The University of Wollongong Faculty of Engineering and Information Sciences was formed in 2013 following an organisational restructure. It comprised an amalgamation of the former Faculty of Engineering and Faculty of Informatics. Related series: Faculty of Engineering and Information Sciences - Papers.

Follow

Papers from 2008

PDF

Power quality survey factor analysis using multivariable linear regression (MVLR), Chandana Herath, Victor J. Gosbell, Sarath Perera, and David A. Stirling

PDF

Evaluation of human gait through observing body movements, Amir S. Hesami, Fazel Naghdy, David A. Stirling, and Harold C. Hill

PDF

Perception of human gestures through observing body movements, Amir S. Hesami, Fazel Naghdy, David A. Stirling, and Harold C. Hill

PDF

Application of fuzzy NARX to human gait modelling and identification, Seyed Hesami, Fazel Naghdy, David A. Stirling, and Harold C. Hill

PDF

Encapsulation of the Anticancer Drug Cisplatin into Nanotubes, T. A. Hilder and James M. Hill

Carbon nanotubes as drug delivery nanocapsules, Tamsyn Hilder and James M. Hill

A continuous model for the joining of two fullerenes, James M. Hill, Duangkamon Baowan, and Barry J. Cox

Coulomb-Mohr granular materials: Quasi-static flows and the highly frictional limit, James M. Hill, Grant M. Cox, Ngamta Thamwattana, and Scott McCue

Lie group symmetry analysis of transport in porous media with variable transmissivity, James M. Hill, Maureen P. Edwards, and A P S Selvadurai

Theoretical comparison of nanotube materials for drug delivery, James M. Hill and Tamsyn A. Hilder

PDF

Mechanics of fullerene-carbon nanotube bundle oscillators, James M. Hill, Ngamta Thamwattana, Duangkamon Baowan, and Barry J. Cox

Continuum modelling of gigahertz nano-oscillators, James M. Hill, Ngamta Thamwattana, Duangkamon Baowan, Tamsyn A. Hilder, and Barry J. Cox

Spherical and spheroidal fullerenes entering carbon nanotubes, James M. Hill, Ngamta Thamwattana, and Barry J. Cox

Productivity and sustainability of a spring wheat-field pea rotation in a semi-arid environment under conventional and conservation tillage systems, G B. Huang, R Z. Zhang, G D. Li, L L. Li, K Y. Chan, D P. Heenan, W Chen, M J. Unkovish, M J. Roberston, Brian R. Cullis, and W D. Belloti

PDF

A five-round algebraic property of the advanced encryption standard, Jianyong Huang, Jennifer Seberry, and Willy Susilo

Ambiguous optimistic fair exchange, Qiong Huang, Guomin Yang, Duncan S. Wang, and Willy Susilo

Efficient optimistic fair exchange secure in the multi-user setting and chosen-key model without random oracles, Qiong Huang, Guomin Yang, Duncan S. Wang, and Willy Susilo

PDF

Making carrier frequency offset an advantage for orthogonal frequency division multiplexing, Xiaojing Huang

PDF

Multipath diversity of precoded OFDM with linear equalization, Xiaojing Huang

PDF

Higher order parallel concatenated spreading matrices OFDM, Xiaojing Huang and Ibrahim Raad

Secure universal designated verifier signature without random oracles, Xinyi Huang, Willy Susilo, Yi Mu, and Wei Wu

PDF

Short designated verifier signature scheme and its identity-based variant, Xinyi Huang, Willy Susilo, Yi Mu, and Futai Zhang

PDF

Barriers to using ICT in mathematics teaching: issues in methodology, Rebecca Hudson, Anne L. Porter, and Mark I. Nelson

PDF

Study on Generalized Analysis Model for Fringe Pattern Profilometry, Y. Hu, Jiangtao Xi, Z. Yang, Enbang Li, and Joe F. Chicharo

PDF

Amal Graafstra- The Do-It-Yourselfer RFID Implantee: The culture, values and ethics of hobbyist implantees: a case study, R. Ip, Katina Michael, and M G. Michael

PDF

The social implications of humancentric chip implants: a scenario - ‘Thy chipdom come, thy will be done’, Rodney Ip, Katina Michael, and M G. Michael

PDF

Supporting a seamless map in peer-to-peer system for massively multiplayer online role playing games, Xinbo Jiang and Farzad Safaei

Proper actions, fixed-point algebras and naturality in nonabelian duality, S. Kaliszewski, John Quigg, and Iain F. Raeburn

PDF

Developing ontology revision framework: A case study on the use of the coherence theory for semantic shopping mall, Seung Hwan Kang and Sim Kim Lau

PDF

A scalable lightweight distributed crawler for crawling with limited resources, Milly W. Kc, Markus Hagenbuchner, and Ah Chung Tsoi

