Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1891 - 1920 of 2936

Full-Text Articles in Social and Behavioral Sciences

Work Hardening Behaviors Of A Low Carbon Nb-Microalloyed Si-Mn Quenching-Partitioning Steel With Different Cooling Styles After Partitioning, Jun Zhang, Hua Ding, Chao Wang, Jingwei Zhao, Ting Ding Jan 2013

Work Hardening Behaviors Of A Low Carbon Nb-Microalloyed Si-Mn Quenching-Partitioning Steel With Different Cooling Styles After Partitioning, Jun Zhang, Hua Ding, Chao Wang, Jingwei Zhao, Ting Ding

Faculty of Engineering and Information Sciences - Papers: Part A

In this paper, the strain hardening behaviors of a low carbon Nb-microalloyed Si–Mn quenching–partitioning (Q–P) steel were investigated. The microstructures were analyzed by the scanning electron microscope (SEM) and transmission electron microscope (TEM). Mechanical tests were used to evaluate the room temperature tensile properties of the steel. The work hardening behaviors of the tested specimens were analyzed using the Hollomon approach. The results showed that a two-stage work hardening behavior was observed during deformation processes. In the first stage, for the quenched samples, martensite deforms plastically and the hardening exponent decreased. For the air-cooled samples, however, the carbide-free ferrite deforms …


On Rfid Authentication Protocols With Wide-Strong Privacy, Nan Li, Yi Mu, Willy Susilo, Fuchun Guo, Vijay Varadharajan Jan 2013

On Rfid Authentication Protocols With Wide-Strong Privacy, Nan Li, Yi Mu, Willy Susilo, Fuchun Guo, Vijay Varadharajan

Faculty of Engineering and Information Sciences - Papers: Part A

Radio frequency identification (RFID) tag privacy is an important issue to RFID security. To date, there have been several attempts to achieve the wide-strong privacy by using zero-knowledge protocols. In this paper, we launch an attack on the recent zero-knowledge based identification protocol for RFID, which was claimed to capture wide-strong privacy, and show that this protocol is flawed. Subsequently, we propose two zero-knowledge based tag authentication protocols and prove that they offer wide-strong privacy.


Modification Of A Polyamide Reverse Osmosis Membrane By Heat Treatment For Enhanced Fouling Resistance, Takahiro Fujioka, Long D. Nghiem Jan 2013

Modification Of A Polyamide Reverse Osmosis Membrane By Heat Treatment For Enhanced Fouling Resistance, Takahiro Fujioka, Long D. Nghiem

Faculty of Engineering and Information Sciences - Papers: Part A

The use of heat treatment to improve solute rejection and fouling resistance of a polyamide reverse osmosis (RO) membrane was investigated in this study. Heat treatment was carried out by immersing the membrane samples in Milli-Q water at 70 degrees celcius for a specific duration. Heat treatment reduced the pure water permeability from 4.1 to 2.8 L/m2 bar but improved conductivity rejection from 95.5 to 97.0 percent. As a result, a correlation was observed between changes in the two parameters. Marginal changes in the membrane surface characteristics were observed as a result of heat treatment. Heat treatment significantly improved the …


Cil Security Proof For A Password-Based Key Exchange, Cristian Ene, Clementine Gritti, Yassine Lakhnech Jan 2013

Cil Security Proof For A Password-Based Key Exchange, Cristian Ene, Clementine Gritti, Yassine Lakhnech

Faculty of Engineering and Information Sciences - Papers: Part A

Computational Indistinguishability Logic (CIL) is a logic for reasoning about cryptographic primitives in computational model. It is sound for standard model, but also supports reasoning in the random oracle and other idealized models. We illustrate the benefits of CIL by formally proving the security of a Password-Based Key Exchange (PBKE) scheme, which is designed to provide entities communicating over a public network and sharing a short password, under a session key.


