Designing self-aware agents for a disaster management scenario
- Keogh, Kathleen, Sonenberg, Elizabeth
- Authors: Keogh, Kathleen , Sonenberg, Elizabeth
- Date: 2007
- Type: Text , Conference paper
- Relation: Paper presented at ISCRAM China 2007, The Second International Workshop on Information Systems for Crisis Response and Management p. 51-58
- Full Text:
- Reviewed:
- Authors: Keogh, Kathleen , Sonenberg, Elizabeth
- Date: 2007
- Type: Text , Conference paper
- Relation: Paper presented at ISCRAM China 2007, The Second International Workshop on Information Systems for Crisis Response and Management p. 51-58
- Full Text:
- Reviewed:
Designs and applications of the rotary limaçon compressors and expanders - a review
- Belfiore, Christopher, Lu, Kui, Phung, Truong, Sultan, Ibrahim
- Authors: Belfiore, Christopher , Lu, Kui , Phung, Truong , Sultan, Ibrahim
- Date: 2022
- Type: Text , Conference paper
- Relation: 3rd International Conference on Energy and Power, ICEP 2021, Chiang Mai, Thailand, 18-20 November 2021, AIP Conference Proceedings Vol. 2681
- Full Text:
- Reviewed:
- Description: Limaçon machines are positive displacement fluid processing machines that belong to the rotary machine family. The limaçon machines can be utilized as expanders to extract work from the working fluid or as compressors to provide energy to the working fluid. The main components of the limaçon machine that are directly involved in fluid processing are the housing and rotor, the construction of which are of either limaçon of Pascal curves or circular curves. One distinct feature of the limaçon machine is the limaçon motion of the rotor; the rotor rotates about and slides along a pole, o, inside a housing during the machine operation. Of important note is the motion of the machine rotor inside the housing always follows the limaçon motion irrespective of their profiles. In this paper, different designs and embodiments of the limaçon machine and their advantages and disadvantages have beed discussed, and the research has been carried out on specific applications, i.e., expander and compressor including the work done on fluid induction, sealing and leakages, porting, and inlet and outlet valve control of such machines. © 2022 American Institute of Physics Inc.. All rights reserved.
- Authors: Belfiore, Christopher , Lu, Kui , Phung, Truong , Sultan, Ibrahim
- Date: 2022
- Type: Text , Conference paper
- Relation: 3rd International Conference on Energy and Power, ICEP 2021, Chiang Mai, Thailand, 18-20 November 2021, AIP Conference Proceedings Vol. 2681
- Full Text:
- Reviewed:
- Description: Limaçon machines are positive displacement fluid processing machines that belong to the rotary machine family. The limaçon machines can be utilized as expanders to extract work from the working fluid or as compressors to provide energy to the working fluid. The main components of the limaçon machine that are directly involved in fluid processing are the housing and rotor, the construction of which are of either limaçon of Pascal curves or circular curves. One distinct feature of the limaçon machine is the limaçon motion of the rotor; the rotor rotates about and slides along a pole, o, inside a housing during the machine operation. Of important note is the motion of the machine rotor inside the housing always follows the limaçon motion irrespective of their profiles. In this paper, different designs and embodiments of the limaçon machine and their advantages and disadvantages have beed discussed, and the research has been carried out on specific applications, i.e., expander and compressor including the work done on fluid induction, sealing and leakages, porting, and inlet and outlet valve control of such machines. © 2022 American Institute of Physics Inc.. All rights reserved.
Detecting illicit drugs on social media using Automated Social Media Intelligence Analysis (ASMIA)
- Authors: Watters, Paul , Phair, Nigel
- Date: 2012
- Type: Text , Conference paper
- Relation: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 7672 LNCS, p. 66-76
- Full Text:
- Reviewed:
- Description: While social media is a new and exciting technology, it has the potential to be misused by organized crime groups and individuals involved in the illicit drugs trade. In particular, social media provides a means to create new marketing and distribution opportunities to a global marketplace, often exploiting jurisdictional gaps between buyer and seller. The sheer volume of postings presents investigational barriers, but the platform is amenable to the partial automation of open source intelligence. This paper presents a new methodology for automating social media data, and presents two pilot studies into its use for detecting marketing and distribution of illicit drugs targeted at Australians. Key technical challenges are identified, and the policy implications of the ease of access to illicit drugs are discussed. © 2012 Springer-Verlag.
- Description: 2003010676
- Authors: Watters, Paul , Phair, Nigel
- Date: 2012
- Type: Text , Conference paper
- Relation: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 7672 LNCS, p. 66-76
- Full Text:
- Reviewed:
- Description: While social media is a new and exciting technology, it has the potential to be misused by organized crime groups and individuals involved in the illicit drugs trade. In particular, social media provides a means to create new marketing and distribution opportunities to a global marketplace, often exploiting jurisdictional gaps between buyer and seller. The sheer volume of postings presents investigational barriers, but the platform is amenable to the partial automation of open source intelligence. This paper presents a new methodology for automating social media data, and presents two pilot studies into its use for detecting marketing and distribution of illicit drugs targeted at Australians. Key technical challenges are identified, and the policy implications of the ease of access to illicit drugs are discussed. © 2012 Springer-Verlag.
