Papers from 2010
A new approach to harmonic allocation for MV installations, Victor J. Gosbell and Robert A. Barr
Harmonic allocation following IEC guidelines using the voltage droop concept, V. J. Gosbell and Robert A. Barr
Social-technical issues facing the humancentric RFID implantee sub-culture through the eyes of Amal Graafstra, Amal Graafstra, Katina Michael, and M G. Michael
The probability of an out of control signal from Nelson's supplementary zig-zag test, David Griffiths, Martin Bunder, Chandra Gulati, and Takeo Onizawa
The detection of steam injection based on video surveillance, Yipeng Guo, Shu Wang, Ming Zhu, and Jiangtao Xi
An efficient opportunistic cooperative diversity protocol for IEEE 802.11 networks, Brett Hagelstein, Mehran Abolhasan, D. Franklin, and Farzad Safaei
Formation of Vulnerable clusters in power system using artificial neural network, Ahmed Haidar, B Bin M, N Laili, and N Lina
Probabilistic neural network for vulnerability prediction on a practical power system, Ahmed Haidar, Zulkeflee Khalidin, and Ibrahim Abdulrab Ahmed
An intelligent approach for cost minimization of power generation, Ahmed M. A. Haidar, Ibrahim A. Ahmed, and Norazila Jaalam
Neural network prediction of electromagnetic field strength in hybrid micro-grid system, Ahmed M. Haidar, Ibrahim Ahmed, and Ahmed Abdalla
Vulnerability control of large scale interconnected power system using neuro-fuzzy load shedding approach, Ahmed M. Haidar, Azah Mohamed, and Aini Hussain
Artificial intelligence application to Malaysian electrical powersystem, Ahmed M. Haidar, Azah Mohamed, Aini Hussain, and Norazila Jaalam
A computational intelligence-based suite for vulnerability assessment of electrical power systems, Ahmed M. Haidar, Azah Mohamed, and Federico Milano
A dimensional tolerancing knowledge management system using Nested Ripple Down Rules (NRDR), Ramsey Hamade, V. C. Moulianitis, D. D'Addonna, and Ghassan Beydoun
A generic construction of dynamic single sign-on with strong security, Jinguang Han, Yi Mu, Willy Susilo, and Jun Yan
A novel control strategy for a variable-speed wind turbine with a permanent-magnet synchronous generator, Md. Enamul Haque, Michael Negnevitsky, and Kashem M. Muttaqi
Haptic carillon: a computationally enhanced mechanical performing instrument, Mark Havryliv, Fazel Naghdy, Greg Schiemer, and Timothy Hurd
Emerging consumers view of secondary uses of medical data, Jennifer A. Heath
Implementation issues for mobile-wireless infrastructure and mobile health care computing devices for a hospital ward setting, Liza Heslop, Stephen Weeding, Linda Dawson, Julie Fisher, and Andrew Howard
Modelling interaction of atoms and ions with graphene, James M. Hill and Yue Chan
Force-extension formula for the worm-like chain model from a variational principle, James M. Hill, Yue Chan, and Richard G. Haverkamp
Dislodgement of carbon nanotube bundles under pressure driven flow, James M. Hill, Barry J. Cox, and Duangkamon Baowan
Modelling gas separation in porous membranes, James M. Hill, Aaron Thornton, and Anita Hill
Carbon-aware business process design in Abnoba, Konstantin Hoesch-Klohe and Aditya K. Ghose
Towards green business process management, Konstantin Hoesch-Klohe, Aditya K. Ghose, and Lam-Son Le
Evolution of solitary waves for a perturbed nonlinear Schrödinger equation, Sayed Hoseini and Timothy R. Marchant
Connecting museum collections and creator communities: The Virtual Museum of the Pacific project, Frank Howarth and Peter Eklund
Bayesian source detection and parameter estimation of a plume model based on sensor network measurements, Chunfeng Huang, Tailen Hsing, Noel Cressie, Auroop R. Ganguly, Vladmir A. Protopopescu, and Nageswara S. Rao
'Bayesian source detection and parameter estimation of a plume model based on sensor network measurements' by C. Huang et al.: Rejoinder, Chunfeng Huang, Tailen Hsing, Noel Cressie, Auroop R. Ganguly, Vladmir A. Protopopescu, and Nageswara S. Rao
Differential fault analysis of LEX, Jianyong Huang, Willy Susilo, and Jennifer Seberry
Interferon a-inducible protein 27 computational network construction and comparison between the frontal cortex of HIV Encephalitis (HIVE) and HIVE-control patients, Juxiang Huang, Lin Wang, Minghu Jiang, and Xiguang Zheng
A new construction of designated confirmer signature and its application to optimistic fair exchange, Qiong Huang, Duncan S. Wong, and Willy Susilo
