Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 2641 - 2670 of 2936

Full-Text Articles in Social and Behavioral Sciences

Security Remarks On A Convertible Nominative Signature Scheme, Guilin Wang, Feng Bao Jan 2007

Security Remarks On A Convertible Nominative Signature Scheme, Guilin Wang, Feng Bao

Faculty of Engineering and Information Sciences - Papers: Part A

A nominative signature scheme allows a nominator (i.e. the signer) and a nominee (i.e. a designated verifier) to jointly generate and publish a signature so that only the nominee can check the validity of a nominative signature and further convince a third party to accept this fact. Recently, Huang and Wang proposed such a new scheme at ACISP 2004, and claimed that their scheme is secure under some standard computational assumptions. In this paper, we remark that their scheme is not a nominative signature in fact, since it fails to meet the crucial security requirement: verification untransferability. Specifically, we identify …


Security Analysis Of Two Ultra-Lightweight Rfid Authentication Protocols, Tieyan Li, Guilin Wang Jan 2007

Security Analysis Of Two Ultra-Lightweight Rfid Authentication Protocols, Tieyan Li, Guilin Wang

Faculty of Engineering and Information Sciences - Papers: Part A

In this paper, we analyze the security vulnerabilities of two ultra-lightweight RFID mutual authentication protocols: LMAP and M2AP, which are recently proposed by Peris-Lopez et al.We identify two e®ective attacks, namely De-synchronization attack and Full-disclosure attack, against their protocols. The former attack can break the synchro- nization between the RFID reader and the tag in a single protocol run so that they can not authenticate each other in any following protocol runs. The latter attack can disclose all the secret information stored on a tag by interrogating the tag multiple times. Thus it compromises the tag completely. Moreover, we point …


Doing It Tough: Factors Impacting On Local E-Government Mmaturity, Peter Shackleton, Linda Dawson Jan 2007

Doing It Tough: Factors Impacting On Local E-Government Mmaturity, Peter Shackleton, Linda Dawson

Faculty of Engineering and Information Sciences - Papers: Part A

As growing numbers of citizens seek to use the Internet to do business, governments across the world have moved into the area of electronic service delivery. For the last decade significant advancements have been made in the area of e-Government. Today, e-Government is often assumed to be wellestablished. However, ongoing support is often missing, particularly at the local government level. The multi-level nature of government often means that citizens are frustrated when accessing services that span many levels of bureaucracy. This paper describes an empirical study which explores the factors influencing local egovernment maturity and identifies the barriers, enablers, priorities …


Kk-Theory And Spectral Flow In Von Neumann Algebras, J Kaad, R Nest, Adam C. Rennie Jan 2007

Kk-Theory And Spectral Flow In Von Neumann Algebras, J Kaad, R Nest, Adam C. Rennie

Faculty of Engineering and Information Sciences - Papers: Part A

We present a definition of spectral flow for any norm closed ideal J in any von Neumann algebra N. Given a path of selfadjoint operators in N which are invertible in N/J, the spectral flow produces a class in Ko(J).Given a semifinite spectral triple (A, H, D) relative to (N, t) with A separable, we construct a class [D] ? KK1(A, K(N)). For a unitary u ? A, the von Neumann spectral flow between D and u*Du is equal to the Kasparov product [u]A[D], and is simply related to the numerical spectral flow, and a refined C*-spectral flow.


Feature Subset Selection For Multi-Class Svm Based Image Classification, Lei Wang Jan 2007

Feature Subset Selection For Multi-Class Svm Based Image Classification, Lei Wang

Faculty of Engineering and Information Sciences - Papers: Part A

Multi-class image classification can benefit much from feature subset selection. This paper extends an error bound of binary SVMs to a feature subset selection criterion for the multi-class SVMs. By minimizing this criterion, the scale factors assigned to each feature in a kernel function are optimized to identify the important features. This minimization problem can be efficiently solved by gradient-based search techniques, even if hundreds of features are involved. Also, considering that image classification is often a small sample problem, the regularization issue is investigated for this criterion, showing its robustness in this situation. Experimental study on multiple benchmark image …