- Description: 2003010676
Detecting phishing emails using hybrid features
- Ma, Liping, Ofoghi, Bahadorreza, Watters, Paul, Brown, Simon
- Authors: Ma, Liping , Ofoghi, Bahadorreza , Watters, Paul , Brown, Simon
- Date: 2009
- Type: Text , Conference paper
- Relation: Paper presented at 2009 Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing, UIC-ATC '09, Brisbane, Queensland : 7th-9th July 2009 p. 493-497
- Full Text:
- Description: Phishing emails have been used widely in fraud of financial organizations and customers. Phishing email detection has drawn a lot attention for many researchers and malicious detection devices are installed in email servers. However, phishing has become more and more complicated and sophisticated and attack can bypass the filter set by anti-phishing techniques. In this paper, we present a method to build a robust classifier to detect phishing emails using hybrid features and to select features using information gain. We experiment on 10 cross-validations to build an initial classifier which performs well. The experiment also analyses the quality of each feature using information gain and best feature set is selected after a recursive learning process. Experimental result shows the selected features perform as well as the original features. Finally, we test five machine learning algorithms and compare the performance of each. The result shows that decision tree builds the best classifier.
- Description: 2003007857
- Authors: Ma, Liping , Ofoghi, Bahadorreza , Watters, Paul , Brown, Simon
- Date: 2009
- Type: Text , Conference paper
- Relation: Paper presented at 2009 Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing, UIC-ATC '09, Brisbane, Queensland : 7th-9th July 2009 p. 493-497
- Full Text:
- Description: Phishing emails have been used widely in fraud of financial organizations and customers. Phishing email detection has drawn a lot attention for many researchers and malicious detection devices are installed in email servers. However, phishing has become more and more complicated and sophisticated and attack can bypass the filter set by anti-phishing techniques. In this paper, we present a method to build a robust classifier to detect phishing emails using hybrid features and to select features using information gain. We experiment on 10 cross-validations to build an initial classifier which performs well. The experiment also analyses the quality of each feature using information gain and best feature set is selected after a recursive learning process. Experimental result shows the selected features perform as well as the original features. Finally, we test five machine learning algorithms and compare the performance of each. The result shows that decision tree builds the best classifier.
- Description: 2003007857
Detection and compensation of covert service-degrading intrusions in cyber physical systems through intelligent adaptive control
- Farivar, Faezeh, Haghighi, Mohammad, Barchinezhad, Soheila, Jolfaei, Alireza
- Authors: Farivar, Faezeh , Haghighi, Mohammad , Barchinezhad, Soheila , Jolfaei, Alireza
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 2019 IEEE International Conference on Industrial Technology, ICIT 2019; Melbourne, Australia; 13th-15th February 2019 Vol. 2019-February, p. 1143-1148
- Full Text:
- Reviewed:
- Description: Cyber-Physical Systems (CPS) are playing important roles in the critical infrastructure now. A prominent family of CPSs are networked control systems in which the control and feedback signals are carried over computer networks like the Internet. Communication over insecure networks make system vulnerable to cyber attacks. In this article, we design an intrusion detection and compensation framework based on system/plant identification to fight covert attacks. We collect error statistics of the output estimation during the learning phase of system operation and after that, monitor the system behavior to see if it significantly deviates from the expected outputs. A compensating controller is further designed to intervene and replace the classic controller once the attack is detected. The proposed model is tested on a DC motor as the plant and is put against a deception signal amplification attack over the forward link. Simulation results show that the detection algorithm well detects the intrusion and the compensator is also successful in alleviating the attack effects.
- Authors: Farivar, Faezeh , Haghighi, Mohammad , Barchinezhad, Soheila , Jolfaei, Alireza
- Date: 2019
- Type: Text , Conference proceedings , Conference paper
- Relation: 2019 IEEE International Conference on Industrial Technology, ICIT 2019; Melbourne, Australia; 13th-15th February 2019 Vol. 2019-February, p. 1143-1148
- Full Text:
- Reviewed:
- Description: Cyber-Physical Systems (CPS) are playing important roles in the critical infrastructure now. A prominent family of CPSs are networked control systems in which the control and feedback signals are carried over computer networks like the Internet. Communication over insecure networks make system vulnerable to cyber attacks. In this article, we design an intrusion detection and compensation framework based on system/plant identification to fight covert attacks. We collect error statistics of the output estimation during the learning phase of system operation and after that, monitor the system behavior to see if it significantly deviates from the expected outputs. A compensating controller is further designed to intervene and replace the classic controller once the attack is detected. The proposed model is tested on a DC motor as the plant and is put against a deception signal amplification attack over the forward link. Simulation results show that the detection algorithm well detects the intrusion and the compensator is also successful in alleviating the attack effects.
Determining provenance in phishing websites using automated conceptual analysis
- Layton, Robert, Watters, Paul
- Authors: Layton, Robert , Watters, Paul
- Date: 2009
- Type: Text , Conference paper
- Relation: Paper presented at 2009 eCrime Researchers Summit, eCRIME '09, Tacoma, Washington : 20th-21st October 2009 p. 1-7
- Full Text:
- Description: Phishing is a form of online fraud with drastic consequences for the victims and institutions being defrauded. A phishing attack tries to create a believable environment for the intended victim to enter their confidential data such that the attacker can use or sell this information later. In order to apprehend phishers, law enforcement agencies need automated systems capable of tracking the size and scope of phishing attacks, in order to more wisely use their resources shutting down the major players, rather then wasting resources stopping smaller operations. In order to develop these systems, phishing attacks need to be clustered by provenance in a way that adequately profiles these evolving attackers. The research presented in this paper looks at the viability of using automated conceptual analysis through cluster analysis techniques on phishing websites, with the aim of determining provenance of these phishing attacks. Conceptual analysis is performed on the source code of the websites, rather than the final text that is displayed to the user, eliminating problems with rendering obfuscation and increasing the distinctiveness brought about by differences in coding styles of the phishers. By using cluster analysis algorithms, distinguishing factors between groups of phishing websites can be obtained. The results indicate that it is difficult to separate websites by provenance without also separating by intent, by looking at the phishing websites alone. Instead, the methods discussed in this paper should form part of a larger system that uses more information about the phishing attacks.
