Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

2012

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 781 - 810 of 12197

Full-Text Articles in Physical Sciences and Mathematics

Swindew-S: Extending P2p Workflow Systems For Adaptive Composite Web Services, Jun Shen, Jun Yan, Yun Yang Dec 2012

Swindew-S: Extending P2p Workflow Systems For Adaptive Composite Web Services, Jun Shen, Jun Yan, Yun Yang

Dr Jun Shen

SwinDeW, an innovative decentralised workflow management system, has established an underlying framework for peer-to-peer (p2p) based business process coordination environments. SwinDeW-S extends SwinDeW to support adaptive composite service orchestration in the era of service-oriented computing. This paper comprehensively presents features of SwinDeW-S, including the p2p network establishment, the messaging mechanism, the service deployment and enactment, the service discovery and advertisement, and the service flow execution. The prototypical extension of SwinDeW to SwinDeW-S and the advantages of SwinDeW-S are also examined and analysed. With the innovative integration of service and p2p-based enterprise application techniques, SwinDeW-S can support composite service orchestration, deployment …


Guest Editorial Notes For Selected Papers From Soca 2010, Jun Shen, Soo-Dong Kim, Nalini Venkatasubramanian Dec 2012

Guest Editorial Notes For Selected Papers From Soca 2010, Jun Shen, Soo-Dong Kim, Nalini Venkatasubramanian

Dr Jun Shen

No abstract provided.


Towards Dynamic Formation Of Temporal Constraints For The Service Level Agreements Negotiation, Azlan Ismail, Jun Yan, Jun Shen Dec 2012

Towards Dynamic Formation Of Temporal Constraints For The Service Level Agreements Negotiation, Azlan Ismail, Jun Yan, Jun Shen

Dr Jun Shen

SLAs play an important role for the QoS-driven service composition. Meanwhile, the temporal constraints are one of the main elements in the management of SLA especially in specifying the validity period of the QoS offers. In practice, the temporal constraints should be generated dynamically by taking the resource capability of the provider into account. The generation should consider various parameters that influence the resource capability such as the expected duration of the required Web service, the amount of current utilization, the amount of available resources, the number of required time slots, etc. Therefore, this paper aims to elaborate this issue …


Modeling Mobile Learning System Using Anfis, Ahmed Al-Hmouz, Jun Shen, Jun Yan, Rami Al-Hmouz Dec 2012

Modeling Mobile Learning System Using Anfis, Ahmed Al-Hmouz, Jun Shen, Jun Yan, Rami Al-Hmouz

Dr Jun Shen

Personalisation is becoming more important in the area of mobile learning. Learner model is logically partitioned into smaller elements or classes in the form of learner profiles, which can represent the entire learning process. Machine learning techniques have the ability to detect patterns from complicated data and learn how to perform activities based on learner profiles. This paper focuses on a systematic approach in reasoning the learner contexts to deliver adaptive learning content. A fuzzy rule base model that has been proposed in related work is found insufficient in deciding all possible conditions. To tackle this problem, this paper adopts …


Adaptive Task Allocation For P2p-Based E-Services Composition, Jun Shen, Shuai Yuan Dec 2012

Adaptive Task Allocation For P2p-Based E-Services Composition, Jun Shen, Shuai Yuan

Dr Jun Shen

To effectively manage the task allocation, especially when handling with numerous different peers’ qualities, is one of the greatest challenges to be faced in order to guarantee the success of P2P-based e-services composition. In this context, various QoS descriptive frameworks and Web services technologies (such as WSDL and BPEL) are being considered as the most affordable solutions to promote the performance of decentralized e-services, through applying strategies like QoS ontologies and related optimization algorithms globally or locally. Nonetheless, most P2P-based service selection and composition approaches applied nowadays lack dynamism and autonomy. In this paper, we first propose an extension of …


From Bpel4ws Process Model To Full Owl-S Ontology, M. A. Aslam, S. Auer, J. Shen Dec 2012

