The University of Wollongong Faculty of Engineering and Information Sciences was formed in 2013 following an organisational restructure. It comprised an amalgamation of the former Faculty of Engineering and Faculty of Informatics. Related series: Faculty of Engineering and Information Sciences - Papers.

Follow

Papers from 2005

PDF

On an infinite integral arising in the numerical integration of stochastic differential equations, David M. Stump and James M. Hill

PDF

Personal firewall for Pocket PC 2003: design & implementation, Willy Susilo, R. J. Ang, C. A. McDonald, and J. Huang

On the security of nominative signatures, Willy Susilo and Yi Mu

Provably secure fail-stop signature schemes based on RSA, Willy Susilo and Yi Mu

Tripartite concurrent signatures, Willy Susilo and Yi Mu

PDF

Secure key extraction in computer networks, Willy Susilo, Yi Mu, and Xinyi Huang

PDF

Privacy-enhanced Internet storage, Willy Susilo, Fangguo Zhang, and Yi Mu

PDF

Privacy-enhanced Internet storage: Non-interactive publicly verifiable 1-out-of-n encryption schemes, Willy Susilo, Fangguo Zhang, and Yi Mu

PDF

Effects of polyethylene bags, ethylene absorbent and 1-methylcyclopropene on the storage of Japanese pears, M. J. Szczerbanik, K. J. Scott, J. E. Paton, and D J. Best

PDF

Knowledge-based semantic image segmentation and global precedence effect, Fardin Akhlaghian Tab and Golshah Naghdy

An agent-based grid computing infrastructure, Jia Tang and Minjie Zhang

PDF

An agent-based peer-to-peer grid computing architecture, J. Tang and Minjie Zhang

PDF

Response of Mains Connected Induction Motors to Low Frequency Voltage Fluctuations from a Flicker Perspective, Sankika Tennakoon, Sarath Perera, and D A. Robinson

PDF

Mathematical modelling in nanotechnology, Ngamta Thamwattana and James M. Hill

Perturbation solutions for highly frictional granular media, Ngamta Thamwattana and James M. Hill

PDF

Bitstream Binding Language – Mapping XML Multimedia Containers into Streams, Joseph Thomas-Kerr, I. Burnett, and Philip Ciufo

PDF

A theoretical justification for partnerships in Community Technology Centre projects, William Tibben

PDF

A Fast Neural-Based Eye Detection System, Fok Hing Chi Tivive and Abdesselam Bouzerdoum

PDF

An eye feature detector based on convolutional neural network, Fok Hing Chi Tivive and Abdesselam Bouzerdoum

PDF

Efficient training algorithms for a class of shunting inhibitory convolutional neural networks, Fok Hing Chi Tivive and Abdesselam Bouzerdoum

PDF

Handwritten digit recognition based on shunting inhibitory convolutional neural networks, Fok Hing Chi Tivive and Abdesselam Bouzerdoum

PDF

Virtual cochlear implant insertion for medical education, C. Todd and F. Naghdy

PDF

Investigating the relationship between Location-Based Services and National Security, Holly Tootell

PDF

A generalized algorithm for the generation of correlated Rayleigh fading envelopes in wireless channels, Le Chung Tran, Tadeusz A. Wysocki, Alfred Mertins, and Jennifer R. Seberry

PDF

A generalized algorithm for the generation of correlated Rayleigh fading envelopes, Le Chung Tran, Tadeusz A. Wysocki, Jennifer Seberry, and Alfred Mertins

PDF

A generalized algorithm for the generation of correlated Rayleigh fading envelopes in radio channels, Le Chung Tran, Tadeusz A. Wysocki, Jennifer Seberry, and Alfred Mertins

PDF

Generalized Williamson and Wallis-Whiteman constructions for improved square order-8 CO STBCs, Le Chung Tran, Tadeusz A. Wysocki, Jennifer Seberry, A. Mertins, and Sarah A. Spence

The case for small area microdata, Mark Tranmer, A. Pickles, Ed Fieldhouse, M. Elliot, A. Dale, Mark Brown, D. Martin, David G. Steel, and C. Gardiner

PDF

The Importance of Utilising Electronic Identification for Total Farm Management: A Case Study of Dairy Farms on the South Coast of NSW, A. Trevarthen

Bias adjusted small area estimation with M-quantile models, Nikos Tzavidis and Ray Chambers

A fast, optimal spatial-prediction method for massive datasets, ShengLi Tzeng, Hsin-Cheng Huang, and Noel A. Cressie

PDF

On the performance of turbo codes with convolutional interleavers, Sina Vafi and Tadeusz A. Wysocki

PDF

Performance of convolutional interleavers with different spacing parameters in turbo codes, Sina Vafi and Tadeusz A. Wysocki