Watermarking Protocol Of Secure Verification, Jun Zhang, Weidong Kou, Kai Fan, Lei Ye Jan 2007

Watermarking Protocol Of Secure Verification, Jun Zhang, Weidong Kou, Kai Fan, Lei Ye

Faculty of Engineering and Information Sciences - Papers: Part A

The secure verification is important for watermarking protocols. A malicious arbitrator is able to remove an original watermark from an unauthorized copy of the digital content as a result of a security breach in the phase of arbitration and resell multiple copies of it with impunity. We propose a novel buyer-seller watermarking protocol of secure verification. In this scheme, a seller permutes an original watermark provided by a trusted Watermarking Certification Authority (WCA) and embeds it into digital content in an encrypted domain. In case an unauthorized copy is found, the seller can recover the original watermark from the watermark …


Turbulent Transfer Mechanism In Sediment-Laden Flow, Shu-Qing Yang Jan 2007

Turbulent Transfer Mechanism In Sediment-Laden Flow, Shu-Qing Yang

Faculty of Engineering and Information Sciences - Papers: Part A

Characteristics of turbulent flows in rivers can be significantly modified because of the presence of sediment particles and secondary currents/nonuniformity. This paper investigates why the measured vertical distributions of velocity deviate from the log law. In contrast to previous research that attributed the deviation to Richardson number only, this study demonstrates that like Reynolds shear stress (−equation image), momentum flux (uv) caused by the nonzero wall-normal velocity v is also responsible for these deviations. Starting from Reynolds equations, this paper shows that the classical log law can be obtained only when v = 0; otherwise the velocity v results in …


Discussion, Raymond Chambers Jan 2007

Discussion, Raymond Chambers

Faculty of Engineering and Information Sciences - Papers: Part A

Discussion on Bjornstad, J.F. 2007, "Non-Bayesian Multiple Imputation", Journal of Official Statistics, vol. 23, no. 4, pp. 433.


Integrating Rfid Technology And Epc Network Into A B2b Retail Supply Chain: A Step Toward Intelligent Business Processes, Samuel Fosso Wamba, Louis A. Lefebvre, Elisabeth Lefebvre Jan 2007

Integrating Rfid Technology And Epc Network Into A B2b Retail Supply Chain: A Step Toward Intelligent Business Processes, Samuel Fosso Wamba, Louis A. Lefebvre, Elisabeth Lefebvre

Faculty of Engineering and Information Sciences - Papers: Part A

This article introduces RFID technology and the EPC Network and investigates their potential for B-to-B eCommerce supply chain management. Based on empirical data gathered from four tightly interrelated firms from three layers of a supply chain, several scenarios integrating RFID and the EPC Network have been tested and evaluated. In the context of warehousing activities in one specific retail supply chain, the results indicate that i) the business process approach seems quite appropriate to capture the real potential of RFID and the EPC Network; ii) RFID technology and the EPC Network can improve the "shipping" and the "receiving" processes; iii) …


Orientation Effect On Mechanical Properties Of Commercially Pure Titanium At Room Temperature, M Battaini, E V. Pereloma, Christopher Davies Jan 2007

Orientation Effect On Mechanical Properties Of Commercially Pure Titanium At Room Temperature, M Battaini, E V. Pereloma, Christopher Davies

Faculty of Engineering and Information Sciences - Papers: Part A

The effect of sample orientation on the mechanical properties of commercially pure (CP) titanium plate with a transverse split basal texture was investigated at room temperature (RT) using plane strain compression (PSC). A large variation in flow stress of up to (EBSD) and calculating Schmid factors for all important slip and twinning modes. Importantly, the Schmid factors were calculated for all orientations in Euler space because there are significant variations over all orientations for the PSC stress state, unlike uniaxial compression or tension. The Schmid factor analysis and twin data for the wide variety of orientations tested enabled the conclusion …


Properties Preserved Under Morita Equivalence Of C*-Algebras, Astrid An Huef, Iain Raeburn, Dana Williams Jan 2007

Properties Preserved Under Morita Equivalence Of C*-Algebras, Astrid An Huef, Iain Raeburn, Dana Williams

Faculty of Engineering and Information Sciences - Papers: Part A

We show that important structural properties of C*-algebras and the muliplicity numbers of representations are preserved under Morita equivalence.