PDF

Quality information retrieval for the World Wide Web, Milly W. Kc, Markus Hagenbuchner, and Ah Chung Tsoi

PDF

In pursuit of a sustainable supply chain: insights from Westpac Banking Corporation, Byron Keating, Ali Quazi, Anton Kriz, and Tim Coltman

PDF

Managing ethics in the tourism supply chain: the case of Chinese travel to Australia, Byron W. Keating

PDF

Outbound Tourism From China: Literature Review and Research Agenda, Byron W. Keating and A. Kriz

PDF

In pursuit of a sustainable supply chain: Insights from Westpac Banking Corporation, Byron W. Keating, A. Quazi, A. Kriz, and T. Coltman

PDF

Using a novel variable block size image compression algorithm for hiding secret data, F. Keissarian

PDF

Adaptive independence samplers, Jonathan M. Keith, Dirk P. Kroese, and Georgy Sofronov

Network Structure, Position, Ties and ICT Use in Distributed Knowledge-Intensive Work, Kon Shing Kenneth Chung and Liaquat Hossain

PDF

A Spatially Aware RFID-Enhanced Wireless Sensor Network, Dheeraj Klair, Kwan-Wu Chin, Raad Raad, and Darryn Lowe

PDF

Voltage unbalance emission limits for installations: general guidelines and system specific considerations, Robert Koch, Alexander Baitch, Sarath Perera, and Prabodha Paranavithana

PDF

Towards an Enterprise Business Process Architecture standard, George Koliadis, Aditya K. Ghose, and Srinivas Padmanabhuni

ICT education issues and challenges in Australia and the UK, Anthony J. Koppi, Fazel Naghdy, and Joe F. Chicharo

PDF

Issues in Australian ICT education, Tony J. Koppi, Fazel Naghdy, and Joe F. Chicharo

PDF

The crisis in ICT education: an academic perspective, Tony J. Koppi, Fazel Naghdy, Joe F. Chicharo, Judy Sheard, Sylvia Edwards, and David Wilson

PDF

New orthogonal designs from weighing matrices, Ilias Kotsireas, Christos Koukouvinos, and Jennifer Seberry

PDF

Requirements elicitation using goal-based organizational model, Aneesh Krishna and He Lu

PDF

C*-algebras associated to coverings of k-graphs, Alexander Kumjian, David A. Pask, and Aidan Sims

PDF

Advanced location-based services, Miguel A. Labrador, Katina Michael, and Axel Kuepper

PDF

East coast mainline rail track: options for 2014, Philip G. Laird

Branch and Bound Algorithms to Solve Semiring Constraint Satisfaction Problems, Louise Leenen and Aditya K. Ghose

Evaluation of perennial pasture legumes and herbs to identify species with high herbage production and persistence in mixed farming zones in southern Australia, G. D. Li, G. M. Lodge, G. A. Moore, A. D. Craig, B. S. Dear, S. P. Boschma, T. O. Albertsen, S. M. Miller, S. Harden, R. C. Hayes, S. J. Hughes, R. Snowball, A B. Smith, and Brian R. Cullis

Cryptanalysis and Improvement of an Efficient Certificateless Signature Scheme, Jiguo Li, Xinyi Huang, Yi Mu, and Wei Wu

The security and improvement of an ultra-lightweight RFID authentication protocol, Tieyan Li, Robert Deng, and Guilin Wang

Security analysis on a family of ultra-lightweight RFID authentication protocols, Tieyan Li, Guilin Wang, and Robert Deng

The analysis of stratified multiple responses, Ivy Liu and Thomas F. Suesse

Certificate-based signature schemes without pairings or random oracles, Joseph K. Liu, Joonsang Baek, Willy Susilo, and Jianying Zhou

PDF

Hierarchical Identity-Based Online/Offline Encryption, Zhongren Liu, Li Xu, Zhide Chen, Yi Mu, and Fuchun Guo

The HCM for perceptual image segmentation, Wanqing Li, Ling Guan, Jonathon Randall, and Xing Zhang

PDF

Expandable data-driven graphical modeling of human actions based on salient postures, Wanqing Li, Zhengyou Zhang, and Zicheng Liu

PDF

Graphical modeling and decoding of human actions, Wanqing Li, Zhengyou Zhang, and Zicheng Liu

Identify and extract delta of materialized view with limited collaborations, Z. Lu and Janusz R. Getta

PDF

Abnormal behavior detection using a multi-modal stochastic learning approach, Philippa M. Lyons-Wall, Abdesselam Bouzerdoum, Son Lam Phung, and Azeddine Beghdadi

Barriers to e-Commerce adoption in SMEs: a comparison of the perception of barriers in a developed and a developing country, Robert Macgregor and Mira Kartiwi