PDF

An ultra wide band simulator using MATLAB/Simulink, Peter James Vial, Beata J. Wysocki, and Tad Wysocki

Generic, optimistic, and efficient schemes for fair certified email delivery, Guilin Wang, Feng Bao, Kenji Imamoto, and Kouichi Sakurai

PDF

An efficient certified e-mail scheme suitable for wireless mobile environments, Guilin Wang, Feng Bao, Jianying Zhou, and Robert H. Deng

Security notes on two cheat-proof secret sharing schemes, Guilin Wang and Si-Han Qing

Security flaws in several group signatures proposed by Popescu, Guilin Wang and Sihan Qing

Cryptanalysis of a proxy blind signature scheme based on DLP, Shu-Hong Wang, Guilin Wang, Bao Feng, and Jie Wang

PDF

An exposure property of block designs, Y. Wang, Jennifer Seberry, Beata J. Wysocki, Tadeusz A. Wysocki, L. C. Tran, Y. Zhao, and Tianbing Xia

PDF

Novel color processing architecture for digital cameras with CMOS image sensors, Chaminda Weerasinghe, Wanqing Li, Igor Kharitonenko, Magnus Nilsson, and Sue Twelves

SQL structure rebuilder: preventing SQL injection attacks, Jian Wen, Yi Mu, and Willy Susilo

PDF

Location privacy in mobile IP, Rungrat Wiangsripanawan, R. Safavi-Naini, and Willy Susilo

A Review of security of electronic health records, Khin Than Win

Engineering Dependable Health Informations Systems, Khin Than Win and Peter Croll

PDF

An ontology based approach for health information discovery, Khin T. Win and Minjie Zhang

A variational approach to the stability of an embedded NLS soliton at the edge of the continuum, Annette L. Worthy, Antonmaria A. Minzoni, and Noel F. Smyth

PDF

Access Policy Sheet for access control in fine-grained XML, Jing Wu, Yi Mu, Jennifer Seberry, and Chun Ruan

PDF

Delegatable access control for fine-grained XML, Jing Wu, Jennifer Seberry, Y. Mu, and Chun Ruan

PDF

An infinite family of Goethals-Seidel arrays, M. Xia, Tianbing Xia, and Jennifer Seberry

PDF

A new method for constructing T-matrices, M. Xia, Tianbing Xia, Jennifer Seberry, and G. Zuo

A New Method for Constructing Williamson Matrices, Tianbing Xia, Jennifer Seberry, and Xia Mingyuan

PDF

Some new results of regular Hadamard matrices and SBIBD II, Tianbing Xia, M. Xia, and Jennifer Seberry

PDF

Estimating the parameters of semiconductor lasers based on weak optical feedback self-mixing interferometry, Jiangtao Xi, Yanguang Yu, Joe F. Chicharo, and T. Bosch

PDF

Estimating the parameters of semiconductor lasers based on weak optical feedback interferometry, Jiangtao Xi, Yanguang Yu, Joe F. Chicharo, and Thierry Bosch

PDF

An improved dynamic model for optical feedback self-mixing interferometry-based measurement and instrumentation, Jiangtao Xi, Yuanguang Yu, Enbang Li, and Joe F. Chicharo

A short proxy signature scheme: efficient authentication in the ubiquitous world, Huang Xinyi, Yi Mu, Willy Susilo, Fangguo Zhang, and Xiaofeng Chen

PDF

Power system applications of superconducting magnetic energy storage systems, X D. Xue, Eric KW Cheng, and Danny Sutanto

Efficient authentication scheme for routing in mobile ad hoc networks, Shidi Xu, Yi Mu, and Willy Susilo

Secure AODV routing protocol using one-time signature, Shidi Xu, Yi Mu, and Willy Susilo

PDF

Signal processing methods implemented in a novel FBG sensing system for vibration/dynamic strain measurement, Xingyuan Xu, Enbang Li, Jiangtao Xi, and Joe F. Chicharo

PDF

Ontology-based resource descriptions for distributed information sources, Hui Yang and Minjie Zhang

PDF

Decision aided joint compensation of clipping noise and nonlinearity for MIMO-OFDM systems, Shouyi Yang, Jiangtao Xi, and Xiaomin Mu

PDF

Decision aided compensation of residual frequency offset for MIMO-OFDM systems with nonlinear channel, Shouyi Yang, Jiangtao Xi, Fang Wang, Xiaomin Mu, and Hideo Kobayashi

PDF

Face recognition with CTFM sonar, Kok Kai Yoong and Phillip J. McKerrow

Research summary: capacity and willingness of residential aged care workers to use IT to manage care information, Ping Yu

PDF

A collaborative approach to health informatics capacity building - learning from Canadian practice in fostering research and education, Ping Yu, Marilynne Herbert, and Francis Lau