Influence Of Microalloying Precipitates On Bauschinger Effect During Uoe Forming Of Line Pipe Steels, Andrii Kostryzhev, Martin Strangwood, Claire L. Davis Jan 2007

Influence Of Microalloying Precipitates On Bauschinger Effect During Uoe Forming Of Line Pipe Steels, Andrii Kostryzhev, Martin Strangwood, Claire L. Davis

Faculty of Engineering and Information Sciences - Papers: Part A

Large diameter steel line pipes are generally produced by cold deforming hot rolled or thermomechanically controlled rolled (TMCR) plate by the three-stage 'UOE' process. Pipe strength has been found to increase or decrease relative to the plate, depending on the steel grade and plate processing history. The strength increase is due to work hardening whereas any decrease in strength arises from the Bauschinger effect due to the reverse cold deformation of the UOE process. The steel chemistry, through the presence of strengthening microalloy precipitates, and prior processing, through the size and distribution of microalloy precipitates and the presence of retained …


Evolution Analysis Of Iterative Lmmse-App Detection For Coded Linear System With Cyclic Prefixes, Xiaojun Yuan, Qinghua Guo, Li Ping Jan 2007

Evolution Analysis Of Iterative Lmmse-App Detection For Coded Linear System With Cyclic Prefixes, Xiaojun Yuan, Qinghua Guo, Li Ping

Faculty of Engineering and Information Sciences - Papers: Part A

This paper is concerned with the iterative detection principles for coded linear systems with cyclic prefixes. We derive a matrix-form low-cost fast Fourier transform (FFT) based iterative LMMSE-APP detector and propose an evolution technique for the performance evaluation of the proposed detector. Numerical results show a good match between simulation and evolution prediction. ©2007 IEEE.


Contact Element Method With Two Relative Coordinates And Its Application To Prediction Of Strip Profile Of A Sendzimir Mill, Hai-Liang Yu, Xiang-Hua Liu, Gyoo-Taek Lee Jan 2007

Contact Element Method With Two Relative Coordinates And Its Application To Prediction Of Strip Profile Of A Sendzimir Mill, Hai-Liang Yu, Xiang-Hua Liu, Gyoo-Taek Lee

Faculty of Engineering and Information Sciences - Papers: Part A

A new numerical method, Contact Element Method with Two Relative Coordinates, has been developed. The main features of this method are that element meshing depends on the contact length between rolls or between the work roll and the strip, and that each element has two relative coordinates based on two separate contact objects. With this method, a program code “Setup Models for Sendzimir Mill” (SM4SM) has been developed for prediction of the strip profile of a 20-high Sendzimir mill with double AS-U-Roll systems. The strip profiles are predicted under various rolling conditions, such as the positions of AS-U racks, the …


Strategic Analysis Adaptation Assessment: An Alternative To The Storyline Scenario, Susan Krumdieck, Mohammed Imroz Sohel Jan 2007

Strategic Analysis Adaptation Assessment: An Alternative To The Storyline Scenario, Susan Krumdieck, Mohammed Imroz Sohel

Faculty of Engineering and Information Sciences - Papers: Part A

Scenarios of future trends are widely used by government and international agencies to inform decision-making. While story line scenarios may be useful for business or government thinking, they are not effective at informing engineering research, innovation and design, and add very little to the understanding of sustainability. This paper presents a strategic analysis approach to complex systems, which relies on identification of risks to important activities and wellbeing. This method mimics the actual processes of anthropogenic continuity, where people explore, experiment, learn from success and mistakes, and adapt and evolve. The method is applied to the case study of transportation …


Further Discussions On The Security Of A Nominative Signature Scheme, Lifeng Guo, Guilin Wang, Duncan S. Wong Jan 2007

