The University of Wollongong Faculty of Engineering and Information Sciences was formed in 2013 following an organisational restructure. It comprised an amalgamation of the former Faculty of Engineering and Faculty of Informatics. Related series: Faculty of Engineering and Information Sciences - Papers.

Follow

Papers from 2007

PDF

A simple spatial model for self-heating compost piles, Harvinder Sidhu, Mark Nelson, and Xiao Dong Chen

PDF

Mathematical modelling of the self-heating process in compost piles, Harvinder Sidhu, Mark Nelson, Thiansiri Luangwilai, and Xiao Dong Chen

Mathematical analysis of the activated aludge process for domestic wastewater treatment, Harvinder S. Sidhu and Mark I. Nelson

PDF

Performance improvement and dynamical behaviour analysis of a cascade of two CSTRs, Harvinder S. Sidhu, Simon D. Watt, Mark I. Nelson, and Ajay K. Ray

PDF

Quasi-Monte Carlo for Highly Structured Generalised Response Models, I. H. Sloan, F. Y. Kuo, W. T. Dunsmuir, M. Wand, and R. S. Womersley

Varietal selection for perennial crops where data relate to multiple harvests from a series of field trials, A B. Smith, J. K. Stringer, X. Wei, and Brian R. Cullis

PDF

Comparative analysis of resource reservation cost for different rsvp extension schemes in mobile environments, Yilin Song, Yi Sun, Min Liu, and E. Dutkiewicz

PDF

Implementing Trusted Terminals with a TPM and SITDRM, S. Stamm, N. P. Sheppard, and R. Safavi-Naini

PDF

Person-level and household-level regression estimation in household surveys, David G. Steel and Robert Graham Clark

PDF

Fast RSVP: a cross layer resource reservation scheme for mobile IPv6 networks, Yi Sun, Bin Feng, Yucheng Zhang, Gengfa Fang, Jinglin Shi, and E. Dutkiewicz

PDF

Research on bandwidth reservation in IEEE 802.16 (WiMAX) networks, Yi Sun, Yilin Song, Jinglin Shi, and Eryk Dutkiewicz

PDF

Location-based DRM using WiFi Access Points, Martin Jan Surminen, Nicholas Paul Sheppard, and Reihaneh Safavi-Naini

PDF

Cryptanalysis of Modification to Self-Certified Group-Oriented Cryptosystem without A Combiner, Willy Susilo and Hiroaki Kikuchi

Securing personal health information access in mobile healthcare environment through short signature schemes, Willy Susilo and Khin Than Win

Security and Access of Health Research Data, Willy Susilo and Khin Than Win

The development of Taiwanese electronic medical record systems evaluation instrument, Yung-Yu Su, Khin Than Win, and Herng-Chia Chiu

PDF

Flicker Propagation in Interconnected Power Systems, S. Tennakoon, S. Perera, and Danny Sutanto

PDF

Intelligent Multimedia Delivery? It’s a question of semantics, Joseph Thomas-Kerr, I. Burnett, and C. Ritz

PDF

Is That a Fish in Your Ear? A Universal Metalanguage for Multimedia, Joseph Thomas-Kerr, I. Burnett, C. H. Ritz, S. Devillers, D. de Schrijever, and R. Van de Walle

PDF

Reconfigurable Media Coding: self-describing multimedia bitstreams, Joseph Thomas-Kerr, J. Janneck, M. Mattavelli, I. Burnett, and C. Ritz

PDF

How to Find the Sufficient Collision Conditions for Haval-128 Pass 3 by Backward Analysis, Pairat Thorncharoensri, Tianbing Xia, and Yi Mu

PDF

Energy efficient integrated scheduling of unicast and multicast traffic in 802.16e WMANs, Lin Tian, Yubo Yang, Jinglin Shi, E. Dutkiewicz, and Gengfa Fang

PDF

A communications policy perspective on CTC sustainability in regional Australia: commercial viability and social good, William Tibben

PDF

Re-conceptualizing the digital divide: a knowledge-based approach, William Tibben

Innovation strategy for the Pacific islands in the new millennium: mixing science with tradition, William Tibben and Apelu Tielu

PDF

Citation Analysis using Formal Concept Analysis: A case study in Software Engineering, T. Tilley and P Eklund

PDF

A Nonlinear Feature Extractor for Texture Segmentation, Fok Hing Chi Tivive and Abdesselam Bouzerdoum

PDF

Force Application During Cochlear Implant Insertion: An Analysis for Improvement of Surgeon Technique, C. Todd, F. Naghdy, and M. J. Svehla

A comparison of media response to recent national security events, Holly Tootell

PDF

Auto-ID and location-based services in national security: Social implications, Holly Tootell

Design of a P2P information sharing MAS using MOBMAS, Numi Tran, Ghassan Beydoun, and Graham C. Low

PDF

Beyond Mere Compliance of RFID Regulations by the Farming Community: A Case Study of the Cochrane Dairy Farm, A. Trevarthen and Katina Michael

Blacklistable anonymous credentials: blocking misbehaving users without ttps, Patrick P. Tsang, Man Ho Allen Au, Apu Kapadia, and Sean W. Smith