- Authors: Layton, Robert , Watters, Paul
- Date: 2009
- Type: Text , Conference paper
- Relation: Paper presented at 2009 eCrime Researchers Summit, eCRIME '09, Tacoma, Washington : 20th-21st October 2009 p. 1-7
- Full Text:
- Description: Phishing is a form of online fraud with drastic consequences for the victims and institutions being defrauded. A phishing attack tries to create a believable environment for the intended victim to enter their confidential data such that the attacker can use or sell this information later. In order to apprehend phishers, law enforcement agencies need automated systems capable of tracking the size and scope of phishing attacks, in order to more wisely use their resources shutting down the major players, rather then wasting resources stopping smaller operations. In order to develop these systems, phishing attacks need to be clustered by provenance in a way that adequately profiles these evolving attackers. The research presented in this paper looks at the viability of using automated conceptual analysis through cluster analysis techniques on phishing websites, with the aim of determining provenance of these phishing attacks. Conceptual analysis is performed on the source code of the websites, rather than the final text that is displayed to the user, eliminating problems with rendering obfuscation and increasing the distinctiveness brought about by differences in coding styles of the phishers. By using cluster analysis algorithms, distinguishing factors between groups of phishing websites can be obtained. The results indicate that it is difficult to separate websites by provenance without also separating by intent, by looking at the phishing websites alone. Instead, the methods discussed in this paper should form part of a larger system that uses more information about the phishing attacks.
Developing a spiritual health and life-orientation measure for secondary school students
- Authors: Fisher, John
- Date: 1999
- Type: Text , Conference paper
- Relation: Paper presented at Research with a regional/rural focus : proceedings of the University of Ballarat inaugural annual conference, Mt. Helen: Victoria 15th October, 1999 p. 57-63
- Full Text:
- Description: The problem posed in this project was the development of an instrument to give a balanced assessment of young people’s spiritual health. Spiritual health is a dynamic state of being, which can be reflected in how well people relate in up to four domains of human existence, namely with themselves; with others; with the environment; and/or with a Transcendent Other. A convenience sample of 850 secondary students in State, Catholic, Christian Community and other independent schools in Ballarat and western suburbs of Melbourne were surveyed during 1999 to determine how important they considered each of the four sets of relationships to be for an ideal state of spiritual health (called Life-Orientation). They also expressed how each area reflected their personal experience most of the time (called Spiritual Health). Extensive factor analysis enabled the original 60-item instrument to be reduced to a reliable, compact 25-item Spiritual Health And Life-Orientation Measure (SHALOM for short). Analysis of variance and t-tests revealed significant variations between students’ views when compared by school type, gender, and year level. SHALOM has advantages over previous instruments in that it is balanced across the four domains of spiritual well-being, is more sensitive, and it compares people’s stated ideal position, with their lived experience, not others’, in determining the quality of relationships which constitute their spiritual well-being.
- Authors: Fisher, John
- Date: 1999
- Type: Text , Conference paper
- Relation: Paper presented at Research with a regional/rural focus : proceedings of the University of Ballarat inaugural annual conference, Mt. Helen: Victoria 15th October, 1999 p. 57-63
- Full Text:
- Description: The problem posed in this project was the development of an instrument to give a balanced assessment of young people’s spiritual health. Spiritual health is a dynamic state of being, which can be reflected in how well people relate in up to four domains of human existence, namely with themselves; with others; with the environment; and/or with a Transcendent Other. A convenience sample of 850 secondary students in State, Catholic, Christian Community and other independent schools in Ballarat and western suburbs of Melbourne were surveyed during 1999 to determine how important they considered each of the four sets of relationships to be for an ideal state of spiritual health (called Life-Orientation). They also expressed how each area reflected their personal experience most of the time (called Spiritual Health). Extensive factor analysis enabled the original 60-item instrument to be reduced to a reliable, compact 25-item Spiritual Health And Life-Orientation Measure (SHALOM for short). Analysis of variance and t-tests revealed significant variations between students’ views when compared by school type, gender, and year level. SHALOM has advantages over previous instruments in that it is balanced across the four domains of spiritual well-being, is more sensitive, and it compares people’s stated ideal position, with their lived experience, not others’, in determining the quality of relationships which constitute their spiritual well-being.
