The University of Wollongong Faculty of Engineering and Information Sciences was formed in 2013 following an organisational restructure. It comprised an amalgamation of the former Faculty of Engineering and Faculty of Informatics. Related series: Faculty of Engineering and Information Sciences - Papers.

Follow

Papers from 2009

PDF

Is the notion of divisible on-line/off-line signatures stronger than on-line/off-line signatures?, Willy Susilo, Yi Mu, and Man Ho Allen Au

PDF

Measuring end-users' opinions for establishing a user-centred Electronic Health Record (EHR) system from the perspective of nurses, Yung-Yu Su, Khin Than Win, John Fulcher, and Herng-Chia Chiu

PDF

The development of Taiwanese electronic medical record systems evaluation instrument, Y.Y. Su, Khin Than Win, and Herng-Chia Chiu

Continuum modelling for interactions between fullerenes and other carbon nanostructures, Ngamta Thamwattana, Duangkamon Baowan, and James M. Hill

Oscillation of carbon molecules inside carbon nanotube bundles, Ngamta Thamwattana, Barry Cox, and James M. Hill

Nanotube bundle oscillators: carbon and boron nitride nanostructures, Ngamta Thamwattana and James M. Hill

Informative statistical analyses using smooth goodness of fit test., Olivier Thas, J. C. W Rayner, Donald John Best, and B. De Boeck

PDF

Semantic-Aware Delivery of Multimedia, Joseph Thomas-Kerr, Christian Ritz, and Ian Burnett

Identity-based identification scheme secure against concurrent-reset attacks without random oracles, Pairat Thorncharoensri, Willy Susilo, and Yi Mu

Policy-controlled signatures, Pairat Thorncharoensri, Willy Susilo, and Yi Mu

Predicting gas diffusion regime within pores of different size, shape, Aaron Thornton, Tamsyn Hilder, Anita Hill, and James M. Hill

PDF

Modelling hydrogen adsorption within spherical, cylindrical and slit-shaped cavities, Aaron Thornton and James M. Hill

Metal-organic frameworks impregnated with magnesium-decorated fullerenes for methane and hydrogen storage, Aaron Thornton, Kate Nairn, James M. Hill, Anita Hill, and Mathew Hill

PDF

A communications policy perspective on CTC sustainability in regional Australia: normative assumptions, commercial viability and social good, William Tibben

PDF

Revisiting the question of social capital in public policy: exploring new directions for community informatics research, William Tibben

PDF

A car detection system based on hierarchical visual features, Fok Hing Chi Tivive and Abdesselam Bouzerdoum

Unconditionally Secure Approximate Message Authentication, Dongvu Tonien, Reihaneh Safavi-Naini, Peter Nickolas, and Yvo Desmedt

Stability of plane poiseuille-couette flows of a piezo-viscous fluid, Thien Tran-Duc and Sergey Suslov

PDF

Novel Cooperative Communication Schemes for Space-Time-Frequency Coded MB-OFDM UWB, Le Chung Tran, Xiaojing Huang, Alfred Mertins, and Eryk Dutkiewicz

PDF

Unitary differential space-time-frequency codes for MB-OFDM UWB, Le Chung Tran, Alfred Mertins, E. Dutkiewicz, and Xiaojing Huang

PDF

Novel constructions of improved square complex orthogonal designs for eight transmit antennas, Le Chung Tran, Alfred Mertins, Jennifer Seberry, Tadeusz A. Wysocki, and Sarah S. Adams

Evaluation of health information system: a case study on laboratory information system, Chris Troncone and Khin Than Win

The isometric representation theory of numerical semigroups, Sean T. Vittadello

PDF

RFID Adoption Issues: Analysis of Organizational Benefits & Risks, Samuel Fosso Wamba, Byron W. Keating, Tim Coltman, and Katina Michael

PDF

A contingency model for creating value from RFID supply chain network projects in logistics and manufacturing environments, S. F. Wamba and A. T. Chatfield

Semiparametric regression and graphical models, M. P. Wand

PDF

An efficient certificateless signature from pairings, Changji Wang, Dongyang Long, and Yong Tang

PDF

OLSR-R^3: Optimised link state routing with reactive route recovery, Jerry Chun-Ping Wang, Farzad Safaei, Mehran Abolhasan, and Daniel R. Franklin

PDF

Design and Experimental Investigation of Demand Dependent Active Suspension for Vehicle Rollover Control, Lifu Wang, Nong Zhang, and Haiping Du

New results on unconditionally secure multi-receiver manual authentication, Shuhong Wang and Reihaneh Safavi-Naini

Further observations on certificateless public key encryption, Xu Wang, Xinyi Huang, and Xiaoyuan Yang

PDF

Comparison of Alamouti and STS implementations using a software defined radio test bed, Shinhan Wee, Montserrat B. Ros, and Peter James Vial