From Bpel4ws Process Model To Full Owl-S Ontology, M. A. Aslam, S. Auer, J. Shen

Dr Jun Shen

BPEL4WS is one of the most utilized business process development languages. It can be used to develop executable business processes as a combination of Web Services interactions in a specific sequence called process flow. But still BPEL4WS lacks sufficient representation of business process semantics required for business processes automation. On the other hand OWL-S (OWL for Web Services) is designed to present such kind of semantic information. There exists similarity in the conceptual model of OWL-S and BPEL4WS that can be used to overcome this lack of semantics in BEPL4WS by mapping the BPEL4WS process model to the OWL-S ontology. …


A P2p Based Service Flow System With Advanced Ontology-Based Service Profiles, J. Shen, Y. Yang, Jun Yan Dec 2012

A P2p Based Service Flow System With Advanced Ontology-Based Service Profiles, J. Shen, Y. Yang, Jun Yan

Dr Jun Shen

A peer-to-peer (p2p) based service flow management system, SwinDeW-S, could support decentralised Web service composition, deployment and enactment. However, traditional workflow definition languages, such as extended XPDL and service-oriented BPEL4WS, have become insufficient to specify business process semantics, especially the descriptions of inputs, outputs, preconditions and effects. In this paper, we propose a novel solution based on OWL-S, a semantic Web ontology language that leverages service discovery, invocation and negotiation more effectively. The enhanced SwinDeW-S architecture is adapted with advanced ontology-based service profiles, and it takes advantage of a well-developed profile generation tool, which translates the BPEL4WS process models to …


Dynamic Selection Of Service Peers With Multiple Property Specifications, Jun Shen, Shuai Yuan, Aneesh Krishna Dec 2012

Dynamic Selection Of Service Peers With Multiple Property Specifications, Jun Shen, Shuai Yuan, Aneesh Krishna

Dr Jun Shen

Semantic Web services, one of the most significant areas in the emerging business process management systems, have attracted a great deal of effort from both academic and industry community. Traditional methodologies are still very inadequate to effectively and autonomously conduct service discovery and composition in a dynamic environment, as they seldom focus on dealing with real complex situations, such as simultaneously considering peers’ multiple specifications which reflect different properties of e-services. Different ontology based e-service profiles have been proposed to enhance service oriented framework for the total or partial automation of service invocation, discovery, selection and composition, which are involved …


Qos-Aware Service Selection In P2p-Based Business Process Frameworks, S. Yuan, J. Shen Dec 2012

Qos-Aware Service Selection In P2p-Based Business Process Frameworks, S. Yuan, J. Shen

Dr Jun Shen

With the advances and evolution of semantic Web services, service providers need to be more competitive, efficient, flexible, and integrated in the service network at different scenarios, including static and dynamic deployments and interactions. Recently, OWL-S and QoS-aware services have been distinguished due to their significance and their impact on decentralised network. JXTA and BPEL allow peers to cooperate and automate business processes and reengineer their structure, so as to rationally select and make use of all resource in decentralised environment; in addition, they increase efficiency and reduce costs. We incorporated several typical constraints to testify the possibility of the …


Expressing Business Process Model As Owl-S Ontologies, M. A. Aslam, S. Auer, J. Shen, M. Herrmann Dec 2012

Expressing Business Process Model As Owl-S Ontologies, M. A. Aslam, S. Auer, J. Shen, M. Herrmann

Dr Jun Shen

BPEL4WS is a well-established business process standard that can be used to orchestrate service-based workflows. However, the rapid growth and automation demands of e-business and grid applications require BPEL4WS to provide enhanced semantic annotations to achieve the goal of business processes automation. Here, OWL-S (OWL for Web Services) is designed to represent such kind of semantic information. Furthermore, there exists a similarity in the conceptual model of OWL-S and BPEL4WS that can be employed to overcome the lack of semantics in BPEL4WS by mapping the BPEL4WS process model to the OWL-S suite of ontologies. The mapped OWL-S service can be …


An Effective Data Aggregation Based Adaptive Long Term Cpu Load Predictions Mechanism On Computational Grid, Fang Dong, Junzhou Luo, Aibo Song, Jiuxin Cao, Jun Shen Dec 2012