Scalable Fragile Watermarking For Image Authentication, Angela Piper, Reihaneh Safavi-Naini Jan 2013

Scalable Fragile Watermarking For Image Authentication, Angela Piper, Reihaneh Safavi-Naini

Faculty of Engineering and Information Sciences - Papers: Part A

Semi-fragile watermarks are used to detect unauthorised changes to an image, whereas tolerating allowed changes such as compression. Most semi-fragile algorithms that tolerate compression assume that because compression only removes the less visually significant data from an image, tampering with any data that would normally be removed by compression cannot affect a meaningful change to the image. Scalable compression allows a single compressed image to produce a variety of reduced resolution or reduced quality images, termed subimages, to suit the different display or bandwidth requirements of each user. However, highly scaled subimages remove a substantial fraction of the data in …


Accuracy Of Deformable Image Registration For Contour Propagation In Adaptive Lung Radiotherapy, Nicholas Hardcastle, Wouter Van Elmpt, Dirk De Ruysscher, Karl Bzdusek, Wolfgang A. Tome Jan 2013

Accuracy Of Deformable Image Registration For Contour Propagation In Adaptive Lung Radiotherapy, Nicholas Hardcastle, Wouter Van Elmpt, Dirk De Ruysscher, Karl Bzdusek, Wolfgang A. Tome

Faculty of Engineering and Information Sciences - Papers: Part A

Background: Deformable image registration (DIR) is an attractive method for automatic propagation of regions of interest (ROIs) in adaptive lung radiotherapy. This study investigates DIR for automatic contour propagation in adaptive Non Small Cell Lung Carcinoma patients.


Enabling And Encouraging Greater Diversity In Ict, Madeleine R H Roberts, Tanya Mcgrill Jan 2013

Enabling And Encouraging Greater Diversity In Ict, Madeleine R H Roberts, Tanya Mcgrill

Faculty of Engineering and Information Sciences - Papers: Part A

There is now a far greater level of heterogeneity in the university cohort in age, experience and cultural and socio-economic backgrounds than in the past. This means that assumptions about the equality of student knowledge and ability that may still exist could be causing difficulties for female and male students who are not school leavers or native English speakers. The issues faced by mature-age, international, and low socio-economic background female and male students are diverse and the potential strategies to assist in retaining current students and attracting future students are varied. Therefore, the strategies employed must address as many of …


Shear Behaviour Of Rock Joints With Unsaturated Infill, B Indraratna, Wuditha N. Premadasa, E. T. Brown Jan 2013

Shear Behaviour Of Rock Joints With Unsaturated Infill, B Indraratna, Wuditha N. Premadasa, E. T. Brown

Faculty of Engineering and Information Sciences - Papers: Part A

Behaviour of soil-infilled rock joints has significant importance with respect to the strength of fractured rock mass. The presence of even a small amount of fine-grained infill material within a joint can reduce its shear strength considerably, depending on the degree of saturation of infill. Therefore, it is crucial to examine how the infill material can adversely affect the joint shear strength. Previous studies of infilled joints have mainly been focused on idealised regular joint patterns owing to the simplicity and reproducibility in laboratory testing. Current literature on infilled rock joints has also neglected the effect of the degree of …


Conceptual Model Describing Smear Zone Caused By Mandrel Action, Cholachat Rujikiatkamjorn, Made Ardana, Buddhima Indraratna, S Leroueil Jan 2013

Conceptual Model Describing Smear Zone Caused By Mandrel Action, Cholachat Rujikiatkamjorn, Made Ardana, Buddhima Indraratna, S Leroueil

Faculty of Engineering and Information Sciences - Papers: Part A

In this study the characteristics and extent of the smear zone are investigated using a large, undisturbed sample. The aim of using such a sample is to capture the realistic characteristics of the smear zone in relation to the in situ soil structure during the installation of prefabricated vertical drains (PVDs) using a mandrel. The extent of the smear zone for Bulli clay (New South Wales, Australia) is determined on the basis of normalised permeability (k(h)/k(hu)) and the reduction in the water content upon consolidation. The permeability and compressibility of the soil are investigated to determine the extent to which …