PDF

Mitagation against MAI in a space time spreading software defined radio, Shinhan Wee, Montse Ros, and Peter James Vial

Linewidth enhancement factor measurement based on optical feedback self-mixing effect: a genetic algorithm approach, Lu Wei, Jiangtao Xi, Yanguang Yu, and Joe F. Chicharo

PDF

An e-learning system architecture based on web services and intelligent agents, Xu Wei and Jun Yan

PDF

Learner profile design for personalized e-learning systems, Xu Wei and Jun Yan

A review of telemedicine in developing countries: introduction and implementation issues, Khin Than Win and Nurazean Maarop

Teleconsultation service utilization key issues in the context of Malaysia: an organizational perspective, Khin Than Win, Nurazean Maarop, Sukdershan Singh HS, and Maslin Masrom

Efficient non-interactive range proof, Duncan S. Wong, Willy Susilo, Yi Mu, Tsz Hon Yuen, Guomin Yang, and Q.X. Huang

Asymmetric group key agreement, Qianhong Wu, Yi Mu, Willy Susilo, Bo Qin, and Josep Domingo-Ferrer

Privacy for private key in signatures, Qianhong Wu, Bo Qin, Willy Susilo, and Yi Mu

PDF

Certificate-based signatures revisited, Wei Wu, Yi Mu, Willy Susilo, and Xinyi Huang

PDF

Identification and prioritization of variables that influence learning content development in e-learning platforms, Zhengui Wu and Parviz Doulai

PDF

Customizable data exchange based on web service, Jun Xu, Gang Xiao, Jiawei Lu, Qianhui Liang, and Jun Shen

PDF

A new approach to sparse image representation using MMV and K-SVD, Jie Yang, Abdesselam Bouzerdoum, and Son Lam Phung

Lifetime service level agreement management with autonomous agents for services provision, Jun Yan, Ryszard Kowalczyk, Hai Jin, Yun Yang, and Qiang He

PDF

An efficient task allocation protocol for P2P multi-agent systems, Dayong Ye, Quan Bai, Minjie Zhang, Khin Than Win, and Zhiqi Shen

Indexing and retrieval of ubiquitous visual information, Lei Ye, Jianhua Ma, and Runhe Huang

Local aggregation function learning based on support vector machines, Lei Ye and Jun Zhang

PDF

DDoS defense using TCP_IP header analysis and proactive tests, Zhen Ye, Weiwei Shi, and Dayong Ye

PDF

Discovery of core-nodes in event-based social networks, Shaojie Yuan, Quan Bai, Minjie Zhang, and Khin Than Win

PDF

Ant inspired scalable peer selection in ontology-based service composition, Shuai Yuan, Jun Shen, and Aneesh Krishna

The development and evaluation of a PDA-based method for public health surveillance data collection in developing countries, Ping Yu, Maximilian de Courten, Elaine Pan, Gauden Galea, and Jan Pryer

Developing approaches to measure the quality of electronic versus paper-based nursing documentation in aged care homes, Ping Yu, David Hailey, Ning Wang, and Deborah Oxlade

Health IT acceptance factors in long-term care facilities: a cross-sectional survey, Ping Yu, Haocheng Li, and Marie-Pierre Gagnon

PDF

Optical feedback self-mixing interferometry with a large feedback factor C: behavior studies, Yanguang Yu, Jiangtao Xi, Joe F. Chicharo, and Thierry Bosch

PDF

Face recognition from single sample based on human face perception, Ce Zhan, Wanqing Li, and Philip Ogunbona

PDF

Content based image retrieval using unclean positive examples, Jun Zhang and Lei Ye

PDF

Image retrieval based on bag of images, Jun Zhang and Lei Ye

PDF

Image retrieval using noisy query, Jun Zhang and Lei Ye

PDF

Ranking method for optimizing precision/recall of content-based image retrieval, Jun Zhang and Lei Ye

PDF

Watermarking protocol for protecting user's right in content based image retrieval, Jun Zhang and Lei Ye

Collaborative agents for complex problems solving, Minjie Zhang, Q. Bai, Fenghui Ren, and John Fulcher

Flexible negotiation modeling by using colored petri nets, Minjie Zhang, Kwang Mong Sim, and Quan Bai

PDF

Secure mobile agents with designated hosts, Qi Zhang, Yi Mu, Minjie Zhang, and Robert H. Deng

Self organizing maps for the clustering of large sets of labeled graphs, Shujia Zhang, Markus Hagenbuchner, Ah Chung Tsoi, and Alessandro Sperduti

Handling significant scale difference for object retrieval in a supermarket, Yuhang Zhang, Lei Wang, Richard Hartley, and Hongdong Li

PDF

Construction of amicable orthogonal designs of quaternions, Ying Zhao, Jennifer Seberry, Tianbing Xia, Beata J. Wysocki, and Tadeusz A. Wysocki

