Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

2012

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 541 - 570 of 12196

Full-Text Articles in Physical Sciences and Mathematics

A Cloud Based Information Integration Platform For Smart Cars, Yi Xu, Jun Yan Dec 2012

A Cloud Based Information Integration Platform For Smart Cars, Yi Xu, Jun Yan

Dr Jun Yan

Current in-car computers have limited processing capabilities, and the content in smart car applications is poor extension. Even more, tradition software install approach which was used in smart cars lacks neither economy nor convenience. To solve these issues, we introduced a Cloud based Information Integration Platform for Smart Cars that has the ability to encourage flexibility in smart cars and enhance the value of them. To achieve the smart control and information sharing in smart cars, the platform collects data on the CAN bus automatically, with the ability to process CAN bus messages in Clouds. The Smart Car Information Service …


Insc: An Iterative Negotiation Approach For Service Compositions, Q He, Yun Yang, Jun Yan, Hai Jin Dec 2012

Insc: An Iterative Negotiation Approach For Service Compositions, Q He, Yun Yang, Jun Yan, Hai Jin

Dr Jun Yan

The service-oriented paradigm offers support for engineering service-based systems (SBSs) based on service compositions. The selection of services with the aim to fulfil the quality constraints for SBSs and to achieve the optimisation goals is a critical and challenging issue. In particular, when the quality-of-service (QoS) constraints for a SBS are severe, it is often difficult to find an optimal solution for the SBS. Exploiting the competition among service providers can help SBS developers obtain favourable QoS offers for the component services of SBSs and increase the possibility of finding optimal solutions for the SBSs. In this paper, we present …


Design An Automatic Appointment System To Improve Patient Access To Primary Health Care, Hongxiang Hu, Ping Yu, Jun Yan Dec 2012

Design An Automatic Appointment System To Improve Patient Access To Primary Health Care, Hongxiang Hu, Ping Yu, Jun Yan

Dr Jun Yan

Advanced Access model has been introduced in general practice in the United States to improve patient access to primary health care services for more than ten years. It has brought in the benefits of eliminating service provider’s waiting lists, improving patients’ timely access to services and reducing no-show rate. However, to implement this model, practices need to collect relevant information, develop contingency plans and set up practice strategies to balance the provision of care and patient’s demand. These tasks are not always easy to achieve. Understanding the requirements and constraints for effective management of patient booking is essential for developing …


Towards Dynamic Formation Of Temporal Constraints For The Service Level Agreements Negotiation, Azlan Ismail, Jun Yan, Jun Shen Dec 2012

Towards Dynamic Formation Of Temporal Constraints For The Service Level Agreements Negotiation, Azlan Ismail, Jun Yan, Jun Shen

Dr Jun Yan

SLAs play an important role for the QoS-driven service composition. Meanwhile, the temporal constraints are one of the main elements in the management of SLA especially in specifying the validity period of the QoS offers. In practice, the temporal constraints should be generated dynamically by taking the resource capability of the provider into account. The generation should consider various parameters that influence the resource capability such as the expected duration of the required Web service, the amount of current utilization, the amount of available resources, the number of required time slots, etc. Therefore, this paper aims to elaborate this issue …


Modeling Mobile Learning System Using Anfis, Ahmed Al-Hmouz, Jun Shen, Jun Yan, Rami Al-Hmouz Dec 2012

Modeling Mobile Learning System Using Anfis, Ahmed Al-Hmouz, Jun Shen, Jun Yan, Rami Al-Hmouz

Dr Jun Yan

Personalisation is becoming more important in the area of mobile learning. Learner model is logically partitioned into smaller elements or classes in the form of learner profiles, which can represent the entire learning process. Machine learning techniques have the ability to detect patterns from complicated data and learn how to perform activities based on learner profiles. This paper focuses on a systematic approach in reasoning the learner contexts to deliver adaptive learning content. A fuzzy rule base model that has been proposed in related work is found insufficient in deciding all possible conditions. To tackle this problem, this paper adopts …


Kernel Density Estimation Of Traffic Accidents In A Network Space, Zhixiao Xie, Jun Yan Dec 2012

Kernel Density Estimation Of Traffic Accidents In A Network Space, Zhixiao Xie, Jun Yan

Dr Jun Yan

A standard planar Kernel Density Estimation (KDE) aims to produce a smooth density surface of spatial point events over a 2-D geographic space. However, the planar KDE may not be suited for characterizing certain point events, such as traffic accidents, which usually occur inside a 1-D linear space, the roadway network. This paper presents a novel network KDE approach to estimating the density of such spatial point events. One key feature of the new approach is that the network space is represented with basic linear units of equal network length, termed lixel (linear pixel), and related network topology. The use …