A General Framework For Infrastructure System Reliability Modelling And Analysis, Payam Mokhtarian, Mohammad-Reza Namazi-Rad, Tin Kin Ho, Mahmoud Efatmaneshnik Jan 2013

A General Framework For Infrastructure System Reliability Modelling And Analysis, Payam Mokhtarian, Mohammad-Reza Namazi-Rad, Tin Kin Ho, Mahmoud Efatmaneshnik

Faculty of Engineering and Information Sciences - Papers: Part A

An infrastructure system is inherently complex, with layers of both explicitly defined and hidden or subtle interfaces with other infrastructure systems and human users. High availability is desired, which implies stringent requirements on reliability and safety. Reliability analysis typically starts at component or sub-system level and aggregates through the system functional hierarchy. Because of the system complexity, incorporating occurrences of all possible interactions and scenarios is not always practical and failure data is often limited. Moreover, there are unobserved events among the sub-systems distributing either randomly or with temporal trend. To facilitate reliability analysis amid the complex environment and uncertain …


Dynamics Of Formation Of Anthracene Anions In Molecular Clouds And Protoplanetary Atmospheres, A Garcia-Sanz, F Carelli, F Sebastianelli, F A. Gianturco, Gustavo Garcia Gomez-Tejedor Jan 2013

Dynamics Of Formation Of Anthracene Anions In Molecular Clouds And Protoplanetary Atmospheres, A Garcia-Sanz, F Carelli, F Sebastianelli, F A. Gianturco, Gustavo Garcia Gomez-Tejedor

Faculty of Engineering and Information Sciences - Papers: Part A

Quantum mechanical scattering calculations are carried out for gas-phase molecules of anthracene, an aromatic system with three condensed aromatic carbon rings, in collision with low-energy electrons. They reveal the presence of various metastable (resonant) anionic states of this prototype species belonging to the larger polycondensed aromatic hydrocarbons deemed to be present in various regions of the interstellar medium. These resonances are analysed in terms of their most likely paths to stabilization into bound anionic molecules or aromatic fragments, while the important role of threshold virtual states is also discussed within the same context.


Bayesian Nonparametric Reliability Analysis For A Railway System At Component Level, Payam Mokhtarian, Mohammad-Reza Namazi-Rad, Tin Kin Ho, Thomas Suesse Jan 2013

Bayesian Nonparametric Reliability Analysis For A Railway System At Component Level, Payam Mokhtarian, Mohammad-Reza Namazi-Rad, Tin Kin Ho, Thomas Suesse

Faculty of Engineering and Information Sciences - Papers: Part A

Railway system is a typical large-scale complex system with interconnected sub-systems which contain numerous components. System reliability is retained through appropriate maintenance measures and cost-effective asset management requires accurate estimation of reliability at the lowest level. However, real-life reliability data at component level of a railway system is not always available in practice, let alone complete. The component lifetime distributions from the manufacturers are often obscured and complicated by the actual usage and working environments. Reliability analysis thus calls for a suitable methodology to estimate a component lifetime under the conditions of a lack of failure data and unknown and/or …


A Ciphertext-Policy Attribute-Based Proxy Re-Encryption With Chosen-Ciphertext Security, Kaitai Liang, Liming Fang, Willy Susilo, Duncan S. Wong Jan 2013

A Ciphertext-Policy Attribute-Based Proxy Re-Encryption With Chosen-Ciphertext Security, Kaitai Liang, Liming Fang, Willy Susilo, Duncan S. Wong

Faculty of Engineering and Information Sciences - Papers: Part A

Cipher text-Policy Attribute-Based Proxy Re-Encryption (CP-ABPRE) extends the traditional Proxy Re-Encryption (PRE) by allowing a semi-trusted proxy to transform a cipher text under an access policy to the one with the same plaintext under another access policy (i.e. attribute-based re-encryption). The proxy, however, learns nothing about the underlying plaintext. CP-ABPRE has many real world applications, such as fine-grained access control in cloud storage systems and medical records sharing among different hospitals. Previous CP-ABPRE schemes leave how to be secure against Chosen-Cipher text Attacks (CCA) as an open problem. This paper, for the first time, proposes a new CP-ABPRE to tackle …