Further Discussions On The Security Of A Nominative Signature Scheme, Lifeng Guo, Guilin Wang, Duncan S. Wong

Faculty of Engineering and Information Sciences - Papers: Part A

A nominative signature scheme allows a nominator (or signer) and a nominee (or veri¯er) to jointly generate and publish a signature in such a way that only the nominee can verify the signature and if nec- essary, only the nominee can prove to a third party that the signature is valid. In a recent work, Huang and Wang proposed a new nominative signature scheme which, in addition to the above properties, only allows the nominee to convert a nominative signature to a publicly veri¯able one. In ACISP 2005, Susilo and Mu presented several algorithms and claimed that these algorithms can …


Searchsleuth: The Conceptual Neighbourhood Of An Web Query, Jon Ducrou, Peter Eklund Jan 2007

Searchsleuth: The Conceptual Neighbourhood Of An Web Query, Jon Ducrou, Peter Eklund

Faculty of Engineering and Information Sciences - Papers: Part A

This paper presents SearchSleuth, a program developed to experiment with a form of automatic local analysis that extends the standard Web search interface to include a conceptual neighbourhood focused on a formal concept derived from the query. The conceptual neighbourhood is displayed with upper neighbours representative of a generalisation operation, and lower neighbours representative of a specialisation operation. SearchSleuth also introduces a notion of a categorisation operation, where the conceptual focus can shift to a sibling concept of the search concept.


Reliability Of Fault-Tolerant Systems With Parallel Task Processing, Gregory Levitin, Min Xie, Tieling Zhang Jan 2007

Reliability Of Fault-Tolerant Systems With Parallel Task Processing, Gregory Levitin, Min Xie, Tieling Zhang

Faculty of Engineering and Information Sciences - Papers: Part A

The paper considers performance and reliability of fault-tolerant software running on a hardware system that consists of multiple processing units. The software consists of functionally equivalent but independently developed versions that start execution simultaneously. The computational complexity and reliability of different versions are different. The system completes the task execution when the outputs of a pre-specified number of versions coincide. The processing units are characterized by different availability and processing speed. It is assumed that they are able to share the computational burden perfectly and that execution of each version can be fully parallelized. The algorithm based on the universal …


The Ofdm-Idma Approach To Wireless Communication Systems, Li Ping, Qinghua Guo, Jun Tong Jan 2007

The Ofdm-Idma Approach To Wireless Communication Systems, Li Ping, Qinghua Guo, Jun Tong

Faculty of Engineering and Information Sciences - Papers: Part A

This article outlines the basic principles of OFDM-IDMA. Comparisons with other alternative technologies such as OFDM-CDMA and OFDMA are provided. Some attractive features of OFMD-IDMA are explained, including low-cost iterative multi-user detection, flexible rate adaptation, frequency diversity, and significant advantages regarding spectral and power efficiency. © 2007 IEEE.


Performance Comparison Of Subtractive Resistive Readout With Conventional Resistive Readout For A High-Resolution Compact Gamma Camera, Y J. Qi, M J. Zhang, C L. Zhao, R F. Wojcik Jan 2007

Performance Comparison Of Subtractive Resistive Readout With Conventional Resistive Readout For A High-Resolution Compact Gamma Camera, Y J. Qi, M J. Zhang, C L. Zhao, R F. Wojcik

Faculty of Engineering and Information Sciences - Papers: Part A

The purpose of this study was to investigate an optimal readout for a high-resolution compact gamma camera with maximum performance in crystal element identifications. The compact camera is based on a pixellated Nal(Tl) crystal with 1.2 mm pixel size coupled to a 5" Hamamatsu R3292 PSPMT. A conventional resistive-chain readout was initially developed for the camera. Then a novel subtractive resistive readout developed was utilized to optimize the performance of the camera. The performance of the camera was evaluated by raw flood images of a 137Cs source. The results show that the conventional resistive readout results in a significant shrinkage …


On The Performance Of Short Forward Error-Correcting Codes, Sheng Tong, Dengsheng Lin, Aleksandar Kavcic, Li Ping, Baoming Bai Jan 2007