Developing policy for Australia's small towns : From anthropology to sustainability
- Courvisanos, Jerry, Martin, John
- Authors: Courvisanos, Jerry , Martin, John
- Date: 2005
- Type: Text , Conference paper
- Relation: Paper presented at the Centre for Sustainable Regional Communities (CSRC) 2nd National Conference on the future of Australia's Country Towns, Latrobe, Bendigo : 11th February, 2005
- Full Text:
- Reviewed:
- Description: Over the last three decades the way in which public policy analysts learn about the structure and function of Australia’s small towns has shifted from the intensive, in-depth analysis provided by the anthropologist living in the community (called “community studies”) to a more empirically oriented, demographic-based research carried out at a distance from these places (called “sustainability studies”). Rather than just understanding the functioning of small towns through case studies, recent research emphasis has centred on the more “aggregative” question of small town sustainability in all it forms. This alters the way in which small towns are viewed and complicates the current policy approaches to small town development and change. This paper identifies the two different methodologies implied by these divergent approaches and examines what this means to understanding of small towns and the policy implications that emerge. By reviewing the community studies approach to learning about small towns popular in the 1960s and 1970s, and contrasting this approach with recent, more aggregative approaches to learning about the sustainability of towns; this paper aims to find points of alignment and suggest a broader research framework that incorporates both approaches. This provides a comprehensive understanding of small towns, leading to a more effective development of public policies for these communities.
- Description: E1
- Description: 2003001308
- Authors: Courvisanos, Jerry , Martin, John
- Date: 2005
- Type: Text , Conference paper
- Relation: Paper presented at the Centre for Sustainable Regional Communities (CSRC) 2nd National Conference on the future of Australia's Country Towns, Latrobe, Bendigo : 11th February, 2005
- Full Text:
- Reviewed:
- Description: Over the last three decades the way in which public policy analysts learn about the structure and function of Australia’s small towns has shifted from the intensive, in-depth analysis provided by the anthropologist living in the community (called “community studies”) to a more empirically oriented, demographic-based research carried out at a distance from these places (called “sustainability studies”). Rather than just understanding the functioning of small towns through case studies, recent research emphasis has centred on the more “aggregative” question of small town sustainability in all it forms. This alters the way in which small towns are viewed and complicates the current policy approaches to small town development and change. This paper identifies the two different methodologies implied by these divergent approaches and examines what this means to understanding of small towns and the policy implications that emerge. By reviewing the community studies approach to learning about small towns popular in the 1960s and 1970s, and contrasting this approach with recent, more aggregative approaches to learning about the sustainability of towns; this paper aims to find points of alignment and suggest a broader research framework that incorporates both approaches. This provides a comprehensive understanding of small towns, leading to a more effective development of public policies for these communities.
- Description: E1
- Description: 2003001308
DFS based partial pathways in GA for protein structure prediction
- Hoque, Md Tamjidul, Chetty, Madhu, Lewis, Andrew, Sattar, Abdul
- Authors: Hoque, Md Tamjidul , Chetty, Madhu , Lewis, Andrew , Sattar, Abdul
- Date: 2008
- Type: Text , Conference paper
- Relation: Third IAPR International Conference, PRIB 2008
- Full Text:
- Reviewed:
- Description: Nondeterministic conformational search techniques, such as Genetic Algorithms (GAs) are promising for solving protein structure prediction (PSP) problem. The crossover operator of a GA can underpin the formation of potential conformations by exchanging and sharing potential sub-conformations, which is promising for solving PSP. However, the usual nature of an optimum PSP conformation being compact can produce many invalid conformations (by having non-self-avoiding-walk) using crossover. While a crossover-based converging conformation suffers from limited pathways, combining it with depth-first search (DFS) can partially reveal potential pathways. DFS generates random conformations increasingly quickly with increasing length of the protein sequences compared to random-move-only-based conformation generation. Random conformations are frequently applied for maintaining diversity as well as for initialization in many GA variations.
- Authors: Hoque, Md Tamjidul , Chetty, Madhu , Lewis, Andrew , Sattar, Abdul
- Date: 2008
- Type: Text , Conference paper
- Relation: Third IAPR International Conference, PRIB 2008
- Full Text:
- Reviewed:
- Description: Nondeterministic conformational search techniques, such as Genetic Algorithms (GAs) are promising for solving protein structure prediction (PSP) problem. The crossover operator of a GA can underpin the formation of potential conformations by exchanging and sharing potential sub-conformations, which is promising for solving PSP. However, the usual nature of an optimum PSP conformation being compact can produce many invalid conformations (by having non-self-avoiding-walk) using crossover. While a crossover-based converging conformation suffers from limited pathways, combining it with depth-first search (DFS) can partially reveal potential pathways. DFS generates random conformations increasingly quickly with increasing length of the protein sequences compared to random-move-only-based conformation generation. Random conformations are frequently applied for maintaining diversity as well as for initialization in many GA variations.
Digital forensic techniques for static analysis of NTFS images
- Alazab, Mamoun, Venkatraman, Sitalakshmi, Watters, Paul
- Authors: Alazab, Mamoun , Venkatraman, Sitalakshmi , Watters, Paul
- Date: 2009
- Type: Text , Conference paper
- Relation: Paper presented at 4th International Conference of Information Technology, ICIT 2009, AL-Zaytoonah University, Amman, Jordan : 3rd-5th June 2009
- Full Text:
- Description: Static analysis of the Windows NTS File System (NTFS) which is the standard and most commonly used file system could provide useful information for digital forensics. However, since the NFTS disk image records every event in the system, forensic tools need to process an enormous amount of information related to user / kernel environment, buffer overflows, trace conditions, network stack and other related subsystems. This leads to imperfect forensic tools that are practical for implementation but not comprehensive and effective. This research discusses the analysis technique to detect data hidden based on the internal structure of the NTFS file system in the boot sector. Further, it attempts to unearth the vulnerabilities of NTFS disk image and weaknesses of the current forensic techniques. The paper argues that a comprehensive tool with improved techniques is warranted for a successful forensic analysis.