PDF

Diversity Performance of Interleaved Spread Spectrum OFDM Signals over Frequency Selective Multipath Fading Channels, P. Tu, Xiaojing Huang, and E. Dutkiewicz

PDF

Peak-to-Average Power Ratio Performance of Interleaved Spread Spectrum OFDM Signals, P. Tu, Xiaojing Huang, and E. Dutkiewicz

The analysis of QTL by simultaneous use of the full linkage map, A. P. Verbyla, Brian R. Cullis, and R Thompson

Design and simulation of a DS-TH-UWB system using Simulink/MATLAB for first arriving rays in a non line of sight wireless scenario, Peter James Vial

PDF

Soccer robot toy within an educational environment, Peter James Vial, G. Serafini, and I. Raad

PDF

Optimal receiver for Space Time Spreading across a Time Hopping PPM over Ultra Wideband Saleh-Valenzuela MIMO Channel, Peter James Vial, Beata J. Wysocki, and Tadeusz A. Wysocki

On the generic and efficient constructions of secure designated confirmer signatures, Guilin Wang, Joonsang Baek, Duncan Wong, and Feng bao

PDF

On Separating Route Control and Data Flows in Multi-radio Multi-hop Ad Hoc Network, Jerry Chun-Ping Wang, Mehran Abolhasan, D. Franklin, Farzad Safaei, and Justin Lipman

PDF

A Survey on Control Separation Techniques in Multi-Radio Multi-channel MAC Protocols, Jerry Chun-Ping Wang, Mehran Abolhasan, Farzad Safaei, and D. Franklin

Improving ethanol production through continuous fermentation, Simon D. Watt, Harvinder S. Sidhu, Mark I. Nelson, and Ajay K. Ray

PDF

Analysis of a model for ethanol production through continuous fermentation, Simon Watt, Harvinder Sidhu, Mark Nelson, and Ajay Ray

PDF

An example of a hierarchical system model using SEAM and its formalization in Alloy, Alain Wegmann, Lam-Son Le, Jose Diego de la Cruz, Irina Rychkova, and Gil Regev

Enterprise modeling using the foundation concepts of the RM-ODP ISO/ITU standard, Alain Wegmann, Lam-Son Le, Gil Regev, and Bryan Wood

PDF

Business and IT alignment with SEAM for enterprise architecture, Alain Wegmann, Gil Regev, Irina Rychkova, Lam-Son Le, Jose Diego de la Cruz, and Philippe Julia

PDF

Pre-Processing of Signals Observed from Laser Diode Self-mixing Intereferometries using Neural Networks, L. Wei, Joe F. Chicharo, Yanguang Yu, and Jiangtao Xi

PDF

Displacement Estimation Based on Model Calibration in Weak Feedback Optical Self-Mixing System, L. Wei, Jiangtao Xi, and J. Chicharo

PDF

Transition Analysis for Moderate Feedback Self-Mixing Interferometry, L. Wei, Jiangtao Xi, Yanguang Yu, and Joe F. Chicharo

A comparison of mixed model splines for curve fitting, S J. Welham, Brian R. Cullis, M G. Kenward, and R Thompson

Achieving mobility and anonymity in IP-based networks, Rungrat Wiangsripanawan, Willy Susilo, and Reihaneh Safavi-Naini

PDF

Design principles for low latency anonymous network systems secure against timing attacks, Rungrat Wiangsripanawan, Willy Susilo, and Reihaneh Safavi-Naini

Consent mechanisms for electronic medical record system: simple yet unresolved issue, Khin Than Win and John Fulcher

Consent Mechanisms for Electronic Health Record Systems: A Simple Yet Unresolved Issue, Khin Than Win and John A. Fulcher

PDF

Temporal Authorizations Scheme for XML Documents, Jing Wu, Jennifer Seberry, and Y. Mu

Cryptanalysis of BGW broadcast encryption schemes for DVD content protection, Qianhong Wu, Willy Susilo, Yi Mu, and Bo Qin

Convertible undeniable proxy signatures: security models and efficient construction, Wei Wu, Yi Mu, Willy Susilo, and Xinyi Huang

Provably secure identity-based undeniable signatures with selective and universal convertibility, Wei Wu, Yi Mu, Willy Susilo, and Xinyi Huang

Identity-based proxy signature from pairings, Wei Wu, Yi Mu, Willy Susilo, Jennifer Seberry, and Xinyi Huang

A finite element method for granular flow through a frictional boundary, Yong-Hong Wu, James M. Hill, and Aibing Yu

PDF

A simple orthogonal space-time-polarization block code, Beata J. Wysocki, Tadeusz A. Wysocki, Jennifer R. Seberry, Sarah S. Adams, and Hamid Sharif

Dynamic Zone Topology Routing Protocol for Mobile Ad Hoc Networks, Tadeusz A. Wysocki and Mehran Abolhasan

Space-Time-Polarization Block Codes from Quaternionic Orthogonal Designs, Tadeusz A. Wysocki, Beata J. Wysocki, and Jennifer Seberry

PDF

Some new results of regular Hadamard matrices and SBIBD II, Tianbing Xia, Mingyuan Xia, and Jennifer Seberry