PDF

Identifying anatomical shape difference by regularized discriminative direction, Luping Zhou, Richard Hartley, Lei Wang, Paulette Lieby, and Nick Barnes

PDF

Improving software testing cost-effectiveness through dynamic partitioning, Zhiquan Zhou, Arnaldo Sinaga, Lei Zhao, Willy Susilo, and Kai-Yuan Cai

An analytical solution for long wave refraction over a circular hump, Song-Ping Zhu and Fatimah Noor bt Harun

Refraction of interfacial waves over a circular hump, Song-Ping Zhu and Fatimah Noor bt Harun

A perturbation DRBEM model for weakly nonlinear wave run-ups around islands, Song-Ping Zhu, Huan-Wen Liu, and Timothy R. Marchant

PDF

Diffraction of ocean waves around a hollow cylindrical shell structure, Song-Ping Zhu and Lewis Mitchell

A hybrid finite difference method for valuing American options, Song-Ping Zhu and Jin Zhang

PDF

Support of distribution system using distributed wind and PV systems, Kai Zou, Ashish P. Agalgaonkar, Kashem Muttaqi, Sarath Perera, and N Browne

Securing electronic health records: an overview, Alejandro Flores Zuniga, Khin Win, and Willy Susilo

Papers from 2008

PDF

The state of public data availability in Australia: a study of suppliers of critical infrastructure information, Roba Abbas

PDF

Development and performance evaluation of a flexible, low cost MANET, Mehran Abolhasan, Brett Hagelstein, Jerry Chun-Ping Wang, D. Franklin, Farzad Safaei, and Tadeusz A. Wysocki

Survey of the potential of emerging wireless technologies to improve telecommunication services in remote Australian settlements, Mehran Abolhasan and Alyson Wright

Quaternion orthogonal designs from complex companion designs, Sarah S. Adams, Jennifer Seberry, Nathaniel Karst, Jonathan Pollack, and Tadeusz A. Wysocki

PDF

Motion classification using Dynamic Time Warping, Kevin Adistambha, Christian Ritz, and Ian Burnett

Genetic correlations between reproduction of crossbred ewes and the growth and carcass performance of their progeny, R. A. Afolayan, N. M. Fogarty, Arthur R. Gilmour, V. M. Ingham, G. M. Gaunt, and L. J. Cummins

Reproductive performance and genetic parameters in first cross ewes from different maternal genotypes, R. Afolayan, N. Fogarty, Arthur Gilmour, V. Ingham, G. Gaunt, and L. Cummins

PDF

Calibrating mean-reverting jump diffusion models: an application to the NSW electricity market, Jamie Alcock, J. M. Goard, and Tony Vassallo

Toward a model for e-government services adoption: the case of Jordan, Omar Al Hujran and Akemi T. Chatfield

Comparison of small-scale and large-scale mixing characteristics: Correlations between small-scale and large-scale mixing and extensional characteristics of wheat flour dough, Helen Allen, Simon Diffey, Allen H, Zena Pumpa, Simon Nath, Jennifer K. Morell, Gulay R. Cullis, and Alison Smith

Healthcare workers' readiness to adopt e-Health applications in public hospitals in regional Saudi Arabia: a case study, Fares Alshammari and Ping Yu

PDF

Parameters estimation for SSMs: QL and AQL approaches, Raed Alzghool and Yan-Xia Lin

Covariant representations of Hecke algebras and imprimitivity for crossed products by homogeneous spaces, Astrid an Huef, S. Kaliszewski, and Iain F. Raeburn

PDF

Collisionless shock resolution in nematic liquid crystals, Gaetano Assanto, Timothy R. Marchant, and Noel Smyth

PDF

Traceable and retrievable identity-based encryption, Man Ho Au, Qiong Huang, Joseph K. Liu, Willy Susilo, Duncan S. Wong, and Guomin Yang

PDF

Practical anonymous divisible e-cash from bounded accumulators, Man Ho Au, Willy Susilo, and Yi Mu

Constructing strong KEM from weak KEM (or how to revive the KEM/DEM framework), Joonsang Baek, David Galindo, Willy Susilo, and Jianying Zhou

Fuzzy identity-based encryption: new and efficient schemes, Joonsang Baek, Willy Susilo, and Jianying Zhou

PDF

A flexible and reasonable mechanism for self-interested agent team forming, Q. Bai and Minjie Zhang

A fuzzy logic-based approach for flexible self-interested agent team forming, Q. Bai and Minjie Zhang

Colored Petri Net Based Scheduling for Agent-Based Grid Systems, Q. Bai and Minjie Zhang

PDF

Elimination of gamma nonlinear luminance effects for digital video projection phase measuring profilometers, Matthew J. Baker, Jiangtao Xi, and Joe F. Chicharo

PDF

Joining a carbon nanotube and a graphene sheet, D. Baowan, B. J. Cox, and James M. Hill