Anonymous Single Sign-On Schemes Transformed From Group Signatures, Jingquan Wang, Guilin Wang, Willy Susilo Jan 2013

Anonymous Single Sign-On Schemes Transformed From Group Signatures, Jingquan Wang, Guilin Wang, Willy Susilo

Faculty of Engineering and Information Sciences - Papers: Part A

Single Sign-on (SSO) allows a user to obtain a single credential from a Trusted Third Party (TTP) once and then authenticates himself/herself to different service providers by using the same credential. Though different SSO schemes have been obtained from various primitives, user anonymity has not yet been studied formally. Motivated by the fact that anonymity is a very essential security requirement in certain scenarios, in this paper we first formalize a security model of anonymous single-sign on (ASSO). Subsequently, we present a generic ASSO scheme which is transformed from group signatures. Formal proofs are provided to show that the proposed …


A Simple Adaptive Stfc Mb-Ofdm Uwb System For Wban Applications, Miftadi Sudjai, Le Chung Tran, Farzad Safaei Jan 2013

A Simple Adaptive Stfc Mb-Ofdm Uwb System For Wban Applications, Miftadi Sudjai, Le Chung Tran, Farzad Safaei

Faculty of Engineering and Information Sciences - Papers: Part A

This paper proposes a simple, but efficient, adaptive space-time-frequency coded (STFC) multiband orthogonal frequency division multiplexing ultra-wideband (MB-OFDM UWB) system to improve the average BER performance for body-to-external link wireless body area network (WBAN) applications. The novelty of this paper is the proposed body direction based adaptive algorithm that controls the set of modulation scheme, space-time-frequency code (STFC) coding rate, and power of signal constellations implemented in STFC MB-OFDM UWB WBAN. Simulation results show that the proposed system can provide a consistent 1-2 dB improvement in the case of 2I1O configuration, and 1-3 dB improvement in a medium-to-high SNR region …


Some Influences On Wall Friction Measurements - A Preliminary Investigation, Wendy Halford, Cameron Lawler, Andrew P. Grima, Peter C. Arnold Jan 2013

Some Influences On Wall Friction Measurements - A Preliminary Investigation, Wendy Halford, Cameron Lawler, Andrew P. Grima, Peter C. Arnold

Faculty of Engineering and Information Sciences - Papers: Part A

The concept of measuring the friction between a bulk solid and a wall material is very simple. However, experience together with previous wall friction measurement research suggest that variables that influence wall friction values are difficult to quantify and, so far, are proving unreliable to predict with any degree of confidence. In this paper some preliminary test results are presented for different bulk solids on different wall plates where variables examined include particle size distribution, moisture content, test cell size and shear speed. The outcomes presented confirm the authors' belief that with the present state of knowledge about wall friction …


I-125 Ropes Eye Plaque Dosimetry: Validation Of A Commercial 3d Ophthalmic Brachytherapy Treatment Planning System And Independent Dose Calculation Software With Gafchromic Ebt3 Films, Joel Poder, Stephanie Corde Jan 2013

I-125 Ropes Eye Plaque Dosimetry: Validation Of A Commercial 3d Ophthalmic Brachytherapy Treatment Planning System And Independent Dose Calculation Software With Gafchromic Ebt3 Films, Joel Poder, Stephanie Corde

Faculty of Engineering and Information Sciences - Papers: Part A

Purpose: The purpose of this study was to measure the dose distributions for different Radiation Oncology Physics and Engineering Services, Australia (ROPES) type eye plaques loaded with I-125 (model 6711) seeds using GafChromic R EBT3 films, in order to verify the dose distributions in the Plaque SimulatorTM (PS) ophthalmic 3D treatment planning system. The brachytherapy module of RADCALC R was used to independently check the dose distributions calculated by PS. Correction factors were derived from the measured data to be used in PS to account for the effect of the stainless steel ROPES plaque backing on the 3D dose distribution. …


