Victoria University

Displaying 1-31 of 31 results

  • White Papers // Dec 2012

    Data Delivery Scheme for Wireless Sensor Network Powered by RF Energy Harvesting

    Wireless Sensor Networks (WSNs) have traditionally been powered by portable energy sources, viz. batteries, which limit their operational lifetime. To ensure WSN sustainability, researchers have turned to alternative energy sources for power. Harvesting ambient energy to power WSNs is a promising approach but energy harvesting devices of the same footprint...

    Provided By Victoria University

  • White Papers // May 2012

    Interference Management in Cognitive Radio Systems - A Convex Optimisation Approach

    The authors consider a cognitive radio system with N Secondary User (SU) pairs and a pair of Primary Users (PU). The SU power allocation problem is formulated as a rate maximization problem under PU and SU quality of service and SU peak power constraints. They show their problem formulation is...

    Provided By Victoria University

  • White Papers // May 2012

    MIMO Capacity Gain Analysis for General Channel Models

    In this paper, the authors evaluate the capacity gains offered by MIMO systems relative to SISO by using two metrics: the ratio between the expected value of the two capacities and a weighted difference between the two capacities. They present results for these metrics for the case of a general...

    Provided By Victoria University

  • White Papers // Apr 2012

    Identification of Potential Malicious Web Pages

    Malicious web pages are an emerging security concern on the Internet due to their popularity and their potential serious impact. Detecting and analyzing them are very costly because of their qualities and complexities. In this paper, the authors present a lightweight scoring mechanism that uses static features to identify potential...

    Provided By Victoria University

  • White Papers // Mar 2012

    A Calculus for Constraint-Based Flow Typing

    Flow typing offers an alternative to the traditional Hindley-Milner approach to type inference. A key distinction is that variables may have different types at different program points. Flow typing systems are typically formalised in the style of a dataflow analysis. Whilst a natural choice, this can hinder the formalisation and...

    Provided By Victoria University

  • White Papers // Feb 2012

    Security Threats and Solutions in MANETs: A Case Study Using AODV and SAODV

    Mobile Ad-hoc NETwork (MANET) security has become the focus of prolific research efforts. Driven by the unique and considerable difficulties of providing security arising from the dynamic nature of MANETs, many security schemes have been proposed. Rather than trying to encompass the entire field of MANET security, this paper focuses...

    Provided By Victoria University

  • White Papers // Nov 2011

    K-Anonymous Private Query Based on Blind Signature and Oblivious Transfer

    In this paper, the authors consider a scenario where there are a group of clients and a database server, and a client wishes to query the database, but does not want to reveal her or his query to the server. Current solutions for this problem are based on oblivious transfer,...

    Provided By Victoria University

  • White Papers // Oct 2011

    Multi-Tier Probabilistic Polling in Wireless Sensor Networks Powered by Energy Harvesting

    Wireless Sensor Networks (WSNs) that consist of battery powered sensor nodes start to lose operational capability once the nodes' batteries run out of power. To ensure the sustainability of WSNs, researchers have turned to alternative energy sources for power. Harvesting ambient energy from the environment to power WSNs is a...

    Provided By Victoria University

  • White Papers // Oct 2011

    Utilizing the Inherent Properties of Preamble Sequences for Load Balancing in Cellular Networks

    Achieving maximum network throughput while providing fairness is one of the key challenges in wireless cellular networks. This goal is typically met when the load of Base Stations (BSs) is balanced. In a recent study, it was confirmed that the preamble sequence, which is mainly used for cell identification and...

    Provided By Victoria University

  • White Papers // Oct 2011

    Performance Evaluation of Routing Metrics for Community Wireless Mesh Networks

    With the growth of different types of Internet traffic, there is a compelling need to provide better quality of service especially over the increasing number of wireless networks. Expected Transmission Count (ETX) is a high throughput route selection metric developed for routing protocols used in Wireless Mesh Networks (WMNs). Using...