An Effective Data Aggregation Based Adaptive Long Term Cpu Load Predictions Mechanism On Computational Grid, Fang Dong, Junzhou Luo, Aibo Song, Jiuxin Cao, Jun Shen

Dr Jun Shen

With the development of Internet-based technologies and the rapid growth of scientific computing applications, Grid computing becomes more and more attractive. Generally, the execution time of a CPU-intensive task on a certain resource is tightly related to the CPU load on this resource. In order to estimate the task execution time more accurately to achieve an effective task scheduling, it is significant to make an effective long-term load prediction in dynamic Grid environments. Nevertheless, as the prediction errors will be gradually accumulated while the best values of prediction parameters may vary vigorously, the existing prediction algorithms usually fail to achieve …


Modelling And Simulation Of An Adaptive Neuro-Fuzzy Inference System (Anfis) For Mobile Learning, Ahmed Al-Hmouz, Jun Shen, Rami Al-Hmouz, Jun Yan Dec 2012

Modelling And Simulation Of An Adaptive Neuro-Fuzzy Inference System (Anfis) For Mobile Learning, Ahmed Al-Hmouz, Jun Shen, Rami Al-Hmouz, Jun Yan

Dr Jun Shen

With recent advances in mobile learning (m-learning), it is becoming possible for learning activities to occur everywhere. The learner model presented in our earlier work was partitioned into smaller elements in the form of learner profiles, which collectively represent the entire learning process. This paper presents an Adaptive Neuro-Fuzzy Inference System (ANFIS) for delivering adapted learning content to mobile learners. The ANFIS model was designed using trial and error based on various experiments. This study was conducted to illustrate that ANFIS is effective with hybrid learning, for the adaptation of learning content according to learners' needs. Study results show that …


1891 Eruption Of Foerstner Volcano (Pantelleria, Sicily): Insights Into The Vent Structure Of Basaltic Balloon Eruptions, J. Kelly, S. Carey, K. Croff-Bell, C. Roman, M. Rosi, M. Marani, M. Pistolesi, E. Baker Dec 2012

1891 Eruption Of Foerstner Volcano (Pantelleria, Sicily): Insights Into The Vent Structure Of Basaltic Balloon Eruptions, J. Kelly, S. Carey, K. Croff-Bell, C. Roman, M. Rosi, M. Marani, M. Pistolesi, E. Baker

Christopher N. Roman

AGU session number V21A-2750.


Interative Discussion Leader (Idt) @ Futuregov Forum Queensland On The Theme Of "Mobile Government", Katina Michael, Erica Fensom Dec 2012

Interative Discussion Leader (Idt) @ Futuregov Forum Queensland On The Theme Of "Mobile Government", Katina Michael, Erica Fensom

Professor Katina Michael

Mobile Government Briefing: Provide services anywhere any time: - Transact to enable in-field data collection, request processing, order management, approvals, edits, updates and execute actions. - What are the implications for the incorporation of rich multimedia content on devices to better serve staff and citizens? - Addressing the security challenges of various risks around data access, data transmission, and data storage for BI architecture and mobile devices


Calipso Observations Of Transatlantic Dust: Vertical Stratification And Effect Of Clouds, W. Yang, A. Marshak, T. Varnai, O. V. Kalashnikova, A. Kostinski Dec 2012

Calipso Observations Of Transatlantic Dust: Vertical Stratification And Effect Of Clouds, W. Yang, A. Marshak, T. Varnai, O. V. Kalashnikova, A. Kostinski

Department of Physics Publications

We use CALIOP nighttime measurements of lidar backscatter, color and depolarization ratios, as well as particulate retrievals during the summer of 2007 to study transatlantic dust properties downwind of Saharan sources, and to examine the influence of nearby clouds on dust. Our analysis suggests that (1) under clear skies, while lidar backscatter and color ratio do not change much with altitude and longitude in the Saharan Air Layer (SAL), depolarization ratio increases with altitude and decreases westward in the SAL; (2) the vertical lapse rate of dust depolarization ratio, introduced here, increases within SAL as plumes move westward; (3) nearby …