On The Performance Of Short Forward Error-Correcting Codes, Sheng Tong, Dengsheng Lin, Aleksandar Kavcic, Li Ping, Baoming Bai

Faculty of Engineering and Information Sciences - Papers: Part A

This letter investigates the performance of short forward error-correcting (FEC) codes. Reed-Solomon (RS) codes and concatenated zigzag codes are chosen as representatives of classical algebraic codes and modern simple iteratively decodable codes, respectively. Additionally, random binary linear codes are used as a baseline reference. Our main results (demonstrated by simulations and ensemble distance spectrum analysis) are as follows: 1) Short RS codes are as good as random binary linear codes; 2) Carefully designed short low-density parity-check (LDPC) codes are almost as good as random binary linear codes; 3) Low complexity belief propagation decoders incur considerable performance loss at short coding …


On Short Forward Error-Correcting Codes For Wireless Communication Systems, Sheng Tong, Dengsheng Lin, Aleksandar Kavcic, Baoming Bai, Li Ping Jan 2007

On Short Forward Error-Correcting Codes For Wireless Communication Systems, Sheng Tong, Dengsheng Lin, Aleksandar Kavcic, Baoming Bai, Li Ping

Faculty of Engineering and Information Sciences - Papers: Part A

For real-time wireless communications, short forward error-correcting (FEC) codes are indispensable due to the strict delay requirement. In this paper we study the performance of short FEC codes. Reed-Solomon (RS) codes and concatenated zigzag (CZ) codes are chosen as representatives of classical algebraic codes and modern simple iterative decodable codes, respectively. Additionally, we use random binary linear codes as a baseline reference for comparison. Our main results (demonstrated by both simulation and ensemble distance spectrum analysis) are as follows: 1) Short RS codes are as good as random binary linear codes; 2) Carefully designed short low- density parity-check (LDPC) codes …


Quantifying The Regional Load-Bearing Ability Of Trans-Tibial Stumps, Ming Zhang, Winson Lee Jan 2006

Quantifying The Regional Load-Bearing Ability Of Trans-Tibial Stumps, Ming Zhang, Winson Lee

Faculty of Engineering and Information Sciences - Papers: Part A

This paper reports findings of experiments aiming to (1) compare the load tolerant ability over different regions of stumps of lower limb amputees, (2) study the effect of walking on the load tolerant ability, and (3) examine the distal-end weight-bearing ability supported by different interface materials. The method was to apply increasing load to the stump up to the pain level through a force transducer or a digital scale, considering the effect of regional difference, walking, and interface materials. The results show that the patellar tendon and the distal end of the fibula were the best and worst load-tolerant region, …


Energy Storage System For Reduction Of Mid-Line Voltage Variation Of A Dfig Wnd Turbine Connected To A Weak Grid, M Aktarujjaman, Kashem M. Muttaqi, Michael Negnevitsky, Gerard Ledwich Jan 2006

Energy Storage System For Reduction Of Mid-Line Voltage Variation Of A Dfig Wnd Turbine Connected To A Weak Grid, M Aktarujjaman, Kashem M. Muttaqi, Michael Negnevitsky, Gerard Ledwich

Faculty of Engineering and Information Sciences - Papers: Part A

Penetration of wind power into electricity system is constantly increasing. Wind resources are usually distant from existing transmission lines. Wind farms are often connected to weak grids far from central generation stations. Maximum wind power extraction causes the more irregular and unpredicted power output of wind turbine, which has same nature as wind speed variation. The voltage in such long line is vulnerable with the consumption and generation imbalance. In a long line, the mid-line voltage is largely affected by the variation and the penetration of the wind fluctuating power. Fluctuating nature of wind power output and long transmission line …


Distributed Generation Diversity Level For Optimal Investment Planning, An D. T Le, Kashem M. Muttaqi, Michael Negnevitsky, Gerard Ledwich Jan 2006