Further observations on optimistic fair exchange protocols in the multi-user setting, Xinyi Huang, Yi Mu, Willy Susilo, Wei Wu, and Yang Xiang
Medical image retrieval with query-dependent feature fusion based on one-class SVM, Yonggang Huang, Jun Zhang, Yongwang Zhao, and Dianfu Ma
Ecological inference techniques: an empirical evaluation using data describing gender and voter turnout at New Zealand elections, 1893-1919, Irene Hudson, Linda Moore, Eric Beh, and David G. Steel
ICT use to improve mathematics education in secondary schools, Rebecca Hudson and Anne L. Porter
Design an automatic appointment system to improve patient access to primary health care, Hongxiang Hu, Ping Yu, and Jun Yan
Associations between driving forces to adopt ICT and benefits derived from that adoption in medical practices in Australia, Peter N. Hyland, Charles Harvie, and Robert Macgregor
The effect of DVR location for enhancing voltage sag, Rohanim Ibrahim, Ahmed Haidar, Zahim M, and Herbert Iu
An offer generation approach to SLA negotiation support in service oriented computing, Azlan Ismail, Jun Yan, and Jun Shen
Overview on the profile measurement of turbine blade and its developm, Huang Junhui, Wang Zhao, Gao Jianmin, and Yanguang Yu
A longer look at the asymmetric dependence between hedge funds and the equity market, Byoung Kang, Francis In, Gunky Kim, and Tong Kim
Using temporal variability to improve spatial mapping with application to satellite data, Emily Kang, Noel A. Cressie, and T Shi
The Yang-Mills functional and Laplace's equation on quantum Heisenberg manifolds, Sooran Kang
Graph algebras, exel-laca algebras, and ultragraph algebras coincide up to Morita equivalence, Takeshi Katsura, Paul Muhly, Aidan Sims, and Mark Tomforde
A machine learning approach to link prediction for interlinked documents, Milly W. Kc, Rowena Chau, Markus Hagenbuchner, Ah Chung Tsoi, and Vincent Lee
Unpacking the RFID Investment Decision, Byron W. Keating, Tim R. Coltman, Samuel Fosso Wamba, and Valerie Baker
A compressive sensing approach to image restoration, Matthew Kitchener, Abdesselam Bouzerdoum, and Son Lam Phung
Adaptive regularization for image restoration using a variational inequality approach, Matthew Kitchener, Abdesselam Bouzerdoum, and Son Lam Phung
A survey and tutorial of RFID anti-collision protocols, Dheeraj K. Klair, Kwan-Wu Chin, and Raad Raad
Analyst-mediated contextualization of regulatory policies, George Koliadis, Nirmit V. Desai, Nanjangud C. Nerandra, and Aditya K. Ghose
The case for ICT work-integrated learning from graduates in the workplace, Anthony J. Koppi, Sylvia L. Edwards, Judy Sheard, Fazel Naghdy, and Wayne Brookes
Towards a gender inclusive information and communications technology curriculum : a perspective from graduates in the workforce, Anthony J. Koppi, Judy Sheard, Fazel Naghdy, Sylvia Edwards, and Wayne Brookes
New weighing matrices of order 2n and weight 2n-9, Ilias Kotsireas, Christos Koukouvinos, and Jennifer Seberry
New classes of orthogonal designs constructed from complementary sequences with given spread, Ilias Kotsireas, Christos Koukouvinos, Jennifer Seberry, and D. Simos
Business Relationships in China: Lessons about Deep Trust, A. Kriz and Byron W. Keating
Metamorphic testing of decision support systems: a case study, Fei-Ching Kuo, Zhiquan Q. Zhou, Jan Ma, and G. Zhang
Phase transition on the Toeplitz algebra of the affine semigroup over the natural numbers, Marcelo Laca and Iain F. Raeburn
Silicon nanotubes with distinct bond lengths, Richard Lee, Barry J. Cox, and James Hill
The geometric structure of single-walled nanotubes, Richard K F Lee, Barry J. Cox, and James M. Hill
On business services representation - the 3 x 3 x 3 Approach, Lam-Son Le, Hoa Khanh Dam, and Aditya K. Ghose
Definition of a Description Language for Business Service Decomposition, Lam-Son Le, Aditya K. Ghose, and Evan D. Morrison
Strategy Representation Using an i*-like Notation, Lam-Son Le, Bingyu Zhang, and Aditya K. Ghose
Simplicity of 2-graph algebras associated to dynamical systems, Peter Lewin and David Pask
Aperiodicity and cofinality for finitely aligned higher-rank graphs, Peter Lewin and Aidan Sims
Constructions of certificate-based signature secure against key replacement attacks, Jiguo Li, Xinyi Huang, Yi Mu, Willy Susilo, and Qianhong Wu
Attribute-based signature and its applications, Jin Li, Man Ho Allen Au, Willy Susilo, Donggang Xie, and Kui Ren
Event recognition based on top-down motion attention, Li Li, Weiming Hu, Bing Li, Chunfeng Yuan, Pengfei Zhu, and Wanqing Li