Work practice changes caused by the introduction of a picture archiving and communication system, Ping Yu and Paul Hilton

PDF

A recommended communicable disease surveillance and control network to secure a healthy and happy olympic game, Ping Yu and Hui Yu

PDF

Measuring the linewidth enhancement factor of semiconductor lasers based on weak optical feedback effect, Yanguang Yu, Jiangtao Xi, Enbang Li, and Joe F. Chicharo

PDF

Reducing security overhead for mobile networks, Fangguo Zhang, Yi Mu, and Willy Susilo

PDF

Identity-based partial message recovery signatures (or how to shorten ID-based signatures), Fangguo Zhang, Willy Susilo, and Yi Mu

Identity-based Universal Designated Verifier Signatures, Fangguo Zhang, Willy Susilo, Yi Mu, and Xiaofeng Chen

PDF

A secure multicast architecture and protocol for MOSPF, Junqi Zhang, Yi Mu, and Vijay Varadharajan

PDF

An ID-based Access Control Scheme for MOSPF, Junqi Zhang, Vijay Varadharajan, and Yi Mu

PDF

Constructing university timetable using constraint satisfaction programming approach, L. Zhang and Sim Kim Lau

PDF

Novel two-dimension FBG sensor based on rectangle cantiliver beam for simultaneous measurement of force and temperature, Weigang Zhang, Guiyan Kai, Shuzhong Yuan, Xiaoyi Dong, Enbang Li, Jiangtao Xi, and Joe F. Chicharo

PDF

Human Motion Recognition through Fuzzy Hidden Markov Model, X. Zhang and F. Naghdy

PDF

A data-fitting approach for displacements and vibration measurement using self-mixing interferometers, Yi Zhang, Jiangtao Xi, Joe F. Chicharo, and Yanguang Yu

Efficient and robust key management for large mobile ad hoc networks, Bo Zhu, Feng bao, Robert Deng, Mohan Kankanhalli, and Guilin Wang

PDF

A closed-form exact solution for the value of American put and its optimal exercise boundary, Song-Ping Zhu

Papers from 2004

PDF

A routing strategy for heterogeneous mobile ad hoc networks, Mehran Abolhasan, Justin Lipman, and Joe F. Chicharo

PDF

Load-Balanced Route Discovery for Mobile Ad hoc Networks, Mehran Abolhasan, Justin Lipman, and Tadeusz A. Wysocki

PDF

Power Quality Data Analysis Using Unsupervised Data Mining, Ali Asheibi, David A. Stirling, Sarath Perera, and D A. Robinson

PDF

Accuracy limitations introduced by digital projection sources in profilometric optical metrology systems, Matthew J. Baker, Joe F. Chicharo, Jiangtao Xi, and Enbang Li

PDF

Image quality assessment using a neural network approach, Abdesselam Bouzerdoum, A. Havstad, and A. Beghdadi

PDF

Power quality waveform generator based on the CSound software sound synthesizer, J. P. Braun, V. J. Gosbell, and S. Perera

PDF

Hierarchic decomposition in agent oriented conceptual modelling, R. B. Brown and Aditya K. Ghose

PDF

Nonlinear sigma model for odd-frequency triplet superconductivity in superconductor/ferromagnet structures, J E. Bunder and K B. Efetov

PDF

A longitudinal study of the use of the Web by regional tourism organisations in the Asia Pacific region, Lois Burgess, Joan Cooper, Carole Alcock, and Preeti Uppala

PDF

Edge image description using angular radial partitioning, A. Chalechale, Alfred Mertins, and G. Naghdy

PDF

Arabic/Persian cursive signature recognition and verification using line segment distribution, A. Chalechale, G. Naghdy, and Prashan Premaratne

PDF

Image analysis using line segments extraction by chain code differentiation, A. Chalechale, G. Naghdy, and Prashan Premaratne

PDF

Image database retrieval using sketched queries, A. Chalechale, G. Naghdy, and Prashan Premaratne

PDF

Document image analysis and verification using cursive signature, A. Chalechale, G. Naghdy, Prashan Premaratne, and Alfred Mertins

PDF

Chain-based extraction of line segments to describe images, A. Chalechale, G. Naghdy, Prashan Premaratne, and H. Moghaddasi

PDF

Asterism decoding for layered space-time systems, P. Conder and Tadeusz A. Wysocki

PDF

Asterism decoding for layered space-time systems using 8PSK, P. Conder and Tadeusz A. Wysocki

PDF

Extending Asterism decoding to QAM and its complexity in Rician fading MIMO systems, P. Conder and Tadeusz A. Wysocki

Ecological bias: use of maximum-entropy approximations, Noel A. Cressie, S Richardson, and I Jaussent