    Provided By Victoria University

  • White Papers // Oct 2011

    Event Reliability in Wireless Sensor Networks

    Ensuring reliable transport of data in resource constrained Wireless Sensor Networks (WSNs) is one of the primary concerns. The two reliability mechanisms typically used in WSNs are packet reliability and event reliability. Packet reliability requires all packets from all the sensor nodes to reach the sink that can result in...

    Provided By Victoria University

  • White Papers // Oct 2011

    An Algorithmic Framework for Recursive Structural Types

    Structural type systems provide an interesting alternative to the more common nominal typing scheme. Many existing languages employ structural types in some form, including Modula-3, Scala and various extensions proposed for Java. Previous work has addressed many aspects of structural types, such as efficient sub-typing algorithms. Unlike nominal type systems,...

    Provided By Victoria University

  • White Papers // Sep 2011

    Random Asynchronous PSO

    In this paper, the authors propose the Random Asynchronous PSO (RAPSO) algorithm, a rather simple but intuitive variant of the Asynchronous PSO (APSO) that introduces a randomized order in which particles share their information. Their algorithm, while conceived as serial in terms of execution, is able to model the behavior...

    Provided By Victoria University

  • White Papers // Jul 2011

    Probabilistic Data Collection Protocols for Energy Harvesting Sensor Networks

    Energy harvesting has been studied as a candidate for powering next generation wireless sensor networks. The technologies that can harvest electric power from ambient energy sources include solar, vibration, heat and wind. However, sensor nodes powered by energy harvesting devices cannot always communicate with other nodes because the energy harvesting...

    Provided By Victoria University

  • White Papers // Jul 2011

    Exploiting Radio Irregularity in the Internet of Things for Automated People Counting

    The Internet of Things (IoT) is a new concept that refers to an Internet connecting not just computer systems but a plethora of systems, devices, and objects, collectively referred to as "Things", and encompasses technologies for identification and tracking, sensing and actuation, both wired and wireless communications, and also, intelligence...

    Provided By Victoria University

  • White Papers // Jul 2011

    Structural and Flow-Sensitive Types for Whiley

    Modern statically typed languages require variables to be declared with a single static type, and that sub-typing relationships between used-defined types be made explicit. This contrasts with dynamically typed languages, where variables are declared implicitly, can hold values of different types at different points and have no restrictions on flow...

    Provided By Victoria University

  • White Papers // May 2011

    Routing Protocol Based Shared and Session Key Exchange Protocol for Wireless Mobile Ad-Hoc Network

    Mobile Ad-hoc NETwork (MANET) is a transitory and infrastructureless network supported by no fixed trusted infrastructure. To achieve security goals like: authentication, integrity, non-repudiation, privacy, a secret key (or session key) is necessary to be shared between the sender and receiver. Because of the nature of MANET, it is unrealistic...

    Provided By Victoria University

  • White Papers // Feb 2011

    Implementing a Language With Flow-Sensitive and Structural Typing on the JVM

    Dynamically typed languages are flexible and impose few burdens on the programmer. In contrast, static typing leads to software that is more efficient and has fewer errors. However, static type systems traditionally require every variable to have one type, and that relationships between types (e.g., sub-classing) be declared explicitly. The...

    Provided By Victoria University

  • White Papers // Jan 2011

    JPure: A Modular Purity System for Java

    Purity Analysis is the problem of determining whether or not a method may have side-effects. This has applications in automatic parallelisation, extended static checking, and more. The authors present a novel purity system for Java that employs purity annotations which can be checked modularly. This is done using a flow-sensitive,...

    Provided By Victoria University

  • White Papers // Nov 2010

    Understanding the Impact of Collection Contracts on Design

    Java provides a specification for a user-defined general purpose equivalence operator for objects, but collections such as Set have more stringent requirements. This inconsistency breaks polymorphism: programmers must take care to follow Set's contract rather than the more general Object contract if their object could enter a Set. The authors...

    Provided By Victoria University

  • White Papers // Nov 2010

    The Interactive ZooOZ Guide

    GPS (Global Positioning System) technology is widely known for its ability to track down devices in real time. Combined with mobile phones, it has become a very powerful tool with a great potential for future development of mobile GPS applications. The Interactive ZooOz Guide was a final year industry project...