- Description: 2003007524
- Authors: Alazab, Mamoun , Venkatraman, Sitalakshmi , Watters, Paul
- Date: 2009
- Type: Text , Conference paper
- Relation: Paper presented at 4th International Conference of Information Technology, ICIT 2009, AL-Zaytoonah University, Amman, Jordan : 3rd-5th June 2009
- Full Text:
- Description: Static analysis of the Windows NTS File System (NTFS) which is the standard and most commonly used file system could provide useful information for digital forensics. However, since the NFTS disk image records every event in the system, forensic tools need to process an enormous amount of information related to user / kernel environment, buffer overflows, trace conditions, network stack and other related subsystems. This leads to imperfect forensic tools that are practical for implementation but not comprehensive and effective. This research discusses the analysis technique to detect data hidden based on the internal structure of the NTFS file system in the boot sector. Further, it attempts to unearth the vulnerabilities of NTFS disk image and weaknesses of the current forensic techniques. The paper argues that a comprehensive tool with improved techniques is warranted for a successful forensic analysis.
- Description: 2003007524
DINE : a framework for deep incomplete network embedding
- Hou, Ke, Liu, Jiaying, Peng, Yin, Xu, Bo, Lee, Ivan, Xia, Feng
- Authors: Hou, Ke , Liu, Jiaying , Peng, Yin , Xu, Bo , Lee, Ivan , Xia, Feng
- Date: 2019
- Type: Text , Conference paper
- Relation: 32nd Australasian Joint Conference on Artificial Intelligence, AI 2019 Vol. 11919 LNAI, p. 165-176
- Full Text:
- Reviewed:
- Description: Network representation learning (NRL) plays a vital role in a variety of tasks such as node classification and link prediction. It aims to learn low-dimensional vector representations for nodes based on network structures or node attributes. While embedding techniques on complete networks have been intensively studied, in real-world applications, it is still a challenging task to collect complete networks. To bridge the gap, in this paper, we propose a Deep Incomplete Network Embedding method, namely DINE. Specifically, we first complete the missing part including both nodes and edges in a partially observable network by using the expectation-maximization framework. To improve the embedding performance, we consider both network structures and node attributes to learn node representations. Empirically, we evaluate DINE over three networks on multi-label classification and link prediction tasks. The results demonstrate the superiority of our proposed approach compared against state-of-the-art baselines. © 2019, Springer Nature Switzerland AG.
- Description: E1
- Authors: Hou, Ke , Liu, Jiaying , Peng, Yin , Xu, Bo , Lee, Ivan , Xia, Feng
- Date: 2019
- Type: Text , Conference paper
- Relation: 32nd Australasian Joint Conference on Artificial Intelligence, AI 2019 Vol. 11919 LNAI, p. 165-176
- Full Text:
- Reviewed:
- Description: Network representation learning (NRL) plays a vital role in a variety of tasks such as node classification and link prediction. It aims to learn low-dimensional vector representations for nodes based on network structures or node attributes. While embedding techniques on complete networks have been intensively studied, in real-world applications, it is still a challenging task to collect complete networks. To bridge the gap, in this paper, we propose a Deep Incomplete Network Embedding method, namely DINE. Specifically, we first complete the missing part including both nodes and edges in a partially observable network by using the expectation-maximization framework. To improve the embedding performance, we consider both network structures and node attributes to learn node representations. Empirically, we evaluate DINE over three networks on multi-label classification and link prediction tasks. The results demonstrate the superiority of our proposed approach compared against state-of-the-art baselines. © 2019, Springer Nature Switzerland AG.
- Description: E1
Direct injection and spark controlled jet ignition to convert a diesel truck engine to LPG
- Authors: Boretti, Alberto
- Date: 2010
- Type: Text , Conference paper
- Relation: Paper presented at SAE 2010 Commercial Vehicle Engineering Congress, Illinois, USA : 5th-6th October 2010
- Full Text:
- Description: Jet ignition and direct fuel injection are potential enablers of higher efficiency, cleaner Internal Combustion Engines (ICE). Very lean mixtures of gaseous fuels could be burned with pollutants formation below Euro 6 levels (in the ultra-lean mode), efficiencies approaching 50% full load and small efficiency penalties when operating part load. The lean burn Direct Injection Jet Ignition (DI-JI) ICE uses a fuel injection and mixture ignition system comprising one main chamber direct fuel injector and one small size jet ignition pre-chamber per engine cylinder. The jet ignition pre-chamber is connected to the main chamber through calibrated orifices and accommodates a second direct fuel injector. In the spark plug version, the jet ignition pre-chamber includes a spark plug that ignites the slightly rich pre-chamber mixture that then bulk ignites the ultra lean, stratified main chamber mixture through multiple jets of hot reacting gases entering the in-cylinder. This paper uses coupled CAE and CFD simulations to provide better details of the operation of the jet ignition pre-chamber. They have been analysed so far with downstream experiments or standalone CFD simulations, enabling a better understanding of the complex interactions between chemistry and turbulence that governs the pre-chamber flow and combustion. CAE simulations are performed for a production 11 litre, in-line six, 24 valve Diesel Truck engine. It is turbo charged, with inter cooler and cooled Exhaust Gas Recirculation (EGR). It is modified to fit the jet ignition pre-chamber and run propane fuel by replacing the Diesel fuel injector with a direct injector for the LPG fuel plus reducing the compression ratio and changing the piston shape. Operation full load with same air-to-fuel equivalence ratio