Estimating shared copy number aberrations for array CGH data: the linear-median method, Yan-Xia Lin, Veera Baladandayuthapani, V Bonato, and K.-A. Do
Automatic recognition of smiling and neutral facial expressions, Peiyao Li, S L. Phung, Abdesselam Bouzerdoum, and Fok Hing Chi Tivive
Improved facial expression recognition with trainable 2-D filters and support vector machines, Peiyao Li, Son Lam Phung, Abdesselam Bouzerdoum, and Fok Hing Chi Tivive
Towards an algebraic framework for querying inductive databases, Hong-Chen Liu, Aditya K. Ghose, and John Zeleznikow
Short generic transformation to strongly unforgeable signature in the standard model, Joseph K. Liu, Man Ho Allen Au, Willy Susilo, and Jianying Zhou
Phase error correction based on Inverse Function Shift Estimation in Phase Shifting Profilometry using a digital video projector, Yang Liu, Jiangtao Xi, Yanguang Yu, and Joe F. Chicharo
Human action recognition with expandable graphical models, Wanqing Li, Zhengyou Zhang, Zicheng Liu, and Philip Ogunbona
Action recognition based on a bag of 3D points, Wanqing Li, Zhenyu Zhang, and Zicheng Liu
A generalised minimum variance controller for time-varying MIMO linear systems with multiple delays, Zheng Li and Christian Schmid
Generalised minimum variance control of MIMO time-varying system with multiple delays, Zheng Li and Christian Schmid
FPGA-based signal processing in an optical feedback self-mixing interferometry system, Zongzhen Li, Yanguang Yu, Jiangtao Xi, and Huiying Ye
Using Singularity Theory to Analyse a Spatially Uniform Model of Self-Heating in Compost Piles, Thiansiri Luangwilai, Harvinder Sidhu, Mark Nelson, and Xiao Dong Chen
The semenov formulation of the biological self-heating process in compost piles, Thiansiri Luangwilai, Harvinder Sidhu, M I. Nelson, and X D. Chen
Modelling air flow and ambient temperature effects on the biological self-heating of compost piles, T Luangwilai, H S. Sidhu, M I. Nelson, and X D. Chen
A feasibility of incorporating PDAs into problem-based learning approach to medical education: An overview, Rattiporn Luanrattana, Khin Than Win, and John Fulcher
Data security and information privacy for PDA accessible clinical-log for medical education in problem-based learning (PBL) approach, Rattiporn Luanrattana, Khin Than Win, and John A. Fulcher
Reconstruction from limited-angle projections based on spectrum analysis, Jianhua Luo, Wanqing Li, and Yuemin Zhu
Dual boundary integral formulation for 2-D crack problems, Xiaoping Lu and Wei-Liang Wu
Perception of barriers to e-commerce adoption in SMEs in a developed and developing country: a comparison between Australia and Indonesia, Robert Macgregor and Mira Kartiwi
Kinetic analysis of oleic acid esterification using lipase as catalyst in a microaqueous environment, Mohd Mahmud, Tomasz Safinski, Mark Nelson, Harvinder Sidhu, and Soji Adesina
Non-standard semiparametric regression via BRugs, Jennifer Marley and M. Wand
Investigation of relative risk estimates from studies of the same population with contrasting response rates and designs, Nicole M. Mealing, Emily Banks, Louisa R. Jorm, David G. Steel, Mark S. Clements, and Kris D. Rogers
Decoupled-DFIG fault ride-through strategy for enhanced stability performance during grid faults, Lasantha G. Meegahapola, Damian Flynn, and Tim Littler
Head-tracking haptic computer interface for the blind, Simon Meers and Koren Ward
A control approach for voltage and frequency regulation of a wind-diesel-battery based hybrid remote area power supply system, Nishad Mendis, Kashem Muttaqi, Saad Sayeef, and Sarath Perera
Autonomous operation of wind-battery hybrid power system with maximum power extraction capability, Nishad Mendis, Kashem Muttaqi, Saad Sayeef, and Sarath Perera
Control coordination of a wind turbine generator and a battery storage unit in a remote area power supply system, Nishad Mendis, Kashem Muttaqi, Saad Sayeef, and Sarath Perera
Hybrid operation of wind-diesel-fuel cell remote area power supply system, Nishad Mendis, Kashem Muttaqi, Saad Sayeef, and Sarath Perera
Operation of a wind-diesel-battery based hybrid remote area power supply system, Nishad Mendis, Kashem Muttaqi, Saad Sayeef, and Sarath Perera
The D-completeness of T->, R K. Meyer and M W. Bunder
The legal, social and ethical controversy of the collection and storage of fingerprint profiles and DNA samples in forensic science, Katina Michael