Integrating Building Information Modelling (Bim) Into Engineering Education: An Exploratory Study Of Industry Perceptions Using Social Network Data, Kriengsak Panuwatwanich, Mei Liang Wong, Jeung-Hwan Doh, Rodney A. Stewart, Timothy J. Mccarthy Jan 2013

Integrating Building Information Modelling (Bim) Into Engineering Education: An Exploratory Study Of Industry Perceptions Using Social Network Data, Kriengsak Panuwatwanich, Mei Liang Wong, Jeung-Hwan Doh, Rodney A. Stewart, Timothy J. Mccarthy

Faculty of Engineering and Information Sciences - Papers: Part A

Building Information Modelling (BIM) has been widely acknowledged as an emerging technological and procedural shift within the Architecture, Engineering and Construction (AEC) industry. BIM represents a methodology to manage the building design and project data in digital format throughout a building lifecycle. With the implementation of BIM, the design, construction and operation processes can be better streamlined to improve project efficiency. Because of its far-reaching benefits, there is a current push for BIM by governments worldwide, including Australia. However, a significant lack of the understanding of BIM and industry readiness has been identified as a major hindrance; hence, there is …


Applying Mathematical Model To Simplify The Procession Of Pipeline Route Selection, Jianli Liu, Shuqing Yang, Joseph Wiltshire Jan 2013

Applying Mathematical Model To Simplify The Procession Of Pipeline Route Selection, Jianli Liu, Shuqing Yang, Joseph Wiltshire

Faculty of Engineering and Information Sciences - Papers: Part A

Now there are many pipelines to deliver liquid-like water diversions in the world. Optimal route for pipeline transportation is a major concern for engineers, economists, and decision makers. Pipeline route selection is governed by many factors such as the shortest distance between supply and demand points, constructability, affordability, environmental impacts, and approachability. There are many methods developed for the pipeline route selection like Gestalt method, land suitability mapping techniques, geographic information systems (GIS), imaging technologies for pipeline mapping with the use of airborne lidar, etc. But these methods, though robust in translating physical constraints into feasible alternatives for route location, …


An Exploratory Study Of Personal Reflection And Collaboration Skills Using Online Collaborative Tool In Project-Based Learning, Sim Kim Lau, Wendy Meyers Jan 2013

An Exploratory Study Of Personal Reflection And Collaboration Skills Using Online Collaborative Tool In Project-Based Learning, Sim Kim Lau, Wendy Meyers

Faculty of Engineering and Information Sciences - Papers: Part A

By deepening our understanding of the use of Web 2.0 for reflective practice, knowledge co-construction and project based learning this paper aims to contribute to our understanding of collaborative learning. The paper investigates a case study of a post-graduate system development subject to increase student learning through the development of students' personal reflection and collaboration skills. The project aims to develop key foundational knowledge and skills identified in the IS 2010 curriculum guidelines, i.e. the ability to work collaboratively. Of particular interest was the ability of student collaboration combined with personal reflective learning to lead to negotiation of meaning and …


The Influence Of Pallets On The Behaviour And Design Of Steel Drive-In Storage Racks - Part Ii Design, B P. Gilbert, L H. Teh, R X. Badet, K J. R Rasmussen Jan 2013

The Influence Of Pallets On The Behaviour And Design Of Steel Drive-In Storage Racks - Part Ii Design, B P. Gilbert, L H. Teh, R X. Badet, K J. R Rasmussen