- Authors: Boretti, Alberto
- Date: 2010
- Type: Text , Conference paper
- Relation: Paper presented at SAE 2010 Commercial Vehicle Engineering Congress, Illinois, USA : 5th-6th October 2010
- Full Text:
- Description: Jet ignition and direct fuel injection are potential enablers of higher efficiency, cleaner Internal Combustion Engines (ICE). Very lean mixtures of gaseous fuels could be burned with pollutants formation below Euro 6 levels (in the ultra-lean mode), efficiencies approaching 50% full load and small efficiency penalties when operating part load. The lean burn Direct Injection Jet Ignition (DI-JI) ICE uses a fuel injection and mixture ignition system comprising one main chamber direct fuel injector and one small size jet ignition pre-chamber per engine cylinder. The jet ignition pre-chamber is connected to the main chamber through calibrated orifices and accommodates a second direct fuel injector. In the spark plug version, the jet ignition pre-chamber includes a spark plug that ignites the slightly rich pre-chamber mixture that then bulk ignites the ultra lean, stratified main chamber mixture through multiple jets of hot reacting gases entering the in-cylinder. This paper uses coupled CAE and CFD simulations to provide better details of the operation of the jet ignition pre-chamber. They have been analysed so far with downstream experiments or standalone CFD simulations, enabling a better understanding of the complex interactions between chemistry and turbulence that governs the pre-chamber flow and combustion. CAE simulations are performed for a production 11 litre, in-line six, 24 valve Diesel Truck engine. It is turbo charged, with inter cooler and cooled Exhaust Gas Recirculation (EGR). It is modified to fit the jet ignition pre-chamber and run propane fuel by replacing the Diesel fuel injector with a direct injector for the LPG fuel plus reducing the compression ratio and changing the piston shape. Operation full load with same air-to-fuel equivalence ratio
Disconnection time and sequence of rooftop PVs under short-circuit faults in low voltage networks
- Yengejeh, Hadi, Shahnia, Farhad, Islam, Syed
- Authors: Yengejeh, Hadi , Shahnia, Farhad , Islam, Syed
- Date: 2015
- Type: Text , Conference proceedings , Conference paper
- Relation: North American Power Symposium, NAPS 2015; Charlotte, United States; 4th-6th October 2015 p. 1-6
- Full Text:
- Reviewed:
- Description: This paper presents an analysis on the disconnection time of single-phase rooftop PVs, located in a three-phase four-wire low voltage distribution feeder after a line-to-ground short-circuit fault on the low voltage feeder. The paper aims to evaluate and discuss the disconnection time and sequence of PVs in a network with 100% PV penetration level. The impact of different parameters such as the location of the fault, impedance of the fault and the ratio of PVs generation capacity to the load demand are considered. Furthermore, the effect of the system earthing in the form of multiple earthed neutral and non-effectively grounded systems are evaluated on the PVs disconnection time. The analyses intend to figure out the conditions under which the PVs in the feeder may fail to disconnect after a line-to-ground fault and keep feeding the fault. The analyses are carried out in PSCAD/EMTDC software.
- Authors: Yengejeh, Hadi , Shahnia, Farhad , Islam, Syed
- Date: 2015
- Type: Text , Conference proceedings , Conference paper
- Relation: North American Power Symposium, NAPS 2015; Charlotte, United States; 4th-6th October 2015 p. 1-6
- Full Text:
- Reviewed:
- Description: This paper presents an analysis on the disconnection time of single-phase rooftop PVs, located in a three-phase four-wire low voltage distribution feeder after a line-to-ground short-circuit fault on the low voltage feeder. The paper aims to evaluate and discuss the disconnection time and sequence of PVs in a network with 100% PV penetration level. The impact of different parameters such as the location of the fault, impedance of the fault and the ratio of PVs generation capacity to the load demand are considered. Furthermore, the effect of the system earthing in the form of multiple earthed neutral and non-effectively grounded systems are evaluated on the PVs disconnection time. The analyses intend to figure out the conditions under which the PVs in the feeder may fail to disconnect after a line-to-ground fault and keep feeding the fault. The analyses are carried out in PSCAD/EMTDC software.
Discovery of small group interactions and performance from project emails
- Ivkovic, Sasha, Oseni, Taiwo, Chadhar, Mehmood, Firmin, Sally
- Authors: Ivkovic, Sasha , Oseni, Taiwo , Chadhar, Mehmood , Firmin, Sally
- Date: 2020
- Type: Text , Conference paper
- Relation: 24th Pacific Asia Conference on Information Systems: Information Systems (IS) for the Future, PACIS 2020
- Full Text:
- Reviewed:
- Description: Despite latest advances in small group research, discovery of group interactions and performance from analysis of small group communication, such as project emails, is still minimally represented. This paper presents a novel approach of studying small groups through analysis of the participants' emails sent to the project manager. We examined 1,105 email messages from managers' email in-boxes across five distinct ICT projects from the personal, social, collaborative, and engaging perspective of the email senders and link the findings to group performance. The study provides theoretical evidence that analysis of incoming communication from project managers' email in-box can be used to measure a group's success. For project managers the approach has the potential to be highly beneficial for monitoring of indicators for the state of project health. © Proceedings of the 24th Pacific Asia Conference on Information Systems: Information Systems (IS) for the Future, PACIS 2020. All rights reserved.