    Provided By Victoria University

  • White Papers // Sep 2010

    Analysis and Implementation of Reinforcement Learning on a GNU Radio Cognitive Radio Platform

    The authors present a physical cognitive radio system implementation under the GNU Radio platform with the aim of evaluating a reinforcement learning spectrum management scheme. In their experiments they examine the packet transmission success rate of the cognitive user for a variety of channel utilisation parameters. They derive analytical expressions...

    Provided By Victoria University

  • White Papers // Sep 2010

    TEAMTRACKER - An Innovative Team Collaboration System

    GPS (Global Positioning System) has been around for many years and becomes currently the most widely used system in determining position and measuring distance of objects on earth. Integration of GPS receivers in mobile phones and other portable devices has provided a powerful tool for developers and consumers of GPS...

    Provided By Victoria University

  • White Papers // Jul 2010

    Strategies Of Persuasion In Social/Environmental Reporting

    The purpose of this paper is illustrate how persuasive strategies utilised in social/environmental reports assist to legitimise prevailing, business-centered understandings of social responsibility and sustainable business. The methodologies in this paper are Rhetorical analysis, specifically Aristotle's concepts of ethos, logos and pathos, to reveal the persuasive textual strategies employed by...

    Provided By Victoria University

  • White Papers // Mar 2010

    Improving Link Failure Detection and Response in IEEE 802.11 Wireless Ad Hoc Networks

    Wireless multi-hop ad hoc networks face a multitude of challenging problems including highly dynamic multi-hop topologies, lossy and noisy communication channels, and sporadic connectivity which contribute to frequent link failures. Rapid and accurate link failure detection is therefore important to maintain correct and optimum operation of network routing protocols. In...

    Provided By Victoria University

  • White Papers // Feb 2010

    Design and Development of Magical Mobile Updater for Automatic Information Synchronization

    Today wireless technologies have become more and more popular in the daily life, the most popular being in telecommunication and networking. Wireless technology has turned out to be convenient and widely uses as it is becoming an inexpensive option to replace fixed cables. There are many different wireless technologies around...

    Provided By Victoria University

  • White Papers // Oct 2009

    Globetracker - A Wireless Tracking System

    The GPS (Global Positioning System) is currently the most favoured tool for location determination and navigation. Combined with mobile phones, it has gained rapid acceptance among the wider community. The integration of mobile phones and GPS receivers has provided a very powerful tool with great potential for devolvement into future...

    Provided By Victoria University

  • White Papers // Oct 2009

    Design and Development of "?Meter" - An Innovative Bluetooth Application

    Bluetooth today, has conquered almost all mobile devices including Personal Digital Assistants (PDAs), handhelds, smart phones and mobile phones. Unlike the internet, where one has to rely on a third party to provide a wireless connection, Bluetooth is inexpensive and easily available with no dependence on manufacturers or service providers...

    Provided By Victoria University

  • White Papers // Jun 2009

    Relationship Aspect Patterns

    Relationships between objects are almost as important to designs as the objects themselves. Most programming languages do not support relationships well, so programmers must implement relationships in terms of more primitive constructs. This paper presents a selection of proto-patterns which describe how aspects can be used to model relationships within...

    Provided By Victoria University

  • White Papers // Apr 2009

    A Featherweight Calculus for Flow-Sensitive Type Systems in Java

    The complexity of modern programming languages presents a fundamental difficulty for researchers wishing to formalise and reason about language extensions. A good approach here is to develop a "Core calculus" of the language which captures features characterising the problem at hand. Featherweight Java (FJ) is a well-known example which provides...

    Provided By Victoria University

  • White Papers // Aug 2003

    Tunnel Vision: Limited Use Of Human Resource Information Systems (HRIS)

    This paper presents a review of the literature on the uses and potential uses of Human Resource Information Systems (HRIS) from administrative to strategic purposes. It focuses on the fact that these systems are largely restricted to administrative use and this is exemplified through two case studies. There is considerable...