Computing Resource Prediction For Mapreduce Applications Using Decision Tree, Jing Piao, Jun Yan Dec 2012

Computing Resource Prediction For Mapreduce Applications Using Decision Tree, Jing Piao, Jun Yan

Dr Jun Yan

The cloud computing paradigm offer users access to computing resource in a pay-as-you-go manner. However, to both cloud computing vendors and users, it is a challenge to predict how much resource is needed to run an application in a cloud at a required level of quality. This research focuses on developing a model to predict the computing resource consumption of MapReduce applications in the cloud computing environment. Based on the Classified and Regression Tree (CART), the proposed approach derives knowledge of the relationship among the application features, quality of service, and amount of computing resource, from a small training. The …


Privacy Enhanced Data Outsourcing In The Cloud, Miao Zhou, Yi Mu, Willy Susilo, Jun Yan, Liju Dong Dec 2012

Privacy Enhanced Data Outsourcing In The Cloud, Miao Zhou, Yi Mu, Willy Susilo, Jun Yan, Liju Dong

Dr Jun Yan

How to secure outsourcing data in cloud computing is a challenging problem, since a cloud environment cannot been considered to be trusted. The situation becomes even more challenging when outsourced data sources in a cloud environment are managed by multiple outsourcers who hold different access rights. In this paper, we introduce an efficient and novel tree-based key management scheme that allows a data source to be accessed by multiple parties who hold different rights. We ensure that the database remains secure, while some selected data sources can be securely shared with other authorized parties.


New Constructions Of Osbe Schemes And Their Applications In Oblivious Access Control, Jinguang Han, Willy Susilo, Yi Mu, Jun Yan Dec 2012

New Constructions Of Osbe Schemes And Their Applications In Oblivious Access Control, Jinguang Han, Willy Susilo, Yi Mu, Jun Yan

Dr Jun Yan

Oblivious signature-based envelope (OSBE) schemes have demonstrated their potential applications in the protection of users privacy and rights. In an OSBE protocol, an encrypted message can only be decrypted by the receiver who holds a valid signature on a public message, while the sender (encrypter) does not know whether the receiver has the signature or not. Our major contributions in this work lie in the following aspects. We improve the notion of OSBE so that a valid credential holder cannot share his/her credential with other users (i. e., all-or-nothing non-transferability). We clarify the relationship between one-round OSBE and identity-based encryption …


Dynamic Trust Model For Federated Identity Management, Hao Gao, Jun Yan, Yi Mu Dec 2012

Dynamic Trust Model For Federated Identity Management, Hao Gao, Jun Yan, Yi Mu

Dr Jun Yan

The goal of federated identity management is to allow principals, such as identities and attributes, to be shared across trust boundaries based on established policies. Since current Single Sign-On (SSO) mechanism excessively relies on the specifications of Circle of Trust (CoT), the need for service collaboration from different domains is being addressed on CoT. For the motivating issue of the cross-domain SSO mechanism, we need an emergent dynamic trust list for calculating the trust parties, thus, the CoT specifications require an initial effort on enrolling members automatically to adapt to the dynamic open environment. In this paper, we propose a …


Towards Autonomous Service Level Agreement Negotiation For Adaptive Service Composition, Jun Yan, J. Zhang, J. Lin, M. Chhetri, S. Goh, R. Kowalczyk Dec 2012

Towards Autonomous Service Level Agreement Negotiation For Adaptive Service Composition, Jun Yan, J. Zhang, J. Lin, M. Chhetri, S. Goh, R. Kowalczyk

Dr Jun Yan

This paper reports innovative research aiming at supporting autonomous establishment and maintenance of service level agreements in order to guarantee end-to-end quality of service requirements for service composition provision. In this research, a set of interrelated service level agreements is established and maintained for a service composition, through autonomous agent negotiation. To enable this, an innovative framework is proposed in which agents on behalf of the service requestor and the service providers can negotiate service level agreements in a coordinated way. This framework also enables adaptive service level agreement re-negotiation in the dynamic and ever-changing service environment.


Wfms-Based Data Integration For E-Learning, Jianming Yong, Jun Yan, Xiaodi Huang Dec 2012

Wfms-Based Data Integration For E-Learning, Jianming Yong, Jun Yan, Xiaodi Huang

Dr Jun Yan

As more and more organisations and institutions are moving towards the e-learning strategy, more and more disparate data are distributed by different e-learning systems. How to effectively use this vast amount of distributed data becomes a big challenge. This paper addresses this challenge and works out a new mechanism to implement data integration for e-learning. A workflow management system based (WFMS-based) data integration model is contributed to the e-learning.