Faculty of Engineering and Information Sciences - Papers: Part A

This paper analyses the influence of the horizontal restraints provided by pallets on the ultimate capacity of drive-in racks. The paper is based on the assumption that one can accurately determine the coefficient of friction between the rail beams and the pallets or can design a device that restrains the pallets from sliding on the rail beams. Thirty-six drive-in racks representing the global sale of an Australian manufacturer over three years are analysed for all possible loading scenarios. For the sake of computational efficiency, the simple 2D model introduced in the companion paper is used for the study. The load …


Energy-Aware Two Link-Disjoint Paths Routing, Gongqi Lin, Sieteng Soh, Mihai Lazarescu, Kwan-Wu Chin Jan 2013

Energy-Aware Two Link-Disjoint Paths Routing, Gongqi Lin, Sieteng Soh, Mihai Lazarescu, Kwan-Wu Chin

Faculty of Engineering and Information Sciences - Papers: Part A

Network robustness and throughput can be improved by routing each source-to-terminal (s, t) demand via two link-disjoint paths (TLDP). However, the use of TLDP incurs higher energy cost. Henceforth, we address the problem of minimizing the energy usage of networks that use TLDP. Specifically, our problem is to maximally switch off redundant network links while maintaining at least 0zT100% of (s, t) TLDP in the network, for a given T, and limiting the maximum link utilization (MLU) to no greater than a configured threshold. To address this problem, we present a fast heuristic, called TLDP by Shortest Path First (TLDP-SPF), …


An Outlier Robust Block Bootstrap For Small Area Estimation, Payam Mokhtarian, Ray Chambers Jan 2013

An Outlier Robust Block Bootstrap For Small Area Estimation, Payam Mokhtarian, Ray Chambers

Faculty of Engineering and Information Sciences - Papers: Part A

Small area inference based on mixed models, i.e. models that contain both fixed and random effects, are the industry standard for this field, allowing between area heterogeneity to be represented by random area effects. Use of the linear mixed model is ubiquitous in this context, with maximum likelihood, or its close relative, REML, the standard method for estimating the parameters of this model. These parameter estimates, and in particular the resulting predicted values of the random area effects, are then used to construct empirical best linear unbiased predictors (EBLUPs) of the unknown small area means. It is now well known …


Prediction Of Earthquake-Induced Liquefaction For Level And Gently Sloped Ground, G Chiaro, J Koseki Jan 2013

Prediction Of Earthquake-Induced Liquefaction For Level And Gently Sloped Ground, G Chiaro, J Koseki

Faculty of Engineering and Information Sciences - Papers: Part A

This paper presents a simplified procedure for predicting earthquake-induced level and sloped ground failure, namely liquefaction and shear failure. It consists of a framework where cyclic stress ratio (CSR), static stress ratio (SSR) and undrained shear strength (USS) are formulated considering simple shear conditions, which simulate field stress during earthquakes more realistically.


Different Modes Of Dust Testing For Bulk Solids, Ian Frew, Peter W. Wypych, Leong Mar Jan 2013

Different Modes Of Dust Testing For Bulk Solids, Ian Frew, Peter W. Wypych, Leong Mar

Faculty of Engineering and Information Sciences - Papers: Part A

The loss of dust from the mining, processing, storage, handling, transportation and loading of bulk materials is creating an increasing number of problems for industry and the community. This includes loss of valuable material and export income, increasing workplace dust emissions (e.g. from mine sites, loading, receival, ports, bulk berths) and decreasing ambient air quality and human health, especially for nearby communities. It is virtually impossible to estimate the total cost of these problems to industry and the community. An initial key step in addressing dust problems is to quantify the dustiness or dustability of bulk materials. This paper examines …


Temporal Sentiment Detection For User Generated Video Product Reviews, M S. Barakat, C H. Ritz, D A. Stirling Jan 2013

Temporal Sentiment Detection For User Generated Video Product Reviews, M S. Barakat, C H. Ritz, D A. Stirling