    Provided By Victoria University

  • White Papers // Dec 2012

    Data Delivery Scheme for Wireless Sensor Network Powered by RF Energy Harvesting

    Wireless Sensor Networks (WSNs) have traditionally been powered by portable energy sources, viz. batteries, which limit their operational lifetime. To ensure WSN sustainability, researchers have turned to alternative energy sources for power. Harvesting ambient energy to power WSNs is a promising approach but energy harvesting devices of the same footprint...

    Provided By Victoria University

  • White Papers // Feb 2010

    Design and Development of Magical Mobile Updater for Automatic Information Synchronization

    Today wireless technologies have become more and more popular in the daily life, the most popular being in telecommunication and networking. Wireless technology has turned out to be convenient and widely uses as it is becoming an inexpensive option to replace fixed cables. There are many different wireless technologies around...

    Provided By Victoria University

  • White Papers // Sep 2010

    TEAMTRACKER - An Innovative Team Collaboration System

    GPS (Global Positioning System) has been around for many years and becomes currently the most widely used system in determining position and measuring distance of objects on earth. Integration of GPS receivers in mobile phones and other portable devices has provided a powerful tool for developers and consumers of GPS...

    Provided By Victoria University

  • White Papers // Oct 2009

    Globetracker - A Wireless Tracking System

    The GPS (Global Positioning System) is currently the most favoured tool for location determination and navigation. Combined with mobile phones, it has gained rapid acceptance among the wider community. The integration of mobile phones and GPS receivers has provided a very powerful tool with great potential for devolvement into future...

    Provided By Victoria University

  • White Papers // Oct 2009

    Design and Development of "?Meter" - An Innovative Bluetooth Application

    Bluetooth today, has conquered almost all mobile devices including Personal Digital Assistants (PDAs), handhelds, smart phones and mobile phones. Unlike the internet, where one has to rely on a third party to provide a wireless connection, Bluetooth is inexpensive and easily available with no dependence on manufacturers or service providers...

    Provided By Victoria University

  • White Papers // Nov 2010

    The Interactive ZooOZ Guide

    GPS (Global Positioning System) technology is widely known for its ability to track down devices in real time. Combined with mobile phones, it has become a very powerful tool with a great potential for future development of mobile GPS applications. The Interactive ZooOz Guide was a final year industry project...

    Provided By Victoria University

  • White Papers // Jul 2010

    Strategies Of Persuasion In Social/Environmental Reporting

    The purpose of this paper is illustrate how persuasive strategies utilised in social/environmental reports assist to legitimise prevailing, business-centered understandings of social responsibility and sustainable business. The methodologies in this paper are Rhetorical analysis, specifically Aristotle's concepts of ethos, logos and pathos, to reveal the persuasive textual strategies employed by...

    Provided By Victoria University

  • White Papers // May 2011

    Routing Protocol Based Shared and Session Key Exchange Protocol for Wireless Mobile Ad-Hoc Network

    Mobile Ad-hoc NETwork (MANET) is a transitory and infrastructureless network supported by no fixed trusted infrastructure. To achieve security goals like: authentication, integrity, non-repudiation, privacy, a secret key (or session key) is necessary to be shared between the sender and receiver. Because of the nature of MANET, it is unrealistic...

    Provided By Victoria University

  • White Papers // Nov 2011

    K-Anonymous Private Query Based on Blind Signature and Oblivious Transfer

    In this paper, the authors consider a scenario where there are a group of clients and a database server, and a client wishes to query the database, but does not want to reveal her or his query to the server. Current solutions for this problem are based on oblivious transfer,...

    Provided By Victoria University

  • White Papers // Jan 2011

    JPure: A Modular Purity System for Java

    Purity Analysis is the problem of determining whether or not a method may have side-effects. This has applications in automatic parallelisation, extended static checking, and more. The authors present a novel purity system for Java that employs purity annotations which can be checked modularly. This is done using a flow-sensitive,...