A P2p Based Service Flow System With Advanced Ontology-Based Service Profiles, J. Shen, Y. Yang, Jun Yan Dec 2012

A P2p Based Service Flow System With Advanced Ontology-Based Service Profiles, J. Shen, Y. Yang, Jun Yan

Dr Jun Yan

A peer-to-peer (p2p) based service flow management system, SwinDeW-S, could support decentralised Web service composition, deployment and enactment. However, traditional workflow definition languages, such as extended XPDL and service-oriented BPEL4WS, have become insufficient to specify business process semantics, especially the descriptions of inputs, outputs, preconditions and effects. In this paper, we propose a novel solution based on OWL-S, a semantic Web ontology language that leverages service discovery, invocation and negotiation more effectively. The enhanced SwinDeW-S architecture is adapted with advanced ontology-based service profiles, and it takes advantage of a well-developed profile generation tool, which translates the BPEL4WS process models to …


Efficient Oblivious Transfers With Access Control, Jinguang Han, Willy Susilo, Yi Mu, Jun Yan Dec 2012

Efficient Oblivious Transfers With Access Control, Jinguang Han, Willy Susilo, Yi Mu, Jun Yan

Dr Jun Yan

Oblivious transfer (OT) is a protocol where a receiver can obtain t-out-of-n services from the sender without releasing anything about his choices. OT can be used to protect user’s privacy. In principle, any user can interact with a server to request some services. This might allow some undesirable users to obtain services from the server. How to ensure that only the authorized receivers can obtain services obliviously is a daunting task. In this paper, we introduce oblivious signature based-on envelope (OSBE) to OT and propose two novel OT schemes, which only allow the legitimate receivers to obtain services obliviously. The …


Privacy-Preserved Access Control For Cloud Computing, Miao Zhou, Yi Mu, Willy Susilo, Man Ho Allen Au, Jun Yan Dec 2012

Privacy-Preserved Access Control For Cloud Computing, Miao Zhou, Yi Mu, Willy Susilo, Man Ho Allen Au, Jun Yan

Dr Jun Yan

The problem of access control on outsourced data to "honest but curious" cloud servers has received considerable attention, especially in scenarios involving potentially huge sets of data files, where re-encryption and re-transmission by the data owner may not be acceptable. Considering the user privacy and data security in cloud environment, in this paper, we propose a solution to achieve flexible and fine-grained access control on outsourced data files. In particular, we look at the problem of defining and assigning keys to users based on different attribute sets, and hiding access policies as well as users information to the third-party cloud …


Location-Based Services In Emergency Management- From Government To Citizens: Global Case Studies, A. Aloudat, Katina Michael, Jun Yan Dec 2012

Location-Based Services In Emergency Management- From Government To Citizens: Global Case Studies, A. Aloudat, Katina Michael, Jun Yan

Dr Jun Yan

In emergencies governments have long utilised broadcasting media like radio and television to disseminate up-to-date real-time information to citizens. In the same context, however, some other technologies like mobile location-based services have not been utilised to full extent or potential. The value of such services could be foreseen in the case of critical situations where the coordination of emergency management procedures with location-awareness activities is paramount. This paper tracks the introduction of location-aware services in the realm of emergency management. It investigates case studies where text messaging has been exploited to deliver safety information and early warnings to users based …


Attribute-Based Oblivious Access Control, Jinguang Han, Willy Susilo, Yi Mu, Jun Yan Dec 2012

Attribute-Based Oblivious Access Control, Jinguang Han, Willy Susilo, Yi Mu, Jun Yan

Dr Jun Yan

In an attribute-based system (ABS), users are identified by various attributes, instead of their identities. Since its seminal introduction, the attribute-based mechanism has attracted a lot of attention. However, current ABS schemes have a number of drawbacks: (i) the communication cost is linear in the number of the required attributes; (ii) the computation cost is linear in the number of the required attributes and (iii) there are no efficient verification algorithms for the secret keys. These drawbacks limit the use of ABS in practice. In this paper, we propose an attribute-based oblivious access control (ABOAC) scheme to address these problems, …


Towards Collaborative Service Level Agreement Negotiation, Qiang He, Jun Yan, Yun Yang, Ryszard Kowalczyk, Hai Jin Dec 2012

Towards Collaborative Service Level Agreement Negotiation, Qiang He, Jun Yan, Yun Yang, Ryszard Kowalczyk, Hai Jin

Dr Jun Yan

A critical issue in the Service Level Agreement management for service composition is to control the relationship between the composite service and the component services in the negotiation. However, existing approaches are inefficient. This paper presents a novel agent-based collaborative approach to address this problem. We introduce a negotiation protocol, under which the agents on the service providers’ side collaborate by exchanging information with each other to gain global knowledge of the negotiation. The collaboration can facilitate the progress of the negotiation. We also discuss the corresponding impact on the decision making strategies.