- Authors: Ivkovic, Sasha , Oseni, Taiwo , Chadhar, Mehmood , Firmin, Sally
- Date: 2020
- Type: Text , Conference paper
- Relation: 24th Pacific Asia Conference on Information Systems: Information Systems (IS) for the Future, PACIS 2020
- Full Text:
- Reviewed:
- Description: Despite latest advances in small group research, discovery of group interactions and performance from analysis of small group communication, such as project emails, is still minimally represented. This paper presents a novel approach of studying small groups through analysis of the participants' emails sent to the project manager. We examined 1,105 email messages from managers' email in-boxes across five distinct ICT projects from the personal, social, collaborative, and engaging perspective of the email senders and link the findings to group performance. The study provides theoretical evidence that analysis of incoming communication from project managers' email in-box can be used to measure a group's success. For project managers the approach has the potential to be highly beneficial for monitoring of indicators for the state of project health. © Proceedings of the 24th Pacific Asia Conference on Information Systems: Information Systems (IS) for the Future, PACIS 2020. All rights reserved.
Discursive Australia : Public discussion of refugees in the early twenty-first century
- Rodan, Debbie, Mummery, Jane
- Authors: Rodan, Debbie , Mummery, Jane
- Date: 2005
- Type: Text , Conference paper
- Relation: Paper presented at the 2nd Annual Conference of the Centre for Research on Social Inclusion, Sydney : 27th - 28th September, 2004
- Full Text:
- Reviewed:
- Description: This paper interrogates recurring discourses in Australia’s public domain with regards to the issue of refugees and Australianness, and how they have been used to ratify notions of inclusion and exclusion with regards to what being Australian - or indeed being un-Australian - does and should mean. The unpacking of these primary discursive positions will be based on an analysis of the letters to the editor published in both The Australian (Australia’s national newspaper) and The West Australian, covering one key period from 22 January to 28 February 2002 (a period encompassing the Woomera hunger strike).
- Description: E1
- Description: 2003001231
- Authors: Rodan, Debbie , Mummery, Jane
- Date: 2005
- Type: Text , Conference paper
- Relation: Paper presented at the 2nd Annual Conference of the Centre for Research on Social Inclusion, Sydney : 27th - 28th September, 2004
- Full Text:
- Reviewed:
- Description: This paper interrogates recurring discourses in Australia’s public domain with regards to the issue of refugees and Australianness, and how they have been used to ratify notions of inclusion and exclusion with regards to what being Australian - or indeed being un-Australian - does and should mean. The unpacking of these primary discursive positions will be based on an analysis of the letters to the editor published in both The Australian (Australia’s national newspaper) and The West Australian, covering one key period from 22 January to 28 February 2002 (a period encompassing the Woomera hunger strike).
- Description: E1
- Description: 2003001231
Does major regional infrastructure influence the resilience of a rural community?
- Schwarz, Imogen, McRae-Williams, Pamela
- Authors: Schwarz, Imogen , McRae-Williams, Pamela
- Date: 2009
- Type: Text , Conference paper
- Relation: Paper presented at 10th National Rural Health Conference: Rural health, the place to be, Cairns, Queensland : 17th-20th May 2009
- Full Text:
- Description: 2003006931
- Authors: Schwarz, Imogen , McRae-Williams, Pamela
- Date: 2009
- Type: Text , Conference paper
- Relation: Paper presented at 10th National Rural Health Conference: Rural health, the place to be, Cairns, Queensland : 17th-20th May 2009
- Full Text:
- Description: 2003006931
DOWL : A dynamic ontology language
- Authors: Avery, John , Yearwood, John
- Date: 2003
- Type: Text , Conference paper
- Relation: Paper presented at IADIS International Conference WWW/Internet 2003, Algarve, Portugal : 5th August, 2003
- Full Text:
- Reviewed:
- Description: Abstract: Ontologies in a web setting, particularly those used in a group context (such as a virtual community), need to be flexible and open to changes that reflect the evolution of knowledge. OWL the ontology language of the semantic web provides very little for facilitating the description of evolutionary changes in an ontology. We propose a dynamic web ontology language (dOWL), an extension to OWL, which consists of a set of elements that can be used to model these evolutionary changes in an ontology.
- Description: E1
- Description: 2003000552
- Authors: Avery, John , Yearwood, John
- Date: 2003
- Type: Text , Conference paper
- Relation: Paper presented at IADIS International Conference WWW/Internet 2003, Algarve, Portugal : 5th August, 2003
- Full Text:
- Reviewed:
- Description: Abstract: Ontologies in a web setting, particularly those used in a group context (such as a virtual community), need to be flexible and open to changes that reflect the evolution of knowledge. OWL the ontology language of the semantic web provides very little for facilitating the description of evolutionary changes in an ontology. We propose a dynamic web ontology language (dOWL), an extension to OWL, which consists of a set of elements that can be used to model these evolutionary changes in an ontology.
- Description: E1
- Description: 2003000552
Dramatic flow in interactive 3D narrative
- Macfadyen, Alyx, Stranieri, Andrew, Yearwood, John
- Authors: Macfadyen, Alyx , Stranieri, Andrew , Yearwood, John
- Date: 2007
- Type: Text , Conference paper
- Relation: Paper presented at Fourth Australiasian Conference on Interactive Entertainment, IE2007, RMIT University, Melbourne, Victoria : 3rd-5th December 2007
- Full Text:
- Description: The concept of dramatic level is crucial for a model of dramatic flow. We present a framework to maintain optimal dramatic flow in an interactive 3D environment where both linear and emergent narratives co-exist. Unlike all other interactive narrative prototypes the framework advanced focuses on the optimal dramatic flow of the emerging user narrative so that although fragmented, it can be engaging and make sense. Using a sample narrative from Ovid’s Metamorphoses [18] we demonstrate a method to evaluate dramatic levels as plot points so that movement across narratives retains a strong dramatic flow. Although users may never choose to explore any given linear narrative in its entirety, the result is an engaging and rich narrative experience.