Collaborative Research: Life Histories Of Species In The Genus Calanus In The North Atlantic And North Pacific Oceans And Responses To Climate Forcing, Jeffrey Runge, Andrew J. Pershing Dec 2012

Collaborative Research: Life Histories Of Species In The Genus Calanus In The North Atlantic And North Pacific Oceans And Responses To Climate Forcing, Jeffrey Runge, Andrew J. Pershing

University of Maine Office of Research Administration: Grant Reports

Species in the genus Calanus are predominant in the mesozooplankton of the North Atlantic and North Pacific Oceans. Their key role in marine food web interactions has been recognized in GLOBEC programs, both in the U.S. and internationally. Considerable knowledge of life history characteristics, including growth, reproduction, mortality, diapause behavior and demography has been acquired from both laboratory experiments and measurements at sea. This project reviews and synthesizes this knowledge and uses it to develop an Individual Based Life Cycle model for sibling species in two sympatric species pairs, C.marshallae and C. pacificus in the North Pacific Ocean and C. …


Strichartz Estimates And Maximal Operators For The Wave Equation In R^3, Marius Beceanu, Michael Goldberg Dec 2012

Strichartz Estimates And Maximal Operators For The Wave Equation In R^3, Marius Beceanu, Michael Goldberg

Mathematics and Statistics Faculty Scholarship

We prove sharp Strichartz-type estimates in three dimensions, including some which hold in reverse spacetime norms, for the wave equation with potential. These results are also tied to maximal operator estimates studied by Rogers--Villaroya, of which we prove a sharper version. As a sample application, we use these results to prove the local well-posedness and the global well-posedness for small initial data of semilinear wave equations in R^3 with quintic or higher monomial nonlinearities.


Defence In Depth, Protection In Depth And Security In Depth: A Comparative Analysis Towards A Common Usage Language, Michael Coole, Jeff Corkill, Andrew Woodward Dec 2012

Defence In Depth, Protection In Depth And Security In Depth: A Comparative Analysis Towards A Common Usage Language, Michael Coole, Jeff Corkill, Andrew Woodward

Australian Security and Intelligence Conference

A common language with consistency of meaning is a critical step in the evolution of a profession. Whilst the debate as to whether or not security should be considered a profession is ongoing there is no doubt that the wider community of professionals operating in the security domain are working towards achieving recognition of security as a profession. The concepts of defence in depth, protection in depth and security in depth have been used synonymously by different groups across the domain. These concepts represent the very foundation of effective security architecture are hierarchical in nature and have specific meaning. This …


Representing Variable Source Credibility In Intelligence Analysis With Bayesian Networks, Ken Mcnaught, Peter Sutovsky Dec 2012

Representing Variable Source Credibility In Intelligence Analysis With Bayesian Networks, Ken Mcnaught, Peter Sutovsky

Australian Security and Intelligence Conference

Assessing the credibility of an evidential source is an important part of intelligence analysis, particularly where human intelligence is concerned. Furthermore, it is frequently necessary to combine multiple items of evidence with varying source credibilities. Bayesian networks provide a powerful probabilistic approach to the fusion of information and are increasingly being applied in a wide variety of settings. In this paper we explore their application to intelligence analysis and provide a simple example concerning a potential attack on an infrastructure target. Our main focus is on the representation of source credibility. While we do not advocate the routine use of …


Creating A Counter-Insurgency Plan: Elements Required Based Upon A Comparative Analysis Of Research Findings, William J. Bailey Dec 2012

Creating A Counter-Insurgency Plan: Elements Required Based Upon A Comparative Analysis Of Research Findings, William J. Bailey

Australian Security and Intelligence Conference

The development of a counter-insurgency doctrine is an evolutionary process: no two insurgencies are the same. However, certain fundamental principals remain consistent and these can be applied to meet the required circumstances. The creation of an overarching plan encompassing a combination of military, political and social actions under the strong control of a single authority is central. Therefore, understanding the basics allows for the development of a tactical strategy based upon a structured plan. Compiling the ‘Plan’ should be based upon the lessons learnt from the past. To this end, the methodology used is supported by a literature review and …