    Provided By Victoria University

  • White Papers // Nov 2010

    Understanding the Impact of Collection Contracts on Design

    Java provides a specification for a user-defined general purpose equivalence operator for objects, but collections such as Set have more stringent requirements. This inconsistency breaks polymorphism: programmers must take care to follow Set's contract rather than the more general Object contract if their object could enter a Set. The authors...

    Provided By Victoria University

  • White Papers // Jun 2009

    Relationship Aspect Patterns

    Relationships between objects are almost as important to designs as the objects themselves. Most programming languages do not support relationships well, so programmers must implement relationships in terms of more primitive constructs. This paper presents a selection of proto-patterns which describe how aspects can be used to model relationships within...

    Provided By Victoria University

  • White Papers // Feb 2011

    Implementing a Language With Flow-Sensitive and Structural Typing on the JVM

    Dynamically typed languages are flexible and impose few burdens on the programmer. In contrast, static typing leads to software that is more efficient and has fewer errors. However, static type systems traditionally require every variable to have one type, and that relationships between types (e.g., sub-classing) be declared explicitly. The...

    Provided By Victoria University

  • White Papers // Mar 2012

    A Calculus for Constraint-Based Flow Typing

    Flow typing offers an alternative to the traditional Hindley-Milner approach to type inference. A key distinction is that variables may have different types at different program points. Flow typing systems are typically formalised in the style of a dataflow analysis. Whilst a natural choice, this can hinder the formalisation and...

    Provided By Victoria University

  • White Papers // Oct 2011

    An Algorithmic Framework for Recursive Structural Types

    Structural type systems provide an interesting alternative to the more common nominal typing scheme. Many existing languages employ structural types in some form, including Modula-3, Scala and various extensions proposed for Java. Previous work has addressed many aspects of structural types, such as efficient sub-typing algorithms. Unlike nominal type systems,...

    Provided By Victoria University

  • White Papers // Jul 2011

    Structural and Flow-Sensitive Types for Whiley

    Modern statically typed languages require variables to be declared with a single static type, and that sub-typing relationships between used-defined types be made explicit. This contrasts with dynamically typed languages, where variables are declared implicitly, can hold values of different types at different points and have no restrictions on flow...

    Provided By Victoria University

  • White Papers // Apr 2009

    A Featherweight Calculus for Flow-Sensitive Type Systems in Java

    The complexity of modern programming languages presents a fundamental difficulty for researchers wishing to formalise and reason about language extensions. A good approach here is to develop a "Core calculus" of the language which captures features characterising the problem at hand. Featherweight Java (FJ) is a well-known example which provides...

    Provided By Victoria University

  • White Papers // Oct 2011

    Utilizing the Inherent Properties of Preamble Sequences for Load Balancing in Cellular Networks

    Achieving maximum network throughput while providing fairness is one of the key challenges in wireless cellular networks. This goal is typically met when the load of Base Stations (BSs) is balanced. In a recent study, it was confirmed that the preamble sequence, which is mainly used for cell identification and...

    Provided By Victoria University

  • White Papers // Oct 2011

    Multi-Tier Probabilistic Polling in Wireless Sensor Networks Powered by Energy Harvesting

    Wireless Sensor Networks (WSNs) that consist of battery powered sensor nodes start to lose operational capability once the nodes' batteries run out of power. To ensure the sustainability of WSNs, researchers have turned to alternative energy sources for power. Harvesting ambient energy from the environment to power WSNs is a...

    Provided By Victoria University

  • White Papers // Oct 2011

    Performance Evaluation of Routing Metrics for Community Wireless Mesh Networks

    With the growth of different types of Internet traffic, there is a compelling need to provide better quality of service especially over the increasing number of wireless networks. Expected Transmission Count (ETX) is a high throughput route selection metric developed for routing protocols used in Wireless Mesh Networks (WMNs). Using...

    Provided By Victoria University

  • White Papers // Oct 2011

    Event Reliability in Wireless Sensor Networks

    Ensuring reliable transport of data in resource constrained Wireless Sensor Networks (WSNs) is one of the primary concerns. The two reliability mechanisms typically used in WSNs are packet reliability and event reliability. Packet reliability requires all packets from all the sensor nodes to reach the sink that can result in...