Efficient Authentication Schemes for AODV and DSR, Shidi Xu, Yi Mu, Willy Susilo, Xinyi Huang, Xiaofeng Chen, and Fangguo Zhang

Dynamic Service Composition Contracting based on Agent Coalition, Jun Yan

Autonomous service level agreement negotiation for service composition provisions, Jun Yan, Ryszard Kowalczyk, Jian Lin, Mohan Chhetri, Suk Goh, and Jianying Zhang

An agent-based decentralised process management framework for web service composition, Jun Yan, Phillip Pidgeon, A. Krishna, and Jianming Yong

A mobile Agent Based Peer-to-Peer framework for Distributed Intributed Detections, Dayong Ye, Q. Bai, and Minjie Zhang

PDF

QoS-Aware Service Selection in P2P-Based Business Process Frameworks, S. Yuan and J. Shen

(Convertible) undeniable signatures without random oracles, Tsz Hon Yuen, Man Ho Allen Au, Joseph K. Liu, and Willy Susilo

The perceptions of aged care workers about the adoption of e-health applications in residential aged care in Australia, Ping Yu

PDF

The acceptance of a clinical IT innovation by the care givers in residential aged care 11-weeks after the software implementation in Australia, Ping Yu, Hui Yu, and Yi Mu

PDF

Improving the Performance in an Optical feedback Self-mixing Interferometry System using Digital Signal Pre-processing, Yanguang Yu, Jiangtao Xi, and Joe F. Chicharo

PDF

Toward automatic measurement of the linewidth-enhancement factor using optical feedback self-mixing interferometry with weak optical feedback, Yanguang Yu, Jiangtao Xi, Joe F. Chicharo, and Thierry Bosch

Efficient identity-based signcryption scheme for multiple receivers, Yong Yu, Bo Yang, Xinyi Huang, and Mingwu Zhang

PDF

Real-time facial feature point extraction, Ce Zhan, Wanqing Li, Philip Ogunbona, and Farzad Safaei

PDF

Emotional states control for on-line game avatars, Ce Zhan, Wanqing Li, Farzad Safaei, and Philip Ogunbona

Face to face communications in multiplayer online games: a real-time system, Ce Zhan, Wanqing Li, Farzad Safaei, and Philip Ogunbona

Anser: Adaptive neuron Artificial Neural Network System for Estimating Rainfall, Ming Zhang, Shuxiang Xu, and John Fulcher

Expert Discovery and Knowledge Mining in Complex Multi-agent Systems, Minjie Zhang, Xijin Tang, Jifa Gu, and Quan Bai

An Extended Dual Concern Model for Partner Selection in Multi-Agent Systems, Minjie Zhang, Jun Yan, and Fenghui Ren

PDF

The quality indicators of delivering e-learning for dementia care to nurses, Zhengyu Zhang and Ping Yu

PDF

Dynamic Bandwidth MCIDS - A Cognitive Solution for MCIDS based UWB Communications, J. Zhao, Xiaojing Huang, and E. Dutkiewicz

Human motion simulation and action corpus, Gang Zheng, Wanqing Li, Philip Ogunbona, Liju Dong, and Igor Kharitonenko

First price sealed bid auction without auctioneers, Shuo Zheng, Luke McAven, and Yi Mu

PDF

Perceived similarity and visual descriptions in content-based image retrieval, Yuan Zhong, Lei Ye, Wanqing Li, and Philip Ogunbona

PDF

Optimizing initial ranging region allocation in IEEE 802.16 OFDMA systems, Jihua Zhou, E. Dutkiewicz, Di Pang, Jinlong Hu, and Jinglin Shi

New construction of group secret handshakes based on pairings, Lan Zhou, Willy Susilo, and Yi Mu

On Favourable Conditions for Adaptive Random Testing, Zhiquan Zhou, Fei-Ching Kuo, and T.Y Chen

PDF

Automated Software Testing and Analysis: Techniques, Practices and Tools, Z. Q. Zhou, B. Scholz, and G. Denaro

Multi-party stand-alone and setup-free verifiably committed signatures, Huafei Zhu, Willy Susilo, and Yi Mu

PDF

A Numerical Model for Multiphase Flow Based on the GMPPS formulation, Part I Kinematics, Song-Ping Zhu and Frank Bierbrauer

Calculating The Early Exercise Boundary of American Put Options with an Approximation Formula, Song-Ping Zhu and ZhiWei He

PDF

A comparative study of the direct boundary element method and the dual reciprocity boundary element method in solving the Helmholtz equation, Song-Ping Zhu and Yinglong Zhang

PDF

Saidi minimization of a remote distribution feeder, Kai Zou, Wickramaarachchi W. Keerthipala, and Sarath Perera

Papers from 2006

PDF

The risk of public data availability on critical infrastructure protection, Roba Abbas

PDF

Simulation of HTS saturable core-type FCLs for MV distribution systems, S B. Abbott, Duane Robinson, S Perera, F A. Darmann, C J. Hawley, and T P. Beales

Self-selecting route discovery strategies for reactive routing in ad hoc networks, Mehran Abolhasan and Justin Lipman