Faculty of Engineering and Information Sciences - Papers: Part A

User generated video product reviews in social media is gaining popularity every day due to its creditability and the broad evaluation context provided by it. Extracting sentiment automatically from such videos will help the consumers making decisions and producers improving their products. This paper investigates the feasibility of sentiment detection temporally from those videos by analyzing the transcription generated by a speech recognition system which was not investigated before. Another two main contribution for this paper is introducing a solution to the problem of fixed threshold estimation for the Naive Bayesian classifier output probabilities and irrelative text filtering for improving …


Block Shear Capacity Of Bolted Connections In Hot-Rolled Steel Plates, Lip H. Teh, Veysel Yazici Jan 2013

Block Shear Capacity Of Bolted Connections In Hot-Rolled Steel Plates, Lip H. Teh, Veysel Yazici

Faculty of Engineering and Information Sciences - Papers: Part A

This paper extends the research previously conducted at the University of Wollongong on block shear failure of bolted connections in cold-reduced steel sheets with low ductility to hot-rolled steel plates. It examines the applicability of the basic approach employed for cold-reduced sheet steel bolted connections, which makes use of the so-called active shear planes, to hot-rolled steel plate connections. The active shear planes lie midway between the gross and the net shear planes defined in the steel structures specifications. The paper shows that shear yielding leading to the block shear failure of a bolted connection in a hot-rolled steel gusset …


Coastal Reservoirs Strategy For Water Resource Development-A Review Of Future Trend, Jianli Liu, Shu-Qing Yang, Changbo Jiang Jan 2013

Coastal Reservoirs Strategy For Water Resource Development-A Review Of Future Trend, Jianli Liu, Shu-Qing Yang, Changbo Jiang

Faculty of Engineering and Information Sciences - Papers: Part A

Water use and access become a more and more important determinant of environmental equity and human development according to the view held by the UN [1]. Water scarcity is one of the major crises which has overarching implications for other world problems especially poverty, hunger, ecosystem degradation, desertification, climate change, threatening world peace and security [2]. In the decades to come, freshwater consumed by human will get to a tipping point. Many projects and concepts have been proposed and implemented for several years to improve the effectiveness of us-ing water. These research activities can be grouped as: desalination plants; water …


Automatic Bdi Plan Recognition From Process Execution Logs And Effect Logs, Hongyun Xu, Bastin Tony Roy Savarimuthu, Aditya Ghose, Evan Morrison, Qiying Cao, Youqun Shi Jan 2013

Automatic Bdi Plan Recognition From Process Execution Logs And Effect Logs, Hongyun Xu, Bastin Tony Roy Savarimuthu, Aditya Ghose, Evan Morrison, Qiying Cao, Youqun Shi

Faculty of Engineering and Information Sciences - Papers: Part A

Agent applications are often viewed as unduly expensive to develop and maintain in commercial contexts. Organizations often settle for less sophisticated and more traditional software in place of agent technology because of (often misplaced) fears about the development and maintenance costs of agent technology, and the often mistaken perception that traditional software offers better returns on investment. This paper aims to redress this by developing a plan recognition framework for agent program learning, where behavior logs of legacy applications (or even manually executed processes) are mined to extract a 'draft' version of agent code that could eventually replace these applications …


Identity-Based Mediated Rsa Revisited, Ibrahim Elashry, Yi Mu, Willy Susilo Jan 2013

Identity-Based Mediated Rsa Revisited, Ibrahim Elashry, Yi Mu, Willy Susilo

Faculty of Engineering and Information Sciences - Papers: Part A

In SSYM 2001, Boneh, Ding, Tsudik and Wong presented encryption and signature schemes based on the identity-based mediated RSA (ID-MRSA), in which the users are not allowed to decrypt/sign messages without the permission of a security mediator (the SEM). This allows a simple key revocation. Subsequently, in CT-RSA 2003, Ding and Tsudik presented a security proof for these schemes. In particular, they stated that 'IB-mRSA/OAEP encryption offers equivalent the semantic security to RSA/OAEP against adaptive chosen ciphertext attacks in the random oracle model if the key generation function is division intractable'. To make the key generation function division intractable, Ding …