A profile of Australian regional SME non-adopters of E-commerce, Robert Macgregor and Lejla Vrazalic

PDF

Kinetic analysis of oleic acid esterification using lipolytic enzyme as catalyst, Mohd S. Mahmud, James W. Ryan, Cyrus Cooper, Tomasz Safinski, Mark I. Nelson, Harvinder S. Sidhu, and Soji A. Adesina

Undular bores and the initial-boundary value problem for the modified Korteweg-de Vries equation, Timothy R. Marchant

Nonlocal validity of an asymptotic one-dimensional nematicon solution, Timothy R. Marchant and Noel Smyth

Helices for mathematical modelling of proteins, nucleic acids and polymers, James A. McCoy

PDF

Acoustic Flow, Phillip J. McKerrow

PDF

A software architecture for mobile robot navigation, Phillip J. McKerrow and Sherine M. Antoun

Identifying and distinguishing various varieties of abelian topological groups, Carolyn E. McPhail and Sidney A. Morris

PDF

Varieties of abelian topological groups and scattered spaces, Carolyn E. McPhail and Sidney A. Morris

PDF

Head-pose tracking with a time-of-flight camera, Simon Meers and Koren Ward

PDF

Simple, robust and accurate head-pose tracking using a single camera, S. Meers, Koren Ward, and I. Piper

PDF

Application of Quasi-orthogonal space-time-frequency codes in MB-OFDM UWB, Alfred Mertins and Le Chung Tran

PDF

Social and Organizational Aspects of Information Security Management, Katina Michael

Editorial: What is evidence-based policy (EBP)?, Katina Michael and M G. Michael

PDF

Schengen Information System II: The balance between civil liberties, security and justice, Katina Michael and M G. Michael

PDF

Microchip implants for humans as unique identifiers: a case study on VeriChip, Katina Michael, M G. Michael, and Rodney Ip

PDF

Policy implications of convergence in the new security environment: An investigation into the symbiosis between risk management and intelligence, K. Michael and M. Loves

PDF

Schengen Information System II: The balance between civil liberties, security and justice, K. Michael and M. G. Michael

PDF

A research note on ethics in the emerging age of Überveillance, M. G. Michael, Sarah Jean Fusco, and Katina Michael

PDF

Überveillance: 24/7 x 365 People Tracking & Monitoring, MG. Michael and K. Michael

PDF

National security and the misology-misanthropy paradox of technology, George M. Mickhail

PDF

Location Constraints in Digital Rights Management, Adam Muhlbauer, Reihaneh Safavi-Naini, Farzad Salim, Nicholas Paul Sheppard, and Martin Jan Surminen

PDF

Strong shift equivalence of C*correspondences, Paul Muhly, David A. Pask, and Mark Tomforde

Identity-based online/offline encryption, Yi Mu, Zhide Chen, and Fuchun Guo

Multi-Identity Management for Identity-Based Cryptography, Yi Mu, Zhide Chen, and Fuchun Guo

Concurrent signatures without a conventional keystone, Yi Mu, Duncan S. Wang, Liqun Chen, Willy Susilo, and Qianhong Wu

Methods for estimating special variations in rotating panel surveys, Mohammad-Reza Namazi-Rad

PDF

Modelling of Hydraulic Governor-Turbine for Control Stabilisation, Michael Negnevitsky, Kashem Muttaqi, and Yin Chin Choo

Efficient modular arithmetic in adapted modular number system using lagrange representation, Christophe Negre and Thomas Plantard

Reducing the emission of pollutants in industrial wastewater through the use of membrane bioreactors, Mark Nelson, Xiao Dong Chen, and Harvinder Sidhu

PDF

Autoignition of hydrocarbons in a batch reactor: Analysis of a reduced model, Mark I. Nelson and E Balakrishnan

A fundamental analysis of continuous flow bioreactor models and membrane reactor models to process industrial wastewaters, Mark I. Nelson, Xiao Dong Chen, Easwaran Balakrishnan, and Harvinder S. Sidhu

A fundamental analysis of continuous flow bioreactor and membrane reactor models with death and maintenance included, Mark Nelson, Tara Kerr, and Xiao Dong Chen

PDF

An operational model for a well-stirred membrane bioreactor: reactor performance analysis, Mark Nelson, Harvinder Sidhu, and Soji Adesina

PDF

The passage of food through animal stomachs: a chemical reactor engineering approach, Mark Nelson, Harvinder S. Sidhu, and Xiao Dong Chen

RFID privacy models revisited, Ching Yu Ng, Willy Susilo, Yi Mu, and Reihaneh Safavi-Naini

PDF

A supervised learning approach for imbalanced data sets, Giang H. Nguyen, Abdesselam Bouzerdoum, and Son Lam Phung