    Provided By Victoria University

  • White Papers // Sep 2011

    Random Asynchronous PSO

    In this paper, the authors propose the Random Asynchronous PSO (RAPSO) algorithm, a rather simple but intuitive variant of the Asynchronous PSO (APSO) that introduces a randomized order in which particles share their information. Their algorithm, while conceived as serial in terms of execution, is able to model the behavior...

    Provided By Victoria University

  • White Papers // Jul 2011

    Probabilistic Data Collection Protocols for Energy Harvesting Sensor Networks

    Energy harvesting has been studied as a candidate for powering next generation wireless sensor networks. The technologies that can harvest electric power from ambient energy sources include solar, vibration, heat and wind. However, sensor nodes powered by energy harvesting devices cannot always communicate with other nodes because the energy harvesting...

    Provided By Victoria University

  • White Papers // Jul 2011

    Exploiting Radio Irregularity in the Internet of Things for Automated People Counting

    The Internet of Things (IoT) is a new concept that refers to an Internet connecting not just computer systems but a plethora of systems, devices, and objects, collectively referred to as "Things", and encompasses technologies for identification and tracking, sensing and actuation, both wired and wireless communications, and also, intelligence...

    Provided By Victoria University

  • White Papers // Mar 2010

    Improving Link Failure Detection and Response in IEEE 802.11 Wireless Ad Hoc Networks

    Wireless multi-hop ad hoc networks face a multitude of challenging problems including highly dynamic multi-hop topologies, lossy and noisy communication channels, and sporadic connectivity which contribute to frequent link failures. Rapid and accurate link failure detection is therefore important to maintain correct and optimum operation of network routing protocols. In...

    Provided By Victoria University

  • White Papers // Sep 2010

    Analysis and Implementation of Reinforcement Learning on a GNU Radio Cognitive Radio Platform

    The authors present a physical cognitive radio system implementation under the GNU Radio platform with the aim of evaluating a reinforcement learning spectrum management scheme. In their experiments they examine the packet transmission success rate of the cognitive user for a variety of channel utilisation parameters. They derive analytical expressions...

    Provided By Victoria University

  • White Papers // May 2012

    Interference Management in Cognitive Radio Systems - A Convex Optimisation Approach

    The authors consider a cognitive radio system with N Secondary User (SU) pairs and a pair of Primary Users (PU). The SU power allocation problem is formulated as a rate maximization problem under PU and SU quality of service and SU peak power constraints. They show their problem formulation is...

    Provided By Victoria University

  • White Papers // May 2012

    MIMO Capacity Gain Analysis for General Channel Models

    In this paper, the authors evaluate the capacity gains offered by MIMO systems relative to SISO by using two metrics: the ratio between the expected value of the two capacities and a weighted difference between the two capacities. They present results for these metrics for the case of a general...

    Provided By Victoria University

  • White Papers // Feb 2012

    Security Threats and Solutions in MANETs: A Case Study Using AODV and SAODV

    Mobile Ad-hoc NETwork (MANET) security has become the focus of prolific research efforts. Driven by the unique and considerable difficulties of providing security arising from the dynamic nature of MANETs, many security schemes have been proposed. Rather than trying to encompass the entire field of MANET security, this paper focuses...

    Provided By Victoria University

  • White Papers // Apr 2012

    Identification of Potential Malicious Web Pages

    Malicious web pages are an emerging security concern on the Internet due to their popularity and their potential serious impact. Detecting and analyzing them are very costly because of their qualities and complexities. In this paper, the authors present a lightweight scoring mechanism that uses static features to identify potential...

    Provided By Victoria University

  • White Papers // Aug 2003

    Tunnel Vision: Limited Use Of Human Resource Information Systems (HRIS)

    This paper presents a review of the literature on the uses and potential uses of Human Resource Information Systems (HRIS) from administrative to strategic purposes. It focuses on the fact that these systems are largely restricted to administrative use and this is exemplified through two case studies. There is considerable...

    Provided By Victoria University