Distributed Generation Diversity Level For Optimal Investment Planning, An D. T Le, Kashem M. Muttaqi, Michael Negnevitsky, Gerard Ledwich

Faculty of Engineering and Information Sciences - Papers: Part A

The task of improving the supply quality and maintaining supply continuity during emergencies has become more feasible for a distribution company (DISCO), owing to new developments in Distributed Generation (DG) technologies. Even though the technical issues regarding DG interconnection to the main grid are of great importance and are being addressed by on-going research, it must be clearly placed in the context of on the financial performance of the utility. In this paper, a general approach to quantify the technical benefits of DG employment is proposed. The power system economic impact is assessed by evaluating supply quality, supply reliability, system …


Distributed Generation Control Using Protection Principles, An D. T Le, Kashem M. Muttaqi, Michael Negnevitsky, Gerard Ledwich Jan 2006

Distributed Generation Control Using Protection Principles, An D. T Le, Kashem M. Muttaqi, Michael Negnevitsky, Gerard Ledwich

Faculty of Engineering and Information Sciences - Papers: Part A

No abstract provided.


Control Strategy Of Distributed Generation For Voltage Support In Distribution Systems, An D. T Le, Kashem M. Muttaqi, Michael Negnevitsky, Gerard Ledwich Jan 2006

Control Strategy Of Distributed Generation For Voltage Support In Distribution Systems, An D. T Le, Kashem M. Muttaqi, Michael Negnevitsky, Gerard Ledwich

Faculty of Engineering and Information Sciences - Papers: Part A

Voltage problem is always a critical issue in operating a distribution system. The uncertainties of load distribution and variation have introduced a great complexity to the task of maintaining system voltage within the permitted range. In this paper, small-scale generator, known as distributed generation (DG), is employed in the system and acting as a voltage regulator. The output of DG is controlled in such a way that acceptable level of electrical supply quality is achieved with a reasonable operating cost. The DG controller is tested with a non-uniformly varying load on the time domain basis. Simulations have been conducted with …


Geant4 Simulation For Lhc Radiation Monitoring, M Glaser, S Guatelli, B Mascialino, M Moll, M G. Pia, F Ravotti Jan 2006

Geant4 Simulation For Lhc Radiation Monitoring, M Glaser, S Guatelli, B Mascialino, M Moll, M G. Pia, F Ravotti

Faculty of Engineering and Information Sciences - Papers: Part A

Monitoring radiation background is a crucial task for the operation of LHC experiments. A project is in progress at CERN for the optimisation of the radiation monitors for LHC experiments. A simulation system based on Geant4, designed to assist the engineering optimisation of LHC radiation monitor detectors, is presented. Various detector packaging configurations are studied through their Geant4-based simulation, and their behaviour is compared.


The Use Of Maple Platform For The Study Of Geodisc Motion On Curved Spacetimes, Dumitru N. Vulcanov, Valentina D. Wheeler Jan 2006

The Use Of Maple Platform For The Study Of Geodisc Motion On Curved Spacetimes, Dumitru N. Vulcanov, Valentina D. Wheeler

Faculty of Engineering and Information Sciences - Papers: Part A

The article illustrates the graphical study of geodesic motion on curved space-times (mainly exact solutions of Einstein equations) using the symbolic, numerical and graphical computation facilities of Maple platform. The example of null geodesics on Schwarzschild solution is completely processed. The geodesic curves are plotted directly using DEtools package in Schwarzschild coordinates.


Reply To Comment By M. Bayani Cardenas And John L. Wilson On "Flow Resistance And Bed Form Geometry In A Wide Alluvial Channel", Shu-Qing Yang, Soon-Keat Tan, Siow-Yong Lim Jan 2006

Reply To Comment By M. Bayani Cardenas And John L. Wilson On "Flow Resistance And Bed Form Geometry In A Wide Alluvial Channel", Shu-Qing Yang, Soon-Keat Tan, Siow-Yong Lim

Faculty of Engineering and Information Sciences - Papers: Part A

The authors would like to thank Cardenas and Wilson [2006] for their valuable comments and interesting discussions.