A Cloud-Based Design Of Smart Car Information Services, Yi Xu, Jun Yan Dec 2012

A Cloud-Based Design Of Smart Car Information Services, Yi Xu, Jun Yan

Dr Jun Yan

"Although modern Smart Car technologies are growing rapidly, there are many challenges to be addressed. The limited processing capabilities of the contemporary in-car computers in smart cars may cause bottlenecks in smart control. The content in smart car applications can hardly be extended. In addition, the traditional software installation approach that is used in smart cars is neither economical nor convenient. To address these issues in smart cars, this paper presents a Cloud-based Information Integration Platform that has the ability to improve flexibility and enhance the value of smart cars. In this work, the architecture of the Cloud-based Information Integration …


An Extended Dual Concern Model For Partner Selection In Multi-Agent Systems, Minjie Zhang, Jun Yan, Fenghui Ren Dec 2012

An Extended Dual Concern Model For Partner Selection In Multi-Agent Systems, Minjie Zhang, Jun Yan, Fenghui Ren

Dr Jun Yan

No abstract provided.


Modelling And Simulation Of An Adaptive Neuro-Fuzzy Inference System (Anfis) For Mobile Learning, Ahmed Al-Hmouz, Jun Shen, Rami Al-Hmouz, Jun Yan Dec 2012

Modelling And Simulation Of An Adaptive Neuro-Fuzzy Inference System (Anfis) For Mobile Learning, Ahmed Al-Hmouz, Jun Shen, Rami Al-Hmouz, Jun Yan

Dr Jun Yan

With recent advances in mobile learning (m-learning), it is becoming possible for learning activities to occur everywhere. The learner model presented in our earlier work was partitioned into smaller elements in the form of learner profiles, which collectively represent the entire learning process. This paper presents an Adaptive Neuro-Fuzzy Inference System (ANFIS) for delivering adapted learning content to mobile learners. The ANFIS model was designed using trial and error based on various experiments. This study was conducted to illustrate that ANFIS is effective with hybrid learning, for the adaptation of learning content according to learners' needs. Study results show that …


Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption, Jinguang Han, Willy Susilo, Yi Mu, Jun Yan Dec 2012

Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption, Jinguang Han, Willy Susilo, Yi Mu, Jun Yan

Dr Jun Yan

Decentralized attribute-based encryption (ABE) is a variant of a multiauthority ABE scheme where each authority can issue secret keys to the user independently without any cooperation and a central authority. This is in contrast to the previous constructions, where multiple authorities must be online and setup the system interactively, which is impractical. Hence, it is clear that a decentralized ABE scheme eliminates the heavy communication cost and the need for collaborative computation in the setup stage. Furthermore, every authority can join or leave the system freely without the necessity of reinitializing the system. In contemporary multiauthority ABE schemes, a user's …


C*-Algebras Of Tilings With Infinite Rotational Symmetry, Michael F. Whittaker Dec 2012

C*-Algebras Of Tilings With Infinite Rotational Symmetry, Michael F. Whittaker

Dr Michael Whittaker

A tiling with infinite rotational symmetry, such as the Conway– Radin Pinwheel Tiling, gives rise to a topological dynamical system to which an etale equivalence relation is associated. A groupoid C¤-algebra for a tiling is produced and a separating dense set is exhibited in the C*-algebra which encodes the structure of the topological dynamical system. In the case of a substitution tiling, natural subsets of this separating dense set are used to define an AT-subalgebra of the C*-algebra. Finally our results are applied to the Pinwheel Tiling.


Threshold Anonymous Announcement In Vanets, Guilin Wang, L Chen, S. L. Ng Dec 2012

Threshold Anonymous Announcement In Vanets, Guilin Wang, L Chen, S. L. Ng

Dr Guilin Wang

Vehicular ad hoc networks (VANETs) allow wireless communications between vehicles without the aid of a central server. Reliable exchanges of information about road and traffic conditions allow a safer and more comfortable travelling environment. However, such profusion of information may allow unscrupulous parties to violate user privacy. On the other hand, a degree of auditability is desired for law enforcement and maintenance purposes. In this paper we propose a Threshold Anonymous Announcement service using direct anonymous attestation and one-time anonymous authentication to simultaneously achieve the seemingly contradictory goals of reliability, privacy and auditability.