Understanding The Vulnerabilities In Wi-Fi And The Impact On Its Use In Cctv Systems, Michael Coole, Andrew Woodward, Craig Valli Dec 2012

Understanding The Vulnerabilities In Wi-Fi And The Impact On Its Use In Cctv Systems, Michael Coole, Andrew Woodward, Craig Valli

Australian Security and Intelligence Conference

Modern surveillance devices are increasingly being taken off private networks and placed onto networks connected via gateway to the Internet or into Wi-Fi based local area wireless networks (LAWN). The devices are also increasingly using IPv4 and IPv6 network stacks and some form of embedded processing or compute built in. Additionally, some specialist devices are using assistive technologies such as GPS or A-GPS. This paper explored the issues with use of the technologies in a networked environment, both wireless and internetworked. Analysis of these systems shows that the use of IP based CCTV systems carries greater risk than traditional CCTV …


The Intelligence Game: Assessing Delphi Groups And Structured Question Formats, Bonnie Wintle, Steven Mascaro, Fiona Fidler, Marissa Mcbride, Mark Burgman, Louisa Flander, Geoff Saw, Charles Twardy, Aidan Lyon, Brian Manning Dec 2012

The Intelligence Game: Assessing Delphi Groups And Structured Question Formats, Bonnie Wintle, Steven Mascaro, Fiona Fidler, Marissa Mcbride, Mark Burgman, Louisa Flander, Geoff Saw, Charles Twardy, Aidan Lyon, Brian Manning

Australian Security and Intelligence Conference

In 2010, the US Intelligence Advanced Research Projects Activity (IARPA) announced a 4-year forecasting “tournament”. Five collaborative research teams are attempting to outperform a baseline opinion pool in predicting hundreds of geopolitical, economic and military events. We are contributing to one of these teams by eliciting forecasts from Delphi-style groups in the US and Australia. We elicit probabilities of outcomes for 3-5 monthly questions, such as: Will Australia formally transfer uranium to India by 1 June 2012? Participants submit probabilities in a 3-step interval format, view those of others in their group, share, rate and discuss information, and then make …


An Information Security Awareness Capability Model (Isacm), Robert Poepjes, Michael Lane Dec 2012

An Information Security Awareness Capability Model (Isacm), Robert Poepjes, Michael Lane

Australian Information Security Management Conference

A lack of information security awareness within some parts of society as well as some organisations continues to exist today. Whilst we have emerged from the threats of late 1990s of viruses such as Code Red and Melissa, through to the phishing emails of the mid 2000’s and the financial damage some such as the Nigerian scam caused, we continue to react poorly to new threats such as demanding money via SMS with a promise of death to those who won’t pay. So is this lack of awareness translating into problems within the workforce? There is often a lack of …


Experimenting With Anomaly Detection By Mining Large-Scale Information Networks, A. Taleb-Bendiab Dec 2012

Experimenting With Anomaly Detection By Mining Large-Scale Information Networks, A. Taleb-Bendiab

Australian Information Security Management Conference

Social networks have formed the basis of many studies into large networks analysis. Whilst much is already known regarding efficient algorithms for large networks analysis, data mining, knowledge diffusion, anomaly detection, viral marketing, to mention. More recent research is focussing on new classes of efficient approximate algorithms that can scale to billion nodes and edges. To this end, this paper presents an extension of an algorithm developed originally to analyse large scale-free autonomic networks called the Global Observer Model. In this paper, the algorithm is studied in the context of monitoring large-scale information networks. Hence, taking into account the size …


Does The Android Permission System Provide Adequate Information Privacy Protection For End-Users Of Mobile Apps?, Michael Lane Dec 2012

Does The Android Permission System Provide Adequate Information Privacy Protection For End-Users Of Mobile Apps?, Michael Lane