- Description: 2003004706
- Authors: Macfadyen, Alyx , Stranieri, Andrew , Yearwood, John
- Date: 2007
- Type: Text , Conference paper
- Relation: Paper presented at Fourth Australiasian Conference on Interactive Entertainment, IE2007, RMIT University, Melbourne, Victoria : 3rd-5th December 2007
- Full Text:
- Description: The concept of dramatic level is crucial for a model of dramatic flow. We present a framework to maintain optimal dramatic flow in an interactive 3D environment where both linear and emergent narratives co-exist. Unlike all other interactive narrative prototypes the framework advanced focuses on the optimal dramatic flow of the emerging user narrative so that although fragmented, it can be engaging and make sense. Using a sample narrative from Ovid’s Metamorphoses [18] we demonstrate a method to evaluate dramatic levels as plot points so that movement across narratives retains a strong dramatic flow. Although users may never choose to explore any given linear narrative in its entirety, the result is an engaging and rich narrative experience.
- Description: 2003004706
Dramatic level analysis for interactive narrative
- Macfadyen, Alyx, Stranieri, Andrew, Yearwood, John
- Authors: Macfadyen, Alyx , Stranieri, Andrew , Yearwood, John
- Date: 2008
- Type: Text , Conference paper
- Relation: Paper presented at NILE 2008: 5th International Conference on Narrative and Interactive Learning Environments, Edinburgh, Scotland : 6th-8th August 2008 p. 17-22
- Full Text:
- Description: In interactive 3D narratives, a user’s narrative emerges through interactions with the system and embodied agencies (characters) mediated through the 3D environment. We present a methodology that identifies and measures four factors in interactive narrative where agency is present. We describe a technique for measuring drama, agency and engagement and compare the centrality of a designed interactive narrative with the emergent participatory narrative. This methodology has application as an analytic device for any interactive narrative where agency is fundamental. The adoption of the FrameNet semantic resource and the interpretation of interaction in narrative, situate this work in the domain of 3D interactive narratives, mixed and augmented realities and polymorphic narratives that cross forms of media.
- Description: 2003006540
- Authors: Macfadyen, Alyx , Stranieri, Andrew , Yearwood, John
- Date: 2008
- Type: Text , Conference paper
- Relation: Paper presented at NILE 2008: 5th International Conference on Narrative and Interactive Learning Environments, Edinburgh, Scotland : 6th-8th August 2008 p. 17-22
- Full Text:
- Description: In interactive 3D narratives, a user’s narrative emerges through interactions with the system and embodied agencies (characters) mediated through the 3D environment. We present a methodology that identifies and measures four factors in interactive narrative where agency is present. We describe a technique for measuring drama, agency and engagement and compare the centrality of a designed interactive narrative with the emergent participatory narrative. This methodology has application as an analytic device for any interactive narrative where agency is fundamental. The adoption of the FrameNet semantic resource and the interpretation of interaction in narrative, situate this work in the domain of 3D interactive narratives, mixed and augmented realities and polymorphic narratives that cross forms of media.
- Description: 2003006540
Dynamic operation of post-combustion CO2 capture in Australian coal-fired power plants
- Bui, Mai, Gunawan, Indra, Verheyen, Vincent, Meuleman, Erik, Feron, Paul
- Authors: Bui, Mai , Gunawan, Indra , Verheyen, Vincent , Meuleman, Erik , Feron, Paul
- Date: 2014
- Type: Text , Conference paper
- Relation: 12th International Conference on Greenhouse Gas Control Technologies, GHGT 2014 p. 1368-1375
- Full Text:
- Reviewed:
- Description: Flexible operation of post-combustion CO2 capture (PCC) plants can improve efficiency through coordinating the balance between consumer demands for electricity and CO2 emission reductions. This strategy however, will impose process disturbances and the immediate and long term impact is unclear. There is a justified need for the development of accurate dynamic PCC models, as well as practical experience in dynamic operation of PCC pilot plants. This paper presents CSIRO PCC pilot plant data from the 2012 and 2013 dynamic campaigns using MEA solvent. The step-change approach to dynamic plant operation was implemented and the use of density meters to instantaneously measure CO2 loading instantaneously was investigated.
- Authors: Bui, Mai , Gunawan, Indra , Verheyen, Vincent , Meuleman, Erik , Feron, Paul
- Date: 2014
- Type: Text , Conference paper
- Relation: 12th International Conference on Greenhouse Gas Control Technologies, GHGT 2014 p. 1368-1375
- Full Text:
- Reviewed:
- Description: Flexible operation of post-combustion CO2 capture (PCC) plants can improve efficiency through coordinating the balance between consumer demands for electricity and CO2 emission reductions. This strategy however, will impose process disturbances and the immediate and long term impact is unclear. There is a justified need for the development of accurate dynamic PCC models, as well as practical experience in dynamic operation of PCC pilot plants. This paper presents CSIRO PCC pilot plant data from the 2012 and 2013 dynamic campaigns using MEA solvent. The step-change approach to dynamic plant operation was implemented and the use of density meters to instantaneously measure CO2 loading instantaneously was investigated.