An Efficient Certified E-Mail Scheme Suitable For Wireless Mobile Environments, Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng Dec 2012

An Efficient Certified E-Mail Scheme Suitable For Wireless Mobile Environments, Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng

Dr Guilin Wang

As security enhanced systems for standard e-mail, certified e-mail schemes guarantee the fair exchange of a digital message with the corresponding receipt between two mistrusted parties. That is, the intended receiver gets the e-mail content if and only if the e-mail sender obtains an irrefutable receipt issued by the receiver, which could be used to prove that the message has been delivered to the receiver. A number of such protocols have been proposed in recent years. However, most of them are not suitable for mobile networks, since many intricate cryptographic primitives are involved so that considerable overheads are introduced. In …


Security Analysis Of Two Signcryption Schemes, Guilin Wang, Robert H. Deng, Dongjin Kwak, Sangjae Moon Dec 2012

Security Analysis Of Two Signcryption Schemes, Guilin Wang, Robert H. Deng, Dongjin Kwak, Sangjae Moon

Dr Guilin Wang

Signcryption is a new cryptographic primitive that performs signing and encryption simultaneously, at a cost significantly lower than that required by the traditional signature-then-encryption approach. In this paper, we present a security analysis of two such schemes: the Huang-Chang convertible signcryption scheme, and the Kwak-Moon group signcryption scheme. Our results show that both schemes are insecure. Specifically, the Huang-Chang scheme fails to provide confidentiality, while the Kwak-Moon scheme does not satisfy the properties of unforgeability, coalition-resistance, and traceability.


Comments On "A Practical (T, N) Threshold Proxy Signature Scheme Based On The Rsa Cryptosystem", Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng Dec 2012

Comments On "A Practical (T, N) Threshold Proxy Signature Scheme Based On The Rsa Cryptosystem", Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng

Dr Guilin Wang

In a (t, n) threshold proxy signature scheme based on RSA, any t or more proxy signers can cooperatively generate a proxy signature while t-1 or fewer of them can't do it. The threshold proxy signature scheme uses the RSA cryptosystem to generate the private and the public key of the signers. In this article, we discuss the implementation and comparison of some threshold proxy signature schemes that are based on the RSA cryptosystem. Comparison is done on the basis of time complexity, space complexity and communication overhead. We compare the performance of four schemes: Hwang et al., Wen et …


Proxy Signature Scheme With Multiple Original Signers For Wireless E-Commerce Applications, Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng Dec 2012

Proxy Signature Scheme With Multiple Original Signers For Wireless E-Commerce Applications, Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng

Dr Guilin Wang

In a proxy signature scheme, a user delegates his/her signing capability to another user in such a way that the latter can sign messages on behalf of the former. We propose an efficient and secure proxy signature scheme with multiple original signers. Our scheme is suitable for wireless electronic commerce applications, since the overheads of computation and communication are low. As an example, we present an electronic air ticket booking scheme for wireless customers.


Improved Certificateless Signature Scheme Provably Secure In The Standard Model, Yong Yu, Yi Mu, Guilin Wang, Q Xia, B Yang Dec 2012

Improved Certificateless Signature Scheme Provably Secure In The Standard Model, Yong Yu, Yi Mu, Guilin Wang, Q Xia, B Yang

Dr Guilin Wang

Certificateless cryptography shares many features of identity-based cryptography and partially solves the problem of key escrow. Three certificateless signature schemes without random oracles were found in the literature. However, all the schemes suffer from some common drawbacks. First, by obtaining a signature on a message and replacing the public key of a signer, an adversary can forge valid signatures on the same message under the replaced public key. Secondly, all the schemes require a relatively large size of public parameters. The authors propose a new certificateless signature scheme, which exhibits an improvement on the existing schemes. Compared with the previous …


Provably Secure Single Sign-On Scheme In Distributed Systems And Networks, Jiangshan Yu, Guilin Wang, Yi Mu Dec 2012

Provably Secure Single Sign-On Scheme In Distributed Systems And Networks, Jiangshan Yu, Guilin Wang, Yi Mu

Dr Guilin Wang

Distributed systems and networks have been adopted by telecommunications, remote educations, businesses, armies and governments. A widely applied technique for distributed systems and networks is the single sign-on (SSO) which enables a user to use a unitary secure credential (or token) to access multiple computers and systems where he/she has access permissions. However, most existing SSO schemes have not been formally proved to satisfy credential privacy and soundness of credential based authentication. To overcome this drawback, we formalise the security model of single sign-on scheme with authenticated key exchange. Specially, we point out the difference between soundness and credential privacy, …