Australian Information Security Management Conference

This paper investigates the Android permission system and its adequacy in alerting end-users of potential information privacy risks in an app. When an end-user seeks to install an app, they are presented with the required permissions and make a supposedly informed decision as to whether to install that app based on the permissions presented. The results from an analysis of ten popular apps indicate a number of permissions that pose potential information privacy risks of which most end-users are likely to be unaware. The Android permission system is complex and difficult for end-users to comprehend and effectively evaluate the potential …


Cyberterrorism: Addressing The Challenges For Establishing An International Legal Framework, Krishna Prasad Dec 2012

Cyberterrorism: Addressing The Challenges For Establishing An International Legal Framework, Krishna Prasad

Australian Counter Terrorism Conference

The increase of international cyberterrorism in recent years has resulted in computer-based criminal activities that generate worldwide fear, destruction and disruption. National laws and policies that address cyberterrorism are mainly limited to developed nations and are not cohesive in managing 21st century cyberterrorism. Given the absence of an international legal framework to address cyberterrorism, authorities and governments around the world face extreme challenges in finding and prosecuting those responsible for cyberterrorism. This article argues for the need for a cohesive international legal framework; highlights key elements to establish an effective international legal framework; and identifies existing international treaties and cross-border …


The Emergence Of Boko Haram: An Analysis Of Terrorist Characteristics, Peter L. Lacey Dec 2012

The Emergence Of Boko Haram: An Analysis Of Terrorist Characteristics, Peter L. Lacey

Australian Counter Terrorism Conference

Boko Haram (BH) is a Nigerian extremist group which emerged only in the last decade, but has rapidly established a reputation for violence. This paper reviews the development and behaviour of BH in recent years, concluding that the group’s activities meet the definition of terrorism as systematic use of fear-evoking violence against civilians to achieve political goals. This characterisation is justified in terms of four definitional elements of terrorism, and further supported by comparison of BH with contemporary terrorist groups such as Abu Sayyaf Group and Caucasus Emirate, which espouse an ostensibly similar ideology. BH should not be mistaken for …


A Model Of Psychological Disengagement, Kira J. Harris Dec 2012

A Model Of Psychological Disengagement, Kira J. Harris

Australian Counter Terrorism Conference

This paper presents the preliminary findings of research into the disengagement from highly entitative and ideological social groups, such as one percent motorcycle clubs, military special forces and fundamental ideological groups. Using a grounded theory approach, the discourse of 25 former members identified the discrepancy between group membership and the self-concept as the core theme in the disengagement experience. This model presents the process of experiencing a threat, self-concept discrepancy and management, physical disengagement and the post-exit identity. The findings indicate a consistent experience of disengagement and allow further understanding to the factors influencing membership appraisal.


Web-Based Risk Analysis For Home Users, R. T. Magaya, N. L. Clarke Dec 2012

Web-Based Risk Analysis For Home Users, R. T. Magaya, N. L. Clarke

Australian Information Security Management Conference

The advancement of the Internet has provided access to a wide variety of online services such as banking, e-commerce, social networking and entertainment. The wide availability and popularity of the Internet has also led to the rise in risks and threats to users, as criminals have taken an increasingly active role in abusing innocent users. Current risk analysis tools, techniques and methods available do not cater for home users but are tailored for large organisations. The tools require expertise to use them and they are expensive to purchase. What is available for home users are generic information portals that provide …


The Mobile Execution Environment: A Secure And Non-Intrusive Approach To Implement A Bring You Own Device Policy For Laptops, Peter James, Don Griffiths Dec 2012

The Mobile Execution Environment: A Secure And Non-Intrusive Approach To Implement A Bring You Own Device Policy For Laptops, Peter James, Don Griffiths

Australian Information Security Management Conference

Bring Your Own Device (BYOD) has become an established business practice, however the practice can increase an organisation’s information security risks. The implementation of a BYOD policy for laptops must consider how the information security risks can be mitigated or managed. The selection of an appropriate secure laptop software configuration is an important part of the information security risk mitigation/management strategy. This paper considers how a secure laptop software configuration, the Mobile Execution Environment (MEE) can be used to minimise risks when a BYOD policy for laptops is implemented. In this paper the security and business risks associated with the …