importance of video clusters. In our application, the flow of a temporal graph is …


Unidirectional Cordic For Efficient Computation Of Trigonometric And Hyperbolic Functions, Satish Ravichandran Oct 2003

Unidirectional Cordic For Efficient Computation Of Trigonometric And Hyperbolic Functions, Satish Ravichandran

Electrical & Computer Engineering Theses & Dissertations

CORDIC (Coordinate Rotation Digital Computer) is an iterative algorithm to compute values of trigonometric, logarithmic and transcendental functions by performing vector rotations, which can be implemented with only shift and add operations in a digital system. CORDIC algorithms are extensively used in the areas of digital signal processing, digital image processing and artificial neural networks. A new technique, named unidirectional CORDIC, for efficient computation of trigonometric and hyperbolic functions is presented in this thesis. In the conventional CORDIC algorithm, the vector rotations are performed in both clockwise and counterclockwise directions, but in the unidirectional CORDIC the vectors are rotated only …


A Computer-Based Articulation Training Aid For Short Words (Cata), Mukund Devarajan Oct 2003

A Computer-Based Articulation Training Aid For Short Words (Cata), Mukund Devarajan

Electrical & Computer Engineering Theses & Dissertations

Several improvements in the vowel articulation training aid (VATA) are described, as well as the efforts to extend the visual feedback system to operate with short words in the form of consonant, vowel and consonant (CVC). The extended version of the visual feedback system is referred to as CATA (Computer-based Articulation Training Aid); the vowel version of the aid (VATA) only operates with ten American English monopthong vowels. Improvements in VATA include the use of a neural network (NN) recognizer method to prune a large database of vowel recordings to eliminate noisy and/or mispronounced tokens. The spectral jitter problem, previously …


Brownian Dynamics Simulation Studies Of Ion Throughput During Cellular Electroporation, Juan A. Gonzalez-Cuevas Oct 2003

Brownian Dynamics Simulation Studies Of Ion Throughput During Cellular Electroporation, Juan A. Gonzalez-Cuevas

Electrical & Computer Engineering Theses & Dissertations

The purpose of the present research work is to analyze the flow of ions through pores formed in the plasma membrane of biological cells during electroporation. In this regard, simulations have been conducted to track the movement of ions in 3-D space based on a Brownian dynamics model, which is mostly deterministic but has some stochastic properties to account for ionic scattering. From the Brownian dynamics simulations, it has been possible to estimate the pore's conductance as well as transport parameters such as the diffusion coefficient and mobility within the pore region, of which there is no experimental data currently …